Global Journals

Displaying 1-40 of 297 results

  • White Papers // Jun 2015

    Attribute Assignment to Point Cloud Data and Its Usage

    In recent years with the development of laser measurement technology, utilization of point cloud data is progressing. However, since point cloud data does not contain attribute information, the usability of the data is low. It is possible to consider that by assigning attributes to the non-attribute point cloud data; this...

    Provided By Global Journals

  • White Papers // Jun 2015

    Improving the Read Performance of the Distributed File System Through Anticipated Parallel Processing

    In the emerging big data scenario, Distributed File Systems (DFSs) are used for storing and accessing information in a scalable manner. Many cloud computing systems use DFS as the main storage component. The big data applications deployed in cloud computing systems more frequently perform read operations and less frequently the...

    Provided By Global Journals

  • White Papers // May 2015

    Real Time Kernel Based Hot Spot Communication Using Raspberry PI

    The real-time application of an embedded Linux is essential in the area of device driver platform. Device driver plays a vital role of both hardware and software. Configuration of raspberry pi processor in various commands sets in embedded Linux by enabling of Wi-Fi device by scratch process of various units...

    Provided By Global Journals

  • White Papers // May 2015

    Edging Trust in Cloud Enviroment

    Cloud computing is an internet based computing system, which allows users to share resources, information, software and services through a distributed network. This paper describes about trust in cloud environment. In this paper, the authors present some measures in relation to security and prevention. The methodology of their study is...

    Provided By Global Journals

  • White Papers // May 2015

    A Review of Business Intelligence Survey on Cloud Computing

    Cloud computing is an important area to research because of the value it can provide to business. the researcher analysis Business Intelligence (BI) can offered to business over the internet as solution. Organization are striving to become intelligence and achieve competition advantages through use of Business Intelligence (BI) solutions one...

    Provided By Global Journals

  • White Papers // May 2015

    Association in Various Clouds and Client Using Proxy Framework

    Cloud computing is a method of providing resources over the Internet. Security challenges are still foremost concern when the authors considering collaboration between multiple Cloud's Service Providers (CSPs). In cloud, user's information or data is stored in multiple CSP. To access those information or data to other CSP user they...

    Provided By Global Journals

  • White Papers // May 2015

    A Study on Consumer's Perception Regarding Online Shopping

    In today's ever changing and dynamic business environment, it is essential for all online retailers to understand the online consumer's purchase behavior and their perception regarding online shopping i.e. causes of buying or not buying products and services offered to them over internet. This paper is to examine selected four...

    Provided By Global Journals

  • White Papers // May 2015

    A Study on Customer's Perception Towards Personalization in Online Purchases

    Recent growth of online business has created a substantial amount of innovative services to overcome the intense online competition. These services have been found to be very useful in increasing customer satisfaction and have become a key component in making an online business successful. A major feature that personalization can...

    Provided By Global Journals

  • White Papers // May 2015

    Effect of Personality on Happiness and Interpersonal Relationship of the Employees

    A happy personality having positive interpersonal relationships at work fosters a variety of beneficial outcomes for individuals and organizations. The present paper was designed to examine the effect of personality on happiness and interpersonal relationship of the employees. A total sample size of 93 was used in this study. The...

    Provided By Global Journals

  • White Papers // May 2015

    Impact of E Commerce on Consumer Protection

    Rapid developments in Information and Communication Technology (ICT) have fueled the new paradigm of Electronic Commerce (E-Commerce). Enterprises all over the globe have either created or are in the process of creating the E-Commerce front-ends to their traditional businesses. Several new products and services are being innovated and marketed through...

    Provided By Global Journals

  • White Papers // Apr 2015

    Two-step authentication with data de-duplication in Cloud

    Data optimization is a method for reducing the amount of storage space an organization and wants to protect its data in most companies the data storage system contains same copies of many parts of data for example some file may be appear in several different part by different users. De-duplication...

    Provided By Global Journals

  • White Papers // Apr 2015

    Consumer Buying Behaviour Towards Online Shopping - A Review of Literature

    In this paper, the authors attempt to analyze the characteristics of buying behavior of online shoppers. Consumer buying behavior in respect of online shopping was studied using different socio-economic variables. It also provides a support that helps researchers understand the drivers of consumers' attitude and goal to shop on the...

    Provided By Global Journals

  • White Papers // Apr 2015

    A New Measures for CSR (Corporate Social Responsibility)

    The last half decade has witnessed a remarkable resurgence of attention among practitioners and scholars to understanding the ability of Corporate Social Responsibility (CSR) to address environmental and social problems. While significant advances have been made, assessing the forms, types and impacts on intended objectives is impeded by the conflation...

    Provided By Global Journals

  • White Papers // Apr 2015

    A Comparative Study of Hybrid Applications in E-Commerce: Better Than Web /Native Applications

    Mobile apps are designed to provide all the facilities in hand. These facilities may vary from platform to platform, due to its performance issues. So, it becomes tedious tasks for the mobile app developers to develop different apps for different platforms. Today, the need of market is to have platform...

    Provided By Global Journals

  • White Papers // Mar 2015

    A New View at Usability Test Methods of Interfaces for Human Computer Interaction

    As a basic and important term in the interaction design and usability is an overall rating of the degree of use in the human computer interaction, which guarantees the realization of interaction. Usability test is a necessary process in the human computer interface design. It is a process of through...

    Provided By Global Journals

  • White Papers // Mar 2015

    Investigating the VLSI Characterization of Parallel Signed Multipliers for RNS Applications Using FPGAs

    Signed multiplication is a complex arithmetic operation, which is reflected in its relatively high signal propagation delay, high power dissipation and large area requirement. High reliability applications such as cryptography, Residue Number System (RNS) and Digital Signal Processing (DSP)'s effective performance are mainly depends on its arithmetic circuit's performance. Trend...

    Provided By Global Journals

  • White Papers // Mar 2015

    Customer Relationship Management System

    In this paper, the authors involve managing customer service and performing the other allied information processing. The customer relationship management handles the customer requisition details, records for stock in consumer products where many transactions are to be noted and keeping accounts for each deal. The products, price and other details...

    Provided By Global Journals

  • White Papers // Mar 2015

    A Study on Consumers' Demographic Profile Influences on Online Shopping Behavior

    Online consumer behavior is a wide and appealing area of study that can grow firms involved in marketing of products and service through new media such as Internet. It is very vital to study that how socio demographic factors of consumers influence the online shopping behavior of consumers. The result...

    Provided By Global Journals

  • White Papers // Feb 2015

    Big Data Analysis: Ap Spark Perspective

    Big data have gained enormous attention in recent years. Analyzing big data is very common requirement today and such requirements become nightmare when analyzing of bulk data source such as Twitter twits are done, it is really a big challenge to analyze the bulk amount of twits to get relevance...

    Provided By Global Journals

  • White Papers // Feb 2015

    A Data Hiding Technique

    Steganography is the art of hiding information and an effort to conceal the existence of the embedded information. It serves as a better way of securing message than cryptography which only conceals the content of the message not the existence of the message. Original message is being hidden within a...

    Provided By Global Journals

  • White Papers // Feb 2015

    Security Issues in Cloud Computing Environment

    Cloud computing is a model for representing significant opportunity for service providers and enterprises. Relying on cloud computing, enterprises can achieve cost savings, flexibility and choice for computing resources. Cloud computing is one of today's most exciting technologies due to its ability to reduce costs associated with Computing while increasing...

    Provided By Global Journals

  • White Papers // Feb 2015

    Data Storage Security and Data Management in Cloud Computing

    Cloud computing has been visualized as the future generation architecture of information technology activity. In difference to predictable solutions, cloud computing moves the application software and databases to the huge information centers. Data security for such a cloud computing includes safe channels, access controls and encryption. When users think the...

    Provided By Global Journals

  • White Papers // Feb 2015

    Data Mining Techniques for Secure Online Financial Transactions in Banking Sector

    In this paper, the authors provide a detailed summarization of data mining techniques that it is possible to characterize and detect false transactions over e commerce in a year, depending on the information, historical performance and characteristics, using different types of data mining techniques. As these days, businesses have become...

    Provided By Global Journals

  • White Papers // Feb 2015

    A Study on Role of E-Commerce in Supply Chain Management

    Supply chain management is delivering the right product to the right place, at the right time and at the right price and is one of the most powerful engines of business transformation. It is one of the leading cost saving and revenue enhancement strategies in use today. At the end...

    Provided By Global Journals

  • White Papers // Feb 2015

    Handling of Library Data with HADOOP

    In this paper, the authors are introducing latest technology in library. As they all know Hadoop is open source software for handling big data. In present era, all library work done by the computer. Day-by-day the resources are increasing in the library so librarians are facing difficulty to handle their...

    Provided By Global Journals

  • White Papers // Feb 2015

    Impact of CSR on Organizational Trust and Brand Authenticity and Their Behavioral Outcomes on Firms

    The importance of corporate social responsibility in sustainable business is inevitable throughout the world. This paper aims to investigate long-term relationships between stakeholders and socially responsible companies, reasoning the effect of organizational trust and brand authenticity on such relationships. Trust is a fundamental asset in every business and non-business relationship....

    Provided By Global Journals

  • White Papers // Feb 2015

    E-HRM: An Innovative Tool for Organizational Performance

    Technology has evolved and developed in a way that enables E-HRM to prove its significance, especially with the introduction of corporate intranets and web-enabled human resource information system. Use of computer in business management was the first step that management evaluates from conventional style to the e-style. The term E-HRM...

    Provided By Global Journals

  • White Papers // Feb 2015

    FPGA Implementation of Scalable Encryption Algorithm Using VerilogHDL with Xilinx Spartan-3

    Initially, SEA is designed for software implementations in controllers, smart cards, or processors. In this paper, the authors proposed a system that investigates its performances in recent Field-Programmable Gate Array (FPGA) devices. The present symmetric encryption algorithms result from a tradeoff between implementation cost and resulting performances. The proposed system...

    Provided By Global Journals

  • White Papers // Jan 2015

    Improved Approaches to Handle Bigdata Through Hadoop

    Big data is an evolving term that describes any voluminous amount of structured, semi-structured and unstructured data that has the potential to be mined for information. Today's world produces a large amount of data from various sources, records and from different fields termed as "Big data". Such huge data is...

    Provided By Global Journals

  • White Papers // Jan 2015

    Data Mining in Biodata Analysis

    For finding interesting patterns in large databases has lot of development in recent years. Data mining is used in many fields like medicine, securing the data etc. Whereas bio data means the data regarding the biology, medical science, DNA technology and Bioinformatics in-depth analysis. Bioinformatics is the science which can...

    Provided By Global Journals

  • White Papers // Jan 2015

    Design of Low Power 4-Bit CMOS Braun Multiplier Based on Threshold Voltage Techniques

    A circuit design for a new low power 4-bit Braun multiplier is presented. The multiplier is implemented by using different threshold voltage techniques. Power reduction techniques are proposed for 4-bit Braun multiplier which is designed by full adders. To get optimum design low threshold voltages are used at critical paths...

    Provided By Global Journals

  • White Papers // Jan 2015

    An Efficient Implementation of Digit FIR Filters Using Memory Based Realization

    There are many hand-held products that include Digital Signal Processing (DSP), for example, cellular phones and hearing aids. In this paper, the authors are an exact common sub expression elimination algorithm for the optimum sharing of partial terms in Multiple Constant Multiplications (MCMs). Although many efficient high-level algorithms have been...

    Provided By Global Journals

  • White Papers // Jan 2015

    Energy Efficient FMA for Embedded Multimedia Application

    In this paper, the authors present energy efficient fused multiply add for multimedia applications. Low cost, low power and high performance factors diddle the design of many microprocessors directed to the low-power figuring market. The floating point unit occupies a significant percentage of the silicon area in a microprocessor due...

    Provided By Global Journals

  • White Papers // Jan 2015

    Myths of Online Advertising in the Internet Era - A Literatures Review

    The term "Online advertising" refers to all sorts of banner, e-mail and keyword advertising on the websites such as Face book, Twitter, Google, etc. The online advertisements presents the advertisement copy in an animated way in a stylish form including both text and images in an interactive manner. With the...

    Provided By Global Journals

  • White Papers // Dec 2014

    Does Gender Play a Role in Online Consumer Behavior?

    Electronic commerce (online shopping) is increasing in popularity now-a-days due to the popularity of computer usage and the prevalence of internet. Electronic commerce can produce numerous benefits to both sellers and consumers. Hence, the study of online consumer behavior can generate a better online atmosphere to facilitate greater profit to...

    Provided By Global Journals

  • White Papers // Dec 2014

    Effect of Visual Merchandising on Consumer Buying Behaviour

    The retailers are facing an intense competitive market place and as a consequence, they find many difficulties to differentiate their stores. Retail store elements such as color, lighting and visual merchandising have always been considered as having immediate effects on the buying decision making process. Visual merchandising is the presentation...

    Provided By Global Journals

  • White Papers // Oct 2014

    Area Efficient Layout Design of Multiply Complements Logic (MCL) Gate Using QCA Technology

    Quantum dot Cellular Automata (QCA) is one of now popular technology for its highly scalable feature and ultra-low power consumption that made its one of the promising alternatives to CMOS technology. This paper present a new layout design of Multiply Complements Logic (MCL) gate based on QCA INVerter (INV), QCA...

    Provided By Global Journals

  • White Papers // Sep 2014

    An Under-Sampled Approach for Handling Skewed Data Distribution Using Cluster Disjuncts

    In data mining and knowledge discovery hidden and valuable knowledge from the data sources is discovered. The traditional algorithms used for knowledge discovery are bottle necked due to wide range of data sources availability. Class imbalance is a one of the problem arises due to data source which provide unequal...

    Provided By Global Journals

  • White Papers // Sep 2014

    Digital Frequency Synthesis Using Multi-Phase NCO for Dielectric Characterization of Materials on Xilinx Zynq FPGA

    Precise measurement of dielectric characteristics of materials is becoming necessity in several engineering applications. The dielectric constant measurement over wide frequency range for emerging applications such as PCB manufacturing, agriculture, environmental and food processing industries has several challenges. With the advancement in digital VLSI and Field Programmable Gate Array (FPGA)...

    Provided By Global Journals

  • White Papers // Sep 2014

    Automatic Multiple Document Text Summarization Using Wordnet and Agility Tool

    The number of web pages on the World Wide Web (WWW) is increasing very rapidly. Consequently, search engines like Google, AltaVista, Bing, etc. provides a long list of URLs to the end user. So, it becomes very difficult to review and analyze each web page manually. That's why automatic text...

    Provided By Global Journals

  • White Papers // Apr 2010

    Energy Efficiency in Datacenters Through Virtualization: A Case Study

    Data centers have turned into a big concern for enterprises. Data centers have exhibited steady energy demand growth, and electric utilities have received sizeable requests for electrical power for new facilities. Electricity usage costs have become an increasing fraction of the total cost of ownership for data centers. There are...

    Provided By Global Journals

  • White Papers // Sep 2010

    Performance Analysis of Wired and Wireless LAN Using Soft Computing Techniques - A Review

    The wired Computer Networks provide a secure and faster means of connectivity but the need of mobility i.e. anywhere, anytime and anyone access is tilting the network users towards wireless technology. In this paper, an overview of the current research literature, in the field of Wired and wireless networks, has...

    Provided By Global Journals

  • White Papers // Dec 2010

    The Role of Boolean Function in Fractal Formation and It's Application to CDMA Wireless Communication

    In this paper, a new transformation is generated from a three variable Boolean function 3, which is used to produce a self-similar fractal pattern of dimension 1.58. This very fractal pattern is used to reconstruct the whole structural position of resources in wireless CDMA network. This reconstruction minimizes the number...

    Provided By Global Journals

  • White Papers // Apr 2010

    Analysis of Malicious Detection in Bluetooth Enabled Devices Exploiting Wireless Personal Area Networks

    The growing popularity of mobile devices (Smart phones, handsets, PDAs) along with 3G technology brings the mobile internet services on these devices. The wireless devices with messaging capabilities attracted the malware writers to target the hand held devices. Even though the mobile device has numerous benefits like mobility, compact size...

    Provided By Global Journals

  • White Papers // Jul 2010

    A Survey on Topology for Bluetooth Based Personal Area Networks

    In recent years, wireless ad-hoc networks have acquired significant importance. Correspondingly, a great deal of attention is offered towards short range radio systems that are operated using Bluetooth technology and IEEE 802.15 Wireless Personal Area Networks (WPAN). Piconets form the fundamental architectural unit in WPANs. Bluetooth is a Wireless Personal...

    Provided By Global Journals

  • White Papers // Apr 2010

    Analysis of Cost Function in Medium Access Control Layer for Next Generation Wireless Terminals

    The next generation wireless networks impose challenges due to their architectural heterogeneity in terms of different access schemes, resource allocation techniques and Quality of Service (QoS) requirements. These heterogeneities must be captured and handled dynamically as mobile terminals roam between different wireless architectures. These challenges are addressed by an Adaptive...

    Provided By Global Journals

  • White Papers // Apr 2015

    Two-step authentication with data de-duplication in Cloud

    Data optimization is a method for reducing the amount of storage space an organization and wants to protect its data in most companies the data storage system contains same copies of many parts of data for example some file may be appear in several different part by different users. De-duplication...

    Provided By Global Journals

  • White Papers // Jan 2015

    Myths of Online Advertising in the Internet Era - A Literatures Review

    The term "Online advertising" refers to all sorts of banner, e-mail and keyword advertising on the websites such as Face book, Twitter, Google, etc. The online advertisements presents the advertisement copy in an animated way in a stylish form including both text and images in an interactive manner. With the...

    Provided By Global Journals

  • White Papers // Nov 2013

    Consumer Awareness in Online Shopping System

    The Internet has become an essential part of everyone's daily life, and companies realize that the Internet can be a shopping channel to reach existing and potential consumers. With this consensus online shopping as a whole has rapidly grown. The biggest surprise is that clothing is one of the top...

    Provided By Global Journals

  • White Papers // Feb 2015

    A Data Hiding Technique

    Steganography is the art of hiding information and an effort to conceal the existence of the embedded information. It serves as a better way of securing message than cryptography which only conceals the content of the message not the existence of the message. Original message is being hidden within a...

    Provided By Global Journals

  • White Papers // Nov 2013

    TPA Added Service in Cloud Computing

    Cloud computing involves three segments. They are cloud User (U), who has large amount of data files to be stored in the cloud, the Cloud Server (CS), which is managed by Cloud Service Provider (CSP) to provide data storage service. The system adds the fourth layer the Third Party Auditor...

    Provided By Global Journals

  • White Papers // Feb 2015

    Security Issues in Cloud Computing Environment

    Cloud computing is a model for representing significant opportunity for service providers and enterprises. Relying on cloud computing, enterprises can achieve cost savings, flexibility and choice for computing resources. Cloud computing is one of today's most exciting technologies due to its ability to reduce costs associated with Computing while increasing...

    Provided By Global Journals

  • White Papers // May 2015

    Edging Trust in Cloud Enviroment

    Cloud computing is an internet based computing system, which allows users to share resources, information, software and services through a distributed network. This paper describes about trust in cloud environment. In this paper, the authors present some measures in relation to security and prevention. The methodology of their study is...

    Provided By Global Journals

  • White Papers // May 2015

    A Review of Business Intelligence Survey on Cloud Computing

    Cloud computing is an important area to research because of the value it can provide to business. the researcher analysis Business Intelligence (BI) can offered to business over the internet as solution. Organization are striving to become intelligence and achieve competition advantages through use of Business Intelligence (BI) solutions one...

    Provided By Global Journals

  • White Papers // May 2015

    Association in Various Clouds and Client Using Proxy Framework

    Cloud computing is a method of providing resources over the Internet. Security challenges are still foremost concern when the authors considering collaboration between multiple Cloud's Service Providers (CSPs). In cloud, user's information or data is stored in multiple CSP. To access those information or data to other CSP user they...

    Provided By Global Journals

  • White Papers // Feb 2015

    Data Storage Security and Data Management in Cloud Computing

    Cloud computing has been visualized as the future generation architecture of information technology activity. In difference to predictable solutions, cloud computing moves the application software and databases to the huge information centers. Data security for such a cloud computing includes safe channels, access controls and encryption. When users think the...

    Provided By Global Journals

  • White Papers // Jun 2013

    Emerging Scienario of Cloud Computing and its Security

    In last three decades, the computing world is based on the Internet environment. Internet featured by the rapid development and application of computer. The cloud computing model is one of the most important shapes of a new technology of recent era. This technology based on distributed computing; parallel computing; grid...

    Provided By Global Journals

  • White Papers // Feb 2015

    Data Mining Techniques for Secure Online Financial Transactions in Banking Sector

    In this paper, the authors provide a detailed summarization of data mining techniques that it is possible to characterize and detect false transactions over e commerce in a year, depending on the information, historical performance and characteristics, using different types of data mining techniques. As these days, businesses have become...

    Provided By Global Journals

  • White Papers // Feb 2015

    A Study on Role of E-Commerce in Supply Chain Management

    Supply chain management is delivering the right product to the right place, at the right time and at the right price and is one of the most powerful engines of business transformation. It is one of the leading cost saving and revenue enhancement strategies in use today. At the end...

    Provided By Global Journals

  • White Papers // May 2015

    A Study on Consumer's Perception Regarding Online Shopping

    In today's ever changing and dynamic business environment, it is essential for all online retailers to understand the online consumer's purchase behavior and their perception regarding online shopping i.e. causes of buying or not buying products and services offered to them over internet. This paper is to examine selected four...

    Provided By Global Journals

  • White Papers // Mar 2015

    Customer Relationship Management System

    In this paper, the authors involve managing customer service and performing the other allied information processing. The customer relationship management handles the customer requisition details, records for stock in consumer products where many transactions are to be noted and keeping accounts for each deal. The products, price and other details...

    Provided By Global Journals

  • White Papers // Nov 2013

    Studying Customer Behavior in Retail Stores

    Studies of customer behavior in retail stores usually deal with identification of customers and their buying behavior patterns. The aim of such studies is to ascertain who buys where, what, when and how. In addition, such studies endeavor to learn about customer response to sales promotion devices. The results of...

    Provided By Global Journals

  • White Papers // May 2015

    A Study on Customer's Perception Towards Personalization in Online Purchases

    Recent growth of online business has created a substantial amount of innovative services to overcome the intense online competition. These services have been found to be very useful in increasing customer satisfaction and have become a key component in making an online business successful. A major feature that personalization can...

    Provided By Global Journals

  • White Papers // Mar 2015

    A Study on Consumers' Demographic Profile Influences on Online Shopping Behavior

    Online consumer behavior is a wide and appealing area of study that can grow firms involved in marketing of products and service through new media such as Internet. It is very vital to study that how socio demographic factors of consumers influence the online shopping behavior of consumers. The result...

    Provided By Global Journals

  • White Papers // Apr 2015

    Consumer Buying Behaviour Towards Online Shopping - A Review of Literature

    In this paper, the authors attempt to analyze the characteristics of buying behavior of online shoppers. Consumer buying behavior in respect of online shopping was studied using different socio-economic variables. It also provides a support that helps researchers understand the drivers of consumers' attitude and goal to shop on the...

    Provided By Global Journals

  • White Papers // May 2015

    Effect of Personality on Happiness and Interpersonal Relationship of the Employees

    A happy personality having positive interpersonal relationships at work fosters a variety of beneficial outcomes for individuals and organizations. The present paper was designed to examine the effect of personality on happiness and interpersonal relationship of the employees. A total sample size of 93 was used in this study. The...

    Provided By Global Journals

  • White Papers // Feb 2015

    Handling of Library Data with HADOOP

    In this paper, the authors are introducing latest technology in library. As they all know Hadoop is open source software for handling big data. In present era, all library work done by the computer. Day-by-day the resources are increasing in the library so librarians are facing difficulty to handle their...

    Provided By Global Journals

  • White Papers // Feb 2015

    Impact of CSR on Organizational Trust and Brand Authenticity and Their Behavioral Outcomes on Firms

    The importance of corporate social responsibility in sustainable business is inevitable throughout the world. This paper aims to investigate long-term relationships between stakeholders and socially responsible companies, reasoning the effect of organizational trust and brand authenticity on such relationships. Trust is a fundamental asset in every business and non-business relationship....

    Provided By Global Journals

  • White Papers // Feb 2015

    E-HRM: An Innovative Tool for Organizational Performance

    Technology has evolved and developed in a way that enables E-HRM to prove its significance, especially with the introduction of corporate intranets and web-enabled human resource information system. Use of computer in business management was the first step that management evaluates from conventional style to the e-style. The term E-HRM...

    Provided By Global Journals

  • White Papers // Feb 2015

    FPGA Implementation of Scalable Encryption Algorithm Using VerilogHDL with Xilinx Spartan-3

    Initially, SEA is designed for software implementations in controllers, smart cards, or processors. In this paper, the authors proposed a system that investigates its performances in recent Field-Programmable Gate Array (FPGA) devices. The present symmetric encryption algorithms result from a tradeoff between implementation cost and resulting performances. The proposed system...

    Provided By Global Journals

  • White Papers // Apr 2015

    A New Measures for CSR (Corporate Social Responsibility)

    The last half decade has witnessed a remarkable resurgence of attention among practitioners and scholars to understanding the ability of Corporate Social Responsibility (CSR) to address environmental and social problems. While significant advances have been made, assessing the forms, types and impacts on intended objectives is impeded by the conflation...

    Provided By Global Journals

  • White Papers // Apr 2015

    A Comparative Study of Hybrid Applications in E-Commerce: Better Than Web /Native Applications

    Mobile apps are designed to provide all the facilities in hand. These facilities may vary from platform to platform, due to its performance issues. So, it becomes tedious tasks for the mobile app developers to develop different apps for different platforms. Today, the need of market is to have platform...

    Provided By Global Journals

  • White Papers // May 2015

    Impact of E Commerce on Consumer Protection

    Rapid developments in Information and Communication Technology (ICT) have fueled the new paradigm of Electronic Commerce (E-Commerce). Enterprises all over the globe have either created or are in the process of creating the E-Commerce front-ends to their traditional businesses. Several new products and services are being innovated and marketed through...

    Provided By Global Journals

  • White Papers // May 2011

    Vertical Handover Decision Schemes Using SAW and WPM for Network Selection in Heterogeneous Wireless Networks

    Seamless continuity is the main goal and challenge in Fourth Generation Wireless Networks (FGWNs), to achieve seamless connectivity "HANDOVER" technique is used, Handover mechanism are mainly used when a Mobile Terminal (MT) is in overlapping area for service continuity. In Heterogeneous wireless networks main challenge is continual connection among the...

    Provided By Global Journals

  • White Papers // Sep 2011

    Ubiquitous Life Care Integrates Wireless Sensor Network and Cloud Computing With Security

    The world we are living today is surrounded with different types of diseases so people started showing a great care for their health .This makes a rapid growth in healthcare systems. Ubiquitous life cares are attracted by people as they monitor patient health at home and at any time. In...

    Provided By Global Journals

  • White Papers // Apr 2013

    Ant-Based Routing Schemes for Mobile Ad Hoc Networks

    An ad-hoc network is a collection of mobile nodes, which communicate over radio. These networks have an important advantage; they do not require any existing infrastructure or central administration. Therefore, mobile ad-hoc networks are suitable for temporary communication links. This flexibility, however, comes at a price: communication is difficult to...

    Provided By Global Journals

  • White Papers // Apr 2013

    An Efficient Multi Path Dynamic Routing Protocol for Computing and Constrained Mobile Ad-Hoc Network Environment

    Wireless mobile ad-hoc networks are classified as ad-hoc networks with logical connections. These types of networks do not have fixed topology (or physical connections) due to the mobility property of nodes, interference, propagation and loss of path. Because of all these problems the path established between sources to destination is...

    Provided By Global Journals

  • White Papers // Apr 2013

    Enhancing Network Security Using Ant Colony Optimization

    Security of the information in the computer networks has been one of the most important research area. To preserve the secure condition it is essential to be aware of the behavior of the incoming data. Network Security is becoming an important issue for all the organizations, and with the increase...

    Provided By Global Journals

  • White Papers // Jun 2010

    Risk Mitigation and Management Scheme Based on Risk Priority

    Much effort has been put in order to identify the possible risks hindering the successful completion of software projects. Techniques in risk mitigation, management and monitoring plan devise the estimation process of risk likelihood and their possible impact on the progress of software project. Risk mitigation, monitoring and management are...

    Provided By Global Journals

  • White Papers // Jul 2010

    An Empirical Study on Data Mining Applications

    The wide availability of huge amounts of data and the need for transforming such data into knowledge influences towards the attraction of IT industry in data mining. During the early years of the development of computer techniques for business, IT professionals were concerned with designing databases to store the data...

    Provided By Global Journals