Interscience Open Access Journals

Displaying 161-200 of 434 results

  • White Papers // Aug 2012

    Enhanced Security in Cloud With Multi-Level Intrusion Detection System

    Cloud computing is a new type of service which provides large scale computing resource to each customer. Cloud Computing Systems can be easily threatened by various cyber attacks, because most of Cloud computing system needs to contain some Intrusion Detection Systems (IDS) for protecting each Virtual Machine (VM) against threats....

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2012

    A Novel Approach for Information Security With Automatic Variable Key Using Fibonacci Q-Matrix

    Information security is essential nowadays. Large number of cipher generation and decryption algorithms exists and are being evolved due to increasing demand of users and e-commerce services. In this paper, the authors propose a new approach for secure information transmission over communication channel with key variability concept in symmetric key...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2012

    An Ant Colony Optimization for Job Scheduling to Minimize Makespan Time

    This paper deals with the make span minimization for Job Scheduling. Research on optimization techniques of the Job Scheduling Problem (JSP) is one of the most significant and promising areas of an optimization. Instead of the traditional optimization method, this paper presents an investigation into the use of an Ant...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2012

    Network Reconfiguration in Distribution System by Software Simulation for Loss Reduction

    The main aim of the distribution companies is to reduce their operating costs to get ahead of competition. One of the most popular approach is to increase the degree of reliability of distribution system. The management of network defeats (e.g., earth fault and short circuits) offers a lot of feasibilities...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2012

    Secure Framework in Data Processing for Mobile Cloud Computing

    Generally Mobile Cloud storage enables users to remotely store their data and enjoy the on-demand high quality cloud applications without the burden of local hardware and software management. Though the benefits are clear, such a service is also relinquishing users 'Physical possession of their outsourced data, which inevitably poses new...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2012

    Load Balancing in Computational Grids Using Ant Colony Optimization Algorithm

    Grid computing is the combination of computer resources from multiple administrative domains for a common goal. Load balancing is one of the critical issues that must be considered in managing a grid computing environment. It is complicated due to the distributed and heterogeneous nature of the resources. An ant colony...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2012

    Novel Techniques to Eradicate Energy Inefficiencies That Abbreviate the Lifetime of the Cell Phone Based WSNs

    The cell phone based WSN of compressed micro-sensors for data acquirement and supervise some surroundings distinctiveness, such as noise, trembling, temperature, and strain. These sensors are entrenched devices accomplished of data communication. In numerous of applications, sensor nodes are deployed over a geo-graphically large region. Due to their configuration, data...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2012

    Clustering Based Classification and Analysis of Data

    This paper presents clustering based document classification and analysis of data. The proposed clustering based classification and analysis of data approach is based on unsupervised and supervised document classification. In this paper unsupervised document and supervised document classification are used. In this approach document collection, text preprocessing, feature selection, indexing,...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2012

    Exploiting Data Mining Techniques for Improving the Efficiency of Time Series Data

    The research work in data mining has achieved a high attraction due to the importance of its applications This paper addresses some theoretical and practical aspects on Exploiting Data Mining Techniques for Improving the Efficiency of Time Series Data using SPSS-CLEMENTINE. This paper can be helpful for an organization or...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2012

    An Area Efficient 32-Bit Carry-Select Adder for Low Power Applications

    CSLA is used in many computational systems to alleviate the problem of carry propagation delay by independently generating multiple carries and then select a carry to generate the sum. However, the CSLA is not area efficient because it uses multiple pairs of Ripple Carry Adders (RCA) to generate partial sum...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2012

    Edge-Triggered Pulsed Sequential Elements With SoC Applications

    The System-On-Chip (SoC) design is integrating hundreds of millions of transistors on one chip, whereas packaging and cooling only have a limited ability to remove the excess heat. In this paper, various design techniques for a low power clocking system are surveyed. Among them is an effective way to reduce...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2012

    Multiplier Design and Performance Estimation With Distributed Arithmetic Algorithm

    A new architecture of Multiplier-and-Accumulator (MAC) for high-speed arithmetic. By combining multiplication with accumulation and devising a hybrid type of Carry Save Adder (CSA), the performance was improved. Since the accumulator that has the largest delay in MAC was merged into CSA, the overall performance was elevated. The proposed CSA...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2012

    Implementation of Memory Less Based Low-Complexity CODECS

    In this paper, the authors present a CODEC design for two classes of Crosstalk Avoidance Codes (CACs), Forbidden Pattern Codes (FPCs) and Forbidden Transition Codes (FTCs). Their mapping and coding scheme is based on the Fibonacci numeral system and the mathematical analysis shows that all numbers can be represented by...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2012

    A Novel Decode-Aware Compression Technique for Improved Compression and Decompression

    With compressed bit streams, more configuration information can be stored using the same memory. The access delay is also reduced, because less bits need to be transferred through the memory interface. To measure the efficiency of bit stream compression, Compression Ratio (CR) is widely used as a metric. It is...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2012

    Embedded Programmable Web-Based ECG Monitoring & Detection System Using a Fast Algorithm

    The physicians have to interpret this large amount of ECG data to search for only a few abnormal beats in the ECG. Physicians may overlook some abnormal cycles due to fatigue and human error in interpreting such a large amount of data. Therefore, there is an urgent need for an...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2012

    Fast and Scalable Pattern Matching for Memory Architecture

    Multi-pattern matching is known to require intensive memory accesses and is often a performance bottleneck. Hence, specialized hardware-accelerated algorithms are being developed for line-speed packet processing. While several pattern matching algorithms have already been developed for such applications, the authors find that most of them suffer from scalability issues. They...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Combining Server and Storage Virtualization: A New Dimension for SMB's

    The virtualization wave is quickly reaching its way down into the small-to-medium-sized business. Virtualization provides unmatched flexibility, performance, and utilization by allowing the user to move server workloads from one virtual workspace to the next, maximizing server resources on the fly based on their business needs. Server virtualization eliminates the...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Security Analysis of Cloud Computing

    Cloud computing play an important role in IT industry. Cloud computing reshaping the IT industry and in software development process. Cloud computing techniques can offer many facilities like sharing of hardware, availability of software and many more resources as a basic need. Cloud computing effectively reduces the cost, maintenance. As...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Defending Against Modern Threats in Web Applications

    Web applications have become critical part of business. They hold a treasure trove of data behind their front ends. Now-a-days attackers are well aware of the valuable information accessible through web applications, so website security has become a major problem today. The number of vulnerabilities has multiplied in recent years....

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Software Performance Analysis With Parallel Programming Approaches

    The term Software Performance Engineering (SPE) is a systematic and quantitative approach for constructing software systems to meet the performance objectives such as response time, throughput, scalability and resource utilization. Optimization is major concern in achieving performance parameters. Optimization is performed during run-time, or in the design phase. This paper...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Cloud Computing in Distributed System

    Cloud Computing as an Internet-based computing; where resources, software and information are provided to computers on-demand, like a public utility; is emerging as a platform for sharing resources like infrastructure, software and various applications. The majority of cloud computing infrastructure consists of reliable services delivered through data centers and built...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Choosing a Technique for Digital Signatures From the Customers' Perspective

    One way to secure identity over the Internet and other channels is to use digital signatures. Since this area is often used in contact with banks, the authors have during their work co-operated with Nordea IT. In order for customers to use a digital signature whenever they wish to, a...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Approaches for Improving the Performance of Snort Intrusion Detection Systems

    The process of monitoring the events occurring in a computer system or network and analyzing them for sign of intrusions is known as Intrusion Detection Systems (IDS). In this paper the architecture of the snort which is an open source Intrusion detection system is explained. It is a rule based...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Intrusion Detection System Using Genetic Algorithm and Data Mining: An Overview

    Network security is of primary concerned now days for large organizations. Various types of Intrusion Detection Systems (IDS) are available in the market like Host based, Network based or Hybrid depending upon the detection technology used by them. Modern IDS have complex requirements. With data integrity, confidentiality and availability, they...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    A Rule-Based Approach for Effective Resource Provisioning in Hybrid Cloud Environment

    Resource provisioning is important issue in cloud computing and in the environment of heterogeneous clouds. The private cloud with confidentiality data configure according to users need. But the scalability of the private cloud limited. If the resources private clouds are busy in fulfilling other requests then new request cannot be...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    A Perspective Approach on Citizen Card System - Applicability and Opportunity

    Citizen card system in which every citizen of a country will have a unique 16 digit number citizen card system which would not just help the government track down individuals, but would make life far easier for citizens as they would not have to submit multiple documents each time they...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Interactive Database System

    With the revolution in the technology and lifestyle of human race, the need of easy life and faster result in the need of an hour. Due to complex life and fast growing technology it is always desired to obtain results for any query, problem or requirement with the speed of...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Various Network Used Radio Frequency Identification Techniques and its Frequency Ranges

    Now-a-days, there are various technologies used in day-to-day life; such as human computer interaction, communication engineering, various types of architectures of computer system for easy convenience of living life style of human being. However, there are various network utilized for the transmission of signal containing various data like audio, video,...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Design and Modification of Circular Monpole UWB Antenna for WPAN Application

    The basic circular monopole antenna exhibits a 10 dB return loss bandwidth over the entire frequency band, the paper proposed a modified version of simple circular monopole antenna for WPAN application. The antenna offers excellent performance in the range of 2-12 GHz.. The antenna is designed on FR4 substrate and...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    The Impact of Calls to the Processor on a Server PABX

    This paper is to define the relationship between the number of calls made in an Asterisk server and use of the processor in this server as the processor is one of the major hardware resources. Subsequently, the authors derived the formulation for the generalization of this relationship or a mathematical...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    User Authentication Techniques for Wireless Sensor Networks : A Survey

    A Wireless Sensor Network (WSN) consisting of a large number of tiny sensors can be an effective tool for gathering data in diverse kinds of environments. The data collected by each sensor node is communicated to the base station, which forwards the data to the end user. In wireless sensor...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    Simulation and Analysis of Impact of Buffering of Voice Calls in Integrated Voice and Data Communication System

    Queuing theory and Markov chain analysis plays vital role in analyzing real-life problems. It is applied to wired network, wireless network and mobile communication to analyze the packet traffic in packet switched network. In this simulation and analysis, integrated communication system such as voice and data is simulated with different...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    Techniques for Load Balancing in Wireless LAN

    This suggests new strategies for balancing load in a wireless network connected in star topology. The loads are assigned to each processor using divisible load theory & Different techniques. Divisible load theory suggests that a load can be divided arbitrarily such that each fraction of the load can be independently...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    Comparative Performance Analysis of Ad-Hoc Routing Protocol Using NS-2 Simulator

    Mobile Ad hoc Network is a collection of mobile nodes in which the wireless links are frequently broken down due to mobility and dynamic infrastructure. Routing is a significant issue and challenge in ad hoc networks. In Mobile ad hoc network, due to mobility of nodes network topology change frequently...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    A Comparative Study of Different Smart Parking Assist Systems Using Wireless Sensor Networks

    To deal with the parking guidance issue of the parking lots, this paper proposes a vision of improvements in parking guidance and information system based on wireless sensor system. This system consists of parking space monitoring nodes, routing nodes, parking guidance display and Central control center. The nodes transmit the...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    Mobile Voting Using Global System for Mobile Communication (GSM) Technology and Authentication Using Fingerprinting Biometrics and Wireless Networks

    India is world's largest democracy. Fundamental right to vote or simply voting in elections forms the basis of Indian democracy. In India all earlier elections a voter used to cast his vote by using ballot paper. This is a long, time-consuming process and very much prone to errors. This situation...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    Performance Enhancement of Reactive on Demand Routing Protocol in Wireless Ad Hoc Network

    A Mobile Adhoc NETwork (MANET) is a class of wireless mobile nodes that dynamically organize themselves in arbitrary network topologies. Due to mobility of nodes, routing plays an important role in communication and routing protocols are divided into two basic classes: proactive and reactive. AODV is an on demand routing...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    A Call Admission Control Scheme for Multimedia Support Over IEEE 802.11 Wireless LANs

    These days there is an increasing interest for VoIP over wireless LANs. QoS support for real-time services like voice in the IEEE 802.11 WLAN is an important issue. Since, IEEE 802.11 uses contention based MAC protocol - the distributed coordination function DCF, it is difficult to support the strict QoS...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    An Efficient Key Management Scheme for Secure Data Access Control in Wireless Broadcast Services

    Wireless broadcast is an effective approach to disseminate data to a number of users. To provide secure access to data in wireless broadcast services, symmetric key - based encryption is used to ensure that only users who own the valid keys can decrypt the data. Regarding various subscriptions, an efficient...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    Quality of Service Based Handover Approach in a WLAN Network

    As the technology is improving so are the demands of end users and their applications increasing. A wide variety of new applications are being invented daily. These applications have different demands from the underlying network protocol suite. High bandwidth internet connectivity has become a basic requirement to the success of...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Digital Watermarking Technique Used for Security of Digital Images During Broadcasting and Telecasting by Using DWT

    Signals are any time varying quantity having lot of Information and have its own frequency. Signal can be classified into random signal, periodic signals, and non-periodic signals, discrete or digital signal. Signal may contain various data like audio, video, or in text format. Signal also has information like images. But...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Performance Analysis of MIMO SFBC CI-COFDM System Against the Nonlinear Distortion and Narrowband Interference

    Carrier Interferometry Coded Orthogonal Frequency Division Multiplexing (CI-COFDM) system has been widely studied in multi-carrier communication system. The CI-COFDM system spreads each coded information symbol across all N sub-carriers using orthogonal CI spreading codes. The CI-COFDM system shows the advantages of Peak to Average Power Ratio (PAPR) reduction, frequency diversity...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Simulation of a Real-Time Bus Arrival Predictor Using RFID and LabVIEW

    Most college and office goers in India use the public buses for daily commuting. The bus network caters to the need of thousands who find it an affordable means of transport. However, the absence of real-time updates in the system poses some very serious problems during the exit period. Large...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Optimal Allocation of FACTS Devices by Using Multi-Objective Optimal Power Flow and Genetic Algorithms

    The introduction of the Flexible AC Transmission System (FACTS) in the power system reduces the losses, reduces the cost of the generation, improves the stability and also improves the load capability of the system. Some application of the Flexible AC Transmission System (FACTS) technologies to existing high voltage power system...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    The Design and Development of Microstrip Patch Antenna Using Simulation Studies by ADS

    The matching network of a Microstrip Patch Antenna at 10.65 GHz was designed and developed using the software Advanced Design System (ADS). ADS is powerful software for designing microwave electronic circuits. The Microstrip Patch antenna thus developed was tested at 10m Far Field Antenna Anechoic Chamber and Momentum Simulation studies...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Reliable Routings in Networks With Generalized Link Failure Events

    Traditional methods for ensuring reliable transmissions in circuit-switched networks rely on the pre computation of a backup path for every working path or for every network link. These methods work fine as long as the network experiences only single link failures. They do not guarantee undisturbed communication, however, in the...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Object Detection Using Am-Fm Features

    This paper presents a template-based approach to detect objects of interest from real images. The authors rely on AM-FM models and specifically, on the Dominant Component Analysis (DCA) for feature extraction. They incorporate the results from AM-FM models for object detection. In order to detect the object of interest from...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Mobile Communication

    Consumers demand more from their technology. Whether it be a television, cellular phone, or refrigerator, the latest technology purchase must have new features. With the advent of the Internet, the most-wanted feature is better, faster access to information. Cellular subscribers pay extra on top of their basic bills for such...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Role of Feature Selection in Intrusion Detection Systems for 802.11 Networks

    Intrusion Detection Systems are important for protecting network and its resources from illegal penetration. For 802.11network, the features used for training and testing the intrusion detection systems consist of basic information related to the TCP/IP header, with no considerable attention to the features associated with lower level protocol frames. The...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Design and Implementation of an Enhanced DDS Based Digital Modulator for Multiple Modulation Schemes

    This paper deals with the design & implementation of a Digital Modulator based on the FPGA. The design is implemented using the Enhanced Direct Digital Synthesis (DDS) Technology. The basic DDS architecture is enhanced with the minimum hardware to facilitate the complete system level support for different kinds of Modulations...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Detecting & Eliminating Rogue Access Point in IEEE 802.11 WLAN

    Rogue Access Points (RAPs) is one of the leading security threats in current network scenario, if not properly handled in time could lead from minor network faults to serious network failure. Most of the current solutions to detect rogue access points are not automated and are dependent on a specific...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Attacks in Wireless Networks

    Communications in wireless networks has been facilitating numerous emerging applications that require packet delivery from one or more senders to multiple receivers. Communications are susceptible to various kinds of attacks due to insecure wireless channels. Communications in wireless networks remains a challenging and critical issue. This paper presents recent advances...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    A Trust Based Sensor Protocol for Information Dissemination in a Point to Point Media

    Securing the information dissemination is an important issue in wireless sensor network. Previously, there is no available work on the integrated design of trust model and SPIN-PP protocol (sensor Protocols for Information via Negotiation) for information dissemination in wireless sensor networks. In this paper, to improve the quality of this...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Analyzing the Performance of Data Dissemination Algorithms to Application Requirements in Wireless Sensor Network

    A Wireless Sensor Network (WSN) is a collection of thousands of tiny sensor nodes having the capability of wireless communication, limited computation and sensing. Many data dissemination protocols have been proposed for multi-hop communication in sensor networks, each evaluated in some scenario. Many protocols are designed to exploit application requirements,...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Study of Wireless Sensor Network in SCADA System for Power Plant

    In this paper, study of wireless SCADA system which is powerful setup for monitoring and controlling the various applications from remotely placed is presented. All communication between GSM modem and user are wireless based, this translates into lowest cost compared to all other systems. Wireless based solutions have universally accepted,...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Performance Comparison of Routing Protocols in MANET Varying Network Size

    A Mobile Ad hoc NETwork (MANET) consists of mobile wireless nodes in which the communication between nodes is carried out without any centralized control. MANET is a self organized and self configurable network where the mobile nodes move arbitrarily. The mobile nodes can receive and forward packets as a router....

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Dual Bootstrap Server Based Super peer Overlay Construction

    Many two-layer hierarchy unstructured Peer-To-Peer (P2P) systems, comprising of superpeers and ordinary peers improved the performance of large scale P2P systems. The construction and maintenance of the superpeer overlay network play an important role in improving the performance P2P systems. One efficient method of constructing the superpeer overlay network is...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Evaluation of Proactive, Reactive and Hybrid Ad Hoc Routing Protocol for Various Battery Models in VANET Using Qualnet

    In VANET high speed is the real characteristic which leads frequent breakdown, interference etc. In this paper, the authors studied various Ad hoc routing protocols, Reactive, Proactive & Hybrid, taking in to consideration various VANET parameters like speed, altitude etc in real traffic scenario and evaluated them for various battery...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Autonomic Diffusion Based Spray Routing in Intermittently Connected Mobile Networks With Multiple Copies

    Intermittently connected mobile Network systems represent a challenging environment for networking research, due to the problems of ensuring messages delivery in spite of frequent disconnections and random meeting patterns. These networks fall into general category of Delay Tolerant Networks. There are many real networks that follow this model, for example,...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    An Improved Hybrid Peer-to-Peer System With Caching for Distributed Data Sharing

    Peer-to-peer overlay networks are widely used in distributed systems. Based on whether a regular topology is maintained among peers, peer-to-peer networks can be divided into two categories: structured peer-to-peer networks in which peers are connected by a regular topology, and unstructured peer-to-peer networks in which the topology is arbitrary. Structured...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    A Multipurpose Image Processing Technique for Wireless and Wired Networks

    One of the most important and challenging goal of current and future communication network is transmission of high quality images from sender to receiver side quickly with least error where limitation of bandwidth is a prime problem. Here, the authors will discuss a new approach towards compressing and decompressing with...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    ICMP, SNMP: Collaborative Approach to Network Discovery and Monitoring

    The algorithm and realization technique of network topology discovery is a very important technical indicator for a network management system's quality. Based on the knowledge of the network topology discovery theory, the research on ICMP and SNMP programming for Windows, this paper proposes a method of developing the common network...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    The Future of IP SAN Using SCVM

    The SCVM, which stands for Storage Concentrator Virtual Machine, creates IP SAN storage as virtual machine, providing the user with the ability to consolidate their virtual data center. The SCVM can fully manage and has features for the storage over local as well as networked VMs. This can be attained...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    An Efficient Key Management Scheme for Secure Data Access Control in Wireless Broadcast Services

    Wireless broadcast is an effective approach to disseminate data to a number of users. To provide secure access to data in wireless broadcast services, symmetric key - based encryption is used to ensure that only users who own the valid keys can decrypt the data. Regarding various subscriptions, an efficient...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    Quality of Service Based Handover Approach in a WLAN Network

    As the technology is improving so are the demands of end users and their applications increasing. A wide variety of new applications are being invented daily. These applications have different demands from the underlying network protocol suite. High bandwidth internet connectivity has become a basic requirement to the success of...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    Dual-Hop OSTBC Transmissions Over Fading Channels Under Receiver Phase Noise for Regenerative Systems

    Space-time coding for fading channels is a Communication technique that realizes the diversity benefits of multiple transmit antennas. Previous work in this area has focused on the narrowband flat fading case where spatial diversity only is available. In this paper, the authors investigate the use of space-time coding in OFDM...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    Route Request Flooding Attack Using Trust Based Security Scheme in Manet

    In recent years, the use of Mobile Ad hoc NETworks (MANETs) has been widespread in many applications, including some mission critical applications, and as such security has become one of the major concerns in MANETs. A mobile ad hoc network is set up with a group of mobile wireless nodes...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    Fault Tolerant, Energy Saving Method for Reliable Information Propagation in Sensor Network

    The reliability of Wireless Sensor Networks (WSN) is affected by faults that may occur due to various reasons such as malfunctioning hardware, software glitches, dislocation, or environmental hazards, e.g. fire or flood. Due to inherent nature of these networks a sensor node may fail and hence the route may also...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    Techniques for Load Balancing in Wireless LAN

    This suggests new strategies for balancing load in a wireless network connected in star topology. The loads are assigned to each processor using divisible load theory & Different techniques. Divisible load theory suggests that a load can be divided arbitrarily such that each fraction of the load can be independently...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    Comparative Performance Analysis of Ad-Hoc Routing Protocol Using NS-2 Simulator

    Mobile Ad hoc Network is a collection of mobile nodes in which the wireless links are frequently broken down due to mobility and dynamic infrastructure. Routing is a significant issue and challenge in ad hoc networks. In Mobile ad hoc network, due to mobility of nodes network topology change frequently...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    A Comparative Study of Different Smart Parking Assist Systems Using Wireless Sensor Networks

    To deal with the parking guidance issue of the parking lots, this paper proposes a vision of improvements in parking guidance and information system based on wireless sensor system. This system consists of parking space monitoring nodes, routing nodes, parking guidance display and Central control center. The nodes transmit the...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    Mobile Voting Using Global System for Mobile Communication (GSM) Technology and Authentication Using Fingerprinting Biometrics and Wireless Networks

    India is world's largest democracy. Fundamental right to vote or simply voting in elections forms the basis of Indian democracy. In India all earlier elections a voter used to cast his vote by using ballot paper. This is a long, time-consuming process and very much prone to errors. This situation...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    Performance Enhancement of Reactive on Demand Routing Protocol in Wireless Ad Hoc Network

    A Mobile Adhoc NETwork (MANET) is a class of wireless mobile nodes that dynamically organize themselves in arbitrary network topologies. Due to mobility of nodes, routing plays an important role in communication and routing protocols are divided into two basic classes: proactive and reactive. AODV is an on demand routing...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    A Call Admission Control Scheme for Multimedia Support Over IEEE 802.11 Wireless LANs

    These days there is an increasing interest for VoIP over wireless LANs. QoS support for real-time services like voice in the IEEE 802.11 WLAN is an important issue. Since, IEEE 802.11 uses contention based MAC protocol - the distributed coordination function DCF, it is difficult to support the strict QoS...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    Impact of Routing Protocol on Performance of Wireless Ad Hoc Vehicular Network

    Vehicular Ad Hoc NETwork (VANET) is an emerging new technology integrating ad hoc network, Wireless LAN (WLAN) and cellular technology to achieve intelligent inter-vehicle communications and improve road traffic safety and efficiency. VANETs are distinguished from other kinds of ad hoc networks by their hybrid network architectures, node movement characteristics,...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    Localization in Wireless Sensor Network Using MDS

    In this paper, determining the localization of nodes in a Wireless Sensor Network is a very important task, which involves collaboration between sensor nodes. Localization is a fundamental service since it is relevant to many applications and to the network main functions, such as: routing, communication, cluster creation, network coverage,...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    Effective Analysis of Different Parameters in Ad Hoc Network for Different Protocols

    A wireless Ad-hoc network consists of wireless nodes communicating without the need for a centralized administration, in which all nodes potentially contribute to the routing process. A user can move anytime in an ad hoc scenario and, as a result, such a network needs to have routing protocols which can...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    A Fuzzy Implementation of Biometrics With Five Factor Authentication System for Secured Banking

    Remote authentication is the most commonly used method to determine the identity of a remote client. Secure and efficient authentication scheme has been a very important issue with the development of networking technologies. In a Generic Framework for Authentication, preserving security and privacy in distributed systems provide three factors for...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    Normalized Transfer of Bulk Data By Using UDP in Dedicated Networks

    High speed bulk data transfer is an important part of many data-intensive scientific applications. TCP fails for the transfer of large amounts of data over long distance across high-speed dedicated network links. Due to system hardware is incapable of saturating the bandwidths supported by the network and rise buffer overflow...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    End-to-End Delay Optimization in Wireless Sensor Network (WSN)

    In this paper, the authors are interested in optimizing the delay of event-driven wireless sensor networks, for which events does not occur frequently. In such systems, most of the energy is consumed when the radios are on, waiting for an arrival to occur. Sleep-wake scheduling is an effective mechanism to...

    Provided By Interscience Open Access Journals