gopalax softwares

Displaying 1-26 of 26 results

  • White Papers // Mar 2012

    A Novel XML Documents Using Clustering Tree Pattern Algorithms

    In a business enterprises generate and exchange XML data, are used more often for increasing the demand of efficient processing of queries on the XML. The searching for the occurrences of tree pattern query are on XML database is a core operation in XML query process which meets more problems...

    Provided By gopalax softwares

  • White Papers // Mar 2012

    Dynamic Time Slot Partitioning For a Mobile Multihop Relay In Cellular Network

    The wireless industry is experiencing a great revolution in order to meet the expectations of the end users. In mobile multi-hop DTSP algorithm, the available bandwidth resources are increased by partitioning each time slot into several minislots wherein different numbers of minislots are allocated to different users. The mobile multi-hop...

    Provided By gopalax softwares

  • White Papers // Mar 2012

    Deploying Storage Node Aiming to Minimize the Communication Cost of Sink in Sensor Networks

    Data storage has became very important issue in Sensor networks for future information retrieval. Data Storage is happens via the Forwarding nodes and Storage nodes. Forwarding nodes are regular sensors and they always forward the data received by other nodes or generated by themselves along a path toward the sink....

    Provided By gopalax softwares

  • White Papers // Mar 2012

    Survey on Scheduling Methods in P2P Desktop Grid

    Grid computing is a next level of infrastructure that provides dependable, consistent, pervasive, and inexpensive access to high-end computational capabilities with variety of shared resources. In this high end computing infrastructure job scheduling is a complex one due to grid infrastructures. This proposal gives a detail analysis of various scheduling...

    Provided By gopalax softwares

  • White Papers // Mar 2012

    Improving Performance Using Mobile Data Collectors in Wireless Sensor Networks

    Sensor networks are characterized by limited energy, processing power, and bandwidth capabilities. These limitations become particularly critical in the case of event-based sensor networks where multiple collocated nodes are likely to notify the sink about the same event, at almost the same time. The propagation of redundant highly correlated data...

    Provided By gopalax softwares

  • White Papers // Mar 2012

    Privacy Preserving of VoIP Against Peer-to-Peer Network Attacks and Defense

    Peer-to-Peer VoIP (Voice over IP) networks, exemplified by Skype, are becoming increasingly popular due to their significant cost advantage and richer call forwarding features than traditional public switched telephone networks. One of the most important features of a VoIP network is privacy (for VoIP clients). Unfortunately, most peer-to-peer VoIP networks...

    Provided By gopalax softwares

  • White Papers // Mar 2012

    Enhancement of Hierarchical Key Management Scheme of Secure Multicast Transmission for Overlay Networks

    Group communication security is needed to protect sensitive information. A group key is shared by all users under secure group communication model. The group key is used to encrypt data transmitted to the group. The group membership is dynamic and requires new key for membership changes. Secure multicast transmission schemes...

    Provided By gopalax softwares

  • White Papers // Jun 2011

    High Efficient Performance of DFA for Robust Refiltering Operation on Parallel Process in Packet Inspection

    Multi-pattern string matching remains a major performance bottleneck in network intrusion detection and anti-virus systems for high-speed Deep Packet Inspection (DPI). Although Aho-Corasick Deterministic Finite Automaton (ACDFA) based solutions produce deterministic throughput and are widely used in today's DPI systems such as Snort and ClamAV, the high memory requirement of...

    Provided By gopalax softwares

  • White Papers // Jun 2011

    Performance of Symmetric Encryption Algorithms

    Encryption algorithms play a main role in information security systems. On the other side, those algorithms consume a significant amount of computing resources such as CPU time, memory, and battery power. This paper provides evaluation of six of the most common encryption algorithms namely: AES (Rijndael), DES, 3DES, RC2, Blowfish,...

    Provided By gopalax softwares

  • White Papers // Jun 2011

    Transmission Rate of Non-Cooperative Routing in Ad Hoc Network

    This paper analyzes routing in lossy networks under the assumption of non-cooperative aspect of existing routing protocols. The authors study the three existing non-cooperative routing protocols namely AODV, DSDV, and DSR under different topologies and under different communication traffic pattern to analyze its performance under each of the scenario and...

    Provided By gopalax softwares

  • White Papers // Mar 2011

    A LAN Protocol for Efficient File Transfer on Linux Based System

    Data sharing has always been an cruicial task over a LAN. Considering the existing TCP/IP model only network and transport layers are of immense importance. As the authors know that, TCP defines the actual port numbers on which connections are made by the applications and of course, the local IP...

    Provided By gopalax softwares

  • White Papers // Dec 2010

    An Approach to Dual-failure Survivability for Multi Quality Data Based On Double p-Cycle

    The authors propose new method to provide dual failures survivability using Double p-cycle. A p-cycle is set up for each link. When link is failure, the system will on-line select the best route of p-cycles to react. In single failure or dual failure, data does not divert randomly in route...

    Provided By gopalax softwares

  • White Papers // Dec 2010

    Miniaturized and Dual Band Hybrid Koch Dipole Fractal Antenna Design

    There are many techniques to improve the characteristic of antennas. In this paper, the performance and analysis of a small size, low profile and dual band hybrid Koch curve dipole antenna is introduced. The proposed antenna design, analysis and characterization has been performed using the Method of Moments (MoM) technique....

    Provided By gopalax softwares

  • White Papers // Dec 2010

    Hardware Implementation of Viterbi Decoder for Wireless Applications

    In 2G mobile terminals, the VD consumes approximately one third of the power consumption of a baseband mobile transceiver. Thus, in 3G mobile systems, it is essential to reduce the power consumption of the VD. In this paper, the Register Exchange (RE) method, adopting a pointer concept, is used to...

    Provided By gopalax softwares

  • White Papers // Dec 2010

    A Convenient Way From Normalized Database To Denormalized Database

    Data warehouse is a denormalized and information oriented system used to convert business rules into useful information as it is the collection of archived operational data which is useful in tactical and strategic business decisions. A relational database consists of a collection of tables that store particular sets of data...

    Provided By gopalax softwares

  • White Papers // Dec 2010

    Method Level Detection and Removal of Code Clones in C and Java Programs Using Refactoring

    Clone detection and refactoring is the major role in software maintenance and evaluation. A well-known bad code smell in refactoring and software maintenances is duplicated code, or code clones. A code clone is a code fragment that is identical or similar to another. Unjustified code clones increase code size, make...

    Provided By gopalax softwares

  • White Papers // Dec 2010

    Invariant Feature Extraction From Fingerprint Biometric Using Pseudo Zernike Moments

    To represent the large amount of data in the biometric images an efficient feature extraction method is needed. Further biometric image acquisition is subject to deforming processes such as rotation, translation and scaling. Hence, it is also required that the image representation be invariant to the deformations and sustain the...

    Provided By gopalax softwares

  • White Papers // Dec 2010

    Key Management Techniques for Controlling the Distribution and Update of Cryptographic Keys

    Key management plays a fundamental role in cryptography as the basis for securing cryptographic techniques providing confidentiality, entity authentication, data origin authentication, data integrity, and digital signatures. The goal of a good cryptographic design is to reduce more complex problems to the proper management and safe-keeping of a small number...

    Provided By gopalax softwares

  • White Papers // Dec 2010

    Broadband Access for Wireless and Fixed - WiMax

    A variety of broadband wireless and mobile access technologies are available which are suitable for various usages and offer different performances. One will be optimum for a given geographical situation. This papers aim is to offer the best access network available for users when and where they need it. This...

    Provided By gopalax softwares

  • White Papers // Dec 2010

    Performance Evaluation of AODV for Mobile Ad Hoc Network With Varying Network Size

    An ad hoc network is a collection of wireless mobile nodes dynamically forming a network topology without the use of any existing network infrastructure or centralized administration. Routing is the task of directing data packets from a source node to a given destination. The main method for evaluating the performance...

    Provided By gopalax softwares

  • White Papers // Dec 2010

    A Novel Approach for Optimal Network Selection in Heterogeneous Wireless Networks

    Today Communication industry concentrates more on the live information transfer without altering the existing infrastructure and hence requires a single convergence platform of all networks' access. The next generation systems support multimode, multi-access and reconfigurable devices to support inter-working of heterogeneous networks. The network selection is user-centric and based on...

    Provided By gopalax softwares

  • White Papers // Dec 2010

    Implementing Intrusion Detection System for Multicore Processor

    Multi-core processors represent a major evolution in computing hardware technology. Multi-core provides a network security application with more processing power from the hardware perspective. However, there are still significant software design challenges that must be overcome. In this paper, the authors present new architecture for multi-core supported Intrusion Detection System,...

    Provided By gopalax softwares

  • White Papers // Dec 2010

    An Enriched Reactive Routing Protocol - AODV for Mobile Adhoc Networks

    Mobile Ad hoc NETwork (MANET) is an emerging trend and it has to face many challenges and issues. An ad hoc network is a collection of mobile nodes that dynamically form a temporary network, without the use of existing infrastructure. When two nodes are not within the radio range of...

    Provided By gopalax softwares

  • White Papers // Dec 2010

    A Prototype Parking System Using Wireless Sensor Networks

    With the rapid proliferation of vehicle availability and usage in recent years, finding a vacant car parking space is becoming more and more difficult, resulting in a number of practical conflicts. Parking problems are becoming ubiquitous and ever growing at an alarming rate in every major city. Wide usage of...

    Provided By gopalax softwares

  • White Papers // May 2009

    A New Approach to Efficient Bluetooth Scatternet Formation in Adhoc Wireless Network

    Bluetooth enabled electronic devices connect & communicate wirelessly through short-range adhoc networks known as Piconets. Each device can also belong to several Piconets simultaneously. Piconets are established dynamically & automatically as Bluetooth device enter and leave radio proximity. The Bluetooth specification enables to form Scatternet from many devices but it...

    Provided By gopalax softwares

  • White Papers // May 2009

    Ubiquity of Mobile Computing in Wireless Networks

    Mobile computing embraces a host of portable technologies that makes Internet access on the go not only possible, but integral to every day life. From notebook computers to Personal Digital Assistants (PDAs), like the i-Phone and Blackberry to standard cell phones, mobile computing has become an indispensable way of life....

    Provided By gopalax softwares

  • White Papers // Mar 2011

    A LAN Protocol for Efficient File Transfer on Linux Based System

    Data sharing has always been an cruicial task over a LAN. Considering the existing TCP/IP model only network and transport layers are of immense importance. As the authors know that, TCP defines the actual port numbers on which connections are made by the applications and of course, the local IP...

    Provided By gopalax softwares

  • White Papers // Mar 2012

    A Novel XML Documents Using Clustering Tree Pattern Algorithms

    In a business enterprises generate and exchange XML data, are used more often for increasing the demand of efficient processing of queries on the XML. The searching for the occurrences of tree pattern query are on XML database is a core operation in XML query process which meets more problems...

    Provided By gopalax softwares

  • White Papers // Mar 2012

    Dynamic Time Slot Partitioning For a Mobile Multihop Relay In Cellular Network

    The wireless industry is experiencing a great revolution in order to meet the expectations of the end users. In mobile multi-hop DTSP algorithm, the available bandwidth resources are increased by partitioning each time slot into several minislots wherein different numbers of minislots are allocated to different users. The mobile multi-hop...

    Provided By gopalax softwares

  • White Papers // Mar 2012

    Deploying Storage Node Aiming to Minimize the Communication Cost of Sink in Sensor Networks

    Data storage has became very important issue in Sensor networks for future information retrieval. Data Storage is happens via the Forwarding nodes and Storage nodes. Forwarding nodes are regular sensors and they always forward the data received by other nodes or generated by themselves along a path toward the sink....

    Provided By gopalax softwares

  • White Papers // Mar 2012

    Survey on Scheduling Methods in P2P Desktop Grid

    Grid computing is a next level of infrastructure that provides dependable, consistent, pervasive, and inexpensive access to high-end computational capabilities with variety of shared resources. In this high end computing infrastructure job scheduling is a complex one due to grid infrastructures. This proposal gives a detail analysis of various scheduling...

    Provided By gopalax softwares

  • White Papers // Mar 2012

    Improving Performance Using Mobile Data Collectors in Wireless Sensor Networks

    Sensor networks are characterized by limited energy, processing power, and bandwidth capabilities. These limitations become particularly critical in the case of event-based sensor networks where multiple collocated nodes are likely to notify the sink about the same event, at almost the same time. The propagation of redundant highly correlated data...

    Provided By gopalax softwares

  • White Papers // Mar 2012

    Privacy Preserving of VoIP Against Peer-to-Peer Network Attacks and Defense

    Peer-to-Peer VoIP (Voice over IP) networks, exemplified by Skype, are becoming increasingly popular due to their significant cost advantage and richer call forwarding features than traditional public switched telephone networks. One of the most important features of a VoIP network is privacy (for VoIP clients). Unfortunately, most peer-to-peer VoIP networks...

    Provided By gopalax softwares

  • White Papers // Mar 2012

    Enhancement of Hierarchical Key Management Scheme of Secure Multicast Transmission for Overlay Networks

    Group communication security is needed to protect sensitive information. A group key is shared by all users under secure group communication model. The group key is used to encrypt data transmitted to the group. The group membership is dynamic and requires new key for membership changes. Secure multicast transmission schemes...

    Provided By gopalax softwares

  • White Papers // Dec 2010

    An Approach to Dual-failure Survivability for Multi Quality Data Based On Double p-Cycle

    The authors propose new method to provide dual failures survivability using Double p-cycle. A p-cycle is set up for each link. When link is failure, the system will on-line select the best route of p-cycles to react. In single failure or dual failure, data does not divert randomly in route...

    Provided By gopalax softwares

  • White Papers // Dec 2010

    Miniaturized and Dual Band Hybrid Koch Dipole Fractal Antenna Design

    There are many techniques to improve the characteristic of antennas. In this paper, the performance and analysis of a small size, low profile and dual band hybrid Koch curve dipole antenna is introduced. The proposed antenna design, analysis and characterization has been performed using the Method of Moments (MoM) technique....

    Provided By gopalax softwares

  • White Papers // Dec 2010

    Hardware Implementation of Viterbi Decoder for Wireless Applications

    In 2G mobile terminals, the VD consumes approximately one third of the power consumption of a baseband mobile transceiver. Thus, in 3G mobile systems, it is essential to reduce the power consumption of the VD. In this paper, the Register Exchange (RE) method, adopting a pointer concept, is used to...

    Provided By gopalax softwares

  • White Papers // May 2009

    A New Approach to Efficient Bluetooth Scatternet Formation in Adhoc Wireless Network

    Bluetooth enabled electronic devices connect & communicate wirelessly through short-range adhoc networks known as Piconets. Each device can also belong to several Piconets simultaneously. Piconets are established dynamically & automatically as Bluetooth device enter and leave radio proximity. The Bluetooth specification enables to form Scatternet from many devices but it...

    Provided By gopalax softwares

  • White Papers // Dec 2010

    A Convenient Way From Normalized Database To Denormalized Database

    Data warehouse is a denormalized and information oriented system used to convert business rules into useful information as it is the collection of archived operational data which is useful in tactical and strategic business decisions. A relational database consists of a collection of tables that store particular sets of data...

    Provided By gopalax softwares

  • White Papers // Dec 2010

    Method Level Detection and Removal of Code Clones in C and Java Programs Using Refactoring

    Clone detection and refactoring is the major role in software maintenance and evaluation. A well-known bad code smell in refactoring and software maintenances is duplicated code, or code clones. A code clone is a code fragment that is identical or similar to another. Unjustified code clones increase code size, make...

    Provided By gopalax softwares

  • White Papers // Dec 2010

    Invariant Feature Extraction From Fingerprint Biometric Using Pseudo Zernike Moments

    To represent the large amount of data in the biometric images an efficient feature extraction method is needed. Further biometric image acquisition is subject to deforming processes such as rotation, translation and scaling. Hence, it is also required that the image representation be invariant to the deformations and sustain the...

    Provided By gopalax softwares

  • White Papers // Dec 2010

    Key Management Techniques for Controlling the Distribution and Update of Cryptographic Keys

    Key management plays a fundamental role in cryptography as the basis for securing cryptographic techniques providing confidentiality, entity authentication, data origin authentication, data integrity, and digital signatures. The goal of a good cryptographic design is to reduce more complex problems to the proper management and safe-keeping of a small number...

    Provided By gopalax softwares

  • White Papers // Dec 2010

    Broadband Access for Wireless and Fixed - WiMax

    A variety of broadband wireless and mobile access technologies are available which are suitable for various usages and offer different performances. One will be optimum for a given geographical situation. This papers aim is to offer the best access network available for users when and where they need it. This...

    Provided By gopalax softwares

  • White Papers // Dec 2010

    Performance Evaluation of AODV for Mobile Ad Hoc Network With Varying Network Size

    An ad hoc network is a collection of wireless mobile nodes dynamically forming a network topology without the use of any existing network infrastructure or centralized administration. Routing is the task of directing data packets from a source node to a given destination. The main method for evaluating the performance...

    Provided By gopalax softwares

  • White Papers // Dec 2010

    A Novel Approach for Optimal Network Selection in Heterogeneous Wireless Networks

    Today Communication industry concentrates more on the live information transfer without altering the existing infrastructure and hence requires a single convergence platform of all networks' access. The next generation systems support multimode, multi-access and reconfigurable devices to support inter-working of heterogeneous networks. The network selection is user-centric and based on...

    Provided By gopalax softwares

  • White Papers // Dec 2010

    Implementing Intrusion Detection System for Multicore Processor

    Multi-core processors represent a major evolution in computing hardware technology. Multi-core provides a network security application with more processing power from the hardware perspective. However, there are still significant software design challenges that must be overcome. In this paper, the authors present new architecture for multi-core supported Intrusion Detection System,...

    Provided By gopalax softwares

  • White Papers // Dec 2010

    An Enriched Reactive Routing Protocol - AODV for Mobile Adhoc Networks

    Mobile Ad hoc NETwork (MANET) is an emerging trend and it has to face many challenges and issues. An ad hoc network is a collection of mobile nodes that dynamically form a temporary network, without the use of existing infrastructure. When two nodes are not within the radio range of...

    Provided By gopalax softwares

  • White Papers // May 2009

    Ubiquity of Mobile Computing in Wireless Networks

    Mobile computing embraces a host of portable technologies that makes Internet access on the go not only possible, but integral to every day life. From notebook computers to Personal Digital Assistants (PDAs), like the i-Phone and Blackberry to standard cell phones, mobile computing has become an indispensable way of life....

    Provided By gopalax softwares

  • White Papers // Dec 2010

    A Prototype Parking System Using Wireless Sensor Networks

    With the rapid proliferation of vehicle availability and usage in recent years, finding a vacant car parking space is becoming more and more difficult, resulting in a number of practical conflicts. Parking problems are becoming ubiquitous and ever growing at an alarming rate in every major city. Wide usage of...

    Provided By gopalax softwares

  • White Papers // Jun 2011

    High Efficient Performance of DFA for Robust Refiltering Operation on Parallel Process in Packet Inspection

    Multi-pattern string matching remains a major performance bottleneck in network intrusion detection and anti-virus systems for high-speed Deep Packet Inspection (DPI). Although Aho-Corasick Deterministic Finite Automaton (ACDFA) based solutions produce deterministic throughput and are widely used in today's DPI systems such as Snort and ClamAV, the high memory requirement of...

    Provided By gopalax softwares

  • White Papers // Jun 2011

    Performance of Symmetric Encryption Algorithms

    Encryption algorithms play a main role in information security systems. On the other side, those algorithms consume a significant amount of computing resources such as CPU time, memory, and battery power. This paper provides evaluation of six of the most common encryption algorithms namely: AES (Rijndael), DES, 3DES, RC2, Blowfish,...

    Provided By gopalax softwares

  • White Papers // Jun 2011

    Transmission Rate of Non-Cooperative Routing in Ad Hoc Network

    This paper analyzes routing in lossy networks under the assumption of non-cooperative aspect of existing routing protocols. The authors study the three existing non-cooperative routing protocols namely AODV, DSDV, and DSR under different topologies and under different communication traffic pattern to analyze its performance under each of the scenario and...

    Provided By gopalax softwares