International forum of researchers Students and Academician

Displaying 241-280 of 577 results

  • White Papers // Feb 2013

    Survey on Data Mining in Cloud Computing

    Data and information has a significant role on human activities, thus data sources are growing to be larger and distributed. But the main problem is not storing data; it is analyzing, mine, and process data for understanding it. Current era is of networking and communication; people are interested in keeping...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    An Approach for Enhancement of Data Security in Cloud Computing-A Review

    Cloud computing is an emerging trend which can transform information technology and the way it is used. The main issue is data security as it should not be a concern over the large data to be shared in cloud and hence not limit its use. This is a review of...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    Optimized Data Warehouse Model Through Pentaho ETL Tool

    Extraction-Transformation-Loading (ETL) tools are available for the extraction of data from several sources, their cleansing, customization and insertion into a data warehouse. In this paper, the authors have focus on how to build optimized data warehouse model through Pentaho ETL tool. Initially they have taken data set that is given...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    Indoor Location Determination by Using RFIDs

    With the Growing usage of smart software that uses the location information, automatic location sensing became a necessity in everyday life. There is the Global Positioning System (GPS) which is a satellite based navigation system made up of a network of 24 satellites placed into orbit. GPS is widely used...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    Routing in Manets

    A Mobile Ad-hoc NETwork is a collection of mobile nodes forming an ad-hoc network without the assistance of any centralized structures. These networks introduced a new art of network establishment and can be well suited for an environment where either the infrastructure is lost or where deploying an infrastructure is...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    An Online Strategy Proof Mechanism for Dynamic Spectrum Allocation in Cognitive Radios

    With the ever-increasing and dramatic development of wireless networks and mobile technologies the scarcity of spectrum in the spectrum market has been a natural phenomenon over the last few years. The challenge is taken up in the cognitive radio technologies to alleviate this scarcity by managing and efficiently redistributing the...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    A Survey of Security Issues in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are becoming very attractive for both telecommunication and network industry. WSNs are a most challenging and emerging technology for the research due to their vital scope in the field coupled with their low processing power and associated low energy. Today Wireless Sensor Networks are broadly used...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    Data Acquisition and Delivery in Traffic Monitoring VANETs Joint Optimization

    Vehicular Ad-hoc NETworks (VANETs) are envisaged to become a flexible platform for monitoring road traffic, which will gradually replace more cumbersome fixed sensor deployments. The efficacy of vehicle-assisted traffic monitoring systems depends on the freshness of traffic data that they can deliver to users, and the bandwidth used to do...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    Remote Monitoring & Control of Wireless Sensor Network Using Smart Phone

    In this paper, the authors describe the design of a Wireless Sensor Network based on ZigBee technology. It is mainly used for collecting and transferring the various monitoring information about the coal mine underground with the help of WSN. Then the data will be analyzed and processed in the monitoring...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    Embedded Based Finger Print Recognition System For Time and Attendance

    The main objective of this paper is to develop an embedded system, which will record the time and attendance of an employee in an organization and send monthly record of employee's work hours to organization using finger print recognition module which is interfaced with microcontroller. Whenever the employee enters the...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    Analysis of Document Retrieval System

    In this paper, the authors provide analysis of document retrieval system using Lucene. This paper also describes development and implementation of document retrieval system based on content of document using Lucene technology. It explains significance of Term frequency and Inverse document frequency in Lucene's document scoring formula. Lucene is a...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    Fine Grained Partitioning for Transactional Database Using Lookup Table

    In web and OLTP databases, the most common strategy for scaling database workload is to horizontally partition the database using hash or range partitioning. It works well in many simple applications such as an email application. In other applications like social networking, workloads involving many-to-many relationships are hard to partition....

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    Data Mining: Tools and Techniques

    The data collected from different applications require proper mechanism of extracting knowledge/information from large repositories for better decision making. Knowledge Discovery in Databases (KDD), often called data mining, aims at the discovery of useful information from large collections of data. Data mining is the process of finding new patterns from...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    Design and Implementation of FLEXRAY for Distributed Injection Molding Machine based on ARM Controller

    A new Flexray based distributed intelligent control of combining the features of the injection moldings machine is proposed. The innovative application of the Flexray technology in the control system of the injection molding machine enables the simple processing procedure self-learning, fault diagnosing and process parameters optimizing. Embedded technology and Flexray...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2013

    Monitoring & Detecting the Application Layer DDOS Attacks that Affects Popular Websites

    One of the major threats for the Internet's reliability and stability is Distributed Denial-Of-Service (DDOS) attack. The attackers are becoming more sophisticated and organized; also several high-profile attacks targeted prominent websites. These are the prime reasons that gained importance for the study of DDOS attack detection and prevention. It becomes...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    Integer Wavelet Based Steganographic Model by Selecting Variable Bit Length

    To enhance the embedding capacity of image steganography and provide an Imperceptible stego-image for human vision, an integer wavelet based data hiding with variable bit length substitution method employing secret-key is proposed in this paper. The new technique embeds binary bit stream in 8-bit color image (RGB channel). The technique...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    A Novel Technique to Secure Communication Using Chaos Generated by Non-Linear Circuits

    Secure communication is effected by encoding and decoding a simple message using chaotic non-linear circuits. A Non Linear Circuit is designed for generating the chaos in its output voltage. Time evolutions of generated chaos are studied with respect to two of the operating parameters of the circuit. Chaotic regimes of...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    Dynamic Evaluation Model for Threshold Cryptography in MANETS

    A Mobile Ad hoc NETwork (MANET) is a collection of low-power, wireless, mobile nodes forming a temporary network without the aid of any established infrastructure or centralized administration. In comparison with traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure instead hosts rely on each...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    An Implementation of Multi-Path Dynamic Routing for Computing and Constrained Mobile Ad-Hoc Network Environment

    Wireless mobile ad-hoc networks are classified as networks where nodes are logically connected with each other. These types of networks do not have fixed topology due to the mobility property of nodes, interference, propagation and loss of path. Hence a dynamic source routing protocol is required for these networks to...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    A Survey on Unicast and Multicast Routing Protocols for Mobile Ad-Hoc Networks

    A Mobile Ad-hoc NETwork (MANET) is a self-configuring network composed of mobile nodes without any fixed infrastructure. In a MANETs, there are no difference between a host node and a router so that all nodes can be source as well as forwarders of traffic. Moreover, all MANET components can be...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    Intrusion Detection System in Ad-Hoc Network

    Intrusion detection prevention measures, such as encryption and authentication can be used in ad-hoc networks to reduce intrusions but cannot eliminate them. For example, encryption and authentication cannot defend against compromised mobile nodes, which often carry private keys. Integrity validation using redundant information (from different nodes), such as those being...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    A Novel Approach for Efficient Delay Tolerant Networks Using Conditional Shortest Path Routing

    This paper deals with Delay Tolerant Networks (DTNs) where each node knows the probabilistic distribution of contacts with other nodes. Delay tolerant networks are characterized by the sporadic connectivity between their nodes and therefore the lack of stable end-to-end paths from source to destination. Since the future node connections are...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    Improving Network Processing Technique in Internet Controlled Embedded Systems

    The RTCS Embedded Internet stack provides IP networking for the MQX platform. RTCS is provided with a rich assortment of TCP/IP networking application protocols and uses the MQX RTOS drivers for Ethernet or serial connectivity. RTCS is tightly integrated with the latest ColdFire and Power Architecture processors from Freescale and...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    Secure Usability Design System for User Authentication

    The term usable authentication is been brought about as a result of issues surrounding user memorabiilty. Computer users find it less easy to memorize plain text password compared to images or graphics. Researchers have over the years presented several authentication schemes in an effort to provide users with a usable...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    Performance Evaluation of Different Level Modulation Schemes for an Efficient Mobile WiMAX System in OFDM Under Rayleigh Fading and AWGN Channel

    Mobile WiMAX technology has become one of the fastest growing arenas of internet accessing in the people modern daily life. WiMAX is introduced by the Institute of Electrical and Electronic Engineers (IEEE) to provide a worldwide interoperability for microwave access. IEEE 802.16e-2005 has been developed for mobile wireless communication which...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    Dynamic Path Optimization CBET Technique Using for MANETS

    Efficient scheduling of processes on processors of a Network Of Workstations (NOW) is essential for good system performance. However, the design of such schedulers is challenging because of the complex interaction between several system and workload parameters. Co-scheduling, though desirable, is impractical for such a loosely coupled environment. Two operations,...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    Optimized Routing Algorithm for Congestion Control in Wireless Sensor Networks

    The previous routing approaches like Purely Random Propagation (PRP), Non-Repetitive purely Random Propagation (NRRP), Directed Random Propagation (DRP) perform the routing of packets without considering congestion might occur. When the intermediate nodes receive a huge amount of packets they directly drop the packets. The second problem is that there will...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    Route Handoff Using Channel Aware Routing Protocol in MANETs

    A Mobile Ad-hoc NETwork (MANETs) is a spontaneous network that can be established with no fixed infrastructure. Mobile ad-hoc networks are characterized by multi-hop wireless links and absence of any cellular infrastructure. Transmissions of packets are impaired by radio link fluctuations. Thus, in this paper an enhanced, channel aware routing...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    A Review on Data Security in Data Warehousing

    Data Warehouses are used for storing historic and current data and are used for creating trending reports for annual and quarterly comparisons for the enterprises. Data Warehouses are the most valuable assets which contains critical business data and information for the enterprises in today's world. Most of the existing data...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    An Implementation of Web Content Extraction Using Mining Techniques

    Web mining is a class of data mining. In order to relieve a \"Data rich but information poor\" dilemma, data mining emerged. Web mining is a variation of this field that distils untapped source of abundantly available free textual information. The importance of web mining is growing along with the...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    Web Usage Mining: Pattern Discovery and Forecasting

    Web usage mining: automatic discovery of patterns in click-streams and associated data collected or generated as a result of user interactions with one or more web sites. In this paper, the authors describe web usage mining for their college log files to analyze the behavioral patterns and profiles of users...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2012

    Improving the Atmospheric Delay Effects on the Received Global Positioning System Signals

    There are several error sources that cause the estimated position and time measuring from Global Positioning System (GPS) receivers to be inaccurate. The most significant error sources are the satellite clock drifts, mismodeling of gravitational and non-gravitational forces in combining the orbits, geometry of the satellites, ionospheric and tropospheric atmospheric...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2012

    Techniques to Improve Performance of VoIP Over 802.11e WLAN

    Voice over Internet Protocol is an important service with strict quality of requirements in Wireless Local Area Network (WLANs). The IEEE 802.11e standard has been introduced recently for providing Quality of Service (QoS) capabilities in the emerging Wireless Local Area Networks. This 802.11e introduces a contention window based that is...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2012

    Load Balancing in Wireless Mobile AD HOC Networks

    Ad hoc networks consist of a set of homogeneous nodes (computers or embedded devices) that move in an independent fashion and communicate with the other node in the topology over a wireless channel. Such networks are logically realized as a set of clusters by grouping together. Nodes which are in...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2012

    Distributed DACS Based on Low Cost Internet Controlled Embedded Servers

    Now-a-days everyone using many networked embedded systems for monitoring and control the home or industrial devices. With the scalable networking solution, the server enables web access to distributed measurement/control systems and provides optimization for educational laboratories, instrumentation, industrial and home automation. In this paper, the authors present the principles and...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2012

    Identification of Web User Sessions using Clustering Technique

    The common definition of a user-session is given by a period of time during which the user is generating traffic in internet a user-session is then terminated by a "Long" inactivity period. Within an activity period, many TCP connections may be used to transfer data. Unfortunately, the identification of active...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2012

    Multi-Copy: Routing Efficiently in Intermittently Connected Mobile Networks

    Intermittently connected mobile networks are wireless networks where most of the time there does not exist complete path from the source to the destination. There are many real networks that follow this model, for example, wildlife tracking sensor networks, military networks, vehicular ad hoc networks, etc. In this paper, conventional...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2012

    Analysis of BER in BPSK and GMSK Employing Different Coding

    In this paper, BPSK and GMSK communication system model using AWGN channel and different coding and decoding is analyzed. In the paper performance of BPSK using Convolutional coding and viterbi decoding is compared to GMSK uncoded and GMSK employing Reed Solomon coding. The simulation shows that GMSK using Reed Solomon...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2012

    An Agent-Fuzzy Hybrid Approach to Control Bullwhip Effect in Supply Chain Networks

    Most omnipresent technologies used in supply chain management are software agents. Software agents also called \"Agent-refereed\"- e-commerce. Agent-Based Role Modeling (ABRM) approach and MA CBR approach of multi agent in case base reasoning and fuzzy agent-which is started to achieve better designs in agent technology. In the recent past, lots...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2012

    An Impulsive Bit Plane Complexity Segmentation Approach to Steganography

    Steganography is a technique to hide secret information in some other data without leaving any evidence of data alteration. All of the traditional steganographic techniques have curbed information hiding capacity. The original and derived Bit Plane Complexity Segmentation (BPCS) method embeds as much data as possible into a cover image...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2011

    Performance Analysis of Effectiveness of AODV, DSDV and DSR Routing Algorithms in MANET

    The Mobile Ad hoc NETworks (MANETs) has gained an important part of the interest of researchers and become very popular in last few years. Mobile Ad hoc NETworks (MANET) represent complex distributed systems that comprise wireless mobile nodes that can freely and dynamically self organize into arbitrary and temporary ad...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    Call Admission Control Scheme in Wireless Mobile Network

    An important issue in the operation of a cellular telephone system is how to efficiently use the available band width to provide good service to as many customers as for civil. This application demand and allocation could lead to congestion if the network has to maintain such high resources for...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2012

    A Proposed Cryptographic Algorithm Provides Better Data Security

    RSA algorithm uses integer factorization as the backbone of data security while Diffie-Hellman Algorithm uses Discrete Logarithm to provide platform for secure key exchange. In this paper, the authors provide algorithm to merge both of them to provide a user with even higher level of data security. Actually, their intent...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2012

    Mobile Payment System-A Secure Approach

    This paper is to design a complete architecture and model of SMS-based mobile payment system, which could be used to implement a wireless platform for transferring money from one person to other person, paying utility bills and etc. Mobile communication devices have become popular tools for gathering and disseminating information...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2012

    Polling Algorithm for Dynamic Bandwidth Distribution in LR-PON

    With the advances in optical technology, long-reach PON increased the span of a broadband access network using PON technology from today's standard of 20 km to 100 km or higher. This technology can enable broadband access for a large number of customers in the access/metro area. In LR-PON the propagation...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2012

    Two Layer Intrusion Detection System for Mobile Devices

    In recent years, the usage of mobile devices has increased like anything. Mobile devices are more used for gaming, video streams, transferring files, connecting to internet rather than voice or text communication. At this point of time, a strong Intrusion Detection System (IDS) for mobile devices is must. Even though...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2012

    Automated Generation of Test Data for Evolutionary Testing With Empirical Study Using AspectJ Programs

    In today's programming paradigm research interest is moving from object oriented programming to Aspect oriented programming. Most of the research on aspect oriented programs was targeted towards the programming, not for testing. Automation of AOP testing is a new research area and very few researchers are working on automation of...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2012

    Exploring Smart, Efficient and Robust Routing Algorithm for VANET

    This paper gives the insight of VANET and the new techniques by which the performance of VANET can be improved. There by making the VANET more intelligent smart and robust. Here the hybrid techniques are used to measure the various parameters of VANET. VANET is an emerging technology to achieve...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2012

    The MPEG-7 Standard

    MPEG-7, formally known as Multimedia Content Description Interface, includes standardized tools (descriptors, description schemes, and language) enabling structural, detailed descriptions of audio - visual information at different granularity levels (region, image, video segment, collection) and in different areas (content description, management, organization, navigation, and user interaction). It uses XML to...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2012

    Learning OO Concepts Through Storytelling Metaphors and 3D Objects Using Alice

    Teaching programming to a novice is equally challenging to both the learner and the teacher. Several attempts have been made in the past to ease out the pain of the learner and to assist them in enhancing their learning outcomes. This paper includes providing specially designed languages to teach programming,...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2012

    An Approach for Optimization of the Performance of DSR (Distance Source Routing) in Mobile Ad-Hoc Network as Optimized-DSR

    Mobile Ad hoc NETwork (MANET) comprises of nodes, which are free to move randomly, yet cooperate to forward packets between source and destination over a multi-hop wireless network. Due to absence of any fixed node, each node acts as a router, providing routing capability for the MANET. Various protocols for...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2012

    Dual Module Secure Login (DMSL)

    DMSL is an enhanced technique used as a counter measure for the shoulder surfing attack. It is more secure technique than the previous versions. Shoulder surfing is an observation technique of stealing the information by looking over someone's shoulder. Very often people are unaware of the presence of any external...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    A Unified Approach for Outlier Detection Using Change Point for Intrusion Detection

    The number of computers connected to a network is increasing and Network Intrusion Detection System (NIDS) is one of the essential to an organization. The challenge here is to react quickly to different events with high detection rates and low false positives for real time traffic. Current research is in...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    Networking Protocols : Bluetooth Architecture

    Bluetooth uses a variety of protocols. Core protocols are defined by the trade organization Bluetooth SIG. Additional protocols have been adopted from other standards bodies. This paper gives an overview of the core protocols and those adopted protocols that are widely used. The Bluetooth protocol stack is split in two...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    Design and Implementation of Artificial Neural Network Architecture for MANET on FPGA Platform

    This paper presents and FPGA implementation of Artificial Neural Network (ANN) is applied in Wireless Ad-Hoc NETwork (WANET) for the performance optimization of Routing protocol and its Hardware implementation using Field Programmable Gate Arrays (FPGA). Artificial Neural Network is designed using MATLAB and its digital architecture implementation is described using...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2011

    Data Collection Privacy Protocol With K-Anonymity Framework in Multirelational Databases: Theoretical Analysis

    Data mining is the task of extracting knowledge from large amount of data. While applying various data mining algorithms to the data it is necessary to preserve the privacy of an individual. Due to privacy concern collecting data from different parties become difficult. The problem of privacy is very common...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2011

    Design and Implementation of High Performance Transfer Protocol

    Efficient and reliable communication is essential for achieving high performance in a networked computing environment. Limited network resources bring about unavoidable competition among in-flight packets, resulting in network congestion and, possibly, deadlock. The effectiveness of deadlock handling mechanisms in a network often determines the upper bound in the throughput and...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2011

    Challenges of Dynamic Load Balancing of Association Rule Mining Algorithms in Distributed Computing Platform

    Decrease in hardware costs and increase in computer networking technologies have led to the exponential growth in the use of large-scale parallel and distributed computing systems. One of the biggest issues in such systems is the development of effective techniques/algorithms for the distribution of the processes/load of a parallel program...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2011

    Enhancement OLAP Via Fragmentation

    The two terms Data Warehouse (DW) and On-Line Analysis Processing (OLAP) technology are the backbone of the Decision Support System (DSS) and also many of others applications. Working to discover important information and appropriate depending on the analyzing results of the multidimensional database. In this paper it will be used...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2011

    Chaos: The Common Cause of Data Warehousing Project Failures

    Data warehousing project failures not appropriate for managing every situation or even every kind of project. Project management does apply to great many situations. It is not only in large scale infrequent undertakings that project management applies. Its in all kinds of smaller more frequent activities as well. As long...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2011

    Resource Management on Private Cloud Using Predictive Algorithm

    Currently existing cloud service providers require users to manually manage their instances which asks for constant monitoring. The authors propose SLA Aware Resource Management service wherein resources are scaled-up or scaled-down on demand and a fair user policy is implemented by placing a cap on the number of instances that...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2011

    Research Directions in Intrusion Detection, Prevention and Response Systems -A Survey

    With the advances in network based technology reliable operation of network based systems is very important. The ability to detect intruders in computer systems is important as computers are increasingly integrated into the systems that the people rely on. Internet security is a critical factor in the performance of an...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    3D Face Recognition Using Radon Transform and PCA

    Three Dimensional (3D) human face recognition is emerging as a significant biometric technology. Research interest into 3D face recognition has increased during recent years due to availability of improved 3D acquisition devices and processing algorithms. A 3D face image is represented by 3D meshes or range images which contain depth...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    Multimodal Biometric Based Person Authentication System Using Fisher Linear Discriminative Analysis (FLDA) Algorithm

    Biometric system allows automatic person recognition based on physical or behavioral features which belong to a certain person. Each biometric feature has its limits and no biometric system is perfect so unimodal biometric system raise a variety of problem and the experimental studies show that unimodal biometric systems had many...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    Improving Semantic Web Service Composition Performance Using Apriori Algorithm

    There are many usages for the web services in the World Wide Web. For creating new services the people can compose other developed services in the way the people want to use them. The large amount of web services make composing of services a time consuming and impossible job. So...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Performance Analysis of Convolutionaly Coded MC-CDMA System Using Modulation Techniques

    Orthogonal Frequency Division Multiplexing (OFDM) has recently gained a lot attention and is a potential candidate for Fourth Generation (4G) wireless systems because it promises data rates up to 10Mbps. A variation of OFDM is Multi-Carrier CDMA (MC-CDMA) which is an OFDM technique where the individual data symbols are spread...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2011

    To Improve TCP Performance in Mobile Ad Hoc Network

    Transmission Control Protocol (TCP) is a reliable end-to-end protocol which is widely used in wired network. In the next generation heterogeneous network, the performance of TCP is not suitable. Since some new characters are in the new situation. Like long delay, high Bit Error Rate (BER), asymmetric channels, handover, dynamic...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2011

    MediCloud: A Novel Cloud-Based Framework for Healthcare Applications

    The healthcare system is increasingly collaborative, where a broad range of healthcare services are provided by many individuals and organizations. The use of computers in healthcare can greatly enhance the quality and effectiveness of health care services while at the same time reduce cost. Disparate computing resources can be integrated...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2011

    Mobile Cloud Computing (A Review Study)

    Mobile cloud computing has been worldwide accepted as a concept that can significantly improve the user experience when accessing mobile services. Its application has become more popular all across the world. By removing the limitations of mobile devices with respect to storage and computing capabilities and providing new integrated levels...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2011

    Implementing Visual Cryptography and Biometrics for Improved Stego Image Security

    The main idea of this paper is to apply the Biometric template Encryption (encryption using biometric template) along with Visual cryptography to secure the authors' valuable stego images. In the proposed scheme visual cryptography is applied to the stego image to get the image divided into parts and each part...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2011

    Field Programming Oriented Secured Speech Communication Using Watermark With Multiple Domain Analysis

    This paper presents a FPGA (Field Programmable Gate Array) based speech signal communication system. The system consists of encryption and watermarking. To facilitate fast operation and reduced data size, the sampled signal is compressed before operation. There are many encryption techniques available for encryption. But for real-time signal encryption, fast...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2011

    GSM and ICT Framed e-Governance Incorporated With Network Protection

    E-governance escalation and divine service begins from the easy dissemination and easy access from the citizen to the governmental information, passes through the electronic transactions between the citizen and the public organization, and reaches to the electronic delivery of the requested document by the public organization to the citizen. An...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2011

    Real-Time Speech Signals for E-Wallet Using Watermarking Algorithm With Fast and Highly Secured Encryption

    This paper presents a watermarking technique with fast encryption and compression. Recently a number of algorithms exist for watermarking and encryption. Their drawbacks are size, security and time for execution. Compression is necessary to maintain size small where bandwidth and storage capacity is limited. A loss-less compression technique is used...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2011

    Adaptive Modulation Techniques for Improving BIT Error Rate Performance of Cognitive Radio Network

    This paper examines the benefits of using adaptive modulation in terms of spectral efficiency and probability of bit error for cognitive radio networks. In channels that fluctuate dynamically over time, systems that are based upon the conventional methods of fixed modulation formats do not perform well. Adaptive modulation provides many...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2011

    Analysis of Quality of Service in Flexi Base Transceiver Station Environment

    In these days wireless communication systems are well-liked due to its wide range of advantages. The communication path between the transmitter and the receiver in wireless communication can vary from simple Line Of Sight (LOS) to one that is rigorously obstructed by buildings, mountains and shrubbery. This paper shows the...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2011

    Analysis and Characterization of Intercarrier Interference of Multicarrier CDMA System

    The future wireless mobile communication systems will be required to support high-speed transmission rate. Direct Sequence Code-Division Multiple Access (DSCDMA) and MultiCarrier (MC- CDMA) are two important CDMA schemes for high rate wireless communication. Multi-Carrier Code Division Multiple Access (MCCDMA) has been considered as a strong candidate for next generation...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2011

    Spoofing Media Access Control (MAC) & Its Counter Measures

    The IEEE 802.3 MAC Protocol is the standard for LAN Ethernet Card in Computer Architecture. An adversary can exploit this vulnerability of 802,3 Protocol to launch a large number of attacks. When computers connect together on a network, a network card or wireless network card are typically used. Each network...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    An Approach to Cognition Built-In Knowledge Discovery

    Knowledge discovery is a data mining problem. Data mining is complex especially when the data size huge. Efficient data mining algorithms are required for mining large size data. It has been provided that knowledge base is required which is nothing but user beliefs, experiences and intuitive thinking for mining useful...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2011

    Performance Measurement of Oracle Database

    Database tuning in modern database systems requires a lot of expertise is very time consuming and often misdirected. Tuning attempts often lack a methodology that has a holistic view of the database. The absence of historical diagnostic information to investigate performance issues at first occurrences exacerbates the whole tuning process...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2011

    Switching to Sphere-Shaped Display on Surface Computing

    Sphere is mainly a kind of multiple-user and the multiple-touch sensitive type of surface computing application. Infact the display is on the outer surface of the sphere rather than on the flat screen. It mainly uses the infrared cameras for the touch sensing purposes and the projectors are mainly used...

    Provided By International forum of researchers Students and Academician