Interscience Open Access Journals

Displaying 81-120 of 434 results

  • White Papers // Jan 2013

    Minimax Filtering in Wireless Sensor and Actor Networks

    Wireless Sensor and Actor Networks (WSANs) are distributed wireless networks of heterogeneous devices referred to as sensors and actors. In Wireless Sensor and Actor Networks (WSANs) the collaborative operation of sensors enables the distributed sensing of physical phenomenon, while actors collect and process sensor data and perform appropriate actions. Sensors...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2013

    Mobile Networking for "Smart Dust" with RFID Sensor Networks

    Large-scale networks of wireless sensors are becoming an active topic of research. The authors review the key elements of the emergent technology of "Smart Dust" and outline the research challenges they present to the mobile networking and systems community, which must provide coherent connectivity to large numbers of mobile network...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2013

    Overview of Wireless Network Control Protocol in Smart Phone Devices

    The computer network connection without wire or any cable is referring as wireless network. These Wireless Local Area Networks are popular for its worldwide applications. It has covered wide scale Wireless Local Area Network. The large scale systems to all applicable areas make large numbers of wireless termination and covering...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2013

    Design Issues and Classification of WSNs Operating Systems

    Wireless Sensor Networks is an emerging area of research. Wireless Sensor Networks (WSNs) face lot of problems that do not arise in other types of wireless networks and computing environments. Limited computational resources, power constraints, low reliability and higher density of sensor nodes (motes) are just some basic problems that...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2013

    Routing Protocol for Vehicular Adhoc Network

    Vehicular Ad-hoc NETworks (VANETs) are special type of Mobile Ad-hoc NETworks (MANETs) where wireless equipped vehicles from a network are continuously travelling along the road. Node movement feature of Vehicular Ad-hoc NETwork (VANET) closely resembles with that of Mobile Ad-hoc NETwork (MANET) but its high speed mobility and unpredictable movement...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2013

    Review on Hierarchical Routing in Wireless Sensor Networks

    The Wireless Sensor Network (WSN) has become an interesting field of research of the 21st century. It is a type of the wireless ad-hoc network. This has brought about developing low cost, low-power and multi-function sensor nodes. The network life for Wireless Sensor Network plays an important role in survivability....

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2013

    Comparison of Feasibility of Risk Monitoring in Buildings in Two Wireless Sensor Network: MICA Mote and MEMS

    In this paper, feasibility of risk monitoring of buildings in two Wireless Sensor Network is presented, firstly by using MICA Mote and then by MEMS. Also, it will be verified that the MEMS sensors are superior as it provides high quality sensor data and no data loss as compared to...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2013

    Wireless Eurynomus A Wireless (802.11) Probe Request Based Attack

    The 802.11 standard for wireless includes a procedure of sending a continuous probe request to find out if there is a nearby Access Point available or not. Most of wireless clients like laptops or smart phones are configured to auto-connect. Due to this auto connect feature any client can be...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2013

    Ultra Wide Band Planer Antenna for Wireless Network Application

    Application of Ultra-WideBand (UWB) technology on wireless communication system has increased considerably in last seven years. This paper presents a planar Antenna for Ultra Wide Band frequency for cover a large bandwidth of 3.1 GHz and 13.1GHz for the resonance frequency of 6.5 and its wide application like WLAN, Wi-MAX,...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2013

    Ant Colony Optimized Routing for Mobile Adhoc Networks (MANET)

    A Mobile Ad-hoc NETwork (MANET) is a collection of wireless mobile nodes forming a temporary network without using centralized access points, infrastructure, or centralized administration. Routing means the act of moving information across an internet work from a source to a destination. The biggest challenge in this kind of networks...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2013

    Load Balancing Protocol for Energy Accomplished Routing in WSN

    Wireless Sensor Networks (WSNs) have been considered as a promising method for reliably monitoring both civil and military environments under hazardous or dangerous conditions. Due to such environments, the power supplies for sensors in the network are not usually rechargeable or replaceable. Therefore, the energy efficiency is critical for the...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2013

    Visualization of Network Traffic

    Network security in today's world is critical. System administrators must quickly perceive the security state of their networks, but they often have only text-based tools to work with. These tools often provide no overview that would help users grasp the big-picture. Network traffic visualization tools have successfully enabled security analysts...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2013

    The Campus Security Tracking System Based on RFID and ZigBee Network

    In this paper, the authors present the Campus Security Tracking system (CST) has been designed and implemented using the RFID and ZigBee network. The CST reads the RFID tags data through FRID & ZigBee node, and then sends it to PC node by a custom wireless protocol on the ZigBee....

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Improving Localization Accuracy in Wireless Sensor Networks

    The most fundamental problem of wireless sensor networks is localization (finding the geographical location of the sensors). Most of the localization algorithms proposed for sensor networks are based on Sequential Monte Carlo (SMC) method. To achieve high accuracy in localization it requires high seed node density and it also suffers...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Performance Evaluation of Relaying Schemes for Wireless Communication Systems

    The evaluation of MIMO (Multiple-Input Multiple-Output) Relay wireless system is carried out and compared against the performance of a SISO (Single-Input Single-Output) Relay wireless system. The encoding scheme used in MIMO is Alamouti coding and decoding is done by the Maximum Likelihood (ML) detector. A comparison is made between the...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    A Fuzzy Based Approach in Multihop Network

    The proposed system utilizes the concept of multi hop communication in Wireless Sensor Networks (WSNs). On the other hand, the single hop communication leads to more power dissipation in the nodes at the time of transmitting sensed data. The proposed system rectifies the above mentioned problem with the multi hop...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Amorphous Event Prevention in Wireless Sensor Network

    In many applications wireless sensor can be used to detect the events in those applications. With the advances in sensing, communication, and computation, there is an increasing need to track mobile events such as air pollutant diffusion, toxic gas leakage, or wildfire spreading using mobile sensors such as robots. Lots...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Attacks in Mobile Ad Hoc Networks: Detection and Counter Measure

    In Wireless Ad-hoc network Stealthy packet dropping is a suite of four attacks; misrouting, power control, identity delegation, and colluding collision - that can be easily launched against multi hop wireless ad hoc network. Stealthy packet dropping disrupts the packet from reaching the destination through malicious behavior at an intermediate...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Novel Defence Mechanism Against On Demand Adhoc Routing Protocol for Mobile Adhoc Networks

    To access multimedia data mobile users like to use their own consumer electronic devices anywhere and at anytime. Hence, the authors expect that wireless ad hoc networks will be widely used in the near future since these networks form the topology with low cost on the fly. However, consumer electronic...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    A Security Architecture for Real-World Applications of Wireless Sensor Network

    With the recent capability of being applicable in enormous fields, the Wireless Sensor Networks (WSN) has drawn attention of researchers and industries in diverse areas. Being deployed in areas that are hostile, WSN pose lots of difficulties and challenges to the research fraternity. In this paper, the authors discuss a...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Increasing the Lifetime of Heterogeneous Sensor Network by using Genetic-Fuzzy Clustering

    Wireless Sensor Network is composed of hundreds or thousands of sensor nodes which have computational, energy and memory limitation. Its duty is to receive information from its surrounding environment, analyze and process data and to send the received data to other nodes or base station. In these networks, sensor nodes...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Analysis of Unipath and Multipath Routing Protocols in Mobile Adhoc Networks

    A MANET is an interconnection of mobile devices by wireless links, which forms a dynamic topology. Routing protocols play a vital role in transmission of data across the network. The two major classifications of routing protocols are unipath and multipath. In this paper, the authors have evaluated the performance of...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Hierarchical Routing Protocols for Wireless Sensor Network-A Survey

    Wireless Sensor Networks are a web of sensor nodes with a set of processor and limited memory unit embedded in it. Reliable routing of packets from the sensor node to its base station is the most important task for the networks. The routing protocols applied for the other networks cannot...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Wireless Network Security Threats and their Solutions: A Short Study

    With continual advances in technology, wireless accessibility is being deployed increasingly in office and public environments, as it is having huge benefits. But it is also coupled with the security threats and risks that will adversely affect the performance of the organization. To get rid of these threats, firstly these...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Fault Tolerance in Wireless Sensor Networks Using Constrained Delaunay Triangulation

    Fault tolerance is one of the main issues in Wireless Sensor Networks (WSNs) since it becomes critical in real deployment environment where reliability and reduced inaccessibility times are important. In this paper, the authors propose a fault-tolerance technique for coverage area of the sensor network that enhances the energy efficiency...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Investigation of Capacity Gains in MIMO Correlated Rician Fading Channels Systems

    This paper investigate the effect of Rician fading and correlation on the capacity and diversity of MIMO channels. The use of antenna arrays at both sides of the wireless communication link (MIMO systems) can increase channel capacity provided the propagation medium is rich scattering or Rayleigh fading and the antenna...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Secure and Reliable Power Supply with Challenges-Smart Grid

    Smart Grid implementations will certainly increase the quantity, quality and use of information available from advanced sensing, computing and communications hardware as well as software. There is virtually universal agreement that it is necessary to upgrade the electric grid to increase overall system efficiency and reliability. Many technologies currently in...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Detecting and Effective Routing of Time Critical Events Using Congestion and Delay Aware Routing in WSNS

    Reliability and timeliness are two essential requirements of successful detection of critical events n Wireless Sensor Networks (WSNs). The Base Station (BS) is particularly interested about reliable and timely collection of data sent by the nodes close to the ongoing event, and at that time, the data sent by other...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Association Rule Mining for Gene Expression Data

    Microarray technology has created a revolution in the field of biological research. Association rules can not only group the similarly expressed genes but also discern relationships among genes. The authors propose a new row-enumeration rule mining method to mine high confidence rules from microarray data. It is a support-free algorithm...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    An Integration Approach for Heterogeneous Distributed Database Transaction Protocols

    Integration is commonly used for summarizing information held in very large databases which are encountered in data warehousing, large scale transaction management, and statistical databases. Such applications often involve distributed databases that have developed independently and therefore may exhibit incompatibility, heterogeneity, and data inconsistency. The authors are here concerned with...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Fuzzy Set Approaches to Data Mining of Association Rule

    Data mining on large databases has been a major concern in research community due to the difficulty of analyzing huge volume of data. This paper focuses on the large set area i.e. on fuzzy sets and knowledge discovery of data. Association rules provide information in accessing significant correlations in large...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Ontology Techniques for Web Data

    In this paper the authors presents techniques for knowledge description and formalization, ontologies are used to represent user profiles in personalized web data. However, when representing user profiles, many models or techniques have utilized only knowledge from either a global knowledge base or user local information. In this paper, a...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Design of Configurable IP Core for Error Detection and Correction

    In this paper the authors address the design & implementation of configurable Intellectual Property (IP) core for double error detection and single error correction. The encoding/decoding algorithms considered in this can be implemented with a simple and faster hardware. The block can be used for coding and decoding word having...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Security Escalation Using Key Template and Distortion Reduction in Audio Steganography

    Due to the abrupt enhancement in the development of the distributed computing in recent years, there is necessity of efficient protection of the information that is send through the network. For this purpose, steganography is used as the one of the method to protect the secret message against the intruders....

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Survey of Botnets and Detection Tools

    Botnet meaning bot network is a collection of infected computers under the command and control of a single individual known as a botmaster. Botnets are a current threat to the internet community and have recently been a root cause of many internet attacks. Various attacks that include spamming, distributed denial...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Application and Simulation of Route Optimization in Mobile IP

    Mobile Internet Protocol has been proposed by Internet Engineering Task Force (IETF) to support portable IP addresses for mobile devices that often change their network access points to the Internet. In the basic mobile IP protocol, datagrams sent from wired or wireless hosts and destined for the mobile host that...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Dataprefetching Framework for Mobile Behavior Mining Using Co-Smart-Cast Method

    Data Mining is a widely used technique for discovering valuable information in a complex data set. In this paper the authors discussed the main issues about Mobile User Behavior Mining. In mobile transaction database, users in the different user groups may have different behaviors. So that they proposed parameter-less clustering...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Radio Access Network Requirement for New Deployment of WIMAX in Dhaka

    Mobile WiMAX is expected to be the next generation radio-interface, complementing WLAN and challenging EVDO/HSPA/LTE. High speed data rate, reduced latency, better Quality of service, and mobility can allow WiMAX to meet the rapidly growing demand of the users. A study of WiMAX Radio Network Planning (RNP) for an urban...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    A Survey on Mobile Agent Itinerary Planning in Wireless Sensor Networks

    It has been proven recently that using Mobile Agent (MA) in Wireless Sensor Networks (WSNs) can drastically help to obtain the flexibility of application-aware deployment. Normally, in any MA based sensor network, it is an important research issue to find out an optimal itinerary for the MA in order to...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Private Cloud: A Paradigm of Cloud Computing With University Shared Data Center (USDC)

    Cloud computing in academic environment will be benefited by every student and staff where lots of collaboration and safety of data is needed in academia. Academic has various departments and many semesters where lots of students need to access the computing a need for highly available up-to-date software and hardware...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    An Improved Hybrid Peer-to-Peer System With Caching for Distributed Data Sharing

    Peer-to-peer overlay networks are widely used in distributed systems. Based on whether a regular topology is maintained among peers, peer-to-peer networks can be divided into two categories: structured peer-to-peer networks in which peers are connected by a regular topology, and unstructured peer-to-peer networks in which the topology is arbitrary. Structured...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    A Multipurpose Image Processing Technique for Wireless and Wired Networks

    One of the most important and challenging goal of current and future communication network is transmission of high quality images from sender to receiver side quickly with least error where limitation of bandwidth is a prime problem. Here, the authors will discuss a new approach towards compressing and decompressing with...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    ICMP, SNMP: Collaborative Approach to Network Discovery and Monitoring

    The algorithm and realization technique of network topology discovery is a very important technical indicator for a network management system's quality. Based on the knowledge of the network topology discovery theory, the research on ICMP and SNMP programming for Windows, this paper proposes a method of developing the common network...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    The Future of IP SAN Using SCVM

    The SCVM, which stands for Storage Concentrator Virtual Machine, creates IP SAN storage as virtual machine, providing the user with the ability to consolidate their virtual data center. The SCVM can fully manage and has features for the storage over local as well as networked VMs. This can be attained...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    Impact of Routing Protocol on Performance of Wireless Ad Hoc Vehicular Network

    Vehicular Ad Hoc NETwork (VANET) is an emerging new technology integrating ad hoc network, Wireless LAN (WLAN) and cellular technology to achieve intelligent inter-vehicle communications and improve road traffic safety and efficiency. VANETs are distinguished from other kinds of ad hoc networks by their hybrid network architectures, node movement characteristics,...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    Localization in Wireless Sensor Network Using MDS

    In this paper, determining the localization of nodes in a Wireless Sensor Network is a very important task, which involves collaboration between sensor nodes. Localization is a fundamental service since it is relevant to many applications and to the network main functions, such as: routing, communication, cluster creation, network coverage,...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Preemptive Routing & Intrusion Detection for MANETs

    An ad-hoc network will often change rapidly in topology, this courses for routes in the network to often disappear and new to arise. The Ad-hoc On-Demand Distance Vector Routing Protocol(AODV), is based on the principle of discover routes as needed. In this paper, the authors will extend the definition of...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Embedded Smart Car Security System on Face Detection

    In this proposed embedded car security system, FDS (Face Detection System) is used to detect the face of the driver and compare it with the predefined face. For example, in the night when the car's owner is sleeping and someone theft the car then FDS obtains images by one tiny...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2011

    GPS Based Bluetooth Broadcasting - Long Range Solution

    In this paper, GPS based Bluetooth broadcasting for long range is proposed. System model for Long range broadcasting of messages with multiple piconets and dynamically created threshold devices, based on GPS information is presented. The authors' simulation results have shown that, message can be received by those devices which are...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2011

    Min Max Normalization Based Data Perturbation Method for Privacy Protection

    Data mining system contain large amount of private and sensitive data such as healthcare, financial and criminal records. These private and sensitive data can not be share to every one, so privacy protection of data is required in data mining system for avoiding privacy leakage of data. Data perturbation is...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2011

    Multi-Gigabit Pattern for Data in Network Security

    In the current scenario network security is emerging the world. Matching large sets of patterns against an incoming stream of data is a fundamental task in several fields such as network security or computational biology. High-speed network Intrusion Detection Systems (IDS) rely on efficient pattern matching techniques to analyze the...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2011

    VANET: Performance Comparison of BNGF Method in Different Vehicular Traffic Scenarios

    A Vehicular Ad hoc NETwork (VANET) is a wireless ad hoc network that is formed between vehicles on an on demand basis. A lot of research work around the world is being conducted to design the routing protocols for VANETs. In this paper, the authors examine the significance Greedy Forwarding...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Designing of an Automated Power Meter Reading With Zigbee Communication

    This paper presents the design and implementation of Automatic Power Meter (APM), The APM is implemented using an ARM and Zigbee Based power meter Communication Module. The design presents a new methodology for avoiding the high construction and maintenance costs in the existing meter reading technology. Using an APM with...

    Provided By Interscience Open Access Journals

  • White Papers // Nov 2011

    A Modified Approach to the New Lossless Data Compression Method

    This paper proposed the modified approach to the new lossless data compression method. It is developed based on hiding data reversibly with a location map. It performs same as the earlier algorithm but it stands on lossless strategy where as the former approach could not do it. It can compress...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Extending UML for Multidimensional Modeling in Data Warehouse

    Multidimensional modeling is the foundation of data warehouses, MD databases, and On-Line Analytical Processing (OLAP) applications. Nowadays Dimensional modeling and object-orientation are becoming growing interest areas. In the past few years; there have been many proposals, for representing the MD properties at the conceptual level. However, none of them has...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    The Impact of Calls to the Processor on a Server PABX

    This paper is to define the relationship between the number of calls made in an Asterisk server and use of the processor in this server as the processor is one of the major hardware resources. Subsequently, the authors derived the formulation for the generalization of this relationship or a mathematical...

    Provided By Interscience Open Access Journals

  • White Papers // Nov 2010

    A Goal Driven Framework for Service Discovery in Service-Oriented Architecture: A Multiagent Based Approach

    Automated service discovery is one of the very important features in any Semantic Web Service (SWS) based framework. Achieving this functionality in e-resource sharing system is not an easy task due to its hugeness and heterogeneity among the available resources. Any efficient automated service discovery will remain worthless until discovered...

    Provided By Interscience Open Access Journals

  • White Papers // Nov 2010

    Web-Based Tool for Automatic Assignment Evaluation

    The demands for teachers in most educational institutions are continually increasing. Teachers have to teach an increasing number of students every year while simultaneously providing meaningful and constructive feedback and correcting assignments in a minimal amount of time. Consequently, results and assessment of student's progress can be considerably delayed. The...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2010

    Practical Quantum Cryptography for Secure Free-Space Communications

    Quantum Cryptography is an emerging technology in which two parties may simultaneously generate shared, secret cryptographic key material using the transmission of quantum states of light. The security of these transmissions is based on the inviolability of the laws of quantum mechanics and information - theoretically secure post-processing methods. An...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2010

    Design and Implementation of a (2,2) and a (2,3) Visual Cryptographic Scheme

    In this paper two methods for (2, 2) and (2, 3) Visual Cryptographic Scheme(VCS) is proposed. The first scheme considers 4 pixels of input image at a time and generates 4 output pixels in each share. As 4 output pixels are generated from 4 input pixels dimension and aspect ratio...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2010

    A Simple Scheme for Visual Cryptography

    Here an algorithm is proposed to implement (2, 2) secret sharing problem which reduces the size (resolution) of the generated shares. Instead of considering one pixel at a time to generate the share, two consecutive pixels of the original image are considered row wise. Finally a pixel share having six...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2010

    Elliptic Curve Cryptosystem for Email Encryption

    The idea of information security lead to the evolution of cryptography. In other words, cryptography is the science of keeping information secure. It involves encryption and decryption of messages. The core of cryptography lies in the keys involved in encryption and decryption and maintaining the secrecy of the keys. Another...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2010

    Cellular Automata Based Data Security Scheme in Computer Network Using Single Electron Device

    The internet conceptualized new ways of social interaction, activities globally. Internet serves billions of users worldwide. By the end of 2011it is expected that 22% of the world's population will regularly surf internet. Beside this, internet incorporated high risks for e-users by enabling intruders to gain access via security holes....

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2010

    Call Routing in Contact Center

    Now a day companies uses the contact center to provide service to customer. One of the important challenges of today contact center solution is to align the customer to the most appropriate agent within the time constrain. Call routing is used to for the alignment of customer with agent. Call...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2010

    Enabling Mainframe Assets to Services for SOA

    Service-Oriented Architecture (SOA) is a mechanism for achieving interoperability between heterogeneous systems. SOA enables existing legacy systems to expose their functionality as services, without making significant changes to the legacy systems. Migration towards a Service-Oriented Approach (SOA) not only standardizes interaction, but also allows for more flexibility in the existing...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2010

    Next Gen Smart and Connected Systems

    With the kind of technological advancements such as cloud computing, virtualization, computing grids, etc, that the people are seeing today, soon the hardware and software producers will be under severe pressure to deliver cheaper and cost effective solutions and to combine them with innovate commercial models such as "Pay as...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2010

    Comparison of 3GPP LTE and 3GPP2 UMB

    In the last years, technology evolution in mobile communications is mainly motivated by three relevant agents: the market globalization and liberalization and the increasing competence among vendors and operators coming from this new framework, the popularization of IEEE 802 wireless technologies within the mobile communications sector and, finally, the exponential...

    Provided By Interscience Open Access Journals

  • White Papers // Nov 2010

    Next Generation Middleware Technology for Mobile Computing

    Current advances in portable devices, wireless technologies, and distributed systems have created a mobile computing environment that is characterized by a large scale of dynamism. Diversities in network connectivity, platform capability, and resource availability can significantly affect the application performance. Traditional middleware systems are not prepared to offer proper support...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2010

    Wireless Sensor Networks for Indoor Environment Monitoring Using Lab View

    Wireless Sensor Networks (WSNs) have gained worldwide attention in recent years, particularly with the rapid progress in Micro-Electro-Mechanical Systems (MEMS) technology which has facilitated the development of smart sensors. These sensors are small, with limited processing and computing resources, and they are inexpensive compared to traditional sensors. These sensor nodes...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2010

    Minimizing Link Utilization in Selfish Overlay Routing

    The rapid growth and increasing requirements for service quality, reliability had made everyone to choose the traffic engineering essential for the large public networks. The multi Protocol label switching is a protocol used when there is interaction between the traffic engineering and the overlay networks. This Multi-Protocol Labeled Switching (MPLS)...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Resilient GIA

    The core activity of any P2P system is File Sharing. In any system where many peers are connected, several replicas of same file may be present but the challenge, especially in an unstructured p2p overlay, is to make sure that there exist certain copies of the latest version for performing...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Data Partitioning for Semantic Web

    Semantic web database is an RDF database. Tremendous increase can be seen in semantic web data, as real life applications of semantic web are using this data. Efficient management of this data at a larger scale, and efficient query performance are the two major concerns. This work aims at analyzing...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    A Correctness Criterion for Eager Approach Validation for Transactional Memory System

    With rise of multi-core systems, Software Transactional Memory (STM) has garnered significant interest as an elegant alternative for developing concurrent code. A (memory) transaction is an unit of code in execution in memory. A Software Transactional Memory system (STM) ensures that a transaction appears either to execute atomically (even in...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    The Effect of Social Online Networking Service on Public Libraries Via Critical Systems Heuristics (CSH) :A Case Study

    Libraries can provide numerous services for users on the use of Web 2.0 technology by promoting library services. In the interactive Web 2.0 environment; (SON) took hold. The Purpose of this paper is to discuss on the impact of Social Online Networking (SON) on library services by a qualitative evaluation...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Modeling and Simulation of a Single Phase Matrix Converter With Reduce Switch Count as a Buck/Boost Rectifier With Close Loop Control

    This Paper focused on Buck/Boost Rectification by Single Phase Matrix Converter with fewer numbers of switches. The conventional matrix converter consists of 4 bidirectional switches, i.e., 8 set of IGBT/MOSFET with anti parallel diodes. In this proposed matrix converter, only six switches are used. The switch commutation arrangements are also...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2011

    A Soft Computing Platform for Minimizing the Bullwhip Effect

    An unmanaged supply chain is not inherently stable. The bullwhip effect occurs when the demand order variability's in the supply chain are amplified as they moved up the supply chain. Distorted information from one end of a supply chain to the other can lead to tremendous inefficiencies. In this paper...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2011

    Reduction of Context Switches Due to Task Synchronization in Uniprocessor and Multiprocessor Platform

    The problem of frequent context switches in multitasking is a real scheduling overhead which wastes extra CPU cycles, memory and causes much delay in scheduling. This paper focuses on reducing the context switches that result due to blocking when jobs are required to synchronize. The Priority Ceiling Protocol (PCP) is...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2011

    Performance Analysis of ESPRIT Algorithm for Smart Antenna System

    ESPRIT is a high-resolution signal parameter estimation technique based on the translational invariance structure of a sensor array. The ESPRIT algorithm is an attractive solution to many parameter estimation problems due to its low computational cost. The performance of DOA using estimation signal parameter via a rotational invariant technique is...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2011

    Development of a Fuzzy Logic Based Software for Automation of a Single Pool Irrigation Canal

    A fuzzy logic based software for automation of a single pool irrigation canal is presented. Purpose of the software is to control downstream discharge and water level of the canal, by adjusting discharge release from the upstream end and upstream gate settings. The software is developed on a fuzzy control...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Review on Main Memory Database

    The idea of using Main Memory DataBase (MMDB) as physical memory is not new but is in existence quite since a decade. MMDB have evolved from a period when they were only used for caching or in high-speed data systems to a time now in twenty first century when they...

    Provided By Interscience Open Access Journals