Interscience Open Access Journals

Displaying 121-160 of 442 results

  • White Papers // Dec 2012

    A Survey on Mobile Agent Itinerary Planning in Wireless Sensor Networks

    It has been proven recently that using Mobile Agent (MA) in Wireless Sensor Networks (WSNs) can drastically help to obtain the flexibility of application-aware deployment. Normally, in any MA based sensor network, it is an important research issue to find out an optimal itinerary for the MA in order to...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Private Cloud: A Paradigm of Cloud Computing With University Shared Data Center (USDC)

    Cloud computing in academic environment will be benefited by every student and staff where lots of collaboration and safety of data is needed in academia. Academic has various departments and many semesters where lots of students need to access the computing a need for highly available up-to-date software and hardware...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Social Network Analysis for Churn Prediction in Telecom Data

    Social Network Analysis (SNA) is a set of research procedures for identifying group of people who share common structures in systems based on the relations among actors. Grounded in graph and system theories, this approach has proven to be powerful measures for studying networks in various industries like Telecommunication, banking,...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Security Escalation Using Key Template and Distortion Reduction in Audio Steganography

    Due to the abrupt enhancement in the development of the distributed computing in recent years, there is necessity of efficient protection of the information that is send through the network. For this purpose, steganography is used as the one of the method to protect the secret message against the intruders....

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Survey of Botnets and Detection Tools

    Botnet meaning bot network is a collection of infected computers under the command and control of a single individual known as a botmaster. Botnets are a current threat to the internet community and have recently been a root cause of many internet attacks. Various attacks that include spamming, distributed denial...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Effective Transmission of Data in Group Editor Using Multithreaded Server

    Group editors are a classic model and research vehicle for distributed interactive groupware applications because they typically manipulate shared data in a coordinated manner. Operational Transformation (OT) has been well accepted in group editors for achieving optimistic consistency control. OT allows local operations to execute in a non blocking manner...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Study on Improvement in RSA Algorithm and its Implementation

    The network security means to protect data during their transmission over channel of networks similarly internet security also to protect data during their transmission over a collection of interconnected networks in all over the world. Cryptography is the way of hiding information during transmission over a cannel. There are lots...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Vulnerability Assessment and Penetration Testing

    In this modern world, all of the persons are using the facility of internet. Security is one of the major issues of the internet. Everyday highly skilled hackers breach the security and take the advantage of vulnerabilities to access the confidential data. To overcome this problem one solution was suggested...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    An Efficient Three Step Algorithm for Fast Motion Estimation in Mobile Domain

    The goal of this paper is to find a fast method for motion estimation and motion segmentation using proposed model. Recent day Communication between ends is facilitated by the development in the area of wired and wireless networks. Block matching algorithms are very useful in achieving the efficient and acceptable...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Comparative Analysis of AODV and DSR To Achieve Group Communication in Manet

    Secure group communication is a challenging task with respect to MANET's. Since its introduction as a communication medium, wireless technology found broad application on the battlefield. Robust and reliable group communication plays a major role in developing distributed mobile application in which unannounced disconnections will occur frequently due to the...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Eon of Implementing a Multifaceted Cloud Based Ocr in Apple's Compassionate App Store Milieu

    Cloud architectures discourse key hitches surrounding large-scale data dispensation. In customary data processing it is grim to get as many machines as an application needs. Second, it is difficult to get the machines when one needs them. Third, it is difficult to dispense and harmonize a large-scale job on different...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Internet Access in Remote Areas Using NXP Microcontroller and GSM Modem

    In India and many developing and under-developed countries, providing internet facility to many school-going students is still a far-fetched concept. In this paper, which is based on the authors' project, they propose a new system which circumvents the internet architecture by using GSM infrastructure to access internet services, albeit on...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Self-Managing Performance in Application Servers - Modelling and Data Architecture

    High performance is always a desired objective in computing systems. Managing performance through manual intervention is a well-known and obvious mechanism. The attempts to self-manage performance with minimal human intervention are pre-dominant in the recent advances of research. Control Systems theory is playing a significant role in building such intelligent...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Automated Swim (Single Window Infrastructure Management) for Cloud

    Data centers manage complex server environments, including physical and virtual machines, across a wide variety of platforms, and often in geographically dispersed locations. Information Technology managers are responsible for ensuring that servers in these increasingly complex environments are properly configured and monitored throughout the IT life cycle. They also face...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Improved Near Duplicate Matching Scheme for E-Mail Spam Detection

    Today the major problem that the people are facing is spam mails or e-mail spam. In recent years there are so many schemes are developed to detect the spam emails. Here the primary idea of the similarity matching scheme for spam detection is to maintain a known spam database, formed...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Smart Worms Defense and Detection

    There are several worm attacks in the recent years, this leads to an essentiality of producing new detection technique for worm attacks. In this paper, the authors present a spectrum based smart worm detection scheme, this is based on the idea of detection of worm in the frequency domain. This...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Use of Web Harvesting Technique

    Web harvesting (Web data extraction) is a computer software technique of extracting information from websites. Usually, such software programs simulate human exploration of the Web by either implementing low-level Hyper-Text Transfer Protocol (HTTP), or embedding certain full-fledged Web browsers. Web harvesting is closely related to Web indexing, which indexes information...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    An Efficient Multi-Constrained Feasible Path Selection for Manet

    Quality-of-Service (QoS) routing in an ad-hoc network is difficult because the network topology may change constantly and the available state information for routing is inherently imprecise. This paper proposes a method for multi-constrained feasible path selection for MANET. The authors introduce the composite function which allows OLSR to find the...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Review of XY Routing Algorithm for Network-on-Chip Architecture

    The Network-on-Chip (NoC) is Network-version of System-on-Chip (SoC) means that on-chip communication is done through packet based networks. In NOC topology, routing algorithm and switching are main terminology. The routing algorithm is one of the key factor in NOC architecture. The routing algorithm, which defines as the path taken by...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Raptor Code Based Secure Storage in Cloud Computing

    The end of this decade is marked by a paradigm shift of the industrial information technology towards a pay-peruse service business model known as cloud computing. Cloud data storage redefines the security issues targeted on customer's outsourced data. To ensure the correctness of users' data in the cloud, the authors...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Improved Security System in Mobile Cloud Access Through Fuzzy Intrusion Detection Technique

    Mobile phones are playing a vital role in every one's life. The computing strategy of mobile internet usage is lower than the mobile usage, this may due to the security threat. In general mobility and cloud computing initializing the global marketing, sales and development activities using mobile platforms to market...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Secured Cloud Environment with a New Approach

    Cloud computing is the technology of resource sharing in the present setup, where in the users never look to buy a resource in terms of software, hardware, and many as such only in the name of pay for use it is being used but they have to face big issue...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Testing As A Service (TAAS) - An Enhanced Security Framework for TAAS in Cloud Environment

    Testing becomes an important process not only in terms of exposure but also in terms of performance, safety, usability. Test Environment that directly represents the production environment is too expensive in terms of hardware, software licenses and more people. Cloud computing supports an everything as a service (XaaS) Delivery model....

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Simulation of Adaptive Channel Equalization for BPSK,QPSK and 8-PSK Schemes

    The distortion and inter symbol interference caused by multipath effects of channel degrades the quality of signal transmission in transmission system of digital baseband. Adaptive channel equalization is used commonly to compensate these effects so as to increase the reliability of propagation. Recursive Least Squares (RLS) algorithm is most commonly...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Statistical Analysis of Wsn Based Indoor Positioning Localization Schemes with Kalman Filtering

    Wireless Sensor Network (WSN) is used for determining the Indoor Positioning of objects and persons since recent years. WSN has been implemented in indoor positioning applications such as real time tracking of humans/objects, patient monitoring in health care, navigation, warehouses for inventory monitoring, shopping malls, etc. But one of the...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Inter Carrier Interference and Signal to Interference Ratio of Various Pulse Shaping Functions Used in Ofdm System with Carrier Frequency Offset

    Orthogonal Frequency Division Multiplexing (OFDM) is the important modulation of choice for fourth generation broadband multimedia wireless systems. This paper is focused on the problem of reducing the Inter-Carrier Interference (ICI) and signal to noise ratio in the transmission over OFDM using various pulse shaping methods. Here, the authors have...

    Provided By Interscience Open Access Journals

  • White Papers // Nov 2012

    Gesture Based Touchpad Security System with Design of Touch Screen Controller

    In this paper, the authors present a new approach on the design of security systems by using a touch sensitive device. Security is a permanent concern in a variety of environments ranging from physical access restriction in home and industrial settings to information security in digital systems. Numeric passwords, fingerprint...

    Provided By Interscience Open Access Journals

  • White Papers // Nov 2012

    Loss Allocation of Transmission Line and Minimization of Loss for 5 Bus,14 Bus &30 Bus Systems

    In this paper, the authors focus on the issue of transmission loss allocation and transmission loss minimization by incorporating UPFC injection model using load flow analysis. To investigate the effect of the UPFC on the steady state condition of the system and load flow, different models can be used. These...

    Provided By Interscience Open Access Journals

  • White Papers // Nov 2012

    Performance Evalution of CNTFET-Based SRAM Cell Design

    Carbon Nano-Tube Field Effect Transistor (CNTFET) technology with their excellent current capabilities, ballistic transport operation and superior thermal conductivities has proved to be a very promising and superior alternative to the conventional CMOS technology. A detailed analysis and simulation based assessment of circuit performance of this technology is presented here....

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2012

    EBDP Buffer Sizing Strategy 802.11 Based WLANS

    In this paper, the authors present wired routers, for whom the sizing of buffers is an active research topic. The classical rule of thumb for sizing wired buffers is to set buffer sizes to be the product of the bandwidth and the average delay of the flows utilizing this link,...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2012

    Performance Optimization in Networks Serving Heterogeneous Flows

    Channel-aware scheduling strategies have emerged as an effective mechanism for improving the throughput of wireless data users by exploiting rate variations. The improvement in throughput comes however at the expense of an increase in the variability of the service rate received over time. While the larger variability only has a...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2012

    Ontology for Automatic Acquisition Web User Information

    Information retrieval has a well-established tradition of performing laboratory experiments on test collections to compare the relative effectiveness of different retrieval approaches. The experimental design specifies the evaluation criterion to be used to determine if one approach is better than another. Retrieval behavior is sufficiently complex to be difficult to...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2012

    The Awareness Network of Monitoring and Displaying Actions of Social Networks

    The concept of awareness plays a pivotal role in research in Computer-Supported Cooperative Work. Recently, Software Engineering researchers interested in the collaborative nature of software development have explored the implications of this concept in the design of software development tools. A critical aspect of awareness is the associated coordinative work...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2012

    Tracking of Moving Object in Wireless Sensor Network

    A Wireless Sensor Network is a collection of sensor nodes distributed into a network to monitor the environmental conditions and send the sensed data to the Base Station. Wireless Sensor Network is one of the rapidly developing area in which energy consumption is the most important aspect to be considered...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2012

    A Public Key Distribution and Broadcast Authentication Scheme for Wireless Sensor Networks

    In wireless sensor networks, broadcast communication is the most fundamental and prevailing communication pattern. Securing the broadcast messages from the adversary is critical issue. To defend the WSNs against the adversary attacks of impersonation of a broadcast source or receiver, modification/fabrication of the broadcast message, attacker injecting malicious traffic to...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2012

    Neighbourhood Load Routing and Multi-Channels in Wireless Mesh Networks

    As an emerging technology, wireless mesh networks are making significant progress in the area of wireless networks in recent years. Routing in Wireless Mesh Network (WMN) is challenging because of the unpredictable variations of the wireless environment. Traditional mechanisms have been proved that the routing performance would get deteriorated and...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2012

    Counting Bloom Filter Architecture in VLSI Network Systems

    The Counting Bloom Filter (CBF) is useful for real time applications where the time and space efficiency is the main consideration in performing a set membership tests. The CBF estimates whether an element is present in a large array or not by allowing false positives and by not permitting false...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2012

    Minimization of Load Based Resources in Cloud Computing Systems

    Cloud computing is a term, which involves virtualization, distributed computing, networking, software and Web services. The authors' objective is to develop an effective load balancing algorithm using Divisible Load Scheduling Theorem to maximize or minimize different performance parameters (throughput, latency for example) for the clouds of different sizes. Central to...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2012

    Evolution of Crowd-Sourcing From Computer to Mobile Systems

    As crowd-sourcing is becoming popular for problem solving and completing a task, it is now very important to use this concept in an advance manner. It can also be used as a distributed and vast source of information. This concept is now evolving in world of mobile systems. This will...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2012

    Simulation and Performance Analysis Evaluation for Multipath Extension of Aodv to Improve End to End Delay, Route Error Sent, Routing Load and Packet Drop Ratio

    This paper describes improvement in standard routing protocol AODV for mobile ad-hoc networks. The mechanism setups multiple optimal paths based on bandwidth and delay. It allows to store multiple optimal paths based on Bandwidth and delay. At time of link failure, it will switch to next available path. To set...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Performance Comparison of Routing Protocols in MANET Varying Network Size

    A Mobile Ad hoc NETwork (MANET) consists of mobile wireless nodes in which the communication between nodes is carried out without any centralized control. MANET is a self organized and self configurable network where the mobile nodes move arbitrarily. The mobile nodes can receive and forward packets as a router....

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Dual Bootstrap Server Based Super peer Overlay Construction

    Many two-layer hierarchy unstructured Peer-To-Peer (P2P) systems, comprising of superpeers and ordinary peers improved the performance of large scale P2P systems. The construction and maintenance of the superpeer overlay network play an important role in improving the performance P2P systems. One efficient method of constructing the superpeer overlay network is...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Evaluation of Proactive, Reactive and Hybrid Ad Hoc Routing Protocol for Various Battery Models in VANET Using Qualnet

    In VANET high speed is the real characteristic which leads frequent breakdown, interference etc. In this paper, the authors studied various Ad hoc routing protocols, Reactive, Proactive & Hybrid, taking in to consideration various VANET parameters like speed, altitude etc in real traffic scenario and evaluated them for various battery...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Autonomic Diffusion Based Spray Routing in Intermittently Connected Mobile Networks With Multiple Copies

    Intermittently connected mobile Network systems represent a challenging environment for networking research, due to the problems of ensuring messages delivery in spite of frequent disconnections and random meeting patterns. These networks fall into general category of Delay Tolerant Networks. There are many real networks that follow this model, for example,...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    An Improved Hybrid Peer-to-Peer System With Caching for Distributed Data Sharing

    Peer-to-peer overlay networks are widely used in distributed systems. Based on whether a regular topology is maintained among peers, peer-to-peer networks can be divided into two categories: structured peer-to-peer networks in which peers are connected by a regular topology, and unstructured peer-to-peer networks in which the topology is arbitrary. Structured...

    Provided By Interscience Open Access Journals

  • White Papers // May 2011

    Design and Implementation of a Lossless Serial High-Speed Data Compression System

    The paper presents a novel VLSI architecture for high-speed data compressor designs which implement the X-Match algorithm. This design involves important trade off that affects the compression performance, latency, and throughput. The most promising approach is implemented into FPGA hardware. This device typical compression ratio that halves the original uncompressed...

    Provided By Interscience Open Access Journals

  • White Papers // May 2011

    Interesting Video Frames Capturing on Digital Video Development Platform

    Video surveillance has been a popular security tool for years. Video surveillance systems produce huge amounts of data for storage and display. Long-term human monitoring of the acquired video is impractical and in-effective. This paper presents a novel solution for real-time cases that identify and record only "Interesting" video frames...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Cloud Computing in Distributed System

    Cloud Computing as an Internet-based computing; where resources, software and information are provided to computers on-demand, like a public utility; is emerging as a platform for sharing resources like infrastructure, software and various applications. The majority of cloud computing infrastructure consists of reliable services delivered through data centers and built...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Choosing a Technique for Digital Signatures From the Customers' Perspective

    One way to secure identity over the Internet and other channels is to use digital signatures. Since this area is often used in contact with banks, the authors have during their work co-operated with Nordea IT. In order for customers to use a digital signature whenever they wish to, a...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Approaches for Improving the Performance of Snort Intrusion Detection Systems

    The process of monitoring the events occurring in a computer system or network and analyzing them for sign of intrusions is known as Intrusion Detection Systems (IDS). In this paper the architecture of the snort which is an open source Intrusion detection system is explained. It is a rule based...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Intrusion Detection System Using Genetic Algorithm and Data Mining: An Overview

    Network security is of primary concerned now days for large organizations. Various types of Intrusion Detection Systems (IDS) are available in the market like Host based, Network based or Hybrid depending upon the detection technology used by them. Modern IDS have complex requirements. With data integrity, confidentiality and availability, they...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    A Rule-Based Approach for Effective Resource Provisioning in Hybrid Cloud Environment

    Resource provisioning is important issue in cloud computing and in the environment of heterogeneous clouds. The private cloud with confidentiality data configure according to users need. But the scalability of the private cloud limited. If the resources private clouds are busy in fulfilling other requests then new request cannot be...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Security Analysis of Cloud Computing

    Cloud computing play an important role in IT industry. Cloud computing reshaping the IT industry and in software development process. Cloud computing techniques can offer many facilities like sharing of hardware, availability of software and many more resources as a basic need. Cloud computing effectively reduces the cost, maintenance. As...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Research on Data Mining Using Neural Networks

    The application of neural networks in the data mining has become wider. Data mining is the search for relationships and global patterns that exist in large databases but are 'Hidden' among the vast amount of data, such as a relationship between patient data and their medical diagnosis. These relationships represent...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2012

    Basic Model of Multicast Authentication Based On Batch Signature-MABS

    Traditional multicast authentication schemes manage the different involvement of the receivers by letting the sender: choose the block size, divide a multicast stream into blocks, connect each block with a signature, and spread the effect of the Signature across all the packets in the block. The relationship between packets tends...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Cross-Layer System for Cluster Based Data Access in MANET'S

    The objective of cooperative caching is to improve data availability, improve access efficiency and reduce query delay in mobile Ad-Hoc networks. Many types of cache replacement algorithms like LRU, LFU, LFRU, LRU-MIN and LFU-MIN are used to improve data accessibility and reduce query delay in cluster based cooperative caching in...

    Provided By Interscience Open Access Journals

  • White Papers // Mar 2012

    A New Generation Peer-to-Peer Advanced Botnet

    A botnet is a network of compromised computers that are infected with code that allows an unauthorized user to control them via the Internet. Botnets are one of the most serious threats to today's Internet. Most current botnets have centralized Command and Control (C&C) architecture. However, Peer-To-Peer (P2P) structured botnets...

    Provided By Interscience Open Access Journals

  • White Papers // Mar 2012

    An Integrated Approach for Measuring Software Quality and Code Readability

    In this paper, the authors explore the concept of code readability and investigate its relation to software quality. This is a new approach to measuring the complexity of software systems. Software industry uses software metrics to measure the complexity of software systems for software cost estimation, software development control, software...

    Provided By Interscience Open Access Journals

  • White Papers // Mar 2012

    Secure Web System Development

    The recent development in the field of Web system technology has transformed the software industry radically by integrating a wide range of web users, vendors, and enterprise applications worldwide. In Web-based system, a security requirement is a critical issue. This difficulty is due to the complexity level of such systems...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    An Effective Time Management Schema in WSNs

    WSN usually consists of a large number of resource constraint sensor nodes that are generally deployed in unattended/hostile environments and Existing security designs mostly provide a hop-by-hop security paradigm. Furthermore, existing security designs are also vulnerable to many types of Denial of Service (DoS) attacks, such as random node capture...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Periodically Updating the Content in Mobile Ad Hoc Network With Secured Synchronization

    The content and presence updates were used to transmit updates to nearby nodes over an ad hoc network using duty cycles; the authors' algorithms synchronize the transmissions of nodes periodically. By this approach, nodes can save battery power without missing updates from their neighbours by switching off their network cards....

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    An Improvement of Centroid Algorithm Based on Distance in Wireless Sensor Network

    In Wireless Sensor Network (WSN), estimating the exact position of sensor node is an important research problem and its location accuracy impacts the efficiency of localization algorithms. In this paper improved centroid range free localization method is proposed and comparison with conventional centroid is done by varying different parameters such...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Improving Routing Efficiency Based on Random Direction Mobility Model in Manets

    Major issue arising in Mobile Ad hoc NETworks (MANETs) is the selection of the optimal path between any two nodes. A method that has been advocated to improve routing efficiency is to select the most stable path so as to reduce the latency and the overhead due to re-routing instability...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Audio Streaming Over Low Data Rate Wireless System

    Audio applications over wireless networks have recently emerged as a promising research field. However, the limits in terms of communication bandwidth and transmission power have withstood the design of low-power embedded nodes for audio communication. In this paper, the authors describe the implementation details of an embedded system for the...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2012

    Carrier Frequency Offset Estimation Algorithm in the Presence of I/Q Imbalance in OFDM Systems

    In this paper, the authors analyzed the feasibility of using a virtual carrier based carrier frequency offset estimation algorithm in the presence of I/Q imbalance in OFDM systems. Based on the analysis of the signal model with both receiver CFO and I/Q imbalance impairment they conclude that it is feasible...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2012

    Embedded Automobile Engine Locking System, Using GSM Technology

    This paper deals with the design & development of an embedded system, which is being used to prevent/control the theft of a vehicle. The developed instrument is an embedded system based on GSM technology. The instrument is installed in the engine of the vehicle. An interfacing GSM modem is also...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2011

    New Improved Algorithm for Mining Privacy - Preserving Frequent Itemsets

    Due to the increasing use of very large databases and data warehouses, mining useful information and helpful knowledge from transactions is evolving into an important research area. Frequent Itemsets (FI) Mining is one of the most researched areas of data mining. In order to mining privacy preserving frequent itemsets on...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2011

    Virtual Fabrication and Analog Performance of Sub-40nm Bulk MOSFET Using TCAD TOOL

    The Scaling of MOSFET device to sub40nm is very critical because of short channel effect. The SCE is mainly due to power supply since scaling of device is more rapid as compared to The scaling of supply voltage result is the SCE, because of high electric field degrades the mobility...

    Provided By Interscience Open Access Journals

  • White Papers // Mar 2011

    A Real Time ZigBee Based Locating System

    An Adhoc networks is a self organized and distributed entity, consisting of n Mobile Stations (MSs) without the coordination of any centralized access point. Initialization is one of the fundamental tasks to set up an adhoc network, which involves assigning of each of the n MSs a distinct ID number...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2011

    Mathematics in Internet Traffic Data Analysis

    The Internet traffic data have been found to possess extreme variability and bursty structures in a wide range of time-scales, so that there is no definite duration of busy or silent periods. But there is a self-similarity for which it is possible to characterize the data. The self-similar nature was...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2011

    Software Reusable Components With Repository System

    Software reuse is the process of creating software systems from existing software rather than building them from scratch. The goal is the use of reusable components as building blocks in new systems with modifications occurring in a controlled way. The reuse of software components is the key to improve productivity...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2011

    A Review of Open Source Software and Open Source Movement in Developing Countries

    Open-source software abbreviated as OSS is computer software that is available with source code and is provided under a software license that permits users to study, change, and improve the software. For the commercial software the source code and certain other rights are normally reserved for copyright holders, i.e., the...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Effective Method of Age Dependent Face Recognition

    This Automatic age dependent face recognition system is developed. This approach is based on the Principle Component Analysis (PCA). Eigen face approach is used for both age prediction and face recognition. Face database is created by aging groups individually. The age prediction is carried out by projecting a new face...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Model Based Approach to Prevent SQL Injection Attacks on .NET Applications

    Web applications support static and dynamic queries to access the database. Dynamic queries take input from the user and use that input to form the query. A user can give malicious input to the application which results in an incorrect query or an unauthorized query and performs vulnerable action on...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    An Efficient Regression Testing by Computing Coverage Data for Software Evolution

    Software systems is evolve continuously during development and maintenance. After software is modified regression testing is applied to software to ensure that It behaves intended and modifications not negatively impacts its original functionality. It is time consuming to rerun test suite T of program Pi on modified program Pi+1. So,...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2012

    Tree Based Aggregation and Routing in WSN: A Multi-Agent System Approach

    In WSN one of the issues is to route the data from the sensor nodes to sink node. The tree-based approach provides an efficient solution for establishing the path and in network aggregation. Tree is nonlinear structures, which have hierarchical levels in terms of parent-child combination. In this paper, the...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2012

    Mathematical Model for the Detection of Selfish Nodes in MANETs

    A mobile ad hoc network, is an independent network of mobile devices connected by wireless links. Each device in a MANET can move freely in any direction, and will therefore change its links to other devices easily. Each must forward traffic of others, and therefore be called a router. The...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2012

    The Application of Case-Based Reasoning to Estimation of Software Development Effort

    Accurate project effort estimation is an important goal for the software engineering community. Till date most work has focused upon building algorithmic models of effort estimation for example COCOMO. The authors describe an alternative approach to estimation based upon the use of analogy. The objective is to estimate the development...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2012

    Basic Concept of Embedded 'C': Review

    The use of C language to program micro controllers is becoming too common. And most of the time its not easy to build an application in assembly which instead one can make easily in C. So, its important that one know C language for micro controller which is commonly known...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2012

    Fast and Texture-Structure Preservable Inpainting and Its Application for Creating Virtualized-Reality Indoor Models

    This paper discusses the new inpainting algorithm for handling the images in the virtualized-reality indoor models. The untextured regions in the indoor model are textured by this proposed inpainting method which guarantees the texture and the structure propagation. The authors call this as a hybrid method because it combines the...

    Provided By Interscience Open Access Journals