Interscience Open Access Journals

Displaying 1-40 of 434 results

  • White Papers // Oct 2013

    Comparative Study of Multi User Broadcast Authentication in Wireless Sensor Network

    Wireless Sensor Network (WSN) is an emerging technology consisting of spatially distributed sensor nodes, which can cooperatively monitor physical or environmental conditions. The major resource constrain of WSN are, low processing, energy and storage capabilities. Broadcast is widely used communication method in WSN environment. In most of the sensor networks,...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2013

    Method to Achieve Security and Storage Services in Cloud Computing

    Cloud storage enables users to remotely store their data and enjoy the on-demand high quality cloud applications without the burden of local hardware and software management. Though the benefits are clear, such a service is also relinquishing users' physical possession of their outsourced data, which inevitably poses new security risks...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2013

    Analysis of Facial Marks to Distinguish Between Identical Twins Using Novel Method

    Reliable and accurate verification of people is extremely important in a number of business transactions as well as access to privileged information. The biometrics-based methods assume that the physical characteristics of an individual (as captured by a sensor) used for verification are sufficiently unique to distinguish one person from another....

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2013

    Effective Event Derivation of Uncertain Events in Rule-Based Systems

    There is a growing need for systems that react automatically to events. While some events are generated externally and deliver data across distributed systems, others need to be derived by the system itself based on available information. Unpredictability of future events which influence the outcome of the present decisions but...

    Provided By Interscience Open Access Journals

  • White Papers // Sep 2013

    VOD Streaming with a Network Coding Equivalent Content Distribution Scheme

    Although random access operations are desirable for on-demand video streaming in peer-to-peer systems, they are difficult to efficiently achieve due to the asynchronous interactive behaviors of users and the dynamic nature of peers. In this paper, the authors propose a Network Coding Equivalent Content Distribution (NCECD) scheme to efficiently handle...

    Provided By Interscience Open Access Journals

  • White Papers // Sep 2013

    Smc Protocol for Distributed K- Anonymity

    Secure multiparty protocols have been proposed to enable non colluding parties to cooperate without a trusted server. Even though such protocols put off information expos

    Provided By Interscience Open Access Journals

  • White Papers // Sep 2013

    A Bio Genetic Process to Replicas-Free Repository

    Several systems that rely on consistent data to offer high-quality services, such as digital libraries and ecommerce brokers, may be affected by the existence of duplicates, quasi replicas, or near-duplicate entries in their repositories. Because of that, there have been significant investments from private and government organizations for developing methods...

    Provided By Interscience Open Access Journals

  • White Papers // Sep 2013

    Attack Against Anonymity Using Cell Counting

    Various low-latency anonymous communication systems such as Tor and Anonymizer have been designed to provide anonymity service for users. In order to hide the communication of users, most of the anonymity systems pack the application data into equal-sized cells. Via extensive experiments on Tor, the authors found that the size...

    Provided By Interscience Open Access Journals

  • White Papers // Sep 2013

    Entity Extraction Using Statistical Methods Using Interactive Knowledge Mining Framework

    There are various kinds of valuable semantic information about real-world entities embedded in web pages and databases. Extracting and integrating these entity information from the Web is of great significance. Comparing to traditional information extraction problems, web entity extraction needs to solve several new challenges to fully take advantage of...

    Provided By Interscience Open Access Journals

  • White Papers // Sep 2013

    Minimization of Mobile Ad Hoc Networks Routing Attacks Using Ds Mathematical Theory

    Mobile Ad-hoc NETworks (MANET) have been highly vulnerable to attacks due to the dynamic nature of its network infrastructure. Among these attacks, routing attacks have received considerable attention since it could cause the most devastating damage to MANET. Even though there exist several intrusions response techniques to mitigate such critical...

    Provided By Interscience Open Access Journals

  • White Papers // Sep 2013

    Light Weight Security for OPC UA Based Architecture

    The Open Platform Communication (OPC) is becoming the universal standard for platform independent data sharing and data access. The OPC standard defines communication standards to be followed for data integration in the automation industry. The OPC communication facilitates a language independent way of communication and by using this; all devices...

    Provided By Interscience Open Access Journals

  • White Papers // Sep 2013

    Intrusion Detection for Discrete Sequences

    Global understanding of the sequence anomaly detection problem and how techniques proposed for different domains relate to each other. The authors' specific contributions are as follows: they identify three distinct formulations of the anomaly detection problem, and review techniques from many disparate and disconnected domains that address each of these...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2013

    Empirical Study on Selection of Team Members for Software Projects - Data Mining Approach

    One of the essential requisites of any software industry is the development of customer satisfied products. However, accomplishing the aforesaid business objective depends upon the depth of quality of product that is engineered in the organization. Thus, generation of high quality depends upon process, which is in turn depends upon...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2013

    Lock-Free Dining Philosopher

    The past few years have marked the start of a historic transition from sequential to parallel computation. The necessity to write parallel programs is increasing as systems are getting more complex while processor speed increases are slowing down. Current parallel programming uses low-level programming constructs like threads and explicit synchronization...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2013

    Efficient Load Balancing in Peer-to-Peer Systems Using Virtual Servers

    Load balancing is a critical issue for the efficient operation of peer-to-peer networks. With the notion of virtual servers, peers participating in a heterogeneous, structured Peer-To-Peer (P2P) network may host different numbers of virtual servers, and by migrating virtual servers, peers can balance their loads proportional to their capacities. Peers...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2013

    Managing Redundancy and Conflicts in Distributed Firewalls

    The use of firewall has been widespread in all the emerging technologies such as service oriented architecture, web services, cloud computing and so on. The term security itself is the most important task that has to be maintained in the real-time applications. Policies are enrolled in the security of the...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2013

    Hiding Secret Data Through Steganography in VOIP

    Steganography is an effective way of hiding secret data, by this means of protecting the data from unauthorized or unwanted viewing. Using cryptography technique will encrypt and decrypt message to provide better security. Cryptography protects the message from being read by unauthorized parties, steganography lets the sender conceal the fact...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2013

    Detection of Data Leakage

    Sometimes sensitive data must be handed over to supposedly trust third parties. With the extensive application of database systems, the owners of the databases have urgent requirements to protect their copyright of databases. Some of the data is leaked and found in an unauthorized place the distributor must assess the...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2013

    A Comparative Analysis of Ecdsa V/S Rsa Algorithm

    Elliptic curve cryptography with its various protocols implemented in terms of accuracy and fast observation of results for better security solution. ECC applied on two finite fields: prime field and binary field. Because it is public key cryptography so, it also focuses on generation of elliptic curve and shows why...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2013

    Publishing Search Logs Privacy Guarantee for User Sensitive Information

    Search engine companies maintain the search log to store the histories of their users search queries. These search logs are gold mines for researchers. However, search engine companies take care of publishing search log in order to provide privacy for user's sensitive information. In this paper the authors analyze algorithm...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2013

    Intelligent Phishing Website Detection and Prevention System by Using Link Guard Algorithm

    Phishing is a new type of network attack where the attacker creates a replica of an existing web page to fool users (e.g., by using specially designed e-mails or instant messages) into submitting personal, financial, or password data to what they think is their service provides' website. In this paper,...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2013

    Acoustic Sensors to Detect Clogs in Sewer Pipelines

    Blockages in sewage pipelines are difficult to be cleaned or extracted. In order to manage sewer blockage proactively sewer managers need to be able to identify the location of blockages precisely. As of now, only humans do this sully job of cleaning the sewages. Many human right organizations have been...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2013

    Feature Selection and Classification of Intrusion Detection System Using Rough Set

    With the expansion of computer network there is a challenge to compete with the intruders who can easily break into the system. So it becomes a necessity to device systems or algorithms that can not only detect intrusion but can also improve the detection rate. In this paper the authors...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2013

    A Study of Advanced Encryption Tools for Data Security

    With the rapid growth and uses of internet, the task of protection of data and information is become a key challenge to the user as well as security experts. In the era of e-commerce, online shopping, online banking information security is a vital issue. Information may be hacked, stolen and...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2013

    Development of Scada Like Application Using Arduino with .NET Interface

    Now-a-days SCADA systems are used for home automation, greenhouse automation, E-agriculture etc. Basically these SCADA applications include level monitoring, light & climate control, security & surveillance, control and manage spatially separated utility sites and control of shutters & doors and so on. With the arrival of new hardware and software...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2013

    New Dynamic Query Optimization Technique in Relational Database Management Systems

    Query optimizer is an important component in the architecture of relational data base management system. This component is responsible for translating user submitted query into an efficient query evolution program which can be executed against the database. The present query evolution existing algorithm tries to find the best possible plan...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2013

    Extracting Accurate Data from Multiple Conflicting Information on Web Sources

    For the World-Wide Web has become the most important information source for most of the users. As different websites often provide conflicting information there is no guarantee for the correctness of the data. Among multiple conflict results, can the users automatically identify which one is likely the true fact?, In...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2013

    Face Recognition by Linear Discriminant Analysis

    Linear Discriminant Analysis (LDA) has been successfully applied to face recognition which is based on a linear projection from the image space to a low dimensional space by maximizing the between class scatter and minimizing the within-class scatter. LDA allows objective evaluation of the significance of visual information in different...

    Provided By Interscience Open Access Journals

  • White Papers // May 2013

    Fault-Prone Components Identification for Real Time Complex Systems Based on Criticality Analysis

    Generally, complexity of software affects the development and maintenance cost. The complexity of the software increases, when the number of components increase, among these components, some are more critical than others which will lead to catastrophic effects on field use. Hence, it is needed to identify such critical components after...

    Provided By Interscience Open Access Journals

  • White Papers // May 2013

    Aspect Mining Using UML Communication Diagram

    Aspect-Oriented Programming (AOP) focuses on precise constructs for modularization of the crosscutting concerns of a program. Crosscutting concerns can be defined as the functionalities that navigate the principal decomposition of software and therefore cannot be assigned to a single modular unit. Aspect mining attempts to find and isolate crosscutting concerns...

    Provided By Interscience Open Access Journals

  • White Papers // May 2013

    Blackbox Testing of Web Service

    Web services and Service Oriented Computing (SOC) paradigm have received significant attention due to its wide spread adoption and promotion by major IT vendors. As more and more service-oriented softwares are built today testing of web service have becomes crucial point. Web services are distributed, loosly coupled, autonomous, re-usuable, discoverable,...

    Provided By Interscience Open Access Journals

  • White Papers // May 2013

    A Secure Data Forwarding Schema for Cloud Storage Systems

    Cloud computing has been envisioned as the next-generation architecture of IT Enterprise. It moves the application software and databases to the centralized large data centers, where the management of the data and services may not be fully trustworthy. This unique paradigm brings about many new security challenges, which have not...

    Provided By Interscience Open Access Journals

  • White Papers // May 2013

    Reliablity Control Using Loss Recovery Ratio in Wireless Sensor Network

    In Wireless Sensor Network congestion leads to the degradation of communication links that result in the decreased the reliability and waste of energy which one of the scarcest resources of sensor network. In cluster based environment, each sensor senses the information and forwarded to its cluster head and cluster head...

    Provided By Interscience Open Access Journals

  • White Papers // May 2013

    Distributed Accountability and Auditing in Cloud

    The widespread use of Cloud computing has opened up new challenges by introducing different types of trust scenario. The lack of confidence in trusting information flow (users data are usually processes remotely in unknown machines that do not owned or operated by user) in cloud has become common, as users...

    Provided By Interscience Open Access Journals

  • White Papers // May 2013

    Optimal Route Selection Strategy for QoS Improvement

    An ad-hoc mobile network is a collection of mobile nodes that are dynamically and arbitrarily located in such a manner that the interconnections between nodes are capable of changing on a continual basis. Ad-hoc nodes operating in a single path, single channel model might experience packet loss and high latency...

    Provided By Interscience Open Access Journals

  • White Papers // May 2013

    Adaptive Channel Split Ratio in Tdd Based Wi-Max Network for Link Improvement Analysis

    The last mile access for residential user is asymmetric. As a result an equal split between the uplink and downlink channel cause inefficient bandwidth utilization. Improper allocation will severely affect the traffic. In this paper, the main focus is TCP performance during improper bandwidth allocation. The TDD framing in WiMAX...

    Provided By Interscience Open Access Journals

  • White Papers // May 2013

    Self Adaptive Effective Aperture for Multi Antenna Set-Ups in Faded Wireless Channels

    In mobile communication, a less explored technique to mitigate fading effects is based on the physical parameter of the transmitter by varying the physical dimension of the transmitting antenna. This paper deals with a self adaptive system to eliminate severe fading effects in different multi antenna set-ups by adaptively updating...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2013

    Fault Tolerant System for Cellular Network

    In cellular communication networks, the geographical area is divided into smaller regions, called cells. In each cell, there is one Mobile Service Station (MSS) as well as a number of Mobile Hosts (MH). The communication between MSSs is, in general, through wired links, while the links between an MH and...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2013

    A Tool for Effective Detection of Fraud in Credit Card System

    Due to the rise and rapid growth of E-commerce, use of credit cards for online purchases has dramatically increased and it caused an explosion in the credit card fraud. Fraud is one of the major ethical issues in the credit card industry. As credit card becomes the most popular mode...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2013

    Rate Compatible Punctured Turbo-Coded Hybrid ARQ for OFDM System

    Now-a-day's Orthogonal Frequency Division Multiplexing (OFDM) is under intense research for broadband wireless transmission because of its robustness against multipath fading. A major concern in data communication such as OFDM is to control transmission errors caused by the channel noise so that error free data can be delivered to the...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Automata for Web Services Fault Monitoring and Diagnosis

    Like any software, web service fault management is also required to go through different phases of fault management lifecycle. Model based diagnosis has been a well established practice for its several positive aspects including cognitively being better understood by development and testing teams. Automata is a simple and formally well...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    STM: Lock-Free Synchronization

    Current parallel programming uses low-level programming constructs like threads and explicit synchronization (for example, locks, semaphores and monitors) to coordinate thread execution which makes these programs difficult to design, program and debug. In this paper, the authors present Software Transactional Memory (STM) which is a promising new approach for programming...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Checkpointing Orchestrated Web Services

    Web Services are built on service-oriented architecture which is based on the notion of building applications by discovering and orchestrating services available on the web. Complex business processes can be realized by discovering and orchestrating already available services on the web. In order to make these orchestrated web services resilient...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Goal Programming Approach for Selection of COTS Components in Designing a Fault Tolerant Modular Software System under Consensus Recovery Block Scheme

    The application of computer systems has now crossed many different fields. Systems are becoming more software intensive. The requirements of the customer for a more reliable software led to the fact that software reliability is now an important research area. One method to improve software reliability is by the application...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    SMS Text Compression Through IDBE (Intelligent Dictionary Based Encoding) for Effective Mobile Storage Utilization

    Effective storage utilization is the key concept for better working of any operating system. Even operating systems used for mobile phones are not an exception for this fact. This paper proposes a technique for maximizing the utilization of the storage space present in mobile phones. Thus, it is important to...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Secure Efficient On-Demand Insider Attacks Multicast Routing Protocol in Wireless Networks

    Wireless multicast routing send and receives the data source to destination. High error rates, unfixed and changeable self of the signal power and broadcast change with time and environment regularly result in not effective links. These services more weak to internal attacks coming from compromised nodes that behave randomly to...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Spectral Minutiae Fingerprint Recognition System

    Biometrics refers to the automatic recognition of individuals based on their physiological and/or behavioral characteristics, such as faces, finger prints, iris, and gait. In this paper, the authors focus on the application of finger print recognition system. The spectral minutiae fingerprint recognition is a method to represent a minutiae set...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Facial Expression Recognition System Using Facial Characteristic Points and ID3

    Facial expression is one of the most powerful, natural, and abrupt means for human beings which have the knack to communicate emotion and regulate inter-personal behaviour. In this paper, the authors present a novel approach for facial expression detection using decision tree. Facial expression information is mostly concentrate on facial...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Implementation of MHMIP and Comparing the Performance With MIP and DHMIP in Mobile Networks

    Managing the mobility efficiently in wireless networks causes critical issue, in order to support mobile users. To support global mobility in IP networks the Mobile Internet Protocol (MIP) has been proposed. The Hierarchical MIP (HMIP) and Dynamic HMIP (DHMIP) strategies are also proposed for providing high signaling delay. The authors'...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    CMA Channel Equalization Through an Adaptive MMSE Equalizer Based RLS Algorithm

    The adaptive algorithm has been widely used in the digital signal processing like channel estimation, channel equalization, echo cancellation, and so on. One of the most important adaptive algorithms is the RLS algorithm. The authors present in this paper n multiple objective optimization approach to fast blind channel equalization. By...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    An Efficient Authentication Protocol for Security in Mobile Ad Hoc Networks

    Mobile Ad hoc NETworks (MANETs) is a collection of mobile nodes that communicate by forming a network dynamically that lacks fixed infrastructure and centralized control. Secure routing is of at most importance in such networks because of dynamically changing topologies, absence of centralized monitoring points and lack of clear lines...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Simulation of DSDV Protocol

    An ad-hoc network is the cooperative engagement of a collection of Mobile Hosts without the required intervention of any centralized Access Point. This Application is the innovative design for the operation of such ad-hoc networks. The basic idea of the design is to operate each Mobile Host as a specialized...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Performance Analysis of MIMO SFBC CI-COFDM System Against the Nonlinear Distortion and Narrowband Interference

    Carrier Interferometry Coded Orthogonal Frequency Division Multiplexing (CI-COFDM) system has been widely studied in multi-carrier communication system. The CI-COFDM system spreads each coded information symbol across all N sub-carriers using orthogonal CI spreading codes. The CI-COFDM system shows the advantages of Peak to Average Power Ratio (PAPR) reduction, frequency diversity...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Simulation of a Real-Time Bus Arrival Predictor Using RFID and LabVIEW

    Most college and office goers in India use the public buses for daily commuting. The bus network caters to the need of thousands who find it an affordable means of transport. However, the absence of real-time updates in the system poses some very serious problems during the exit period. Large...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Optimal Allocation of FACTS Devices by Using Multi-Objective Optimal Power Flow and Genetic Algorithms

    The introduction of the Flexible AC Transmission System (FACTS) in the power system reduces the losses, reduces the cost of the generation, improves the stability and also improves the load capability of the system. Some application of the Flexible AC Transmission System (FACTS) technologies to existing high voltage power system...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    The Design and Development of Microstrip Patch Antenna Using Simulation Studies by ADS

    The matching network of a Microstrip Patch Antenna at 10.65 GHz was designed and developed using the software Advanced Design System (ADS). ADS is powerful software for designing microwave electronic circuits. The Microstrip Patch antenna thus developed was tested at 10m Far Field Antenna Anechoic Chamber and Momentum Simulation studies...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Carrier to Noise Ratio Performance Evaluation for Optical SSB Signal in Radio Over Fiber System

    The optical and wireless communication systems convergence will activate the potential capacity of photonic technology for providing the expected growth in interactive video, voice communication and data traffic services that are cost effective and a green communication service. The last decade growth of the broadband internet projects the number of...

    Provided By Interscience Open Access Journals

  • White Papers // Mar 2012

    An Improved Face Recognition Using Neighborhood Defined Modular Phase Congruency Based Kernel PCA

    A face recognition algorithm based on NMPKPCA algorithm presented in this paper. The proposed algorithm when compared with conventional Principal Component Analysis (PCA) algorithms has an improved recognition Rate for face images with large variations in illumination, facial expressions. In this technique, first phase congruency features are extracted from the...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Performance Comparison of IACO,AODV Networking Routing Protocols

    There are several standard protocols for Mobile Ad hoc NETworks (MANET) that have been developed for devices with higher computing features. The Efficient routing protocols can provide significant benefits to mobile ad hoc networks, in terms of both performance and reliability. Many routing protocols for such networks have been proposed...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2011

    A High Performance DDR3 SDRAM Controller

    The paper presents the implementation of compliant DDR3 memory controller. It discusses the overall architecture of the DDR3 controller along with the detailed design and operation of its individual sub blocks, the pipelining implemented in the design to increase the design throughput. It also discusses the advantages of DDR3 memories...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2011

    EARM: An Efficient and Adaptive File Replication With Consistency Maintenance in P2P Systems

    In p2p systems, file replication and replica consistency maintenance are most widely used techniques for better system performance. Most of the file replication methods replicates file in all nodes or at two ends in a client-server query path or close to the server, leading to low replica utilization, produces unnecessary...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2011

    Proposed Design for Circular Antenna and Half Ring Antenna for UWB Application

    In this paper, Ultra wideband planar circular patch and half circular ring patch antennas are proposed. These newly simulated structures are proposed for fabrication. The antennas are suitable for operating frequency of 7.5 GHz. It is shown that return loss of the both the antennas at 7.5 GHz is better...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2011

    MBER Space Time Equalization Assisted Multiuser Detection

    A novel Minimum Bit-Error Rate (MBER) Space-Time-Equalization (STE)-based Multi-User Detector (MUD) is proposed for multiple-receive-antenna-assisted space-division multiple-access systems. It is shown that the MBER-STE-aided MUD significantly outperforms the standard minimum mean-square error design in terms of the achievable Bit-Error Rate (BER). Adaptive implementations of the MBER STE are considered, and...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2011

    Performance Analysis of a Cellular System Using C-OFDM Techniques

    The basic idea of COFDM is to split the modulation samples of incoming data stream onto a large number of carriers instead of modulating a unique carrier. Therefore, COFDM is an effective technique for combating multi-path fading and for high-bit-rate transmission over wireless channel. In a single carrier system a...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2010

    Capacity Enhancement in WLAN Using MIMO

    Increasing demand for high-performance 4G broadband wireless is enabled by the use of multiple antennas at both transmitter and receiver ends. Multiple antenna technologies enable high capacities suited for Internet and multimedia services, and also dramatically increase range and reliability. The combination of Multiple-Input Multiple-Output (MIMO) signal processing with Orthogonal...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2010

    Distributed Computing for Ubiquitous Systems

    Distributed computing provides a strong foundation on top of which a powerful ubiquitous system can be realized. However, distributed computing is not solely sufficient for the ubiquitous systems - a completely new era of computer world which is not based on the conventional mainframes or PCs but on the virtually...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2010

    Analysis and Design of Circular Shape Microstrip Antenna for Wireless Communication System

    The circular microstrip antenna element is formed by radiating disk closely spaced above a ground plane. It is modeled as a cylindrical cavity with magnetic walls which can be resonant in the transverse magnetic modes. This circular shape microstrip antenna is analysed using cavity model and fields within the cylindrical...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2010

    Mining Wireless Sensor Network Data: An Adaptive Approach Based on Artificial Neural Networks Algorithm

    This paper proposes a layered modular architecture to adaptively perform data mining tasks in large sensor networks. The architecture consists in a lower layer which performs data aggregation in a modular fashion and in an upper layer which employs an adaptive local learning technique to extract a prediction model from...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2010

    Network Management System for (FUTON-Like) Radio-Over-Fiber Infrastructure

    EU-Project FUTON Radio-over-Fiber (RoF) infrastructure proposes high transmission rates at small antenna costs, implying competitive CAPEX for next generation networks. But to be cost-efficient, it needs to employ new network architectures and intelligent technology solutions for decreasing network operational costs. The RoF Network Manager manages the network equipment on the...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2010

    An Improvement in Stability of MANET Using Flow Admission Control Algorithm

    An ad hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any centralized administration or standard support services. However, flows transported across mobile ad hoc wireless networks suffer from route breakups caused by nodal mobility. In a network that aims to support...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2010

    Soft Clustering: An Overview

    Document clustering has been extensively investigated as a methodology for improving document retrieval process. In Traditional clustering algorithm each documents belongs to exactly one cluster & hence cannot detect the multiple themes of a document where as soft clustering algorithm each document can belong to multiple clusters. This paper gives...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2012

    Fast and Scalable Pattern Matching for Memory Architecture

    Multi-pattern matching is known to require intensive memory accesses and is often a performance bottleneck. Hence, specialized hardware-accelerated algorithms are being developed for line-speed packet processing. While several pattern matching algorithms have already been developed for such applications, the authors find that most of them suffer from scalability issues. They...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2012

    Multiplier Design and Performance Estimation With Distributed Arithmetic Algorithm

    A new architecture of Multiplier-and-Accumulator (MAC) for high-speed arithmetic. By combining multiplication with accumulation and devising a hybrid type of Carry Save Adder (CSA), the performance was improved. Since the accumulator that has the largest delay in MAC was merged into CSA, the overall performance was elevated. The proposed CSA...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2012

    Implementation of Memory Less Based Low-Complexity CODECS

    In this paper, the authors present a CODEC design for two classes of Crosstalk Avoidance Codes (CACs), Forbidden Pattern Codes (FPCs) and Forbidden Transition Codes (FTCs). Their mapping and coding scheme is based on the Fibonacci numeral system and the mathematical analysis shows that all numbers can be represented by...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2012

    A Novel Decode-Aware Compression Technique for Improved Compression and Decompression

    With compressed bit streams, more configuration information can be stored using the same memory. The access delay is also reduced, because less bits need to be transferred through the memory interface. To measure the efficiency of bit stream compression, Compression Ratio (CR) is widely used as a metric. It is...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2012

    Embedded Programmable Web-Based ECG Monitoring & Detection System Using a Fast Algorithm

    The physicians have to interpret this large amount of ECG data to search for only a few abnormal beats in the ECG. Physicians may overlook some abnormal cycles due to fatigue and human error in interpreting such a large amount of data. Therefore, there is an urgent need for an...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    A UML Framework for Socially Responsive Resource Usage Protocol

    Everything available in the people environment which can be used to satisfy their needs, provided, it is technologically accessible, economically feasible and culturally acceptable can be termed as 'Resource'. Therefore, planning is essentially required for judicious use of resources. It has importance in a country like India, which has enormous...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2010

    Dual-Failure Survivability for Multi Quality Data Using Single pcycle

    Dual-failure scenarios are a real possibility in today's optical networks and it is becoming more and more important foe carriers and network operators to consider them when designing their networks. The p-Cycle is a recent approach in optical network protection. The p-Cycle use preconnected cycles of spare capacity to restore...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2010

    Time Analysis of the State Space of Real-Time Preemptive Systems

    The authors present in this paper an algorithm making it possible an efficient time analysis of the state space of preemptive real time systems modeled using Time Petri Nets with inhibitor arcs. For this effect, they discuss how to determine from the reachability graph linear and quantitative properties of the...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2010

    An Alternate Idea for Storage Optimization in Search Engine

    The authors propose an alternate indexing storage technique of Search Engine. In this approach, they achieve reduced space complexity. They try to decrease time complexity for faster data retrieval and decrease storage space for efficient utilization of space. This paper provides an algorithm of indexing mechanism by which effective storage...

    Provided By Interscience Open Access Journals