Interscience Open Access Journals

Displaying 41-80 of 426 results

  • White Papers // Apr 2013

    Improving Spam Email Filtering Efficiency Using Bayesian Backward Approach Project

    Unethical e-mail senders bear little or no cost for mass distribution of messages; yet normal e-mail users are forced to spend time and effort in reading undesirable messages from their mailboxes. Due to the rapid increase of electronic mail (or e-mail), several people and companies found it an easy way...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2013

    Cloud Computing Applications and Security Issues: An Analytical Survey

    Cloud computing, a rapidly developing information technology has becoming a well-known the whole world. Cloud computing is Internet-based computing, whereby shared resources, software and information, are provided to computers and devices on-demand, like the electricity grid. Cloud computing is the product of the fusion of traditional computing technology and network...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2013

    Data Warehousing Applications: An Analytical Tool for Decision Support System

    Data-driven decision support systems, such as data warehouses can serve the requirement of extraction of information from more than one subject area. Data warehouses standardize the data across the organization so as to have a single view of information. Data Warehouses (DW) can provide the information required by the decision...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2013

    Transmission Network Expansion with Transmission Loading Relief

    Transmission planning should seek to maintain or improve system security over time and facilitate robust wholesale power markets by improving transmission capacity for bulk power transfers across wide regions It includes finding the optimal plan for the electrical system expansion, it must specify the transmission lines and/or transformers that should...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Performance Comparison of Spread Spectrum Modulation for Wireless Channels Using Ann - Assisted Pseudo - Noise Sequence Generator

    One of the challenging issues in Spread-Spectrum Modulation (SSM) is the design of the Pseudo - Random or Pseudo - Noise (PN) sequence generator. Though several approaches are available that deals with the PN - sequence generator, there always exists the possibility of exploring the use of innovative methods through...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    A Rake Receiver Design for Ultra Wide Band Application

    In this paper, the authors describe the design and implementation of a rake receiver for use with Ultra Wide Band (UWB) systems. The rake receiver uses Spread Spectrum Modulation (SSM) aided by kasami sequence generator. The combination is found to be effective in dealing with multipath fading and signal to...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    The New Adaptive Active Constellation Extension Algorithm for Par Minimization in OFDM Systems

    In this paper, the peak-to-average ratio reduction in OFDM systems is implemented by the Adaptive Active Constellation Extension (ACE) technique which is more simple and attractive for practical downlink implementation purpose. However, in normal constellation method the authors cannot achieve the minimum PAR if the target clipping level is much...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Implementation and Comparison of Wavelet Transform and Fourier Transform in Wi-Max OFDM System

    WIMAX wireless communication is based on OFDM technology which enables going towards 4G Based on IEEE 802.16d-2004. But the reliability of OFDM is limited with the problems of time varying nature of the channel. This can reduced by adding cyclic prefix or guard interval between each block of data symbols....

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Underground Wireless Communication Channel Modeling and Simulation Using 0.3GMSK Modulation Considering Penetration and Scattering Loss

    Wireless communication inside mines and tunnels is very different from that in terrestrial environment because of the strong attenuation of signals. Here, the authors are developing an empirical model for the underground wireless communication channel based on experimental data which help in predicting the average received signal strength at a...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    CCI Cancellation Using KF in Faded MIMO Channels

    Multi Input Multi Output system (MIMO) has become a viable option to meet the demand of high data rate wireless communication. But MIMO system performance is severely affected by the presence of Co-Channel Interference (CCI). CCI cancellation in MIMO channel therefore is a challenging area of research. This paper provides...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Split MLSE Adaptive Equalization in Severely Faded Rayleigh MIMO Channels

    This paper presents an overview of adaptive equalization used in Multiple-Input-Multiple-Output (MIMO) wireless systems. In this paper, the authors consider two-user transmission over a Rayleigh frequency selective fading channel, in which the Channel State Information (CSI) is known by the receiver. Subject to an average transmit power constraint, they study...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Artificial Neural Network Aided Retina Based Biometric Identification System

    Artificial Neural Network (ANN)s are efficient means of prediction, optimization and recognition. Retina is a unique biometric pattern that can be used as a part of a verification system. An ANN can be configured and trained to handle such variations observed in the texture of the retina. The specialty of...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Online Log Analysis for Detecting User Behavior

    Most search engines are not provided the facility of expected results every time. Because two words can have same meaning e.g. if query \"Block size\" is entered in search engine then search engine will display the records related to operating system as well as the living apartment block size. But...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    A Review on Approaches and Models Proposed for Software Reliability Testing

    Reliability testing of software is the key area of concern now-a-days; especially with the software which is safety critical and security prone systems. There is always a need of high software reliability. Most of the present models for evaluation of software reliability are based on statistical and probability approach. When...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Middleware Infrastructure for Predicate Detection in Asynchronous Environment

    Context-awareness is an essential feature of pervasive applications, and runtime detection of contextual properties is one of the primary approaches to enabling context awareness. However, existing context-aware middleware does not provide sufficient support for detection of contextual properties in asynchronous environments. The contextual activities usually involve multiple context collecting devices,...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Qualitative Evaluation of Routing Protocols of MANET in Wireless Sensor Network

    A Mobile Ad-hoc NETwork (MANET) is composed of mobile nodes without any infrastructure. Mobile nodes self-organize to form a network over radio links. The goal of MANETs is to extend mobility into the realm of autonomous, mobile and wireless domains, where a set of nodes form the network routing infrastructure...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Text Clustering in Concept Based Mining

    Text mining mostly used to find out unknown information from natural language processing and data mining by applying various techniques. In text mining most techniques depends on statistical analysis of terms. Statistical analysis trances important terms within document only. However this concept based mining model analyses terms in sentence, document...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Location Based Automatic Sound Profile Switching Application in Android Mobiles

    This is an android application for automatic profile switching as per location. There are many places like hospitals, petrol pumps, universities, corporate offices etc. where it is clearly mentioned, \"Keep the user mobile phones silent!\" Many times people forget to switch the mobile to the \"Silent Mode\" which is not...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    E-Converse an Affordable Touch Screen Solution to Intrigue Dining Experience

    Ample efforts have been taken in restaurant sector to intrigue the dining experience. Several information and communication technologies have been adopted earlier such as PDA; wireless communication technologies etc. These technologies provide a simple but powerful infrastructure. This paper highlights the limitations of the existing technologies and proposed the e-converse,...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Survey Paper on Wifi Community on Android Phones

    With the development of wireless communication, the popularity of android phones, the increasing of social networking services, mobile social networking has become a hot research topic. Personal mobile devices have become ubiquitous and an inseparable part of the authors' daily lives. These devices have evolved rapidly from simple phones and...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Counter Measures Against Evolving Search Engine Spamming Techniques

    Search engine spamming is a practice of misleading the search engine and increasing the page rank of undeserving websites. The black hat Search Engine Optimization (SEO) techniques lead to untrustworthy results for search engines. In this paper, the authors have characterized some commonly used black hat techniques, and they have...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Survey on Review Spam Detection

    Today due to the popularity of E-commerce sites it became a target for spammers apart from well-known email and web spam. The proliferation of E-commerce sites has made web an excellent source of gathering customer reviews about products; as there is no quality control anyone one can write anything which...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Controlling and Monitoring of Remote Host

    In today's world, the role of remote access is changing dramatically. So accessing network remotely is an important issue. The proposed system allows administrator to access network from anywhere at any time. Administrator user can control and monitor the network using RFB (Remote FreameBuffer) protocol. Administrator user can run server...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    An Efficient Algorithm for Clustering Nodes, Classifying and Replication of Content on Demand Basis for Content Distribution in P2P Overlay Networks

    In this paper the authors propose an efficient algorithm for clustering nodes, classifying and replication of content on demand basis for content distribution in p2p overlay networks. Peer-to-peer overlay networks are a good solution for distributed computing than client-server model since nodes in P2P networks act both as client and...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Optimized Intention for Continuous Queries in the Active Data Aggregation Network with Cost Model

    Within an RDBMS streams of changes to the data and reporting when the result of a query defined over the data changes. These queries are referred to as the continuous queries since they continually produce results whenever new data arrives or existing data changes. To make online decision the authors...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    An Efficient and Systematic Virus Detection Processor for Embedded Network Security

    Network security has always been an important issue and its application is ready to perform powerful pattern matching to protect against virus attacks, spam and Trojan horses. However, attacks such as spam, spyware, worms, viruses, and phishing target the application layer rather than the network layer. Therefore, traditional firewalls no...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    An Optimized Arm Scheme for Distinct Network Data Set

    Association Rule Mining (ARM) discovers correlations between different item sets in a transaction database. It provides important knowledge in business for decision makers. Association rule mining is an active data mining research area and most ARM algorithms cater to a centralized environment. Centralized data mining to discover useful patterns in...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Post-Mining of Association Rules Using Ontologies and Rule Schemas

    Knowledge Discovery and Databases (KDD) deals with the overall process of discovering useful knowledge from data. Data mining is a particular step in this process by applying specific algorithms for extracting hidden fact in the data. Association rule mining is one of the data mining techniques that generate a large...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2013

    Wireless Sensor Network with Centralized Embedded Web Server Using ARM 7

    A plat form independent embedded web server and its integration into a network of wireless sensor nodes is implemented here. The embedded web server is designed and built as an expansion module for one of the nodes in the Wireless Sensor Network (WSN). It allows authorized Internet users to establish...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2013

    Implementation and Performance Analysis Evaluation of A New MANET Routing Protocol in Ns-2

    Mobile Ad-hoc NETworks (MANETs) can be defined as a collection of large number of mobile nodes that form temporary network without aid of any existing network infrastructure or central access point. The efficient routing protocols can provide significant benefits to Mobile Ad-hoc NETworks, in terms of both performance and reliability....

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2013

    Minimization of Data Replica in Mobile Adhoc Network Routing

    Ad hoc networks have characteristics such as flexibility, easy deployment, robustness which makes them an interesting technology for various applications. Ad hoc networks are considered as the most promising terminal networks in future mobile communications. A novel position based opportunistic routing protocol, in which several forwarding candidates cache the packet...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2013

    Providing the Boundary Line Controlled Request with Adaptable Transmission Rates in WDM Mesh Networks

    The mixture of applications increases and supported over optical networks, to the network customers new service guarantees must be offered. The partitioning the data into multiple segments can be processed independently the useful data to be transferred before a predefined deadline, this is a deadline driven request. To provide the...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2013

    Efficient E-MRZT Algorithm Based Tree Construction Technique for ZigBee Mobile Wireless Networks

    In Wireless Personal Area Networks (WPANs), the Zigbee protocol/IEEE 802.15.4 standard is a protocol specification for low range, less cost and low power systems. The Zigbee network is usually constructed using cluster trees for the purpose of performing data delivery among nodes and for power saving. Here the data delivery...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2013

    Adaptive Resource Allocation for Wireless Multicast MIMO-OFDM Systems

    Multiple antenna Orthogonal Frequency Division Multiple Access (OFDMA) is a promising technique for the high downlink capacity in the next generation wireless systems, in which adaptive resource allocation would be an important research issue that can significantly improve the performance with guaranteed QoS for users. Moreover, most of the current...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2013

    Minimax Filtering in Wireless Sensor and Actor Networks

    Wireless Sensor and Actor Networks (WSANs) are distributed wireless networks of heterogeneous devices referred to as sensors and actors. In Wireless Sensor and Actor Networks (WSANs) the collaborative operation of sensors enables the distributed sensing of physical phenomenon, while actors collect and process sensor data and perform appropriate actions. Sensors...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2013

    Mobile Networking for "Smart Dust" with RFID Sensor Networks

    Large-scale networks of wireless sensors are becoming an active topic of research. The authors review the key elements of the emergent technology of "Smart Dust" and outline the research challenges they present to the mobile networking and systems community, which must provide coherent connectivity to large numbers of mobile network...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2013

    Overview of Wireless Network Control Protocol in Smart Phone Devices

    The computer network connection without wire or any cable is referring as wireless network. These Wireless Local Area Networks are popular for its worldwide applications. It has covered wide scale Wireless Local Area Network. The large scale systems to all applicable areas make large numbers of wireless termination and covering...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2013

    Design Issues and Classification of WSNs Operating Systems

    Wireless Sensor Networks is an emerging area of research. Wireless Sensor Networks (WSNs) face lot of problems that do not arise in other types of wireless networks and computing environments. Limited computational resources, power constraints, low reliability and higher density of sensor nodes (motes) are just some basic problems that...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2013

    Routing Protocol for Vehicular Adhoc Network

    Vehicular Ad-hoc NETworks (VANETs) are special type of Mobile Ad-hoc NETworks (MANETs) where wireless equipped vehicles from a network are continuously travelling along the road. Node movement feature of Vehicular Ad-hoc NETwork (VANET) closely resembles with that of Mobile Ad-hoc NETwork (MANET) but its high speed mobility and unpredictable movement...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2013

    Review on Hierarchical Routing in Wireless Sensor Networks

    The Wireless Sensor Network (WSN) has become an interesting field of research of the 21st century. It is a type of the wireless ad-hoc network. This has brought about developing low cost, low-power and multi-function sensor nodes. The network life for Wireless Sensor Network plays an important role in survivability....

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Star Varietal Cube: A New Large Scale Parallel Interconnection Network

    This paper proposes a new interconnection network topology, called the Star varietal-cube SVC (n, m), for large scale multicomputer systems. The authors take advantage of the hierarchical structure of the Star graph network and the Varietal hypercube to obtain an efficient method for constructing the new topology. The Star graph...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Detection of Phishing Websites and Secure Transactions

    Phishing is an electronic online identity theft in which the attackers use a combination of social engineering and web site spoofing techniques to trick a user into revealing confidential information. It steals the user's personal identity data and financial credentials. Most of the phishing attacks emerge as spoofed E-Mails appearing...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Integrated Approach of Malicious Website Detection

    With the advent and the rising popularity of Internet, security is becoming one of the focal point. At present, Web sites have become the attacker's main target. The attackers uses the strategy of embedding the HTML tags, the script tag to include web-based Trojan scripting or redirector scripting, the embedded...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2012

    Simulation and Performance Analysis Evaluation for Multipath Extension of Aodv to Improve End to End Delay, Route Error Sent, Routing Load and Packet Drop Ratio

    This paper describes improvement in standard routing protocol AODV for mobile ad-hoc networks. The mechanism setups multiple optimal paths based on bandwidth and delay. It allows to store multiple optimal paths based on Bandwidth and delay. At time of link failure, it will switch to next available path. To set...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2012

    GSM Based Intelligent Wireless Mobile Patient Monitoring System Using ZIGBEE Communication

    Miniaturization of biomedical sensors helped the fast development and popularization of information processing and wireless data transmission technology, the research of wireless medical monitoring system has became a hot topic. By utilizing the wireless technique to transmit information between medical sensor and monitoring control center, the free space of patients...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2012

    HTCPM: A Hybrid Test Case Prioritization Model for Web and GUI Applications

    Web and Event-Driven Applications (EDS) is a class of applications that is quickly becoming ubiquitous. All EDS take sequences of events (e.g., messages, mouse-clicks) as input, change their state, and produce an output (e.g., events, system calls, text messages), where as in web, user session data gathered as users operate...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2012

    A Public Key Distribution and Broadcast Authentication Scheme for Wireless Sensor Networks

    In wireless sensor networks, broadcast communication is the most fundamental and prevailing communication pattern. Securing the broadcast messages from the adversary is critical issue. To defend the WSNs against the adversary attacks of impersonation of a broadcast source or receiver, modification/fabrication of the broadcast message, attacker injecting malicious traffic to...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2012

    EBDP Buffer Sizing Strategy 802.11 Based WLANS

    In this paper, the authors present wired routers, for whom the sizing of buffers is an active research topic. The classical rule of thumb for sizing wired buffers is to set buffer sizes to be the product of the bandwidth and the average delay of the flows utilizing this link,...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2012

    Performance Optimization in Networks Serving Heterogeneous Flows

    Channel-aware scheduling strategies have emerged as an effective mechanism for improving the throughput of wireless data users by exploiting rate variations. The improvement in throughput comes however at the expense of an increase in the variability of the service rate received over time. While the larger variability only has a...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2012

    Ontology for Automatic Acquisition Web User Information

    Information retrieval has a well-established tradition of performing laboratory experiments on test collections to compare the relative effectiveness of different retrieval approaches. The experimental design specifies the evaluation criterion to be used to determine if one approach is better than another. Retrieval behavior is sufficiently complex to be difficult to...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2012

    Tracking of Moving Object in Wireless Sensor Network

    A Wireless Sensor Network is a collection of sensor nodes distributed into a network to monitor the environmental conditions and send the sensed data to the Base Station. Wireless Sensor Network is one of the rapidly developing area in which energy consumption is the most important aspect to be considered...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Eon of Implementing a Multifaceted Cloud Based Ocr in Apple's Compassionate App Store Milieu

    Cloud architectures discourse key hitches surrounding large-scale data dispensation. In customary data processing it is grim to get as many machines as an application needs. Second, it is difficult to get the machines when one needs them. Third, it is difficult to dispense and harmonize a large-scale job on different...

    Provided By Interscience Open Access Journals

  • White Papers // Mar 2012

    Record Matching for Web Databases by Domain-Specific Query Probing

    Record matching refers to the task of finding entries that refer to the same entity in two or more files, is a vital process in data integration. Most of the record matching methods are supervised, which requires the user to provide training data. These methods are not applicable for web...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2012

    An Area Efficient 32-Bit Carry-Select Adder for Low Power Applications

    CSLA is used in many computational systems to alleviate the problem of carry propagation delay by independently generating multiple carries and then select a carry to generate the sum. However, the CSLA is not area efficient because it uses multiple pairs of Ripple Carry Adders (RCA) to generate partial sum...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2012

    Edge-Triggered Pulsed Sequential Elements With SoC Applications

    The System-On-Chip (SoC) design is integrating hundreds of millions of transistors on one chip, whereas packaging and cooling only have a limited ability to remove the excess heat. In this paper, various design techniques for a low power clocking system are surveyed. Among them is an effective way to reduce...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2012

    Load Balancing in Computational Grids Using Ant Colony Optimization Algorithm

    Grid computing is the combination of computer resources from multiple administrative domains for a common goal. Load balancing is one of the critical issues that must be considered in managing a grid computing environment. It is complicated due to the distributed and heterogeneous nature of the resources. An ant colony...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2012

    Novel Techniques to Eradicate Energy Inefficiencies That Abbreviate the Lifetime of the Cell Phone Based WSNs

    The cell phone based WSN of compressed micro-sensors for data acquirement and supervise some surroundings distinctiveness, such as noise, trembling, temperature, and strain. These sensors are entrenched devices accomplished of data communication. In numerous of applications, sensor nodes are deployed over a geo-graphically large region. Due to their configuration, data...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2012

    Clustering Based Classification and Analysis of Data

    This paper presents clustering based document classification and analysis of data. The proposed clustering based classification and analysis of data approach is based on unsupervised and supervised document classification. In this paper unsupervised document and supervised document classification are used. In this approach document collection, text preprocessing, feature selection, indexing,...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2012

    Exploiting Data Mining Techniques for Improving the Efficiency of Time Series Data

    The research work in data mining has achieved a high attraction due to the importance of its applications This paper addresses some theoretical and practical aspects on Exploiting Data Mining Techniques for Improving the Efficiency of Time Series Data using SPSS-CLEMENTINE. This paper can be helpful for an organization or...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2012

    Enhanced Security in Cloud With Multi-Level Intrusion Detection System

    Cloud computing is a new type of service which provides large scale computing resource to each customer. Cloud Computing Systems can be easily threatened by various cyber attacks, because most of Cloud computing system needs to contain some Intrusion Detection Systems (IDS) for protecting each Virtual Machine (VM) against threats....

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2012

    A Novel Approach for Information Security With Automatic Variable Key Using Fibonacci Q-Matrix

    Information security is essential nowadays. Large number of cipher generation and decryption algorithms exists and are being evolved due to increasing demand of users and e-commerce services. In this paper, the authors propose a new approach for secure information transmission over communication channel with key variability concept in symmetric key...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2012

    An Ant Colony Optimization for Job Scheduling to Minimize Makespan Time

    This paper deals with the make span minimization for Job Scheduling. Research on optimization techniques of the Job Scheduling Problem (JSP) is one of the most significant and promising areas of an optimization. Instead of the traditional optimization method, this paper presents an investigation into the use of an Ant...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2012

    Network Reconfiguration in Distribution System by Software Simulation for Loss Reduction

    The main aim of the distribution companies is to reduce their operating costs to get ahead of competition. One of the most popular approach is to increase the degree of reliability of distribution system. The management of network defeats (e.g., earth fault and short circuits) offers a lot of feasibilities...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Internet Access in Remote Areas Using NXP Microcontroller and GSM Modem

    In India and many developing and under-developed countries, providing internet facility to many school-going students is still a far-fetched concept. In this paper, which is based on the authors' project, they propose a new system which circumvents the internet architecture by using GSM infrastructure to access internet services, albeit on...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Self-Managing Performance in Application Servers - Modelling and Data Architecture

    High performance is always a desired objective in computing systems. Managing performance through manual intervention is a well-known and obvious mechanism. The attempts to self-manage performance with minimal human intervention are pre-dominant in the recent advances of research. Control Systems theory is playing a significant role in building such intelligent...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Automated Swim (Single Window Infrastructure Management) for Cloud

    Data centers manage complex server environments, including physical and virtual machines, across a wide variety of platforms, and often in geographically dispersed locations. Information Technology managers are responsible for ensuring that servers in these increasingly complex environments are properly configured and monitored throughout the IT life cycle. They also face...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Improved Near Duplicate Matching Scheme for E-Mail Spam Detection

    Today the major problem that the people are facing is spam mails or e-mail spam. In recent years there are so many schemes are developed to detect the spam emails. Here the primary idea of the similarity matching scheme for spam detection is to maintain a known spam database, formed...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Smart Worms Defense and Detection

    There are several worm attacks in the recent years, this leads to an essentiality of producing new detection technique for worm attacks. In this paper, the authors present a spectrum based smart worm detection scheme, this is based on the idea of detection of worm in the frequency domain. This...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Use of Web Harvesting Technique

    Web harvesting (Web data extraction) is a computer software technique of extracting information from websites. Usually, such software programs simulate human exploration of the Web by either implementing low-level Hyper-Text Transfer Protocol (HTTP), or embedding certain full-fledged Web browsers. Web harvesting is closely related to Web indexing, which indexes information...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    An Efficient Multi-Constrained Feasible Path Selection for Manet

    Quality-of-Service (QoS) routing in an ad-hoc network is difficult because the network topology may change constantly and the available state information for routing is inherently imprecise. This paper proposes a method for multi-constrained feasible path selection for MANET. The authors introduce the composite function which allows OLSR to find the...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Review of XY Routing Algorithm for Network-on-Chip Architecture

    The Network-on-Chip (NoC) is Network-version of System-on-Chip (SoC) means that on-chip communication is done through packet based networks. In NOC topology, routing algorithm and switching are main terminology. The routing algorithm is one of the key factor in NOC architecture. The routing algorithm, which defines as the path taken by...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Raptor Code Based Secure Storage in Cloud Computing

    The end of this decade is marked by a paradigm shift of the industrial information technology towards a pay-peruse service business model known as cloud computing. Cloud data storage redefines the security issues targeted on customer's outsourced data. To ensure the correctness of users' data in the cloud, the authors...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Improved Security System in Mobile Cloud Access Through Fuzzy Intrusion Detection Technique

    Mobile phones are playing a vital role in every one's life. The computing strategy of mobile internet usage is lower than the mobile usage, this may due to the security threat. In general mobility and cloud computing initializing the global marketing, sales and development activities using mobile platforms to market...

    Provided By Interscience Open Access Journals

  • White Papers // Mar 2011

    A Temporal Logic Based Approach to Multi-Agent Intrusion Detection and Prevention

    Collaborative systems research in the last decade have led to the development in several areas ranging from social computing, e-learning systems to management of complex computer networks. Intrusion Detection Systems (IDS) available today have a number of problems that limit their configurability, scalability or efficiency. An important shortcoming is that...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    A Lime Light on the Emerging Trends of Web Mining

    The World Wide Web is a huge, information center for a variety of applications. Web contains a dynamic and rich collection of hyperlink information. It allows Web page access, usage of information and provides numerous sources for data mining. The goal of Web mining is to discover the pattern of...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    A Novel Traffic Tracking System Based on Division of Video Into Frames and Processing

    This paper is to visualize and analyze video. Videos are sequence of image frames. In this work, algorithm will be developed to analyze a frame and the same will be applied to all frames in a video. It is expected see unwanted objects in video frame, which can be removed...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Mechanism to Mitigate Application Layer DDoS Attack With a Light Weight Trust Approach

    New application layer DDoS attacks is a continuous critical threat to which network layer solutions is not applicable as attackers are indistinguishable based on packets or protocols. The increase in Internet-based transactions and communications offers new opportunities for hackers to disrupt business operations with DDoS attacks to prevent legitimate users...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Combining Server and Storage Virtualization: A New Dimension for SMB's

    The virtualization wave is quickly reaching its way down into the small-to-medium-sized business. Virtualization provides unmatched flexibility, performance, and utilization by allowing the user to move server workloads from one virtual workspace to the next, maximizing server resources on the fly based on their business needs. Server virtualization eliminates the...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2012

    Basic Concept of Embedded "C": Review

    The use of C language to program micro controllers is becoming too common. And most of the time its not easy to build an application in assembly which instead the user can make easily in C. So its important that they know C language for micro controller which is commonly...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2012

    Neighbourhood Load Routing and Multi-Channels in Wireless Mesh Networks

    As an emerging technology, wireless mesh networks are making significant progress in the area of wireless networks in recent years. Routing in Wireless Mesh Network (WMN) is challenging because of the unpredictable variations of the wireless environment. Traditional mechanisms have been proved that the routing performance would get deteriorated and...

    Provided By Interscience Open Access Journals