Interscience Open Access Journals

Displaying 121-160 of 428 results

  • White Papers // Dec 2012

    Eon of Implementing a Multifaceted Cloud Based Ocr in Apple's Compassionate App Store Milieu

    Cloud architectures discourse key hitches surrounding large-scale data dispensation. In customary data processing it is grim to get as many machines as an application needs. Second, it is difficult to get the machines when one needs them. Third, it is difficult to dispense and harmonize a large-scale job on different...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Internet Access in Remote Areas Using NXP Microcontroller and GSM Modem

    In India and many developing and under-developed countries, providing internet facility to many school-going students is still a far-fetched concept. In this paper, which is based on the authors' project, they propose a new system which circumvents the internet architecture by using GSM infrastructure to access internet services, albeit on...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Self-Managing Performance in Application Servers - Modelling and Data Architecture

    High performance is always a desired objective in computing systems. Managing performance through manual intervention is a well-known and obvious mechanism. The attempts to self-manage performance with minimal human intervention are pre-dominant in the recent advances of research. Control Systems theory is playing a significant role in building such intelligent...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Automated Swim (Single Window Infrastructure Management) for Cloud

    Data centers manage complex server environments, including physical and virtual machines, across a wide variety of platforms, and often in geographically dispersed locations. Information Technology managers are responsible for ensuring that servers in these increasingly complex environments are properly configured and monitored throughout the IT life cycle. They also face...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Improved Near Duplicate Matching Scheme for E-Mail Spam Detection

    Today the major problem that the people are facing is spam mails or e-mail spam. In recent years there are so many schemes are developed to detect the spam emails. Here the primary idea of the similarity matching scheme for spam detection is to maintain a known spam database, formed...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Smart Worms Defense and Detection

    There are several worm attacks in the recent years, this leads to an essentiality of producing new detection technique for worm attacks. In this paper, the authors present a spectrum based smart worm detection scheme, this is based on the idea of detection of worm in the frequency domain. This...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Use of Web Harvesting Technique

    Web harvesting (Web data extraction) is a computer software technique of extracting information from websites. Usually, such software programs simulate human exploration of the Web by either implementing low-level Hyper-Text Transfer Protocol (HTTP), or embedding certain full-fledged Web browsers. Web harvesting is closely related to Web indexing, which indexes information...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    An Efficient Multi-Constrained Feasible Path Selection for Manet

    Quality-of-Service (QoS) routing in an ad-hoc network is difficult because the network topology may change constantly and the available state information for routing is inherently imprecise. This paper proposes a method for multi-constrained feasible path selection for MANET. The authors introduce the composite function which allows OLSR to find the...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Review of XY Routing Algorithm for Network-on-Chip Architecture

    The Network-on-Chip (NoC) is Network-version of System-on-Chip (SoC) means that on-chip communication is done through packet based networks. In NOC topology, routing algorithm and switching are main terminology. The routing algorithm is one of the key factor in NOC architecture. The routing algorithm, which defines as the path taken by...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Raptor Code Based Secure Storage in Cloud Computing

    The end of this decade is marked by a paradigm shift of the industrial information technology towards a pay-peruse service business model known as cloud computing. Cloud data storage redefines the security issues targeted on customer's outsourced data. To ensure the correctness of users' data in the cloud, the authors...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Improved Security System in Mobile Cloud Access Through Fuzzy Intrusion Detection Technique

    Mobile phones are playing a vital role in every one's life. The computing strategy of mobile internet usage is lower than the mobile usage, this may due to the security threat. In general mobility and cloud computing initializing the global marketing, sales and development activities using mobile platforms to market...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Secured Cloud Environment with a New Approach

    Cloud computing is the technology of resource sharing in the present setup, where in the users never look to buy a resource in terms of software, hardware, and many as such only in the name of pay for use it is being used but they have to face big issue...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Testing As A Service (TAAS) - An Enhanced Security Framework for TAAS in Cloud Environment

    Testing becomes an important process not only in terms of exposure but also in terms of performance, safety, usability. Test Environment that directly represents the production environment is too expensive in terms of hardware, software licenses and more people. Cloud computing supports an everything as a service (XaaS) Delivery model....

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Simulation of Adaptive Channel Equalization for BPSK,QPSK and 8-PSK Schemes

    The distortion and inter symbol interference caused by multipath effects of channel degrades the quality of signal transmission in transmission system of digital baseband. Adaptive channel equalization is used commonly to compensate these effects so as to increase the reliability of propagation. Recursive Least Squares (RLS) algorithm is most commonly...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Statistical Analysis of Wsn Based Indoor Positioning Localization Schemes with Kalman Filtering

    Wireless Sensor Network (WSN) is used for determining the Indoor Positioning of objects and persons since recent years. WSN has been implemented in indoor positioning applications such as real time tracking of humans/objects, patient monitoring in health care, navigation, warehouses for inventory monitoring, shopping malls, etc. But one of the...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Inter Carrier Interference and Signal to Interference Ratio of Various Pulse Shaping Functions Used in Ofdm System with Carrier Frequency Offset

    Orthogonal Frequency Division Multiplexing (OFDM) is the important modulation of choice for fourth generation broadband multimedia wireless systems. This paper is focused on the problem of reducing the Inter-Carrier Interference (ICI) and signal to noise ratio in the transmission over OFDM using various pulse shaping methods. Here, the authors have...

    Provided By Interscience Open Access Journals

  • White Papers // Nov 2012

    Gesture Based Touchpad Security System with Design of Touch Screen Controller

    In this paper, the authors present a new approach on the design of security systems by using a touch sensitive device. Security is a permanent concern in a variety of environments ranging from physical access restriction in home and industrial settings to information security in digital systems. Numeric passwords, fingerprint...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2012

    EBDP Buffer Sizing Strategy 802.11 Based WLANS

    In this paper, the authors present wired routers, for whom the sizing of buffers is an active research topic. The classical rule of thumb for sizing wired buffers is to set buffer sizes to be the product of the bandwidth and the average delay of the flows utilizing this link,...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2012

    Performance Optimization in Networks Serving Heterogeneous Flows

    Channel-aware scheduling strategies have emerged as an effective mechanism for improving the throughput of wireless data users by exploiting rate variations. The improvement in throughput comes however at the expense of an increase in the variability of the service rate received over time. While the larger variability only has a...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2012

    Ontology for Automatic Acquisition Web User Information

    Information retrieval has a well-established tradition of performing laboratory experiments on test collections to compare the relative effectiveness of different retrieval approaches. The experimental design specifies the evaluation criterion to be used to determine if one approach is better than another. Retrieval behavior is sufficiently complex to be difficult to...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2012

    The Awareness Network of Monitoring and Displaying Actions of Social Networks

    The concept of awareness plays a pivotal role in research in Computer-Supported Cooperative Work. Recently, Software Engineering researchers interested in the collaborative nature of software development have explored the implications of this concept in the design of software development tools. A critical aspect of awareness is the associated coordinative work...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2012

    Neighbourhood Load Routing and Multi-Channels in Wireless Mesh Networks

    As an emerging technology, wireless mesh networks are making significant progress in the area of wireless networks in recent years. Routing in Wireless Mesh Network (WMN) is challenging because of the unpredictable variations of the wireless environment. Traditional mechanisms have been proved that the routing performance would get deteriorated and...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2012

    Counting Bloom Filter Architecture in VLSI Network Systems

    The Counting Bloom Filter (CBF) is useful for real time applications where the time and space efficiency is the main consideration in performing a set membership tests. The CBF estimates whether an element is present in a large array or not by allowing false positives and by not permitting false...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2012

    Minimization of Load Based Resources in Cloud Computing Systems

    Cloud computing is a term, which involves virtualization, distributed computing, networking, software and Web services. The authors' objective is to develop an effective load balancing algorithm using Divisible Load Scheduling Theorem to maximize or minimize different performance parameters (throughput, latency for example) for the clouds of different sizes. Central to...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2012

    Evolution of Crowd-Sourcing From Computer to Mobile Systems

    As crowd-sourcing is becoming popular for problem solving and completing a task, it is now very important to use this concept in an advance manner. It can also be used as a distributed and vast source of information. This concept is now evolving in world of mobile systems. This will...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2012

    Simulation and Performance Analysis Evaluation for Multipath Extension of Aodv to Improve End to End Delay, Route Error Sent, Routing Load and Packet Drop Ratio

    This paper describes improvement in standard routing protocol AODV for mobile ad-hoc networks. The mechanism setups multiple optimal paths based on bandwidth and delay. It allows to store multiple optimal paths based on Bandwidth and delay. At time of link failure, it will switch to next available path. To set...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2012

    GSM Based Intelligent Wireless Mobile Patient Monitoring System Using ZIGBEE Communication

    Miniaturization of biomedical sensors helped the fast development and popularization of information processing and wireless data transmission technology, the research of wireless medical monitoring system has became a hot topic. By utilizing the wireless technique to transmit information between medical sensor and monitoring control center, the free space of patients...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2012

    HTCPM: A Hybrid Test Case Prioritization Model for Web and GUI Applications

    Web and Event-Driven Applications (EDS) is a class of applications that is quickly becoming ubiquitous. All EDS take sequences of events (e.g., messages, mouse-clicks) as input, change their state, and produce an output (e.g., events, system calls, text messages), where as in web, user session data gathered as users operate...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2012

    A Public Key Distribution and Broadcast Authentication Scheme for Wireless Sensor Networks

    In wireless sensor networks, broadcast communication is the most fundamental and prevailing communication pattern. Securing the broadcast messages from the adversary is critical issue. To defend the WSNs against the adversary attacks of impersonation of a broadcast source or receiver, modification/fabrication of the broadcast message, attacker injecting malicious traffic to...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2012

    Tracking of Moving Object in Wireless Sensor Network

    A Wireless Sensor Network is a collection of sensor nodes distributed into a network to monitor the environmental conditions and send the sensed data to the Base Station. Wireless Sensor Network is one of the rapidly developing area in which energy consumption is the most important aspect to be considered...

    Provided By Interscience Open Access Journals

  • White Papers // Sep 2012

    Design & Implementation of Teacher Student Interaction System Using Zigbee & RFID

    Research of the past years has led to numerous novel developments and approaches for Wireless Sensor Networks (WSNs). However, most previous work has focused on either mathematical analysis or theoretical algorithms with extensive simulation results. In this paper, in order to realistically understand the complexity of WSNs, a ZigBee/IEEE 802.15.4...

    Provided By Interscience Open Access Journals

  • White Papers // Sep 2012

    A Survey of the Effect of Network Parameters on Communication Links in Wireless Sensor Networks

    Sensor networks are a collection of large number of low-cost, low-power, multifunctional, and small sensors. a transceiver and a power source .Wireless sensor networks hold the promise of many new applications in the area of monitoring and control. Examples include target tracking, intrusion detection, wildlife habitat monitoring, climate control and...

    Provided By Interscience Open Access Journals

  • White Papers // Sep 2012

    Priority Based Traffic Lights Controller Using Wireless Sensor Networks

    Vehicular traffic is continuously increasing around the world, especially in large urban areas. The resulting congestion has become a major concern to transportation specialists and decision makers. The existing methods for traffic management, surveillance and control are not adequately efficient in terms of performance, cost, maintenance, and support. In this...

    Provided By Interscience Open Access Journals

  • White Papers // Sep 2012

    Distributed Shared Files Management

    Most often file sharing is the common and basic requirement when users work on a particular domain or area of interest. Users can use software that connects in to a peer-to-peer network to access shared files on the computers of other users (i.e. peers) connected to the network. Files of...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2012

    Load Balancing in Computational Grids Using Ant Colony Optimization Algorithm

    Grid computing is the combination of computer resources from multiple administrative domains for a common goal. Load balancing is one of the critical issues that must be considered in managing a grid computing environment. It is complicated due to the distributed and heterogeneous nature of the resources. An ant colony...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2012

    Novel Techniques to Eradicate Energy Inefficiencies That Abbreviate the Lifetime of the Cell Phone Based WSNs

    The cell phone based WSN of compressed micro-sensors for data acquirement and supervise some surroundings distinctiveness, such as noise, trembling, temperature, and strain. These sensors are entrenched devices accomplished of data communication. In numerous of applications, sensor nodes are deployed over a geo-graphically large region. Due to their configuration, data...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2012

    Clustering Based Classification and Analysis of Data

    This paper presents clustering based document classification and analysis of data. The proposed clustering based classification and analysis of data approach is based on unsupervised and supervised document classification. In this paper unsupervised document and supervised document classification are used. In this approach document collection, text preprocessing, feature selection, indexing,...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2012

    Exploiting Data Mining Techniques for Improving the Efficiency of Time Series Data

    The research work in data mining has achieved a high attraction due to the importance of its applications This paper addresses some theoretical and practical aspects on Exploiting Data Mining Techniques for Improving the Efficiency of Time Series Data using SPSS-CLEMENTINE. This paper can be helpful for an organization or...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2012

    Enhanced Security in Cloud With Multi-Level Intrusion Detection System

    Cloud computing is a new type of service which provides large scale computing resource to each customer. Cloud Computing Systems can be easily threatened by various cyber attacks, because most of Cloud computing system needs to contain some Intrusion Detection Systems (IDS) for protecting each Virtual Machine (VM) against threats....

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2012

    A Novel Approach for Information Security With Automatic Variable Key Using Fibonacci Q-Matrix

    Information security is essential nowadays. Large number of cipher generation and decryption algorithms exists and are being evolved due to increasing demand of users and e-commerce services. In this paper, the authors propose a new approach for secure information transmission over communication channel with key variability concept in symmetric key...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2012

    Fast and Texture-Structure Preservable Inpainting and Its Application for Creating Virtualized-Reality Indoor Models

    This paper discusses the new inpainting algorithm for handling the images in the virtualized-reality indoor models. The untextured regions in the indoor model are textured by this proposed inpainting method which guarantees the texture and the structure propagation. The authors call this as a hybrid method because it combines the...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Defending Against Modern Threats in Web Applications

    Web applications have become critical part of business. They hold a treasure trove of data behind their front ends. Now-a-days attackers are well aware of the valuable information accessible through web applications, so website security has become a major problem today. The number of vulnerabilities has multiplied in recent years....

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Software Performance Analysis With Parallel Programming Approaches

    The term Software Performance Engineering (SPE) is a systematic and quantitative approach for constructing software systems to meet the performance objectives such as response time, throughput, scalability and resource utilization. Optimization is major concern in achieving performance parameters. Optimization is performed during run-time, or in the design phase. This paper...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Cloud Computing in Distributed System

    Cloud Computing as an Internet-based computing; where resources, software and information are provided to computers on-demand, like a public utility; is emerging as a platform for sharing resources like infrastructure, software and various applications. The majority of cloud computing infrastructure consists of reliable services delivered through data centers and built...

    Provided By Interscience Open Access Journals

  • White Papers // Mar 2011

    Performance of Joint Admission and Power Control Algorithms for Cognitive Radio CDMA Networks in Shadowed Environment

    Cognitive radio network maximizes number of Secondary Users (SUs) without affecting the service of Primary Users (PUs). Admittance of SUs is not only affected by the path loss but also lognormal shadowing. In this paper, the authors have carried out the simulation study of Joint Admission and Power Control (JAPC)...

    Provided By Interscience Open Access Journals

  • White Papers // Mar 2011

    Computing Symmetric Block Cipher Using Linear Algebraic Equation

    In this paper, a pair of symmetric block ciphers has been developed for encryption and decryption of text file. The characters in the file are represented by the ASCII codes. A substitution table and a reverse substitution table are formed by using a key. The process of encryption and decryption...

    Provided By Interscience Open Access Journals

  • White Papers // Mar 2011

    Encryption and Decryption Algorithm Using Two Dimensional Cellular Automata Rules in Cryptography

    In this paper, the authors present a new encryption and decryption algorithm for block cipher based on the linear (Periodic Boundary-PB) and nonlinear cellular automata rules. First, they apply non linear CA rules (complements) to both plain text and key. Then PB CA rule is applied to the above results...

    Provided By Interscience Open Access Journals

  • White Papers // May 2011

    Impact of Mobility Models on Mobile Sensor Networks

    Wireless Sensor Networks (WSN) is an emerging technology, finds variety of applications in military, movement tracking, industries and medical fields. WSN are self configurable, self healing networks. In Mobile Sensor Network, (MSN) nodes are free to move with wireless links without infrastructure. In this paper, the authors have studied the...

    Provided By Interscience Open Access Journals

  • White Papers // Mar 2011

    Reducing Throughput-Delay Analysis of Conflict - Free Scheduling in Multihop Adhoc Networks

    An ad hoc networks is a self organized and distributed entity, consisting of n Mobile Stations (MSs) without the coordination of any centralized access point. Initialization is one of the fundamental tasks to set up an ad hoc network, which involves assigning of each of the n MSs a distinct...

    Provided By Interscience Open Access Journals

  • White Papers // Mar 2011

    An Analysis on End-to-End Inference Methods Based on Packet Probing in Network

    Current Internet is a massive, distributed network which continues to grow in size as globalization takes major role in everyone's life like e-commerce, social networking and related activities grow. The heterogeneous and largely unregulated structure of the Internet renders tasks such as optimized service provision, rate limiting certain classes of...

    Provided By Interscience Open Access Journals

  • White Papers // Mar 2011

    Recovery of Loss of Packet in Network Using Constant Packet Reordering

    When the packet is reordered the most standard implementation of the Transmission Control Protocol (TCP) gives poor performance. This paper proposes a new version of the TCP which gives the high throughput when the packet reordering occurs and in another case if the packet reordering is not occurs then in...

    Provided By Interscience Open Access Journals

  • White Papers // Mar 2011

    Equivalence of DES and AES Algorithm With Cellular Automata

    In this paper, the authors present the equivalence of the operations involved in DES and AES algorithm with operations of cellular automata. They identify all the permutation and substitution operations involved in DES and AES algorithm and compare these operations with the cellular automata rules. Then they find that permutation...

    Provided By Interscience Open Access Journals

  • White Papers // Mar 2011

    A Temporal Logic Based Approach to Multi-Agent Intrusion Detection and Prevention

    Collaborative systems research in the last decade have led to the development in several areas ranging from social computing, e-learning systems to management of complex computer networks. Intrusion Detection Systems (IDS) available today have a number of problems that limit their configurability, scalability or efficiency. An important shortcoming is that...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    A Lime Light on the Emerging Trends of Web Mining

    The World Wide Web is a huge, information center for a variety of applications. Web contains a dynamic and rich collection of hyperlink information. It allows Web page access, usage of information and provides numerous sources for data mining. The goal of Web mining is to discover the pattern of...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    A Novel Traffic Tracking System Based on Division of Video Into Frames and Processing

    This paper is to visualize and analyze video. Videos are sequence of image frames. In this work, algorithm will be developed to analyze a frame and the same will be applied to all frames in a video. It is expected see unwanted objects in video frame, which can be removed...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Mechanism to Mitigate Application Layer DDoS Attack With a Light Weight Trust Approach

    New application layer DDoS attacks is a continuous critical threat to which network layer solutions is not applicable as attackers are indistinguishable based on packets or protocols. The increase in Internet-based transactions and communications offers new opportunities for hackers to disrupt business operations with DDoS attacks to prevent legitimate users...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Combining Server and Storage Virtualization: A New Dimension for SMB's

    The virtualization wave is quickly reaching its way down into the small-to-medium-sized business. Virtualization provides unmatched flexibility, performance, and utilization by allowing the user to move server workloads from one virtual workspace to the next, maximizing server resources on the fly based on their business needs. Server virtualization eliminates the...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2012

    Basic Concept of Embedded "C": Review

    The use of C language to program micro controllers is becoming too common. And most of the time its not easy to build an application in assembly which instead the user can make easily in C. So its important that they know C language for micro controller which is commonly...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2012

    Neighbourhood Load Routing and Multi-Channels in Wireless Mesh Networks

    As an emerging technology, wireless mesh networks are making significant progress in the area of wireless networks in recent years. Routing in Wireless Mesh Network (WMN) is challenging because of the unpredictable variations of the wireless environment. Traditional mechanisms have been proved that the routing performance would get deteriorated and...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2012

    Counting Bloom Filter Architecture in VLSI Network Systems

    The Counting Bloom Filter (CBF) is useful for real time applications where the time and space efficiency is the main consideration in performing a set membership tests. The CBF estimates whether an element is present in a large array or not by allowing false positives and by not permitting false...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2012

    Minimization of Load Based Resources in Cloud Computing Systems

    Cloud computing is a term, which involves virtualization, distributed computing, networking, software and Web services. The authors' objective is to develop an effective load balancing algorithm using Divisible Load Scheduling Theorem to maximize or minimize different performance parameters (throughput, latency for example) for the clouds of different sizes. Central to...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2012

    Evolution of Crowd-Sourcing From Computer to Mobile Systems

    As crowd-sourcing is becoming popular for problem solving and completing a task, it is now very important to use this concept in an advance manner. It can also be used as a distributed and vast source of information. This concept is now evolving in world of mobile systems. This will...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2012

    Simulation and Performance Analysis Evaluation for Multipath Extension of Aodv to Improve End to End Delay, Route Error Sent, Routing Load and Packet Drop Ratio

    This paper describes improvement in standard routing protocol AODV for mobile ad-hoc networks. The mechanism setups multiple optimal paths based on bandwidth and delay. It allows to store multiple optimal paths based on Bandwidth and delay. At time of link failure, it will switch to next available path. To set...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2012

    GSM Based Intelligent Wireless Mobile Patient Monitoring System Using ZIGBEE Communication

    Miniaturization of biomedical sensors helped the fast development and popularization of information processing and wireless data transmission technology, the research of wireless medical monitoring system has became a hot topic. By utilizing the wireless technique to transmit information between medical sensor and monitoring control center, the free space of patients...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2011

    Review of Some Transaction Models Used in Mobile Databases

    Mobile computing is presently experiencing a period of unprecedented growth with the convergence of communication and computing capabilities of mobile phones and personal digital assistant. However, mobile computing presents many inherent problems that lead to poor network connectivity. To overcome poor connectivity and reduce cost, mobile clients are forced to...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2011

    Soft Computing Approach to Automatic Test Pattern Generation for Sequential Vlsi Circuit

    Due to the constant development in the integrated circuits, the automatic test pattern generation problem become more vital for sequential VLSI circuits in these days. Also testing of integrating circuits and systems has become a difficult problem. In this paper, the authors have discussed the problem of the automatic test...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2011

    Ant Colony Optimization: A Computational Intelligence Technique

    Ant Colony Optimization (ACO) is a novel computational technique inspired by a foraging behavior of ants has been successfully applied for solving real world optimization problems. This behavioral pattern inspires artificial ants for the search of solutions to the various types of optimization problems. ACO is a probabilistic search approach...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Design and Modification of Circular Monpole UWB Antenna for WPAN Application

    The basic circular monopole antenna exhibits a 10 dB return loss bandwidth over the entire frequency band, the paper proposed a modified version of simple circular monopole antenna for WPAN application. The antenna offers excellent performance in the range of 2-12 GHz.. The antenna is designed on FR4 substrate and...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Tunable Microstrip Filters for Modern Wireless Communications

    Microwave filters are essential components for a large variety of modern communication systems. Filters engage in many recreating roles in RF and microwave applications. Forthcoming technologies like wireless communications are racing with RF and microwave filters in performance, physical and cost parameters. Developing technologies in materials and fabrications are defining...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    A New Hammerstein Model for Non-Linear System Identification

    In this paper, a newer type of black box nonlinear model in Hammerstein structure is proposed. The model has wavelet network coupled with Orthonormal basis functions which is capable of modeling a class of non-linear systems with acceptable accuracy. Wavelet basis functions have the property of localization in both the...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Enhancing Spectrum Efficiency of Cognitive Radio Waveforms Using SD-SMSE Framework

    Spectrum overcrowding continues to present is a fundamental challenge for both military and commercial communications. Recent studies suggest that spectrum congestion is primarily due to inefficient usage rather than spectrum availability. Dynamic Spectrum Access (DSA) and Cognitive Radio (CR) are two techniques being considered to improve spectrum efficiency and utilization....

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Probabilistic Model for Intrusion Detection in Wireless Sensor Network

    Intrusion detection in Wireless Sensor Network (WSN) is important through the view of security in WSN. Sensor Deployment Strategy gives an extent to security in WSNs. This paper compares the probability of intrusion detection in both the Poisson as well as Gaussian deployment strategies. It focuses on maximizing intrusion detection...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    An Efficient Load Balancing Clustering Scheme for Data Centric Wireless Sensor Networks

    Clustering is an efficient approach to capitalize the energy of energy constraint sensor nodes in wireless sensor networks. Clustering schemes do not guarantee formation of clusters with equal number of nodes. So data frames transmitted by the nodes vary. TDMA schedule of nodes of smaller cluster is smaller than others...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Multi User Diversity Evaluation in MIMO HSDPA Downlink Channels

    A multiple transmit antenna, single receive antenna (per receiver) downlink channel with limited channel feedback is considered. Given a constraint on the total system-wide channel feedback, the following question is considered: is it preferable to get low-rate feedback from a large number of receivers or to receive high-rate/high-quality feedback from...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Design of AMBA AXI4 Protocol for System-on-Chip Communication

    Advanced Microcontroller Bus Architecture (AMBA) protocol family provides metric-driven verification of protocol compliance, enabling comprehensive testing of interface Intellectual Property (IP) blocks and System-on-Chip (SoC) designs. The AMBA advanced eXtensible Interface 4 (AXI4) update to AMBA AXI3 includes the following: support for burst lengths up to 256 beats, updated write...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Seamless Handover Between UMTS and GPRS

    UMTS is one step ahead from the 2.5G network GPRS and supports faster data rates with wide coverage area. GPRS and UMTS are already deployed in many countries but seamless handover between GPRS and UMTS still remains as a stumbling block for the service providers to fulfill the continuously increasing...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    QoS Analysis for Scheduling Schemes in Wireless Networks

    In wireless environment, the periodic moments of wireless networks may cause the fluctuation of available bandwidth by varying with time and location. The periodic fluctuation disturbs the resource distribution and Quality of Service (QoS). QoS design is the fundamental functionality of the networking router to enable differentiated delivery and to...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Implementation of a Modem for Narrow Bandwidth Channel Using 6713 DSK

    As communication plays an important role in day to day life, the effective and efficient voice transmission is to be maintained. This paper mainly deals with voice transmission over a channel and implemented using 6713 DSK. For this purpose, some modulation schemes and voice coders are implemented. So two points...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2012

    Credit Card Forgery Identification System With Location Based Tracking Using Mobiles With GPS

    In Mobile networks the user's location, passwords might be used as authentication factor to provide security services for remote client authentication. In addition there are many typical authentication factors. In Location based Remote client Authentication Protocol for mobile environment (LRAP), combines several authentication factors to securely authenticate a mobile user....

    Provided By Interscience Open Access Journals

  • White Papers // Mar 2012

    A QoS Aware Vertical Handover in Mobile Network

    The convergence of heterogeneous wireless access technologies characterizes the 4G wireless networks. In such converged systems, the seamless and efficient handoff between different access technologies (vertical handoff) is essential and remains a challenging problem. The heterogeneous co-existence of access technologies with largely different characteristics creates a decision problem of determining...

    Provided By Interscience Open Access Journals