International Association of Computer Science & Information Technology (IACSIT)

Displaying 1-40 of 605 results

  • White Papers // Jan 2015

    A New Multiple-Pattern Matching Algorithm for the Network Intrusion Detection System

    String matching algorithms are essential for network application devices that filter packets and flows based on their payload. Applications like intrusion detection/prevention, web filtering, anti-virus, and anti-spam all raise the demand for efficient algorithms dealing with string matching. In this paper, the authors present a new algorithm for multiple-pattern exact...

    Provided By International Association of Computer Science & Information Technology (IACSIT)

  • White Papers // Apr 2014

    Implementation of Enhanced Singly Linked List Equipped with DLL Operations: An Approach towards Enormous Memory Saving

    A linked list is a complex data structure, especially useful in systems or application programming. Linked list uses dynamic allocation of memory by which it allocates memory at the runtime alike of array so it is also called as dynamic data structure. As dynamic list is used for runtime allocation...

    Provided By International Association of Computer Science & Information Technology (IACSIT)

  • White Papers // Mar 2014

    An Efficient Lossless Data Compression Algorithm for Fluctuating Environment Variables in WSN

    A major performance bottleneck in sensor networks is energy since it is impractical to replace the batteries in embedded sensor nodes post-deployment so (Wireless Sensor Networks) WSNs are energy constrained. Radio transmission is most energy draining task that a node performs. Data aggregation and data compression are the widely discussed...

    Provided By International Association of Computer Science & Information Technology (IACSIT)

  • White Papers // Mar 2014

    A Performance Evaluation of OLTP Workloads on Flash- Based SSDs

    Flash-based solid state drives are high-performance data storage device. SSDs deliver high performance than the traditionally rotating storage hard drives. This paper is to evaluate the Solid State Drive (SSD) performance as a choice for database storage device. Initially SSD out performed in terms of transactions per second as compared...

    Provided By International Association of Computer Science & Information Technology (IACSIT)

  • White Papers // Mar 2014

    Nearest Neighbor Classification with Locally Weighted Distance for Imbalanced Data

    The datasets used in many real applications are highly imbalanced which makes classification problem hard. Classifying the minor class instances is difficult due to bias of the classifier output to the major classes. Nearest neighbor is one of the most popular and simplest classifiers with good performance on many datasets....

    Provided By International Association of Computer Science & Information Technology (IACSIT)

  • White Papers // Feb 2014

    FPGA Implementation of Linear Observer

    In this paper the authors propose implementation of linear observer and full state feedback controller using pole placement method for second order system. System consists of two 1st order differential equations, solved using Euler and Runge Kutta-2 (RK-2) method and linear observer implemented on FPGA Vietex-5 platform. Sampling rate of...

    Provided By International Association of Computer Science & Information Technology (IACSIT)

  • White Papers // Feb 2014

    A Compact and Fast FPGA Based Implementation of Encoding and Decoding Algorithm Using Reed Solomon Codes

    In this paper the authors present a compact and fast Field Programmable Gate Array (FPGA) based implementation technique of encoding and decoding algorithm using Reed Solomon (RS) codes, widely used in numerous applications ranging from wireless and mobile communications units to satellite links for correcting multiple errors especially burst-type errors....

    Provided By International Association of Computer Science & Information Technology (IACSIT)

  • White Papers // Feb 2014

    Triple Patterns Extraction for Accessing Data on Ontology

    Some web applications use the ontology to integrate multiple data sources because ontology-based data integration is the ideal solution to handle the semantic conflict. For accessing the data on ontology, ontology understanding query such as SPARQL is needed. However, end users enter the unstructured sentence (words, statements, etc.) as an...

    Provided By International Association of Computer Science & Information Technology (IACSIT)

  • White Papers // Jan 2014

    Architectural Comparison and Implementation of Cloud Tools and Technologies

    Service oriented architecture is a collection of services that communicate with each other to provide flexibility in system development and deployment. Cloud computing emphasizes on various service oriented architectures with the help of tools, which reduces the infrastructure cost of users. There are varying range of cloud tools and technology...

    Provided By International Association of Computer Science & Information Technology (IACSIT)

  • White Papers // Jan 2014

    Understanding a Proposed Model of Customer Loyalty Formation in B2C e-Commerce

    The expansion of infrastructure and rapid growing of internet user have caused many companies to operate in B2C e-commerce. Customer loyalty is a key determinant of B2C e-commerce survival, competitive advantage, and the long-term success. Loyalty can be divided into 2 types: attitudes loyalty, represented by customer purchase intention and...

    Provided By International Association of Computer Science & Information Technology (IACSIT)

  • White Papers // Jan 2014

    FPGA Implementation of High Performance and Low Power VOD Server

    Video play has become a popular entertainment as network capacities have been improved. To lower the power of the video stream server to meet the requirements of green computing and to save the bandwidth which helps to solve the bandwidth congestion problem, a novel hardware-based VOD server system is introduced....

    Provided By International Association of Computer Science & Information Technology (IACSIT)

  • White Papers // Jan 2014

    Applying Data Ming to Develop a Warning System of Procurement in Construction

    In the knowledge-based economy era, an enterprise need to quickly control and accumulate knowledge in a high-knowledge and complicated market and also use them to establish a proper management and warming system for decision-makers and managements. Procurements always play an important role to increase profit in the organization and an...

    Provided By International Association of Computer Science & Information Technology (IACSIT)

  • White Papers // Jan 2014

    Object Request Reduction in Home Nodes and Load Balancing of Object Request in Hybrid Decentralized Web Caching

    In this paper, the authors propose a method to reduce the number of object requests sent to home nodes in hybrid decentralized web cache. Because when home nodes receive a large number of object requests, the hotspot problem can occur. In addition, the method also provides load balancing of object...

    Provided By International Association of Computer Science & Information Technology (IACSIT)

  • White Papers // Jan 2014

    Efficient On-Chip Crosstalk Avoidance CODECs using FTF-FNS

    VLSI design has marched into the realm of Deep Sub-Micron (DSM) processes, where the minimum feature size is well below 1 ?m. These advanced processes enable designers to implement faster, bigger and more complex designs. Integrated Circuit (IC) design has seen a revolutionary progress in the past two decades with...

    Provided By International Association of Computer Science & Information Technology (IACSIT)

  • White Papers // Jan 2014

    A Novel Approach for a Collaborative Exploration of a Spatial Data Cube

    Spatial data warehouses store large volumes of consolidated and historicized multidimensional spatial data in order to be explored and analyzed by various users. The data exploration is a process of searching relevant information in a data set. The data set to explore is a spatial data cube taken out from...

    Provided By International Association of Computer Science & Information Technology (IACSIT)

  • White Papers // Jan 2014

    A Database Sanitizing Algorithm for Hiding Sensitive Multi-Level Association Rule Mining

    The sharing of information has been proven to be beneficial for business partnerships in many application areas such as business planning or marketing. Today, association rule mining imposes threats to data sharing, since it may disclose patterns and various kinds of sensitive knowledge that are difficult to find. Such information...

    Provided By International Association of Computer Science & Information Technology (IACSIT)

  • White Papers // Jan 2014

    Cloud Computing: Security Issues

    Cloud computing is a present and future of the Information Technology (IT), to enhance the capacity of Information dynamically without investing capital for new infrastructure, training new personnel or licensing new software. With extending the IT's present capabilities, it is growing radically. Enterprise customers are unenthusiastic to deploy their business...

    Provided By International Association of Computer Science & Information Technology (IACSIT)

  • White Papers // Jan 2014

    Personal Portable Proxy on a USB Flash Drive

    In this paper, the authors propose a personal portable proxy server that offers various functions from a USB flash drive. With the rapidly growing volume of data generated by applications, managing that data becomes a problem. A USB flash drive can help the users manage data easily, because they can...

    Provided By International Association of Computer Science & Information Technology (IACSIT)

  • White Papers // Jan 2014

    A Comparative Study on RTN Deconvolution of Richardson-Lucy and Proposed Partitioned Means for Analyzing SRAM Fail-Bit Prediction Accuracy

    In this paper the authors present a comparative analysis of the Random Telegraph Noise (RTN) de-convolution accuracy between the Richardson-Lucy (R-L) algorithm and the proposed Partitioned Forward-problem based De-ConVolution means (PFDCV). Unlike the R-L based de-convolution, the proposed technique successfully solves the issue of noise amplification thanks to eliminating any...

    Provided By International Association of Computer Science & Information Technology (IACSIT)

  • White Papers // Jan 2014

    The Application of Genetic Algorithm in Motion Detection for Data Storage Optimization

    In this paper the authors focus on detecting motion and capable of emitting insignificant parts of video from the captured frames from IP camera and enhancing available data storage. This paper embarks a system that is capable of minimizing the video in terms of eliminating frames which can't be used...

    Provided By International Association of Computer Science & Information Technology (IACSIT)

  • White Papers // Jan 2014

    Generating Licensure Examination Performance Models Using PART and JRip Classifiers: A Data Mining Application in Education

    In this paper the authors focused on the generation of the licensure examination performance models implementing PART and JRip classifiers. Specifically, it identified the attributes that are significant to the response attribute; it generated prediction models using the PART and JRip classifiers of WEKA; and it determined how likely is...

    Provided By International Association of Computer Science & Information Technology (IACSIT)

  • White Papers // Jan 2014

    A Web-Based Multiple Regressor for Data Analysis Using R

    The production of business analytics inevitably involves applying some statistical procedures to a data set related to the decision problem for a particular scenario. In light of the sheer volume of the data set, it is very often that the computation chores rely very much upon statistical software or others...

    Provided By International Association of Computer Science & Information Technology (IACSIT)

  • White Papers // Jan 2014

    Research of Metadata Construction Approach on 3D Model Database

    It's important to construct 3D model database to prevent repeated resource construction and information Island, and the unified metadata standard is the basis and essential prerequisite of model database construction. Firstly, the model metadata framework which is represented by 2D matrix is designed through comparing the home and abroad metadata...

    Provided By International Association of Computer Science & Information Technology (IACSIT)

  • White Papers // Jan 2014

    The Application of Study Assessment Based on Cloud Model in Educational System

    In this paper, it studied student study quality assessment system in the educational system combined with cloud theory. In order to do better reflects on the teaching thinking of the center of students and improve teaching effect and learning quality, it construct a new method for the quality of student...

    Provided By International Association of Computer Science & Information Technology (IACSIT)

  • White Papers // Jan 2014

    An Implementation of the IEEE 1588 MAC with a Packet Identification Encryption

    A packet encryption architecture embedded in MAC is proposed due to that the IEEE 1588 messages employed for synchronizing time with each other is of vital importance, especially the security aspect applications. For instance, an industry demands a terminal host to provide a precise time to control these automatic machines...

    Provided By International Association of Computer Science & Information Technology (IACSIT)

  • White Papers // Jan 2014

    Graph Database Model for Querying, Searching and Updating

    The field of database technologies has undergone drastic changes. The advent of complex connected data has given rise to database technologies that diverge from the traditional Relational DataBase Management System (RDBMS). Graph-based database, which abstracts data in the form of nodes, edges and properties, is one such innovative idea for...

    Provided By International Association of Computer Science & Information Technology (IACSIT)

  • White Papers // Jan 2014

    Mutual Message Authentication Protocol in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are through the distribution of sensor nodes in different locations to monitor environmental conditions. The collected data from sensor nodes were sent back to the base station for further analysis and processing. The protection of data confidentiality is the most critical requirements for the ubiquitous use...

    Provided By International Association of Computer Science & Information Technology (IACSIT)

  • White Papers // Jan 2014

    An Adaptive Clustering Scheme Related to the Sink Position for Sensor Networks

    Most existing clustering protocols have been aimed to provide balancing the residual energy of each node and maximizing life-time of wireless sensor networks. In this paper, the authors present the adaptive clustering strategy related to sink position for clustering protocols in wireless sensor networks. This protocol allows networks topology to...

    Provided By International Association of Computer Science & Information Technology (IACSIT)

  • White Papers // Jan 2014

    Intelligent Energy Conservation System Design Based on Hybrid Wireless Sensor Network

    In this paper the authors attempt to design and implement an active intelligent energy conservation system utilizing Hybrid Wireless Sensor Network (HWSN) which incorporates ZigBee Wireless Sensor Network (WSN) with Bluetooth Control Network (BCN). This paper also proposes an ontological information agent built in back-end server to provide the system...

    Provided By International Association of Computer Science & Information Technology (IACSIT)

  • White Papers // Jan 2014

    Incorporating 3D Modeling System with HDF (Hierarchical Data Format) for the Enhancement of Modeling

    In these times scientific data format is used for versatile researches and wide varieties of computational work. Hierarchical Data Format (HDF) is such kind of powerful scientific data format, which can deal with very large dataset. HDF technologies address the problems of how to organize, store, discover, access, analyze, share...

    Provided By International Association of Computer Science & Information Technology (IACSIT)

  • White Papers // Jan 2014

    New Modular Authentication and Authorization Architecture, a Decentralized Approach

    All web based Information systems such as web portals and Content Managements Systems (CMS) need an Authentication and Authorization (AA) architecture. More than 1200 web portals and content management systems have been developed as yet. Existing portals and CMS use a similar centralized approach that gather all similar parts of...

    Provided By International Association of Computer Science & Information Technology (IACSIT)

  • White Papers // Jan 2014

    Information Retrieval Using Ontology Based Authentication for Personal Identification

    In this paper the authors impart integration of information effectively from various databases to retrieve reliable information about an individual. This can be achieved by using the concept of ontology since enormous data has to be processed for extracting information. This is an important challenge for answering queries. They propose...

    Provided By International Association of Computer Science & Information Technology (IACSIT)

  • White Papers // Jan 2014

    Measure Instrument for Heterogeneous Data Sources Extraction

    Measurement and analysis process is vital for mature organizations. It supports several activities of project management, process management, and quality management. However, data collection in the measurement process is resource consuming and error prone. Moreover, the measurement data may be created in different formats. Extracting the data from heterogeneous sources...

    Provided By International Association of Computer Science & Information Technology (IACSIT)

  • White Papers // Jan 2014

    Paper-Based Document Authentication Using Digital Signature and QR Code

    There are still needs for paper-based documents in certain circumstances where electronic documents cannot efficiently replace them. For example, documents issued by the government such as birth certificates, driver licenses, and passports must be paper-based. With advanced scanning and printing technologies, paper-based document fraud can easily be conducted without significant...

    Provided By International Association of Computer Science & Information Technology (IACSIT)

  • White Papers // Jan 2014

    Measuring the Insertion Attack Effect on Randomness Property of AES-Based Pseudorandom Generator

    Random (PseudoRandom) Number Generator (RNG/PRNG) as the heart of a cryptographic system could be a potential target for adversary to defect the security. The attack can be performed actively through insertion attack on the random outputs to reduce or even omit the randomness property. In this paper, the authors try...

    Provided By International Association of Computer Science & Information Technology (IACSIT)

  • White Papers // Jan 2014

    An Approach for Residual Energy Based Aggregator Selection for Data Aggregation in Wireless Sensor Networks

    Wireless Sensor Networks (WSN) comprises an emerging technology which has received a significant attention from the research community. Tiny sensor nodes sometimes referred as \"Motes\" are mini, low-cost devices with limited coverage having low power, smaller memory sizes and low bandwidth. WSN is an event-based system with one \"Sink\" subscribing...

    Provided By International Association of Computer Science & Information Technology (IACSIT)

  • White Papers // Jan 2014

    Privacy Preserving Mining of Association Rules on Horizontally Distributed Databases

    Many algorithms have been proposed to provide privacy preserving in data mining. These protocols are based on two main approaches named as: the randomization approach and the cryptographic approach. The first one is based on perturbation of the valuable information while the second one uses cryptographic techniques. The randomization approach...

    Provided By International Association of Computer Science & Information Technology (IACSIT)

  • White Papers // Jan 2014

    Antispoofing Model for Secure Information Retrieval in a Networking Society

    Biometric system identifies a person based on their details like thumb impression (left/right), eye retina, voice, etc. No two individuals' biometrics may seem to be identical because with respect to their voice when considered vocal tract shapes, larynx sizes, and other parts of their voice production organs are different, with...

    Provided By International Association of Computer Science & Information Technology (IACSIT)

  • White Papers // Jan 2014

    Gossip Originated Trusted Leader Selection with Reinforcement in Wireless Mesh Network

    Wireless mesh network is the area where more and more research works are carried on. The mesh network comprises of fixed mesh routers and mobile mesh clients. This paper proposes a unique leader selection algorithm for wireless mesh network. The proposed method is unique in the way that apart from...

    Provided By International Association of Computer Science & Information Technology (IACSIT)

  • White Papers // Jan 2014

    Relay Node and Cluster Head Placement in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) have enjoyed considerable interest from the research community due to their varied applications and unique challenges. They have found applications in military use for enemy tracking, battlefield surveillance, and target classification as well as other applications including traffic monitoring, cross-border infiltration detection, military reconnaissance, habitat monitoring,...

    Provided By International Association of Computer Science & Information Technology (IACSIT)

  • White Papers // Dec 2010

    Towards an Intelligent Multimodal Biometric Identification System

    The goal of this project is to bring together and integrates the work of the laboratory team members in order to get a practical realization of an Intelligent Multimodal Biometric Identification System. This last exploits the vocal and visual properties of a person to carry out, her or his, identification....

    Provided By International Association of Computer Science & Information Technology (IACSIT)

  • White Papers // Jul 2009

    Agent Based Efficient Anomaly Intrusion Detection System in Adhoc Networks

    Networks are protected using many firewalls and encryption software's. But many of them are not sufficient and effective. Most intrusion detection systems for mobile ad hoc networks are focusing on either routing protocols or its efficiency, but it fails to address the security issues. Some of the nodes may be...

    Provided By International Association of Computer Science & Information Technology (IACSIT)

  • White Papers // Oct 2010

    A Joint Routing and Bandwidth Allocation Protocol for IEEE 802.16 WiMax Mesh Networks

    Bandwidth allocation and routing are two important mechanisms in the provision of guaranteed QoS in wireless networks. The QoS provisioning algorithms developed in mobile ad hoc networks might not be applied directly in wireless mesh networks, since, WiMax based backhaul mesh networks have different characteristics. In this paper, to solve...

    Provided By International Association of Computer Science & Information Technology (IACSIT)

  • White Papers // Oct 2010

    Cluster Based QoS Routing Protocol for MANET

    A Mobile Ad hoc NETwork (MANET) is a temporary network formed by a number of mobile nodes without a centralized administration or wired infrastructure. Because of its dynamic nature and random topology, MANET's routing protocol is different from other networks. The dynamic nature of these ad hoc networks makes support...

    Provided By International Association of Computer Science & Information Technology (IACSIT)

  • White Papers // Sep 2009

    Taxonomy of Routing Security for Ad-Hoc Network

    The emergence of the Mobile Ad Hoc Networking (MANET) technology advocates self-organized wireless interconnection of communication devices that would either extend or operate in concert with the wired networking infrastructure or, possibly, evolve to autonomous networks. In either case, the proliferation of MANET-based applications depends on a multitude of factors,...

    Provided By International Association of Computer Science & Information Technology (IACSIT)

  • White Papers // Dec 2010

    A Hop by Hop Congestion Control Protocol to Mitigate Traffic Contention in Wireless Sensor Networks

    In wireless sensor networks, contention causes message collisions, which are very likely to occur when traffic is frequent and correlated, and hence decreases the lifetime of the network. Also congestion happens due to contention which is caused by concurrent transmissions. In this paper, the authors propose to develop a Hop-by-hop...

    Provided By International Association of Computer Science & Information Technology (IACSIT)

  • White Papers // Apr 2009

    Dynamic and Auto Responsive Solution for Distributed Denial-of-Service Attacks Detection in ISP Network

    Denial of Service (DoS) attacks and more particularly the distributed ones (DDoS) are one of the latest threat and pose a grave danger to users, organizations and infrastructures of the Internet. Several schemes have been proposed on how to detect some of these attacks, but they suffer from a range...

    Provided By International Association of Computer Science & Information Technology (IACSIT)

  • White Papers // Oct 2009

    Performance Evaluation of Symmetric Encryption Algorithms on Power Consumption for Wireless Devices

    The popularity of wireless networks increases, so does the need to protect them. Encryption algorithms play a main role in information security systems. On the other side, those algorithms consume a significant amount of computing resources such as CPU time, memory, and battery power. This paper illustrates the key concepts...

    Provided By International Association of Computer Science & Information Technology (IACSIT)

  • White Papers // Jan 2012

    Fault Tolerance in Distributed Paradigms

    Distributed systems are responsible for providing the main execution platform for High Performance Computing (HPC). As distributed systems can be homogeneous (cluster) as well as heterogeneous (grid and cloud etc), they are prone to different kinds of problems. The issues in distributed systems can be Security, Quality of Service, Resource...

    Provided By International Association of Computer Science & Information Technology (IACSIT)

  • White Papers // Jan 2012

    Research on IEEE 802.11 Wireless LANs Traffic Characteristics Analysis for Supporting Picture Archiving and Communication System (PACS)

    Nowadays, when a health system uses medical imaging or Picture Archiving and Communication System (PACS) medicine and clinical information services such as X-ray, laboratory work, and Medical Record System (MRS) are delivered over wireless networks. A system with wireless enabled mobile carts is very easy to setup and running at...

    Provided By International Association of Computer Science & Information Technology (IACSIT)

  • White Papers // Jan 2012

    A Robust Digital Image Watermarking Approach Against JPEG Compression Attack Based on Hybrid Fractal-Wavelet

    The recent progress in the digital multimedia technologies has offered many facilities in the transmission, reproduction and manipulation of data. However, this advance has also brought the problem such as copyright protection for content providers. Digital watermarking is one of the proposed solutions for copyright protection of multimedia. This paper...

    Provided By International Association of Computer Science & Information Technology (IACSIT)

  • White Papers // Jan 2012

    A Novel Encryption Algorithm for Transmitting Secure Data Based on Genetic Hyper Chaos Map

    A new color image encryption algorithm based on chaos genetic algorithm and control parameter chaotic map is proposed in this paper. Four chaotic sequences are generated from a 4D hyper chaos. To increase the security of the cryptosystem, Tent map is used to produce the control parameter, and the cubic...

    Provided By International Association of Computer Science & Information Technology (IACSIT)

  • White Papers // Jan 2012

    Study on Energy Saving in Network Devices

    A lot of studies on high efficiency energy for backbone networks, EPON (Ethernet Passive Optical Network), networking equipment and IDC (International Data Center) are being carried out by many Korean and foreign researchers. For EPON, research on the development of protocols for higher energy efficiency at the PHY/MAC layers and...

    Provided By International Association of Computer Science & Information Technology (IACSIT)

  • White Papers // Jan 2012

    Study on Energy Efficient IPTV Settop Box

    The potential exists for substantial energy savings from more efficient Set-Top Boxes (STBs), including digital TV converter boxes, cable boxes, and satellite receivers/tuners. Much of this potential is driven by the scheduled conversion to digital broadcasting in 2007, which will require analog television sets to use some type of set-top...

    Provided By International Association of Computer Science & Information Technology (IACSIT)

  • White Papers // Jan 2012

    New Testing Method in Wireless Sensor Networks with Compressed Sensing Theory

    Wireless sensor networks consist of a large number of small devices or wireless nodes each with sensing unit, processing unit, communication unit and power supply unit. The wireless nodes can be deployed for monitoring scenarios such as industrial automation community, traffic controlling, electronic wars, transportation automation, electronic health and web...

    Provided By International Association of Computer Science & Information Technology (IACSIT)

  • White Papers // Jan 2012

    A Synergic Approach to Web Usability for Smartphones

    The mobile phones that the authors have been carrying with one all the time started becoming increasingly sophisticated and, consequently, the term "Smartphone" surfaced. Smartphones today are extremely powerful and, in addition to making phone calls, are capable of performing a variety of other functions. One very important function is...

    Provided By International Association of Computer Science & Information Technology (IACSIT)

  • White Papers // Jan 2012

    A Dual-Band Bandpass Filter Using SIR Suitable for WiMAX Band

    In this paper a dual band bandpass filter with sharp rejection is proposed. The filter is realized by using two half wavelength stepped impedance resonator to operate at the passband 2.5 GHz and 3.5 GHz. To increase the band width further inter-digital capacitors are introduced between resonator and input and...

    Provided By International Association of Computer Science & Information Technology (IACSIT)

  • White Papers // Jan 2012

    Performance Analysis of Parallel Interference Cancellation in Cyclic-Prefix CDMA

    Code Division Multiple Access with Cyclic Prefix (CP-CDMA) is regarded as one of the best candidates for the broadband wireless communication system. This paper proposes a Parallel Interference Cancellation (PIC) in CP-CDMA system. With less complexity, the PIC can achieve better Bit Error Rate (BER) performance than the conventional interference...

    Provided By International Association of Computer Science & Information Technology (IACSIT)

  • White Papers // Jan 2012

    A Study for an Adaptive Anti-Jamming Antenna for the User Receiver of the GEO Satellite Communication System

    The separation angle between Geostationary Earth Orbit (GEO) satellites tends to be smaller owing to the increasing demand of high-speed fixed satellite services. This will increase the interferences from adjacent satellites at the user receivers of the GEO satellite communication systems. The commonly Very Small Aperture Terminal (VSAT) used by...

    Provided By International Association of Computer Science & Information Technology (IACSIT)

  • White Papers // Jan 2012

    Bit Error Probability of Cooperative Diversity for M-ary QAM OFDM-Based System With Best Relay Selection

    Cooperative relay networks in OFDM-based systems have been shown to improve performance in wireless communication systems as a form of spatial diversity, but are not readily available cooperative diversity for M-ary QAM OFDM-based system where the best relay only participates in the relaying. In this paper, the authors investigate the...

    Provided By International Association of Computer Science & Information Technology (IACSIT)

  • White Papers // Jan 2012

    Wheelchair Ramp Lift Boarding Supporter for Public Bus Transportation Service Using RFID and Fuzzy Proportional Plus Integral Control System

    This paper presents the development of wheelchair ramp lift boarding supporter system that is applied for WheelChair Passenger accessible on public transport Bus service system (WCPB) which is the first step to develop a wheelchair user guide for more safety and comfortable to public transit services system that can be...

    Provided By International Association of Computer Science & Information Technology (IACSIT)

  • White Papers // Jan 2012

    An Intelligent Analysis of a City Crime Data Using Data Mining

    There had been an enormous increase in the crime in the recent past. The concern about national security has increased significantly since the 26/11 attacks at Mumbai, India. However, information and technology overload hinders the effective analysis of criminal and terrorist activities. Crime deterrence has become an upheaval task. The...

    Provided By International Association of Computer Science & Information Technology (IACSIT)

  • White Papers // Jan 2012

    A Wireless Sensor Network for Weather and Disaster Alarm Systems

    In the last few years, the occurrences of natural disasters have been continuing changing the people lives, damaging property and life styles in many different ways. In this paper, the authors present a system that can be used to prevent enormous damage from natural disasters. In this system, a wireless...

    Provided By International Association of Computer Science & Information Technology (IACSIT)

  • White Papers // Jan 2012

    Analyzing SQL Meta Characters and Preventing SQL Injection Attacks Using Meta Filter

    SQL Injection Attacks (SQLIA) are widely used in which an attacker crafts input to the application server to access or modify data on the database server. A common approach for an attacker to launch SQLIA is by modifying the input URL to contain partial SQL queries and trick the server...

    Provided By International Association of Computer Science & Information Technology (IACSIT)

  • White Papers // Jan 2012

    Multi Secret Sharing Scheme for Encrypting Two Secret Images Into Two Shares

    Information, image and media encryption is a method for preventing misuse of adversaries. Because encryption and decryption normally need too complex computation. Visual cryptography is a method in witch decryption is performed with used via human visual system. In the traditional scheme; one secret image is divided between two shares...

    Provided By International Association of Computer Science & Information Technology (IACSIT)

  • White Papers // Jan 2012

    Speech Recognition Using Linear Predictive Coding and Artificial Neural Network for Controlling Movement of Mobile Robot

    This paper describes about implementation of speech recognition system on a mobile robot for controlling movement of the robot. The methods used for speech recognition system are Linear Predictive Coding (LPC) and Artificial Neural Network (ANN). LPC method is used for extracting feature of a voice signal and ANN is...

    Provided By International Association of Computer Science & Information Technology (IACSIT)

  • White Papers // Jan 2012

    Dispersion Compensation Using All Pass Filters in Optical Fibers

    All Pass Filters (APFs) are used in dispersion compensation which is the foremost requirement in an optical fiber link. All pass filters can correct any order of dispersion by the careful design of multistage all pass filters starting from very simple components with the use of N port devices. Multiple...

    Provided By International Association of Computer Science & Information Technology (IACSIT)

  • White Papers // Jan 2012

    The Association Between Confidentiality and Integrity of Information Assets in ICT Outsourcing

    Information security risk is a major concern for organisations, particularly when implementing Information Communication Technology (ICT) outsourcing. Despite the benefits of ICT outsourcing, it places information assets at risk and thus the viability of the strategy owes much of its success to the security measures taken to minimise such risks....

    Provided By International Association of Computer Science & Information Technology (IACSIT)

  • White Papers // Jan 2012

    Cross-Layer Self Organized Routing Protocol for MANET

    Mobile Ad hoc NETworks (MANETs) generally adopt a peer-to-peer architecture. Disconnectivity with peer nodes, induced by mobility, power drains and damage makes route maintenance difficult and degrade the network's ability. In this paper, the authors present a routing scheme for proactive management of such disconnections, by fusing and leveraging information...

    Provided By International Association of Computer Science & Information Technology (IACSIT)

  • White Papers // Jan 2012

    An Intelligent Way of Defining Routing Table and Path for MANET

    The knowledge about the topology can dramatically affect the performance of Mobile Ad hoc NETworks (MANET). In pro-active routing protocols, all the nodes consume enough power to build up the routing table before starting a communication. And the routing table is always updated so that the nodes have most up-to-date...

    Provided By International Association of Computer Science & Information Technology (IACSIT)

  • White Papers // Jan 2012

    3D Model Retrieval Method Based on Sample Prediction

    This paper presents a novel method for 3D model retrieval combining the content-based retrieval and the text-based retrieval. Algorithm merges the content-based retrieval and the text-based retrieval through the sample library. The user only need to enter a keyword and the algorithm will search the 3D models with a keyword...

    Provided By International Association of Computer Science & Information Technology (IACSIT)

  • White Papers // Jan 2012

    A Performance Modeling Framework Considering Service Components Deployment Issue

    Performance evaluation of distributed system is always a complex task where the service behavior results from a collaboration of partial components behavior those are physically distributed. The authors present an approach to delineate a performance modeling framework in model based service engineering context that proposes a transformation process from high...

    Provided By International Association of Computer Science & Information Technology (IACSIT)

  • White Papers // Jan 2012

    Performance Analysis of Delay Jitter in Mobile WiMAX Systems

    Mobile WiMAX, based on IEEE 802.16e provides five different service classes: UGS, ertPS, rtPS, nrtPS and BE, to deliver the best quality experiences for mobile WiMAX users. Each service class is incorporated with several Quality of Service (QoS) mechanisms at the Media Access Control (MAC) layer to support the various...

    Provided By International Association of Computer Science & Information Technology (IACSIT)

  • White Papers // Jan 2012

    Process Induced Random Variation Models of Nanoscale MOS Performance: Efficient Tool for the Nanoscale Regime Analog/mixed Signal CMOS Statistical/variability Aware Design

    In this paper, the novel models of random variation in Ids which is a key parameter of any MOS transistor, have been proposed in this paper as the probability density functions. Both triode and saturation regions have been explored. Unlike the previous researches, this paper has been performed based upon...

    Provided By International Association of Computer Science & Information Technology (IACSIT)

  • White Papers // Jan 2012

    Soft-IP Interface Modification Methodology

    The reuse of predefined Intellectual Property (IP) can lead to great success in system design and help the designer to meet time-to-market requirements. A soft IP usually needs some customization and integration efforts rather than plug-and-play. Communication interface mismatch is one of the problems that integrators often meet. This paper...

    Provided By International Association of Computer Science & Information Technology (IACSIT)

  • White Papers // Jan 2012

    Development of an Intelligent Fault Indicator for Smart Grids

    The paper develops and implements a ZigBee-based intelligent fault indicator for smart grids to achieve significant and immediate improvement in reliability and hence service to the electricity customers. A fault detection and identification system is also designed; thus, the fault location can be found out effectively and efficiently after a...

    Provided By International Association of Computer Science & Information Technology (IACSIT)

  • White Papers // Jan 2012

    An IT Security Investigation Into the Email Systems of Selected Local Government Councils in WA

    This paper investigated Information Technology (IT) security on the email systems at three selected Western Australian (WA) local government councils. The paper was based on several industries and national benchmarking standards and investigated the email system security. The scope of the analysis included the architecture, the infrastructure devices, port scanning...

    Provided By International Association of Computer Science & Information Technology (IACSIT)

  • White Papers // Jan 2012

    Performance Analysis of Power Line Communication Using DS-CDMA Technique With Adaptive Laguerre Filters

    This paper presents the system performance of the Power Line Communication (PLC) using Direct-Sequence Code Division Multiple Access (DS-CDMA) technique with an adaptive equalizer based on Laguerre filter. The objectives are to improve the performance of system by means of Bit Error Rate (BER) at the receiver, and to eliminate...

    Provided By International Association of Computer Science & Information Technology (IACSIT)

  • White Papers // Jan 2012

    FAST Color Space Transformation for Embedded Controller by SA-C Recofigurable Computing

    This paper proposes nominal decomposition for calculating color space transformation in single assignment language, to speed up execution time. Chromaticity coordinate transformation is discussed within the framework of nominal decomposition. The numerical value is decomposed into nominal value and base value, respectively. Such an algorithm is suitable for the programming...

    Provided By International Association of Computer Science & Information Technology (IACSIT)

  • White Papers // Jan 2012

    Prioritization of Lineare TV Sub Traffic in the IPTV Over IMS Session

    The distribution of real-time 'Linear' TV, VoD and PvR traffic, on IP infrastructure, requires strict QoS constraints especially low loss and latency of packets transmission. The main challenge to realize these objectives is how to design cross layer architecture which resolve many problems and failures in existing network, and develop...

    Provided By International Association of Computer Science & Information Technology (IACSIT)