International forum of researchers Students and Academician

Displaying 1-40 of 577 results

  • White Papers // Jul 2015

    Implementation of Viterbi Decoder Using Verilog

    Convolutional encoding with Viterbi decoding is a good Forward Error Correction (FEC) technique suitable for channels affected by additive white Gaussian noise. Viterbi decoder decodes quicker and takes less memory compared to other. The Viterbi algorithm is a well-known maximum likelihood algorithm for decoding of convolution codes. The complexity of...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2015

    Design and Implementation of Low Power Reversible ALU Using Parity Preserving Logic

    Today's world highly depends on embedded applications with advanced technologies; due to this number of transistors on a chip is an increase which causes power dissipation. In processor designing and energy dissipation is one of the major aspects and it is due to loss of information. Usage of reversible logic...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2015

    Secure Communication with AES Cryptosystemusing HDL

    Cryptography is the study of mathematical techniques related to aspects of information security such as confidentiality, data integrity, entity authentication and data origin authentication. Encryption and decryption of electronic data like text, image, videos, etc. is commonly performed to protect it from unauthorized access. The use of secret symmetric key...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2015

    Significance of Weighted - Type Fractional Fourier Transform in FIR Filters

    The desired frequency response of a filter is periodic in frequency and can be expanded in Fourier series. One possible way of obtaining FIR filter is to truncate the infinite Fourier series. But abrupt truncation of the Fourier series results in oscillation in the pass band and stop band. These...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2015

    Efficient Text Retrieval Over Cluster Data Bases Using Mapping Cardinalities

    The liaison analysis procedure for finding relationships in relational database generalizing both simple and multiple correspondences analyzes. It is based on a mobility models through implementing the liaison analysis for database relations having as many states as elements in the database. A link-analysis based technique allowing analyzing relationships existing in...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2015

    Geographical Junction Information Based Routing in Vehicular Ad Hoc Networks (VANETs)

    Vehicular Ad hoc NETwork (VANET) is a special case of MANET (Mobile Ad hoc NETwork) which involves the communication between moving vehicles. The aim of the VANET routing protocol is to provide efficient routing mechanism, in order to find shortest path between a source and destination for the efficient transmission...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2015

    What and How? Inside Network Simulators(NS3)

    All network simulators (ns-1, ns-2 and ns-3) are discrete-event network simulators. These simulators are used in research and training. The version ns-3 is particularly open source or available for free. ns3 has a key feature of Direct Code Execution (DCE). Simulator is a designed and implemented software program that creates...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2015

    A COLLID Based Intrusion Detection System for Detection of DDOS Attacks with Trust Evaluation

    In Mobile Ad hoc NETworks (MANETs), Distributed Denial of Service (DDoS) attacks remains as a major security concern. The early discovery of these attacks is necessary to protect the end user and the whole infrastructure. This paper addresses this issue and presents architecture of collaborative intrusion detection system. The core...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2015

    A Preferable Access for Averting Flood Attacks in Disruption Tolerant Networks

    Disruption Tolerant Networks (DTNs) are networks that aim to bring low-cost best-effort connectivity to challenged environments with no or limited infrastructures. Nodes in DTNs are often highly mobile and experience intermittent connectivity. Disruption Tolerant Networks (DTNs) use the moving of nodes and opportunistic contacts among nodes for data communication. Owing...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2015

    Performance Evaluation of Hetrogeneous Networks using Opnet Modeller :A Survey

    Wireless networking is an attractive networking solution due to its flexibility, mobility and ease of installation without damaging the furnishing of buildings (this factor play most important role in of situations where buildings are of higher heritage importance). Wireless networks such as WLAN, WIMAX, UMTS, etc. are in a period...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2015

    Performance Evaluation of MANET RoutingProtocols: A Literature survey

    A Mobile Ad hoc NETwork (MANET) is a collection of mobile nodes that forms on the fly a temporary wireless network in a self-organizing way, without established infrastructure. In MANET, the messages are exchange over a direct wireless link or including one or over a sequence of wireless links through...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2015

    A Performance Analysis Towards Big Data on Hadoop Cluster Using HDFS and Mapreduce

    Now-a-days, the use of internet grows, so the user wishes to store data on cloud computing platform. MapReduce has become an important distributed processing model for large-scale data-intensive applications. Hadoop an open source implementation of MapReduce is widely used for storage and retrieval of the big data. The tera-bytes size...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2015

    Big Data Visualization: Turning Big Data Into Big Perceptions

    In this paper, the authors provide valuable information about visualization-based data discovery tools and how they can help IT decision-makers derive more value from big data. Topics include: an overview of the IT landscape and the challenges that are leading more businesses to look for alternatives to traditional business intelligence...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2015

    TARF: Trust-Aware Routing Framework for WSNs

    Wireless sensor networks are vulnerable to a wide set of security attacks, including those targeting the routing protocol functionality. The multi-hop routing in Wireless Sensor Networks (WSNs) offers little protection against identity deception through replaying routing information. An adversary can exploit this defect to launch various harmful or even devastating...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2015

    Optimized Energy Efficient and Target Tracking Technique in Wireless Sensor Network

    In the development of various large-scale sensor systems, a particularly challenging problem is how to dynamically organize the sensors into a wireless communication network and route sensed information from the field sensors to a target system. Recently, the research focus on energy harvesting routing, a promising routing scheme in Wireless...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2015

    Forwarding Node Path Selection Scheme for Prolong Network Lifetimein Wireless Sensor Network

    Several anomalies can occur in wireless sensor networks that impair their desired functionalities i.e., sensing and communication. Different kinds of holes can form in such networks creating geographically correlated problem areas. Hole problem is a crucial issue in Wireless Sensor Network (WSN). Nodes near the sink region will die sooner...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2015

    Route Discovery Considering with High Link Stability Neighbor in MANET

    In this paper, the authors present a complete study on the routing discovery considering with high link stability neighbors in MANET. A fundamental issue arising in Mobile Ad hoc NETworks (MANETs) is the selection of the optimal path between any two nodes. Ensuring a data path to be valid for...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2015

    A New Route Selection Strategy for Multipath Routing in MANET

    In MANET, to maintain energy efficiency and load aware technique based routing mechanism get significant role for discovering routes during data transmission. Now-a-days, Smartphones and latest communication devices are play vital role in communication technology. These devices are battery-operated, so it is essential to maintain the energy power and load...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2015

    Extract, Transform, and LoadBig Data with Apache Hadoop

    Over the last few years, organizations across public and private sectors have made a strategic decision to turn big data into competitive advantage. The challenge of extracting value from big data is similar in many ways to the age-old problem of distilling business intelligence from transactional data. At the heart...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2015

    Customer Relationship Management Token Tacking System

    In this paper, the authors present the customer relationship management. It solves the complaints of the customer and their online product. Suppose there is 'N' number of customers and they are going to give complaints, then each complaint will be verified as per its priority and then it is going...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2015

    Real-Time Bluetooth Communication Between an FPGA Based Embedded System and an Android Phone

    Today, with the rapid increment of automatic control technology, embedded system technology and Smartphone has become many people's primary personal computing device due to their vast mobility, low cost and vast capabilities. This paper presents the design and implementation of a Bluetooth connection between FPGA-based embedded system and Smartphone, running...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2015

    Design of Novel Reversible Logic Circuits Using Pseudo Reed-Muller Expression

    Reversible logic is became a very promising logic for low power in emerging computing technologies. Reversible logic found applications in ultra-low power green computing, quantum computing, nanotechnology, optical computing, Quantum-dot Cellular Automata (QCA) and dissipation less computing. In the reversible logic there is a one to one mapping between the...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2015

    FPGA Baesd Design of BCH Decoder for Error Correction in Wireless Communication

    It is really become very difficult to provide an error free secure communication during transmission applications. Normally the complexity of decoder is much more than that of encoder. In this paper, a BCH decoder is proposed for (63 and 36) BCH code that is able to correct error up to...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2015

    VLSI Implementation of Adaptive Edge Enhanced Image Scalar Using ETA Adder

    A low complexity adaptive edge enhanced algorithm will be used for the implementation of 2D-image scaling application. It consists of linear space variant edge detector, a low complexity sharpening spatial filter and a simplified bilinear interpolation. The adaptive technology is used to enhance the effect of the edge detector by...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2014

    A Topic Model Approach Towards Contextual Advertisement Mining

    Online contextual advertisement has a great advantage over internet services, and has major role in shaping the web economy. Contextual advertising is a type of online advertising in which the commercial textual advertisement is placed within a web page based on the relevance of the advertisements to the page content....

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2014

    Improving Cluster Quality for Prediction of User Behaviors Using CTMSP Mining

    Increasing popularity of wireless technology leads to research in mining and prediction of mobile movements and associated transactions. Discovery of mobile patterns from logs may not be precise enough for predictions since the varying mobile behaviors among users and temporal periods are not considered. In this paper, Hubert's gamma statistics...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2014

    Multiple Linear Regression in Data Mining

    From a statistical perspective data mining can be viewed as computer automated exploratory data analysis of large complex data sets. Despite the obvious connections between data mining and statistical data analysis, most of the methodologies used in data mining have so far originated in fields other than statistics. This paper...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2014

    Review On: Content Extraction Through Web Mining & Hidden Web Mining

    Web mining is the application of data mining techniques to extract useful knowledge from web data, including web pages, hyperlinks between documents, usage logs of web sites & web pages, etc. This paper focus on three different categories of web mining - web content mining, web structure mining and web...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2014

    An Intuitionistic Fuzzy C-Means Clustering Algorithm with Point Symmetry Distance Measure

    Clustering is a fundamental problem in data mining with innumerable applications spanning many fields. In organize to scientifically recognize clusters in a data set, it is typically essential to initial describe a measure of resemblance or nearness which will set up a rule for transmission patterns to the area of...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2014

    A Review of Data Structures Used in Finding Frequent Itemsets Quickly

    In databases or data warehouse records the relevance between interesting mutual relationships amongst the attributes has gained a lot of focus now-a-days. The main research in this area is the Mining of association rules. To mine the association rules, it is important to generate the frequent itemsets. The efficiency of...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2014

    Grid Topology Based Performance Analysis of TCP Variants with Routing Protocol

    TCP is being used as a highly reliable end-to-end protocol for transporting applications. TCP was originally designed for wired links where the error rate is really low and actually assumed that packet losses are due to congestion in the network. But TCP performance in wireless networks suffers from significant throughput...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2014

    Different Approaches to Construct Collaborative Environment and Real Time Collaborative Editing

    A collaborative system is one where multiple users or agents engage in a shared activity, usually from remote locations. In the larger family of distributed applications, collaborative systems are distinguished by the fact that the agents in the system are working together towards a common goal and have a critical...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2014

    Reconfigurable Efficient Design of BCH Encoder for Communication Systems

    In this paper, the authors propose a design and FPGA implementation of SISO BCH encoder. FPGA's are reprogrammable and they require shorter testing and debugging times, thus making them increasingly popular for rapid hardware prototyping. Reconfigurable systems also offer the potential of accelerating or speeding up the algorithms to be...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2014

    Blackhole Attack Putting into Practice in AODV Routing Protocol

    An ad hoc network is the network with no fixed infrastructure. There is no central administrator so any node can come and move in and outside of the network in a dynamic manner. Because of security vulnerabilities of the routing protocols, wireless ad hoc networks may be unprotected against attacks...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2014

    Classification of TCP Variants Inside Wireless Networks

    TCP is transmission control protocol in TCP/IP protocol suite which provides end to end, connection-oriented and reliable packet delivery services in computer network. TCP provides services to both wired and wireless networks. The performance of TCP in wired network is optimized. While in wireless network the nodes are dynamic in...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2014

    Sybil Attack Detection in MANET

    In this paper, the authors propose a scheme to detect the mobile identities of Sybil attackers in urban or congested areas. Fully self-organized Mobile Ad hoc NETworks (MANETs) represent complex distributed systems. Due to the complex nature of MANETs and its resource constraint nodes, there has always been a need...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2014

    Two Phase Watermarking for Security in Database

    Digital multimedia watermarking technology had suggested in the last decade to embed copyright information in digital objects such as images, audio and video. However, the increasing use of relational database systems in many real-life applications created an ever-increasing need for watermarking database systems. As a result, watermarking relational database systems...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2014

    Review Study of Behavioural Biometric Techniques for User Authentication

    Most of the existing authentication system has certain drawbacks for that reason graphical passwords are more suitable authentication system where users click on images to authenticate themselves. A necessary usable goal of an authentication system is to support users for selecting the better password. User creates unforgettable password which is...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2014

    Implementation and Analysis of WiMAX Module for Reactive and Proactive Routing Protocols under ns2

    Today the world is moving towards wireless system. Wireless networks are gaining popularity to its peak today, as the users want wireless connectivity irrespective of their geographic position WiMAX are considered to be the special application of infrastructure-less wireless Mobile Ad-hoc NETwork (MANET). In these networks, the speed of the...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2014

    Temporal Association Rule Mining in Soft Computing Framework: A Survey

    In this paper, the authors provide a survey of association rule mining in soft computing framework especially in fuzzy genetic paradigm based on temporal behavior of the transactions. Soft computing tools and its hybridization provides a great potential to come up with rules with greater confidence value than the apriori...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    Indoor Location Determination by Using RFIDs

    With the Growing usage of smart software that uses the location information, automatic location sensing became a necessity in everyday life. There is the Global Positioning System (GPS) which is a satellite based navigation system made up of a network of 24 satellites placed into orbit. GPS is widely used...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    Routing in Manets

    A Mobile Ad-hoc NETwork is a collection of mobile nodes forming an ad-hoc network without the assistance of any centralized structures. These networks introduced a new art of network establishment and can be well suited for an environment where either the infrastructure is lost or where deploying an infrastructure is...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    Connectivity-Based Localization Schema for Wireless Sensor Network

    In this paper, the author examines localization error will be minimal after adjusting the radio range of beacons' and error performance tradeoffs. Anchor based-range-free schema for Wireless Sensor Network. Localization algorithms are different in different network environments. His work is to find out an efficient localization algorithm for Wireless Sensor...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    A CDMA Cellular Network Base Station Distributed Closed-Loop Power Control Algorithm Based on Sixteen-Iterations

    All users transmit on the same frequency and time and utilize the entire bandwidth in CDMA compared to TDMA or FDMA. Even though CDMA provides more capacity and better QoS, the capacity is affected by the near-far problem which degrades the performance of users far away from the BSs. It...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    On Dynamic Configurability and Adaptability of Intelligent Tags with Handheld Mobile Devices

    The availability of unlicensed spectrum coupled with the increasing popularity of wireless communication has given rise to wide range of wireless technologies. The overwhelming success of mobile devices and wireless communications is stressing the need for the development of wireless mobile application services. Device mobility requires services adapting their behavior...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    Hiding Text in Audio Cover with the High Capacity and Security Using Multiple LSBs

    Stenography is an art of embedding hidden data or secret messages over a public channel so third party cannot detect the presence of secret messages. In this stenography method of embedding textual information in an audio file, a proposed technique is first audio sampled and then appropriate bit of each...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    Architecture of Data Warehouse ETL Tools- Performing Efficient and Effective Way

    Data warehousing has been a buzz word in the industry since mid 90's, but it was not wide spread due to be complex timing and maintenance. Business and technologies are now wider and wider so in modern technologies users cannot think in any organization without data warehouse. Data warehouse helps...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    Wi-MAX Security Enhancement and Solution for Authentication Against Man-in-the-Middle Attack

    The paper presents security enhancement of Worldwide Interoperability for Microwave Access (WiMAX) for authentication frame work in IEEE 802.16 against man-in-the-middle attack. This gives secure authentication of legitimate Mobile Station (MS) and protects man-in-the-middle attack. To prevent this kind of attack and to make the authentication more secure, a Hash-Random...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    Stability of Feedback Based LNA Topologies for UWB Communication

    Since the U.S. Federal Communications Commission (FCC) approved the application of Ultra Wide-Band (UWB) technology for commercial use in early 2002, ranging from 3.1 to 10.6 GHz (bandwidth: 7.5 GHz), the implementation of a UWB system and its sub-blocks has been a challenge for Integrated Circuit (IC) designers. In this...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    Gallium Nitride-Based RF Power Amplifiers for Future Wireless Communication Systems

    Radio Frequency (RF) High Power Amplifiers (PAs) received increasing attention as key components responsible for a sizable portion of base station cost (power loss and cooling equipment) in wireless communication systems. Thus, high power and high efficiency amplifiers with low power loss are critically needed. To meet these requirements, higher...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    VLSI Based Wireless Sensor Network For Signal Classification

    The tremendous increase in the Wireless Sensor Network (WSN) in the last decade has increased the potential applications including environment monitoring, smart spaces, medical systems, and robotics exploration. Sensors integrated into structures, machinery, and the environment has led to fewer catastrophic failures, conservation of natural resources, improved manufacturing productivity, improved...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Spectral Entropy Based VAD Using Teager Energy Operator and HOS

    In this paper, the authors presents Voice Activity Detection (VAD) algorithm for detecting voice in noisy environments. The presented robust VAD utilizes the Spectral Entropy (SE) with Teager Energy Operator (TEO) to provide a better representation of formant information resulting in high performance of classification of speech/non-speech priori to entropy...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Survey Report on Implementation of Optimized Cryptographic Algorithm

    Cryptography has a long and fascinating history. Over the centuries, an elaborate set of protocols and mechanisms has been created to deal with information security issues when the information is conveyed by physical documents. Cryptographic algorithms are widely used in Internet Systems. Applications of cryptographic algorithms include credentials establishment i.e....

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    An Online Strategy Proof Mechanism for Dynamic Spectrum Allocation in Cognitive Radios

    With the ever-increasing and dramatic development of wireless networks and mobile technologies the scarcity of spectrum in the spectrum market has been a natural phenomenon over the last few years. The challenge is taken up in the cognitive radio technologies to alleviate this scarcity by managing and efficiently redistributing the...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    A Survey of Security Issues in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are becoming very attractive for both telecommunication and network industry. WSNs are a most challenging and emerging technology for the research due to their vital scope in the field coupled with their low processing power and associated low energy. Today Wireless Sensor Networks are broadly used...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    Data Acquisition and Delivery in Traffic Monitoring VANETs Joint Optimization

    Vehicular Ad-hoc NETworks (VANETs) are envisaged to become a flexible platform for monitoring road traffic, which will gradually replace more cumbersome fixed sensor deployments. The efficacy of vehicle-assisted traffic monitoring systems depends on the freshness of traffic data that they can deliver to users, and the bandwidth used to do...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    Remote Monitoring & Control of Wireless Sensor Network Using Smart Phone

    In this paper, the authors describe the design of a Wireless Sensor Network based on ZigBee technology. It is mainly used for collecting and transferring the various monitoring information about the coal mine underground with the help of WSN. Then the data will be analyzed and processed in the monitoring...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    Embedded Based Finger Print Recognition System For Time and Attendance

    The main objective of this paper is to develop an embedded system, which will record the time and attendance of an employee in an organization and send monthly record of employee's work hours to organization using finger print recognition module which is interfaced with microcontroller. Whenever the employee enters the...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jun 2012

    ARM Based Vehicle Tracking and Security Using GPS and GSM

    A low cost GPS and GSM based vehicle tracking system is developed using ARM processor for real time application. The main core of the system is an embedded hardware along with embedded C compiler. GPS gives the location of the vehicle and also embedded device communicates with GSM network which...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    MANET Based Emergency Communication Module for Post Disaster Recovery

    In recent years, the world has experienced a number of catastrophic natural disasters such as earthquake, hurricane, typhoon, tsunami, etc. The victims trapped in the collapsed buildings and landslides will have a great chance of survival in case the rescue team reaches for help in a short period of time....

    Provided By International forum of researchers Students and Academician

  • White Papers // Jun 2012

    Verilog Implementation of Elliptic Curve Cryptosystem (ECC)

    Data Encryption is widely used to ensure security in open networks such as the internet with the fast development of cryptography research and computer technology. The capabilities of cryptosystems such as of RSA & Diffie-Hellman are inadequate due the requirement of large number of bits. The cryptosystem based on Elliptic...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jun 2012

    Implementation of Software-Defined Radio Using Lab VIEW

    A software-defined radio consists of a programmable communication system where functional changes can be made by merely updating software. In this paper, a software-defined radio 4-QAM (Quadrature Amplitude Modulation) modem system is implemented in LabVIEW. LabVIEW is a widely used graphical programming environment which allows designing systems in an intuitive...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jun 2012

    Off-Line Signature Verification and Recognition

    Signatures are composed of special characters and flourishes and therefore most of the time they can be unreadable. Also intrapersonal variations and interpersonal differences make it necessary to analyze them as complete images and not as letters and words put together. As signatures are the primary mechanism both for authentication...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    Link Failure Tolerance by Path Restoration

    Due to channel interference, dynamic obstacles and/or applications' bandwidth demands multi-hop Wireless Mesh Networks (WMNs) experience frequent link failures. This results performance degradation in WMNs and require expensive, manual network management for their real-time recovery. Herewith the authors present an Autonomous network Reconfiguration System (ARS) that enables a multi-radio WMN...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    Comparative Study for Quadruple Tank Process with Coefficient Diagram Method

    In this paper, a new decoupler method using Coefficient Diagram Method (CDM) for quadruple tank process is proposed. It consists of four inter connected water tanks and two pumps. The major problem in a multivariable process is that the loop interaction may arise and cause difficulty in feedback control design....

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    A Review on RFID Data Cleaning Problem Using Data Mining Tools

    The data stream produced by RFID reader is sometimes inaccurate. As a result there is a big load of unreliable data which is useless for higher level processing. Therefore the authors need to clean this unreliable data which they sometimes call dirty data. Dirty data appears in three reading errors...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    Vehicular Traffic Surveillance Using Multiple Methodology

    Digital image processing is the use of computer algorithms to perform image processing on digital images. As a subcategory or field of digital signal processing, digital image processing has many advantages and applications. One of the applications of digital image processing is for traffic analysis. In literature survey found that...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2013

    Monitoring & Detecting the Application Layer DDOS Attacks that Affects Popular Websites

    One of the major threats for the Internet's reliability and stability is Distributed Denial-Of-Service (DDOS) attack. The attackers are becoming more sophisticated and organized; also several high-profile attacks targeted prominent websites. These are the prime reasons that gained importance for the study of DDOS attack detection and prevention. It becomes...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2012

    Improving the Atmospheric Delay Effects on the Received Global Positioning System Signals

    There are several error sources that cause the estimated position and time measuring from Global Positioning System (GPS) receivers to be inaccurate. The most significant error sources are the satellite clock drifts, mismodeling of gravitational and non-gravitational forces in combining the orbits, geometry of the satellites, ionospheric and tropospheric atmospheric...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2012

    Techniques to Improve Performance of VoIP Over 802.11e WLAN

    Voice over Internet Protocol is an important service with strict quality of requirements in Wireless Local Area Network (WLANs). The IEEE 802.11e standard has been introduced recently for providing Quality of Service (QoS) capabilities in the emerging Wireless Local Area Networks. This 802.11e introduces a contention window based that is...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2012

    Load Balancing in Wireless Mobile AD HOC Networks

    Ad hoc networks consist of a set of homogeneous nodes (computers or embedded devices) that move in an independent fashion and communicate with the other node in the topology over a wireless channel. Such networks are logically realized as a set of clusters by grouping together. Nodes which are in...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2012

    Distributed DACS Based on Low Cost Internet Controlled Embedded Servers

    Now-a-days everyone using many networked embedded systems for monitoring and control the home or industrial devices. With the scalable networking solution, the server enables web access to distributed measurement/control systems and provides optimization for educational laboratories, instrumentation, industrial and home automation. In this paper, the authors present the principles and...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2012

    Identification of Web User Sessions using Clustering Technique

    The common definition of a user-session is given by a period of time during which the user is generating traffic in internet a user-session is then terminated by a "Long" inactivity period. Within an activity period, many TCP connections may be used to transfer data. Unfortunately, the identification of active...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2012

    Multi-Copy: Routing Efficiently in Intermittently Connected Mobile Networks

    Intermittently connected mobile networks are wireless networks where most of the time there does not exist complete path from the source to the destination. There are many real networks that follow this model, for example, wildlife tracking sensor networks, military networks, vehicular ad hoc networks, etc. In this paper, conventional...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2012

    Analysis of BER in BPSK and GMSK Employing Different Coding

    In this paper, BPSK and GMSK communication system model using AWGN channel and different coding and decoding is analyzed. In the paper performance of BPSK using Convolutional coding and viterbi decoding is compared to GMSK uncoded and GMSK employing Reed Solomon coding. The simulation shows that GMSK using Reed Solomon...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    A Proposed Architecture for Agent Communication Manager in Mobile Ad-hoc Network

    In this paper, the authors are going to introduce the proposed architecture for agent communication manager in MANETS. Here they are introducing a manager for agent communication that support the dynamic as well the static infrastructure according to the nature of the problem. The architecture proposed by them consists of...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    Realization of the SISO Architecture for Downlink Data Channels of 3GPP-LTE Using PlanAhead Tool and Virtex-5 Device

    Long Term Evolution (LTE) of UMTS Terrestrial Radio Access and Radio Access Network is a Fourth Generation wireless broadband technology which is capable of providing backward compatibility with 2G and 3G technologies. As compared with other promises LTE is able to deliver high data rate and low latency with reduced...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2011

    Comparative Study Of Cross Domain Models in Sentiment Mining

    Sentiment mining is the application of text mining to infer the sentiment expressed in a piece of text about a chosen target. Sentiment mining or opinion mining refers to the application of natural language processing, computational linguistics, and text analytics to identify and extract subjective information in source materials. Generally...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    A Nodal Relational Approach to Database Virtualization

    Virtualization has become a necessarily in today's IT world. Virtualization has successfully reduced the problems like space, time taken in setting up the environments and Green IT problems. But there are certain issues which need to be focused on virtual environments. One of the most important issues is performance. This...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    An Approach on Privacy Preserving Data Mining Based on Fuzzy C-Means

    Extracting information from an existing data warehouse and transforming it to a human understandable form for further use is the main objective of data mining. The data mining process does not enclose, any security any person can repossess the information from the data warehouse. The data are categorized in the...

    Provided By International forum of researchers Students and Academician