International forum of researchers Students and Academician

Displaying 281-320 of 471 results

  • White Papers // Feb 2012

    A Review on the Effects of Reader/Tag Antenna Parameters on Read Range of UHF Passive RFID System

    The performance RFID system is dependent on many factors. Read Range is one factor which describes the performance of passive RFID system. Read range depends on the parameters of both the reader and the tag. It also depends on its application environment. This paper gives a brief introduction to an...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Design & Development of "Programmable Security Controller (PSC) (A Nanotechnology Device)" for WiMAX/WiFi Wireless Communication

    WiMAX (World-wide Interoperability for Microwave Access) will offer broadband wireless access at data rate of multiple mega bits per second to the end-user within a range of several kilometers. WiMAX is a complement to fixed, portable and mobile access for wireless communications. Application of nanotechnology is taking place in WiMAX/Wi-Fi...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    DHT Based Routing Protocols for MANETs: A Survey

    A Mobile Ad-hoc NETwork (MANET) is a temporary wireless network composed of mobile nodes, in which there is no infrastructure. The mobile nodes can dynamically exchange data among themselves. Because of these characteristics, path connecting source nodes with destination may be very unstable and go down at any time, making...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    MANET Internet Integration: A Survey Based Study

    Mobile ad hoc network being easy to deploy, self organized, flexible and independent of any pre-established infrastructure has become main component of research. But the research in the field of ad hoc network is restricted to stand-alone isolated networks. To widen the network coverage and application domain of ad hoc...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Secure Authentication Scheme for Mobile Ad Hoc Networks

    In Mobile Ad hoc NETworks (MANETs), it is easy to launch wormhole, man-in-the-middle and Denial of Service (DoS) attacks, or to impersonate another node. The authors' studies show that there are performance and security problems with the existing authentication and keying mechanisms which are currently employed by wireless ad hoc...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Capacity and Cell Range Assessment for Multitraffic User in Mobile WiMAX

    Radio technology advanced rapidly to enable transmission over larger distances with better quality, less power, smaller and cheaper devices. A cursory look into the history of wireless communications will reveal that every new wireless system improved on previous ones. The chance for WiMAX (IEEE -802.16e-2005 standard) to serve those who...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Two Phase Energy Optimisation in Android Phones

    'Computing eats up energy' - and it's not a trivial matter. Processors are said to be the incipient of modern day computing era. Deploying the best processor is always marked by the one which leads to highest efficiency in energy saving without degrading system's performance. In this battle-ground of Excellency...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Dynamic Periphery Multicast Routing Protocol

    In this paper, the authors describe a new multicast routing protocol for mobile ad hoc wireless networks. The protocol establishes a source based mesh of nodes called with no static periphery or zone to distribute data for that source. The notion of zone or a flooding group is different the...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Propagation Path Loss Measurements and Spline Interpolation for Missing Data

    Now-a-days the most of straight wired network systems are replaced by the wireless network systems. The authors know the main difference in between these two is the change from a fixed network location to mobile network location, i.e., an address is no longer a physical location and an address will...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Handover Probability Analysis for B3G Heterogeneous Wireless Networks

    Wireless communications play an important role for providing global information access to the users. One of the main challenges for seamless mobility is the availability of simple and robust handoff algorithms, which allow a mobile node to roam among heterogeneous wireless networks and also meets the challenges for the emerging...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Identifying Mischievous Users in Private Networks and Status Updating in Android Mobile

    Basically in anonymizing networks users privately access Internet services with the help of routers; the reason behind this is to hide the user's IP address. The disadvantage here is that users are taking advantage of this to deface websites. To overcome this problem administrator tries to block IP address of...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    ERP IN E-Business World

    ERP is the acronym for Enterprise Resource Planning. ERP is a software application to improve the performance of organizations' resource planning, management control and operational control. ERP software is multi-module application software that integrates activities across functional departments, from product planning, parts purchasing, inventory control, product distribution, order tracking. This...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Multi Criteria Based Multicast Routing for Wireless Mobile Ad Hoc Networks

    Mobile ad hoc network is a collection of independent mobile nodes that can communicate to each other via radio waves. The mobile nodes that are in radio range of each other can directly communicate whereas the others need the aid of intermediate nodes to route their packets. These networks are...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Static Voltage Stability Indication in a Power System Using ANN

    The paper presents an approach for indication of static voltage stability conditions of a power system using Artificial Neural Network (ANN) as a correlator to correlate voltage stability index and bus loading index and corresponding bus voltage. The approach uses voltage stability indices and bus loading indices along with bus...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Improved ODMRP With Motion Detection Approach

    Many network applications require transmitting the same single copy of data packets concurrently to many destinations. Applying the infrastructure-based multicast routing protocols in Mobile Ad hoc wireless NETworks (MANETs) is a big challenge. Factors that make Multicasting in ad hoc networks is more complex than in wired networks are host...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Interworking of 3G and 802.11 Networks: Present and the Future Ahead

    With the wide-spread deployment of 3G services in most of the countries and continuous increasing demand of Smartphones and iPhones, past has experienced a substantial increase in cellular data traffic. Since the licensed spectrum over which the 3G services are delivered is costly and scarce, mobile operators have already started...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Multicast Genetic Zone Routing Protocol

    Multicast Zone Routing Protocol (MGRP) is the most promising and widely accepted and well proved hybrid routing protocol in Mobile Ad-hoc NETworks (MANETs) for its performance when compared in order to load balance the network, with table-driven demand protocols. This study is aimed to provide a set of available paths...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Mobile Crawler Using Aglets Technology Instead Web Crawlers

    To search Information on the Internet (World Wide Web) users make use of search engines. To search the user's information search engines make use of the Web Crawlers. Web crawlers has to index millions of web pages to make the searching efficient, also web crawlers has to visit the web...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    A Pragmatic Study of Underwater Acoustic Sensor Network and Global Wireless Network

    Two third of the earth is covered with water and there has been a growing interest in monitoring underwater medium for scientific exploration and attack protection. Underwater sensor nodes will find application in ocean-graphic data collection, pollution monitoring, disaster prevention and tactical surveillance application. Underwater network consist of a variable...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    VLSI Based Wireless Sensor Network For Signal Classification

    The tremendous increase in the Wireless Sensor Network (WSN) in the last decade has increased the potential applications including environment monitoring, smart spaces, medical systems, and robotics exploration. Sensors integrated into structures, machinery, and the environment has led to fewer catastrophic failures, conservation of natural resources, improved manufacturing productivity, improved...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Spectral Entropy Based VAD Using Teager Energy Operator and HOS

    In this paper, the authors presents Voice Activity Detection (VAD) algorithm for detecting voice in noisy environments. The presented robust VAD utilizes the Spectral Entropy (SE) with Teager Energy Operator (TEO) to provide a better representation of formant information resulting in high performance of classification of speech/non-speech priori to entropy...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Survey Report on Implementation of Optimized Cryptographic Algorithm

    Cryptography has a long and fascinating history. Over the centuries, an elaborate set of protocols and mechanisms has been created to deal with information security issues when the information is conveyed by physical documents. Cryptographic algorithms are widely used in Internet Systems. Applications of cryptographic algorithms include credentials establishment i.e....

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    A Proposed Architecture for Agent Communication Manager in Mobile Ad-hoc Network

    In this paper, the authors are going to introduce the proposed architecture for agent communication manager in MANETS. Here they are introducing a manager for agent communication that support the dynamic as well the static infrastructure according to the nature of the problem. The architecture proposed by them consists of...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Performance Analysis of Convolutionaly Coded MC-CDMA System Using Modulation Techniques

    Orthogonal Frequency Division Multiplexing (OFDM) has recently gained a lot attention and is a potential candidate for Fourth Generation (4G) wireless systems because it promises data rates up to 10Mbps. A variation of OFDM is Multi-Carrier CDMA (MC-CDMA) which is an OFDM technique where the individual data symbols are spread...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    A Survey on Cryptographic Techniques for Privacy Preserving Data Mining

    Data security is a major and increasingly interested area of research in data mining. Cryptographic techniques have proved beneficial in secured distributed computation. Many techniques have been under research to achieve privacy protection for sensitive data. In this paper, the authors first provide an overview on important cryptographic techniques used...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Learning of Classification Rules Through Ant Colony Optimization Method

    Ant Colony Optimization (ACO) algorithm is gaining major interest as a well-known meta heuristic technique. ACO has a prospective application as a data classifier. The use of ant miner may become very effective for learning of classification rules. Nowadays the field of multi objective optimization is dealing with such mission...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Conditional Functional Dependencies in Data Cleaning

    Functional dependency is an important feature for referencing to the relationship between attributes and candidate key in tuples. It also shows the relationship between entities in a data world. For data cleaning one typically needs a simple extension of traditional FDs that suffices to capture data inconsistencies commonly found in...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Cost Effective and Flexible Database Design Using Parameter Tables

    Software costs form a major chunk of the total cost of any IT initiative since the hardware costs have gone down drastically due to advances in the hardware sector. The software costs consist of developmental and operational costs. The quality of Database design has a huge impact on these costs....

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Comparison of Data Mining and Web Mining

    The increasing amount of web data available in static websites - web1.0, dynamic websites - web2.0 and semantic websites - web3.0 on the world wide web is becoming one of the most valuable resources for information retrieval and knowledge discovery. The known fact information and knowledge management, data mining and...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    An Architecture for Mining WEB Content Hosted on Clustered Backend Servers

    Web content mining is mining of various types of content that include Text, Images, data, etc that are provided in terms of various types of WEB resources that include HTML, DHTML, XML, PHP, JSP, ASP, DLL etc. Sometimes the entire WEB content is horizontally portioned and each of the partition...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Analysis of Security Threats and Performance Evaluation of Some Block Structured Ciphers

    The essential technology underlying virtually all automated networks and computer security applications is encryption. The hackers try their effort in concealing, fabricating and intercepting the transmitted data by attacking the information security system. These security threats are classified as passive and active threats. In this paper, the authors have made...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Data Mining Application in Management Studies

    Despite the importance of data mining techniques to Customer Relationship Management (CRM), there is a lack of a comprehensive literature review and a classification scheme for it. This is the first identifiable academic literature review of the application of data mining techniques to CRM. It provides an academic database of...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    An Approach to Cognition Built-In Knowledge Discovery

    Knowledge discovery is a data mining problem. Data mining is complex especially when the data size huge. Efficient data mining algorithms are required for mining large size data. It has been provided that knowledge base is required which is nothing but user beliefs, experiences and intuitive thinking for mining useful...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Area Efficient Architecture for VLSI Implementation of Wavelet Packet Decomposition

    Interest in wavelet transformation has greatly increased as their applications become more numerous. Traditional digital signal -processors have limited capabilities for processing such high volume data efficiently at real-time or near real-time. This paper is directed towards improving the Convolutional architecture for implementing Wavelet Packet Decomposition (WPD). This paper presents...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    VLSI Design Approach for Efficient Pattern Recognition Algorithms: Review

    The increasing demands of speed and performance in pattern recognition and machine intelligence generated a revolutionary super-computing technology. VLSI technology, which possesses properties of low-cost, high-speed and massive computing capabilities, is a suitable design solution. Due to the fast progress of VLSI technology, algorithm-oriented array architectures appear to be effective,...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Low Power & Low Noise Operational Amplifier

    In this paper, the authors discuss the background and motivation behind the low power low noise operational amplifier. This paper also discusses the need of low noise and low power amplifier and its applications. In concern of power, a low power design has made a revolutionary change in the people...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2012

    A Proposed Cryptographic Algorithm Provides Better Data Security

    RSA algorithm uses integer factorization as the backbone of data security while Diffie-Hellman Algorithm uses Discrete Logarithm to provide platform for secure key exchange. In this paper, the authors provide algorithm to merge both of them to provide a user with even higher level of data security. Actually, their intent...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2012

    Mobile Payment System-A Secure Approach

    This paper is to design a complete architecture and model of SMS-based mobile payment system, which could be used to implement a wireless platform for transferring money from one person to other person, paying utility bills and etc. Mobile communication devices have become popular tools for gathering and disseminating information...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2012

    Polling Algorithm for Dynamic Bandwidth Distribution in LR-PON

    With the advances in optical technology, long-reach PON increased the span of a broadband access network using PON technology from today's standard of 20 km to 100 km or higher. This technology can enable broadband access for a large number of customers in the access/metro area. In LR-PON the propagation...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2012

    Two Layer Intrusion Detection System for Mobile Devices

    In recent years, the usage of mobile devices has increased like anything. Mobile devices are more used for gaming, video streams, transferring files, connecting to internet rather than voice or text communication. At this point of time, a strong Intrusion Detection System (IDS) for mobile devices is must. Even though...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2011

    Implementation of Cryptography on Grey Scale Images

    Visual cryptography place a vital role in present day's where security is required i.e., where the third party should not extract the secret image. Secret hiding techniques have recently become important in a number of application areas. Research and Development over the past years has lead to significant advances in...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2011

    Comparative Study of IPv4 and IPv6

    Data Communication and networking may be the fastest growing technologies in the people culture today. One of the ramifications of that growth is a dramatic increase in the number of professions-where an understanding of these technologies is essential for success. One of such technology is Internet Protocol. It is the...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2011

    Network Design With Server Configuration and Traffic Monitoring Perspective of Bangladesh Government

    The world today is a miracle of technologies, a dream of the past and a base of the future on which men imagine the lifestyle of coming days. In this paper, networking project "Network design with server configuration and traffic monitoring" of secretariat of Bangladesh government will be designed using...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2011

    A Review of Data Caching Techniques for Mobile Ad Hoc Networks

    Data caching is a technique used in mobile ad hoc networks to improve data accessibility. The ad hoc networks are multi hop networks without a central base station and are resource constrained in terms of channel bandwidth and battery power. By data caching the communication cost can be reduced in...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2011

    Distributed Secure Routing Protocol to Support Ad-Hoc Mobile Computing

    Most recent ad hoc network research has focused on providing routing services without considering security. In this paper, the authors detail security threats against ad hoc routing protocols, specifically examining AODV and DSR. In this paper, they presents a new, simple and bandwidth-efficient distributed routing protocol for ad-hoc mobile networks....

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2011

    Performance Study on the Existing Pure ALOHA and Modified (Proposed) Pure ALOHA Anti-Collision Protocols for RFID Network

    This paper is based on Pure ALOHA protocol in Radio Frequency Identification. Theoretical throughput analysis of the existing pure ALOHA was done and simulation was carried out for the same in the MATLAB. The results on throughput, number of collision and identification time was compared between the existing Pure ALOHA...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2011

    Energy Aware Performance Comparison of MANET Routing Protocols Under Different Energy Models

    Mobile Ad hoc NETworks (MANETs) consist of mobile nodes which have no fixed infrastructure. The mobile nodes have limited battery energy, which makes it very important to use energy efficiently in ad hoc networks. In order to maximize the lifetime of ad hoc networks, packet should be sent via a...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2011

    Novel Security Architecture and Mechanism for Identity Based Information Retrieval System in MANET

    It has become a prime concern for providing security while communication between mobile nodes in Mobile Ad Hoc NETworks (MANETs), due to its unique characteristics like rapid movement of node in infrastructure less network that's changes it's topology. It pose a number of non-trivial clustering and security like problems in...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2011

    Network Reliability and Fault Tolerance

    This paper introduces the main issues related to the design and analysis of fault-tolerant systems. Mobile ad-hoc networks are making a new class of mobile applications feasible. They benefit from the fast deployment and reconfiguration of the networks, are mainly characterized by the need to support many-to-many interaction schema within...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    Advanced Vehicle Positioning and Secured System

    This paper discussed a kind of design of vehicle location system based on ARM. The architecture and working theory of this system is introduced in details, and introduces the vehicle location system which uses the ARM microprocessors LPC2129 as a control unit to combinative with GPS LR9548 and GSM TC35...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    VLSI Implementation and Analysis of Cryptographic Algorithms for RC5 and Triple Data Encryption Standard

    In an age of technological advancements, security and privacy plays an important role in the day-to-day communications. With the advent of the internet, data security has become a topic of utmost importance. Through this paper, the authors wish to address this concern by carrying out a comparative analytical study of...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    A Survey on Cryptographic Techniques for Privacy Preserving Data Mining

    Data security is a major and increasingly interested area of research in data mining. Cryptographic techniques have proved beneficial in secured distributed computation. Many techniques have been under research to achieve privacy protection for sensitive data. In this paper, the authors first provide an overview on important cryptographic techniques used...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Learning of Classification Rules Through Ant Colony Optimization Method

    Ant Colony Optimization (ACO) algorithm is gaining major interest as a well-known meta heuristic technique. ACO has a prospective application as a data classifier. The use of ant miner may become very effective for learning of classification rules. Nowadays the field of multi objective optimization is dealing with such mission...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Conditional Functional Dependencies in Data Cleaning

    Functional dependency is an important feature for referencing to the relationship between attributes and candidate key in tuples. It also shows the relationship between entities in a data world. For data cleaning one typically needs a simple extension of traditional FDs that suffices to capture data inconsistencies commonly found in...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Cost Effective and Flexible Database Design Using Parameter Tables

    Software costs form a major chunk of the total cost of any IT initiative since the hardware costs have gone down drastically due to advances in the hardware sector. The software costs consist of developmental and operational costs. The quality of Database design has a huge impact on these costs....

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    Enhance DataBase Performance With Clustering Algorithm

    Clustering, in data mining is useful for discovering groups and identifying interesting distributions in the underlying data and to fast query processing. Traditional clustering algorithms favor clusters with either spherical shapes or with similar sizes. The traditional algorithms are very fragile in the presence of outliers. The authors propose clustering...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Comparison of Data Mining and Web Mining

    The increasing amount of web data available in static websites - web1.0, dynamic websites - web2.0 and semantic websites - web3.0 on the world wide web is becoming one of the most valuable resources for information retrieval and knowledge discovery. The known fact information and knowledge management, data mining and...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    An Architecture for Mining WEB Content Hosted on Clustered Backend Servers

    Web content mining is mining of various types of content that include Text, Images, data, etc that are provided in terms of various types of WEB resources that include HTML, DHTML, XML, PHP, JSP, ASP, DLL etc. Sometimes the entire WEB content is horizontally portioned and each of the partition...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Analysis of Security Threats and Performance Evaluation of Some Block Structured Ciphers

    The essential technology underlying virtually all automated networks and computer security applications is encryption. The hackers try their effort in concealing, fabricating and intercepting the transmitted data by attacking the information security system. These security threats are classified as passive and active threats. In this paper, the authors have made...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    Dynamic Clustering Approaches to Accord Updates in the Data Warehouse

    Data warehouses form the basis for performing data mining tasks such as classification and clustering. A data warehouse is constructed from multiple databases. Whenever the databases are updated, they are not immediately applied to the data warehouse. Typically updates are collected and applied to the data warehouse periodically. Then all...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Data Mining Application in Management Studies

    Despite the importance of data mining techniques to Customer Relationship Management (CRM), there is a lack of a comprehensive literature review and a classification scheme for it. This is the first identifiable academic literature review of the application of data mining techniques to CRM. It provides an academic database of...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    An Approach to Cognition Built-In Knowledge Discovery

    Knowledge discovery is a data mining problem. Data mining is complex especially when the data size huge. Efficient data mining algorithms are required for mining large size data. It has been provided that knowledge base is required which is nothing but user beliefs, experiences and intuitive thinking for mining useful...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2011

    Performance Measurement of Oracle Database

    Database tuning in modern database systems requires a lot of expertise is very time consuming and often misdirected. Tuning attempts often lack a methodology that has a holistic view of the database. The absence of historical diagnostic information to investigate performance issues at first occurrences exacerbates the whole tuning process...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2011

    Switching to Sphere-Shaped Display on Surface Computing

    Sphere is mainly a kind of multiple-user and the multiple-touch sensitive type of surface computing application. Infact the display is on the outer surface of the sphere rather than on the flat screen. It mainly uses the infrared cameras for the touch sensing purposes and the projectors are mainly used...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2011

    Performance Analysis & Enhancements in Intrusion System for Wireless Local Area Networks

    A Wireless Local Area Network (LAN) is a Radio Frequency (RF) data communications system. WLANs transmit and receive data Over The Air (OTA) and thus collectively combine data connectivity with ease of mobility. Wireless LANs today provide wireless access to vital network resources such as large, multi-location enterprises, small and...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2011

    Data Mining: A Tool for the Enhancement of Banking Sector

    Data mining is emerging as a very useful tool for providing valuable information from large databases and enabling managers and business executives to make hard core decisions in a much easier and effective manner. It is a process of analyzing the data from various perspectives and summarizing it into valuable...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2011

    Protection of Users in Multimedia Communication Along With Data

    As the use of ubiquitous multimedia communication increases so do the privacy risks associated with widespread accessibility and utilization of data generated by such applications. Most invasions of privacy are not intentional but due to designers inability to anticipate how this data could be used, by whom, and how this...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2011

    Data Warehouse Processes: An Multidimensional Meta Modeling Framework

    Data warehouses are complex systems consisting of many components which store highly aggregated data for decision support. Due to the role of the data warehouses in the daily business work of an enterprise, the requirements for the design and the implementation are dynamic and subjective. The nature of the work...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2011

    User Identification & Authentication System Based on ZIGBEE

    The authors propose a system which is based on Zigbee technology named as 'User identification & authentication system based on Zigbee' which has a central database of authorized particular user, Zigbee RF user tags, RF tag Reader and RF tag Writer. Zigbee is based on IEEE 802.15.4 standard for Wireless...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2011

    Comparison of Data Mining Versus Traditional Analysis in Textile Business

    The textile industry is also realizing that it is possible to gain a competitive advantage utilizing data mining. With the exponential growth in the amount of data being collected, improvements in technology, and research in machine learning are now able to reduce the ever growing difficult and complex decision making...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2011

    A Study About Data Mining in Terms of Web & Text Mining: Its Trends, Issues Applications and Challenges

    In present business scenario, databases have been playing a crucial role in providing useful information for decision making regarding various marketing plans and strategies, from years. DBMS supports query languages which are useful for query triggered data exploration, whereas data mining supports automatic data exploration. Data mining is the discovery...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    A Novel Technique to Secure Communication Using Chaos Generated by Non-Linear Circuits

    Secure communication is effected by encoding and decoding a simple message using chaotic non-linear circuits. A Non Linear Circuit is designed for generating the chaos in its output voltage. Time evolutions of generated chaos are studied with respect to two of the operating parameters of the circuit. Chaotic regimes of...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    Dynamic Evaluation Model for Threshold Cryptography in MANETS

    A Mobile Ad hoc NETwork (MANET) is a collection of low-power, wireless, mobile nodes forming a temporary network without the aid of any established infrastructure or centralized administration. In comparison with traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure instead hosts rely on each...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    An Implementation of Multi-Path Dynamic Routing for Computing and Constrained Mobile Ad-Hoc Network Environment

    Wireless mobile ad-hoc networks are classified as networks where nodes are logically connected with each other. These types of networks do not have fixed topology due to the mobility property of nodes, interference, propagation and loss of path. Hence a dynamic source routing protocol is required for these networks to...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    A Survey on Unicast and Multicast Routing Protocols for Mobile Ad-Hoc Networks

    A Mobile Ad-hoc NETwork (MANET) is a self-configuring network composed of mobile nodes without any fixed infrastructure. In a MANETs, there are no difference between a host node and a router so that all nodes can be source as well as forwarders of traffic. Moreover, all MANET components can be...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    Intrusion Detection System in Ad-Hoc Network

    Intrusion detection prevention measures, such as encryption and authentication can be used in ad-hoc networks to reduce intrusions but cannot eliminate them. For example, encryption and authentication cannot defend against compromised mobile nodes, which often carry private keys. Integrity validation using redundant information (from different nodes), such as those being...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    A Novel Approach for Efficient Delay Tolerant Networks Using Conditional Shortest Path Routing

    This paper deals with Delay Tolerant Networks (DTNs) where each node knows the probabilistic distribution of contacts with other nodes. Delay tolerant networks are characterized by the sporadic connectivity between their nodes and therefore the lack of stable end-to-end paths from source to destination. Since the future node connections are...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    Improving Network Processing Technique in Internet Controlled Embedded Systems

    The RTCS Embedded Internet stack provides IP networking for the MQX platform. RTCS is provided with a rich assortment of TCP/IP networking application protocols and uses the MQX RTOS drivers for Ethernet or serial connectivity. RTCS is tightly integrated with the latest ColdFire and Power Architecture processors from Freescale and...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    Secure Usability Design System for User Authentication

    The term usable authentication is been brought about as a result of issues surrounding user memorabiilty. Computer users find it less easy to memorize plain text password compared to images or graphics. Researchers have over the years presented several authentication schemes in an effort to provide users with a usable...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    Performance Evaluation of Different Level Modulation Schemes for an Efficient Mobile WiMAX System in OFDM Under Rayleigh Fading and AWGN Channel

    Mobile WiMAX technology has become one of the fastest growing arenas of internet accessing in the people modern daily life. WiMAX is introduced by the Institute of Electrical and Electronic Engineers (IEEE) to provide a worldwide interoperability for microwave access. IEEE 802.16e-2005 has been developed for mobile wireless communication which...

    Provided By International forum of researchers Students and Academician