Interscience Open Access Journals

Displaying 201-240 of 502 results

  • White Papers // Sep 2012

    Priority Based Traffic Lights Controller Using Wireless Sensor Networks

    Vehicular traffic is continuously increasing around the world, especially in large urban areas. The resulting congestion has become a major concern to transportation specialists and decision makers. The existing methods for traffic management, surveillance and control are not adequately efficient in terms of performance, cost, maintenance, and support. In this...

    Provided By Interscience Open Access Journals

  • White Papers // Sep 2012

    Design and Implementation of Asynchronous FIR Filter

    In this paper, the authors present the architecture of a micro-pipeline asynchronous digital signal processing chain coupled to non-uniformly sampled data in time. Non-uniform sampling has been proven to be a better scheme than the uniform sampling to sample low activity signals. With such signals, it generates fewer samples, which...

    Provided By Interscience Open Access Journals

  • White Papers // Sep 2012

    Software Design and Development of Online Monitoring System in SOC Encounter

    In this paper, the authors present the design and development of an online monitoring system that collects data over time or distance with a built-in instrument or sensors. Currently, an online data collection system (vehicle data logger) from general vehicle is not available in the market. Only the vehicles' manufacturers...

    Provided By Interscience Open Access Journals

  • White Papers // Sep 2012

    Performance Evaluation of Booth and Wallace Multiplier Using FIR Filter

    The design of high-speed and area-efficient multipliers is essential for VLSI implementations of digital signal processing systems. An area and speed efficient multipliers is proposed in the paper. The proposed booth and Wallace multipliers show the tradeoff in the performance evaluation for the FIR filter applications. For implementation of FIR...

    Provided By Interscience Open Access Journals

  • White Papers // Sep 2012

    A Transistor Level Analysis for a 8-Bit Vedic Multiplier

    Power and area efficient multiplier using CMOS logic circuits for applications in various digital signal processors is designed. This multiplier is implemented using Vedic multiplication algorithms mainly the "Urdhva Tiryakbhyam sutra", which is the most generalized one Vedic multiplication algorithm. A multiplier is a very important element in almost all...

    Provided By Interscience Open Access Journals

  • White Papers // Sep 2012

    Distributed Shared Files Management

    Most often file sharing is the common and basic requirement when users work on a particular domain or area of interest. Users can use software that connects in to a peer-to-peer network to access shared files on the computers of other users (i.e. peers) connected to the network. Files of...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2012

    Load Balancing in Computational Grids Using Ant Colony Optimization Algorithm

    Grid computing is the combination of computer resources from multiple administrative domains for a common goal. Load balancing is one of the critical issues that must be considered in managing a grid computing environment. It is complicated due to the distributed and heterogeneous nature of the resources. An ant colony...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2012

    Novel Techniques to Eradicate Energy Inefficiencies That Abbreviate the Lifetime of the Cell Phone Based WSNs

    The cell phone based WSN of compressed micro-sensors for data acquirement and supervise some surroundings distinctiveness, such as noise, trembling, temperature, and strain. These sensors are entrenched devices accomplished of data communication. In numerous of applications, sensor nodes are deployed over a geo-graphically large region. Due to their configuration, data...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2012

    Clustering Based Classification and Analysis of Data

    This paper presents clustering based document classification and analysis of data. The proposed clustering based classification and analysis of data approach is based on unsupervised and supervised document classification. In this paper unsupervised document and supervised document classification are used. In this approach document collection, text preprocessing, feature selection, indexing,...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2012

    Exploiting Data Mining Techniques for Improving the Efficiency of Time Series Data

    The research work in data mining has achieved a high attraction due to the importance of its applications This paper addresses some theoretical and practical aspects on Exploiting Data Mining Techniques for Improving the Efficiency of Time Series Data using SPSS-CLEMENTINE. This paper can be helpful for an organization or...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2012

    Enhanced Security in Cloud With Multi-Level Intrusion Detection System

    Cloud computing is a new type of service which provides large scale computing resource to each customer. Cloud Computing Systems can be easily threatened by various cyber attacks, because most of Cloud computing system needs to contain some Intrusion Detection Systems (IDS) for protecting each Virtual Machine (VM) against threats....

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2012

    A Novel Approach for Information Security With Automatic Variable Key Using Fibonacci Q-Matrix

    Information security is essential nowadays. Large number of cipher generation and decryption algorithms exists and are being evolved due to increasing demand of users and e-commerce services. In this paper, the authors propose a new approach for secure information transmission over communication channel with key variability concept in symmetric key...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2012

    An Ant Colony Optimization for Job Scheduling to Minimize Makespan Time

    This paper deals with the make span minimization for Job Scheduling. Research on optimization techniques of the Job Scheduling Problem (JSP) is one of the most significant and promising areas of an optimization. Instead of the traditional optimization method, this paper presents an investigation into the use of an Ant...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2012

    Network Reconfiguration in Distribution System by Software Simulation for Loss Reduction

    The main aim of the distribution companies is to reduce their operating costs to get ahead of competition. One of the most popular approach is to increase the degree of reliability of distribution system. The management of network defeats (e.g., earth fault and short circuits) offers a lot of feasibilities...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2012

    Secure Framework in Data Processing for Mobile Cloud Computing

    Generally Mobile Cloud storage enables users to remotely store their data and enjoy the on-demand high quality cloud applications without the burden of local hardware and software management. Though the benefits are clear, such a service is also relinquishing users 'Physical possession of their outsourced data, which inevitably poses new...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2012

    Fast and Scalable Pattern Matching for Memory Architecture

    Multi-pattern matching is known to require intensive memory accesses and is often a performance bottleneck. Hence, specialized hardware-accelerated algorithms are being developed for line-speed packet processing. While several pattern matching algorithms have already been developed for such applications, the authors find that most of them suffer from scalability issues. They...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2012

    Multiplier Design and Performance Estimation With Distributed Arithmetic Algorithm

    A new architecture of Multiplier-and-Accumulator (MAC) for high-speed arithmetic. By combining multiplication with accumulation and devising a hybrid type of Carry Save Adder (CSA), the performance was improved. Since the accumulator that has the largest delay in MAC was merged into CSA, the overall performance was elevated. The proposed CSA...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2012

    Implementation of Memory Less Based Low-Complexity CODECS

    In this paper, the authors present a CODEC design for two classes of Crosstalk Avoidance Codes (CACs), Forbidden Pattern Codes (FPCs) and Forbidden Transition Codes (FTCs). Their mapping and coding scheme is based on the Fibonacci numeral system and the mathematical analysis shows that all numbers can be represented by...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2012

    A Novel Decode-Aware Compression Technique for Improved Compression and Decompression

    With compressed bit streams, more configuration information can be stored using the same memory. The access delay is also reduced, because less bits need to be transferred through the memory interface. To measure the efficiency of bit stream compression, Compression Ratio (CR) is widely used as a metric. It is...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2012

    Embedded Programmable Web-Based ECG Monitoring & Detection System Using a Fast Algorithm

    The physicians have to interpret this large amount of ECG data to search for only a few abnormal beats in the ECG. Physicians may overlook some abnormal cycles due to fatigue and human error in interpreting such a large amount of data. Therefore, there is an urgent need for an...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2012

    An Area Efficient 32-Bit Carry-Select Adder for Low Power Applications

    CSLA is used in many computational systems to alleviate the problem of carry propagation delay by independently generating multiple carries and then select a carry to generate the sum. However, the CSLA is not area efficient because it uses multiple pairs of Ripple Carry Adders (RCA) to generate partial sum...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2012

    Edge-Triggered Pulsed Sequential Elements With SoC Applications

    The System-On-Chip (SoC) design is integrating hundreds of millions of transistors on one chip, whereas packaging and cooling only have a limited ability to remove the excess heat. In this paper, various design techniques for a low power clocking system are surveyed. Among them is an effective way to reduce...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2012

    FPGA Implementation of Convolutional Encoder and Hard Decision Viterbi Decoder

    In this paper, the authors concern with designing and implementing a convolutional encoder and Viterbi decoder which are the essential block in digital communication systems using FPGA technology. Convolutional coding is a coding scheme used in communication systems including deep space communications and wireless communications. It provides an alternative approach...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2012

    Asynchronous Model of Flip-Flop's and Latches for Low Power Clocking

    There is a wide selection of flip-flops in the literature. Many contemporary microprocessors selectively use master-slave and pulsed-triggered flip-flops. Transmission gated flip-flop, are made up of two stages, one master and one slave alternatively, pulse-triggered flip-flops reduce the two stages into one stage and are characterized by the soft edge...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Cloud Computing in Distributed System

    Cloud Computing as an Internet-based computing; where resources, software and information are provided to computers on-demand, like a public utility; is emerging as a platform for sharing resources like infrastructure, software and various applications. The majority of cloud computing infrastructure consists of reliable services delivered through data centers and built...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Choosing a Technique for Digital Signatures From the Customers' Perspective

    One way to secure identity over the Internet and other channels is to use digital signatures. Since this area is often used in contact with banks, the authors have during their work co-operated with Nordea IT. In order for customers to use a digital signature whenever they wish to, a...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Approaches for Improving the Performance of Snort Intrusion Detection Systems

    The process of monitoring the events occurring in a computer system or network and analyzing them for sign of intrusions is known as Intrusion Detection Systems (IDS). In this paper the architecture of the snort which is an open source Intrusion detection system is explained. It is a rule based...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Intrusion Detection System Using Genetic Algorithm and Data Mining: An Overview

    Network security is of primary concerned now days for large organizations. Various types of Intrusion Detection Systems (IDS) are available in the market like Host based, Network based or Hybrid depending upon the detection technology used by them. Modern IDS have complex requirements. With data integrity, confidentiality and availability, they...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    A Rule-Based Approach for Effective Resource Provisioning in Hybrid Cloud Environment

    Resource provisioning is important issue in cloud computing and in the environment of heterogeneous clouds. The private cloud with confidentiality data configure according to users need. But the scalability of the private cloud limited. If the resources private clouds are busy in fulfilling other requests then new request cannot be...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Security Analysis of Cloud Computing

    Cloud computing play an important role in IT industry. Cloud computing reshaping the IT industry and in software development process. Cloud computing techniques can offer many facilities like sharing of hardware, availability of software and many more resources as a basic need. Cloud computing effectively reduces the cost, maintenance. As...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Defending Against Modern Threats in Web Applications

    Web applications have become critical part of business. They hold a treasure trove of data behind their front ends. Now-a-days attackers are well aware of the valuable information accessible through web applications, so website security has become a major problem today. The number of vulnerabilities has multiplied in recent years....

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Software Performance Analysis With Parallel Programming Approaches

    The term Software Performance Engineering (SPE) is a systematic and quantitative approach for constructing software systems to meet the performance objectives such as response time, throughput, scalability and resource utilization. Optimization is major concern in achieving performance parameters. Optimization is performed during run-time, or in the design phase. This paper...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Combining Server and Storage Virtualization: A New Dimension for SMB's

    The virtualization wave is quickly reaching its way down into the small-to-medium-sized business. Virtualization provides unmatched flexibility, performance, and utilization by allowing the user to move server workloads from one virtual workspace to the next, maximizing server resources on the fly based on their business needs. Server virtualization eliminates the...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    A Perspective Approach on Citizen Card System - Applicability and Opportunity

    Citizen card system in which every citizen of a country will have a unique 16 digit number citizen card system which would not just help the government track down individuals, but would make life far easier for citizens as they would not have to submit multiple documents each time they...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Interactive Database System

    With the revolution in the technology and lifestyle of human race, the need of easy life and faster result in the need of an hour. Due to complex life and fast growing technology it is always desired to obtain results for any query, problem or requirement with the speed of...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Various Network Used Radio Frequency Identification Techniques and its Frequency Ranges

    Now-a-days, there are various technologies used in day-to-day life; such as human computer interaction, communication engineering, various types of architectures of computer system for easy convenience of living life style of human being. However, there are various network utilized for the transmission of signal containing various data like audio, video,...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Design and Implementation of Single Stage PFC Microcontroller Based Drive for Permanent Magnet Brushless DC Motor

    In this paper, the authors new approach is presented aim at improving the power factor of three phase bridge inverter that equip with Permanent Magnet BrushLess DC Motor(PMBLDCM) drive through microcontroller. Power factor correction converter is used for feeding a three phase bridge inverter based PMBLDC motor drive. The front-end...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Design and Modification of Circular Monpole UWB Antenna for WPAN Application

    The basic circular monopole antenna exhibits a 10 dB return loss bandwidth over the entire frequency band, the paper proposed a modified version of simple circular monopole antenna for WPAN application. The antenna offers excellent performance in the range of 2-12 GHz.. The antenna is designed on FR4 substrate and...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    High Speed ACSU Architecture for Viterbi Decoder Using T-Algorithm

    A typical functional diagram of the corresponding Viterbi Decoder (VD). First, Branch Metrics (BMs) are calculated from the received symbols. In this paper, the authors propose an efficient architecture based on pre-computation for Viterbi decoders incorporating T-algorithm. Through optimization at both algorithm level and architecture level, the new architecture greatly...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    The Impact of Calls to the Processor on a Server PABX

    This paper is to define the relationship between the number of calls made in an Asterisk server and use of the processor in this server as the processor is one of the major hardware resources. Subsequently, the authors derived the formulation for the generalization of this relationship or a mathematical...

    Provided By Interscience Open Access Journals

  • White Papers // Nov 2010

    Studying Security Issues in HPC (Super Computer) Environment

    HPC has evolved from being a buzzword to becoming one of the most exciting areas in the field of Information Technology & Computer Science. Organizations are increasingly looking to HPC to improve operational efficiency, reduce expenditure over time and improve the computational power. Using Super Computers hosted on a particular...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2010

    Development of Optical Character Recognition Software Package for Mobile Phones

    Optical Character Recognition (OCR) is a technique through which any textual information contained in images are extracted and converted into editable text format. The various OCR software packages which are available in desktop computer with scanner suffer from one primary constraint-MOBILITY. The authors have developed an OCR application for mobile...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2010

    Probabilistic Neural Network Based Approach for Handwritten Character Recognition

    In this paper, recognition system for totally unconstrained handwritten characters for south Indian language of Kannada is proposed. The proposed feature extraction technique is based on Fourier Transform and well known Principal Component Analysis (PCA). The system trains the appropriate frequency band images followed by PCA feature extraction scheme. For...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2010

    Time Domain Signal Detection for MIMO OFDM

    The MIMO techniques with OFDM is regarded as a promising solution for increasing data rates, for wireless access qualities of future wireless local area networks, fourth generation wireless communication systems, and for high capacity, as well as better performance. Hence as part of continued research, in this paper an attempt...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2011

    Performance Analysis of a Cellular System Using C-OFDM Techniques

    The basic idea of COFDM is to split the modulation samples of incoming data stream onto a large number of carriers instead of modulating a unique carrier. Therefore, COFDM is an effective technique for combating multi-path fading and for high-bit-rate transmission over wireless channel. In a single carrier system a...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2010

    Capacity Enhancement in WLAN Using MIMO

    Increasing demand for high-performance 4G broadband wireless is enabled by the use of multiple antennas at both transmitter and receiver ends. Multiple antenna technologies enable high capacities suited for Internet and multimedia services, and also dramatically increase range and reliability. The combination of Multiple-Input Multiple-Output (MIMO) signal processing with Orthogonal...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2010

    Distributed Computing for Ubiquitous Systems

    Distributed computing provides a strong foundation on top of which a powerful ubiquitous system can be realized. However, distributed computing is not solely sufficient for the ubiquitous systems - a completely new era of computer world which is not based on the conventional mainframes or PCs but on the virtually...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2010

    Analysis and Design of Circular Shape Microstrip Antenna for Wireless Communication System

    The circular microstrip antenna element is formed by radiating disk closely spaced above a ground plane. It is modeled as a cylindrical cavity with magnetic walls which can be resonant in the transverse magnetic modes. This circular shape microstrip antenna is analysed using cavity model and fields within the cylindrical...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2010

    Mining Wireless Sensor Network Data: An Adaptive Approach Based on Artificial Neural Networks Algorithm

    This paper proposes a layered modular architecture to adaptively perform data mining tasks in large sensor networks. The architecture consists in a lower layer which performs data aggregation in a modular fashion and in an upper layer which employs an adaptive local learning technique to extract a prediction model from...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2010

    Network Management System for (FUTON-Like) Radio-Over-Fiber Infrastructure

    EU-Project FUTON Radio-over-Fiber (RoF) infrastructure proposes high transmission rates at small antenna costs, implying competitive CAPEX for next generation networks. But to be cost-efficient, it needs to employ new network architectures and intelligent technology solutions for decreasing network operational costs. The RoF Network Manager manages the network equipment on the...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2010

    An Improvement in Stability of MANET Using Flow Admission Control Algorithm

    An ad hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any centralized administration or standard support services. However, flows transported across mobile ad hoc wireless networks suffer from route breakups caused by nodal mobility. In a network that aims to support...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2010

    Soft Clustering: An Overview

    Document clustering has been extensively investigated as a methodology for improving document retrieval process. In Traditional clustering algorithm each documents belongs to exactly one cluster & hence cannot detect the multiple themes of a document where as soft clustering algorithm each document can belong to multiple clusters. This paper gives...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2010

    Practical Quantum Cryptography for Secure Free-Space Communications

    Quantum Cryptography is an emerging technology in which two parties may simultaneously generate shared, secret cryptographic key material using the transmission of quantum states of light. The security of these transmissions is based on the inviolability of the laws of quantum mechanics and information - theoretically secure post-processing methods. An...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2010

    Design and Implementation of a (2,2) and a (2,3) Visual Cryptographic Scheme

    In this paper two methods for (2, 2) and (2, 3) Visual Cryptographic Scheme(VCS) is proposed. The first scheme considers 4 pixels of input image at a time and generates 4 output pixels in each share. As 4 output pixels are generated from 4 input pixels dimension and aspect ratio...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2010

    A Simple Scheme for Visual Cryptography

    Here an algorithm is proposed to implement (2, 2) secret sharing problem which reduces the size (resolution) of the generated shares. Instead of considering one pixel at a time to generate the share, two consecutive pixels of the original image are considered row wise. Finally a pixel share having six...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2010

    Elliptic Curve Cryptosystem for Email Encryption

    The idea of information security lead to the evolution of cryptography. In other words, cryptography is the science of keeping information secure. It involves encryption and decryption of messages. The core of cryptography lies in the keys involved in encryption and decryption and maintaining the secrecy of the keys. Another...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2010

    Cellular Automata Based Data Security Scheme in Computer Network Using Single Electron Device

    The internet conceptualized new ways of social interaction, activities globally. Internet serves billions of users worldwide. By the end of 2011it is expected that 22% of the world's population will regularly surf internet. Beside this, internet incorporated high risks for e-users by enabling intruders to gain access via security holes....

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2010

    Call Routing in Contact Center

    Now a day companies uses the contact center to provide service to customer. One of the important challenges of today contact center solution is to align the customer to the most appropriate agent within the time constrain. Call routing is used to for the alignment of customer with agent. Call...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2010

    Enabling Mainframe Assets to Services for SOA

    Service-Oriented Architecture (SOA) is a mechanism for achieving interoperability between heterogeneous systems. SOA enables existing legacy systems to expose their functionality as services, without making significant changes to the legacy systems. Migration towards a Service-Oriented Approach (SOA) not only standardizes interaction, but also allows for more flexibility in the existing...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2010

    Next Gen Smart and Connected Systems

    With the kind of technological advancements such as cloud computing, virtualization, computing grids, etc, that the people are seeing today, soon the hardware and software producers will be under severe pressure to deliver cheaper and cost effective solutions and to combine them with innovate commercial models such as "Pay as...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2010

    Comparison of 3GPP LTE and 3GPP2 UMB

    In the last years, technology evolution in mobile communications is mainly motivated by three relevant agents: the market globalization and liberalization and the increasing competence among vendors and operators coming from this new framework, the popularization of IEEE 802 wireless technologies within the mobile communications sector and, finally, the exponential...

    Provided By Interscience Open Access Journals

  • White Papers // Nov 2010

    Next Generation Middleware Technology for Mobile Computing

    Current advances in portable devices, wireless technologies, and distributed systems have created a mobile computing environment that is characterized by a large scale of dynamism. Diversities in network connectivity, platform capability, and resource availability can significantly affect the application performance. Traditional middleware systems are not prepared to offer proper support...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2010

    Wireless Sensor Networks for Indoor Environment Monitoring Using Lab View

    Wireless Sensor Networks (WSNs) have gained worldwide attention in recent years, particularly with the rapid progress in Micro-Electro-Mechanical Systems (MEMS) technology which has facilitated the development of smart sensors. These sensors are small, with limited processing and computing resources, and they are inexpensive compared to traditional sensors. These sensor nodes...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2010

    Minimizing Link Utilization in Selfish Overlay Routing

    The rapid growth and increasing requirements for service quality, reliability had made everyone to choose the traffic engineering essential for the large public networks. The multi Protocol label switching is a protocol used when there is interaction between the traffic engineering and the overlay networks. This Multi-Protocol Labeled Switching (MPLS)...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Goal Programming Approach for Selection of COTS Components in Designing a Fault Tolerant Modular Software System under Consensus Recovery Block Scheme

    The application of computer systems has now crossed many different fields. Systems are becoming more software intensive. The requirements of the customer for a more reliable software led to the fact that software reliability is now an important research area. One method to improve software reliability is by the application...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    SMS Text Compression Through IDBE (Intelligent Dictionary Based Encoding) for Effective Mobile Storage Utilization

    Effective storage utilization is the key concept for better working of any operating system. Even operating systems used for mobile phones are not an exception for this fact. This paper proposes a technique for maximizing the utilization of the storage space present in mobile phones. Thus, it is important to...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Secure Efficient On-Demand Insider Attacks Multicast Routing Protocol in Wireless Networks

    Wireless multicast routing send and receives the data source to destination. High error rates, unfixed and changeable self of the signal power and broadcast change with time and environment regularly result in not effective links. These services more weak to internal attacks coming from compromised nodes that behave randomly to...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Spectral Minutiae Fingerprint Recognition System

    Biometrics refers to the automatic recognition of individuals based on their physiological and/or behavioral characteristics, such as faces, finger prints, iris, and gait. In this paper, the authors focus on the application of finger print recognition system. The spectral minutiae fingerprint recognition is a method to represent a minutiae set...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Facial Expression Recognition System Using Facial Characteristic Points and ID3

    Facial expression is one of the most powerful, natural, and abrupt means for human beings which have the knack to communicate emotion and regulate inter-personal behaviour. In this paper, the authors present a novel approach for facial expression detection using decision tree. Facial expression information is mostly concentrate on facial...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Implementation of MHMIP and Comparing the Performance With MIP and DHMIP in Mobile Networks

    Managing the mobility efficiently in wireless networks causes critical issue, in order to support mobile users. To support global mobility in IP networks the Mobile Internet Protocol (MIP) has been proposed. The Hierarchical MIP (HMIP) and Dynamic HMIP (DHMIP) strategies are also proposed for providing high signaling delay. The authors'...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    CMA Channel Equalization Through an Adaptive MMSE Equalizer Based RLS Algorithm

    The adaptive algorithm has been widely used in the digital signal processing like channel estimation, channel equalization, echo cancellation, and so on. One of the most important adaptive algorithms is the RLS algorithm. The authors present in this paper n multiple objective optimization approach to fast blind channel equalization. By...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    An Efficient Authentication Protocol for Security in Mobile Ad Hoc Networks

    Mobile Ad hoc NETworks (MANETs) is a collection of mobile nodes that communicate by forming a network dynamically that lacks fixed infrastructure and centralized control. Secure routing is of at most importance in such networks because of dynamically changing topologies, absence of centralized monitoring points and lack of clear lines...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Simulation of DSDV Protocol

    An ad-hoc network is the cooperative engagement of a collection of Mobile Hosts without the required intervention of any centralized Access Point. This Application is the innovative design for the operation of such ad-hoc networks. The basic idea of the design is to operate each Mobile Host as a specialized...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Preemptive Routing & Intrusion Detection for MANETs

    An ad-hoc network will often change rapidly in topology, this courses for routes in the network to often disappear and new to arise. The Ad-hoc On-Demand Distance Vector Routing Protocol(AODV), is based on the principle of discover routes as needed. In this paper, the authors will extend the definition of...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Embedded Smart Car Security System on Face Detection

    In this proposed embedded car security system, FDS (Face Detection System) is used to detect the face of the driver and compare it with the predefined face. For example, in the night when the car's owner is sleeping and someone theft the car then FDS obtains images by one tiny...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2011

    GPS Based Bluetooth Broadcasting - Long Range Solution

    In this paper, GPS based Bluetooth broadcasting for long range is proposed. System model for Long range broadcasting of messages with multiple piconets and dynamically created threshold devices, based on GPS information is presented. The authors' simulation results have shown that, message can be received by those devices which are...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2011

    Min Max Normalization Based Data Perturbation Method for Privacy Protection

    Data mining system contain large amount of private and sensitive data such as healthcare, financial and criminal records. These private and sensitive data can not be share to every one, so privacy protection of data is required in data mining system for avoiding privacy leakage of data. Data perturbation is...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2011

    Multi-Gigabit Pattern for Data in Network Security

    In the current scenario network security is emerging the world. Matching large sets of patterns against an incoming stream of data is a fundamental task in several fields such as network security or computational biology. High-speed network Intrusion Detection Systems (IDS) rely on efficient pattern matching techniques to analyze the...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2011

    VANET: Performance Comparison of BNGF Method in Different Vehicular Traffic Scenarios

    A Vehicular Ad hoc NETwork (VANET) is a wireless ad hoc network that is formed between vehicles on an on demand basis. A lot of research work around the world is being conducted to design the routing protocols for VANETs. In this paper, the authors examine the significance Greedy Forwarding...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Designing of an Automated Power Meter Reading With Zigbee Communication

    This paper presents the design and implementation of Automatic Power Meter (APM), The APM is implemented using an ARM and Zigbee Based power meter Communication Module. The design presents a new methodology for avoiding the high construction and maintenance costs in the existing meter reading technology. Using an APM with...

    Provided By Interscience Open Access Journals