Interscience Open Access Journals

Displaying 201-240 of 428 results

  • White Papers // May 2012

    A Fuzzy Implementation of Biometrics With Five Factor Authentication System for Secured Banking

    Remote authentication is the most commonly used method to determine the identity of a remote client. Secure and efficient authentication scheme has been a very important issue with the development of networking technologies. In a Generic Framework for Authentication, preserving security and privacy in distributed systems provide three factors for...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    Normalized Transfer of Bulk Data By Using UDP in Dedicated Networks

    High speed bulk data transfer is an important part of many data-intensive scientific applications. TCP fails for the transfer of large amounts of data over long distance across high-speed dedicated network links. Due to system hardware is incapable of saturating the bandwidths supported by the network and rise buffer overflow...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    End-to-End Delay Optimization in Wireless Sensor Network (WSN)

    In this paper, the authors are interested in optimizing the delay of event-driven wireless sensor networks, for which events does not occur frequently. In such systems, most of the energy is consumed when the radios are on, waiting for an arrival to occur. Sleep-wake scheduling is an effective mechanism to...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    ICMP, SNMP: Collaborative Approach to Network Discovery and Monitoring

    The algorithm and realization technique of network topology discovery is a very important technical indicator for a network management system's quality. Based on the knowledge of the network topology discovery theory, the research on ICMP and SNMP programming for Windows, this paper proposes a method of developing the common network...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    The Future of IP SAN Using SCVM

    The SCVM, which stands for Storage Concentrator Virtual Machine, creates IP SAN storage as virtual machine, providing the user with the ability to consolidate their virtual data center. The SCVM can fully manage and has features for the storage over local as well as networked VMs. This can be attained...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    Impact of Routing Protocol on Performance of Wireless Ad Hoc Vehicular Network

    Vehicular Ad Hoc NETwork (VANET) is an emerging new technology integrating ad hoc network, Wireless LAN (WLAN) and cellular technology to achieve intelligent inter-vehicle communications and improve road traffic safety and efficiency. VANETs are distinguished from other kinds of ad hoc networks by their hybrid network architectures, node movement characteristics,...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    Localization in Wireless Sensor Network Using MDS

    In this paper, determining the localization of nodes in a Wireless Sensor Network is a very important task, which involves collaboration between sensor nodes. Localization is a fundamental service since it is relevant to many applications and to the network main functions, such as: routing, communication, cluster creation, network coverage,...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    Effective Analysis of Different Parameters in Ad Hoc Network for Different Protocols

    A wireless Ad-hoc network consists of wireless nodes communicating without the need for a centralized administration, in which all nodes potentially contribute to the routing process. A user can move anytime in an ad hoc scenario and, as a result, such a network needs to have routing protocols which can...

    Provided By Interscience Open Access Journals

  • White Papers // Mar 2012

    An Improved Face Recognition Using Neighborhood Defined Modular Phase Congruency Based Kernel PCA

    A face recognition algorithm based on NMPKPCA algorithm presented in this paper. The proposed algorithm when compared with conventional Principal Component Analysis (PCA) algorithms has an improved recognition Rate for face images with large variations in illumination, facial expressions. In this technique, first phase congruency features are extracted from the...

    Provided By Interscience Open Access Journals

  • White Papers // Mar 2012

    Record Matching for Web Databases by Domain-Specific Query Probing

    Record matching refers to the task of finding entries that refer to the same entity in two or more files, is a vital process in data integration. Most of the record matching methods are supervised, which requires the user to provide training data. These methods are not applicable for web...

    Provided By Interscience Open Access Journals

  • White Papers // Mar 2012

    Dynamic Resource Management in Large Cloud Environments Using Distributed Gossip Protocol

    Resource management poses particular challenges in large-scale systems, such as server clusters that simultaneously process requests from a large number of clients. The authors mainly focus on the dynamic resource management in large scale cloud environment. Their core contribution centers around outlining a distributed middleware architecture and presenting one of...

    Provided By Interscience Open Access Journals

  • White Papers // Mar 2012

    Secure Web System Development

    The recent development in the field of Web system technology has transformed the software industry radically by integrating a wide range of web users, vendors, and enterprise applications worldwide. In Web-based system, a security requirement is a critical issue. This difficulty is due to the complexity level of such systems...

    Provided By Interscience Open Access Journals

  • White Papers // Mar 2012

    An Approach for Customer Behavior Analysis Using Web Mining

    Customer satisfaction is the key secret of success for all industries regardless of whether it is web enabled or not. This paper focuses the role of web mining in achieving a viable edge in business. Web mining is becoming the tool for success for those who adopt electronic means of...

    Provided By Interscience Open Access Journals

  • White Papers // Mar 2012

    Cloud Computing: A Survey

    Cloud computing provides huge computing services to the business for improving the organizational growth. Basic requirement needed for this technology is Internet but provides higher capability when compared to the Internet. Cloud computing is a combination of computation, software, data access and also provides storage services. In Cloud, storage of...

    Provided By Interscience Open Access Journals

  • White Papers // Mar 2012

    A New Generation Peer-to-Peer Advanced Botnet

    A botnet is a network of compromised computers that are infected with code that allows an unauthorized user to control them via the Internet. Botnets are one of the most serious threats to today's Internet. Most current botnets have centralized Command and Control (C&C) architecture. However, Peer-To-Peer (P2P) structured botnets...

    Provided By Interscience Open Access Journals

  • White Papers // Mar 2012

    An Integrated Approach for Measuring Software Quality and Code Readability

    In this paper, the authors explore the concept of code readability and investigate its relation to software quality. This is a new approach to measuring the complexity of software systems. Software industry uses software metrics to measure the complexity of software systems for software cost estimation, software development control, software...

    Provided By Interscience Open Access Journals

  • White Papers // Mar 2012

    An Insight into the Importance of Requirements Engineering

    When developing a software, one of the most important aspects for success of any software project is to get the requirements right. The success of any software project depends on the quality of the requirements. As the projects change over the time, the authors try to study the requirement process...

    Provided By Interscience Open Access Journals

  • White Papers // Mar 2012

    Web Search Using Improved Concept Based Query Refinement

    The information extracted from Web pages can be used for effective query expansion. The aspect needed to improve accuracy of web search engines is the inclusion of metadata, not only to analyze Web content, but also to interpret. With the Web of today being unstructured and semantically heterogeneous, keyword-based queries...

    Provided By Interscience Open Access Journals

  • White Papers // Mar 2012

    A QoS Aware Vertical Handover in Mobile Network

    The convergence of heterogeneous wireless access technologies characterizes the 4G wireless networks. In such converged systems, the seamless and efficient handoff between different access technologies (vertical handoff) is essential and remains a challenging problem. The heterogeneous co-existence of access technologies with largely different characteristics creates a decision problem of determining...

    Provided By Interscience Open Access Journals

  • White Papers // Mar 2012

    Live Streaming Using Peer Division Multiplexing

    A Number of commercial Peer-To-Peer (P2P) systems for live streaming have been introduced in recent years. The behavior of the popular systems has been extensively studied in several measurement papers. However, these studies have to rely on a "Black-box" approach, where packet traces are collected from a single or a...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2012

    Credit Card Forgery Identification System With Location Based Tracking Using Mobiles With GPS

    In Mobile networks the user's location, passwords might be used as authentication factor to provide security services for remote client authentication. In addition there are many typical authentication factors. In Location based Remote client Authentication Protocol for mobile environment (LRAP), combines several authentication factors to securely authenticate a mobile user....

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2012

    Carrier Frequency Offset Estimation Algorithm in the Presence of I/Q Imbalance in OFDM Systems

    In this paper, the authors analyzed the feasibility of using a virtual carrier based carrier frequency offset estimation algorithm in the presence of I/Q imbalance in OFDM systems. Based on the analysis of the signal model with both receiver CFO and I/Q imbalance impairment they conclude that it is feasible...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2012

    Embedded Automobile Engine Locking System, Using GSM Technology

    This paper deals with the design & development of an embedded system, which is being used to prevent/control the theft of a vehicle. The developed instrument is an embedded system based on GSM technology. The instrument is installed in the engine of the vehicle. An interfacing GSM modem is also...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2012

    The Application of Case-Based Reasoning to Estimation of Software Development Effort

    Accurate project effort estimation is an important goal for the software engineering community. Till date most work has focused upon building algorithmic models of effort estimation for example COCOMO. The authors describe an alternative approach to estimation based upon the use of analogy. The objective is to estimate the development...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2012

    Optimization Through Bayesian Classification on the k-Anonymized Data

    Privacy preserving in data mining & publishing, plays a major role in today networked world. It is important to preserve the privacy of the vital information corresponding to a data set. This process can be achieved by k-anonymization solution for classification. Along with the privacy preserving using anonymization, yielding the...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2012

    A Mark Based Indexing Method for Well Organized Data Retrieval of Comparative Temporal Patterns

    So many numbers of algorithms have been proposed for the discovery of data from the large database. However, since the number of generated patterns can be large, selecting which patterns to analyze can be nontrivial. There is thus a need for algorithms and tools that can assist in the selection...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2012

    Hybrid Algorithm for Improving Efficiency of Keywords Based Search Engine

    Web mining is the application of data mining techniques to discover interesting patterns from the web. Web usage mining is the process of extracting useful information from server logs i.e users history. While discovering interesting patterns in multi agents the efficiency is decreased. In the authors' paper presents hybrid algorithm...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2012

    Tree Based Aggregation and Routing in WSN: A Multi-Agent System Approach

    In WSN one of the issues is to route the data from the sensor nodes to sink node. The tree-based approach provides an efficient solution for establishing the path and in network aggregation. Tree is nonlinear structures, which have hierarchical levels in terms of parent-child combination. In this paper, the...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2012

    Mathematical Model for the Detection of Selfish Nodes in MANETs

    A mobile ad hoc network, is an independent network of mobile devices connected by wireless links. Each device in a MANET can move freely in any direction, and will therefore change its links to other devices easily. Each must forward traffic of others, and therefore be called a router. The...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2012

    Basic Concept of Embedded 'C': Review

    The use of C language to program micro controllers is becoming too common. And most of the time its not easy to build an application in assembly which instead one can make easily in C. So, its important that one know C language for micro controller which is commonly known...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2012

    Fast and Texture-Structure Preservable Inpainting and Its Application for Creating Virtualized-Reality Indoor Models

    This paper discusses the new inpainting algorithm for handling the images in the virtualized-reality indoor models. The untextured regions in the indoor model are textured by this proposed inpainting method which guarantees the texture and the structure propagation. The authors call this as a hybrid method because it combines the...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2012

    Basic Concept of Embedded "C": Review

    The use of C language to program micro controllers is becoming too common. And most of the time its not easy to build an application in assembly which instead the user can make easily in C. So its important that they know C language for micro controller which is commonly...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2012

    Basic Model of Multicast Authentication Based On Batch Signature-MABS

    Traditional multicast authentication schemes manage the different involvement of the receivers by letting the sender: choose the block size, divide a multicast stream into blocks, connect each block with a signature, and spread the effect of the Signature across all the packets in the block. The relationship between packets tends...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Pattern Recognition Algorithms for Cluster Identification Problem

    There are large datasets in high dimensional database to solve the cluster identification problem and for identifying dense clusters in a noisy data. In this paper by using densely intra connected sub graphs the authors' analysis identified the clusters. They have used pattern recognition algorithms for representing the graphs and...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Tunable Microstrip Filters for Modern Wireless Communications

    Microwave filters are essential components for a large variety of modern communication systems. Filters engage in many recreating roles in RF and microwave applications. Forthcoming technologies like wireless communications are racing with RF and microwave filters in performance, physical and cost parameters. Developing technologies in materials and fabrications are defining...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    A New Hammerstein Model for Non-Linear System Identification

    In this paper, a newer type of black box nonlinear model in Hammerstein structure is proposed. The model has wavelet network coupled with Orthonormal basis functions which is capable of modeling a class of non-linear systems with acceptable accuracy. Wavelet basis functions have the property of localization in both the...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Enhancing Spectrum Efficiency of Cognitive Radio Waveforms Using SD-SMSE Framework

    Spectrum overcrowding continues to present is a fundamental challenge for both military and commercial communications. Recent studies suggest that spectrum congestion is primarily due to inefficient usage rather than spectrum availability. Dynamic Spectrum Access (DSA) and Cognitive Radio (CR) are two techniques being considered to improve spectrum efficiency and utilization....

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Probabilistic Model for Intrusion Detection in Wireless Sensor Network

    Intrusion detection in Wireless Sensor Network (WSN) is important through the view of security in WSN. Sensor Deployment Strategy gives an extent to security in WSNs. This paper compares the probability of intrusion detection in both the Poisson as well as Gaussian deployment strategies. It focuses on maximizing intrusion detection...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    An Efficient Load Balancing Clustering Scheme for Data Centric Wireless Sensor Networks

    Clustering is an efficient approach to capitalize the energy of energy constraint sensor nodes in wireless sensor networks. Clustering schemes do not guarantee formation of clusters with equal number of nodes. So data frames transmitted by the nodes vary. TDMA schedule of nodes of smaller cluster is smaller than others...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Multi User Diversity Evaluation in MIMO HSDPA Downlink Channels

    A multiple transmit antenna, single receive antenna (per receiver) downlink channel with limited channel feedback is considered. Given a constraint on the total system-wide channel feedback, the following question is considered: is it preferable to get low-rate feedback from a large number of receivers or to receive high-rate/high-quality feedback from...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2012

    Mathematical Model for the Detection of Selfish Nodes in MANETs

    A mobile ad hoc network, is an independent network of mobile devices connected by wireless links. Each device in a MANET can move freely in any direction, and will therefore change its links to other devices easily. Each must forward traffic of others, and therefore be called a router. The...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2012

    The Application of Case-Based Reasoning to Estimation of Software Development Effort

    Accurate project effort estimation is an important goal for the software engineering community. Till date most work has focused upon building algorithmic models of effort estimation for example COCOMO. The authors describe an alternative approach to estimation based upon the use of analogy. The objective is to estimate the development...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2012

    Basic Concept of Embedded 'C': Review

    The use of C language to program micro controllers is becoming too common. And most of the time its not easy to build an application in assembly which instead one can make easily in C. So, its important that one know C language for micro controller which is commonly known...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2012

    Fast and Texture-Structure Preservable Inpainting and Its Application for Creating Virtualized-Reality Indoor Models

    This paper discusses the new inpainting algorithm for handling the images in the virtualized-reality indoor models. The untextured regions in the indoor model are textured by this proposed inpainting method which guarantees the texture and the structure propagation. The authors call this as a hybrid method because it combines the...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Defending Against Modern Threats in Web Applications

    Web applications have become critical part of business. They hold a treasure trove of data behind their front ends. Now-a-days attackers are well aware of the valuable information accessible through web applications, so website security has become a major problem today. The number of vulnerabilities has multiplied in recent years....

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Software Performance Analysis With Parallel Programming Approaches

    The term Software Performance Engineering (SPE) is a systematic and quantitative approach for constructing software systems to meet the performance objectives such as response time, throughput, scalability and resource utilization. Optimization is major concern in achieving performance parameters. Optimization is performed during run-time, or in the design phase. This paper...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Cloud Computing in Distributed System

    Cloud Computing as an Internet-based computing; where resources, software and information are provided to computers on-demand, like a public utility; is emerging as a platform for sharing resources like infrastructure, software and various applications. The majority of cloud computing infrastructure consists of reliable services delivered through data centers and built...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2013

    Feature Selection and Classification of Intrusion Detection System Using Rough Set

    With the expansion of computer network there is a challenge to compete with the intruders who can easily break into the system. So it becomes a necessity to device systems or algorithms that can not only detect intrusion but can also improve the detection rate. In this paper the authors...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2013

    A Study of Advanced Encryption Tools for Data Security

    With the rapid growth and uses of internet, the task of protection of data and information is become a key challenge to the user as well as security experts. In the era of e-commerce, online shopping, online banking information security is a vital issue. Information may be hacked, stolen and...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2013

    Development of Scada Like Application Using Arduino with .NET Interface

    Now-a-days SCADA systems are used for home automation, greenhouse automation, E-agriculture etc. Basically these SCADA applications include level monitoring, light & climate control, security & surveillance, control and manage spatially separated utility sites and control of shutters & doors and so on. With the arrival of new hardware and software...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2013

    New Dynamic Query Optimization Technique in Relational Database Management Systems

    Query optimizer is an important component in the architecture of relational data base management system. This component is responsible for translating user submitted query into an efficient query evolution program which can be executed against the database. The present query evolution existing algorithm tries to find the best possible plan...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2013

    Extracting Accurate Data from Multiple Conflicting Information on Web Sources

    For the World-Wide Web has become the most important information source for most of the users. As different websites often provide conflicting information there is no guarantee for the correctness of the data. Among multiple conflict results, can the users automatically identify which one is likely the true fact?, In...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2013

    A Tool for Effective Detection of Fraud in Credit Card System

    Due to the rise and rapid growth of E-commerce, use of credit cards for online purchases has dramatically increased and it caused an explosion in the credit card fraud. Fraud is one of the major ethical issues in the credit card industry. As credit card becomes the most popular mode...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2013

    Efficient Load Balancing in Peer-to-Peer Systems Using Virtual Servers

    Load balancing is a critical issue for the efficient operation of peer-to-peer networks. With the notion of virtual servers, peers participating in a heterogeneous, structured Peer-To-Peer (P2P) network may host different numbers of virtual servers, and by migrating virtual servers, peers can balance their loads proportional to their capacities. Peers...

    Provided By Interscience Open Access Journals

  • White Papers // Sep 2013

    Light Weight Security for OPC UA Based Architecture

    The Open Platform Communication (OPC) is becoming the universal standard for platform independent data sharing and data access. The OPC standard defines communication standards to be followed for data integration in the automation industry. The OPC communication facilitates a language independent way of communication and by using this; all devices...

    Provided By Interscience Open Access Journals

  • White Papers // Sep 2013

    Smc Protocol for Distributed K- Anonymity

    Secure multiparty protocols have been proposed to enable non colluding parties to cooperate without a trusted server. Even though such protocols put off information expos

    Provided By Interscience Open Access Journals

  • White Papers // Sep 2013

    A Bio Genetic Process to Replicas-Free Repository

    Several systems that rely on consistent data to offer high-quality services, such as digital libraries and ecommerce brokers, may be affected by the existence of duplicates, quasi replicas, or near-duplicate entries in their repositories. Because of that, there have been significant investments from private and government organizations for developing methods...

    Provided By Interscience Open Access Journals

  • White Papers // Mar 2011

    Performance of Joint Admission and Power Control Algorithms for Cognitive Radio CDMA Networks in Shadowed Environment

    Cognitive radio network maximizes number of Secondary Users (SUs) without affecting the service of Primary Users (PUs). Admittance of SUs is not only affected by the path loss but also lognormal shadowing. In this paper, the authors have carried out the simulation study of Joint Admission and Power Control (JAPC)...

    Provided By Interscience Open Access Journals

  • White Papers // Mar 2011

    Computing Symmetric Block Cipher Using Linear Algebraic Equation

    In this paper, a pair of symmetric block ciphers has been developed for encryption and decryption of text file. The characters in the file are represented by the ASCII codes. A substitution table and a reverse substitution table are formed by using a key. The process of encryption and decryption...

    Provided By Interscience Open Access Journals

  • White Papers // Mar 2011

    Encryption and Decryption Algorithm Using Two Dimensional Cellular Automata Rules in Cryptography

    In this paper, the authors present a new encryption and decryption algorithm for block cipher based on the linear (Periodic Boundary-PB) and nonlinear cellular automata rules. First, they apply non linear CA rules (complements) to both plain text and key. Then PB CA rule is applied to the above results...

    Provided By Interscience Open Access Journals

  • White Papers // May 2011

    Impact of Mobility Models on Mobile Sensor Networks

    Wireless Sensor Networks (WSN) is an emerging technology, finds variety of applications in military, movement tracking, industries and medical fields. WSN are self configurable, self healing networks. In Mobile Sensor Network, (MSN) nodes are free to move with wireless links without infrastructure. In this paper, the authors have studied the...

    Provided By Interscience Open Access Journals

  • White Papers // Mar 2011

    Reducing Throughput-Delay Analysis of Conflict - Free Scheduling in Multihop Adhoc Networks

    An ad hoc networks is a self organized and distributed entity, consisting of n Mobile Stations (MSs) without the coordination of any centralized access point. Initialization is one of the fundamental tasks to set up an ad hoc network, which involves assigning of each of the n MSs a distinct...

    Provided By Interscience Open Access Journals

  • White Papers // Mar 2011

    An Analysis on End-to-End Inference Methods Based on Packet Probing in Network

    Current Internet is a massive, distributed network which continues to grow in size as globalization takes major role in everyone's life like e-commerce, social networking and related activities grow. The heterogeneous and largely unregulated structure of the Internet renders tasks such as optimized service provision, rate limiting certain classes of...

    Provided By Interscience Open Access Journals

  • White Papers // Mar 2011

    Recovery of Loss of Packet in Network Using Constant Packet Reordering

    When the packet is reordered the most standard implementation of the Transmission Control Protocol (TCP) gives poor performance. This paper proposes a new version of the TCP which gives the high throughput when the packet reordering occurs and in another case if the packet reordering is not occurs then in...

    Provided By Interscience Open Access Journals

  • White Papers // Mar 2011

    Equivalence of DES and AES Algorithm With Cellular Automata

    In this paper, the authors present the equivalence of the operations involved in DES and AES algorithm with operations of cellular automata. They identify all the permutation and substitution operations involved in DES and AES algorithm and compare these operations with the cellular automata rules. Then they find that permutation...

    Provided By Interscience Open Access Journals

  • White Papers // Mar 2011

    A Temporal Logic Based Approach to Multi-Agent Intrusion Detection and Prevention

    Collaborative systems research in the last decade have led to the development in several areas ranging from social computing, e-learning systems to management of complex computer networks. Intrusion Detection Systems (IDS) available today have a number of problems that limit their configurability, scalability or efficiency. An important shortcoming is that...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    A Lime Light on the Emerging Trends of Web Mining

    The World Wide Web is a huge, information center for a variety of applications. Web contains a dynamic and rich collection of hyperlink information. It allows Web page access, usage of information and provides numerous sources for data mining. The goal of Web mining is to discover the pattern of...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    A Novel Traffic Tracking System Based on Division of Video Into Frames and Processing

    This paper is to visualize and analyze video. Videos are sequence of image frames. In this work, algorithm will be developed to analyze a frame and the same will be applied to all frames in a video. It is expected see unwanted objects in video frame, which can be removed...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Mechanism to Mitigate Application Layer DDoS Attack With a Light Weight Trust Approach

    New application layer DDoS attacks is a continuous critical threat to which network layer solutions is not applicable as attackers are indistinguishable based on packets or protocols. The increase in Internet-based transactions and communications offers new opportunities for hackers to disrupt business operations with DDoS attacks to prevent legitimate users...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Combining Server and Storage Virtualization: A New Dimension for SMB's

    The virtualization wave is quickly reaching its way down into the small-to-medium-sized business. Virtualization provides unmatched flexibility, performance, and utilization by allowing the user to move server workloads from one virtual workspace to the next, maximizing server resources on the fly based on their business needs. Server virtualization eliminates the...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2012

    Basic Concept of Embedded "C": Review

    The use of C language to program micro controllers is becoming too common. And most of the time its not easy to build an application in assembly which instead the user can make easily in C. So its important that they know C language for micro controller which is commonly...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2012

    Neighbourhood Load Routing and Multi-Channels in Wireless Mesh Networks

    As an emerging technology, wireless mesh networks are making significant progress in the area of wireless networks in recent years. Routing in Wireless Mesh Network (WMN) is challenging because of the unpredictable variations of the wireless environment. Traditional mechanisms have been proved that the routing performance would get deteriorated and...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2012

    Counting Bloom Filter Architecture in VLSI Network Systems

    The Counting Bloom Filter (CBF) is useful for real time applications where the time and space efficiency is the main consideration in performing a set membership tests. The CBF estimates whether an element is present in a large array or not by allowing false positives and by not permitting false...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2012

    Minimization of Load Based Resources in Cloud Computing Systems

    Cloud computing is a term, which involves virtualization, distributed computing, networking, software and Web services. The authors' objective is to develop an effective load balancing algorithm using Divisible Load Scheduling Theorem to maximize or minimize different performance parameters (throughput, latency for example) for the clouds of different sizes. Central to...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2012

    Evolution of Crowd-Sourcing From Computer to Mobile Systems

    As crowd-sourcing is becoming popular for problem solving and completing a task, it is now very important to use this concept in an advance manner. It can also be used as a distributed and vast source of information. This concept is now evolving in world of mobile systems. This will...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2012

    Simulation and Performance Analysis Evaluation for Multipath Extension of Aodv to Improve End to End Delay, Route Error Sent, Routing Load and Packet Drop Ratio

    This paper describes improvement in standard routing protocol AODV for mobile ad-hoc networks. The mechanism setups multiple optimal paths based on bandwidth and delay. It allows to store multiple optimal paths based on Bandwidth and delay. At time of link failure, it will switch to next available path. To set...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2012

    GSM Based Intelligent Wireless Mobile Patient Monitoring System Using ZIGBEE Communication

    Miniaturization of biomedical sensors helped the fast development and popularization of information processing and wireless data transmission technology, the research of wireless medical monitoring system has became a hot topic. By utilizing the wireless technique to transmit information between medical sensor and monitoring control center, the free space of patients...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2011

    Review of Some Transaction Models Used in Mobile Databases

    Mobile computing is presently experiencing a period of unprecedented growth with the convergence of communication and computing capabilities of mobile phones and personal digital assistant. However, mobile computing presents many inherent problems that lead to poor network connectivity. To overcome poor connectivity and reduce cost, mobile clients are forced to...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2011

    Soft Computing Approach to Automatic Test Pattern Generation for Sequential Vlsi Circuit

    Due to the constant development in the integrated circuits, the automatic test pattern generation problem become more vital for sequential VLSI circuits in these days. Also testing of integrating circuits and systems has become a difficult problem. In this paper, the authors have discussed the problem of the automatic test...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2011

    Ant Colony Optimization: A Computational Intelligence Technique

    Ant Colony Optimization (ACO) is a novel computational technique inspired by a foraging behavior of ants has been successfully applied for solving real world optimization problems. This behavioral pattern inspires artificial ants for the search of solutions to the various types of optimization problems. ACO is a probabilistic search approach...

    Provided By Interscience Open Access Journals