IJART

Displaying 1-17 of 17 results

  • White Papers // Aug 2012

    Software Engineering Models for Validating Technology and Experimental Validation in Software Engineering

    Several tools are marketed to the educational community for plagiarism detection and prevention. Software engineering researchers solve problems of several different kinds. To do so, they produce several different kinds of results, and they should develop appropriate evidence to validate these results. They often report their research in conference papers....

    Provided By IJART

  • White Papers // Apr 2012

    Fault Detection and Diagnosis in SRAM Based FPGA Using BIST

    This paper presents a Built-In Self-Test (BIST) design for fault detection and fault diagnosis of Static-RAM (SRAM)-based Field-Programmable Gate Arrays (FPGAs). The proposed FPGA BIST structure can test both the interconnect resources [wire channels and Programmable Switches (PSs)] and LookUp Tables (LUTs) in the Configurable Logic Blocks (CLBs). The test...

    Provided By IJART

  • White Papers // Apr 2012

    Distributed Resource Discovery and Management in Grid Environment

    Resource discovery is an important process for finding suitable nodes that satisfy application requirements in large loosely coupled distributed systems. Besides inter-node heterogeneity, many of these systems also show a high degree of intra-node dynamism, so that selecting nodes based only on their recently observed resource capacities can lead to...

    Provided By IJART

  • White Papers // Apr 2012

    Video Surveillance System Based on Motion Detection for Mobile Clients

    Surveillance systems provide the capability of collecting authentic and purposeful information and forming appropriate decisions to enhance safety. In a general video surveillance system, video streams from cameras are sent to a control center and operators monitor the videos. But human operator monitoring of the views every moment of every...

    Provided By IJART

  • White Papers // Apr 2012

    Applying Object Oriented Strategy to Model a Tourist Administration Structure for Secured Databases

    This paper examines the relationship between transport, tourism and the experiences of those travelling for touristic purposes. For over 20 years, it has been acknowledged that transport serves a dual role in tourism, providing access to and around destinations, and as a tourist activity in its own right. This conceptual...

    Provided By IJART

  • White Papers // Apr 2012

    Jamming Aware Energy Efficient Multicast Routing in Mobile ADHOC Networks

    Multiple-path source routing protocols allow a data source node to distribute the total traffic among available paths. In this paper, the authors consider the problem of jamming-aware source routing in which the source node performs traffic allocation based on empirical jamming statistics at individual network nodes. They formulate this traffic...

    Provided By IJART

  • White Papers // Apr 2012

    Compensation of Inter Carrier Interference in OFDM Systems by Using Self Cancellation Scheme

    Orthogonal Frequency Division Multiplexing (OFDM) is a transmission technique which is robust in Multi path channels. It is though sensitive to frequency errors that may be caused by several factors such as frequency offset at the local oscillator, phase noise and mobility of the receiver. These errors introduce Inter-Carrier Interference...

    Provided By IJART

  • White Papers // Apr 2012

    Optimal Routing in Multi-Hop Wireless Networks Using Floyd-Warshall Algorithm

    Multi-hop wireless networks are usually defined as a collection of nodes equipped with radio transmitters, which not only have the capability to communicate each other in a multi-hop fashion, but also to route each others' data packets. The idea of multi-hop wireless networking is sometimes also called infrastructure-less networking, since...

    Provided By IJART

  • White Papers // Mar 2012

    Nonparametric Imputation Framework for Missing Values in Datasets

    Missing values may occur for several reasons, such as malfunctioning of measurement equipment, changes in experimental design during data collection, collation of several similar but not identical datasets and also when respondents in a survey may refuse to answer certain questions such as age or income. Missing values in datasets...

    Provided By IJART

  • White Papers // Oct 2011

    A Low Overhead Routing Protocol for Mobile Adhoc Networks

    Routing protocol is an indispensable part which ensures the normal operation of Wireless Network and the high efficient transmission of information. MANETs are self-organized and so routing protocols must be adaptive to the frequent topology changes. On demand protocols mainly execute the path-finding and communication process only when it is...

    Provided By IJART

  • White Papers // Sep 2011

    Data Storage Virtualization in Cloud Computing

    Cloud computing and server virtualization strategies abound. Cloud computing can be private, public, or a hybrid of the two. Although this paper briefly discusses public cloud computing, the focus is on cloud computing in the data center. Virtualization can be applied to servers, storage, networks, and desktops. Mainframe and UNIX...

    Provided By IJART

  • White Papers // Sep 2011

    Comparative Analysis on Cloud Computing and Service Oriented Architecture

    Cloud computing is fundamentally altering the expectations for how and when computing, storage and networking resources should be allocated, managed and consumed. End-users are increasingly sensitive to the latency of services they consume. Service developers want the Service Providers to ensure or provide the capability to dynamically allocate and manage...

    Provided By IJART

  • White Papers // Sep 2011

    A Novel Third Party Auditability and Dynamic Based Security in Cloud Computing

    Cloud computing refers to the use and access of multiple server-based computational resources via a digital network (WAN, Internet connection using the World Wide Web, etc.). Cloud users may access the server resources using a computer or other device. In cloud computing, applications are provided and managed by the cloud...

    Provided By IJART

  • White Papers // Sep 2011

    Performance Analysis of Load Balancing Techniques for Web Server Systems

    The vast development of World Wide Web traffic has produced great interest in distributed web server systems. While considering architecture of distributed web servers, the DNS based distributed system is an optimistic solution in context of scalability, performance, and availability. DNS (Domain Name Server) name caching, Random Early Detection Method...

    Provided By IJART

  • White Papers // Sep 2011

    Evaluation and Power Saving Protocols for Wireless 802.11 LAN Network

    In recent years, a series of Power Saving (PS) protocols has been proposed in the family of 802.11 standards to save energy for mobile devices. To evaluate their performance, many works have been carried out on testbeds or simulation platforms. However, till now, there is a lack of accurate theoretical...

    Provided By IJART

  • White Papers // Sep 2011

    Multi-Objective Optimization Based on Genetic Algorithm in Grid Scheduling

    Resources scheduling plays a vital role in Grid. This paper converts resources scheduling problem in Grid into a multi-objective optimization problem, and presents a resources scheduling approach based on multi-objective genetic algorithms. The authors propose the Genetic Algorithms (GA) for job scheduling on computational grids which optimizes the make span,...

    Provided By IJART

  • White Papers // Sep 2011

    Enhancement Study of Power-Aware Routing Protocols in Ad Hoc Networks

    An ad hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any established infrastructure or centralized administration. The "Life time of the network" is an important criterion. The nodes in an ad hoc wireless network are powered by batteries. These will have...

    Provided By IJART

  • White Papers // Mar 2012

    Nonparametric Imputation Framework for Missing Values in Datasets

    Missing values may occur for several reasons, such as malfunctioning of measurement equipment, changes in experimental design during data collection, collation of several similar but not identical datasets and also when respondents in a survey may refuse to answer certain questions such as age or income. Missing values in datasets...

    Provided By IJART

  • White Papers // Aug 2012

    Software Engineering Models for Validating Technology and Experimental Validation in Software Engineering

    Several tools are marketed to the educational community for plagiarism detection and prevention. Software engineering researchers solve problems of several different kinds. To do so, they produce several different kinds of results, and they should develop appropriate evidence to validate these results. They often report their research in conference papers....

    Provided By IJART

  • White Papers // Apr 2012

    Compensation of Inter Carrier Interference in OFDM Systems by Using Self Cancellation Scheme

    Orthogonal Frequency Division Multiplexing (OFDM) is a transmission technique which is robust in Multi path channels. It is though sensitive to frequency errors that may be caused by several factors such as frequency offset at the local oscillator, phase noise and mobility of the receiver. These errors introduce Inter-Carrier Interference...

    Provided By IJART

  • White Papers // Apr 2012

    Fault Detection and Diagnosis in SRAM Based FPGA Using BIST

    This paper presents a Built-In Self-Test (BIST) design for fault detection and fault diagnosis of Static-RAM (SRAM)-based Field-Programmable Gate Arrays (FPGAs). The proposed FPGA BIST structure can test both the interconnect resources [wire channels and Programmable Switches (PSs)] and LookUp Tables (LUTs) in the Configurable Logic Blocks (CLBs). The test...

    Provided By IJART

  • White Papers // Apr 2012

    Distributed Resource Discovery and Management in Grid Environment

    Resource discovery is an important process for finding suitable nodes that satisfy application requirements in large loosely coupled distributed systems. Besides inter-node heterogeneity, many of these systems also show a high degree of intra-node dynamism, so that selecting nodes based only on their recently observed resource capacities can lead to...

    Provided By IJART

  • White Papers // Apr 2012

    Video Surveillance System Based on Motion Detection for Mobile Clients

    Surveillance systems provide the capability of collecting authentic and purposeful information and forming appropriate decisions to enhance safety. In a general video surveillance system, video streams from cameras are sent to a control center and operators monitor the videos. But human operator monitoring of the views every moment of every...

    Provided By IJART

  • White Papers // Apr 2012

    Applying Object Oriented Strategy to Model a Tourist Administration Structure for Secured Databases

    This paper examines the relationship between transport, tourism and the experiences of those travelling for touristic purposes. For over 20 years, it has been acknowledged that transport serves a dual role in tourism, providing access to and around destinations, and as a tourist activity in its own right. This conceptual...

    Provided By IJART

  • White Papers // Apr 2012

    Jamming Aware Energy Efficient Multicast Routing in Mobile ADHOC Networks

    Multiple-path source routing protocols allow a data source node to distribute the total traffic among available paths. In this paper, the authors consider the problem of jamming-aware source routing in which the source node performs traffic allocation based on empirical jamming statistics at individual network nodes. They formulate this traffic...

    Provided By IJART

  • White Papers // Sep 2011

    Data Storage Virtualization in Cloud Computing

    Cloud computing and server virtualization strategies abound. Cloud computing can be private, public, or a hybrid of the two. Although this paper briefly discusses public cloud computing, the focus is on cloud computing in the data center. Virtualization can be applied to servers, storage, networks, and desktops. Mainframe and UNIX...

    Provided By IJART

  • White Papers // Sep 2011

    Comparative Analysis on Cloud Computing and Service Oriented Architecture

    Cloud computing is fundamentally altering the expectations for how and when computing, storage and networking resources should be allocated, managed and consumed. End-users are increasingly sensitive to the latency of services they consume. Service developers want the Service Providers to ensure or provide the capability to dynamically allocate and manage...

    Provided By IJART

  • White Papers // Apr 2012

    Optimal Routing in Multi-Hop Wireless Networks Using Floyd-Warshall Algorithm

    Multi-hop wireless networks are usually defined as a collection of nodes equipped with radio transmitters, which not only have the capability to communicate each other in a multi-hop fashion, but also to route each others' data packets. The idea of multi-hop wireless networking is sometimes also called infrastructure-less networking, since...

    Provided By IJART

  • White Papers // Sep 2011

    A Novel Third Party Auditability and Dynamic Based Security in Cloud Computing

    Cloud computing refers to the use and access of multiple server-based computational resources via a digital network (WAN, Internet connection using the World Wide Web, etc.). Cloud users may access the server resources using a computer or other device. In cloud computing, applications are provided and managed by the cloud...

    Provided By IJART

  • White Papers // Sep 2011

    Performance Analysis of Load Balancing Techniques for Web Server Systems

    The vast development of World Wide Web traffic has produced great interest in distributed web server systems. While considering architecture of distributed web servers, the DNS based distributed system is an optimistic solution in context of scalability, performance, and availability. DNS (Domain Name Server) name caching, Random Early Detection Method...

    Provided By IJART

  • White Papers // Sep 2011

    Evaluation and Power Saving Protocols for Wireless 802.11 LAN Network

    In recent years, a series of Power Saving (PS) protocols has been proposed in the family of 802.11 standards to save energy for mobile devices. To evaluate their performance, many works have been carried out on testbeds or simulation platforms. However, till now, there is a lack of accurate theoretical...

    Provided By IJART

  • White Papers // Sep 2011

    Multi-Objective Optimization Based on Genetic Algorithm in Grid Scheduling

    Resources scheduling plays a vital role in Grid. This paper converts resources scheduling problem in Grid into a multi-objective optimization problem, and presents a resources scheduling approach based on multi-objective genetic algorithms. The authors propose the Genetic Algorithms (GA) for job scheduling on computational grids which optimizes the make span,...

    Provided By IJART

  • White Papers // Sep 2011

    Enhancement Study of Power-Aware Routing Protocols in Ad Hoc Networks

    An ad hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any established infrastructure or centralized administration. The "Life time of the network" is an important criterion. The nodes in an ad hoc wireless network are powered by batteries. These will have...

    Provided By IJART

  • White Papers // Oct 2011

    A Low Overhead Routing Protocol for Mobile Adhoc Networks

    Routing protocol is an indispensable part which ensures the normal operation of Wireless Network and the high efficient transmission of information. MANETs are self-organized and so routing protocols must be adaptive to the frequent topology changes. On demand protocols mainly execute the path-finding and communication process only when it is...

    Provided By IJART