Interscience Open Access Journals

Displaying 121-160 of 502 results

  • White Papers // Dec 2012

    Increasing the Lifetime of Heterogeneous Sensor Network by using Genetic-Fuzzy Clustering

    Wireless Sensor Network is composed of hundreds or thousands of sensor nodes which have computational, energy and memory limitation. Its duty is to receive information from its surrounding environment, analyze and process data and to send the received data to other nodes or base station. In these networks, sensor nodes...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Analysis of Unipath and Multipath Routing Protocols in Mobile Adhoc Networks

    A MANET is an interconnection of mobile devices by wireless links, which forms a dynamic topology. Routing protocols play a vital role in transmission of data across the network. The two major classifications of routing protocols are unipath and multipath. In this paper, the authors have evaluated the performance of...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Hierarchical Routing Protocols for Wireless Sensor Network-A Survey

    Wireless Sensor Networks are a web of sensor nodes with a set of processor and limited memory unit embedded in it. Reliable routing of packets from the sensor node to its base station is the most important task for the networks. The routing protocols applied for the other networks cannot...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Wireless Network Security Threats and their Solutions: A Short Study

    With continual advances in technology, wireless accessibility is being deployed increasingly in office and public environments, as it is having huge benefits. But it is also coupled with the security threats and risks that will adversely affect the performance of the organization. To get rid of these threats, firstly these...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Fault Tolerance in Wireless Sensor Networks Using Constrained Delaunay Triangulation

    Fault tolerance is one of the main issues in Wireless Sensor Networks (WSNs) since it becomes critical in real deployment environment where reliability and reduced inaccessibility times are important. In this paper, the authors propose a fault-tolerance technique for coverage area of the sensor network that enhances the energy efficiency...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Improving Localization Accuracy in Wireless Sensor Networks

    The most fundamental problem of wireless sensor networks is localization (finding the geographical location of the sensors). Most of the localization algorithms proposed for sensor networks are based on Sequential Monte Carlo (SMC) method. To achieve high accuracy in localization it requires high seed node density and it also suffers...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Performance Evaluation of Relaying Schemes for Wireless Communication Systems

    The evaluation of MIMO (Multiple-Input Multiple-Output) Relay wireless system is carried out and compared against the performance of a SISO (Single-Input Single-Output) Relay wireless system. The encoding scheme used in MIMO is Alamouti coding and decoding is done by the Maximum Likelihood (ML) detector. A comparison is made between the...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    A Fuzzy Based Approach in Multihop Network

    The proposed system utilizes the concept of multi hop communication in Wireless Sensor Networks (WSNs). On the other hand, the single hop communication leads to more power dissipation in the nodes at the time of transmitting sensed data. The proposed system rectifies the above mentioned problem with the multi hop...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Amorphous Event Prevention in Wireless Sensor Network

    In many applications wireless sensor can be used to detect the events in those applications. With the advances in sensing, communication, and computation, there is an increasing need to track mobile events such as air pollutant diffusion, toxic gas leakage, or wildfire spreading using mobile sensors such as robots. Lots...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Investigation of Capacity Gains in MIMO Correlated Rician Fading Channels Systems

    This paper investigate the effect of Rician fading and correlation on the capacity and diversity of MIMO channels. The use of antenna arrays at both sides of the wireless communication link (MIMO systems) can increase channel capacity provided the propagation medium is rich scattering or Rayleigh fading and the antenna...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Secure and Reliable Power Supply with Challenges-Smart Grid

    Smart Grid implementations will certainly increase the quantity, quality and use of information available from advanced sensing, computing and communications hardware as well as software. There is virtually universal agreement that it is necessary to upgrade the electric grid to increase overall system efficiency and reliability. Many technologies currently in...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Detecting and Effective Routing of Time Critical Events Using Congestion and Delay Aware Routing in WSNS

    Reliability and timeliness are two essential requirements of successful detection of critical events n Wireless Sensor Networks (WSNs). The Base Station (BS) is particularly interested about reliable and timely collection of data sent by the nodes close to the ongoing event, and at that time, the data sent by other...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    VHDL Implementation of Genetic Algorithm for 2-Bit Adder

    Future planetary and deep space exploration demands that the space vehicles should have robust system architectures and be reconfigurable in unpredictable environment. The evolutionary design of electronic circuits, or Evolvable HardWare (EHW), is a discipline that allows the user to automatically obtain the desired circuit design. The circuit configuration is...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Analyzing the Performance of Carry Tree Adders Based on FPGA's

    In this paper, carry tree adders are known to have the best performance in VLSI designs. However, this performance advantage does not translate directly into FPGA implementations due to constraints on logic block configurations and routing overhead. This paper investigates three types of carry-tree adders (the Kogge-stone, sparse Kogge-stone and...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Design of an Efficient Reversible Logic Based Bidirectional Barrel Shifter

    Embedded digital signal processors and general purpose processors will use barrel shifters to manipulate data. This paper will present the design of the barrel shifter that performs logical shift right, arithmetic shift right, rotate right, logical shift left, arithmetic shift left and rotate left operations. The main objective of the...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Design of Analog Circuits Using Pseudo Floating Gate

    In this paper, the authors present pseudo-floating gate and its bi-directional property. Inverter also can be implemented using bi-directional property. The inverter can be made bidirectional simply by interchanging VDD and GND and no need to add any circuitry or any amplifier. They are using this inverter to implement the...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Performance Comparison of Bulk FINFET with SOI FINFET in Nano-Scale Regime

    In this paper, the authors describe the characteristics comparison of bulk FINFET and SOI FINFET. The scaling trend in device dimension require limit on short channel effect through the control of subthreshold slope and DIBL characteristics. It can be achieved by proper device design. The subthreshold characteristics are plotted with...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Association Rule Mining for Gene Expression Data

    Microarray technology has created a revolution in the field of biological research. Association rules can not only group the similarly expressed genes but also discern relationships among genes. The authors propose a new row-enumeration rule mining method to mine high confidence rules from microarray data. It is a support-free algorithm...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    An Integration Approach for Heterogeneous Distributed Database Transaction Protocols

    Integration is commonly used for summarizing information held in very large databases which are encountered in data warehousing, large scale transaction management, and statistical databases. Such applications often involve distributed databases that have developed independently and therefore may exhibit incompatibility, heterogeneity, and data inconsistency. The authors are here concerned with...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Fuzzy Set Approaches to Data Mining of Association Rule

    Data mining on large databases has been a major concern in research community due to the difficulty of analyzing huge volume of data. This paper focuses on the large set area i.e. on fuzzy sets and knowledge discovery of data. Association rules provide information in accessing significant correlations in large...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Ontology Techniques for Web Data

    In this paper the authors presents techniques for knowledge description and formalization, ontologies are used to represent user profiles in personalized web data. However, when representing user profiles, many models or techniques have utilized only knowledge from either a global knowledge base or user local information. In this paper, a...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Linear Feedback Shift Register Based Unique Random Number Generator

    Linear Feedback Shift Register (LFSR) based unique random number generator is an enhancement of random number generator with the additional property that any number generated by a unique random number generator can't be duplicated. As per users demand for not duplicated random numbers in some applications like transferring a random...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Design of Configurable IP Core for Error Detection and Correction

    In this paper the authors address the design & implementation of configurable Intellectual Property (IP) core for double error detection and single error correction. The encoding/decoding algorithms considered in this can be implemented with a simple and faster hardware. The block can be used for coding and decoding word having...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Dataprefetching Framework for Mobile Behavior Mining Using Co-Smart-Cast Method

    Data Mining is a widely used technique for discovering valuable information in a complex data set. In this paper the authors discussed the main issues about Mobile User Behavior Mining. In mobile transaction database, users in the different user groups may have different behaviors. So that they proposed parameter-less clustering...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Radio Access Network Requirement for New Deployment of WIMAX in Dhaka

    Mobile WiMAX is expected to be the next generation radio-interface, complementing WLAN and challenging EVDO/HSPA/LTE. High speed data rate, reduced latency, better Quality of service, and mobility can allow WiMAX to meet the rapidly growing demand of the users. A study of WiMAX Radio Network Planning (RNP) for an urban...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    A Survey on Mobile Agent Itinerary Planning in Wireless Sensor Networks

    It has been proven recently that using Mobile Agent (MA) in Wireless Sensor Networks (WSNs) can drastically help to obtain the flexibility of application-aware deployment. Normally, in any MA based sensor network, it is an important research issue to find out an optimal itinerary for the MA in order to...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Private Cloud: A Paradigm of Cloud Computing With University Shared Data Center (USDC)

    Cloud computing in academic environment will be benefited by every student and staff where lots of collaboration and safety of data is needed in academia. Academic has various departments and many semesters where lots of students need to access the computing a need for highly available up-to-date software and hardware...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Social Network Analysis for Churn Prediction in Telecom Data

    Social Network Analysis (SNA) is a set of research procedures for identifying group of people who share common structures in systems based on the relations among actors. Grounded in graph and system theories, this approach has proven to be powerful measures for studying networks in various industries like Telecommunication, banking,...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Application and Simulation of Route Optimization in Mobile IP

    Mobile Internet Protocol has been proposed by Internet Engineering Task Force (IETF) to support portable IP addresses for mobile devices that often change their network access points to the Internet. In the basic mobile IP protocol, datagrams sent from wired or wireless hosts and destined for the mobile host that...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Study on Improvement in RSA Algorithm and its Implementation

    The network security means to protect data during their transmission over channel of networks similarly internet security also to protect data during their transmission over a collection of interconnected networks in all over the world. Cryptography is the way of hiding information during transmission over a cannel. There are lots...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Vulnerability Assessment and Penetration Testing

    In this modern world, all of the persons are using the facility of internet. Security is one of the major issues of the internet. Everyday highly skilled hackers breach the security and take the advantage of vulnerabilities to access the confidential data. To overcome this problem one solution was suggested...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Security Escalation Using Key Template and Distortion Reduction in Audio Steganography

    Due to the abrupt enhancement in the development of the distributed computing in recent years, there is necessity of efficient protection of the information that is send through the network. For this purpose, steganography is used as the one of the method to protect the secret message against the intruders....

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Survey of Botnets and Detection Tools

    Botnet meaning bot network is a collection of infected computers under the command and control of a single individual known as a botmaster. Botnets are a current threat to the internet community and have recently been a root cause of many internet attacks. Various attacks that include spamming, distributed denial...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Effective Transmission of Data in Group Editor Using Multithreaded Server

    Group editors are a classic model and research vehicle for distributed interactive groupware applications because they typically manipulate shared data in a coordinated manner. Operational Transformation (OT) has been well accepted in group editors for achieving optimistic consistency control. OT allows local operations to execute in a non blocking manner...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    An Efficient Three Step Algorithm for Fast Motion Estimation in Mobile Domain

    The goal of this paper is to find a fast method for motion estimation and motion segmentation using proposed model. Recent day Communication between ends is facilitated by the development in the area of wired and wireless networks. Block matching algorithms are very useful in achieving the efficient and acceptable...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Comparative Analysis of AODV and DSR To Achieve Group Communication in Manet

    Secure group communication is a challenging task with respect to MANET's. Since its introduction as a communication medium, wireless technology found broad application on the battlefield. Robust and reliable group communication plays a major role in developing distributed mobile application in which unannounced disconnections will occur frequently due to the...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Real-Time Scheduling Policy in Embedded System Domain: A Frame Work

    Scheduling a sequence of jobs released over time when the processing time of a job is only known at its completion is a classical problem in CPU scheduling in time-sharing and real time operating system. The authors discuss here different scheduling techniques used in real-time systems. Even, if there are...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Eon of Implementing a Multifaceted Cloud Based Ocr in Apple's Compassionate App Store Milieu

    Cloud architectures discourse key hitches surrounding large-scale data dispensation. In customary data processing it is grim to get as many machines as an application needs. Second, it is difficult to get the machines when one needs them. Third, it is difficult to dispense and harmonize a large-scale job on different...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Internet Access in Remote Areas Using NXP Microcontroller and GSM Modem

    In India and many developing and under-developed countries, providing internet facility to many school-going students is still a far-fetched concept. In this paper, which is based on the authors' project, they propose a new system which circumvents the internet architecture by using GSM infrastructure to access internet services, albeit on...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Self-Managing Performance in Application Servers - Modelling and Data Architecture

    High performance is always a desired objective in computing systems. Managing performance through manual intervention is a well-known and obvious mechanism. The attempts to self-manage performance with minimal human intervention are pre-dominant in the recent advances of research. Control Systems theory is playing a significant role in building such intelligent...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Performance Comparison of Routing Protocols in MANET Varying Network Size

    A Mobile Ad hoc NETwork (MANET) consists of mobile wireless nodes in which the communication between nodes is carried out without any centralized control. MANET is a self organized and self configurable network where the mobile nodes move arbitrarily. The mobile nodes can receive and forward packets as a router....

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Dual Bootstrap Server Based Super peer Overlay Construction

    Many two-layer hierarchy unstructured Peer-To-Peer (P2P) systems, comprising of superpeers and ordinary peers improved the performance of large scale P2P systems. The construction and maintenance of the superpeer overlay network play an important role in improving the performance P2P systems. One efficient method of constructing the superpeer overlay network is...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Evaluation of Proactive, Reactive and Hybrid Ad Hoc Routing Protocol for Various Battery Models in VANET Using Qualnet

    In VANET high speed is the real characteristic which leads frequent breakdown, interference etc. In this paper, the authors studied various Ad hoc routing protocols, Reactive, Proactive & Hybrid, taking in to consideration various VANET parameters like speed, altitude etc in real traffic scenario and evaluated them for various battery...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Autonomic Diffusion Based Spray Routing in Intermittently Connected Mobile Networks With Multiple Copies

    Intermittently connected mobile Network systems represent a challenging environment for networking research, due to the problems of ensuring messages delivery in spite of frequent disconnections and random meeting patterns. These networks fall into general category of Delay Tolerant Networks. There are many real networks that follow this model, for example,...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    An Improved Hybrid Peer-to-Peer System With Caching for Distributed Data Sharing

    Peer-to-peer overlay networks are widely used in distributed systems. Based on whether a regular topology is maintained among peers, peer-to-peer networks can be divided into two categories: structured peer-to-peer networks in which peers are connected by a regular topology, and unstructured peer-to-peer networks in which the topology is arbitrary. Structured...

    Provided By Interscience Open Access Journals

  • White Papers // May 2011

    Design and Implementation of a Lossless Serial High-Speed Data Compression System

    The paper presents a novel VLSI architecture for high-speed data compressor designs which implement the X-Match algorithm. This design involves important trade off that affects the compression performance, latency, and throughput. The most promising approach is implemented into FPGA hardware. This device typical compression ratio that halves the original uncompressed...

    Provided By Interscience Open Access Journals

  • White Papers // May 2011

    Interesting Video Frames Capturing on Digital Video Development Platform

    Video surveillance has been a popular security tool for years. Video surveillance systems produce huge amounts of data for storage and display. Long-term human monitoring of the acquired video is impractical and in-effective. This paper presents a novel solution for real-time cases that identify and record only "Interesting" video frames...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Cloud Computing in Distributed System

    Cloud Computing as an Internet-based computing; where resources, software and information are provided to computers on-demand, like a public utility; is emerging as a platform for sharing resources like infrastructure, software and various applications. The majority of cloud computing infrastructure consists of reliable services delivered through data centers and built...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Choosing a Technique for Digital Signatures From the Customers' Perspective

    One way to secure identity over the Internet and other channels is to use digital signatures. Since this area is often used in contact with banks, the authors have during their work co-operated with Nordea IT. In order for customers to use a digital signature whenever they wish to, a...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Approaches for Improving the Performance of Snort Intrusion Detection Systems

    The process of monitoring the events occurring in a computer system or network and analyzing them for sign of intrusions is known as Intrusion Detection Systems (IDS). In this paper the architecture of the snort which is an open source Intrusion detection system is explained. It is a rule based...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Intrusion Detection System Using Genetic Algorithm and Data Mining: An Overview

    Network security is of primary concerned now days for large organizations. Various types of Intrusion Detection Systems (IDS) are available in the market like Host based, Network based or Hybrid depending upon the detection technology used by them. Modern IDS have complex requirements. With data integrity, confidentiality and availability, they...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    A Rule-Based Approach for Effective Resource Provisioning in Hybrid Cloud Environment

    Resource provisioning is important issue in cloud computing and in the environment of heterogeneous clouds. The private cloud with confidentiality data configure according to users need. But the scalability of the private cloud limited. If the resources private clouds are busy in fulfilling other requests then new request cannot be...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Security Analysis of Cloud Computing

    Cloud computing play an important role in IT industry. Cloud computing reshaping the IT industry and in software development process. Cloud computing techniques can offer many facilities like sharing of hardware, availability of software and many more resources as a basic need. Cloud computing effectively reduces the cost, maintenance. As...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Research on Data Mining Using Neural Networks

    The application of neural networks in the data mining has become wider. Data mining is the search for relationships and global patterns that exist in large databases but are 'Hidden' among the vast amount of data, such as a relationship between patient data and their medical diagnosis. These relationships represent...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2012

    Basic Model of Multicast Authentication Based On Batch Signature-MABS

    Traditional multicast authentication schemes manage the different involvement of the receivers by letting the sender: choose the block size, divide a multicast stream into blocks, connect each block with a signature, and spread the effect of the Signature across all the packets in the block. The relationship between packets tends...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Cross-Layer System for Cluster Based Data Access in MANET'S

    The objective of cooperative caching is to improve data availability, improve access efficiency and reduce query delay in mobile Ad-Hoc networks. Many types of cache replacement algorithms like LRU, LFU, LFRU, LRU-MIN and LFU-MIN are used to improve data accessibility and reduce query delay in cluster based cooperative caching in...

    Provided By Interscience Open Access Journals

  • White Papers // Mar 2012

    A New Generation Peer-to-Peer Advanced Botnet

    A botnet is a network of compromised computers that are infected with code that allows an unauthorized user to control them via the Internet. Botnets are one of the most serious threats to today's Internet. Most current botnets have centralized Command and Control (C&C) architecture. However, Peer-To-Peer (P2P) structured botnets...

    Provided By Interscience Open Access Journals

  • White Papers // Mar 2012

    An Integrated Approach for Measuring Software Quality and Code Readability

    In this paper, the authors explore the concept of code readability and investigate its relation to software quality. This is a new approach to measuring the complexity of software systems. Software industry uses software metrics to measure the complexity of software systems for software cost estimation, software development control, software...

    Provided By Interscience Open Access Journals

  • White Papers // Mar 2012

    Secure Web System Development

    The recent development in the field of Web system technology has transformed the software industry radically by integrating a wide range of web users, vendors, and enterprise applications worldwide. In Web-based system, a security requirement is a critical issue. This difficulty is due to the complexity level of such systems...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    An Effective Time Management Schema in WSNs

    WSN usually consists of a large number of resource constraint sensor nodes that are generally deployed in unattended/hostile environments and Existing security designs mostly provide a hop-by-hop security paradigm. Furthermore, existing security designs are also vulnerable to many types of Denial of Service (DoS) attacks, such as random node capture...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Periodically Updating the Content in Mobile Ad Hoc Network With Secured Synchronization

    The content and presence updates were used to transmit updates to nearby nodes over an ad hoc network using duty cycles; the authors' algorithms synchronize the transmissions of nodes periodically. By this approach, nodes can save battery power without missing updates from their neighbours by switching off their network cards....

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    An Improvement of Centroid Algorithm Based on Distance in Wireless Sensor Network

    In Wireless Sensor Network (WSN), estimating the exact position of sensor node is an important research problem and its location accuracy impacts the efficiency of localization algorithms. In this paper improved centroid range free localization method is proposed and comparison with conventional centroid is done by varying different parameters such...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Improving Routing Efficiency Based on Random Direction Mobility Model in Manets

    Major issue arising in Mobile Ad hoc NETworks (MANETs) is the selection of the optimal path between any two nodes. A method that has been advocated to improve routing efficiency is to select the most stable path so as to reduce the latency and the overhead due to re-routing instability...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Audio Streaming Over Low Data Rate Wireless System

    Audio applications over wireless networks have recently emerged as a promising research field. However, the limits in terms of communication bandwidth and transmission power have withstood the design of low-power embedded nodes for audio communication. In this paper, the authors describe the implementation details of an embedded system for the...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2012

    Carrier Frequency Offset Estimation Algorithm in the Presence of I/Q Imbalance in OFDM Systems

    In this paper, the authors analyzed the feasibility of using a virtual carrier based carrier frequency offset estimation algorithm in the presence of I/Q imbalance in OFDM systems. Based on the analysis of the signal model with both receiver CFO and I/Q imbalance impairment they conclude that it is feasible...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2012

    Embedded Automobile Engine Locking System, Using GSM Technology

    This paper deals with the design & development of an embedded system, which is being used to prevent/control the theft of a vehicle. The developed instrument is an embedded system based on GSM technology. The instrument is installed in the engine of the vehicle. An interfacing GSM modem is also...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2011

    New Improved Algorithm for Mining Privacy - Preserving Frequent Itemsets

    Due to the increasing use of very large databases and data warehouses, mining useful information and helpful knowledge from transactions is evolving into an important research area. Frequent Itemsets (FI) Mining is one of the most researched areas of data mining. In order to mining privacy preserving frequent itemsets on...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2011

    Virtual Fabrication and Analog Performance of Sub-40nm Bulk MOSFET Using TCAD TOOL

    The Scaling of MOSFET device to sub40nm is very critical because of short channel effect. The SCE is mainly due to power supply since scaling of device is more rapid as compared to The scaling of supply voltage result is the SCE, because of high electric field degrades the mobility...

    Provided By Interscience Open Access Journals

  • White Papers // Mar 2011

    A Real Time ZigBee Based Locating System

    An Adhoc networks is a self organized and distributed entity, consisting of n Mobile Stations (MSs) without the coordination of any centralized access point. Initialization is one of the fundamental tasks to set up an adhoc network, which involves assigning of each of the n MSs a distinct ID number...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2011

    Mathematics in Internet Traffic Data Analysis

    The Internet traffic data have been found to possess extreme variability and bursty structures in a wide range of time-scales, so that there is no definite duration of busy or silent periods. But there is a self-similarity for which it is possible to characterize the data. The self-similar nature was...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2011

    Software Reusable Components With Repository System

    Software reuse is the process of creating software systems from existing software rather than building them from scratch. The goal is the use of reusable components as building blocks in new systems with modifications occurring in a controlled way. The reuse of software components is the key to improve productivity...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2011

    A Review of Open Source Software and Open Source Movement in Developing Countries

    Open-source software abbreviated as OSS is computer software that is available with source code and is provided under a software license that permits users to study, change, and improve the software. For the commercial software the source code and certain other rights are normally reserved for copyright holders, i.e., the...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Effective Method of Age Dependent Face Recognition

    This Automatic age dependent face recognition system is developed. This approach is based on the Principle Component Analysis (PCA). Eigen face approach is used for both age prediction and face recognition. Face database is created by aging groups individually. The age prediction is carried out by projecting a new face...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Model Based Approach to Prevent SQL Injection Attacks on .NET Applications

    Web applications support static and dynamic queries to access the database. Dynamic queries take input from the user and use that input to form the query. A user can give malicious input to the application which results in an incorrect query or an unauthorized query and performs vulnerable action on...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    An Efficient Regression Testing by Computing Coverage Data for Software Evolution

    Software systems is evolve continuously during development and maintenance. After software is modified regression testing is applied to software to ensure that It behaves intended and modifications not negatively impacts its original functionality. It is time consuming to rerun test suite T of program Pi on modified program Pi+1. So,...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2012

    Tree Based Aggregation and Routing in WSN: A Multi-Agent System Approach

    In WSN one of the issues is to route the data from the sensor nodes to sink node. The tree-based approach provides an efficient solution for establishing the path and in network aggregation. Tree is nonlinear structures, which have hierarchical levels in terms of parent-child combination. In this paper, the...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2012

    Mathematical Model for the Detection of Selfish Nodes in MANETs

    A mobile ad hoc network, is an independent network of mobile devices connected by wireless links. Each device in a MANET can move freely in any direction, and will therefore change its links to other devices easily. Each must forward traffic of others, and therefore be called a router. The...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2012

    The Application of Case-Based Reasoning to Estimation of Software Development Effort

    Accurate project effort estimation is an important goal for the software engineering community. Till date most work has focused upon building algorithmic models of effort estimation for example COCOMO. The authors describe an alternative approach to estimation based upon the use of analogy. The objective is to estimate the development...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2012

    Basic Concept of Embedded 'C': Review

    The use of C language to program micro controllers is becoming too common. And most of the time its not easy to build an application in assembly which instead one can make easily in C. So, its important that one know C language for micro controller which is commonly known...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2012

    Fast and Texture-Structure Preservable Inpainting and Its Application for Creating Virtualized-Reality Indoor Models

    This paper discusses the new inpainting algorithm for handling the images in the virtualized-reality indoor models. The untextured regions in the indoor model are textured by this proposed inpainting method which guarantees the texture and the structure propagation. The authors call this as a hybrid method because it combines the...

    Provided By Interscience Open Access Journals