Interscience Open Access Journals

Displaying 41-80 of 434 results

  • White Papers // Apr 2013

    Efficient and Secure Authentication by Using 3-Path Transmission in Ad Hoc Networks

    Ad hoc networks are created dynamically and maintained by the individual nodes comprising the network. They do not require a pre-existing architecture for communication purposes and do not rely on any form of wired infrastructure; in an ad hoc network all communication occurs through a wireless median. The design and...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2013

    Current Reuse Active Inductor Based Wideband LNA

    In this paper, the authors present the design of an active inductor based wideband LNA using current reuse topology, which is designed and simulated in 0.18um CMOS technology. The low noise amplifier is considered to be the key block in an RF receiver. It plays a critical role in determining...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2013

    Hermitian Symmetry Based Fiber Non-Linearity Compensation in Optical OFDM Networks

    Orthogonal Frequency Division Multiplexing (OFDM) is a modulation technique which is now used in most new and emerging broadband wired and wireless communication systems such as standard 802.11a/b/g/n, Digital Video Broad casting TeleVision (DVB-TV), and Long Term Evolution (LTE) in the next mobile generation, due to its capacity in solving...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2013

    Wireless Real Time Proportional Control System

    This system provides low power consuming and low cost wireless sensor network. This system provides a real time temperature and humidity. It also gives proportional control action. This system consists of TI's MSP430 microcontroller which consumes ultra low power and improves the overall system performance. The Sensorion's SHT 11 sensor...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2013

    Maximizing the Lifetime and Security of Wireless Sensor Networks

    Recent technological advances have facilitated the widespread use of Wireless Sensor Networks in many applications such as battle field surveillance, environmental observations, biological detection and industrial diagnostics. In Wireless Sensor Networks, sensor nodes are typically power-constrained with limited lifetime, and so it's necessary to understand however long the network sustains...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2013

    The Mathematical Analysis of Column Oriented Database

    There are two obvious ways to map a two-dimension relational database table onto a one-dimensional storage interface: store the table row-by-row, or store the table column-by-column. Historically, database system implementations and research have focused on the row-by row data layout, since it performs best on the most common application for...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2013

    Improving Spam Email Filtering Efficiency Using Bayesian Backward Approach Project

    Unethical e-mail senders bear little or no cost for mass distribution of messages; yet normal e-mail users are forced to spend time and effort in reading undesirable messages from their mailboxes. Due to the rapid increase of electronic mail (or e-mail), several people and companies found it an easy way...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2013

    Cloud Computing Applications and Security Issues: An Analytical Survey

    Cloud computing, a rapidly developing information technology has becoming a well-known the whole world. Cloud computing is Internet-based computing, whereby shared resources, software and information, are provided to computers and devices on-demand, like the electricity grid. Cloud computing is the product of the fusion of traditional computing technology and network...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2013

    Data Warehousing Applications: An Analytical Tool for Decision Support System

    Data-driven decision support systems, such as data warehouses can serve the requirement of extraction of information from more than one subject area. Data warehouses standardize the data across the organization so as to have a single view of information. Data Warehouses (DW) can provide the information required by the decision...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2013

    Transmission Network Expansion with Transmission Loading Relief

    Transmission planning should seek to maintain or improve system security over time and facilitate robust wholesale power markets by improving transmission capacity for bulk power transfers across wide regions It includes finding the optimal plan for the electrical system expansion, it must specify the transmission lines and/or transformers that should...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Performance Comparison of Spread Spectrum Modulation for Wireless Channels Using Ann - Assisted Pseudo - Noise Sequence Generator

    One of the challenging issues in Spread-Spectrum Modulation (SSM) is the design of the Pseudo - Random or Pseudo - Noise (PN) sequence generator. Though several approaches are available that deals with the PN - sequence generator, there always exists the possibility of exploring the use of innovative methods through...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    A Rake Receiver Design for Ultra Wide Band Application

    In this paper, the authors describe the design and implementation of a rake receiver for use with Ultra Wide Band (UWB) systems. The rake receiver uses Spread Spectrum Modulation (SSM) aided by kasami sequence generator. The combination is found to be effective in dealing with multipath fading and signal to...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    The New Adaptive Active Constellation Extension Algorithm for Par Minimization in OFDM Systems

    In this paper, the peak-to-average ratio reduction in OFDM systems is implemented by the Adaptive Active Constellation Extension (ACE) technique which is more simple and attractive for practical downlink implementation purpose. However, in normal constellation method the authors cannot achieve the minimum PAR if the target clipping level is much...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Implementation and Comparison of Wavelet Transform and Fourier Transform in Wi-Max OFDM System

    WIMAX wireless communication is based on OFDM technology which enables going towards 4G Based on IEEE 802.16d-2004. But the reliability of OFDM is limited with the problems of time varying nature of the channel. This can reduced by adding cyclic prefix or guard interval between each block of data symbols....

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Underground Wireless Communication Channel Modeling and Simulation Using 0.3GMSK Modulation Considering Penetration and Scattering Loss

    Wireless communication inside mines and tunnels is very different from that in terrestrial environment because of the strong attenuation of signals. Here, the authors are developing an empirical model for the underground wireless communication channel based on experimental data which help in predicting the average received signal strength at a...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    CCI Cancellation Using KF in Faded MIMO Channels

    Multi Input Multi Output system (MIMO) has become a viable option to meet the demand of high data rate wireless communication. But MIMO system performance is severely affected by the presence of Co-Channel Interference (CCI). CCI cancellation in MIMO channel therefore is a challenging area of research. This paper provides...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Split MLSE Adaptive Equalization in Severely Faded Rayleigh MIMO Channels

    This paper presents an overview of adaptive equalization used in Multiple-Input-Multiple-Output (MIMO) wireless systems. In this paper, the authors consider two-user transmission over a Rayleigh frequency selective fading channel, in which the Channel State Information (CSI) is known by the receiver. Subject to an average transmit power constraint, they study...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Artificial Neural Network Aided Retina Based Biometric Identification System

    Artificial Neural Network (ANN)s are efficient means of prediction, optimization and recognition. Retina is a unique biometric pattern that can be used as a part of a verification system. An ANN can be configured and trained to handle such variations observed in the texture of the retina. The specialty of...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Survey on Review Spam Detection

    Today due to the popularity of E-commerce sites it became a target for spammers apart from well-known email and web spam. The proliferation of E-commerce sites has made web an excellent source of gathering customer reviews about products; as there is no quality control anyone one can write anything which...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Controlling and Monitoring of Remote Host

    In today's world, the role of remote access is changing dramatically. So accessing network remotely is an important issue. The proposed system allows administrator to access network from anywhere at any time. Administrator user can control and monitor the network using RFB (Remote FreameBuffer) protocol. Administrator user can run server...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Survey Paper on Wifi Community on Android Phones

    With the development of wireless communication, the popularity of android phones, the increasing of social networking services, mobile social networking has become a hot research topic. Personal mobile devices have become ubiquitous and an inseparable part of the authors' daily lives. These devices have evolved rapidly from simple phones and...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Counter Measures Against Evolving Search Engine Spamming Techniques

    Search engine spamming is a practice of misleading the search engine and increasing the page rank of undeserving websites. The black hat Search Engine Optimization (SEO) techniques lead to untrustworthy results for search engines. In this paper, the authors have characterized some commonly used black hat techniques, and they have...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    E-Converse an Affordable Touch Screen Solution to Intrigue Dining Experience

    Ample efforts have been taken in restaurant sector to intrigue the dining experience. Several information and communication technologies have been adopted earlier such as PDA; wireless communication technologies etc. These technologies provide a simple but powerful infrastructure. This paper highlights the limitations of the existing technologies and proposed the e-converse,...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Location Based Automatic Sound Profile Switching Application in Android Mobiles

    This is an android application for automatic profile switching as per location. There are many places like hospitals, petrol pumps, universities, corporate offices etc. where it is clearly mentioned, \"Keep the user mobile phones silent!\" Many times people forget to switch the mobile to the \"Silent Mode\" which is not...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Online Log Analysis for Detecting User Behavior

    Most search engines are not provided the facility of expected results every time. Because two words can have same meaning e.g. if query \"Block size\" is entered in search engine then search engine will display the records related to operating system as well as the living apartment block size. But...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Middleware Infrastructure for Predicate Detection in Asynchronous Environment

    Context-awareness is an essential feature of pervasive applications, and runtime detection of contextual properties is one of the primary approaches to enabling context awareness. However, existing context-aware middleware does not provide sufficient support for detection of contextual properties in asynchronous environments. The contextual activities usually involve multiple context collecting devices,...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    A Review on Approaches and Models Proposed for Software Reliability Testing

    Reliability testing of software is the key area of concern now-a-days; especially with the software which is safety critical and security prone systems. There is always a need of high software reliability. Most of the present models for evaluation of software reliability are based on statistical and probability approach. When...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Text Clustering in Concept Based Mining

    Text mining mostly used to find out unknown information from natural language processing and data mining by applying various techniques. In text mining most techniques depends on statistical analysis of terms. Statistical analysis trances important terms within document only. However this concept based mining model analyses terms in sentence, document...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Qualitative Evaluation of Routing Protocols of MANET in Wireless Sensor Network

    A Mobile Ad-hoc NETwork (MANET) is composed of mobile nodes without any infrastructure. Mobile nodes self-organize to form a network over radio links. The goal of MANETs is to extend mobility into the realm of autonomous, mobile and wireless domains, where a set of nodes form the network routing infrastructure...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    An Efficient Algorithm for Clustering Nodes, Classifying and Replication of Content on Demand Basis for Content Distribution in P2P Overlay Networks

    In this paper the authors propose an efficient algorithm for clustering nodes, classifying and replication of content on demand basis for content distribution in p2p overlay networks. Peer-to-peer overlay networks are a good solution for distributed computing than client-server model since nodes in P2P networks act both as client and...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    An Optimized Arm Scheme for Distinct Network Data Set

    Association Rule Mining (ARM) discovers correlations between different item sets in a transaction database. It provides important knowledge in business for decision makers. Association rule mining is an active data mining research area and most ARM algorithms cater to a centralized environment. Centralized data mining to discover useful patterns in...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Post-Mining of Association Rules Using Ontologies and Rule Schemas

    Knowledge Discovery and Databases (KDD) deals with the overall process of discovering useful knowledge from data. Data mining is a particular step in this process by applying specific algorithms for extracting hidden fact in the data. Association rule mining is one of the data mining techniques that generate a large...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Optimized Intention for Continuous Queries in the Active Data Aggregation Network with Cost Model

    Within an RDBMS streams of changes to the data and reporting when the result of a query defined over the data changes. These queries are referred to as the continuous queries since they continually produce results whenever new data arrives or existing data changes. To make online decision the authors...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    An Efficient and Systematic Virus Detection Processor for Embedded Network Security

    Network security has always been an important issue and its application is ready to perform powerful pattern matching to protect against virus attacks, spam and Trojan horses. However, attacks such as spam, spyware, worms, viruses, and phishing target the application layer rather than the network layer. Therefore, traditional firewalls no...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2013

    Overview of Wireless Network Control Protocol in Smart Phone Devices

    The computer network connection without wire or any cable is referring as wireless network. These Wireless Local Area Networks are popular for its worldwide applications. It has covered wide scale Wireless Local Area Network. The large scale systems to all applicable areas make large numbers of wireless termination and covering...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2013

    Design Issues and Classification of WSNs Operating Systems

    Wireless Sensor Networks is an emerging area of research. Wireless Sensor Networks (WSNs) face lot of problems that do not arise in other types of wireless networks and computing environments. Limited computational resources, power constraints, low reliability and higher density of sensor nodes (motes) are just some basic problems that...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2013

    Routing Protocol for Vehicular Adhoc Network

    Vehicular Ad-hoc NETworks (VANETs) are special type of Mobile Ad-hoc NETworks (MANETs) where wireless equipped vehicles from a network are continuously travelling along the road. Node movement feature of Vehicular Ad-hoc NETwork (VANET) closely resembles with that of Mobile Ad-hoc NETwork (MANET) but its high speed mobility and unpredictable movement...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2013

    Review on Hierarchical Routing in Wireless Sensor Networks

    The Wireless Sensor Network (WSN) has become an interesting field of research of the 21st century. It is a type of the wireless ad-hoc network. This has brought about developing low cost, low-power and multi-function sensor nodes. The network life for Wireless Sensor Network plays an important role in survivability....

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2013

    Comparison of Feasibility of Risk Monitoring in Buildings in Two Wireless Sensor Network: MICA Mote and MEMS

    In this paper, feasibility of risk monitoring of buildings in two Wireless Sensor Network is presented, firstly by using MICA Mote and then by MEMS. Also, it will be verified that the MEMS sensors are superior as it provides high quality sensor data and no data loss as compared to...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2013

    Wireless Sensor Network with Centralized Embedded Web Server Using ARM 7

    A plat form independent embedded web server and its integration into a network of wireless sensor nodes is implemented here. The embedded web server is designed and built as an expansion module for one of the nodes in the Wireless Sensor Network (WSN). It allows authorized Internet users to establish...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Periodically Updating the Content in Mobile Ad Hoc Network With Secured Synchronization

    The content and presence updates were used to transmit updates to nearby nodes over an ad hoc network using duty cycles; the authors' algorithms synchronize the transmissions of nodes periodically. By this approach, nodes can save battery power without missing updates from their neighbours by switching off their network cards....

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    An Improvement of Centroid Algorithm Based on Distance in Wireless Sensor Network

    In Wireless Sensor Network (WSN), estimating the exact position of sensor node is an important research problem and its location accuracy impacts the efficiency of localization algorithms. In this paper improved centroid range free localization method is proposed and comparison with conventional centroid is done by varying different parameters such...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Improving Routing Efficiency Based on Random Direction Mobility Model in Manets

    Major issue arising in Mobile Ad hoc NETworks (MANETs) is the selection of the optimal path between any two nodes. A method that has been advocated to improve routing efficiency is to select the most stable path so as to reduce the latency and the overhead due to re-routing instability...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Audio Streaming Over Low Data Rate Wireless System

    Audio applications over wireless networks have recently emerged as a promising research field. However, the limits in terms of communication bandwidth and transmission power have withstood the design of low-power embedded nodes for audio communication. In this paper, the authors describe the implementation details of an embedded system for the...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Wireless Testing Tool for Wireless Routers

    Wireless test tool is a powerful tool for wireless network monitor and analyzer for 802.11 a/b/g/n networks. Loaded with many user-friendly features, Wireless test tool for Wi-Fi combines performance and flexibility with an ease of use in the industry. Wireless test tool for Wi-Fi captures every packet on the air...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    False Data Detection in Wireless Sensor Network With Secure Communication

    The security of wireless sensor networks is a challenging problem in the process of data aggregation. As data are send though sensor network confidentiality plays and important role between sink and destination. An efficient secure data aggregation is proposed to enhance the data security of wireless sensor networks. In wireless...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Dynamic Transmission Power Assignment for Energy Conservation Routing in MANETs

    Wireless networks are formed by the devices that run on batteries, having limited amount of energy. Different actions of the nodes like transmitting, receiving, processing etc consume available energy. In order to increase the system's life-time, energy consumption has to be minimized. The Power Assignment Minimum Expected Energy and Reliable...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Reliable Routings in Networks With Generalized Link Failure Events

    Traditional methods for ensuring reliable transmissions in circuit-switched networks rely on the pre computation of a backup path for every working path or for every network link. These methods work fine as long as the network experiences only single link failures. They do not guarantee undisturbed communication, however, in the...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Application and Simulation of Route Optimization in Mobile IP

    Mobile Internet Protocol has been proposed by Internet Engineering Task Force (IETF) to support portable IP addresses for mobile devices that often change their network access points to the Internet. In the basic mobile IP protocol, datagrams sent from wired or wireless hosts and destined for the mobile host that...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Dataprefetching Framework for Mobile Behavior Mining Using Co-Smart-Cast Method

    Data Mining is a widely used technique for discovering valuable information in a complex data set. In this paper the authors discussed the main issues about Mobile User Behavior Mining. In mobile transaction database, users in the different user groups may have different behaviors. So that they proposed parameter-less clustering...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Radio Access Network Requirement for New Deployment of WIMAX in Dhaka

    Mobile WiMAX is expected to be the next generation radio-interface, complementing WLAN and challenging EVDO/HSPA/LTE. High speed data rate, reduced latency, better Quality of service, and mobility can allow WiMAX to meet the rapidly growing demand of the users. A study of WiMAX Radio Network Planning (RNP) for an urban...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    A Survey on Mobile Agent Itinerary Planning in Wireless Sensor Networks

    It has been proven recently that using Mobile Agent (MA) in Wireless Sensor Networks (WSNs) can drastically help to obtain the flexibility of application-aware deployment. Normally, in any MA based sensor network, it is an important research issue to find out an optimal itinerary for the MA in order to...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Private Cloud: A Paradigm of Cloud Computing With University Shared Data Center (USDC)

    Cloud computing in academic environment will be benefited by every student and staff where lots of collaboration and safety of data is needed in academia. Academic has various departments and many semesters where lots of students need to access the computing a need for highly available up-to-date software and hardware...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Social Network Analysis for Churn Prediction in Telecom Data

    Social Network Analysis (SNA) is a set of research procedures for identifying group of people who share common structures in systems based on the relations among actors. Grounded in graph and system theories, this approach has proven to be powerful measures for studying networks in various industries like Telecommunication, banking,...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2012

    The Awareness Network of Monitoring and Displaying Actions of Social Networks

    The concept of awareness plays a pivotal role in research in Computer-Supported Cooperative Work. Recently, Software Engineering researchers interested in the collaborative nature of software development have explored the implications of this concept in the design of software development tools. A critical aspect of awareness is the associated coordinative work...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Comparative Analysis of AODV and DSR To Achieve Group Communication in Manet

    Secure group communication is a challenging task with respect to MANET's. Since its introduction as a communication medium, wireless technology found broad application on the battlefield. Robust and reliable group communication plays a major role in developing distributed mobile application in which unannounced disconnections will occur frequently due to the...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    An Efficient Three Step Algorithm for Fast Motion Estimation in Mobile Domain

    The goal of this paper is to find a fast method for motion estimation and motion segmentation using proposed model. Recent day Communication between ends is facilitated by the development in the area of wired and wireless networks. Block matching algorithms are very useful in achieving the efficient and acceptable...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2013

    Maximizing the Lifetime and Security of Wireless Sensor Networks

    Recent technological advances have facilitated the widespread use of Wireless Sensor Networks in many applications such as battle field surveillance, environmental observations, biological detection and industrial diagnostics. In Wireless Sensor Networks, sensor nodes are typically power-constrained with limited lifetime, and so it's necessary to understand however long the network sustains...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2013

    Efficient and Secure Authentication by Using 3-Path Transmission in Ad Hoc Networks

    Ad hoc networks are created dynamically and maintained by the individual nodes comprising the network. They do not require a pre-existing architecture for communication purposes and do not rely on any form of wired infrastructure; in an ad hoc network all communication occurs through a wireless median. The design and...

    Provided By Interscience Open Access Journals

  • White Papers // May 2013

    A Secure Data Forwarding Schema for Cloud Storage Systems

    Cloud computing has been envisioned as the next-generation architecture of IT Enterprise. It moves the application software and databases to the centralized large data centers, where the management of the data and services may not be fully trustworthy. This unique paradigm brings about many new security challenges, which have not...

    Provided By Interscience Open Access Journals

  • White Papers // May 2013

    Reliablity Control Using Loss Recovery Ratio in Wireless Sensor Network

    In Wireless Sensor Network congestion leads to the degradation of communication links that result in the decreased the reliability and waste of energy which one of the scarcest resources of sensor network. In cluster based environment, each sensor senses the information and forwarded to its cluster head and cluster head...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2013

    Wireless Eurynomus A Wireless (802.11) Probe Request Based Attack

    The 802.11 standard for wireless includes a procedure of sending a continuous probe request to find out if there is a nearby Access Point available or not. Most of wireless clients like laptops or smart phones are configured to auto-connect. Due to this auto connect feature any client can be...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2013

    Ultra Wide Band Planer Antenna for Wireless Network Application

    Application of Ultra-WideBand (UWB) technology on wireless communication system has increased considerably in last seven years. This paper presents a planar Antenna for Ultra Wide Band frequency for cover a large bandwidth of 3.1 GHz and 13.1GHz for the resonance frequency of 6.5 and its wide application like WLAN, Wi-MAX,...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2013

    Ant Colony Optimized Routing for Mobile Adhoc Networks (MANET)

    A Mobile Ad-hoc NETwork (MANET) is a collection of wireless mobile nodes forming a temporary network without using centralized access points, infrastructure, or centralized administration. Routing means the act of moving information across an internet work from a source to a destination. The biggest challenge in this kind of networks...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2013

    Load Balancing Protocol for Energy Accomplished Routing in WSN

    Wireless Sensor Networks (WSNs) have been considered as a promising method for reliably monitoring both civil and military environments under hazardous or dangerous conditions. Due to such environments, the power supplies for sensors in the network are not usually rechargeable or replaceable. Therefore, the energy efficiency is critical for the...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2013

    Visualization of Network Traffic

    Network security in today's world is critical. System administrators must quickly perceive the security state of their networks, but they often have only text-based tools to work with. These tools often provide no overview that would help users grasp the big-picture. Network traffic visualization tools have successfully enabled security analysts...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2013

    The Campus Security Tracking System Based on RFID and ZigBee Network

    In this paper, the authors present the Campus Security Tracking system (CST) has been designed and implemented using the RFID and ZigBee network. The CST reads the RFID tags data through FRID & ZigBee node, and then sends it to PC node by a custom wireless protocol on the ZigBee....

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2013

    Wireless Sensor Network with Centralized Embedded Web Server Using ARM 7

    A plat form independent embedded web server and its integration into a network of wireless sensor nodes is implemented here. The embedded web server is designed and built as an expansion module for one of the nodes in the Wireless Sensor Network (WSN). It allows authorized Internet users to establish...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2013

    Implementation and Performance Analysis Evaluation of A New MANET Routing Protocol in Ns-2

    Mobile Ad-hoc NETworks (MANETs) can be defined as a collection of large number of mobile nodes that form temporary network without aid of any existing network infrastructure or central access point. The efficient routing protocols can provide significant benefits to Mobile Ad-hoc NETworks, in terms of both performance and reliability....

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2013

    Minimization of Data Replica in Mobile Adhoc Network Routing

    Ad hoc networks have characteristics such as flexibility, easy deployment, robustness which makes them an interesting technology for various applications. Ad hoc networks are considered as the most promising terminal networks in future mobile communications. A novel position based opportunistic routing protocol, in which several forwarding candidates cache the packet...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2013

    Providing the Boundary Line Controlled Request with Adaptable Transmission Rates in WDM Mesh Networks

    The mixture of applications increases and supported over optical networks, to the network customers new service guarantees must be offered. The partitioning the data into multiple segments can be processed independently the useful data to be transferred before a predefined deadline, this is a deadline driven request. To provide the...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2013

    Efficient E-MRZT Algorithm Based Tree Construction Technique for ZigBee Mobile Wireless Networks

    In Wireless Personal Area Networks (WPANs), the Zigbee protocol/IEEE 802.15.4 standard is a protocol specification for low range, less cost and low power systems. The Zigbee network is usually constructed using cluster trees for the purpose of performing data delivery among nodes and for power saving. Here the data delivery...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2013

    Adaptive Resource Allocation for Wireless Multicast MIMO-OFDM Systems

    Multiple antenna Orthogonal Frequency Division Multiple Access (OFDMA) is a promising technique for the high downlink capacity in the next generation wireless systems, in which adaptive resource allocation would be an important research issue that can significantly improve the performance with guaranteed QoS for users. Moreover, most of the current...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2013

    Minimax Filtering in Wireless Sensor and Actor Networks

    Wireless Sensor and Actor Networks (WSANs) are distributed wireless networks of heterogeneous devices referred to as sensors and actors. In Wireless Sensor and Actor Networks (WSANs) the collaborative operation of sensors enables the distributed sensing of physical phenomenon, while actors collect and process sensor data and perform appropriate actions. Sensors...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2013

    Mobile Networking for "Smart Dust" with RFID Sensor Networks

    Large-scale networks of wireless sensors are becoming an active topic of research. The authors review the key elements of the emergent technology of "Smart Dust" and outline the research challenges they present to the mobile networking and systems community, which must provide coherent connectivity to large numbers of mobile network...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Choosing a Technique for Digital Signatures From the Customers' Perspective

    One way to secure identity over the Internet and other channels is to use digital signatures. Since this area is often used in contact with banks, the authors have during their work co-operated with Nordea IT. In order for customers to use a digital signature whenever they wish to, a...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Approaches for Improving the Performance of Snort Intrusion Detection Systems

    The process of monitoring the events occurring in a computer system or network and analyzing them for sign of intrusions is known as Intrusion Detection Systems (IDS). In this paper the architecture of the snort which is an open source Intrusion detection system is explained. It is a rule based...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Intrusion Detection System Using Genetic Algorithm and Data Mining: An Overview

    Network security is of primary concerned now days for large organizations. Various types of Intrusion Detection Systems (IDS) are available in the market like Host based, Network based or Hybrid depending upon the detection technology used by them. Modern IDS have complex requirements. With data integrity, confidentiality and availability, they...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    A Rule-Based Approach for Effective Resource Provisioning in Hybrid Cloud Environment

    Resource provisioning is important issue in cloud computing and in the environment of heterogeneous clouds. The private cloud with confidentiality data configure according to users need. But the scalability of the private cloud limited. If the resources private clouds are busy in fulfilling other requests then new request cannot be...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Security Analysis of Cloud Computing

    Cloud computing play an important role in IT industry. Cloud computing reshaping the IT industry and in software development process. Cloud computing techniques can offer many facilities like sharing of hardware, availability of software and many more resources as a basic need. Cloud computing effectively reduces the cost, maintenance. As...

    Provided By Interscience Open Access Journals