International Association of Engineers

Displaying 1-40 of 748 results

  • White Papers // Mar 2015

    Key Factors Affecting User Experience of Mobile Recommendation Systems

    With the growing need for user-friendly design of mobile software, user experience has attracted more attention from researchers and practitioners. In particular, it is vital to improve the user acceptance of mobile recommendation systems that are new technologies that provide convenience for mobile device users. Based on recent studies, this...

    Provided By International Association of Engineers

  • White Papers // Mar 2015

    Online Signature Verification for Multi-modal Authentication using Smart Phone

    In this age of technology, authentication has become a burning issue. Demand for new ways to authenticate people are increasing every day. The technological boom in mobile industry has also opened new playing fields. This creates opportunities to implement authentication models that utilize mobile technology. To be more robust and...

    Provided By International Association of Engineers

  • White Papers // Mar 2015

    A Cloud -based Wireless Mesh Network with Adaptive Data Storage Functions

    In recent years, there has been considerable interest in developing and using wireless mesh networks. Compared to wireless local area networks, wireless mesh networks are more flexible because mesh routers are interconnected by wireless links. In addition, they can be much easier to install and maintain, especially in environments where...

    Provided By International Association of Engineers

  • White Papers // Mar 2015

    On -Premises Cloud Storage - Security Aspects for Small and Medium-sized Enterprises

    In this paper, the authors demonstrate and outlines the practical implementation of a secure cloud storage solution for Small and Medium-sized Enterprises (SMEs) by example of an Austrian company. It first introduces some basic principles of cloud storage and eventually focuses on a cloud storage solution considered to be optimal...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Risk Management for a Risk-Averse Firm with Contingent Payment

    In this paper, the authors study the contingent sales price risk mitigation problem of a risk-averse firm which procures some kind of commodity from the spot market as raw material for making certain product. The payment received by this firm depends on the underlying commodity spot price which is unknown...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Crop Production Recognize Frameworks using Mobile Enterprise Application

    In this paper, the authors propose an enterprise application framework using mobile that uses CBD (Component-Based Development) as development methodology and web services for information interchange in the RFID-based distributed computing environment for crop production in agricultural area. They tried to analyze the requirements of mobile applications architecture and mobile...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Software Architectural Design for Image Retrieval System Involving Data Streams and User Interactivity

    In the process of software development, the role played by the software architect is substantial. It is the software architect who splits the entire application into different components, understands the functions performed by each component and should possess sound knowledge on the interactions among these components. The software architect communicates...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Multichannel User Interfaces Towards Crossover Inclusive Computing

    In this paper, the authors summarize the present methods available for providing user interfaces for disability applications. Section 508 of the Rehabilitation Act of 1973 has contributed to providing accommodation to people with disability, and is generally considered a step in the right direction. As many modalities of interaction have...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    The Comparative Analysis Between Sensory and Cognitive in Online Customer Reviews of Baby Formula

    Based on a big data service platform for industry informatization, the authors made a comparative analysis between sensory and cognitive in online customer reviews of baby formula. Three aspects of the customer reviews are analyzed. In the first part, the descriptive analysis was conducted to evaluate the customer reviews propensity...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Text Mining in Business Practice: Automatic Analysis of Customer Reviews for Business Support

    Automatic or semi-automatic (human-assisted) analysis of text sources can be a crucial key element in the business process. Modern companies face a growing competitive environment in which they do not compete only with their market competitors, but in a certain sense even with their customers. It is the customers who...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Prediction of Work Integrated Learning Placement Using Data Mining Algorithms

    Data mining in education is used to study data and discover new patterns that can be used for decision making. The classification algorithms are applied on educational data set for predicting work integrated learning placement based on student performance. J48, Bayes Net, Naive Bayes, Simple Cart, and REPTREE algorithms are...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Cerebration of Privacy Preserving Data Mining Algorithms

    Recent advances in data intensive information processing systems is becoming increasingly important to make decisions in business organizations. Precious & sensitive knowledgeable patterns may reside in the process of business analysis. Recently privacy preserving data mining have acquired a great extent by data mining and Information security community researchers in...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Data Analysis and Prediction of Power Generated by Photovoltaic Systems

    The increasing demand for renewable energy from sources such as wind and solar has attracted the researchers to study the behavior and attributes of these energy resources in more depth. One of the important aspects of renewable energy resources is their uncertainty/unpredictability. To have a balance between the power demand...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    A New Approach for Cluster Disjuncts Using Naive Bayes

    Data mining is the process of discovering hidden knowledge from the existing databases. In real-time applications, most often data sources are of imbalanced nature. The traditional algorithms used for knowledge discovery are bottle necked due to wide range of data sources availability. Class imbalance is a one of the problem...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Problem Solving Hands-On Labware for Teaching Big Data Cybersecurity Analysis

    The rapid growth of big data analysis needs has resulted in a shortage of professionals in this area. Despite such great need, big data analytics and data science is not well represented in current academic programs. Although a few schools have offered new courses in this area but they all...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Distributed Versus Centralized Protection Schema for the Enterprise

    Entities in the enterprise are deployed with a standard configuration. Over time, patches, updates, new software versions, and mistakes or malicious activity all lead to deviations across the enterprise from this standard baseline. Malicious or unknown software on a system can cause harm or unexpected behavior. To mitigate these problems...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Cryptography Based Authentication Methods

    In this paper, the authors review a comparison study on the most common used authentication methods. Some of these methods are actually based on cryptography. In this paper, they show the main cryptographic services. As well as, this paper presents a specific discussion about authentication service. Since the authentication service...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    A Centralized Multimodal Unified Authentication Platform for Web-based Application

    Identifying a user or in technical terms, authentication, is a key process that must be performed before a service can be rendered to a person through electronic means. Common practice for user authentication is to challenge user to present authentication credential, user who can present the valid credential is considered...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    A Bayesian Network Model for Risk Management in Cyber Situation

    The transformation in e-commerce with the advent of other internet based activities has increased the impact of cyber-attacks on organizations and nations at large. However, tracking these attacks and determining risks posed ensure the overall security in cyber situation and invariably enhances communication and economic growth. Consequently, this paper presents...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Xen Web-based Terminal for Learning Virtualization and Cloud Computing Management

    In this paper, the authors propose a web-based terminal for teaching the cloud. This method allows students and trainees to learn managing the cloud in a useful and secure manner. This paper promotes an appreciate educational environment by enabling students to practice the knowledge practically, teaching them the ethics of...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    A Parallel Authenticated Encryption Sharing Scheme Based on Cellular Automata

    Multi-secret sharing scheme based on cellular automata have proven to be a secure encrypting algorithm, although it cannot guarantee data integrity and authenticity of shares of the participants, allowing a chosen cipher text attack. In this work, to improve the security of multiple Secret Sharing Scheme (SSS) against adaptive chosen...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Computing Interfaces for Everyone

    Companies, businesses and agencies rely on computing technology, taking advantage of its trends and benefits. Some categories of users - people with disabilities - have faced considerable challenges accessing the cloud to the point that they have become excluded. Many of the existing systems and companies still rely on assistive...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Efficient Certificateless One-Pass Key Agreement Protocols

    Key agreement is an essential component in any cryptosystem. In this paper, a new certificate-less two-party key agreement protocol is proposed. The protocol involves only one pass of exchanged messages, thus saving both time and bandwidth. The protocol provides implicit authentication of the identities of the two communicating parties. This...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Design of Customer-Oriented Cloud Products

    Cloud computing is defined as a scalable services consumption and delivery platform that allows enterprises and individual users to start from the small and increase resources only in case of service demand increase. The competitive environment of cloud service providers forces them to differentiate their products in terms of technical...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Mining Frequent Patterns in Software Risk Mitigation Factors: Frequent Pattern-Tree Algorithm Tracing

    Frequent-Pattern Tree (FP-Tree) algorithm plays a vital role in mining associations, patterns and other data mining related jobs. Currently a software risk mitigation intelligent decision network engine using rule based technique has been designed against software risk factors. A novel idea of finding the associations between different software risk mitigation...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Fingerprint Matching Using Features Mapping

    Fingerprint systems have been featuring prominently among Biometric identification systems for individuals. The dominance of fingerprint is been promoted through continuous emergence of different forms of Automated Fingerprint Identification Systems (AFIS). In the course of performing its assigned roles, an AFIS conducts several activities including fingerprint enrolment, creation of its...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Experimental Validation of Lafortune-Lecours Propagation Model at 1900 MHz

    With an ever increasing demand for cellular voice and data services, many of the cellular providers are finding deployment of the in-building infrastructure inevitable. The in-building deployments allow for further re-use of the allocated spectrum and hence, they provide one of the most effective ways for increasing the overall system...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    ITU-T Future Networks: A Step Towards Green Computing

    In the field of telecommunications, Information and Communication Technologies (ICTs) the United Nations specialized agency is termed as International Telecommunication Union (ITU) which is a standard. Telecommunication Standardization Sector (ITU-T) is a permanent organ of ITU. ITU-T is identified to be responsible for studying technical, operation including tariff rates, grade...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Quality Measurement for Mobile Crop Production Management Applications

    Most ERP vendors proudly claim their solutions are available on mobile platforms, explaining that managers can access their ERP solution from their Smartphone's. The recent wave of Mobile-Enterprise Resource Planning (M-ERP) systems adoption is a significant commitment of resource and may affect almost all business processes. Mobile business boosting the...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    An Alternative Approach for Investigating the Impact of Mobile Phone Technology on Speech

    Creating a database of mobile phone speech recordings is the first step to studying the impact of mobile phone networks on various speech applications. The conventional way of creating such a database involves transmitting speech between two mobile phone devices across an actual network. However, this can only encompasses a...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Subjective Assessment of Mobile Videos Quality for Long Term Evolution (LTE) Cellular Networks

    In this paper, the authors introduce a Mobile Video Quality Prediction (MVQP) project for Long Term Evolution (LTE). The MVQP aims to predict the quality of streaming video service over User Datagram Protocol (UDP) in LTE cellular networks. In this paper, 100 subjects evaluated video quality using smart phones based...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Object Manipulation Through Explicit Force Control Using Cooperative Mobile Multi-Robot Systems

    Transportation of objects by groups of mobile robots can be advantageous when an object is too large or heavy to be effectively manipulated by a single robot on its own. This paper proposes combining the cluster space control methodology with explicit force control to effectively and safely move such an...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Evaluating Protection of Computer Network in Education Sector

    The use of Information Technology (IT) in the higher education institutes was increased daily. Most of the literature mentioned that the ISO/IEC 27002:2005 is the most popular standard to follow in order to reach the best protection for computer Networks. A questionnaire was designed to determine the extent of satisfaction...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Wireless Sensor Deployment Method on 3D Environments to Maximize Quality of Coverage and Quality of Network Connectivity

    Sensor deployment is one of the most important issues which affect the overall performance of a Wireless Sensor Network (WSN). It is a challenging task to optimally deploy a limited number of sensors on Three Dimensional (3D) environments to maximize Quality of Coverage (QoC) and Quality of Network connectivity (QoN)....

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Neural Network Random Error Prediction on Wireless Local Area Network and Application of One-Dimensional Multi Resolution Wavelet De-Noising Technique

    Self-similarity is a phenomenon known as a random error in a discrete system and considered as one of the major factors that constitute a delay on a network; it affects the overall stability or performance and reduces the capacity utilization of the network. In view of this, an ON/OFF traffic...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Enhanced Bandwidth Sharing Scheme for Small and Medium Enterprises

    Small and Medium Enterprises (SMEs) setup wireless networks in order to make the process of communicating and sharing resources easier. SMEs implement wireless networks, because it's easy, fast and cheaper to implement. However, with the rapid growth within the SMEs sector. SMEs tend to hire more employees when they grow...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Effect of Threshold Voltage on Cylindrical Surrounding Double-Gate MOSFET for Wireless Sensor for Wireless RF Switches

    Wireless Sensor Network (WSN) technologies have potential applications in communication, entertainment, travel, retail, industry, medicine, environment monitoring, scientific observation, field surveillance, structure monitoring and many other areas. The Cylindrical Surrounding Double-Gate (CSDG) Silicon On Insulator (SOI) MOSFET is a leading device for nanotechnology. This paper presents an effect of threshold...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    A New Gateway Location Protocol for Mesh Networks

    Wireless Mesh Network (WMN) is a promising technology that can provide broadband Internet access. Traffic often routed in Wireless Mesh Backbone (WMB). This also extended to the mesh clients and the Internet and forward to then to mesh gateways. Strategically providing efficient and supervising of WMN is a tedious task...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    A Comparative Study of IEEE 802.11 Standards for Non-Safety Applications on Vehicular Ad Hoc Networks: A Congestion Control Perspective

    Vehicular Ad-hoc NETworks (VANETs) is an important component within the Intelligent Transportation Systems (ITS) that have been part of global strategy and advanced applications. The aim is to provide innovative services relating to various modes of transportation and traffic management. These systems enable users to reach their destinations better, safer...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    FDTD Simulation of a Mobile Phone Operating Near a One Metal Cell

    In recent years mobile phones or smart phones have gained popularity because of its versatility: internet capabilities, navigation and cameras. Engineering research on the subject of wireless phones and Radio Frequency (RF) energy has been conducted worldwide for many years. This paper presents results of placing a one metal cell...

    Provided By International Association of Engineers

  • White Papers // Mar 2010

    Exploring the Behavior of Mobile Ad Hoc Network Routing Protocols with Reference to Speed and Terrain Range

    A mobile Ad Hoc network is a collection of autonomous mobile nodes that communicate with each other over wireless links. Such networks are expected to play increasingly important role in future civilian and military settings, being useful for providing communication support where no fixed infrastructure exists or the deployment of...

    Provided By International Association of Engineers

  • White Papers // Jul 2010

    FIP Over Ethernet/IP for Real Time Distributed Systems Implementation

    This paper presents the realization of a platform for testing and validating distributed real time systems (DRTS), by following a methodology of development. The main contribution remains the realization of an industrial communication bus (FIP: Factory Instrumentation Protocol) implemented on an Ethernet platform. The work focuses on improving the response...

    Provided By International Association of Engineers

  • White Papers // Oct 2010

    A Study on the Security Mechanism for Web Services

    Web Service has been widely used in the field of distributed application system. But the security issue of the Web Service has often been considered as a crucial barrier to its application in many fields that conducts sensitive information, such as E-commerce. In the paper, the authors introduce the Security...

    Provided By International Association of Engineers

  • White Papers // Oct 2010

    Video Conferencing With CAI for Better Impact on Training and Education: An Indian Scenario

    Videoconferencing is changing the way Education is being imparted. It facilitates the effective teaching, a face-to-face meeting environment, clearing the way for efficient communication. It is an effective form of communication with distinct benefits. Today, more than ever, it is proving to be an extremely powerful tool, helps to gain...

    Provided By International Association of Engineers

  • White Papers // Oct 2010

    A Survey Of Success Factors For CRM

    Customer Relationship Management has become the main interest of researchers and practitioners especially in the domains of Marketing and Information Systems (IS). This paper is an overview on success factors that could facilitate successful implementation of CRM. In the past decades, the challenge for businesses was optimizing production process to...

    Provided By International Association of Engineers

  • White Papers // Jul 2009

    Hardware Co-Simulation for Video Processing Using Xilinx System Generator

    The use of rapid prototyping tools such as MATLABS-imulink and Xilinx System Generator becomes increasingly important because of time-to-market constraints. This paper presents a methodology for implementing real-time DSP applications on a reconfigurable logic platform using Xilinx System Generator (XSG) for Matlab. The methodology aims to improve the design verification...

    Provided By International Association of Engineers

  • White Papers // Oct 2009

    A Comparative Analysis of Network Benchmarking Tools

    Nowadays, there is a wide variety of network benchmarking tools, giving researchers and network administrators many choices to work with. However, this variety tends to difficult the selection process of the appropriate tool. Furthermore, sometimes users are forced to try several tools in order to find the one that calculates...

    Provided By International Association of Engineers

  • White Papers // Oct 2009

    Dynamic Behavior of Bandwidth Control Management in Mobile Ad-Hoc Network

    Quality of Service (QoS) support in Mobile Ad-hoc NETworks (MANETs) is a challenging task. The major challenge in ad hoc networks lies in adapting multicast communication to environments, where mobility is unlimited and failures are frequent. Such problems increase the delays and decrease the throughput. To meet these challenges, authors...

    Provided By International Association of Engineers

  • White Papers // Jan 2009

    Design Factors on Dynamic Text Display

    Electronic information display systems are widely used in public places. The increase in use of Light-Emitting Diodes (LEDs) display arouses the authors' interest in the effective methods of displaying dynamics text. In order to overcome the limitations of screen size of the display units, numerous means of presenting moving materials...

    Provided By International Association of Engineers

  • White Papers // Aug 2008

    A Review on VHF Power Electronics Converter and Design Issues

    A high output power density VHF converter has become important in recent years. This output power density of the converter is experiencing an adverse effect resulted from the applied switching frequency. In addition, the frequency which is higher than 20MHz will no longer be applicable on the discreet SMT technology...

    Provided By International Association of Engineers

  • White Papers // May 2008

    Design of Reversible/Quantum Ternary Comparator Circuits

    Multiple-valued quantum circuits are promising choices for future quantum computing technology, since the multiple-valued quantum system is more compact than the corresponding binary quantum system. Grover's quantum search algorithm requires a sub-circuit called oracle, which takes a set of inputs and gives an output stating whether a given search condition...

    Provided By International Association of Engineers

  • White Papers // May 2008

    Vector Approximation Based Indexing for High-Dimensional Multimedia Databases

    One of the fundamental problems, in multimedia databases domain, resides in the similarity search, i.e. the need to retrieve a small set of objects which are similar or closest to a given query object. Generally, the similarity is not measured on the multimedia objects directly, but on their traditional primitives...

    Provided By International Association of Engineers

  • White Papers // Feb 2008

    Cost Reduction in Nearest Neighbour Based Synthesis of Quantum Boolean Circuits

    Quantum computer algorithms require an 'Oracle' as an integral part. An oracle is a reversible quantum Boolean circuit, where the inputs are kept unchanged at the outputs and the functional outputs are realized along ancillary input constants (0 or 1). Recently, a nearest neighbor template-based synthesis method of quantum Boolean...

    Provided By International Association of Engineers

  • White Papers // Aug 2007

    The Evaluation Study of Customer Satisfaction Based on Gray -AHP Method for B2C Electronic-Commerce Enterprise

    Under electronic commerce, how to raise the consumers' degree of satisfaction and gain the consumers' loyalty have become the key factor relating with whether e-commerce enterprise can survive, so it's vital to evaluate status of customer satisfaction for B2C electronic commerce enterprise. According to the investigation result by internet, this...

    Provided By International Association of Engineers

  • White Papers // Nov 2007

    Reversible Realization of Quaternary Decoder, Multiplexer, and Demultiplexer Circuits

    Reversible logic is a very prospective approach of logic synthesis for power reduction in future computing technologies. A quaternary reversible circuit is more compact than the corresponding binary reversible circuit in terms of number of input/output lines required. Decoder, multiplexer and de-multiplexer are very important building blocks of digital systems....

    Provided By International Association of Engineers

  • White Papers // Feb 2007

    Analysis of Hybrid Translinear Circuit and Its Application

    The trans-linear principle proposed by researchers in 1975 is one of the important contributions to circuit theory in the electronics era. Generalized trans-linear principle which applies to devices having trans-conductance linear with an electrical variable such as current or voltage has been proposed. In this paper, the hybrid trans-linear circuit...

    Provided By International Association of Engineers

  • White Papers // Feb 2007

    Reordering Algorithm for Minimizing Test Power in VLSI Circuits

    Power consumption has become a crucial concern in Built-In Self-Test (BIST) due to the switching activity in the Circuit Under-Test (CUT). In this paper, the authors present a novel method which aims at minimizing the total power consumption during testing. This is achieved by minimizing the switching activity in the...

    Provided By International Association of Engineers

  • White Papers // Feb 2007

    A Method for Secure Query Processing in Mobile Databases

    A method for secure query processing in mobile databases has been presented in this paper. Mobile devices send queries to the server via point-to-point channels. The mobile database server computes the superset of results of several similar queries, which is broadcast on a large bandwidth broadcast channel. The mobile devices...

    Provided By International Association of Engineers

  • White Papers // Oct 2010

    Implementation of Timed Automata in a Real-time Operating System

    In this paper, the authors present a tool for automatic implementation of timed automata model in a real-time operating system. The purpose of this tool is to make design, implementation and verification of real-time control systems easier because human resources will be concentrated more on the area of specification and...

    Provided By International Association of Engineers

  • White Papers // Mar 2015

    Key Factors Affecting User Experience of Mobile Recommendation Systems

    With the growing need for user-friendly design of mobile software, user experience has attracted more attention from researchers and practitioners. In particular, it is vital to improve the user acceptance of mobile recommendation systems that are new technologies that provide convenience for mobile device users. Based on recent studies, this...

    Provided By International Association of Engineers

  • White Papers // Mar 2015

    Online Signature Verification for Multi-modal Authentication using Smart Phone

    In this age of technology, authentication has become a burning issue. Demand for new ways to authenticate people are increasing every day. The technological boom in mobile industry has also opened new playing fields. This creates opportunities to implement authentication models that utilize mobile technology. To be more robust and...

    Provided By International Association of Engineers

  • White Papers // Mar 2015

    A Cloud -based Wireless Mesh Network with Adaptive Data Storage Functions

    In recent years, there has been considerable interest in developing and using wireless mesh networks. Compared to wireless local area networks, wireless mesh networks are more flexible because mesh routers are interconnected by wireless links. In addition, they can be much easier to install and maintain, especially in environments where...

    Provided By International Association of Engineers

  • White Papers // Mar 2015

    On -Premises Cloud Storage - Security Aspects for Small and Medium-sized Enterprises

    In this paper, the authors demonstrate and outlines the practical implementation of a secure cloud storage solution for Small and Medium-sized Enterprises (SMEs) by example of an Austrian company. It first introduces some basic principles of cloud storage and eventually focuses on a cloud storage solution considered to be optimal...

    Provided By International Association of Engineers

  • White Papers // Mar 2011

    Hiding Sensitive Predictive Frequent Itemsets

    In this paper, the authors propose an itemset hiding algorithm with four versions that use different heuristics in selecting the item in itemset and the transaction for distortion. The main strengths of itemset hiding algorithm can be stated as it works without pre-mining so privacy breech caused by revealing frequent...

    Provided By International Association of Engineers

  • White Papers // Jul 2011

    System Performance Improvement By Server Virtualization

    Servers based on the x86 architecture are now widely used, not only for simple servers but also for mission critical systems in enterprises or government, because microprocessor performance has increased significantly. With the advance of semiconductor technology, microprocessors become highly integrated and therefore multi-processor servers are widely used. On the...

    Provided By International Association of Engineers

  • White Papers // Mar 2011

    Speaker Verification System Using Discrete Wavelet Transform And Formants Extraction Based on the Correlation Coefficient

    In this paper, the authors propose a Discrete Wavelet Transform (DWT) and logarithmic Power Spectrum Density (PSD) are integrated for speaker accurate formants extraction, afterward correlation co-efficient is used for features classification; the correlation thresholding factor is adjusted. As the system works with the recorded samples, the features tracking capability...

    Provided By International Association of Engineers

  • White Papers // Feb 2012

    Review of Security Attacks in Mobile Adhoc Networks (MANETS)

    Security is a major concern for protected communication between mobile nodes in a hostile environment. In hostile environments adversaries can bunch active and passive attacks against intercept able routing in embed in routing message and data packets. In this paper, the authors focus on fundamental security attacks in Mobile Ad-hoc...

    Provided By International Association of Engineers

  • White Papers // Jan 2012

    Role of Imaginary Secure Network

    VPN stands for Virtual Private Network. Virtual means not real or in a different state of being. In a VPN, private communication between two or more devices is achieved through a public network the Internet. Therefore, the communication is virtually but not physically there. Private means to keep something a...

    Provided By International Association of Engineers

  • White Papers // Jan 2012

    Smart Antennas-A Vision for the Future

    Wireless Networking is not a new word nowadays. But, the authors all had the problem of going into a crowded Starbucks and facing difficulties of connections breakouts with substandard Wi-Fi signals because of too many access points and lots of end users. The main issue of concern is that if...

    Provided By International Association of Engineers

  • White Papers // Jan 2012

    Denial of Service Attacks (DOS) in MANET-Classification, Detection & Prevention Methods

    In MANETs (Mobile Ad-hoc NETworks) there is no pre-existing communication infrastructure. Beside the node formation they also formed on the basis of bandwidth, storage space and battery power. It has been assumed that all the nodes will cooperate in Packet Forwarding. But in commercial and civilian applications this is not...

    Provided By International Association of Engineers

  • White Papers // Feb 2012

    Performance Evaluation of LEACH Protocol in Wireless Networks

    Wireless micro sensor networks lend themselves to trade-offs in energy and quality. By ensuring that the system operates at a minimum energy for each quality point, the system can achieve both flexibility and energy efficiency, allowing the end-user to maximize system lifetime. Simulation results show that the proposed adaptive clustering...

    Provided By International Association of Engineers

  • White Papers // Jan 2012

    Performance Analysis of WiMAX Physical Layer for Various Modulation Schemes

    The Worldwide interoperability for microwave access (WiMAX) based on IEEE 802.16, has been one of the most important technologies in communication networks providing voice, data and video services with different type of QoS (Quality of Service) during last few years. This paper is to evaluate, analyze and compare the performance...

    Provided By International Association of Engineers

  • White Papers // Jan 2012

    Online Social Networks-Privacy Issues

    Online Social Networking sites have become one of the greatest social technological advancement in 21st century. But, most users are unaware of many of the privacy issues that come while having a profile over a social networking site. By placing information on WWW users make themselves vulnerable to hackers, selling...

    Provided By International Association of Engineers

  • White Papers // Jan 2012

    Routing Protocols Performance Comparison in Mobile Adhoc Networks (MANET) Using NS2 Simulator

    Mobile Ad-hoc NETwork (MANET) is regarded as an autonomous system of mobile nodes connected via wireless links. In this paper, various routing protocols associated with MANET networks are reviewed via their performance using NS2 Network Simulator. For relatively small networks flat routing protocols may be sufficient. But in case of...

    Provided By International Association of Engineers

  • White Papers // Jan 2012

    Hybrid Intrusion Detection System for Multi-Core Environment

    The network resources are consumed by variety of users. The attackers disrupt the network resources. Different Intrusion Detection schemes are used to detect network attacks. The Denial of Service Attacks (DoS), Probe, User To Remote (U2R) and Remote To Local (R2L) are some of the common attacks that affects network...

    Provided By International Association of Engineers

  • White Papers // Jan 2012

    Malicious Bots Automatic Detection on Internet Using Data Stream Classification

    The Internet has become a much wider place as if of now. It is not regarded as a sole place for human beings but also for Bots too. A Bot is defined as an automated program-a Robot, which reads website pages and gathers as much information as possible to use...

    Provided By International Association of Engineers

  • White Papers // Mar 2011

    An Effective Approach to Improving Packet Delivery Fraction of Ad Hoc Network

    This paper addresses the subject of improving performance of an ad hoc network system suffering from high resource contention by improving its packet delivery fraction. The suggested system model assumes that nodes can be divided into two classes: the servers that provide services and the clients that request services provided...

    Provided By International Association of Engineers

  • White Papers // Mar 2010

    Architecture for 6LoWPAN Mobile Communicator System

    Wireless sensor network is one of the emerging technologies which will have impact on people daily life in near future. This paper presents a 6LoWPAN communicator, which is a mobile device system and responsible for bi-directional communication to retrieve sensor data and conFig sensor nodes. This paper discusses about the...

    Provided By International Association of Engineers

  • White Papers // Mar 2010

    Addressing Method for the Components of On-Chip Communication

    In this paper, the authors propose a hierarchical addressing scheme for Network-on-Chip applications. This scheme will facilitate a user to transmit a lesser number of overhead bits while transmitting a message to some other user. The number of overhead bits required will be dependent on the distance (in terms of...

    Provided By International Association of Engineers

  • White Papers // Mar 2010

    Fast Algorithm in ECC for Wireless Sensor Network

    Elliptic Curve Cryptography (ECC) has been attractive to the people who are working in the field of the network security due to its good potential for wireless sensor network security due to its smaller key size and its high strength of security. But there is a room to reduce the...

    Provided By International Association of Engineers