International forum of researchers Students and Academician

Displaying 201-240 of 566 results

  • White Papers // Jun 2013

    Microcontroller Based Drip Irrigation System

    In the field of agriculture, use of proper method of irrigation is important and it is well known that irrigation by drip is very economical and efficient. In the conventional drip irrigation system, the farmer has to keep watch on irrigation timetable, which is different for different crops. The project...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2013

    Analysis of MIMO and Cooperative Communication Systems for Constrained Wireless Ad Hoc/Sensor Networks

    In this paper, the authors perform an analysis and checks adaptability of MIMO system and cooperative communication systems (which leads to a virtual MIMO system) especially for wireless ad hoc sensor networks. The cooperative MIMO communication system has a source node which is surrounded by multiple neighbors. The source node...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2013

    Discovering Fuzzy Classification Rules Using ACO with Novel Quality Measure

    In this paper, the authors propose an extension of classification algorithm based on ant colony optimization with novel quality function to handle continuous valued attributes using the concept of fuzzy logic. cAnt-Miner transforms continuous attributes into nominal attributes by creating only two discrete intervals. Hence, smooth transition is not possible....

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2013

    Discovery of Usage Access Pattern From Web Log Data Using Efficient Apriori Algorithm

    Web servers generate an enormous amount of information regarding users browsing activities worldwide. Several researches have done on click stream or web access log data in order to better understand and meet the need of web users. With the continuous growth and proliferation of e-commerce, web services and web based...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2013

    A Combined Classification Approach by Using C Means and CART in Data Mining

    Data Mining is a field of search and researches of data. Mining the data means fetching out a piece of data from a huge data block. The basic work in the data mining can be categorized in two subsequent ways. One is called classification and the other is called clustering....

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2013

    Pattern Discovery Using Web Mining Survey

    Web mining is a very hot research topic which combines two of the activated research areas: data mining and World Wide Web (WWW). The web mining research relates to several research communities such as database, Information Retrieval (IR) and Artificial Intelligence (AI). Although there exists quite some confusion about the...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2013

    Survey of Different Clustering Methods

    Clustering is the process of grouping the data into classes or clusters, so that objects within a cluster have high similarity in comparison to one another but are very dissimilar to objects in other clusters. Clustering has its roots in many areas, including data mining, statistics, biology, and machine learning....

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2013

    Finding Frequent Users Access Patterns From Web Server Log Files Using Data Preprocessing

    Web usage mining is the application of data mining techniques to discover usage patterns from web log data, in order to understand and better serve the needs of web-based applications. This helps the organizations to determine the value of specific customers, cross marketing strategies across products and the effectiveness of...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2013

    An Approach for Improving the Performance of the Apriori Algorithm

    The Apriori algorithm is a classic algorithm for mining frequent itemsests and association rule learning over transactional databases. The Apriori algorithm is a classic algorithm for mining frequent item sets for learning Boolean association rules. In this paper, the authors propose an approach for increasing the efficiency of the Apriori...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2013

    Bottom-UP-Detection and Prevention Techniques for TCP Sync Flooding Attack

    The Distributed Denial of Service (DDoS) attack is one of the most alarming threats on the internet. A DDoS attack attempts to exhaust the critical resources of the intended target servers in order to deny their services to legitimate clients. In this paper, a bottom up detection and prevention techniques...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2013

    Protocol for Energy-Efficient Routing Over Mobile Ad Hoc Networks

    A Mobile Ad hoc NETwork (MANET) is a collection of nodes that can communicate with one another without any fixed infrastructure. Energy efficiency is one of the main problems in a MANET, especially in designing a routing protocol. Many minimum energy (energy-efficient) routing protocols have been proposed in recent years....

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2013

    A Protocol for Emergency Information Dissemination in VANET

    VANET integrates components of Wi-Fi, Blue-tooth and other mobile connectivity protocols to facilitate data transfer between cars and between roadside equipment and automobile traffic. Immediate benefits of VANETs are preventing accidents and avoiding traffic jam. If a car spots a dangerous road situation, such as an accident, it transmits the...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2013

    Analysis of Cloud Computing to Increase Speed & Security for Mobile Access

    Fundamental limitations of power, available spectrum and mobility, wireless data network generates the problem of less bandwidth, more latency, less connection stability & less predictable availability. Delay and end to end lengths, of software path, firewalls, virtual private network and other overlay network and lossy wireless network increase latency and...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2013

    A Phenomenon Approach Towards Routing Over Ad Hoc Networks

    Worldwide interoperability for Microwave Access (WiMAX) is a technology that bridges the gap between fixed and mobile access and offer the same subscriber experience for fixed and mobile user. Demand for such type of mobile broadband services access, which is further extended to support portability and mobility based on IEEE...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2013

    Target Coverage Problem in Wireless Sensor Network

    Target coverage problem in wireless sensor networks remains a challenge. In target coverage problem, the fixed number of targets is continuously observed by a number of sensor nodes with the aim of maximizing the lifetime of the network. A sensor covers targets which are within the sensing range. For a...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2013

    Design and Analysis of Model a for 3D OCDMA System Using Cubic Congruent Operator

    Signature sequences in OCDMA play a crucial role to judge the performance of system. In this paper, the authors present the analysis of newly designed model for 3D OCDMA system based on spreading in temporal, spectral and spatial domain using optical orthogonal codes and cubic congruent operator from Galois field...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2013

    Multicast Data Origin Authentication : A Survey

    Multicast is efficient method for group oriented application such as video conferencing, interactive group games and video on demand. IP multicast saves band-width by sending traffic to many clients simultaneously. Multicast is efficient method to deliver data from one sender to many receivers as compared to unicast. It also has...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2013

    A Hybrid Encryption Protocol Based Secure - SMS Framework for Banking Transactions Using Smart Phones

    Proliferation of banking services using the mobile telephony technologies such as GSM is presently restricted due to inherent security vulnerabilities in the existing cellular architecture. The implementation of complex security algorithms to secure the data transactions over wireless communications has not progressed so far due to limitations in mobile handset...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2013

    A Survey on Web Application Security by Integrating Static and Dynamic Analysis Techniques

    In the last few years, the popularity of web-based applications has grown tremendously. Since the advent of the World Wide Web (WWW), the users' routine activities in the banking, finance and insurance sectors have been moved to web based applications. These web applications deal with sensitive data. Most of the...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2013

    Privacy Gain Based Multi-Iterative k-Anonymization to Protect Respondents' Privacy

    Huge volume of data from domain specific applications such as medical, financial, telephone, shopping records and individuals are regularly generated. Sharing of these data is proved to be beneficial for data mining application. Since data mining often involves data that contains personally identifiable information and therefore releasing such data may...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2013

    Multicast Routing Protocol Using Peripheral Dynamism

    In this paper, the authors describe a new multicast routing protocol for mobile ad hoc wireless networks. The protocol establishes a source based mesh of nodes called with no static periphery or zone to distribute data for that source. The notion of zone or a flooding group is different the...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2013

    An Effective Voice Communication over MPLS Network

    Cloud architecture provides a model to distribute the services to clients. The presented paper is the improvement to this distribution architecture in case of public cloud. The improvement is here performed at both the server as well client end. The work is divided in three main stages. First stage is...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2013

    Advanced Security Measures to Prevent the Advent of Bots using PUZ-CAPTCHAs

    In earlier days, confidential mails, documents and various transactions were easily hacked by automated software's indulging in various spamming and other fraudulent activities. The feasible solution founded was CAPTCHA. Captchas are employed as a good security measure to differentiate bots from human beings. But currently, Captchas have been broken and...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2013

    Federated and Cooperative Data Processing Application Architecture over LAN

    Today having a computer with decent processing power is very inexpensive. There are thousands of labs and companies all over the world having 5 to 500 computers over LAN used daily. But what these labs and companies cannot afford is computing power of the combination of their multiple computers (5-500),...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2013

    Utility Based Decision Making Using Multi-Agent Technology

    Dynamic decision making has gained special concern in research endeavor because its' vital importance in various applications. Dynamical changes in decision factors, measurement of level of satisfaction, representation of desires and achieving intelligent behavior towards maximizing utilities are challenging problems in this research area. Attempt of this paper is to...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2013

    Neural Network using Weights in Solving various Pattern Classification

    A Probabilistic Neural Network (PNN) is a feed forward neural network, which was derived from the Bayesian network and a statistical algorithm called Kernel Fisher discriminant analysis. The feed forward neural network was the first and arguably simplest type of artificial neural network devised. In this network, the information moves...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2013

    A Novel and Advanced Online Inspection System for Industrial Applications

    In this paper, the authors monitor and control the industrial parameters like supply voltage, temperature, and speed of the motor (either DC/AC) using sensors. If the measured parameters exceed the predefined values; corresponding action will be considered (like power OFF, Buzzer, light glowing etc.) and the same values measured by...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    Indoor Location Determination by Using RFIDs

    With the Growing usage of smart software that uses the location information, automatic location sensing became a necessity in everyday life. There is the Global Positioning System (GPS) which is a satellite based navigation system made up of a network of 24 satellites placed into orbit. GPS is widely used...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    Routing in Manets

    A Mobile Ad-hoc NETwork is a collection of mobile nodes forming an ad-hoc network without the assistance of any centralized structures. These networks introduced a new art of network establishment and can be well suited for an environment where either the infrastructure is lost or where deploying an infrastructure is...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    An Online Strategy Proof Mechanism for Dynamic Spectrum Allocation in Cognitive Radios

    With the ever-increasing and dramatic development of wireless networks and mobile technologies the scarcity of spectrum in the spectrum market has been a natural phenomenon over the last few years. The challenge is taken up in the cognitive radio technologies to alleviate this scarcity by managing and efficiently redistributing the...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    A Survey of Security Issues in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are becoming very attractive for both telecommunication and network industry. WSNs are a most challenging and emerging technology for the research due to their vital scope in the field coupled with their low processing power and associated low energy. Today Wireless Sensor Networks are broadly used...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    Data Acquisition and Delivery in Traffic Monitoring VANETs Joint Optimization

    Vehicular Ad-hoc NETworks (VANETs) are envisaged to become a flexible platform for monitoring road traffic, which will gradually replace more cumbersome fixed sensor deployments. The efficacy of vehicle-assisted traffic monitoring systems depends on the freshness of traffic data that they can deliver to users, and the bandwidth used to do...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    Remote Monitoring & Control of Wireless Sensor Network Using Smart Phone

    In this paper, the authors describe the design of a Wireless Sensor Network based on ZigBee technology. It is mainly used for collecting and transferring the various monitoring information about the coal mine underground with the help of WSN. Then the data will be analyzed and processed in the monitoring...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    Embedded Based Finger Print Recognition System For Time and Attendance

    The main objective of this paper is to develop an embedded system, which will record the time and attendance of an employee in an organization and send monthly record of employee's work hours to organization using finger print recognition module which is interfaced with microcontroller. Whenever the employee enters the...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    A Review on RFID Data Cleaning Problem Using Data Mining Tools

    The data stream produced by RFID reader is sometimes inaccurate. As a result there is a big load of unreliable data which is useless for higher level processing. Therefore the authors need to clean this unreliable data which they sometimes call dirty data. Dirty data appears in three reading errors...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    Vehicular Traffic Surveillance Using Multiple Methodology

    Digital image processing is the use of computer algorithms to perform image processing on digital images. As a subcategory or field of digital signal processing, digital image processing has many advantages and applications. One of the applications of digital image processing is for traffic analysis. In literature survey found that...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    Survey on Data Mining in Cloud Computing

    Data and information has a significant role on human activities, thus data sources are growing to be larger and distributed. But the main problem is not storing data; it is analyzing, mine, and process data for understanding it. Current era is of networking and communication; people are interested in keeping...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    An Approach for Enhancement of Data Security in Cloud Computing-A Review

    Cloud computing is an emerging trend which can transform information technology and the way it is used. The main issue is data security as it should not be a concern over the large data to be shared in cloud and hence not limit its use. This is a review of...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    Optimized Data Warehouse Model Through Pentaho ETL Tool

    Extraction-Transformation-Loading (ETL) tools are available for the extraction of data from several sources, their cleansing, customization and insertion into a data warehouse. In this paper, the authors have focus on how to build optimized data warehouse model through Pentaho ETL tool. Initially they have taken data set that is given...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    Design and Implementation of FLEXRAY for Distributed Injection Molding Machine based on ARM Controller

    A new Flexray based distributed intelligent control of combining the features of the injection moldings machine is proposed. The innovative application of the Flexray technology in the control system of the injection molding machine enables the simple processing procedure self-learning, fault diagnosing and process parameters optimizing. Embedded technology and Flexray...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2011

    Novel Algorithm for Solving of Radial Distribution Networks Using C++

    This paper presents a simple approach for load flow analysis of a radial distribution networks. The proposed method uses the simple recursive equation to compute the voltage magnitude and angle. The proposed approach has been tested on several radial distribution systems of different size and configuration and found to be...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2011

    Implementation of CQCAN Protocol for Device Control

    The Controller Area Network (CAN) is a bus oriented serial communication protocol used since 1980s. The CAN bus defines only the physical and data link layers. Higher layers, generally called the object layer and application layer describe message details, their generation and use. Several higher level protocols are available for...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2011

    Intrusion Detection System Using Fuzzy Genetic Algorithm With Feature Selection

    Intrusion detection now a day is increasingly important aspect of computer security. Various approaches have been applied in past that are less effective to curb the menace of intrusion. The purpose of this paper is to provide an Intrusion Detection System (IDS), by applying fuzzy-genetic algorithm with feature selection to...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2011

    A Three-Tier Architecture in Sensor Networks for Finding Intruder Information

    In sensor networks, an intruder identified and isolated in one place can be relocated and/or duplicated to other places to continue attacks; hence, detection and isolation of the same intruder or its clones may have to be conducted repeatedly, wasting scarce network resources. Therefore, once an intruder is identified, it...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2011

    Varied Path Routing Protocol for Multimedia Applications in Wireless Networks

    For any Multimedia application the Quality of Service (QoS) parameters are the Bandwidth, Jitter and Delay. The task for QoS provisioning becomes more challenging when it comes for the ad hoc wireless networks due to the dynamically changing topology. The routing protocol available such as AODV, DSR and DSDV does...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2011

    Improvement of Optimal Power Flow and System Security Using Fuzzy Based Contingency Ranking

    To maintain security of a large power system, it is desirable to estimate the effect of contingencies and plan suitable steps to improve system security. Contingency screening and ranking is one of the important components of on-line system security improvement. The objective of contingency screening and ranking is to quickly...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2011

    A Security Set of SMPP Protocol for SMS and Applications

    According to the security requirement of the Short Message Service (SMS) industry application, a secure short message communication protocol is proposed. This is an application level protocol constructed on the standard SMS communication protocol using public key authentication and key agreement without the need of Wireless Public Key Infrastructure (WPKI)....

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    Software Architecture for Implementing Efficient Power Management Techniques Within Intelligent TAGS

    Power consumption has become a serious issue in the development of remote mobile devices such as intelligent tags where charging and recharging of the battery cannot be done frequently. Longevity of the battery has to be increased by power saving. Many existing techniques address the issue of power management in...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    A Study on Traceability and Human Factors in Agile Practices to Improve Software Quality

    The most noticeable change to software process thinking in the last few years has been the appearance of the word 'Agile'. Agile software development methods were invented to minimize the risk of developing low quality software systems with rigid process-based methods. They impose as little overhead as possible in order...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2011

    Software Operational Profile Development Using Use Case Model

    One of the important ways of measuring software reliability is through operational profile of the software. Operational profile is used to guide the development and the testing process. Operational profile testing has effective and practical importance in software testing, since it improves the reliability and speeds up the software development....

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    Cloud E-Learning: A New Virtuous Business Archetype for E-Learning

    Now-a-day, most of predominant education system are becoming not being suitable for necessities of social improvement and educational development and not being able to catch up with the changes of learning demand in time, thus computer networks have brought opportunities for it. In conventional web based E-learning approach, system assembly...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    Customizing and Porting of UClinux on Reconfigurable SoC

    Today's reconfigurable hardware devices have huge densities and are partially reconfigurable, allowing for the configuration and execution of hardware tasks in a true multitasking manner. This makes reconfigurable platforms an ideal target for many modern embedded systems that combine high computation demands with dynamic task sets. Such an operating system...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    FPGA and ASIC Implementation of Vedic Multiplier

    The ever increasing demand in enhancing the ability of processors to handle the complex and challenging processes has resulted in the integration of a number of processor cores into one chip. Still the load on the processor is not less in generic system. This load is reduced by supplementing the...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    A Survey of Proactive Multicast Routing Protocols for Mobile Adhoc Network

    Mobile ad hoc network is a recently emerging branch of wireless communication technology. In such dynamic wireless network selection of the appropriate best efficient routing protocol among the large number of available protocols, as per the network requirement is a major challenge. This paper mainly has its focus on a...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    Knowledge Based Decision Support System for Standardization in Professional Education

    Professional Education is a Global Issue, every country in each continent is striving hard to earn as much professional growth possible. Particularly, in India the professional education has taken grip in last 10 odd years. But being a young fellow in to this new setting, there is a requirement of...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    Prioritizing Quality Requirements Based on Software Architecture Evaluation Feedback

    Quality attributes such as performance, reliability, and maintainability, are crucial for the success of any software system. The software architecture largely influences the quality properties a software system will exhibit. However, while quality requirements are defined in many companies mainly upfront, they are not systematically incorporated during development and thus...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    Extended SNMP Agent for Network Device Management

    The SNMP (Simple Network Management Protocol) provides a method of managing network hosts such as workstation or server computers, routers, bridges and hubs from a centrally-located computer running network management software. SNMP performs management services by using a distributed architecture of management system and agent. The SNMP agents which are...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    Consistent Data Access: An Effective Data Replication at Last Mile Services

    The up-coming last-mile services architecture assures to get the better ease of use and presentation of web services by making the servers available by distributing distributed globally. The main confront in such systems is data duplication and uniformity by which Last-Mile server code can control mutual data without deserving the...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    Protecting Privacy by Location Aggregation in Wireless Sensor Networks

    Preserving privacy of an individual while accessing location based information from Location Based Services (LBSs) is one of the most challenging tasks as the user unknowingly reveals the personal location in this process, where the location information can be tracked continuously and can be exploited. Sometimes it is required that...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    Importance and Benefits of Proposed ERP Maintenance Model

    Enterprise Resource Planning (ERP) systems are identified as enterprise wide software to integrate all the business processes for organizations. Enterprise Resource Planning (ERP) maintenance and upgrade activities are receiving much attention in ERP-using organizations. Still Many organizations lack experience and expertise in managing ERP maintenance and upgrade effectively. One of...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    A Survey on Privacy Preserving Data Mining

    The increasing use of data mining tools in both the public and private sectors raises concerns regarding the potentially sensitive nature of much of the data being mined. The utility to be gained from widespread data mining seems to come into direct conflict with an individual's need and right to...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    Digital P2P Reputation System Using Self Certified Cryptographic Exchanges

    The main reason behind the success Peer-To-Peer (P2P) networks is the anonymity and the utility offered by them to the users. The Client-server security policies implemented in centralized distributed systems is not a feasible solution for P2P networks to store peer reputation information. Though a centralized system does exist, it...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    Analysis of a Hybrid Cipher Algorithm for Data Encryption

    Block and stream ciphers can be joined in order to obtain hybrid algorithms and the main idea of combining can be enhancing the security of the cipher. This paper is presented to illustrate a hybrid algorithm created by combining a block cipher algorithm, TripleDES (ECB mode) and a stream cipher...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    Wireless Sensor Network & Security Attack Analysis

    The materialization of sensor networks as one of the dominant technology trends in the coming decades has posed numerous unique challenges to researchers. These networks are likely to be composed of hundreds, and potentially thousands of tiny sensor nodes, functioning separately, and in many cases, without access to renewable energy...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    The Ten Ingredients of Data Base Systems for Improving Performance and Their Review Leading to Research Problems

    In this paper, the authors survey, consolidate, and present the state of the art in database system and they try to specify the most important research possibilities in the data bases. The heart of their analysis is a survey on basic to advanced concepts and their relativity which will give...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    Maintenance Management to Improve Productivity

    The role of maintenance is very important in the successful operations of continuous process plants like power, chemicals and fertilizer plants. Maintenance is a line function and it is based on systems developed to cover day to day breakdown maintenance, planned maintenance, preventive and predictive maintenance. Computers are integral part...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    Performance Analysis on Channel Assignment Scheme in Mobile Networks

    This paper presents a general framework for a wide range of Call Admission Control (CAC) algorithms. For several CAC schemes, which are a subset of this general framework, an analytical performance evaluation is presented for a mobile wireless network. These CAC algorithms consider a variety of mechanisms to prioritize traffic...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    Increase Sensor Network Tenure by Captive Genetic Algorithm Method

    In sensor networks the nodes have limited energy, so it is critical to the save the energy of the nodes and thus the overall energy consumption of the network. This is necessary to increase the tenure of the entire network. In this paper the genetic algorithm and simulated annealing algorithms...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    Fault Tolerance and Retrieval in MPLS Network

    Multi Protocol Label Switching (MPLS) is an evolving network technology that has been used to provide Traffic Engineering and high speed networking. Uninterrupted transmission in case of failure is a major concern in MPLS based networks. The path protection is an effective method for uninterrupted transmission. Existing approaches towards the...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    A Review of Mobile Grid Computing and Its Architecture Classification

    The concepts of grid computing and mobile computing are the emerging trends in computer science and the advances are going in this filed hand in hand. The paper here discusses how the grid computing can be implemented in wireless mobile devices to work it as a single concept of mobile...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2012

    Performance Evaluation of Elliptic Curve Cryptosystem and Its Application

    ECC is a public key cryptosystem similar to RSA but it is based on elliptic curves. ECC are described with setting of the multiplicative group5 of the integers modulo a prime p. Such system can be modified to work in the group of points on an elliptic curve6. Further Diffe-Hellman...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2012

    Comparison of Propagation Path Loss Models in Outdoor Environment at 900MHz

    Wireless system has been active area of research in recent times. Generally Path loss models are used for predicting the losses in environment depending upon the different types of terrain. These models provide the different result in different area. In this paper, the authors compare different path loss models by...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2012

    Design and Development of Error Tracking and Debugging Tool in Android Platform

    Test automation in various mobile platforms is becoming a need. There are currently available tools in the market that cater to support mobile phone, web and desktop applications on various platforms. These tools are available at a cost by prominent vendors in the industry. The aim of this paper is...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2012

    An Optimized and Energy Efficient Multicast Routing Algorithm for Wireless Mobile Ad Hoc Networks Using Genetic Algorithm Approach

    In ad hoc networks, mobile node battery energy is finite and represents one of the greatest constraints for designing multicast routing protocols. In regards to the battery lifetime limitation in supporting multicast routing, some studies have investigated a power saving network layer. These proposed methods have always considered several techniques...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2012

    Key Exchange Protocol for Mobile Authentication

    In this paper, the authors present an overview of four protocols based on mutual authentication and key exchange. Each of the protocol has their own way of exchanging session keys and authenticating the users. Later they present the differences and similarities between all the four protocols and conclusion based on...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2012

    An Efficient and Robust Multicast Protocol Over Mobile AD-HOC Network

    Group communications are important in Mobile Ad hoc NETworks (MANETs). Multicast is an efficient method for implementing group communications. However, it is challenging to implement efficient and scalable multicast in MANET due to the difficulty in group membership management and multicast packet forwarding over a dynamic topology. The authors propose...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2012

    A Proposed Architecture for Network Management in Mobile Agent Based on Common Object Request Broker Architecture (CORBA)

    In this paper, the authors are going to introduce the proposed architecture for network management in mobile agent based on CORBA. Here, they are introducing operational environment that plays a vital role in network management for Mobile Agents. The architecture proposed by them consist of Agent Communication Manager (ACM), Agent...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2012

    A Secure Scheme to Avoid Worm Hole Attacks in Ant Based Adaptive Multicast Routing Protocol for MANET

    Security issues are very important in mobile ad hoc network. The general attack in wireless network is the wormhole attack. In this wormhole attack two or more malicious nodes create the tunnel bypassing all the traffic. These tunnels emulates shorter links in the network in which adversary records transmitted packets...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2012

    Approaches & Challenges in 3D and Multi-Modal 3D + 2D Face Recognition

    This paper provides a concise & up-to-date review of research efforts in face recognition techniques based on 2D and 3D images. Recent research has also demonstrated that the fusion of different imaging modalities and spectral components can improve the overall performance of face recognition. The majority of face recognition methods...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2012

    New Era in Technology: Grid Computing

    The Grid has the potential to fundamentally change the way science and engineering are done. Aggregate power of computing resources connected by networks - of the Grid-exceeds that of any single supercomputer by many orders of magnitude. Grid Computing, emerging as a new paradigm for next-generation computing, enables the sharing,...

    Provided By International forum of researchers Students and Academician