Creative Commons

Displaying 1-40 of 8146 results

  • White Papers // Aug 2015

    Multiple Parameter Optimization of Antenna Array Using GA for Desired Results

    Linear antenna arrays are used to optimize antenna array factor. 16 antenna arrays are used to achieve the results. Genetic algorithm is used for linear antenna array optimization by simultaneously optimizing two input parameters. It is performed on 16 element array. Reduction of SLL and nulls in desired directions are...

    Provided By Creative Commons

  • White Papers // Aug 2015

    Comparative Study of Fractal Antenna with Rectangular Microstrip Antenna

    In this paper, the authors proposed fractal antenna is compared with L slotted linear microstrip antenna. Fractal antenna is basically used for multiband operations but here a new approach is developed for enhancement of bandwidth by fractal antenna. With the same dimension of ground plane it is found that the...

    Provided By Creative Commons

  • White Papers // Aug 2015

    Practical Implementation of Cognitive Radio Using Cyclostationary Based Spectrum Sensing

    The expansion within the wireless business the spectrum becomes valuable resource. The government agency allots the spectrum to the first user in a very static frequency allocation basis that causes spectrum underutilization. Dynamic frequency allocation for improve the spectrum utilization used by cognitive radio. Spectrum sensing is the main task...

    Provided By Creative Commons

  • White Papers // Aug 2015

    Edge Fed Rectangular Slotted Microstrip Antenna - An Analytical Design Approach

    An analytical model for designing, an edge fed rectangular slotted, Rectangular MicroStrip Antenna (RMSA) is proposed. The introduction of slots on the patch results in shift of resonant frequency towards left. The changes due to introduction of slots had been studied using numerous simulation software's which are tedious and time...

    Provided By Creative Commons

  • White Papers // Aug 2015

    Controlled Parameters of Wireless Community Radio Algorithms

    A village level community radio is an application based on ad hoc networks. Community radio comprises of basic mobile phone network, in which users can communicate with each other by the exchange of data. Spectators can generate and distribute audio data to other users of the community radio exchange. Document...

    Provided By Creative Commons

  • White Papers // Aug 2015

    Cyber Crime: Issues and Challenges

    Cyber-crime refers to the criminal act that deals with computers and networks. This crime is posing the challenges to existing national legal systems and it appears to be difficult to control and deal with these crimes within the existing frame of legal system. Specially, the problem of identity crises, jurisdiction...

    Provided By Creative Commons

  • White Papers // Aug 2015

    Simulation Study of Different Authentication Protocols used for Federated Identity Management in Cloud

    Organizations needed a way to unify authentication systems in the enterprise for easier management and better security. Single-sign-on was widely adopted and provided a solution for keeping one repository of usernames and passwords that could be used transparently across several internal applications. After analyzing various issues regarding authentication of user's...

    Provided By Creative Commons

  • White Papers // Jul 2015

    Cluster Based Data Distribution Techniques for Leakage Detection

    Data security is the very important thing in recent years. One organization has to share the data with other for business purpose. The owner of the data can also be called as data distributer and the other business organization can also be called as data agents. Agents should not share...

    Provided By Creative Commons

  • White Papers // Jul 2015

    Review Paper on Congestion Control in MANET Based Time Stamping

    MANET is the network having no fixed infrastructure. Various nodes lies in the n/w communicate to each other directly. They do not have any access point. There are various applications in which this type of network is most demanding. The application area is like military operation area, conference area, some...

    Provided By Creative Commons

  • White Papers // Jul 2015

    A Review on Analysis of 4-Bit Comparator Using Different Full-Adder Logic Style with Different Technologies

    In era of electronics, comparator is most important digital combinatorial circuit which compares two digital or analog signals, but outputs always digital. With enhancement of technology, optimization of digital circuit design improving day-by-day at the cost of complexity. In this paper, some thoughts on performance of different dynamic comparators are...

    Provided By Creative Commons

  • White Papers // Jul 2015

    Intrusion Detection System Using Data Mining Techniques

    Intrusion detection systems are challenging task for finding the user as normal user or attack user in any organizational information systems or IT Industry. The intrusion detection system is an effective method to deal with the kinds of problem in networks. Different classifiers are used to detect the different kinds...

    Provided By Creative Commons

  • White Papers // Jul 2015

    Monitoring of Critical Infrastructure Using Web Based Scada

    For decades, the monitoring of CIs (Critical Infrastructures) has centered on Supervisory Control And Data Acquisition (SCADA) systems, where operators can monitor and control the behavior of the system. The reach of the SCADA system has been hampered by the lack of deployment flexibility of the sensors that feed it...

    Provided By Creative Commons

  • White Papers // Jul 2015

    Low Power Energy Efficient SRAM Cell with MTCMOS Technique

    In modern high performance integrated circuits, maximum of the total active mode energy is consumed due to leakage current. SRAM cell array is main source of leakage current since majority of transistor are utilized for on-chip memory in today high performance microprocessor and system on-chip designs. Therefore the design of...

    Provided By Creative Commons

  • White Papers // Jul 2015

    Cryptographically Use of Caesar Cipher Technique in Password Managing and Security System

    In this paper, the authors introduced a new type of social engineering attack via the website. They computed the result and then proposed a method to mitigate that attack. This paper objective follows by the description of the experiment and then the mitigation of the suggested attack. The results were...

    Provided By Creative Commons

  • White Papers // Jul 2015

    An Extensive Analysis of MANET Attacks Using Special Characteristics

    Wired or wireless network, security is the most crucial part of any data transmission. Securing mobile ad-hoc networks is an extremely tough issue because chances of having vulnerabilities are more when comparing to conventional wired networks. The MANET constructed by relying each node in the network. Due to the absence...

    Provided By Creative Commons

  • White Papers // Jul 2015

    Exploring Dynamic Spectrum Access with Cognitive Radio: A Review

    The problem faced by wireless systems is to find the suitable spectrum bands for the fulfilment of future demands. All of radio spectrum has been allocated different services, user and applications; still it is shown in the observations that the spectrum usage is quite low. Therefore concept of cognitive radio...

    Provided By Creative Commons

  • White Papers // Jul 2015

    Performance Analysis of IPTV Over Fixed WiMAX

    IEEE defines various modulation schemes for WiMAX i.e. QPSK, BPSK, 16 QAM and 64 QAM. This model will examine Internet Protocol TeleVision (IPTV) performance over fixed WiMAX system taking many combinations of digital modulation. The performance will involve many key system parameters, which will involve the variation in the path...

    Provided By Creative Commons

  • White Papers // Jul 2015

    Prevention of Jamming Attack in MANET

    Because of the wireless nature of the channel and particular features of MANETs, the radio interference attacks cannot be removed by traditional security techniques. An adversary can easily prevail over its Medium Access Control (MAC) protocol and continuously transfer packages on the network medium. The authorized nodes keep propagating Request-To-Send...

    Provided By Creative Commons

  • White Papers // Jul 2015

    Effective Network Handovers Using Fuzzy Inference for Heterogeneous Mobility Management

    Omnipresent communication that is mobile increased capacity and appropriate quality guarantee for solutions. To meet up with these demands next-generation mobile network operators will deploy small cells next to old-fashioned base station structure intensively to enhance capacity and service protection for customers. Femto-cell handover handoff techniques must make sure that...

    Provided By Creative Commons

  • White Papers // Jul 2015

    A Review Paper on Improving Power Consumption in Wireless Sensor Network

    Networking together hundreds or thousands of cheap micro sensor nodes allows users to accurately monitor a remote environment by intelligently combining the data from the individual nodes. These networks require robust wireless communication protocols that are energy efficient and provide low latency. The communication or message passing process must be...

    Provided By Creative Commons

  • White Papers // Jul 2015

    Simulation Study of Connectivity Performance in MANET using Random Waypoint Mobility Model

    In this paper, the authors evaluate the connectivity performance of a dynamic Mobile Ad hoc NETwork (MANET) with the help of introducing agent nodes in the network. Although agent nodes are similar to user nodes, their movements and locations with respect to other nodes in MANET improves network connectivity. The...

    Provided By Creative Commons

  • White Papers // Jul 2015

    Raspberry pi Based Smart Supervisor using Internet of Things (IoT)

    Smart supervisor system using internet things is based on embedded Linux operating system with ARM11 architecture, this paper implemented in a real-time digital video monitoring system with data control and acquisition. Based on the ARM - Linux embedded platform, the real-time video monitoring system fulfills the following functions: to collect...

    Provided By Creative Commons

  • White Papers // Jul 2015

    Modeling Of Antenna Array Parameter Using Neural Network For Directivity Prediction

    In an antenna directivity is very important fundamental parameter. It measures the power density in the direction of its strongest emission, versus the power density radiated by an ideal isotropic radiator (which emits uniformly in all directions) radiating the same total power. Traditional methods used for estimation of directivity are...

    Provided By Creative Commons

  • White Papers // Jul 2015

    Secured Wireless Multicast Group Management Protocol

    IGMP (Internet Group Management Protocol) is an integral part of IP multicast in wired networks. When it is used over wireless links, the amount of overhead increases significantly due to joint operation and the polling of mobile users by routers. And IGMP Joint is also having security threats such as...

    Provided By Creative Commons

  • White Papers // Jul 2015

    Data Security in Cloud Storage using RBAC

    A cloud storage system is a collection of storage servers, provides long term storage services over the web. Storing knowledge in an exceedingly third party cloud system causes serious concern over knowledge confidentiality. A secure cloud is a trustworthy source of information. Protecting the cloud is a very important task...

    Provided By Creative Commons

  • White Papers // Jul 2015

    Review on to Detect and Isolate Black Hole Attack in MANETs using AODV

    A mobile ad hoc network can be described as a wireless network which is a collection of heterogeneous mobile devices and is self-organizing, self-configuring. The security in MANET is a highly preferred research area these days in one of the reactive routing protocol AODV because it is susceptible to various...

    Provided By Creative Commons

  • White Papers // Jul 2015

    Design and Implementation of a Smart Antenna Array With QRD-RLS Adaptive Algorithm

    Smart antenna technology offers a notably improved solution to reduce interference levels and improve the system capacity. This paper presents an application of QRD based RLS algorithm using COordinate Rotation by DIgital Computer (CORDIC) operator due to its ability to reduce area utilization for implementing smart antenna. The QR decomposition...

    Provided By Creative Commons

  • White Papers // Jul 2015

    Improving Performance of Wireless Sensor Network for Disaster Management

    Natural disaster occur suddenly. Due to occurrence of disaster, performance of wireless sensor network is degraded It is seen that communication systems are able to meet disaster management needs efficiently as long as connectivity is not interrupted. However when there is breakdown in connection pipeline of information is cut. Probability...

    Provided By Creative Commons

  • White Papers // Jul 2015

    Tracking Moving Targets in Wireless Sensor Network

    Wireless Sensor Network (WSN) comprises of huge number of spatially distributed homogeneous or heterogeneous sensors. The application areas of WSN comprises of environmental monitoring, military surveillance, health care, industrial process control, home intelligence, security, remote metering and many more. As WSN continuously monitor the environment, target tracking proved out to...

    Provided By Creative Commons

  • White Papers // Jul 2015

    Efficient Data Sharing with Attribute Revocation for Cloud Storage

    In a cloud computing the data security achieved by data access control scheme. Cipher text-Policy Attribute-Based Encryption (CP-ABE) is considered as one of the most suitable scheme for data access control in cloud storage. This scheme provides data owners more direct control on access policies. In this paper, the authors...

    Provided By Creative Commons

  • White Papers // Jul 2015

    Reduce Rerouting Time in MANET using Virtual Buffer Zone Algorithm

    The high mobility of nodes in Mobile Ad hoc NETworks (MANETs), there exist frequent link breakages which lead to frequent path failures and route discoveries. MANET routing protocols have to deal with link breaks, which occur due to the frequent movement of the nodes and a dynamic network topology. The...

    Provided By Creative Commons

  • White Papers // Jul 2015

    Power Consumption in WSN based on Data Compression

    Wireless sensor networks are extensively used almost everywhere. WSN's advantages in certain applications and fields are so crucial that no other system can take its place. They are well known for its portable and scalable nature. Word wireless gives users the notion about self-capable device working autonomously. Remotely situated sensors...

    Provided By Creative Commons

  • White Papers // Jul 2015

    Attitude of Consumers towards Online-Marketing

    The digital environment has changed the way consumers and businesses interact, provided new opportunities by facilitating access to information and reduced transaction costs. The digital environment is also likely to have wider economic benefits in terms of increased innovation, creativity, learning, instant and unlimited access to information sources and reduced...

    Provided By Creative Commons

  • White Papers // Jul 2015

    Enhancing the Security of Identity and Access Management in Cloud Computing using Elliptic Curve Cryptography

    Cloud computing is the new technology that aims to provide software, hardware, bandwidth and virtualized resources on demand via the internet based on the principle of pay per use. There are many challenges that facing the cloud computing, one of the main concerns is managing the identity and access control....

    Provided By Creative Commons

  • White Papers // Jul 2015

    Hybrid Method by using Secured Privileged based De-Duplication in Cloud

    Cloud computing provide very cheap structure to take storage calculations. Many organization need to preserve and also operate huge amount of data. One of the most complicated problem of cloud computing is that management of increasing volume of data. For these the data de-duplication is used. The data deduplication is...

    Provided By Creative Commons

  • White Papers // Jul 2015

    Enhancing Mobile Phone Data Privacy using The Cloud

    As the technology is shifting from the desktop/laptops towards Smartphones, more and more organizations are trying to capture this platform to reap the benefit in any way possible. Everyday new applications are being introduced and the older ones are shifting to mobile devices, making it an area of great interest...

    Provided By Creative Commons

  • White Papers // Jul 2015

    Analysis of Data Delivery Technique with Vehicle Assisted Data Delivery for Data Dissemination

    The rapid evolution of wireless communication capabilities and vehicular technology would allow traffic data to be disseminated by traveling vehicles in the near future. Vehicular Ad hoc NETworks (VANETs) are self-organizing networks that can significantly improve traffic safety and travel comfort, without requiring fixed infrastructure or centralized administration. However, data...

    Provided By Creative Commons

  • White Papers // Jul 2015

    Secure AOMDV Protocol in MANET

    The crucial problem in the MANET is malicious nodes. When data is transmitted among nodes it may reach to the destination node with response time less than the threshold value. Such types of nodes are known as black hole nodes. In this paper, the authors try to analyze the problem...

    Provided By Creative Commons

  • White Papers // Jul 2015

    Performance Evaluation of Software Development Effort Estimation using Neuro-Fuzzy Model

    One of the greatest challenges for software developers is forecasting the development effort for a software system for the last decades. The capability to provide a good estimation on software development efforts is necessitated by the project managers. Software effort estimation models divided into two main categories: algorithmic and non-algorithmic....

    Provided By Creative Commons

  • White Papers // Jul 2015

    Advance Multi-Factor Authentication and Multi-keyword Ranked Search for Encrypted Data

    In this paper, the authors propose a novel biometrics-based single sign on user authentication scheme in telematics system, in order to enable to protect user account privacy. This paper is to develop a secure and versatile multi-factor authentication to telematics environments with key management. Considering the massive form of data...

    Provided By Creative Commons

  • White Papers // Nov 2010

    Equality Saturation: A New Approach to Optimization

    Optimizations in a traditional compiler are applied sequentially, with each optimization destructively modifying the program to produce a transformed program that is then passed to the next optimization. The authors present a new approach for structuring the optimization phase of a compiler. In the approach, optimizations take the form of...

    Provided By Creative Commons

  • White Papers // Mar 2015

    Workload Management in Geo-Distributed Data Centers

    Data center centralizes large amount of data and consumes enormous amount of energy and expenditure. Due to tremendous growth in population, the workload on data centers has been increased because of computation, storage and communication. This leads to operational expenditure due to task assignment, data placement and data movement to...

    Provided By Creative Commons

  • White Papers // Jan 2015

    The Android - A Widely Growing Mobile Operating System with Its Mobile Based Applications

    Android operating system is one of the most widely used mobile operating System these days and also enhancing its use for making betterment in different areas of life. Android mobile operating system is based on the Linux kernel and is developed by Google and primarily designed for smartphones and tablets....

    Provided By Creative Commons

  • White Papers // Jan 2013

    Customer Retention Based on the Number of Purchase: A Data Mining Approach

    In this paper, the authors aim at finding the relationship between the numbers of purchase and the customer's income. The data mining tools were applied in the study to find those customers who bought more than one life insurance policy and represented the signs of good payments at the same...

    Provided By Creative Commons

  • White Papers // Mar 2014

    Aging Modeling in Reliability Evaluation of Power Distribution System

    Electrical power distribution systems are formed from many components which become aged during the time. This aging has a large effect on the reliability level of these systems which cannot be simulated using traditional approaches in reliability assessment of power systems such as renewable models. In this paper, three non-renewable...

    Provided By Creative Commons

  • White Papers // Dec 2014

    Basics of Distributed Operating System

    The distributed operating systems focus mainly on the concept of "Shared memory". The term "Shared memory" means each device connected in network has its own private memory. So in distributed system the data stored in distributed manner or say data is not localized at one center location it is stored...

    Provided By Creative Commons

  • White Papers // Mar 2014

    HTTP Streaming For Transferring Hypertext and Hypermedia Information Based On Mobile Node

    In last decade an instruments called mobile phone being part of human. Today every one required application is based on mobile. Due to new innovation in technology, mobile phone becomes Smartphone that built on mobile operating system with more computing capability and connectivity. Smartphone allow user to install and use...

    Provided By Creative Commons

  • White Papers // Mar 2015

    Smart Home System Using Wireless Module

    In the recent years, the development of wireless technology and android system has brought a considerable change in the lifestyle of each and every human being. In this paper, the authors discuss the design and implementation of home automation system using microcontroller ARM mbed-FRDM KL25Z and Wi-Fi module. This paper...

    Provided By Creative Commons

  • White Papers // Mar 2015

    Mobile Theft Monitoring

    In this paper, the authors create an application "Theft monitoring" where the users are able to find their lost phone easily. Sometimes they accidently tend to replace their phone somewhere and they end up searching for it. Hence to avoid such situations and keeping the recent demand and the greed...

    Provided By Creative Commons

  • White Papers // Mar 2015

    Remote Desktop Access through Android Mobiles and Android Mobiles Access through Web Browser

    In this paper, the authors will present the process to access the computers and handle them with the help of android mobile phones. As well as access the Android mobile by using a Web browser. This process is implemented by using a socket and to access the android mobile "NANOHTTPD"...

    Provided By Creative Commons

  • White Papers // Jun 2014

    Education Recommendation System

    In the present scenario, the authors see that students are facing lot of problems for choosing the right interest of course or the branch and selecting the colleges after their senior secondary education. Most of the students just take the decision of choosing their branch because of their relatives' suggestions...

    Provided By Creative Commons

  • White Papers // Dec 2014

    Implementation of 'Polling Server' in RT Scheduling

    Scheduling is a central activity of a computer system, usually performed by the operating system. Fixed-priority scheduler is the polling-server in rate monotonic scheduling algorithm, which assigns higher priorities to tasks with shorter relative deadlines. It is intuitive to see that if every task's period is the same as its...

    Provided By Creative Commons

  • White Papers // Mar 2015

    Handling PC through Speech Recognition and Air Gesture

    Speech recognition technology is one from the fast growing engineering technologies. It has a number of applications in different areas and provides potential benefits. Nearly 20% people of the world are suffering from various disabilities; many of them are blind or unable to use their hands effectively. The speech recognition...

    Provided By Creative Commons

  • White Papers // Dec 2014

    Thumbnail Image Creation in Hadoop Using Python

    Apache Hadoop is a software framework that supports data-intensive distributed application under a free license. It enables applications to work with thousands of nodes and petabytes of data. Hadoop was inspired by Google's MapReduce and Google File System (GFS) papers. Hadoop was originally developed to support distribution for the Nutch...

    Provided By Creative Commons

  • White Papers // Mar 2015

    A Secure NFC Application for Credit Transfer among Mobile Phones

    Since the late 1990s, people have enjoyed a comfortable lifestyles. Mobile devices supported by the development of wireless networks have spread throughout the world and mobile commerce applications become the most popular application for mobile device users those who want to do business and financial transactions are available anytime, anywhere....

    Provided By Creative Commons

  • White Papers // Mar 2014

    Introduction to Intrusion Detection System

    An Intrusion Detection System (IDS) is a device or software application that monitors network or system activities for malicious activities or policy violations and produces reports to a management station. Some systems may attempt to stop an intrusion attempt but this is neither required nor expected of a monitoring system....

    Provided By Creative Commons

  • White Papers // Sep 2014

    Wearable Technology

    Wearable computing is the pioneer or leading technology of research describing out of thinking & advance platform for students. This paper describes, as the advances are made in hardware layout this technology get spread faster & gives very interesting & challenging application. Wearable computing prototype supporting training activities at the...

    Provided By Creative Commons

  • White Papers // Mar 2015

    Latest Side-Channel Attacks and Its Countermeasure Attacks: Attacks Based On Cryptography

    Latest side-channel attacks are very easy to execute powerful attacks against crypto graphic implementations, and their targets range from primitives, protocols, modules, devices to even systems. These attacks harm a serious threat to the security of cryptographic modules. Also, cryptographic implementations have been executed for their resistivity against such attacks...

    Provided By Creative Commons

  • White Papers // Jun 2014

    Enhancement of Learning Using Speech Recognition and Lecture Transcription

    Speech Recognition (SR) technology has a burgeoning range of applications in education system. Speech Recognition (SR) technologies were evaluated in different classroom environments to assist students to automatically convert oral lectures into text. Two distinct methods of SR-mediated Lecture Acquisition (SR-mLA), Real-Time Captioning (RTC) and Post-Lecture Transcription (PLT), has been...

    Provided By Creative Commons

  • White Papers // Mar 2015

    Power Supply Optimization Using Series-Shunt Flexible AC Transmission System (UPFC): A Review

    In modern power system many protection equipment are connected in complex network. They are interconnected with each other. The rising demand of power and difficulties of constructing a newly transmission network causes the power system to be complex and stressed. Due to the stress in the power system there is...

    Provided By Creative Commons

  • White Papers // Mar 2015

    Anomaly Detection and Prevention in Secure Data Transmission

    There are many techniques in market to send data securely. Data can be sends after applying any specific security check over specific data. But, now-a-days problem is to secure data as well as communicate with different platform. Because, some using Windows platform some using UNIX or any other platform. This...

    Provided By Creative Commons

  • White Papers // Mar 2014

    Wireless Infrared Remote Controller for Multiple Home Appliances

    The InfraRed (IR) remote control devices are used to operate in the most of modern household applications, such as television, DVDs, Set top box, Home theatre And Air conditioner etc. With the development of the society and smart home, there are more and more home appliances and more infrared remote...

    Provided By Creative Commons

  • White Papers // Jun 2014

    Automated Control System for Emission Level & Rash Driving Detection in Vehicles

    Vehicles have become an integral part of everyone's life. Situations and circumstances demand the usage of vehicles in this fast paced urban life. As a coin has two sides, this has its own effects, one of the main side effects being air pollution. Every vehicle will have emission but the...

    Provided By Creative Commons

  • White Papers // Mar 2015

    Medley of Business Sustainability Models

    While there are considerable volumes of literature dealing with sustainability in terms of the creation of economic value and increasing corporate environmental and social sensitivities. There are even more existing body of literature and publications focusing on sustainability as an environmental, social or even moral matter. The degree of divergence...

    Provided By Creative Commons

  • White Papers // Dec 2014

    Design & Development of Two Factor Hash Based Authentication Framework

    Current authentication schemes suffer many weaknesses. Textual passwords are widely used; but this textual passwords easy to break and vulnerable to dictionary attacks or brute force attacks. Available authentication schemes face many problems. Graphical passwords face lack of space. Smart cards or tokens can be lost or prone to theft....

    Provided By Creative Commons

  • White Papers // Jun 2014

    Mitigation of Power Quality Problems by D-Statcom

    In this paper, facts devices used for power quality improvement is presented. In addition, the power electronics-based equipment, which are called power conditioners are used to solve power quality problems. Since the topologies of these equipment are similar to those used in FACTS equipment, power conditioners are also called Distribution...

    Provided By Creative Commons

  • White Papers // Sep 2014

    Dynamic Resource Allocation for Cloud Computing Environment Using Virtual Machines

    Cloud computing allows business customers to scale up and scale down their resource usage based on their needs. Many of the gains in the cloud come from resource multiplexing through virtualization technology. In this paper, the authors present a system that uses virtualization technology to allocate data center resources dynamically...

    Provided By Creative Commons

  • White Papers // Jun 2014

    Smart Programmable Timer

    The electronic industrial timers are used in the industries to control the process/operation with specified time interval of repetitive nature. They find applications in the control of sequential functions of industrial machinery at varying time intervals for plastic industries, pharmaceutical industries, petro-chemical industries, steel industries, power plants etc. Electronic timers...

    Provided By Creative Commons

  • White Papers // Mar 2014

    Analysis of Modern Digital Differential Protection for Power Transformer

    In this paper, the authors present the analysis of digital differential protection for three phase power transformers. Power transformer is the key element in electrical power system. Proper protection is needed for economical and safe operation of electrical power system. Power transformer protective relay should block the tripping during external...

    Provided By Creative Commons

  • White Papers // Jun 2014

    Analysis of a D-Statcom in A 25 KV Power Distribution System Using Simulink

    In this paper, the authors focus on the design and simulation of a D-STATCOM when connected to a distribution system. Simulink from MATLAB is used in the design and simulation of the D-STATCOM. With the struggle envisioned for trying the project in a real power system, the Sim-Power Systems (SPSs)...

    Provided By Creative Commons

  • White Papers // Feb 2013

    GSM Based Automatic Motor Control and Protection System

    Some wise scientist once said that control system is a system where users can shut down the machine whenever they want. That's the difference between controlled and uncontrolled machine. The authors' paper is about make this control system efficient and dynamic. As the name suggested the automatic control is for...

    Provided By Creative Commons

  • White Papers // Sep 2012

    Implementation of High Speed Distributed Data Acquisition System

    In this paper, the authors introduce a high speed distributed data acquisition system based on a Field Programmable Gate Array (FPGA). The aim is to develop a "Distributed" data acquisition interface. The development of instruments such as personal computers and engineering workstations based on "Standard" platforms is the motivation behind...

    Provided By Creative Commons

  • White Papers // Apr 2015

    Handling Multithreading Approach using Java

    In this paper, the authors contains information on multithreading in java and application based on it. In this report, they discuss the use of multithreading, its types and its methods. Java is a multithreaded programming language. A multithreaded program contains two or more parts that can run concurrently and each...

    Provided By Creative Commons

  • White Papers // Feb 2015

    Reviewing Execution Performance of Association Rule Algorithm Towards Data Mining

    Association rule approach for data mining is a popular and well researched method for extracting interesting relations between data values in large databases. Multilevel association rules use multi leveled approach to retrieve in depth insight into information extracted. Apriori algorithm explores the single level association rules. Here fast Apriori implementation...

    Provided By Creative Commons

  • White Papers // Aug 2014

    Protected Data Distribution for Multiple Owners in Dynamic Groups of Public Clouds

    Protected data distribution in multiple owner manner for dynamic groups preserves data, identity privacy from an untrusted cloud and allows frequent change of membership. In RLS while the number of invoked users grows larger, the length of RL increases. To send all user invocation details to the group members for...

    Provided By Creative Commons

  • White Papers // Apr 2014

    Power Efficient Memory Design Using Domino Logic

    In this paper, a power efficient memory file register is designed using Current Comparison-based Domino (CCD) logic. This domino logic is used in designing the Local Bit Line and Global Bit Line (LBL and GBL) of the memory file. An 88 register memory file is designed and the LBL and...

    Provided By Creative Commons

  • White Papers // Jan 2014

    Survey on Clustering Algorithm and Similarity Measure for Categorical Data

    Learning is the process of generating useful information from a huge volume of data. Learning can be either supervised learning (e.g. classification) or unsupervised learning (e.g. clustering) clustering is the process of grouping a set of physical objects into classes of similar object. Objects in real world consist of both...

    Provided By Creative Commons

  • White Papers // Sep 2011

    A Sequential Approach for Surmising Missing Items in the Shopping Cart

    Existing research in association mining has focused mainly on how to expedite the search for frequently co-occurring groups of items in "Shopping cart" type of transactions; less attention has been paid to methods that exploit these frequent item sets for prediction purposes. This paper contributes to the latter task by...

    Provided By Creative Commons

  • White Papers // Sep 2011

    Item Set Extraction of Mining Association Rule

    Most of the research activities in association rule mining focus on defining efficient algorithms for item set extraction. To reduce the computational complexity of item set extraction, support constraint is enforced on the extracted item sets. The IMine index structure can be efficiently exploited by different item set extraction algorithms....

    Provided By Creative Commons

  • White Papers // Sep 2011

    Construction of Developing User Profiles for Mining Structure

    Now-a-days, business transactions are carried out over the web with e-commerce (electronic commerce) activity is undergoing a significant revolution. CRM (Customer-Relationship Management) is the ability to track user's browsing behavior, down to individual mouse clicks, has brought the vendor and end customer to very closer than ever. This paper provides...

    Provided By Creative Commons