International Journal of Power Control Signal and Computation (IJPCSC)

Displaying 1-13 of 13 results

  • White Papers // Mar 2012

    Network Monitoring Using SNMP Protocol

    SNMP (Simple Network Management Protocol) monitor is used to manage agents in a network by collecting network-related parameters. The development of Network Monitor is capable of extracting valid parameters from an SNMP agent. These parameters predefined in management information base (MIB). It is makes an interactive environment between the SNMP...

    Provided By International Journal of Power Control Signal and Computation (IJPCSC)

  • White Papers // Mar 2012

    Towards Privacy Preservation Against Traffic Analysis in Wireless Networks

    Due to the open wireless medium, Multi-hop Wireless Networks MWNs are susceptible to various attacks, such as traffic analysis and flow tracing can be launched by the malicious adversaries. Different from previous schemes, the authors investigate the privacy issue from a brand new perspective using network coding to achieve privacy...

    Provided By International Journal of Power Control Signal and Computation (IJPCSC)

  • White Papers // Mar 2012

    Embedded Based Remote Control Application Using Mobile Phone in Irrigation

    This paper provides the development of mobile phones as remote control application for the induction motor-pump which is used in the agriculture for irrigation. Due to frequent power cuts and abnormal voltage conditions in India, it is necessary to distribute water efficiently to the fields during normal conditions. This is...

    Provided By International Journal of Power Control Signal and Computation (IJPCSC)

  • White Papers // Mar 2012

    A Secure Key Transfer in Decentralized Secure Group Communication

    In this paper, the authors mainly focus storage, computation, communication cost for secure dynamic multicast key distribution. Efficient key distribution is an important problem in secure group communication. Members in the groups are dynamic. They required new key update by using some encryption algorithm during the time of member join...

    Provided By International Journal of Power Control Signal and Computation (IJPCSC)

  • White Papers // Mar 2012

    VLSI Implementation of Fast Convolution Based 2-D Discrete Wavelet Transform for High Speed, Area Efficient Image Computing

    A VLSI design approach of a high speed and real-time 2-D Discrete Wavelet Transform computing is being presented in the paper. The proposed architecture, based on new and fast convolution approach, reduces the hardware complexity in addition to reduce the critical path to the multiplier delay. Furthermore, an advanced Two...

    Provided By International Journal of Power Control Signal and Computation (IJPCSC)

  • White Papers // Mar 2012

    Blocking Misbehaving Users In Anonymizying Networks- Embedded Based

    Anonymizing networks such as Tor allow users to access Internet services privately by using a series of routers to hide the client's IP address from the server. The success of such networks, however, has been limited by users employing this anonymity for abusive purposes such as defacing popular Web sites....

    Provided By International Journal of Power Control Signal and Computation (IJPCSC)

  • White Papers // Mar 2012

    Wireless Fingerprint Attendance System Using ZigBee Technology

    In this paper provides the design method of wireless fingerprint attendance system based on ZigBee technology. The system includes terminal fingerprint acquisition module and attendance management module through computer. It can realize automatically such functions as information acquisition of fingerprint, processing, wireless transmission, fingerprint matching, and attendance management. Considering the...

    Provided By International Journal of Power Control Signal and Computation (IJPCSC)

  • White Papers // Mar 2012

    Service Oriented Architecture Using ISO RM-ODP With Respect to Engineering and Technology Viewpoints

    The proposed Service Oriented Architecture using ISO Reference Model for Open Distributed Processing is a high performance technique for providing effective services to the users. This architecture consists of five different viewpoints namely Enterprise viewpoint, Computational viewpoint, Information viewpoint, Engineering viewpoint and Technology viewpoint. This paper discusses the details about...

    Provided By International Journal of Power Control Signal and Computation (IJPCSC)

  • White Papers // Aug 2011

    Autonomous Toll Controlling Operation and Taxing Methodology Using RFID

    Autonomous Controller is a paradigm that mainly focuses on the technological advances made in the field of Artificial Intelligence. Autonomous Toll Controlling Operation is basically a concept which is being introduced to make the toll taxing over the toll plaza gates done automatically. Using e-commerce & automation mechanisms, the authors...

    Provided By International Journal of Power Control Signal and Computation (IJPCSC)

  • White Papers // Aug 2011

    Comparison of CDMA-OFDM and CP-OFDM Using Alamouti Scheme in MIMO Systems

    This paper deals with a combination of OFDM and the Alamouti scheme for transmission of digital information. First the OFDM modulation scheme is presented. The Alamouti decoding scheme cannot be directly applied to OFDM modulation. The Alamouti coding scheme requires a complex orthogonality property; whereas OFDM only provides real orthogonality....

    Provided By International Journal of Power Control Signal and Computation (IJPCSC)

  • White Papers // Jun 2011

    A Steno Hiding Using Camouflage Based Visual Cryptography Scheme

    This paper deals with an Integrated Secured Data Communication Using Visual Cryptography. Idea of visual cryptography is to hide a secret image in different images called shares or cover images. This concept achieves lossless recovery and reduces the noise in the cover images and also enhances the quality of cover...

    Provided By International Journal of Power Control Signal and Computation (IJPCSC)

  • White Papers // Jun 2011

    Energy Reduction and Delay Minimization in Wireless Sensor Networks Through ASIPS

    Low energy consumption is a major design constraint for battery operated embedded systems such as wireless sensor networks or WSN. Low energy is more important compared to low power for such systems as it will increase lifetime of the system. The major component which can reduce energy is to reduce...

    Provided By International Journal of Power Control Signal and Computation (IJPCSC)

  • White Papers // Jun 2011

    Processing and Performance of Text File Format on Different Data Storage Systems

    Text is the Data, that consists of characters representing the words and symbols of human speech and usually, characters coded according to the ASCII standard, which assigns numeric values to numbers, letters, and certain symbols. Text is obviously the simplest of data type and required the learn amount of storage...

    Provided By International Journal of Power Control Signal and Computation (IJPCSC)

  • White Papers // Mar 2012

    Network Monitoring Using SNMP Protocol

    SNMP (Simple Network Management Protocol) monitor is used to manage agents in a network by collecting network-related parameters. The development of Network Monitor is capable of extracting valid parameters from an SNMP agent. These parameters predefined in management information base (MIB). It is makes an interactive environment between the SNMP...

    Provided By International Journal of Power Control Signal and Computation (IJPCSC)

  • White Papers // Mar 2012

    Towards Privacy Preservation Against Traffic Analysis in Wireless Networks

    Due to the open wireless medium, Multi-hop Wireless Networks MWNs are susceptible to various attacks, such as traffic analysis and flow tracing can be launched by the malicious adversaries. Different from previous schemes, the authors investigate the privacy issue from a brand new perspective using network coding to achieve privacy...

    Provided By International Journal of Power Control Signal and Computation (IJPCSC)

  • White Papers // Mar 2012

    Embedded Based Remote Control Application Using Mobile Phone in Irrigation

    This paper provides the development of mobile phones as remote control application for the induction motor-pump which is used in the agriculture for irrigation. Due to frequent power cuts and abnormal voltage conditions in India, it is necessary to distribute water efficiently to the fields during normal conditions. This is...

    Provided By International Journal of Power Control Signal and Computation (IJPCSC)

  • White Papers // Mar 2012

    A Secure Key Transfer in Decentralized Secure Group Communication

    In this paper, the authors mainly focus storage, computation, communication cost for secure dynamic multicast key distribution. Efficient key distribution is an important problem in secure group communication. Members in the groups are dynamic. They required new key update by using some encryption algorithm during the time of member join...

    Provided By International Journal of Power Control Signal and Computation (IJPCSC)

  • White Papers // Mar 2012

    VLSI Implementation of Fast Convolution Based 2-D Discrete Wavelet Transform for High Speed, Area Efficient Image Computing

    A VLSI design approach of a high speed and real-time 2-D Discrete Wavelet Transform computing is being presented in the paper. The proposed architecture, based on new and fast convolution approach, reduces the hardware complexity in addition to reduce the critical path to the multiplier delay. Furthermore, an advanced Two...

    Provided By International Journal of Power Control Signal and Computation (IJPCSC)

  • White Papers // Mar 2012

    Blocking Misbehaving Users In Anonymizying Networks- Embedded Based

    Anonymizing networks such as Tor allow users to access Internet services privately by using a series of routers to hide the client's IP address from the server. The success of such networks, however, has been limited by users employing this anonymity for abusive purposes such as defacing popular Web sites....

    Provided By International Journal of Power Control Signal and Computation (IJPCSC)

  • White Papers // Mar 2012

    Wireless Fingerprint Attendance System Using ZigBee Technology

    In this paper provides the design method of wireless fingerprint attendance system based on ZigBee technology. The system includes terminal fingerprint acquisition module and attendance management module through computer. It can realize automatically such functions as information acquisition of fingerprint, processing, wireless transmission, fingerprint matching, and attendance management. Considering the...

    Provided By International Journal of Power Control Signal and Computation (IJPCSC)

  • White Papers // Mar 2012

    Service Oriented Architecture Using ISO RM-ODP With Respect to Engineering and Technology Viewpoints

    The proposed Service Oriented Architecture using ISO Reference Model for Open Distributed Processing is a high performance technique for providing effective services to the users. This architecture consists of five different viewpoints namely Enterprise viewpoint, Computational viewpoint, Information viewpoint, Engineering viewpoint and Technology viewpoint. This paper discusses the details about...

    Provided By International Journal of Power Control Signal and Computation (IJPCSC)

  • White Papers // Aug 2011

    Autonomous Toll Controlling Operation and Taxing Methodology Using RFID

    Autonomous Controller is a paradigm that mainly focuses on the technological advances made in the field of Artificial Intelligence. Autonomous Toll Controlling Operation is basically a concept which is being introduced to make the toll taxing over the toll plaza gates done automatically. Using e-commerce & automation mechanisms, the authors...

    Provided By International Journal of Power Control Signal and Computation (IJPCSC)

  • White Papers // Aug 2011

    Comparison of CDMA-OFDM and CP-OFDM Using Alamouti Scheme in MIMO Systems

    This paper deals with a combination of OFDM and the Alamouti scheme for transmission of digital information. First the OFDM modulation scheme is presented. The Alamouti decoding scheme cannot be directly applied to OFDM modulation. The Alamouti coding scheme requires a complex orthogonality property; whereas OFDM only provides real orthogonality....

    Provided By International Journal of Power Control Signal and Computation (IJPCSC)

  • White Papers // Jun 2011

    A Steno Hiding Using Camouflage Based Visual Cryptography Scheme

    This paper deals with an Integrated Secured Data Communication Using Visual Cryptography. Idea of visual cryptography is to hide a secret image in different images called shares or cover images. This concept achieves lossless recovery and reduces the noise in the cover images and also enhances the quality of cover...

    Provided By International Journal of Power Control Signal and Computation (IJPCSC)

  • White Papers // Jun 2011

    Energy Reduction and Delay Minimization in Wireless Sensor Networks Through ASIPS

    Low energy consumption is a major design constraint for battery operated embedded systems such as wireless sensor networks or WSN. Low energy is more important compared to low power for such systems as it will increase lifetime of the system. The major component which can reduce energy is to reduce...

    Provided By International Journal of Power Control Signal and Computation (IJPCSC)

  • White Papers // Jun 2011

    Processing and Performance of Text File Format on Different Data Storage Systems

    Text is the Data, that consists of characters representing the words and symbols of human speech and usually, characters coded according to the ASCII standard, which assigns numeric values to numbers, letters, and certain symbols. Text is obviously the simplest of data type and required the learn amount of storage...

    Provided By International Journal of Power Control Signal and Computation (IJPCSC)