Interscience Open Access Journals

Displaying 1-40 of 434 results

  • White Papers // Oct 2013

    Comparative Study of Multi User Broadcast Authentication in Wireless Sensor Network

    Wireless Sensor Network (WSN) is an emerging technology consisting of spatially distributed sensor nodes, which can cooperatively monitor physical or environmental conditions. The major resource constrain of WSN are, low processing, energy and storage capabilities. Broadcast is widely used communication method in WSN environment. In most of the sensor networks,...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2013

    Method to Achieve Security and Storage Services in Cloud Computing

    Cloud storage enables users to remotely store their data and enjoy the on-demand high quality cloud applications without the burden of local hardware and software management. Though the benefits are clear, such a service is also relinquishing users' physical possession of their outsourced data, which inevitably poses new security risks...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2013

    Analysis of Facial Marks to Distinguish Between Identical Twins Using Novel Method

    Reliable and accurate verification of people is extremely important in a number of business transactions as well as access to privileged information. The biometrics-based methods assume that the physical characteristics of an individual (as captured by a sensor) used for verification are sufficiently unique to distinguish one person from another....

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2013

    Effective Event Derivation of Uncertain Events in Rule-Based Systems

    There is a growing need for systems that react automatically to events. While some events are generated externally and deliver data across distributed systems, others need to be derived by the system itself based on available information. Unpredictability of future events which influence the outcome of the present decisions but...

    Provided By Interscience Open Access Journals

  • White Papers // Sep 2013

    Smc Protocol for Distributed K- Anonymity

    Secure multiparty protocols have been proposed to enable non colluding parties to cooperate without a trusted server. Even though such protocols put off information expos

    Provided By Interscience Open Access Journals

  • White Papers // Sep 2013

    A Bio Genetic Process to Replicas-Free Repository

    Several systems that rely on consistent data to offer high-quality services, such as digital libraries and ecommerce brokers, may be affected by the existence of duplicates, quasi replicas, or near-duplicate entries in their repositories. Because of that, there have been significant investments from private and government organizations for developing methods...

    Provided By Interscience Open Access Journals

  • White Papers // Sep 2013

    Attack Against Anonymity Using Cell Counting

    Various low-latency anonymous communication systems such as Tor and Anonymizer have been designed to provide anonymity service for users. In order to hide the communication of users, most of the anonymity systems pack the application data into equal-sized cells. Via extensive experiments on Tor, the authors found that the size...

    Provided By Interscience Open Access Journals

  • White Papers // Sep 2013

    Minimization of Mobile Ad Hoc Networks Routing Attacks Using Ds Mathematical Theory

    Mobile Ad-hoc NETworks (MANET) have been highly vulnerable to attacks due to the dynamic nature of its network infrastructure. Among these attacks, routing attacks have received considerable attention since it could cause the most devastating damage to MANET. Even though there exist several intrusions response techniques to mitigate such critical...

    Provided By Interscience Open Access Journals

  • White Papers // Sep 2013

    Entity Extraction Using Statistical Methods Using Interactive Knowledge Mining Framework

    There are various kinds of valuable semantic information about real-world entities embedded in web pages and databases. Extracting and integrating these entity information from the Web is of great significance. Comparing to traditional information extraction problems, web entity extraction needs to solve several new challenges to fully take advantage of...

    Provided By Interscience Open Access Journals

  • White Papers // Sep 2013

    VOD Streaming with a Network Coding Equivalent Content Distribution Scheme

    Although random access operations are desirable for on-demand video streaming in peer-to-peer systems, they are difficult to efficiently achieve due to the asynchronous interactive behaviors of users and the dynamic nature of peers. In this paper, the authors propose a Network Coding Equivalent Content Distribution (NCECD) scheme to efficiently handle...

    Provided By Interscience Open Access Journals

  • White Papers // Sep 2013

    Light Weight Security for OPC UA Based Architecture

    The Open Platform Communication (OPC) is becoming the universal standard for platform independent data sharing and data access. The OPC standard defines communication standards to be followed for data integration in the automation industry. The OPC communication facilitates a language independent way of communication and by using this; all devices...

    Provided By Interscience Open Access Journals

  • White Papers // Sep 2013

    Intrusion Detection for Discrete Sequences

    Global understanding of the sequence anomaly detection problem and how techniques proposed for different domains relate to each other. The authors' specific contributions are as follows: they identify three distinct formulations of the anomaly detection problem, and review techniques from many disparate and disconnected domains that address each of these...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2013

    Empirical Study on Selection of Team Members for Software Projects - Data Mining Approach

    One of the essential requisites of any software industry is the development of customer satisfied products. However, accomplishing the aforesaid business objective depends upon the depth of quality of product that is engineered in the organization. Thus, generation of high quality depends upon process, which is in turn depends upon...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2013

    Lock-Free Dining Philosopher

    The past few years have marked the start of a historic transition from sequential to parallel computation. The necessity to write parallel programs is increasing as systems are getting more complex while processor speed increases are slowing down. Current parallel programming uses low-level programming constructs like threads and explicit synchronization...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2013

    Efficient Load Balancing in Peer-to-Peer Systems Using Virtual Servers

    Load balancing is a critical issue for the efficient operation of peer-to-peer networks. With the notion of virtual servers, peers participating in a heterogeneous, structured Peer-To-Peer (P2P) network may host different numbers of virtual servers, and by migrating virtual servers, peers can balance their loads proportional to their capacities. Peers...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2013

    Managing Redundancy and Conflicts in Distributed Firewalls

    The use of firewall has been widespread in all the emerging technologies such as service oriented architecture, web services, cloud computing and so on. The term security itself is the most important task that has to be maintained in the real-time applications. Policies are enrolled in the security of the...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2013

    Hiding Secret Data Through Steganography in VOIP

    Steganography is an effective way of hiding secret data, by this means of protecting the data from unauthorized or unwanted viewing. Using cryptography technique will encrypt and decrypt message to provide better security. Cryptography protects the message from being read by unauthorized parties, steganography lets the sender conceal the fact...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2013

    Detection of Data Leakage

    Sometimes sensitive data must be handed over to supposedly trust third parties. With the extensive application of database systems, the owners of the databases have urgent requirements to protect their copyright of databases. Some of the data is leaked and found in an unauthorized place the distributor must assess the...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2013

    A Comparative Analysis of Ecdsa V/S Rsa Algorithm

    Elliptic curve cryptography with its various protocols implemented in terms of accuracy and fast observation of results for better security solution. ECC applied on two finite fields: prime field and binary field. Because it is public key cryptography so, it also focuses on generation of elliptic curve and shows why...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2013

    Intelligent Phishing Website Detection and Prevention System by Using Link Guard Algorithm

    Phishing is a new type of network attack where the attacker creates a replica of an existing web page to fool users (e.g., by using specially designed e-mails or instant messages) into submitting personal, financial, or password data to what they think is their service provides' website. In this paper,...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2013

    Publishing Search Logs Privacy Guarantee for User Sensitive Information

    Search engine companies maintain the search log to store the histories of their users search queries. These search logs are gold mines for researchers. However, search engine companies take care of publishing search log in order to provide privacy for user's sensitive information. In this paper the authors analyze algorithm...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2013

    New Dynamic Query Optimization Technique in Relational Database Management Systems

    Query optimizer is an important component in the architecture of relational data base management system. This component is responsible for translating user submitted query into an efficient query evolution program which can be executed against the database. The present query evolution existing algorithm tries to find the best possible plan...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2013

    Extracting Accurate Data from Multiple Conflicting Information on Web Sources

    For the World-Wide Web has become the most important information source for most of the users. As different websites often provide conflicting information there is no guarantee for the correctness of the data. Among multiple conflict results, can the users automatically identify which one is likely the true fact?, In...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2013

    Acoustic Sensors to Detect Clogs in Sewer Pipelines

    Blockages in sewage pipelines are difficult to be cleaned or extracted. In order to manage sewer blockage proactively sewer managers need to be able to identify the location of blockages precisely. As of now, only humans do this sully job of cleaning the sewages. Many human right organizations have been...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2013

    Feature Selection and Classification of Intrusion Detection System Using Rough Set

    With the expansion of computer network there is a challenge to compete with the intruders who can easily break into the system. So it becomes a necessity to device systems or algorithms that can not only detect intrusion but can also improve the detection rate. In this paper the authors...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2013

    A Study of Advanced Encryption Tools for Data Security

    With the rapid growth and uses of internet, the task of protection of data and information is become a key challenge to the user as well as security experts. In the era of e-commerce, online shopping, online banking information security is a vital issue. Information may be hacked, stolen and...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2013

    Development of Scada Like Application Using Arduino with .NET Interface

    Now-a-days SCADA systems are used for home automation, greenhouse automation, E-agriculture etc. Basically these SCADA applications include level monitoring, light & climate control, security & surveillance, control and manage spatially separated utility sites and control of shutters & doors and so on. With the arrival of new hardware and software...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2013

    Face Recognition by Linear Discriminant Analysis

    Linear Discriminant Analysis (LDA) has been successfully applied to face recognition which is based on a linear projection from the image space to a low dimensional space by maximizing the between class scatter and minimizing the within-class scatter. LDA allows objective evaluation of the significance of visual information in different...

    Provided By Interscience Open Access Journals

  • White Papers // May 2013

    Blackbox Testing of Web Service

    Web services and Service Oriented Computing (SOC) paradigm have received significant attention due to its wide spread adoption and promotion by major IT vendors. As more and more service-oriented softwares are built today testing of web service have becomes crucial point. Web services are distributed, loosly coupled, autonomous, re-usuable, discoverable,...

    Provided By Interscience Open Access Journals

  • White Papers // May 2013

    Fault-Prone Components Identification for Real Time Complex Systems Based on Criticality Analysis

    Generally, complexity of software affects the development and maintenance cost. The complexity of the software increases, when the number of components increase, among these components, some are more critical than others which will lead to catastrophic effects on field use. Hence, it is needed to identify such critical components after...

    Provided By Interscience Open Access Journals

  • White Papers // May 2013

    Aspect Mining Using UML Communication Diagram

    Aspect-Oriented Programming (AOP) focuses on precise constructs for modularization of the crosscutting concerns of a program. Crosscutting concerns can be defined as the functionalities that navigate the principal decomposition of software and therefore cannot be assigned to a single modular unit. Aspect mining attempts to find and isolate crosscutting concerns...

    Provided By Interscience Open Access Journals

  • White Papers // May 2013

    A Secure Data Forwarding Schema for Cloud Storage Systems

    Cloud computing has been envisioned as the next-generation architecture of IT Enterprise. It moves the application software and databases to the centralized large data centers, where the management of the data and services may not be fully trustworthy. This unique paradigm brings about many new security challenges, which have not...

    Provided By Interscience Open Access Journals

  • White Papers // May 2013

    Reliablity Control Using Loss Recovery Ratio in Wireless Sensor Network

    In Wireless Sensor Network congestion leads to the degradation of communication links that result in the decreased the reliability and waste of energy which one of the scarcest resources of sensor network. In cluster based environment, each sensor senses the information and forwarded to its cluster head and cluster head...

    Provided By Interscience Open Access Journals

  • White Papers // May 2013

    Distributed Accountability and Auditing in Cloud

    The widespread use of Cloud computing has opened up new challenges by introducing different types of trust scenario. The lack of confidence in trusting information flow (users data are usually processes remotely in unknown machines that do not owned or operated by user) in cloud has become common, as users...

    Provided By Interscience Open Access Journals

  • White Papers // May 2013

    Optimal Route Selection Strategy for QoS Improvement

    An ad-hoc mobile network is a collection of mobile nodes that are dynamically and arbitrarily located in such a manner that the interconnections between nodes are capable of changing on a continual basis. Ad-hoc nodes operating in a single path, single channel model might experience packet loss and high latency...

    Provided By Interscience Open Access Journals

  • White Papers // May 2013

    Adaptive Channel Split Ratio in Tdd Based Wi-Max Network for Link Improvement Analysis

    The last mile access for residential user is asymmetric. As a result an equal split between the uplink and downlink channel cause inefficient bandwidth utilization. Improper allocation will severely affect the traffic. In this paper, the main focus is TCP performance during improper bandwidth allocation. The TDD framing in WiMAX...

    Provided By Interscience Open Access Journals

  • White Papers // May 2013

    Self Adaptive Effective Aperture for Multi Antenna Set-Ups in Faded Wireless Channels

    In mobile communication, a less explored technique to mitigate fading effects is based on the physical parameter of the transmitter by varying the physical dimension of the transmitting antenna. This paper deals with a self adaptive system to eliminate severe fading effects in different multi antenna set-ups by adaptively updating...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2013

    A Tool for Effective Detection of Fraud in Credit Card System

    Due to the rise and rapid growth of E-commerce, use of credit cards for online purchases has dramatically increased and it caused an explosion in the credit card fraud. Fraud is one of the major ethical issues in the credit card industry. As credit card becomes the most popular mode...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2013

    Fault Tolerant System for Cellular Network

    In cellular communication networks, the geographical area is divided into smaller regions, called cells. In each cell, there is one Mobile Service Station (MSS) as well as a number of Mobile Hosts (MH). The communication between MSSs is, in general, through wired links, while the links between an MH and...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2013

    Rate Compatible Punctured Turbo-Coded Hybrid ARQ for OFDM System

    Now-a-day's Orthogonal Frequency Division Multiplexing (OFDM) is under intense research for broadband wireless transmission because of its robustness against multipath fading. A major concern in data communication such as OFDM is to control transmission errors caused by the channel noise so that error free data can be delivered to the...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2013

    Overview of Wireless Network Control Protocol in Smart Phone Devices

    The computer network connection without wire or any cable is referring as wireless network. These Wireless Local Area Networks are popular for its worldwide applications. It has covered wide scale Wireless Local Area Network. The large scale systems to all applicable areas make large numbers of wireless termination and covering...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2013

    Design Issues and Classification of WSNs Operating Systems

    Wireless Sensor Networks is an emerging area of research. Wireless Sensor Networks (WSNs) face lot of problems that do not arise in other types of wireless networks and computing environments. Limited computational resources, power constraints, low reliability and higher density of sensor nodes (motes) are just some basic problems that...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2013

    Routing Protocol for Vehicular Adhoc Network

    Vehicular Ad-hoc NETworks (VANETs) are special type of Mobile Ad-hoc NETworks (MANETs) where wireless equipped vehicles from a network are continuously travelling along the road. Node movement feature of Vehicular Ad-hoc NETwork (VANET) closely resembles with that of Mobile Ad-hoc NETwork (MANET) but its high speed mobility and unpredictable movement...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2013

    Review on Hierarchical Routing in Wireless Sensor Networks

    The Wireless Sensor Network (WSN) has become an interesting field of research of the 21st century. It is a type of the wireless ad-hoc network. This has brought about developing low cost, low-power and multi-function sensor nodes. The network life for Wireless Sensor Network plays an important role in survivability....

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2013

    Comparison of Feasibility of Risk Monitoring in Buildings in Two Wireless Sensor Network: MICA Mote and MEMS

    In this paper, feasibility of risk monitoring of buildings in two Wireless Sensor Network is presented, firstly by using MICA Mote and then by MEMS. Also, it will be verified that the MEMS sensors are superior as it provides high quality sensor data and no data loss as compared to...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Fault Tolerance in Wireless Sensor Networks Using Constrained Delaunay Triangulation

    Fault tolerance is one of the main issues in Wireless Sensor Networks (WSNs) since it becomes critical in real deployment environment where reliability and reduced inaccessibility times are important. In this paper, the authors propose a fault-tolerance technique for coverage area of the sensor network that enhances the energy efficiency...

    Provided By Interscience Open Access Journals

  • White Papers // May 2013

    Optimal Route Selection Strategy for QoS Improvement

    An ad-hoc mobile network is a collection of mobile nodes that are dynamically and arbitrarily located in such a manner that the interconnections between nodes are capable of changing on a continual basis. Ad-hoc nodes operating in a single path, single channel model might experience packet loss and high latency...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Improving Localization Accuracy in Wireless Sensor Networks

    The most fundamental problem of wireless sensor networks is localization (finding the geographical location of the sensors). Most of the localization algorithms proposed for sensor networks are based on Sequential Monte Carlo (SMC) method. To achieve high accuracy in localization it requires high seed node density and it also suffers...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Performance Evaluation of Relaying Schemes for Wireless Communication Systems

    The evaluation of MIMO (Multiple-Input Multiple-Output) Relay wireless system is carried out and compared against the performance of a SISO (Single-Input Single-Output) Relay wireless system. The encoding scheme used in MIMO is Alamouti coding and decoding is done by the Maximum Likelihood (ML) detector. A comparison is made between the...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    A Fuzzy Based Approach in Multihop Network

    The proposed system utilizes the concept of multi hop communication in Wireless Sensor Networks (WSNs). On the other hand, the single hop communication leads to more power dissipation in the nodes at the time of transmitting sensed data. The proposed system rectifies the above mentioned problem with the multi hop...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Amorphous Event Prevention in Wireless Sensor Network

    In many applications wireless sensor can be used to detect the events in those applications. With the advances in sensing, communication, and computation, there is an increasing need to track mobile events such as air pollutant diffusion, toxic gas leakage, or wildfire spreading using mobile sensors such as robots. Lots...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Attacks in Mobile Ad Hoc Networks: Detection and Counter Measure

    In Wireless Ad-hoc network Stealthy packet dropping is a suite of four attacks; misrouting, power control, identity delegation, and colluding collision - that can be easily launched against multi hop wireless ad hoc network. Stealthy packet dropping disrupts the packet from reaching the destination through malicious behavior at an intermediate...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Novel Defence Mechanism Against On Demand Adhoc Routing Protocol for Mobile Adhoc Networks

    To access multimedia data mobile users like to use their own consumer electronic devices anywhere and at anytime. Hence, the authors expect that wireless ad hoc networks will be widely used in the near future since these networks form the topology with low cost on the fly. However, consumer electronic...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    A Security Architecture for Real-World Applications of Wireless Sensor Network

    With the recent capability of being applicable in enormous fields, the Wireless Sensor Networks (WSN) has drawn attention of researchers and industries in diverse areas. Being deployed in areas that are hostile, WSN pose lots of difficulties and challenges to the research fraternity. In this paper, the authors discuss a...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Increasing the Lifetime of Heterogeneous Sensor Network by using Genetic-Fuzzy Clustering

    Wireless Sensor Network is composed of hundreds or thousands of sensor nodes which have computational, energy and memory limitation. Its duty is to receive information from its surrounding environment, analyze and process data and to send the received data to other nodes or base station. In these networks, sensor nodes...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Analysis of Unipath and Multipath Routing Protocols in Mobile Adhoc Networks

    A MANET is an interconnection of mobile devices by wireless links, which forms a dynamic topology. Routing protocols play a vital role in transmission of data across the network. The two major classifications of routing protocols are unipath and multipath. In this paper, the authors have evaluated the performance of...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Hierarchical Routing Protocols for Wireless Sensor Network-A Survey

    Wireless Sensor Networks are a web of sensor nodes with a set of processor and limited memory unit embedded in it. Reliable routing of packets from the sensor node to its base station is the most important task for the networks. The routing protocols applied for the other networks cannot...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Wireless Network Security Threats and their Solutions: A Short Study

    With continual advances in technology, wireless accessibility is being deployed increasingly in office and public environments, as it is having huge benefits. But it is also coupled with the security threats and risks that will adversely affect the performance of the organization. To get rid of these threats, firstly these...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Performance Comparison of Spread Spectrum Modulation for Wireless Channels Using Ann - Assisted Pseudo - Noise Sequence Generator

    One of the challenging issues in Spread-Spectrum Modulation (SSM) is the design of the Pseudo - Random or Pseudo - Noise (PN) sequence generator. Though several approaches are available that deals with the PN - sequence generator, there always exists the possibility of exploring the use of innovative methods through...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    A Rake Receiver Design for Ultra Wide Band Application

    In this paper, the authors describe the design and implementation of a rake receiver for use with Ultra Wide Band (UWB) systems. The rake receiver uses Spread Spectrum Modulation (SSM) aided by kasami sequence generator. The combination is found to be effective in dealing with multipath fading and signal to...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    The New Adaptive Active Constellation Extension Algorithm for Par Minimization in OFDM Systems

    In this paper, the peak-to-average ratio reduction in OFDM systems is implemented by the Adaptive Active Constellation Extension (ACE) technique which is more simple and attractive for practical downlink implementation purpose. However, in normal constellation method the authors cannot achieve the minimum PAR if the target clipping level is much...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Implementation and Comparison of Wavelet Transform and Fourier Transform in Wi-Max OFDM System

    WIMAX wireless communication is based on OFDM technology which enables going towards 4G Based on IEEE 802.16d-2004. But the reliability of OFDM is limited with the problems of time varying nature of the channel. This can reduced by adding cyclic prefix or guard interval between each block of data symbols....

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Underground Wireless Communication Channel Modeling and Simulation Using 0.3GMSK Modulation Considering Penetration and Scattering Loss

    Wireless communication inside mines and tunnels is very different from that in terrestrial environment because of the strong attenuation of signals. Here, the authors are developing an empirical model for the underground wireless communication channel based on experimental data which help in predicting the average received signal strength at a...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2013

    Rate Compatible Punctured Turbo-Coded Hybrid ARQ for OFDM System

    Now-a-day's Orthogonal Frequency Division Multiplexing (OFDM) is under intense research for broadband wireless transmission because of its robustness against multipath fading. A major concern in data communication such as OFDM is to control transmission errors caused by the channel noise so that error free data can be delivered to the...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Investigation of Capacity Gains in MIMO Correlated Rician Fading Channels Systems

    This paper investigate the effect of Rician fading and correlation on the capacity and diversity of MIMO channels. The use of antenna arrays at both sides of the wireless communication link (MIMO systems) can increase channel capacity provided the propagation medium is rich scattering or Rayleigh fading and the antenna...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Secure and Reliable Power Supply with Challenges-Smart Grid

    Smart Grid implementations will certainly increase the quantity, quality and use of information available from advanced sensing, computing and communications hardware as well as software. There is virtually universal agreement that it is necessary to upgrade the electric grid to increase overall system efficiency and reliability. Many technologies currently in...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Simulation of Adaptive Channel Equalization for BPSK,QPSK and 8-PSK Schemes

    The distortion and inter symbol interference caused by multipath effects of channel degrades the quality of signal transmission in transmission system of digital baseband. Adaptive channel equalization is used commonly to compensate these effects so as to increase the reliability of propagation. Recursive Least Squares (RLS) algorithm is most commonly...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Statistical Analysis of Wsn Based Indoor Positioning Localization Schemes with Kalman Filtering

    Wireless Sensor Network (WSN) is used for determining the Indoor Positioning of objects and persons since recent years. WSN has been implemented in indoor positioning applications such as real time tracking of humans/objects, patient monitoring in health care, navigation, warehouses for inventory monitoring, shopping malls, etc. But one of the...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Inter Carrier Interference and Signal to Interference Ratio of Various Pulse Shaping Functions Used in Ofdm System with Carrier Frequency Offset

    Orthogonal Frequency Division Multiplexing (OFDM) is the important modulation of choice for fourth generation broadband multimedia wireless systems. This paper is focused on the problem of reducing the Inter-Carrier Interference (ICI) and signal to noise ratio in the transmission over OFDM using various pulse shaping methods. Here, the authors have...

    Provided By Interscience Open Access Journals

  • White Papers // Sep 2012

    Design & Implementation of Teacher Student Interaction System Using Zigbee & RFID

    Research of the past years has led to numerous novel developments and approaches for Wireless Sensor Networks (WSNs). However, most previous work has focused on either mathematical analysis or theoretical algorithms with extensive simulation results. In this paper, in order to realistically understand the complexity of WSNs, a ZigBee/IEEE 802.15.4...

    Provided By Interscience Open Access Journals

  • White Papers // Sep 2012

    A Survey of the Effect of Network Parameters on Communication Links in Wireless Sensor Networks

    Sensor networks are a collection of large number of low-cost, low-power, multifunctional, and small sensors. a transceiver and a power source .Wireless sensor networks hold the promise of many new applications in the area of monitoring and control. Examples include target tracking, intrusion detection, wildlife habitat monitoring, climate control and...

    Provided By Interscience Open Access Journals

  • White Papers // Sep 2012

    Priority Based Traffic Lights Controller Using Wireless Sensor Networks

    Vehicular traffic is continuously increasing around the world, especially in large urban areas. The resulting congestion has become a major concern to transportation specialists and decision makers. The existing methods for traffic management, surveillance and control are not adequately efficient in terms of performance, cost, maintenance, and support. In this...

    Provided By Interscience Open Access Journals

  • White Papers // May 2013

    Self Adaptive Effective Aperture for Multi Antenna Set-Ups in Faded Wireless Channels

    In mobile communication, a less explored technique to mitigate fading effects is based on the physical parameter of the transmitter by varying the physical dimension of the transmitting antenna. This paper deals with a self adaptive system to eliminate severe fading effects in different multi antenna set-ups by adaptively updating...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    CCI Cancellation Using KF in Faded MIMO Channels

    Multi Input Multi Output system (MIMO) has become a viable option to meet the demand of high data rate wireless communication. But MIMO system performance is severely affected by the presence of Co-Channel Interference (CCI). CCI cancellation in MIMO channel therefore is a challenging area of research. This paper provides...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Split MLSE Adaptive Equalization in Severely Faded Rayleigh MIMO Channels

    This paper presents an overview of adaptive equalization used in Multiple-Input-Multiple-Output (MIMO) wireless systems. In this paper, the authors consider two-user transmission over a Rayleigh frequency selective fading channel, in which the Channel State Information (CSI) is known by the receiver. Subject to an average transmit power constraint, they study...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Artificial Neural Network Aided Retina Based Biometric Identification System

    Artificial Neural Network (ANN)s are efficient means of prediction, optimization and recognition. Retina is a unique biometric pattern that can be used as a part of a verification system. An ANN can be configured and trained to handle such variations observed in the texture of the retina. The specialty of...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Detecting and Effective Routing of Time Critical Events Using Congestion and Delay Aware Routing in WSNS

    Reliability and timeliness are two essential requirements of successful detection of critical events n Wireless Sensor Networks (WSNs). The Base Station (BS) is particularly interested about reliable and timely collection of data sent by the nodes close to the ongoing event, and at that time, the data sent by other...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2013

    Transmission Network Expansion with Transmission Loading Relief

    Transmission planning should seek to maintain or improve system security over time and facilitate robust wholesale power markets by improving transmission capacity for bulk power transfers across wide regions It includes finding the optimal plan for the electrical system expansion, it must specify the transmission lines and/or transformers that should...

    Provided By Interscience Open Access Journals

  • White Papers // Mar 2012

    Secure Web System Development

    The recent development in the field of Web system technology has transformed the software industry radically by integrating a wide range of web users, vendors, and enterprise applications worldwide. In Web-based system, a security requirement is a critical issue. This difficulty is due to the complexity level of such systems...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    An Effective Time Management Schema in WSNs

    WSN usually consists of a large number of resource constraint sensor nodes that are generally deployed in unattended/hostile environments and Existing security designs mostly provide a hop-by-hop security paradigm. Furthermore, existing security designs are also vulnerable to many types of Denial of Service (DoS) attacks, such as random node capture...

    Provided By Interscience Open Access Journals