International forum of researchers Students and Academician

Displaying 1-40 of 553 results

  • White Papers // Nov 2014

    A Topic Model Approach Towards Contextual Advertisement Mining

    Online contextual advertisement has a great advantage over internet services, and has major role in shaping the web economy. Contextual advertising is a type of online advertising in which the commercial textual advertisement is placed within a web page based on the relevance of the advertisements to the page content....

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2014

    Improving Cluster Quality for Prediction of User Behaviors Using CTMSP Mining

    Increasing popularity of wireless technology leads to research in mining and prediction of mobile movements and associated transactions. Discovery of mobile patterns from logs may not be precise enough for predictions since the varying mobile behaviors among users and temporal periods are not considered. In this paper, Hubert's gamma statistics...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2014

    Multiple Linear Regression in Data Mining

    From a statistical perspective data mining can be viewed as computer automated exploratory data analysis of large complex data sets. Despite the obvious connections between data mining and statistical data analysis, most of the methodologies used in data mining have so far originated in fields other than statistics. This paper...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2014

    Review On: Content Extraction Through Web Mining & Hidden Web Mining

    Web mining is the application of data mining techniques to extract useful knowledge from web data, including web pages, hyperlinks between documents, usage logs of web sites & web pages, etc. This paper focus on three different categories of web mining - web content mining, web structure mining and web...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2014

    An Intuitionistic Fuzzy C-Means Clustering Algorithm with Point Symmetry Distance Measure

    Clustering is a fundamental problem in data mining with innumerable applications spanning many fields. In organize to scientifically recognize clusters in a data set, it is typically essential to initial describe a measure of resemblance or nearness which will set up a rule for transmission patterns to the area of...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2014

    A Review of Data Structures Used in Finding Frequent Itemsets Quickly

    In databases or data warehouse records the relevance between interesting mutual relationships amongst the attributes has gained a lot of focus now-a-days. The main research in this area is the Mining of association rules. To mine the association rules, it is important to generate the frequent itemsets. The efficiency of...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2014

    Grid Topology Based Performance Analysis of TCP Variants with Routing Protocol

    TCP is being used as a highly reliable end-to-end protocol for transporting applications. TCP was originally designed for wired links where the error rate is really low and actually assumed that packet losses are due to congestion in the network. But TCP performance in wireless networks suffers from significant throughput...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2014

    Different Approaches to Construct Collaborative Environment and Real Time Collaborative Editing

    A collaborative system is one where multiple users or agents engage in a shared activity, usually from remote locations. In the larger family of distributed applications, collaborative systems are distinguished by the fact that the agents in the system are working together towards a common goal and have a critical...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2014

    Reconfigurable Efficient Design of BCH Encoder for Communication Systems

    In this paper, the authors propose a design and FPGA implementation of SISO BCH encoder. FPGA's are reprogrammable and they require shorter testing and debugging times, thus making them increasingly popular for rapid hardware prototyping. Reconfigurable systems also offer the potential of accelerating or speeding up the algorithms to be...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2014

    Blackhole Attack Putting into Practice in AODV Routing Protocol

    An ad hoc network is the network with no fixed infrastructure. There is no central administrator so any node can come and move in and outside of the network in a dynamic manner. Because of security vulnerabilities of the routing protocols, wireless ad hoc networks may be unprotected against attacks...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2014

    Classification of TCP Variants Inside Wireless Networks

    TCP is transmission control protocol in TCP/IP protocol suite which provides end to end, connection-oriented and reliable packet delivery services in computer network. TCP provides services to both wired and wireless networks. The performance of TCP in wired network is optimized. While in wireless network the nodes are dynamic in...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2014

    Sybil Attack Detection in MANET

    In this paper, the authors propose a scheme to detect the mobile identities of Sybil attackers in urban or congested areas. Fully self-organized Mobile Ad hoc NETworks (MANETs) represent complex distributed systems. Due to the complex nature of MANETs and its resource constraint nodes, there has always been a need...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2014

    Two Phase Watermarking for Security in Database

    Digital multimedia watermarking technology had suggested in the last decade to embed copyright information in digital objects such as images, audio and video. However, the increasing use of relational database systems in many real-life applications created an ever-increasing need for watermarking database systems. As a result, watermarking relational database systems...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2014

    Review Study of Behavioural Biometric Techniques for User Authentication

    Most of the existing authentication system has certain drawbacks for that reason graphical passwords are more suitable authentication system where users click on images to authenticate themselves. A necessary usable goal of an authentication system is to support users for selecting the better password. User creates unforgettable password which is...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2014

    Implementation and Analysis of WiMAX Module for Reactive and Proactive Routing Protocols under ns2

    Today the world is moving towards wireless system. Wireless networks are gaining popularity to its peak today, as the users want wireless connectivity irrespective of their geographic position WiMAX are considered to be the special application of infrastructure-less wireless Mobile Ad-hoc NETwork (MANET). In these networks, the speed of the...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2014

    Temporal Association Rule Mining in Soft Computing Framework: A Survey

    In this paper, the authors provide a survey of association rule mining in soft computing framework especially in fuzzy genetic paradigm based on temporal behavior of the transactions. Soft computing tools and its hybridization provides a great potential to come up with rules with greater confidence value than the apriori...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2014

    Developing a Teaching Methodology in the Time of Life of Cloud Computing

    The cloud has become a widely used term in academia and the industry. Education has not remained unaware of this trend, and several educational solutions based on cloud technologies are already in place, especially for software as a service cloud. However, an evaluation of the educational potential of infrastructure and...

    Provided By International forum of researchers Students and Academician

  • White Papers // Sep 2014

    Temperature Sensing based on Industrial automation by using Zigbee and Infrared

    Any object will produce infrared radiation when its temperature is above absolute zero. The intensity of the infrared radiant energy emitted by the object and its temperature is proportional. The temperature of the object is stronger than the energy of the infrared radiation emitted. In the industrial field, long running...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2014

    Survey on Clustering, Classification and Frequent Item-Sets with Its Applications

    Data mining is having techniques like clustering, classification and algorithm like frequent itemset mining algorithms. In this paper, the authors discuss about clustering and classification techniques with its applications and frequent itemset mining algorithm with its applications. Cluster is the process for set of objects in cluster that objects are...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2014

    Dimensionality Reduction in Web Page Classification

    Internet provides millions of web pages for each and every search term and it is a powerful medium for communication between computers and accessing online documents but tools like search engines assist users in locating and organizing information. Web page classification is one of the essential techniques for web mining...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2014

    A Novel Framework for Inductive Learning From Imbalanced Data Sets Using Uniform-Sampling

    The class imbalance situations, where one class is rare compared to the other, arise frequently in machine learning applications. Unbalanced dataset learning is a new paradigm of machine learning which has applicability in real time, since all the datasets of real time are of unbalanced in nature. Researchers have rigorously...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2014

    Classification of Criminal Data Using J48-Decision Tree Algorithm

    In recent years, amount of crime has become a serious problem in most of the countries. Now-a-days, criminals have maximum use of modern technologies to commit the crime and investigators on the other hand are still using traditional manual processes, for example First Information Report (FIR) to analyze the suspect...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2014

    A Fast Fuzzy Based Unsupervised Classification: Using D & C Approach for Mixed Large Data Attributes

    The clustering or unsupervised classification has variety of requirements in which the major one is the capability of the chosen clustering approach to deal with scalability and to handle with the mixed variety of data set. The present scenario of variety of latest approaches of unsupervised classification are swarm optimization...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2014

    Unsupervised Classification with Entropy Approach Using D & C Approach For Mixed Data Type Attributes

    The grouping or unsupervised classification has variety of demands in which the major one is the capability of the chosen clustering approach to deal with scalability and to handle with the mixed variety of data set. There are variety of data sets like categorical/nominal, ordinal, binary (symmetric or asymmetric), ratio...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2014

    Role of Concept Based Mining Model in Enhancing Web Document Clustering

    Existing text mining techniques captures the importance of a term (word or phrase) using term frequency at document level only. The text mining techniques should capture the meaning or semantics of a text also. In this paper, a new concept-based mining system is introduced which analyzes the terms on sentence,...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2014

    A Novel Secure Watermarking Scheme for RDBMS

    Database watermarking is to generate robust and persistent watermark for database. Watermarking for relational databases emerged as a vital solution to provide copyright protection, tamper detection and to maintain the integrity of data. An important area such as payroll, inventory, students' marks, defense and finance requires reliable scheme for checking...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2014

    Impact of Data Mining Technology in E-Commerce Environment

    Internet has grown so vast these days and brought so many opportunities in the field of business and has become the cause of development of enterprises. Web information mining has become vital in the status of e-commerce websites. The data mining helps in deciding the development factor of the organizations....

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2014

    Comparative Study of Different PAPR Reduction Techniques of OFDM

    Orthogonal Frequency Division Multiplexing (OFDM) is considered to be a promising technique against the multipath fading channel for wireless communications. However, the main drawback of OFDM system is the high Peak to Average Power Ratio (PAPR) of the transmitted signals system which leads to power inefficiency in RF section of...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2014

    Evaluation of Dynamic Routing Protocols with Packet Tracer: RIP and EIGRP

    In this paper, performance analysis of the wired computer networks for combination of conventional model of RIP and EIGRP is evaluated through simulation which has been attempted using packet tracer as simulating tool. The Routing Information Protocol (RIP) is one of the first widely used routing protocols. RIP takes the...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2014

    Routing Metrics and Global Load Balancing Mechanism In Wireless Sensor Networks

    Wireless sensor networks have received increasing attention in the recent few years. In many military and civil applications of sensor networks, sensors are constrained in onboard energy supply and are left unattended. Wireless Sensor Networks (WSNs) require appropriate protocols that make judicious use of the finite energy resources of the...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2014

    Security and Quality of Service Improvement In Wireless Sensor Networks

    A Wireless Sensor Network (WSN) is a group of sensors that are geographically distributed and interconnected by wireless networks. There exists a tradeoff in the form of security issues such as data integrity, confidentiality, and freshness in data aggregation that increase manifold when the WSN is deployed in a remote...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2014

    Hierarchical Clustering Approach to Reduce Message Collision in Wireless Mesh Network

    Wireless Mesh Networks (WMNs) is part of ad-hoc network. WMNs are undergoing rapid progress and inspiring numerous applications. In this paper, the authors are working on path selection protocol of WMNs. The path selection protocol has various issues like power consumption, congestion control, and load balance and message collision. Here,...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2014

    An Effective Approach to Improvise the Lifetime of Network by almost Delaunay Triangulation

    Wireless Sensor Networks (WSNs) gained its limelight because of the usage of low-cost and communicable intelligent sensors. When the nodes begin to communicate with each other, obviously the energy level drops out, since the battery backup is limited. This is a critical issue needs to be handled. The authors propose...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2014

    A Study on Adaptive Position Update for Geographic Routing in Manets

    In geographic routing, nodes need to maintain up-to-date positions of their immediate neighbors for making effective forwarding decisions. Periodic broadcasting of beacon packets that contain the geographic location of the nodes is a popular method used by most geographic routing protocols to maintain neighbor positions. A node transmits its next...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2014

    A Survey of Mobile Cloud Computing (MCC): Applications and Security Issues

    Even though increasing usage of mobile computing, misusing its full potential is difficult due to its essential problems such as insufficiency of resources, regular interruptions, and mobility. Mobile cloud computing can address these problems by executing mobile applications on resource providers outside to the mobile device, Together with an explosive...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2014

    Implementation and Performance Analysis of Mobile Cloud Computing Based on Java and Cloud Analyst

    Cloud computing is recognized as a revolution in the computing area. As predicted by the researcher, mobile phones will overtake PCs as the most common web access devices worldwide by 2013. Due to the increase of mobile network infrastructures, they are becoming popular clients to use web resources and especially...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2014

    Accessing Cloud Storage by Group Members with Secure Dynamic User Registration and Revocation

    Cloud computing is one of the computing concepts that involves a large number of computers connected through a real-time communication network such as the Internet. Using cloud storage, users can remotely store their data and enjoy the on-demand high-quality applications and services from a shared pool of configurable computing storage,...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2014

    Secured Mobility Controlled Java-Centric Architecture for Industrial Systems

    Java mobile agent has been seen as a promising distributed computing technology. The mobility characteristic of mobile agent helps the Java Mobile Agent (JMA) to travel in open network. The Java mobile agent platform is the most trusted environment for Java mobile agent which provides the computational environment for Java...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2014

    Hiding Images and Video inside Video using Message Dependent Key Based Encryption and Entropy Based Hiding

    Data hiding method for videos with high security and maximum payload utilization is proposed. The method hides video clip and/or multiple images inside a high resolution video. Before hidden message data is encrypted using a unique algorithm that uses the help of message itself to generate the key for encryption....

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2014

    Distributed Multi-Path Finding Algorithm For Energy Efficient Distributed Routing Scheme

    Energy inefficiencies in current networks provide both challenges and opportunities for energy saving. Recently, here are many works focusing on minimizing energy cost from the routing perspective. However, most existing paper views them as optimization problems and solves them in a centralized manner such as with a solver or using...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    Integer Wavelet Based Steganographic Model by Selecting Variable Bit Length

    To enhance the embedding capacity of image steganography and provide an Imperceptible stego-image for human vision, an integer wavelet based data hiding with variable bit length substitution method employing secret-key is proposed in this paper. The new technique embeds binary bit stream in 8-bit color image (RGB channel). The technique...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    A Novel Technique to Secure Communication Using Chaos Generated by Non-Linear Circuits

    Secure communication is effected by encoding and decoding a simple message using chaotic non-linear circuits. A Non Linear Circuit is designed for generating the chaos in its output voltage. Time evolutions of generated chaos are studied with respect to two of the operating parameters of the circuit. Chaotic regimes of...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    Dynamic Evaluation Model for Threshold Cryptography in MANETS

    A Mobile Ad hoc NETwork (MANET) is a collection of low-power, wireless, mobile nodes forming a temporary network without the aid of any established infrastructure or centralized administration. In comparison with traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure instead hosts rely on each...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    An Implementation of Multi-Path Dynamic Routing for Computing and Constrained Mobile Ad-Hoc Network Environment

    Wireless mobile ad-hoc networks are classified as networks where nodes are logically connected with each other. These types of networks do not have fixed topology due to the mobility property of nodes, interference, propagation and loss of path. Hence a dynamic source routing protocol is required for these networks to...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    A Survey on Unicast and Multicast Routing Protocols for Mobile Ad-Hoc Networks

    A Mobile Ad-hoc NETwork (MANET) is a self-configuring network composed of mobile nodes without any fixed infrastructure. In a MANETs, there are no difference between a host node and a router so that all nodes can be source as well as forwarders of traffic. Moreover, all MANET components can be...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    Intrusion Detection System in Ad-Hoc Network

    Intrusion detection prevention measures, such as encryption and authentication can be used in ad-hoc networks to reduce intrusions but cannot eliminate them. For example, encryption and authentication cannot defend against compromised mobile nodes, which often carry private keys. Integrity validation using redundant information (from different nodes), such as those being...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    A Novel Approach for Efficient Delay Tolerant Networks Using Conditional Shortest Path Routing

    This paper deals with Delay Tolerant Networks (DTNs) where each node knows the probabilistic distribution of contacts with other nodes. Delay tolerant networks are characterized by the sporadic connectivity between their nodes and therefore the lack of stable end-to-end paths from source to destination. Since the future node connections are...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    Improving Network Processing Technique in Internet Controlled Embedded Systems

    The RTCS Embedded Internet stack provides IP networking for the MQX platform. RTCS is provided with a rich assortment of TCP/IP networking application protocols and uses the MQX RTOS drivers for Ethernet or serial connectivity. RTCS is tightly integrated with the latest ColdFire and Power Architecture processors from Freescale and...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    Secure Usability Design System for User Authentication

    The term usable authentication is been brought about as a result of issues surrounding user memorabiilty. Computer users find it less easy to memorize plain text password compared to images or graphics. Researchers have over the years presented several authentication schemes in an effort to provide users with a usable...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    Performance Evaluation of Different Level Modulation Schemes for an Efficient Mobile WiMAX System in OFDM Under Rayleigh Fading and AWGN Channel

    Mobile WiMAX technology has become one of the fastest growing arenas of internet accessing in the people modern daily life. WiMAX is introduced by the Institute of Electrical and Electronic Engineers (IEEE) to provide a worldwide interoperability for microwave access. IEEE 802.16e-2005 has been developed for mobile wireless communication which...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    Dynamic Path Optimization CBET Technique Using for MANETS

    Efficient scheduling of processes on processors of a Network Of Workstations (NOW) is essential for good system performance. However, the design of such schedulers is challenging because of the complex interaction between several system and workload parameters. Co-scheduling, though desirable, is impractical for such a loosely coupled environment. Two operations,...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    Optimized Routing Algorithm for Congestion Control in Wireless Sensor Networks

    The previous routing approaches like Purely Random Propagation (PRP), Non-Repetitive purely Random Propagation (NRRP), Directed Random Propagation (DRP) perform the routing of packets without considering congestion might occur. When the intermediate nodes receive a huge amount of packets they directly drop the packets. The second problem is that there will...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    Route Handoff Using Channel Aware Routing Protocol in MANETs

    A Mobile Ad-hoc NETwork (MANETs) is a spontaneous network that can be established with no fixed infrastructure. Mobile ad-hoc networks are characterized by multi-hop wireless links and absence of any cellular infrastructure. Transmissions of packets are impaired by radio link fluctuations. Thus, in this paper an enhanced, channel aware routing...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    Connectivity-Based Localization Schema for Wireless Sensor Network

    In this paper, the author examines localization error will be minimal after adjusting the radio range of beacons' and error performance tradeoffs. Anchor based-range-free schema for Wireless Sensor Network. Localization algorithms are different in different network environments. His work is to find out an efficient localization algorithm for Wireless Sensor...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    A CDMA Cellular Network Base Station Distributed Closed-Loop Power Control Algorithm Based on Sixteen-Iterations

    All users transmit on the same frequency and time and utilize the entire bandwidth in CDMA compared to TDMA or FDMA. Even though CDMA provides more capacity and better QoS, the capacity is affected by the near-far problem which degrades the performance of users far away from the BSs. It...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    On Dynamic Configurability and Adaptability of Intelligent Tags with Handheld Mobile Devices

    The availability of unlicensed spectrum coupled with the increasing popularity of wireless communication has given rise to wide range of wireless technologies. The overwhelming success of mobile devices and wireless communications is stressing the need for the development of wireless mobile application services. Device mobility requires services adapting their behavior...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    Hiding Text in Audio Cover with the High Capacity and Security Using Multiple LSBs

    Stenography is an art of embedding hidden data or secret messages over a public channel so third party cannot detect the presence of secret messages. In this stenography method of embedding textual information in an audio file, a proposed technique is first audio sampled and then appropriate bit of each...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    Architecture of Data Warehouse ETL Tools- Performing Efficient and Effective Way

    Data warehousing has been a buzz word in the industry since mid 90's, but it was not wide spread due to be complex timing and maintenance. Business and technologies are now wider and wider so in modern technologies users cannot think in any organization without data warehouse. Data warehouse helps...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    Wi-MAX Security Enhancement and Solution for Authentication Against Man-in-the-Middle Attack

    The paper presents security enhancement of Worldwide Interoperability for Microwave Access (WiMAX) for authentication frame work in IEEE 802.16 against man-in-the-middle attack. This gives secure authentication of legitimate Mobile Station (MS) and protects man-in-the-middle attack. To prevent this kind of attack and to make the authentication more secure, a Hash-Random...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    Stability of Feedback Based LNA Topologies for UWB Communication

    Since the U.S. Federal Communications Commission (FCC) approved the application of Ultra Wide-Band (UWB) technology for commercial use in early 2002, ranging from 3.1 to 10.6 GHz (bandwidth: 7.5 GHz), the implementation of a UWB system and its sub-blocks has been a challenge for Integrated Circuit (IC) designers. In this...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    Gallium Nitride-Based RF Power Amplifiers for Future Wireless Communication Systems

    Radio Frequency (RF) High Power Amplifiers (PAs) received increasing attention as key components responsible for a sizable portion of base station cost (power loss and cooling equipment) in wireless communication systems. Thus, high power and high efficiency amplifiers with low power loss are critically needed. To meet these requirements, higher...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    VLSI Based Wireless Sensor Network For Signal Classification

    The tremendous increase in the Wireless Sensor Network (WSN) in the last decade has increased the potential applications including environment monitoring, smart spaces, medical systems, and robotics exploration. Sensors integrated into structures, machinery, and the environment has led to fewer catastrophic failures, conservation of natural resources, improved manufacturing productivity, improved...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Spectral Entropy Based VAD Using Teager Energy Operator and HOS

    In this paper, the authors presents Voice Activity Detection (VAD) algorithm for detecting voice in noisy environments. The presented robust VAD utilizes the Spectral Entropy (SE) with Teager Energy Operator (TEO) to provide a better representation of formant information resulting in high performance of classification of speech/non-speech priori to entropy...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Survey Report on Implementation of Optimized Cryptographic Algorithm

    Cryptography has a long and fascinating history. Over the centuries, an elaborate set of protocols and mechanisms has been created to deal with information security issues when the information is conveyed by physical documents. Cryptographic algorithms are widely used in Internet Systems. Applications of cryptographic algorithms include credentials establishment i.e....

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    An Online Strategy Proof Mechanism for Dynamic Spectrum Allocation in Cognitive Radios

    With the ever-increasing and dramatic development of wireless networks and mobile technologies the scarcity of spectrum in the spectrum market has been a natural phenomenon over the last few years. The challenge is taken up in the cognitive radio technologies to alleviate this scarcity by managing and efficiently redistributing the...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    A Survey of Security Issues in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are becoming very attractive for both telecommunication and network industry. WSNs are a most challenging and emerging technology for the research due to their vital scope in the field coupled with their low processing power and associated low energy. Today Wireless Sensor Networks are broadly used...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    Data Acquisition and Delivery in Traffic Monitoring VANETs Joint Optimization

    Vehicular Ad-hoc NETworks (VANETs) are envisaged to become a flexible platform for monitoring road traffic, which will gradually replace more cumbersome fixed sensor deployments. The efficacy of vehicle-assisted traffic monitoring systems depends on the freshness of traffic data that they can deliver to users, and the bandwidth used to do...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    Remote Monitoring & Control of Wireless Sensor Network Using Smart Phone

    In this paper, the authors describe the design of a Wireless Sensor Network based on ZigBee technology. It is mainly used for collecting and transferring the various monitoring information about the coal mine underground with the help of WSN. Then the data will be analyzed and processed in the monitoring...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    Embedded Based Finger Print Recognition System For Time and Attendance

    The main objective of this paper is to develop an embedded system, which will record the time and attendance of an employee in an organization and send monthly record of employee's work hours to organization using finger print recognition module which is interfaced with microcontroller. Whenever the employee enters the...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jun 2012

    ARM Based Vehicle Tracking and Security Using GPS and GSM

    A low cost GPS and GSM based vehicle tracking system is developed using ARM processor for real time application. The main core of the system is an embedded hardware along with embedded C compiler. GPS gives the location of the vehicle and also embedded device communicates with GSM network which...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    MANET Based Emergency Communication Module for Post Disaster Recovery

    In recent years, the world has experienced a number of catastrophic natural disasters such as earthquake, hurricane, typhoon, tsunami, etc. The victims trapped in the collapsed buildings and landslides will have a great chance of survival in case the rescue team reaches for help in a short period of time....

    Provided By International forum of researchers Students and Academician

  • White Papers // Jun 2012

    Verilog Implementation of Elliptic Curve Cryptosystem (ECC)

    Data Encryption is widely used to ensure security in open networks such as the internet with the fast development of cryptography research and computer technology. The capabilities of cryptosystems such as of RSA & Diffie-Hellman are inadequate due the requirement of large number of bits. The cryptosystem based on Elliptic...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jun 2012

    Implementation of Software-Defined Radio Using Lab VIEW

    A software-defined radio consists of a programmable communication system where functional changes can be made by merely updating software. In this paper, a software-defined radio 4-QAM (Quadrature Amplitude Modulation) modem system is implemented in LabVIEW. LabVIEW is a widely used graphical programming environment which allows designing systems in an intuitive...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jun 2012

    Off-Line Signature Verification and Recognition

    Signatures are composed of special characters and flourishes and therefore most of the time they can be unreadable. Also intrapersonal variations and interpersonal differences make it necessary to analyze them as complete images and not as letters and words put together. As signatures are the primary mechanism both for authentication...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    Link Failure Tolerance by Path Restoration

    Due to channel interference, dynamic obstacles and/or applications' bandwidth demands multi-hop Wireless Mesh Networks (WMNs) experience frequent link failures. This results performance degradation in WMNs and require expensive, manual network management for their real-time recovery. Herewith the authors present an Autonomous network Reconfiguration System (ARS) that enables a multi-radio WMN...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    Comparative Study for Quadruple Tank Process with Coefficient Diagram Method

    In this paper, a new decoupler method using Coefficient Diagram Method (CDM) for quadruple tank process is proposed. It consists of four inter connected water tanks and two pumps. The major problem in a multivariable process is that the loop interaction may arise and cause difficulty in feedback control design....

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    A Review on RFID Data Cleaning Problem Using Data Mining Tools

    The data stream produced by RFID reader is sometimes inaccurate. As a result there is a big load of unreliable data which is useless for higher level processing. Therefore the authors need to clean this unreliable data which they sometimes call dirty data. Dirty data appears in three reading errors...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    Vehicular Traffic Surveillance Using Multiple Methodology

    Digital image processing is the use of computer algorithms to perform image processing on digital images. As a subcategory or field of digital signal processing, digital image processing has many advantages and applications. One of the applications of digital image processing is for traffic analysis. In literature survey found that...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2013

    Monitoring & Detecting the Application Layer DDOS Attacks that Affects Popular Websites

    One of the major threats for the Internet's reliability and stability is Distributed Denial-Of-Service (DDOS) attack. The attackers are becoming more sophisticated and organized; also several high-profile attacks targeted prominent websites. These are the prime reasons that gained importance for the study of DDOS attack detection and prevention. It becomes...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2012

    Improving the Atmospheric Delay Effects on the Received Global Positioning System Signals

    There are several error sources that cause the estimated position and time measuring from Global Positioning System (GPS) receivers to be inaccurate. The most significant error sources are the satellite clock drifts, mismodeling of gravitational and non-gravitational forces in combining the orbits, geometry of the satellites, ionospheric and tropospheric atmospheric...

    Provided By International forum of researchers Students and Academician