Interscience Open Access Journals

Displaying 41-80 of 434 results

  • White Papers // Apr 2013

    Efficient and Secure Authentication by Using 3-Path Transmission in Ad Hoc Networks

    Ad hoc networks are created dynamically and maintained by the individual nodes comprising the network. They do not require a pre-existing architecture for communication purposes and do not rely on any form of wired infrastructure; in an ad hoc network all communication occurs through a wireless median. The design and...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2013

    Current Reuse Active Inductor Based Wideband LNA

    In this paper, the authors present the design of an active inductor based wideband LNA using current reuse topology, which is designed and simulated in 0.18um CMOS technology. The low noise amplifier is considered to be the key block in an RF receiver. It plays a critical role in determining...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2013

    Hermitian Symmetry Based Fiber Non-Linearity Compensation in Optical OFDM Networks

    Orthogonal Frequency Division Multiplexing (OFDM) is a modulation technique which is now used in most new and emerging broadband wired and wireless communication systems such as standard 802.11a/b/g/n, Digital Video Broad casting TeleVision (DVB-TV), and Long Term Evolution (LTE) in the next mobile generation, due to its capacity in solving...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2013

    Wireless Real Time Proportional Control System

    This system provides low power consuming and low cost wireless sensor network. This system provides a real time temperature and humidity. It also gives proportional control action. This system consists of TI's MSP430 microcontroller which consumes ultra low power and improves the overall system performance. The Sensorion's SHT 11 sensor...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2013

    Maximizing the Lifetime and Security of Wireless Sensor Networks

    Recent technological advances have facilitated the widespread use of Wireless Sensor Networks in many applications such as battle field surveillance, environmental observations, biological detection and industrial diagnostics. In Wireless Sensor Networks, sensor nodes are typically power-constrained with limited lifetime, and so it's necessary to understand however long the network sustains...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2013

    The Mathematical Analysis of Column Oriented Database

    There are two obvious ways to map a two-dimension relational database table onto a one-dimensional storage interface: store the table row-by-row, or store the table column-by-column. Historically, database system implementations and research have focused on the row-by row data layout, since it performs best on the most common application for...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2013

    Improving Spam Email Filtering Efficiency Using Bayesian Backward Approach Project

    Unethical e-mail senders bear little or no cost for mass distribution of messages; yet normal e-mail users are forced to spend time and effort in reading undesirable messages from their mailboxes. Due to the rapid increase of electronic mail (or e-mail), several people and companies found it an easy way...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2013

    Cloud Computing Applications and Security Issues: An Analytical Survey

    Cloud computing, a rapidly developing information technology has becoming a well-known the whole world. Cloud computing is Internet-based computing, whereby shared resources, software and information, are provided to computers and devices on-demand, like the electricity grid. Cloud computing is the product of the fusion of traditional computing technology and network...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2013

    Data Warehousing Applications: An Analytical Tool for Decision Support System

    Data-driven decision support systems, such as data warehouses can serve the requirement of extraction of information from more than one subject area. Data warehouses standardize the data across the organization so as to have a single view of information. Data Warehouses (DW) can provide the information required by the decision...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2013

    Transmission Network Expansion with Transmission Loading Relief

    Transmission planning should seek to maintain or improve system security over time and facilitate robust wholesale power markets by improving transmission capacity for bulk power transfers across wide regions It includes finding the optimal plan for the electrical system expansion, it must specify the transmission lines and/or transformers that should...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    A Rake Receiver Design for Ultra Wide Band Application

    In this paper, the authors describe the design and implementation of a rake receiver for use with Ultra Wide Band (UWB) systems. The rake receiver uses Spread Spectrum Modulation (SSM) aided by kasami sequence generator. The combination is found to be effective in dealing with multipath fading and signal to...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    The New Adaptive Active Constellation Extension Algorithm for Par Minimization in OFDM Systems

    In this paper, the peak-to-average ratio reduction in OFDM systems is implemented by the Adaptive Active Constellation Extension (ACE) technique which is more simple and attractive for practical downlink implementation purpose. However, in normal constellation method the authors cannot achieve the minimum PAR if the target clipping level is much...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Implementation and Comparison of Wavelet Transform and Fourier Transform in Wi-Max OFDM System

    WIMAX wireless communication is based on OFDM technology which enables going towards 4G Based on IEEE 802.16d-2004. But the reliability of OFDM is limited with the problems of time varying nature of the channel. This can reduced by adding cyclic prefix or guard interval between each block of data symbols....

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Underground Wireless Communication Channel Modeling and Simulation Using 0.3GMSK Modulation Considering Penetration and Scattering Loss

    Wireless communication inside mines and tunnels is very different from that in terrestrial environment because of the strong attenuation of signals. Here, the authors are developing an empirical model for the underground wireless communication channel based on experimental data which help in predicting the average received signal strength at a...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Performance Comparison of Spread Spectrum Modulation for Wireless Channels Using Ann - Assisted Pseudo - Noise Sequence Generator

    One of the challenging issues in Spread-Spectrum Modulation (SSM) is the design of the Pseudo - Random or Pseudo - Noise (PN) sequence generator. Though several approaches are available that deals with the PN - sequence generator, there always exists the possibility of exploring the use of innovative methods through...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    CCI Cancellation Using KF in Faded MIMO Channels

    Multi Input Multi Output system (MIMO) has become a viable option to meet the demand of high data rate wireless communication. But MIMO system performance is severely affected by the presence of Co-Channel Interference (CCI). CCI cancellation in MIMO channel therefore is a challenging area of research. This paper provides...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Split MLSE Adaptive Equalization in Severely Faded Rayleigh MIMO Channels

    This paper presents an overview of adaptive equalization used in Multiple-Input-Multiple-Output (MIMO) wireless systems. In this paper, the authors consider two-user transmission over a Rayleigh frequency selective fading channel, in which the Channel State Information (CSI) is known by the receiver. Subject to an average transmit power constraint, they study...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Artificial Neural Network Aided Retina Based Biometric Identification System

    Artificial Neural Network (ANN)s are efficient means of prediction, optimization and recognition. Retina is a unique biometric pattern that can be used as a part of a verification system. An ANN can be configured and trained to handle such variations observed in the texture of the retina. The specialty of...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Online Log Analysis for Detecting User Behavior

    Most search engines are not provided the facility of expected results every time. Because two words can have same meaning e.g. if query \"Block size\" is entered in search engine then search engine will display the records related to operating system as well as the living apartment block size. But...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    A Review on Approaches and Models Proposed for Software Reliability Testing

    Reliability testing of software is the key area of concern now-a-days; especially with the software which is safety critical and security prone systems. There is always a need of high software reliability. Most of the present models for evaluation of software reliability are based on statistical and probability approach. When...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Middleware Infrastructure for Predicate Detection in Asynchronous Environment

    Context-awareness is an essential feature of pervasive applications, and runtime detection of contextual properties is one of the primary approaches to enabling context awareness. However, existing context-aware middleware does not provide sufficient support for detection of contextual properties in asynchronous environments. The contextual activities usually involve multiple context collecting devices,...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Qualitative Evaluation of Routing Protocols of MANET in Wireless Sensor Network

    A Mobile Ad-hoc NETwork (MANET) is composed of mobile nodes without any infrastructure. Mobile nodes self-organize to form a network over radio links. The goal of MANETs is to extend mobility into the realm of autonomous, mobile and wireless domains, where a set of nodes form the network routing infrastructure...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Text Clustering in Concept Based Mining

    Text mining mostly used to find out unknown information from natural language processing and data mining by applying various techniques. In text mining most techniques depends on statistical analysis of terms. Statistical analysis trances important terms within document only. However this concept based mining model analyses terms in sentence, document...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Location Based Automatic Sound Profile Switching Application in Android Mobiles

    This is an android application for automatic profile switching as per location. There are many places like hospitals, petrol pumps, universities, corporate offices etc. where it is clearly mentioned, \"Keep the user mobile phones silent!\" Many times people forget to switch the mobile to the \"Silent Mode\" which is not...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    E-Converse an Affordable Touch Screen Solution to Intrigue Dining Experience

    Ample efforts have been taken in restaurant sector to intrigue the dining experience. Several information and communication technologies have been adopted earlier such as PDA; wireless communication technologies etc. These technologies provide a simple but powerful infrastructure. This paper highlights the limitations of the existing technologies and proposed the e-converse,...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Survey Paper on Wifi Community on Android Phones

    With the development of wireless communication, the popularity of android phones, the increasing of social networking services, mobile social networking has become a hot research topic. Personal mobile devices have become ubiquitous and an inseparable part of the authors' daily lives. These devices have evolved rapidly from simple phones and...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Counter Measures Against Evolving Search Engine Spamming Techniques

    Search engine spamming is a practice of misleading the search engine and increasing the page rank of undeserving websites. The black hat Search Engine Optimization (SEO) techniques lead to untrustworthy results for search engines. In this paper, the authors have characterized some commonly used black hat techniques, and they have...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Survey on Review Spam Detection

    Today due to the popularity of E-commerce sites it became a target for spammers apart from well-known email and web spam. The proliferation of E-commerce sites has made web an excellent source of gathering customer reviews about products; as there is no quality control anyone one can write anything which...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Controlling and Monitoring of Remote Host

    In today's world, the role of remote access is changing dramatically. So accessing network remotely is an important issue. The proposed system allows administrator to access network from anywhere at any time. Administrator user can control and monitor the network using RFB (Remote FreameBuffer) protocol. Administrator user can run server...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    An Efficient Algorithm for Clustering Nodes, Classifying and Replication of Content on Demand Basis for Content Distribution in P2P Overlay Networks

    In this paper the authors propose an efficient algorithm for clustering nodes, classifying and replication of content on demand basis for content distribution in p2p overlay networks. Peer-to-peer overlay networks are a good solution for distributed computing than client-server model since nodes in P2P networks act both as client and...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Optimized Intention for Continuous Queries in the Active Data Aggregation Network with Cost Model

    Within an RDBMS streams of changes to the data and reporting when the result of a query defined over the data changes. These queries are referred to as the continuous queries since they continually produce results whenever new data arrives or existing data changes. To make online decision the authors...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    An Efficient and Systematic Virus Detection Processor for Embedded Network Security

    Network security has always been an important issue and its application is ready to perform powerful pattern matching to protect against virus attacks, spam and Trojan horses. However, attacks such as spam, spyware, worms, viruses, and phishing target the application layer rather than the network layer. Therefore, traditional firewalls no...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    An Optimized Arm Scheme for Distinct Network Data Set

    Association Rule Mining (ARM) discovers correlations between different item sets in a transaction database. It provides important knowledge in business for decision makers. Association rule mining is an active data mining research area and most ARM algorithms cater to a centralized environment. Centralized data mining to discover useful patterns in...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Post-Mining of Association Rules Using Ontologies and Rule Schemas

    Knowledge Discovery and Databases (KDD) deals with the overall process of discovering useful knowledge from data. Data mining is a particular step in this process by applying specific algorithms for extracting hidden fact in the data. Association rule mining is one of the data mining techniques that generate a large...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2013

    Wireless Sensor Network with Centralized Embedded Web Server Using ARM 7

    A plat form independent embedded web server and its integration into a network of wireless sensor nodes is implemented here. The embedded web server is designed and built as an expansion module for one of the nodes in the Wireless Sensor Network (WSN). It allows authorized Internet users to establish...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2013

    Implementation and Performance Analysis Evaluation of A New MANET Routing Protocol in Ns-2

    Mobile Ad-hoc NETworks (MANETs) can be defined as a collection of large number of mobile nodes that form temporary network without aid of any existing network infrastructure or central access point. The efficient routing protocols can provide significant benefits to Mobile Ad-hoc NETworks, in terms of both performance and reliability....

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2013

    Minimization of Data Replica in Mobile Adhoc Network Routing

    Ad hoc networks have characteristics such as flexibility, easy deployment, robustness which makes them an interesting technology for various applications. Ad hoc networks are considered as the most promising terminal networks in future mobile communications. A novel position based opportunistic routing protocol, in which several forwarding candidates cache the packet...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2013

    Providing the Boundary Line Controlled Request with Adaptable Transmission Rates in WDM Mesh Networks

    The mixture of applications increases and supported over optical networks, to the network customers new service guarantees must be offered. The partitioning the data into multiple segments can be processed independently the useful data to be transferred before a predefined deadline, this is a deadline driven request. To provide the...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2013

    Efficient E-MRZT Algorithm Based Tree Construction Technique for ZigBee Mobile Wireless Networks

    In Wireless Personal Area Networks (WPANs), the Zigbee protocol/IEEE 802.15.4 standard is a protocol specification for low range, less cost and low power systems. The Zigbee network is usually constructed using cluster trees for the purpose of performing data delivery among nodes and for power saving. Here the data delivery...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2013

    Adaptive Resource Allocation for Wireless Multicast MIMO-OFDM Systems

    Multiple antenna Orthogonal Frequency Division Multiple Access (OFDMA) is a promising technique for the high downlink capacity in the next generation wireless systems, in which adaptive resource allocation would be an important research issue that can significantly improve the performance with guaranteed QoS for users. Moreover, most of the current...

    Provided By Interscience Open Access Journals

  • White Papers // Nov 2010

    A Statistical Approach for Voiced Speech Detection

    Detection of Voice in speech signal is a challenging problem in developing high-performance systems used in noisy environments. In this paper, the authors present an efficient algorithm for robust voiced speech detection and for the application to variable-rate speech coding. The key idea of the algorithm is considering speech energy...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2010

    Applications of Two Dimensional Cellular Automata Rules for Block Cipher in Cryptography

    Cellular Automaton is an idealized parallel processing machine which is an array (1-D, 2-D) of numbers or symbols called cell values together with an updating rule. A cell value is updated based on this updating rule, which involves the cell value as well as other cell values in a particular...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2010

    Designing a Cryptosystem by Implementing Reversible Sequential Switching M/C - A Symmetric Key Approach

    This paper introduces an abstract model of reversible sequential machine in designing the cryptosystem based on the symmetric key approach. A reversible sequential machine is a one-to-one mapping old state and input to new state and output. Reversible computing machine is the mapping of old computational state to new computational...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2010

    Cryptanalysis of the Fast Lightweight Mutual Authentication Protocol

    Security counts as a critical barrier to continuing growth of RFID industry due to lack of a proper high performance lightweight protocol-based solution. Amongst recent developments the Fast Lightweight Mutual Authentication Protocol (FLMAP) has been accepted for its superior speed and low complexity features. Here, the authors examine the security...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2010

    Semantic Learning and Web Image Mining With Image Recognition and Classification

    Image mining is more than just an extension of data mining to image domain. Web Image mining is a technique commonly used to extract knowledge directly from images on WWW. Since, main targets of conventional Web mining are numerical and textual data, Web mining for image data is on demand....

    Provided By Interscience Open Access Journals

  • White Papers // Nov 2010

    Studying Security Issues in HPC (Super Computer) Environment

    HPC has evolved from being a buzzword to becoming one of the most exciting areas in the field of Information Technology & Computer Science. Organizations are increasingly looking to HPC to improve operational efficiency, reduce expenditure over time and improve the computational power. Using Super Computers hosted on a particular...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2010

    Development of Optical Character Recognition Software Package for Mobile Phones

    Optical Character Recognition (OCR) is a technique through which any textual information contained in images are extracted and converted into editable text format. The various OCR software packages which are available in desktop computer with scanner suffer from one primary constraint-MOBILITY. The authors have developed an OCR application for mobile...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2010

    Probabilistic Neural Network Based Approach for Handwritten Character Recognition

    In this paper, recognition system for totally unconstrained handwritten characters for south Indian language of Kannada is proposed. The proposed feature extraction technique is based on Fourier Transform and well known Principal Component Analysis (PCA). The system trains the appropriate frequency band images followed by PCA feature extraction scheme. For...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2010

    Time Domain Signal Detection for MIMO OFDM

    The MIMO techniques with OFDM is regarded as a promising solution for increasing data rates, for wireless access qualities of future wireless local area networks, fourth generation wireless communication systems, and for high capacity, as well as better performance. Hence as part of continued research, in this paper an attempt...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    Comparative Performance Analysis of Ad-Hoc Routing Protocol Using NS-2 Simulator

    Mobile Ad hoc Network is a collection of mobile nodes in which the wireless links are frequently broken down due to mobility and dynamic infrastructure. Routing is a significant issue and challenge in ad hoc networks. In Mobile ad hoc network, due to mobility of nodes network topology change frequently...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    A Comparative Study of Different Smart Parking Assist Systems Using Wireless Sensor Networks

    To deal with the parking guidance issue of the parking lots, this paper proposes a vision of improvements in parking guidance and information system based on wireless sensor system. This system consists of parking space monitoring nodes, routing nodes, parking guidance display and Central control center. The nodes transmit the...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    Mobile Voting Using Global System for Mobile Communication (GSM) Technology and Authentication Using Fingerprinting Biometrics and Wireless Networks

    India is world's largest democracy. Fundamental right to vote or simply voting in elections forms the basis of Indian democracy. In India all earlier elections a voter used to cast his vote by using ballot paper. This is a long, time-consuming process and very much prone to errors. This situation...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    Performance Enhancement of Reactive on Demand Routing Protocol in Wireless Ad Hoc Network

    A Mobile Adhoc NETwork (MANET) is a class of wireless mobile nodes that dynamically organize themselves in arbitrary network topologies. Due to mobility of nodes, routing plays an important role in communication and routing protocols are divided into two basic classes: proactive and reactive. AODV is an on demand routing...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    A Call Admission Control Scheme for Multimedia Support Over IEEE 802.11 Wireless LANs

    These days there is an increasing interest for VoIP over wireless LANs. QoS support for real-time services like voice in the IEEE 802.11 WLAN is an important issue. Since, IEEE 802.11 uses contention based MAC protocol - the distributed coordination function DCF, it is difficult to support the strict QoS...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    User Authentication Techniques for Wireless Sensor Networks : A Survey

    A Wireless Sensor Network (WSN) consisting of a large number of tiny sensors can be an effective tool for gathering data in diverse kinds of environments. The data collected by each sensor node is communicated to the base station, which forwards the data to the end user. In wireless sensor...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    Simulation and Analysis of Impact of Buffering of Voice Calls in Integrated Voice and Data Communication System

    Queuing theory and Markov chain analysis plays vital role in analyzing real-life problems. It is applied to wired network, wireless network and mobile communication to analyze the packet traffic in packet switched network. In this simulation and analysis, integrated communication system such as voice and data is simulated with different...

    Provided By Interscience Open Access Journals

  • White Papers // May 2011

    Design and Implementation of a Lossless Serial High-Speed Data Compression System

    The paper presents a novel VLSI architecture for high-speed data compressor designs which implement the X-Match algorithm. This design involves important trade off that affects the compression performance, latency, and throughput. The most promising approach is implemented into FPGA hardware. This device typical compression ratio that halves the original uncompressed...

    Provided By Interscience Open Access Journals

  • White Papers // May 2011

    Interesting Video Frames Capturing on Digital Video Development Platform

    Video surveillance has been a popular security tool for years. Video surveillance systems produce huge amounts of data for storage and display. Long-term human monitoring of the acquired video is impractical and in-effective. This paper presents a novel solution for real-time cases that identify and record only "Interesting" video frames...

    Provided By Interscience Open Access Journals

  • White Papers // May 2011

    Real Time Monitoring and Neuro-Fuzzy Based Fault Diagnosis of Flow Process in Hybrid System

    Process variables vary with time in certain applications. Monitoring systems let one avoid severe economic losses resulting from unexpected electric system failures by improving the system reliability and maintainability. The installation and maintenance of such monitoring systems is easy when it is implemented using wireless techniques. ZigBee protocol, that is...

    Provided By Interscience Open Access Journals

  • White Papers // May 2011

    Channel Equalization With Single Interference Technique Based on FFT for Efficient OFDM System

    In today's scenario the over sampled OFDM system performance is significantly improved if the deep faded symbols on the sub carriers of each over sampled OFDM signal are discarded and then reconstructed from the remaining OFDM signal by a time domain iterative algorithm. Base on the results of FFT in...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Digital Watermarking Technique Used for Security of Digital Images During Broadcasting and Telecasting by Using DWT

    Signals are any time varying quantity having lot of Information and have its own frequency. Signal can be classified into random signal, periodic signals, and non-periodic signals, discrete or digital signal. Signal may contain various data like audio, video, or in text format. Signal also has information like images. But...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    Effective Analysis of Different Parameters in Ad Hoc Network for Different Protocols

    A wireless Ad-hoc network consists of wireless nodes communicating without the need for a centralized administration, in which all nodes potentially contribute to the routing process. A user can move anytime in an ad hoc scenario and, as a result, such a network needs to have routing protocols which can...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    A Fuzzy Implementation of Biometrics With Five Factor Authentication System for Secured Banking

    Remote authentication is the most commonly used method to determine the identity of a remote client. Secure and efficient authentication scheme has been a very important issue with the development of networking technologies. In a Generic Framework for Authentication, preserving security and privacy in distributed systems provide three factors for...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    Normalized Transfer of Bulk Data By Using UDP in Dedicated Networks

    High speed bulk data transfer is an important part of many data-intensive scientific applications. TCP fails for the transfer of large amounts of data over long distance across high-speed dedicated network links. Due to system hardware is incapable of saturating the bandwidths supported by the network and rise buffer overflow...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    End-to-End Delay Optimization in Wireless Sensor Network (WSN)

    In this paper, the authors are interested in optimizing the delay of event-driven wireless sensor networks, for which events does not occur frequently. In such systems, most of the energy is consumed when the radios are on, waiting for an arrival to occur. Sleep-wake scheduling is an effective mechanism to...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    Performance Evaluation of Extended AODV Using Different Scenarios

    The mobile ad hoc networks have become a major component of the future network development due to their ease of deployment, self configurability; flexibility and independence on any existing network infrastructure Mobile ad-hoc network have the attributes such as wireless connection, continuously changing topology, distributed operation and ease of deployment....

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    Development of Empirical Mode Decomposition

    In this paper, one of the tasks for which empirical mode decomposition is potentially useful is nonparametric signal denoising, an area for which wavelet thresholding has been the dominant technique for many years. In this paper, the wavelet thresholding principle is used in the decomposition modes resulting from applying EMD...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    QoS Routing in Mobile Ad-Hoc Networks Using Agents

    Quality of Service (QoS) provisioning in a Mobile Ad-hoc NETwork (MANETs) routing for multimedia traffic is a challenging task due to dynamic topology of such networks. Fuzzy Logic (FL) was used for QoS prediction from current uncertain QoS constraints in the network for particular applications, from these uncertain constraints there...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    An Efficient Key Management Scheme for Secure Data Access Control in Wireless Broadcast Services

    Wireless broadcast is an effective approach to disseminate data to a number of users. To provide secure access to data in wireless broadcast services, symmetric key - based encryption is used to ensure that only users who own the valid keys can decrypt the data. Regarding various subscriptions, an efficient...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    Quality of Service Based Handover Approach in a WLAN Network

    As the technology is improving so are the demands of end users and their applications increasing. A wide variety of new applications are being invented daily. These applications have different demands from the underlying network protocol suite. High bandwidth internet connectivity has become a basic requirement to the success of...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    Dual-Hop OSTBC Transmissions Over Fading Channels Under Receiver Phase Noise for Regenerative Systems

    Space-time coding for fading channels is a Communication technique that realizes the diversity benefits of multiple transmit antennas. Previous work in this area has focused on the narrowband flat fading case where spatial diversity only is available. In this paper, the authors investigate the use of space-time coding in OFDM...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    Route Request Flooding Attack Using Trust Based Security Scheme in Manet

    In recent years, the use of Mobile Ad hoc NETworks (MANETs) has been widespread in many applications, including some mission critical applications, and as such security has become one of the major concerns in MANETs. A mobile ad hoc network is set up with a group of mobile wireless nodes...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    Fault Tolerant, Energy Saving Method for Reliable Information Propagation in Sensor Network

    The reliability of Wireless Sensor Networks (WSN) is affected by faults that may occur due to various reasons such as malfunctioning hardware, software glitches, dislocation, or environmental hazards, e.g. fire or flood. Due to inherent nature of these networks a sensor node may fail and hence the route may also...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    Techniques for Load Balancing in Wireless LAN

    This suggests new strategies for balancing load in a wireless network connected in star topology. The loads are assigned to each processor using divisible load theory & Different techniques. Divisible load theory suggests that a load can be divided arbitrarily such that each fraction of the load can be independently...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Analyzing the Performance of Data Dissemination Algorithms to Application Requirements in Wireless Sensor Network

    A Wireless Sensor Network (WSN) is a collection of thousands of tiny sensor nodes having the capability of wireless communication, limited computation and sensing. Many data dissemination protocols have been proposed for multi-hop communication in sensor networks, each evaluated in some scenario. Many protocols are designed to exploit application requirements,...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Study of Wireless Sensor Network in SCADA System for Power Plant

    In this paper, study of wireless SCADA system which is powerful setup for monitoring and controlling the various applications from remotely placed is presented. All communication between GSM modem and user are wireless based, this translates into lowest cost compared to all other systems. Wireless based solutions have universally accepted,...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Performance Comparison of Routing Protocols in MANET Varying Network Size

    A Mobile Ad hoc NETwork (MANET) consists of mobile wireless nodes in which the communication between nodes is carried out without any centralized control. MANET is a self organized and self configurable network where the mobile nodes move arbitrarily. The mobile nodes can receive and forward packets as a router....

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Dual Bootstrap Server Based Super peer Overlay Construction

    Many two-layer hierarchy unstructured Peer-To-Peer (P2P) systems, comprising of superpeers and ordinary peers improved the performance of large scale P2P systems. The construction and maintenance of the superpeer overlay network play an important role in improving the performance P2P systems. One efficient method of constructing the superpeer overlay network is...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Evaluation of Proactive, Reactive and Hybrid Ad Hoc Routing Protocol for Various Battery Models in VANET Using Qualnet

    In VANET high speed is the real characteristic which leads frequent breakdown, interference etc. In this paper, the authors studied various Ad hoc routing protocols, Reactive, Proactive & Hybrid, taking in to consideration various VANET parameters like speed, altitude etc in real traffic scenario and evaluated them for various battery...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Autonomic Diffusion Based Spray Routing in Intermittently Connected Mobile Networks With Multiple Copies

    Intermittently connected mobile Network systems represent a challenging environment for networking research, due to the problems of ensuring messages delivery in spite of frequent disconnections and random meeting patterns. These networks fall into general category of Delay Tolerant Networks. There are many real networks that follow this model, for example,...

    Provided By Interscience Open Access Journals