Interscience Open Access Journals

Displaying 81-120 of 434 results

  • White Papers // Jan 2013

    Implementation and Performance Analysis Evaluation of A New MANET Routing Protocol in Ns-2

    Mobile Ad-hoc NETworks (MANETs) can be defined as a collection of large number of mobile nodes that form temporary network without aid of any existing network infrastructure or central access point. The efficient routing protocols can provide significant benefits to Mobile Ad-hoc NETworks, in terms of both performance and reliability....

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2013

    Minimization of Data Replica in Mobile Adhoc Network Routing

    Ad hoc networks have characteristics such as flexibility, easy deployment, robustness which makes them an interesting technology for various applications. Ad hoc networks are considered as the most promising terminal networks in future mobile communications. A novel position based opportunistic routing protocol, in which several forwarding candidates cache the packet...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2013

    Providing the Boundary Line Controlled Request with Adaptable Transmission Rates in WDM Mesh Networks

    The mixture of applications increases and supported over optical networks, to the network customers new service guarantees must be offered. The partitioning the data into multiple segments can be processed independently the useful data to be transferred before a predefined deadline, this is a deadline driven request. To provide the...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2013

    Efficient E-MRZT Algorithm Based Tree Construction Technique for ZigBee Mobile Wireless Networks

    In Wireless Personal Area Networks (WPANs), the Zigbee protocol/IEEE 802.15.4 standard is a protocol specification for low range, less cost and low power systems. The Zigbee network is usually constructed using cluster trees for the purpose of performing data delivery among nodes and for power saving. Here the data delivery...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2013

    Adaptive Resource Allocation for Wireless Multicast MIMO-OFDM Systems

    Multiple antenna Orthogonal Frequency Division Multiple Access (OFDMA) is a promising technique for the high downlink capacity in the next generation wireless systems, in which adaptive resource allocation would be an important research issue that can significantly improve the performance with guaranteed QoS for users. Moreover, most of the current...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2013

    Minimax Filtering in Wireless Sensor and Actor Networks

    Wireless Sensor and Actor Networks (WSANs) are distributed wireless networks of heterogeneous devices referred to as sensors and actors. In Wireless Sensor and Actor Networks (WSANs) the collaborative operation of sensors enables the distributed sensing of physical phenomenon, while actors collect and process sensor data and perform appropriate actions. Sensors...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2013

    Mobile Networking for "Smart Dust" with RFID Sensor Networks

    Large-scale networks of wireless sensors are becoming an active topic of research. The authors review the key elements of the emergent technology of "Smart Dust" and outline the research challenges they present to the mobile networking and systems community, which must provide coherent connectivity to large numbers of mobile network...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2013

    Wireless Eurynomus A Wireless (802.11) Probe Request Based Attack

    The 802.11 standard for wireless includes a procedure of sending a continuous probe request to find out if there is a nearby Access Point available or not. Most of wireless clients like laptops or smart phones are configured to auto-connect. Due to this auto connect feature any client can be...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2013

    Ultra Wide Band Planer Antenna for Wireless Network Application

    Application of Ultra-WideBand (UWB) technology on wireless communication system has increased considerably in last seven years. This paper presents a planar Antenna for Ultra Wide Band frequency for cover a large bandwidth of 3.1 GHz and 13.1GHz for the resonance frequency of 6.5 and its wide application like WLAN, Wi-MAX,...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2013

    Ant Colony Optimized Routing for Mobile Adhoc Networks (MANET)

    A Mobile Ad-hoc NETwork (MANET) is a collection of wireless mobile nodes forming a temporary network without using centralized access points, infrastructure, or centralized administration. Routing means the act of moving information across an internet work from a source to a destination. The biggest challenge in this kind of networks...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2013

    Load Balancing Protocol for Energy Accomplished Routing in WSN

    Wireless Sensor Networks (WSNs) have been considered as a promising method for reliably monitoring both civil and military environments under hazardous or dangerous conditions. Due to such environments, the power supplies for sensors in the network are not usually rechargeable or replaceable. Therefore, the energy efficiency is critical for the...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2013

    Visualization of Network Traffic

    Network security in today's world is critical. System administrators must quickly perceive the security state of their networks, but they often have only text-based tools to work with. These tools often provide no overview that would help users grasp the big-picture. Network traffic visualization tools have successfully enabled security analysts...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2013

    The Campus Security Tracking System Based on RFID and ZigBee Network

    In this paper, the authors present the Campus Security Tracking system (CST) has been designed and implemented using the RFID and ZigBee network. The CST reads the RFID tags data through FRID & ZigBee node, and then sends it to PC node by a custom wireless protocol on the ZigBee....

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Fault Tolerance in Wireless Sensor Networks Using Constrained Delaunay Triangulation

    Fault tolerance is one of the main issues in Wireless Sensor Networks (WSNs) since it becomes critical in real deployment environment where reliability and reduced inaccessibility times are important. In this paper, the authors propose a fault-tolerance technique for coverage area of the sensor network that enhances the energy efficiency...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Improving Localization Accuracy in Wireless Sensor Networks

    The most fundamental problem of wireless sensor networks is localization (finding the geographical location of the sensors). Most of the localization algorithms proposed for sensor networks are based on Sequential Monte Carlo (SMC) method. To achieve high accuracy in localization it requires high seed node density and it also suffers...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Performance Evaluation of Relaying Schemes for Wireless Communication Systems

    The evaluation of MIMO (Multiple-Input Multiple-Output) Relay wireless system is carried out and compared against the performance of a SISO (Single-Input Single-Output) Relay wireless system. The encoding scheme used in MIMO is Alamouti coding and decoding is done by the Maximum Likelihood (ML) detector. A comparison is made between the...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    A Fuzzy Based Approach in Multihop Network

    The proposed system utilizes the concept of multi hop communication in Wireless Sensor Networks (WSNs). On the other hand, the single hop communication leads to more power dissipation in the nodes at the time of transmitting sensed data. The proposed system rectifies the above mentioned problem with the multi hop...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Amorphous Event Prevention in Wireless Sensor Network

    In many applications wireless sensor can be used to detect the events in those applications. With the advances in sensing, communication, and computation, there is an increasing need to track mobile events such as air pollutant diffusion, toxic gas leakage, or wildfire spreading using mobile sensors such as robots. Lots...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Attacks in Mobile Ad Hoc Networks: Detection and Counter Measure

    In Wireless Ad-hoc network Stealthy packet dropping is a suite of four attacks; misrouting, power control, identity delegation, and colluding collision - that can be easily launched against multi hop wireless ad hoc network. Stealthy packet dropping disrupts the packet from reaching the destination through malicious behavior at an intermediate...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Novel Defence Mechanism Against On Demand Adhoc Routing Protocol for Mobile Adhoc Networks

    To access multimedia data mobile users like to use their own consumer electronic devices anywhere and at anytime. Hence, the authors expect that wireless ad hoc networks will be widely used in the near future since these networks form the topology with low cost on the fly. However, consumer electronic...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    A Security Architecture for Real-World Applications of Wireless Sensor Network

    With the recent capability of being applicable in enormous fields, the Wireless Sensor Networks (WSN) has drawn attention of researchers and industries in diverse areas. Being deployed in areas that are hostile, WSN pose lots of difficulties and challenges to the research fraternity. In this paper, the authors discuss a...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Increasing the Lifetime of Heterogeneous Sensor Network by using Genetic-Fuzzy Clustering

    Wireless Sensor Network is composed of hundreds or thousands of sensor nodes which have computational, energy and memory limitation. Its duty is to receive information from its surrounding environment, analyze and process data and to send the received data to other nodes or base station. In these networks, sensor nodes...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Analysis of Unipath and Multipath Routing Protocols in Mobile Adhoc Networks

    A MANET is an interconnection of mobile devices by wireless links, which forms a dynamic topology. Routing protocols play a vital role in transmission of data across the network. The two major classifications of routing protocols are unipath and multipath. In this paper, the authors have evaluated the performance of...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Hierarchical Routing Protocols for Wireless Sensor Network-A Survey

    Wireless Sensor Networks are a web of sensor nodes with a set of processor and limited memory unit embedded in it. Reliable routing of packets from the sensor node to its base station is the most important task for the networks. The routing protocols applied for the other networks cannot...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Wireless Network Security Threats and their Solutions: A Short Study

    With continual advances in technology, wireless accessibility is being deployed increasingly in office and public environments, as it is having huge benefits. But it is also coupled with the security threats and risks that will adversely affect the performance of the organization. To get rid of these threats, firstly these...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Investigation of Capacity Gains in MIMO Correlated Rician Fading Channels Systems

    This paper investigate the effect of Rician fading and correlation on the capacity and diversity of MIMO channels. The use of antenna arrays at both sides of the wireless communication link (MIMO systems) can increase channel capacity provided the propagation medium is rich scattering or Rayleigh fading and the antenna...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Secure and Reliable Power Supply with Challenges-Smart Grid

    Smart Grid implementations will certainly increase the quantity, quality and use of information available from advanced sensing, computing and communications hardware as well as software. There is virtually universal agreement that it is necessary to upgrade the electric grid to increase overall system efficiency and reliability. Many technologies currently in...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Detecting and Effective Routing of Time Critical Events Using Congestion and Delay Aware Routing in WSNS

    Reliability and timeliness are two essential requirements of successful detection of critical events n Wireless Sensor Networks (WSNs). The Base Station (BS) is particularly interested about reliable and timely collection of data sent by the nodes close to the ongoing event, and at that time, the data sent by other...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Ontology Techniques for Web Data

    In this paper the authors presents techniques for knowledge description and formalization, ontologies are used to represent user profiles in personalized web data. However, when representing user profiles, many models or techniques have utilized only knowledge from either a global knowledge base or user local information. In this paper, a...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    An Integration Approach for Heterogeneous Distributed Database Transaction Protocols

    Integration is commonly used for summarizing information held in very large databases which are encountered in data warehousing, large scale transaction management, and statistical databases. Such applications often involve distributed databases that have developed independently and therefore may exhibit incompatibility, heterogeneity, and data inconsistency. The authors are here concerned with...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Fuzzy Set Approaches to Data Mining of Association Rule

    Data mining on large databases has been a major concern in research community due to the difficulty of analyzing huge volume of data. This paper focuses on the large set area i.e. on fuzzy sets and knowledge discovery of data. Association rules provide information in accessing significant correlations in large...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Association Rule Mining for Gene Expression Data

    Microarray technology has created a revolution in the field of biological research. Association rules can not only group the similarly expressed genes but also discern relationships among genes. The authors propose a new row-enumeration rule mining method to mine high confidence rules from microarray data. It is a support-free algorithm...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Design of Configurable IP Core for Error Detection and Correction

    In this paper the authors address the design & implementation of configurable Intellectual Property (IP) core for double error detection and single error correction. The encoding/decoding algorithms considered in this can be implemented with a simple and faster hardware. The block can be used for coding and decoding word having...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Application and Simulation of Route Optimization in Mobile IP

    Mobile Internet Protocol has been proposed by Internet Engineering Task Force (IETF) to support portable IP addresses for mobile devices that often change their network access points to the Internet. In the basic mobile IP protocol, datagrams sent from wired or wireless hosts and destined for the mobile host that...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Dataprefetching Framework for Mobile Behavior Mining Using Co-Smart-Cast Method

    Data Mining is a widely used technique for discovering valuable information in a complex data set. In this paper the authors discussed the main issues about Mobile User Behavior Mining. In mobile transaction database, users in the different user groups may have different behaviors. So that they proposed parameter-less clustering...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Radio Access Network Requirement for New Deployment of WIMAX in Dhaka

    Mobile WiMAX is expected to be the next generation radio-interface, complementing WLAN and challenging EVDO/HSPA/LTE. High speed data rate, reduced latency, better Quality of service, and mobility can allow WiMAX to meet the rapidly growing demand of the users. A study of WiMAX Radio Network Planning (RNP) for an urban...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    A Survey on Mobile Agent Itinerary Planning in Wireless Sensor Networks

    It has been proven recently that using Mobile Agent (MA) in Wireless Sensor Networks (WSNs) can drastically help to obtain the flexibility of application-aware deployment. Normally, in any MA based sensor network, it is an important research issue to find out an optimal itinerary for the MA in order to...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Private Cloud: A Paradigm of Cloud Computing With University Shared Data Center (USDC)

    Cloud computing in academic environment will be benefited by every student and staff where lots of collaboration and safety of data is needed in academia. Academic has various departments and many semesters where lots of students need to access the computing a need for highly available up-to-date software and hardware...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Social Network Analysis for Churn Prediction in Telecom Data

    Social Network Analysis (SNA) is a set of research procedures for identifying group of people who share common structures in systems based on the relations among actors. Grounded in graph and system theories, this approach has proven to be powerful measures for studying networks in various industries like Telecommunication, banking,...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Comparative Analysis of AODV and DSR To Achieve Group Communication in Manet

    Secure group communication is a challenging task with respect to MANET's. Since its introduction as a communication medium, wireless technology found broad application on the battlefield. Robust and reliable group communication plays a major role in developing distributed mobile application in which unannounced disconnections will occur frequently due to the...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Research on Data Mining Using Neural Networks

    The application of neural networks in the data mining has become wider. Data mining is the search for relationships and global patterns that exist in large databases but are 'Hidden' among the vast amount of data, such as a relationship between patient data and their medical diagnosis. These relationships represent...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2012

    Basic Model of Multicast Authentication Based On Batch Signature-MABS

    Traditional multicast authentication schemes manage the different involvement of the receivers by letting the sender: choose the block size, divide a multicast stream into blocks, connect each block with a signature, and spread the effect of the Signature across all the packets in the block. The relationship between packets tends...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Cross-Layer System for Cluster Based Data Access in MANET'S

    The objective of cooperative caching is to improve data availability, improve access efficiency and reduce query delay in mobile Ad-Hoc networks. Many types of cache replacement algorithms like LRU, LFU, LFRU, LRU-MIN and LFU-MIN are used to improve data accessibility and reduce query delay in cluster based cooperative caching in...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Pattern Recognition Algorithms for Cluster Identification Problem

    There are large datasets in high dimensional database to solve the cluster identification problem and for identifying dense clusters in a noisy data. In this paper by using densely intra connected sub graphs the authors' analysis identified the clusters. They have used pattern recognition algorithms for representing the graphs and...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Software Inspection Improves Quality of Software Product

    An electronic tender system (e-tender) streamlines the tender process and thereby saves time and cost. Security requirements for e-tendering systems have not been closely scrutinized in the literature. In addition to the security concerns of conventional e-tender systems - authentication, integrity, privacy, and non-repudiation are provided. This paper identifies key...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Secure E-Tendering Using Identity Based Encryption From Bilinear Pairings

    An electronic tender system (e-tender) streamlines the tender process and thereby saves time and cost. Security requirements for e-tendering systems have not been closely scrutinized in the paper. In addition to the security concerns of conventional e-tender systems - authentication, integrity, privacy, and non-repudiation are provided. This paper identifies key...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Implementation of RED Algorithm to Detect Malicious Packet Losses

    The authors consider the problem of detecting whether a compromised router is maliciously manipulating its stream of packets. In particular, they are concerned with a simple yet effective attack in which a router selectively drops packets destined for some victim. Unfortunately, it is quite challenging to attribute a missing packet...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    A Combined Two Step Approach for Detecting Input Validation Attacks Against Web Applications

    Internet becomes a part of the daily life. Almost very service by the internet will be provided with the help of web applications with these the people can say that without the web application they cannot do anything over the internet but at the same time web applications are mostly...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Intelligent Software Agent Applied To Digital Forensic and Its Usefulness

    Due to the large amount of information produced, accumulated, and distributed via electronic means, it is necessary for forensic experts during crime investigation to increase their abilities to search for important evidence in a timely manner because this is essential to the success of digital forensic examinations. The inadequacy of...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Flaws in Endair-A Secure Routing Protocol for MANETS

    Routing is the one of the essential criteria at network level in mobile ad hoc networks. Ad hoc network routing protocols are difficult to design, and secure because unable to handle rapid node mobility and network topology changes. It has been realized by many researchers, and several "Secure" routing protocols...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Application of Data Mining Using Bayesian Belief Network To Classify Quality of Web Services

    In this paper, the authors employed Na?ve Bayes, Augmented Na?ve Bayes, Tree Augmented Na?ve Bayes, Sons & Spouses, Markov Blanket, Augmented Markov Blanket, Semi Supervised and Bayesian network techniques to rank web services. The Bayesian Network is demonstrated on a dataset taken from literature. The dataset consists of 364 web...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    A Novel Steganographic Algorithm and Hashing to Improve Authentication Using Mobile Phones

    Security has become major issue in all online services. Strong authentication is provided conveniently using mobile phone as security token. While sending security token to user mobile via GSM network, it is vulnerable to several attacks. The authors can avoid them using Steganography which enforces the security of hashing algorithms....

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Role of Web Services in Migration of Legacy System to Service-Oriented Architecture

    Managing the convolution of systems is considered as a key confront in computing and is transact with numerous expansion projected at enhanced computerization. Service-Oriented Architectures (SOA) are predicted to facilitate the prerequisite of a large quantity of varied and contending web services which the potential users will be capable to...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Improving Software Modularity Using AOP

    Software modularity is a software design technique that increases the level to which software is composed of separate interchangeable components called modules. The modules are devised by breaking down the program functions. Each module accomplishes one function and contains all that is necessary to accomplish it. Modules represent a separation...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Model Based Software Development: Issues & Challenges

    One of the goals of software design is to model a system in such a way that it is easily understandable. Nowadays the tendency for software development is changing from manual coding to automatic code generation; it is becoming model-based. This is a response to the software crisis, in which...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    A Comparative Study on Privacy Preserving Association Rule Mining Algorithms

    The field of privacy has seen rapid advances in recent years because of the increases in the ability to store data. In particular, recent advances in the data mining field have lead to increased concerns about privacy. Privacy-preserving data mining has been studied extensively, because of the wide proliferation of...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Combining Retrieval With Ontology Browsing

    The Semantic Web provides a way to encode information and knowledge on web pages in a form that is easier for computers to understand and process. For Semantic Web documents to have an impact, they will have to be compatible with Web based indexing and retrieval. There are techniques to...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Comparisons Various Versions of GridFTP Protocols

    The GridFTP protocol has become a popular data movement tool used to build distributed grid-oriented applications. The GridFTP protocol extends the FTP protocol defined by and extended in some other IETF documents by adding certain features designed to improve the performance of data movement over a wide area network, to...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    A Study of Artifical Intelligence in Intrusion Detection Systems

    Artificial Intelligence could make the use of Intrusion Detection Systems a lot easier than it is today. They could learn the preferences of the security officers and show the kind of alerts first that the officer has previously been most interested. As always, the hardest thing with learning AIs, is...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    A Attack on E-Mail Encryption Protocols by Chosen Ciphertext Method

    Several security protocols (PGP, PEM, MOSS, S/MIME, PKCS#7, CMS, etc.) have been developed to provide confidentiality and authentication of electronic mail. These protocols are widely used and trusted for private communication over the Internet. The authors point out a potentially serious security hole in these protocols: any encrypted message can...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    An Extensive Simulation Analysis of AODV Protocol With IEEE 802.11 MAC for Chain Topology in MANET

    A Mobile Ad hoc NETwork (MANET) represents system of wireless mobile nodes that can self-organize freely and dynamically into arbitrary and temporary network topology. Routing is the task of directing data packets from a source node to a given destination. The main method for evaluating the performance of MANETs is...

    Provided By Interscience Open Access Journals

  • White Papers // Mar 2012

    An Approach for Customer Behavior Analysis Using Web Mining

    Customer satisfaction is the key secret of success for all industries regardless of whether it is web enabled or not. This paper focuses the role of web mining in achieving a viable edge in business. Web mining is becoming the tool for success for those who adopt electronic means of...

    Provided By Interscience Open Access Journals

  • White Papers // Mar 2012

    Cloud Computing: A Survey

    Cloud computing provides huge computing services to the business for improving the organizational growth. Basic requirement needed for this technology is Internet but provides higher capability when compared to the Internet. Cloud computing is a combination of computation, software, data access and also provides storage services. In Cloud, storage of...

    Provided By Interscience Open Access Journals

  • White Papers // Mar 2012

    A New Generation Peer-to-Peer Advanced Botnet

    A botnet is a network of compromised computers that are infected with code that allows an unauthorized user to control them via the Internet. Botnets are one of the most serious threats to today's Internet. Most current botnets have centralized Command and Control (C&C) architecture. However, Peer-To-Peer (P2P) structured botnets...

    Provided By Interscience Open Access Journals

  • White Papers // Mar 2012

    An Integrated Approach for Measuring Software Quality and Code Readability

    In this paper, the authors explore the concept of code readability and investigate its relation to software quality. This is a new approach to measuring the complexity of software systems. Software industry uses software metrics to measure the complexity of software systems for software cost estimation, software development control, software...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2012

    Carrier Frequency Offset Estimation Algorithm in the Presence of I/Q Imbalance in OFDM Systems

    In this paper, the authors analyzed the feasibility of using a virtual carrier based carrier frequency offset estimation algorithm in the presence of I/Q imbalance in OFDM systems. Based on the analysis of the signal model with both receiver CFO and I/Q imbalance impairment they conclude that it is feasible...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2012

    Embedded Automobile Engine Locking System, Using GSM Technology

    This paper deals with the design & development of an embedded system, which is being used to prevent/control the theft of a vehicle. The developed instrument is an embedded system based on GSM technology. The instrument is installed in the engine of the vehicle. An interfacing GSM modem is also...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2011

    New Improved Algorithm for Mining Privacy - Preserving Frequent Itemsets

    Due to the increasing use of very large databases and data warehouses, mining useful information and helpful knowledge from transactions is evolving into an important research area. Frequent Itemsets (FI) Mining is one of the most researched areas of data mining. In order to mining privacy preserving frequent itemsets on...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2011

    Virtual Fabrication and Analog Performance of Sub-40nm Bulk MOSFET Using TCAD TOOL

    The Scaling of MOSFET device to sub40nm is very critical because of short channel effect. The SCE is mainly due to power supply since scaling of device is more rapid as compared to The scaling of supply voltage result is the SCE, because of high electric field degrades the mobility...

    Provided By Interscience Open Access Journals

  • White Papers // Mar 2011

    A Real Time ZigBee Based Locating System

    An Adhoc networks is a self organized and distributed entity, consisting of n Mobile Stations (MSs) without the coordination of any centralized access point. Initialization is one of the fundamental tasks to set up an adhoc network, which involves assigning of each of the n MSs a distinct ID number...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2011

    Mathematics in Internet Traffic Data Analysis

    The Internet traffic data have been found to possess extreme variability and bursty structures in a wide range of time-scales, so that there is no definite duration of busy or silent periods. But there is a self-similarity for which it is possible to characterize the data. The self-similar nature was...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2011

    Software Reusable Components With Repository System

    Software reuse is the process of creating software systems from existing software rather than building them from scratch. The goal is the use of reusable components as building blocks in new systems with modifications occurring in a controlled way. The reuse of software components is the key to improve productivity...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2011

    A Review of Open Source Software and Open Source Movement in Developing Countries

    Open-source software abbreviated as OSS is computer software that is available with source code and is provided under a software license that permits users to study, change, and improve the software. For the commercial software the source code and certain other rights are normally reserved for copyright holders, i.e., the...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Effective Method of Age Dependent Face Recognition

    This Automatic age dependent face recognition system is developed. This approach is based on the Principle Component Analysis (PCA). Eigen face approach is used for both age prediction and face recognition. Face database is created by aging groups individually. The age prediction is carried out by projecting a new face...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Model Based Approach to Prevent SQL Injection Attacks on .NET Applications

    Web applications support static and dynamic queries to access the database. Dynamic queries take input from the user and use that input to form the query. A user can give malicious input to the application which results in an incorrect query or an unauthorized query and performs vulnerable action on...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    An Efficient Regression Testing by Computing Coverage Data for Software Evolution

    Software systems is evolve continuously during development and maintenance. After software is modified regression testing is applied to software to ensure that It behaves intended and modifications not negatively impacts its original functionality. It is time consuming to rerun test suite T of program Pi on modified program Pi+1. So,...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2012

    Tree Based Aggregation and Routing in WSN: A Multi-Agent System Approach

    In WSN one of the issues is to route the data from the sensor nodes to sink node. The tree-based approach provides an efficient solution for establishing the path and in network aggregation. Tree is nonlinear structures, which have hierarchical levels in terms of parent-child combination. In this paper, the...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2012

    Mathematical Model for the Detection of Selfish Nodes in MANETs

    A mobile ad hoc network, is an independent network of mobile devices connected by wireless links. Each device in a MANET can move freely in any direction, and will therefore change its links to other devices easily. Each must forward traffic of others, and therefore be called a router. The...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2012

    The Application of Case-Based Reasoning to Estimation of Software Development Effort

    Accurate project effort estimation is an important goal for the software engineering community. Till date most work has focused upon building algorithmic models of effort estimation for example COCOMO. The authors describe an alternative approach to estimation based upon the use of analogy. The objective is to estimate the development...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2012

    Basic Concept of Embedded 'C': Review

    The use of C language to program micro controllers is becoming too common. And most of the time its not easy to build an application in assembly which instead one can make easily in C. So, its important that one know C language for micro controller which is commonly known...

    Provided By Interscience Open Access Journals