Interscience Open Access Journals

Displaying 161-200 of 428 results

  • White Papers // Aug 2012

    An Ant Colony Optimization for Job Scheduling to Minimize Makespan Time

    This paper deals with the make span minimization for Job Scheduling. Research on optimization techniques of the Job Scheduling Problem (JSP) is one of the most significant and promising areas of an optimization. Instead of the traditional optimization method, this paper presents an investigation into the use of an Ant...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2012

    Network Reconfiguration in Distribution System by Software Simulation for Loss Reduction

    The main aim of the distribution companies is to reduce their operating costs to get ahead of competition. One of the most popular approach is to increase the degree of reliability of distribution system. The management of network defeats (e.g., earth fault and short circuits) offers a lot of feasibilities...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2012

    Secure Framework in Data Processing for Mobile Cloud Computing

    Generally Mobile Cloud storage enables users to remotely store their data and enjoy the on-demand high quality cloud applications without the burden of local hardware and software management. Though the benefits are clear, such a service is also relinquishing users 'Physical possession of their outsourced data, which inevitably poses new...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2012

    An Area Efficient 32-Bit Carry-Select Adder for Low Power Applications

    CSLA is used in many computational systems to alleviate the problem of carry propagation delay by independently generating multiple carries and then select a carry to generate the sum. However, the CSLA is not area efficient because it uses multiple pairs of Ripple Carry Adders (RCA) to generate partial sum...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2012

    Edge-Triggered Pulsed Sequential Elements With SoC Applications

    The System-On-Chip (SoC) design is integrating hundreds of millions of transistors on one chip, whereas packaging and cooling only have a limited ability to remove the excess heat. In this paper, various design techniques for a low power clocking system are surveyed. Among them is an effective way to reduce...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2012

    Fast and Scalable Pattern Matching for Memory Architecture

    Multi-pattern matching is known to require intensive memory accesses and is often a performance bottleneck. Hence, specialized hardware-accelerated algorithms are being developed for line-speed packet processing. While several pattern matching algorithms have already been developed for such applications, the authors find that most of them suffer from scalability issues. They...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2012

    Multiplier Design and Performance Estimation With Distributed Arithmetic Algorithm

    A new architecture of Multiplier-and-Accumulator (MAC) for high-speed arithmetic. By combining multiplication with accumulation and devising a hybrid type of Carry Save Adder (CSA), the performance was improved. Since the accumulator that has the largest delay in MAC was merged into CSA, the overall performance was elevated. The proposed CSA...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2012

    Implementation of Memory Less Based Low-Complexity CODECS

    In this paper, the authors present a CODEC design for two classes of Crosstalk Avoidance Codes (CACs), Forbidden Pattern Codes (FPCs) and Forbidden Transition Codes (FTCs). Their mapping and coding scheme is based on the Fibonacci numeral system and the mathematical analysis shows that all numbers can be represented by...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2012

    A Novel Decode-Aware Compression Technique for Improved Compression and Decompression

    With compressed bit streams, more configuration information can be stored using the same memory. The access delay is also reduced, because less bits need to be transferred through the memory interface. To measure the efficiency of bit stream compression, Compression Ratio (CR) is widely used as a metric. It is...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2012

    Embedded Programmable Web-Based ECG Monitoring & Detection System Using a Fast Algorithm

    The physicians have to interpret this large amount of ECG data to search for only a few abnormal beats in the ECG. Physicians may overlook some abnormal cycles due to fatigue and human error in interpreting such a large amount of data. Therefore, there is an urgent need for an...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Choosing a Technique for Digital Signatures From the Customers' Perspective

    One way to secure identity over the Internet and other channels is to use digital signatures. Since this area is often used in contact with banks, the authors have during their work co-operated with Nordea IT. In order for customers to use a digital signature whenever they wish to, a...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Approaches for Improving the Performance of Snort Intrusion Detection Systems

    The process of monitoring the events occurring in a computer system or network and analyzing them for sign of intrusions is known as Intrusion Detection Systems (IDS). In this paper the architecture of the snort which is an open source Intrusion detection system is explained. It is a rule based...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Intrusion Detection System Using Genetic Algorithm and Data Mining: An Overview

    Network security is of primary concerned now days for large organizations. Various types of Intrusion Detection Systems (IDS) are available in the market like Host based, Network based or Hybrid depending upon the detection technology used by them. Modern IDS have complex requirements. With data integrity, confidentiality and availability, they...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    A Rule-Based Approach for Effective Resource Provisioning in Hybrid Cloud Environment

    Resource provisioning is important issue in cloud computing and in the environment of heterogeneous clouds. The private cloud with confidentiality data configure according to users need. But the scalability of the private cloud limited. If the resources private clouds are busy in fulfilling other requests then new request cannot be...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Security Analysis of Cloud Computing

    Cloud computing play an important role in IT industry. Cloud computing reshaping the IT industry and in software development process. Cloud computing techniques can offer many facilities like sharing of hardware, availability of software and many more resources as a basic need. Cloud computing effectively reduces the cost, maintenance. As...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Defending Against Modern Threats in Web Applications

    Web applications have become critical part of business. They hold a treasure trove of data behind their front ends. Now-a-days attackers are well aware of the valuable information accessible through web applications, so website security has become a major problem today. The number of vulnerabilities has multiplied in recent years....

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Software Performance Analysis With Parallel Programming Approaches

    The term Software Performance Engineering (SPE) is a systematic and quantitative approach for constructing software systems to meet the performance objectives such as response time, throughput, scalability and resource utilization. Optimization is major concern in achieving performance parameters. Optimization is performed during run-time, or in the design phase. This paper...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Cloud Computing in Distributed System

    Cloud Computing as an Internet-based computing; where resources, software and information are provided to computers on-demand, like a public utility; is emerging as a platform for sharing resources like infrastructure, software and various applications. The majority of cloud computing infrastructure consists of reliable services delivered through data centers and built...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Combining Server and Storage Virtualization: A New Dimension for SMB's

    The virtualization wave is quickly reaching its way down into the small-to-medium-sized business. Virtualization provides unmatched flexibility, performance, and utilization by allowing the user to move server workloads from one virtual workspace to the next, maximizing server resources on the fly based on their business needs. Server virtualization eliminates the...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Interactive Database System

    With the revolution in the technology and lifestyle of human race, the need of easy life and faster result in the need of an hour. Due to complex life and fast growing technology it is always desired to obtain results for any query, problem or requirement with the speed of...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    A Perspective Approach on Citizen Card System - Applicability and Opportunity

    Citizen card system in which every citizen of a country will have a unique 16 digit number citizen card system which would not just help the government track down individuals, but would make life far easier for citizens as they would not have to submit multiple documents each time they...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Various Network Used Radio Frequency Identification Techniques and its Frequency Ranges

    Now-a-days, there are various technologies used in day-to-day life; such as human computer interaction, communication engineering, various types of architectures of computer system for easy convenience of living life style of human being. However, there are various network utilized for the transmission of signal containing various data like audio, video,...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Design and Modification of Circular Monpole UWB Antenna for WPAN Application

    The basic circular monopole antenna exhibits a 10 dB return loss bandwidth over the entire frequency band, the paper proposed a modified version of simple circular monopole antenna for WPAN application. The antenna offers excellent performance in the range of 2-12 GHz.. The antenna is designed on FR4 substrate and...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    The Impact of Calls to the Processor on a Server PABX

    This paper is to define the relationship between the number of calls made in an Asterisk server and use of the processor in this server as the processor is one of the major hardware resources. Subsequently, the authors derived the formulation for the generalization of this relationship or a mathematical...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    Techniques for Load Balancing in Wireless LAN

    This suggests new strategies for balancing load in a wireless network connected in star topology. The loads are assigned to each processor using divisible load theory & Different techniques. Divisible load theory suggests that a load can be divided arbitrarily such that each fraction of the load can be independently...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    Comparative Performance Analysis of Ad-Hoc Routing Protocol Using NS-2 Simulator

    Mobile Ad hoc Network is a collection of mobile nodes in which the wireless links are frequently broken down due to mobility and dynamic infrastructure. Routing is a significant issue and challenge in ad hoc networks. In Mobile ad hoc network, due to mobility of nodes network topology change frequently...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    A Comparative Study of Different Smart Parking Assist Systems Using Wireless Sensor Networks

    To deal with the parking guidance issue of the parking lots, this paper proposes a vision of improvements in parking guidance and information system based on wireless sensor system. This system consists of parking space monitoring nodes, routing nodes, parking guidance display and Central control center. The nodes transmit the...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    Mobile Voting Using Global System for Mobile Communication (GSM) Technology and Authentication Using Fingerprinting Biometrics and Wireless Networks

    India is world's largest democracy. Fundamental right to vote or simply voting in elections forms the basis of Indian democracy. In India all earlier elections a voter used to cast his vote by using ballot paper. This is a long, time-consuming process and very much prone to errors. This situation...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    Performance Enhancement of Reactive on Demand Routing Protocol in Wireless Ad Hoc Network

    A Mobile Adhoc NETwork (MANET) is a class of wireless mobile nodes that dynamically organize themselves in arbitrary network topologies. Due to mobility of nodes, routing plays an important role in communication and routing protocols are divided into two basic classes: proactive and reactive. AODV is an on demand routing...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    A Call Admission Control Scheme for Multimedia Support Over IEEE 802.11 Wireless LANs

    These days there is an increasing interest for VoIP over wireless LANs. QoS support for real-time services like voice in the IEEE 802.11 WLAN is an important issue. Since, IEEE 802.11 uses contention based MAC protocol - the distributed coordination function DCF, it is difficult to support the strict QoS...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    User Authentication Techniques for Wireless Sensor Networks : A Survey

    A Wireless Sensor Network (WSN) consisting of a large number of tiny sensors can be an effective tool for gathering data in diverse kinds of environments. The data collected by each sensor node is communicated to the base station, which forwards the data to the end user. In wireless sensor...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    Simulation and Analysis of Impact of Buffering of Voice Calls in Integrated Voice and Data Communication System

    Queuing theory and Markov chain analysis plays vital role in analyzing real-life problems. It is applied to wired network, wireless network and mobile communication to analyze the packet traffic in packet switched network. In this simulation and analysis, integrated communication system such as voice and data is simulated with different...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    An Efficient Key Management Scheme for Secure Data Access Control in Wireless Broadcast Services

    Wireless broadcast is an effective approach to disseminate data to a number of users. To provide secure access to data in wireless broadcast services, symmetric key - based encryption is used to ensure that only users who own the valid keys can decrypt the data. Regarding various subscriptions, an efficient...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    Quality of Service Based Handover Approach in a WLAN Network

    As the technology is improving so are the demands of end users and their applications increasing. A wide variety of new applications are being invented daily. These applications have different demands from the underlying network protocol suite. High bandwidth internet connectivity has become a basic requirement to the success of...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    Dual-Hop OSTBC Transmissions Over Fading Channels Under Receiver Phase Noise for Regenerative Systems

    Space-time coding for fading channels is a Communication technique that realizes the diversity benefits of multiple transmit antennas. Previous work in this area has focused on the narrowband flat fading case where spatial diversity only is available. In this paper, the authors investigate the use of space-time coding in OFDM...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    Route Request Flooding Attack Using Trust Based Security Scheme in Manet

    In recent years, the use of Mobile Ad hoc NETworks (MANETs) has been widespread in many applications, including some mission critical applications, and as such security has become one of the major concerns in MANETs. A mobile ad hoc network is set up with a group of mobile wireless nodes...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    Fault Tolerant, Energy Saving Method for Reliable Information Propagation in Sensor Network

    The reliability of Wireless Sensor Networks (WSN) is affected by faults that may occur due to various reasons such as malfunctioning hardware, software glitches, dislocation, or environmental hazards, e.g. fire or flood. Due to inherent nature of these networks a sensor node may fail and hence the route may also...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    QoS Routing in Mobile Ad-Hoc Networks Using Agents

    Quality of Service (QoS) provisioning in a Mobile Ad-hoc NETwork (MANETs) routing for multimedia traffic is a challenging task due to dynamic topology of such networks. Fuzzy Logic (FL) was used for QoS prediction from current uncertain QoS constraints in the network for particular applications, from these uncertain constraints there...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    Performance Evaluation of Extended AODV Using Different Scenarios

    The mobile ad hoc networks have become a major component of the future network development due to their ease of deployment, self configurability; flexibility and independence on any existing network infrastructure Mobile ad-hoc network have the attributes such as wireless connection, continuously changing topology, distributed operation and ease of deployment....

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    Development of Empirical Mode Decomposition

    In this paper, one of the tasks for which empirical mode decomposition is potentially useful is nonparametric signal denoising, an area for which wavelet thresholding has been the dominant technique for many years. In this paper, the wavelet thresholding principle is used in the decomposition modes resulting from applying EMD...

    Provided By Interscience Open Access Journals

  • White Papers // Mar 2012

    Live Streaming Using Peer Division Multiplexing

    A Number of commercial Peer-To-Peer (P2P) systems for live streaming have been introduced in recent years. The behavior of the popular systems has been extensively studied in several measurement papers. However, these studies have to rely on a "Black-box" approach, where packet traces are collected from a single or a...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Dynamic Thread Pool Based Service Tracking Manager

    The Service Tracking Manager (STM) application is a management software that integrates, collects, and manages alerts/events information from Casino Management Systems. It allows casinos to track alerts and events at different locations. Casinos staff attends to various kinds of requests. The requests can be for providing customer service, handle events...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Performance Analysis of Secured Synchronous Stream Ciphers

    The new information and communication technologies require adequate security. In the past decades, the authors have witnessed an explosive growth of the digital storage and communication of data, triggered by some important breakthroughs such as the Internet and the expansive growth of wireless communications. In the world of cryptography, stream...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Group-Key Management Model for Worldwide Wireless Mesh Networks

    Wireless Mesh Network (WMN) is an upcoming wireless network technology and is mainly used to provide broadband internet in remote locations. It is characterized by minimum fixed infrastructure requirement and is operated in an open medium, such that any user within the range covered by mesh routers may access the...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Secure Biometric Cryptosystem for Distributed System

    Information (biometric) security is concerned with the assurance of confidentiality, integrity, and availability of information in all forms, biometric information is very sophisticated in terms of all, in this paper, the authors are focusing on data pattern along with all security assurance, so that they can improve the matching performance...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    A Novel Approach for Privacy Preserving in Video Using Extended Euclidean Algorithm Based on Chinese Remainder Theorem

    The development in the modern technology paved a path in the utilization of surveillance cameras in streets, offices and other areas but this significantly leads a threat to the privacy of visitors, passengers or employees, leakage of information etc.. To overcome this threat, privacy and security needs to be incorporated...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    An Efficient and Secure Key Management Scheme for Hierarchical Access Control Based on ECC

    In a key management scheme for hierarchy based access control, each security class having higher clearance can derive the cryptographic secret keys of its other security classes having lower clearances. In 2006 Jeng-Wang proposed an efficient scheme on access control in user hierarchy based on elliptic curve cryptosystem. Their scheme...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Dynamic Detection of Packet Losses by CRDP

    TCP has provided the primary means to transfer data reliably across the Internet; however, TCP has imposed limitations on several applications. Measurement and estimation of packet loss characteristics are challenging due to the relatively rare occurrence and typically short duration of packet loss episodes. While active probe tools are commonly...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    An Efficient Approach Formulation of Social Groups of User Calls of GSM

    The people are living in a world of wireless technology. The most widely used wireless i.e. mobile computing device today is the Mobile phone, can be used not only for voice and data communications but also as a computing device running context aware applications. In this paper, the authors present...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Star Varietal Cube: A New Large Scale Parallel Interconnection Network

    This paper proposes a new interconnection network topology, called the Star varietal-cube SVC (n, m), for large scale multicomputer systems. The authors take advantage of the hierarchical structure of the Star graph network and the Varietal hypercube to obtain an efficient method for constructing the new topology. The Star graph...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Detection of Phishing Websites and Secure Transactions

    Phishing is an electronic online identity theft in which the attackers use a combination of social engineering and web site spoofing techniques to trick a user into revealing confidential information. It steals the user's personal identity data and financial credentials. Most of the phishing attacks emerge as spoofed E-Mails appearing...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Integrated Approach of Malicious Website Detection

    With the advent and the rising popularity of Internet, security is becoming one of the focal point. At present, Web sites have become the attacker's main target. The attackers uses the strategy of embedding the HTML tags, the script tag to include web-based Trojan scripting or redirector scripting, the embedded...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    An Implementation of Botnet Detection Algorithm for Grid Networks

    Grid is an emerging technology that aims at utilizing resources efficiently and effectively, A botnet is a collection of infected computers and the common attacks are a Distributed Denial Of Service attack (DDOS) is any type of attack on a networking structure to disable a server from servicing its clients....

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Embedded Wireless Based Communications in Oilfield & Providing Security System

    The area of the oilfield is much wider. Oil exhauster continuous working for 24 hours. As the problem of petroleum being stolen, transmission line being stolen, and transformer being stolen exists which requires the strong secures management system. With Consideration of the objective condition restriction of geographical environment, the implementation...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Facial Expression Recognition System Using Facial Characteristic Points and ID3

    Facial expression is one of the most powerful, natural, and abrupt means for human beings which have the knack to communicate emotion and regulate inter-personal behaviour. In this paper, the authors present a novel approach for facial expression detection using decision tree. Facial expression information is mostly concentrate on facial...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Implementation of MHMIP and Comparing the Performance With MIP and DHMIP in Mobile Networks

    Managing the mobility efficiently in wireless networks causes critical issue, in order to support mobile users. To support global mobility in IP networks the Mobile Internet Protocol (MIP) has been proposed. The Hierarchical MIP (HMIP) and Dynamic HMIP (DHMIP) strategies are also proposed for providing high signaling delay. The authors'...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    CMA Channel Equalization Through an Adaptive MMSE Equalizer Based RLS Algorithm

    The adaptive algorithm has been widely used in the digital signal processing like channel estimation, channel equalization, echo cancellation, and so on. One of the most important adaptive algorithms is the RLS algorithm. The authors present in this paper n multiple objective optimization approach to fast blind channel equalization. By...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    An Efficient Authentication Protocol for Security in Mobile Ad Hoc Networks

    Mobile Ad hoc NETworks (MANETs) is a collection of mobile nodes that communicate by forming a network dynamically that lacks fixed infrastructure and centralized control. Secure routing is of at most importance in such networks because of dynamically changing topologies, absence of centralized monitoring points and lack of clear lines...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Simulation of DSDV Protocol

    An ad-hoc network is the cooperative engagement of a collection of Mobile Hosts without the required intervention of any centralized Access Point. This Application is the innovative design for the operation of such ad-hoc networks. The basic idea of the design is to operate each Mobile Host as a specialized...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Preemptive Routing & Intrusion Detection for MANETs

    An ad-hoc network will often change rapidly in topology, this courses for routes in the network to often disappear and new to arise. The Ad-hoc On-Demand Distance Vector Routing Protocol(AODV), is based on the principle of discover routes as needed. In this paper, the authors will extend the definition of...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Embedded Smart Car Security System on Face Detection

    In this proposed embedded car security system, FDS (Face Detection System) is used to detect the face of the driver and compare it with the predefined face. For example, in the night when the car's owner is sleeping and someone theft the car then FDS obtains images by one tiny...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2011

    GPS Based Bluetooth Broadcasting - Long Range Solution

    In this paper, GPS based Bluetooth broadcasting for long range is proposed. System model for Long range broadcasting of messages with multiple piconets and dynamically created threshold devices, based on GPS information is presented. The authors' simulation results have shown that, message can be received by those devices which are...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2011

    Min Max Normalization Based Data Perturbation Method for Privacy Protection

    Data mining system contain large amount of private and sensitive data such as healthcare, financial and criminal records. These private and sensitive data can not be share to every one, so privacy protection of data is required in data mining system for avoiding privacy leakage of data. Data perturbation is...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2011

    Multi-Gigabit Pattern for Data in Network Security

    In the current scenario network security is emerging the world. Matching large sets of patterns against an incoming stream of data is a fundamental task in several fields such as network security or computational biology. High-speed network Intrusion Detection Systems (IDS) rely on efficient pattern matching techniques to analyze the...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2011

    VANET: Performance Comparison of BNGF Method in Different Vehicular Traffic Scenarios

    A Vehicular Ad hoc NETwork (VANET) is a wireless ad hoc network that is formed between vehicles on an on demand basis. A lot of research work around the world is being conducted to design the routing protocols for VANETs. In this paper, the authors examine the significance Greedy Forwarding...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Designing of an Automated Power Meter Reading With Zigbee Communication

    This paper presents the design and implementation of Automatic Power Meter (APM), The APM is implemented using an ARM and Zigbee Based power meter Communication Module. The design presents a new methodology for avoiding the high construction and maintenance costs in the existing meter reading technology. Using an APM with...

    Provided By Interscience Open Access Journals

  • White Papers // Nov 2011

    A Modified Approach to the New Lossless Data Compression Method

    This paper proposed the modified approach to the new lossless data compression method. It is developed based on hiding data reversibly with a location map. It performs same as the earlier algorithm but it stands on lossless strategy where as the former approach could not do it. It can compress...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Extending UML for Multidimensional Modeling in Data Warehouse

    Multidimensional modeling is the foundation of data warehouses, MD databases, and On-Line Analytical Processing (OLAP) applications. Nowadays Dimensional modeling and object-orientation are becoming growing interest areas. In the past few years; there have been many proposals, for representing the MD properties at the conceptual level. However, none of them has...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    The Impact of Calls to the Processor on a Server PABX

    This paper is to define the relationship between the number of calls made in an Asterisk server and use of the processor in this server as the processor is one of the major hardware resources. Subsequently, the authors derived the formulation for the generalization of this relationship or a mathematical...

    Provided By Interscience Open Access Journals

  • White Papers // Nov 2010

    A Goal Driven Framework for Service Discovery in Service-Oriented Architecture: A Multiagent Based Approach

    Automated service discovery is one of the very important features in any Semantic Web Service (SWS) based framework. Achieving this functionality in e-resource sharing system is not an easy task due to its hugeness and heterogeneity among the available resources. Any efficient automated service discovery will remain worthless until discovered...

    Provided By Interscience Open Access Journals

  • White Papers // Nov 2010

    Web-Based Tool for Automatic Assignment Evaluation

    The demands for teachers in most educational institutions are continually increasing. Teachers have to teach an increasing number of students every year while simultaneously providing meaningful and constructive feedback and correcting assignments in a minimal amount of time. Consequently, results and assessment of student's progress can be considerably delayed. The...

    Provided By Interscience Open Access Journals

  • White Papers // Nov 2010

    Evaluating XPath Expressions on Light Weight BitCube

    XML has become a popular way of storing data and hence has also become a new standard for exchanging and representing data on internet. Many techniques have been proposed for indexing and retrieval of XML documents such as XTree, BitCube. In this paper a indexing structure known as Light Weight...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2012

    An Area Efficient 32-Bit Carry-Select Adder for Low Power Applications

    CSLA is used in many computational systems to alleviate the problem of carry propagation delay by independently generating multiple carries and then select a carry to generate the sum. However, the CSLA is not area efficient because it uses multiple pairs of Ripple Carry Adders (RCA) to generate partial sum...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2012

    Edge-Triggered Pulsed Sequential Elements With SoC Applications

    The System-On-Chip (SoC) design is integrating hundreds of millions of transistors on one chip, whereas packaging and cooling only have a limited ability to remove the excess heat. In this paper, various design techniques for a low power clocking system are surveyed. Among them is an effective way to reduce...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2012

    Load Balancing in Computational Grids Using Ant Colony Optimization Algorithm

    Grid computing is the combination of computer resources from multiple administrative domains for a common goal. Load balancing is one of the critical issues that must be considered in managing a grid computing environment. It is complicated due to the distributed and heterogeneous nature of the resources. An ant colony...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2012

    Novel Techniques to Eradicate Energy Inefficiencies That Abbreviate the Lifetime of the Cell Phone Based WSNs

    The cell phone based WSN of compressed micro-sensors for data acquirement and supervise some surroundings distinctiveness, such as noise, trembling, temperature, and strain. These sensors are entrenched devices accomplished of data communication. In numerous of applications, sensor nodes are deployed over a geo-graphically large region. Due to their configuration, data...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2012

    Clustering Based Classification and Analysis of Data

    This paper presents clustering based document classification and analysis of data. The proposed clustering based classification and analysis of data approach is based on unsupervised and supervised document classification. In this paper unsupervised document and supervised document classification are used. In this approach document collection, text preprocessing, feature selection, indexing,...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2012

    Exploiting Data Mining Techniques for Improving the Efficiency of Time Series Data

    The research work in data mining has achieved a high attraction due to the importance of its applications This paper addresses some theoretical and practical aspects on Exploiting Data Mining Techniques for Improving the Efficiency of Time Series Data using SPSS-CLEMENTINE. This paper can be helpful for an organization or...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2012

    Enhanced Security in Cloud With Multi-Level Intrusion Detection System

    Cloud computing is a new type of service which provides large scale computing resource to each customer. Cloud Computing Systems can be easily threatened by various cyber attacks, because most of Cloud computing system needs to contain some Intrusion Detection Systems (IDS) for protecting each Virtual Machine (VM) against threats....

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2012

    A Novel Approach for Information Security With Automatic Variable Key Using Fibonacci Q-Matrix

    Information security is essential nowadays. Large number of cipher generation and decryption algorithms exists and are being evolved due to increasing demand of users and e-commerce services. In this paper, the authors propose a new approach for secure information transmission over communication channel with key variability concept in symmetric key...

    Provided By Interscience Open Access Journals