Interscience Open Access Journals

Displaying 201-240 of 434 results

  • White Papers // May 2012

    Dual-Hop OSTBC Transmissions Over Fading Channels Under Receiver Phase Noise for Regenerative Systems

    Space-time coding for fading channels is a Communication technique that realizes the diversity benefits of multiple transmit antennas. Previous work in this area has focused on the narrowband flat fading case where spatial diversity only is available. In this paper, the authors investigate the use of space-time coding in OFDM...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    Route Request Flooding Attack Using Trust Based Security Scheme in Manet

    In recent years, the use of Mobile Ad hoc NETworks (MANETs) has been widespread in many applications, including some mission critical applications, and as such security has become one of the major concerns in MANETs. A mobile ad hoc network is set up with a group of mobile wireless nodes...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    Fault Tolerant, Energy Saving Method for Reliable Information Propagation in Sensor Network

    The reliability of Wireless Sensor Networks (WSN) is affected by faults that may occur due to various reasons such as malfunctioning hardware, software glitches, dislocation, or environmental hazards, e.g. fire or flood. Due to inherent nature of these networks a sensor node may fail and hence the route may also...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    QoS Routing in Mobile Ad-Hoc Networks Using Agents

    Quality of Service (QoS) provisioning in a Mobile Ad-hoc NETwork (MANETs) routing for multimedia traffic is a challenging task due to dynamic topology of such networks. Fuzzy Logic (FL) was used for QoS prediction from current uncertain QoS constraints in the network for particular applications, from these uncertain constraints there...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    Performance Evaluation of Extended AODV Using Different Scenarios

    The mobile ad hoc networks have become a major component of the future network development due to their ease of deployment, self configurability; flexibility and independence on any existing network infrastructure Mobile ad-hoc network have the attributes such as wireless connection, continuously changing topology, distributed operation and ease of deployment....

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    Development of Empirical Mode Decomposition

    In this paper, one of the tasks for which empirical mode decomposition is potentially useful is nonparametric signal denoising, an area for which wavelet thresholding has been the dominant technique for many years. In this paper, the wavelet thresholding principle is used in the decomposition modes resulting from applying EMD...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    Effective Analysis of Different Parameters in Ad Hoc Network for Different Protocols

    A wireless Ad-hoc network consists of wireless nodes communicating without the need for a centralized administration, in which all nodes potentially contribute to the routing process. A user can move anytime in an ad hoc scenario and, as a result, such a network needs to have routing protocols which can...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    A Fuzzy Implementation of Biometrics With Five Factor Authentication System for Secured Banking

    Remote authentication is the most commonly used method to determine the identity of a remote client. Secure and efficient authentication scheme has been a very important issue with the development of networking technologies. In a Generic Framework for Authentication, preserving security and privacy in distributed systems provide three factors for...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    Normalized Transfer of Bulk Data By Using UDP in Dedicated Networks

    High speed bulk data transfer is an important part of many data-intensive scientific applications. TCP fails for the transfer of large amounts of data over long distance across high-speed dedicated network links. Due to system hardware is incapable of saturating the bandwidths supported by the network and rise buffer overflow...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    End-to-End Delay Optimization in Wireless Sensor Network (WSN)

    In this paper, the authors are interested in optimizing the delay of event-driven wireless sensor networks, for which events does not occur frequently. In such systems, most of the energy is consumed when the radios are on, waiting for an arrival to occur. Sleep-wake scheduling is an effective mechanism to...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    ICMP, SNMP: Collaborative Approach to Network Discovery and Monitoring

    The algorithm and realization technique of network topology discovery is a very important technical indicator for a network management system's quality. Based on the knowledge of the network topology discovery theory, the research on ICMP and SNMP programming for Windows, this paper proposes a method of developing the common network...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    The Future of IP SAN Using SCVM

    The SCVM, which stands for Storage Concentrator Virtual Machine, creates IP SAN storage as virtual machine, providing the user with the ability to consolidate their virtual data center. The SCVM can fully manage and has features for the storage over local as well as networked VMs. This can be attained...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    Impact of Routing Protocol on Performance of Wireless Ad Hoc Vehicular Network

    Vehicular Ad Hoc NETwork (VANET) is an emerging new technology integrating ad hoc network, Wireless LAN (WLAN) and cellular technology to achieve intelligent inter-vehicle communications and improve road traffic safety and efficiency. VANETs are distinguished from other kinds of ad hoc networks by their hybrid network architectures, node movement characteristics,...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    Localization in Wireless Sensor Network Using MDS

    In this paper, determining the localization of nodes in a Wireless Sensor Network is a very important task, which involves collaboration between sensor nodes. Localization is a fundamental service since it is relevant to many applications and to the network main functions, such as: routing, communication, cluster creation, network coverage,...

    Provided By Interscience Open Access Journals

  • White Papers // Mar 2012

    An Improved Face Recognition Using Neighborhood Defined Modular Phase Congruency Based Kernel PCA

    A face recognition algorithm based on NMPKPCA algorithm presented in this paper. The proposed algorithm when compared with conventional Principal Component Analysis (PCA) algorithms has an improved recognition Rate for face images with large variations in illumination, facial expressions. In this technique, first phase congruency features are extracted from the...

    Provided By Interscience Open Access Journals

  • White Papers // Mar 2012

    Record Matching for Web Databases by Domain-Specific Query Probing

    Record matching refers to the task of finding entries that refer to the same entity in two or more files, is a vital process in data integration. Most of the record matching methods are supervised, which requires the user to provide training data. These methods are not applicable for web...

    Provided By Interscience Open Access Journals

  • White Papers // Mar 2012

    Dynamic Resource Management in Large Cloud Environments Using Distributed Gossip Protocol

    Resource management poses particular challenges in large-scale systems, such as server clusters that simultaneously process requests from a large number of clients. The authors mainly focus on the dynamic resource management in large scale cloud environment. Their core contribution centers around outlining a distributed middleware architecture and presenting one of...

    Provided By Interscience Open Access Journals

  • White Papers // Mar 2012

    An Approach for Customer Behavior Analysis Using Web Mining

    Customer satisfaction is the key secret of success for all industries regardless of whether it is web enabled or not. This paper focuses the role of web mining in achieving a viable edge in business. Web mining is becoming the tool for success for those who adopt electronic means of...

    Provided By Interscience Open Access Journals

  • White Papers // Mar 2012

    Cloud Computing: A Survey

    Cloud computing provides huge computing services to the business for improving the organizational growth. Basic requirement needed for this technology is Internet but provides higher capability when compared to the Internet. Cloud computing is a combination of computation, software, data access and also provides storage services. In Cloud, storage of...

    Provided By Interscience Open Access Journals

  • White Papers // Mar 2012

    A New Generation Peer-to-Peer Advanced Botnet

    A botnet is a network of compromised computers that are infected with code that allows an unauthorized user to control them via the Internet. Botnets are one of the most serious threats to today's Internet. Most current botnets have centralized Command and Control (C&C) architecture. However, Peer-To-Peer (P2P) structured botnets...

    Provided By Interscience Open Access Journals

  • White Papers // Mar 2012

    An Integrated Approach for Measuring Software Quality and Code Readability

    In this paper, the authors explore the concept of code readability and investigate its relation to software quality. This is a new approach to measuring the complexity of software systems. Software industry uses software metrics to measure the complexity of software systems for software cost estimation, software development control, software...

    Provided By Interscience Open Access Journals

  • White Papers // Mar 2012

    Secure Web System Development

    The recent development in the field of Web system technology has transformed the software industry radically by integrating a wide range of web users, vendors, and enterprise applications worldwide. In Web-based system, a security requirement is a critical issue. This difficulty is due to the complexity level of such systems...

    Provided By Interscience Open Access Journals

  • White Papers // Mar 2012

    An Insight into the Importance of Requirements Engineering

    When developing a software, one of the most important aspects for success of any software project is to get the requirements right. The success of any software project depends on the quality of the requirements. As the projects change over the time, the authors try to study the requirement process...

    Provided By Interscience Open Access Journals

  • White Papers // Mar 2012

    Web Search Using Improved Concept Based Query Refinement

    The information extracted from Web pages can be used for effective query expansion. The aspect needed to improve accuracy of web search engines is the inclusion of metadata, not only to analyze Web content, but also to interpret. With the Web of today being unstructured and semantically heterogeneous, keyword-based queries...

    Provided By Interscience Open Access Journals

  • White Papers // Mar 2012

    A QoS Aware Vertical Handover in Mobile Network

    The convergence of heterogeneous wireless access technologies characterizes the 4G wireless networks. In such converged systems, the seamless and efficient handoff between different access technologies (vertical handoff) is essential and remains a challenging problem. The heterogeneous co-existence of access technologies with largely different characteristics creates a decision problem of determining...

    Provided By Interscience Open Access Journals

  • White Papers // Mar 2012

    Live Streaming Using Peer Division Multiplexing

    A Number of commercial Peer-To-Peer (P2P) systems for live streaming have been introduced in recent years. The behavior of the popular systems has been extensively studied in several measurement papers. However, these studies have to rely on a "Black-box" approach, where packet traces are collected from a single or a...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2012

    Credit Card Forgery Identification System With Location Based Tracking Using Mobiles With GPS

    In Mobile networks the user's location, passwords might be used as authentication factor to provide security services for remote client authentication. In addition there are many typical authentication factors. In Location based Remote client Authentication Protocol for mobile environment (LRAP), combines several authentication factors to securely authenticate a mobile user....

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2012

    Carrier Frequency Offset Estimation Algorithm in the Presence of I/Q Imbalance in OFDM Systems

    In this paper, the authors analyzed the feasibility of using a virtual carrier based carrier frequency offset estimation algorithm in the presence of I/Q imbalance in OFDM systems. Based on the analysis of the signal model with both receiver CFO and I/Q imbalance impairment they conclude that it is feasible...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2012

    Embedded Automobile Engine Locking System, Using GSM Technology

    This paper deals with the design & development of an embedded system, which is being used to prevent/control the theft of a vehicle. The developed instrument is an embedded system based on GSM technology. The instrument is installed in the engine of the vehicle. An interfacing GSM modem is also...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2012

    The Application of Case-Based Reasoning to Estimation of Software Development Effort

    Accurate project effort estimation is an important goal for the software engineering community. Till date most work has focused upon building algorithmic models of effort estimation for example COCOMO. The authors describe an alternative approach to estimation based upon the use of analogy. The objective is to estimate the development...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2012

    Basic Concept of Embedded "C": Review

    The use of C language to program micro controllers is becoming too common. And most of the time its not easy to build an application in assembly which instead the user can make easily in C. So its important that they know C language for micro controller which is commonly...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2012

    Tree Based Aggregation and Routing in WSN: A Multi-Agent System Approach

    In WSN one of the issues is to route the data from the sensor nodes to sink node. The tree-based approach provides an efficient solution for establishing the path and in network aggregation. Tree is nonlinear structures, which have hierarchical levels in terms of parent-child combination. In this paper, the...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2012

    Mathematical Model for the Detection of Selfish Nodes in MANETs

    A mobile ad hoc network, is an independent network of mobile devices connected by wireless links. Each device in a MANET can move freely in any direction, and will therefore change its links to other devices easily. Each must forward traffic of others, and therefore be called a router. The...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2012

    Basic Concept of Embedded 'C': Review

    The use of C language to program micro controllers is becoming too common. And most of the time its not easy to build an application in assembly which instead one can make easily in C. So, its important that one know C language for micro controller which is commonly known...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2012

    Fast and Texture-Structure Preservable Inpainting and Its Application for Creating Virtualized-Reality Indoor Models

    This paper discusses the new inpainting algorithm for handling the images in the virtualized-reality indoor models. The untextured regions in the indoor model are textured by this proposed inpainting method which guarantees the texture and the structure propagation. The authors call this as a hybrid method because it combines the...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2012

    Optimization Through Bayesian Classification on the k-Anonymized Data

    Privacy preserving in data mining & publishing, plays a major role in today networked world. It is important to preserve the privacy of the vital information corresponding to a data set. This process can be achieved by k-anonymization solution for classification. Along with the privacy preserving using anonymization, yielding the...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2012

    A Mark Based Indexing Method for Well Organized Data Retrieval of Comparative Temporal Patterns

    So many numbers of algorithms have been proposed for the discovery of data from the large database. However, since the number of generated patterns can be large, selecting which patterns to analyze can be nontrivial. There is thus a need for algorithms and tools that can assist in the selection...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2012

    Hybrid Algorithm for Improving Efficiency of Keywords Based Search Engine

    Web mining is the application of data mining techniques to discover interesting patterns from the web. Web usage mining is the process of extracting useful information from server logs i.e users history. While discovering interesting patterns in multi agents the efficiency is decreased. In the authors' paper presents hybrid algorithm...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2012

    Basic Model of Multicast Authentication Based On Batch Signature-MABS

    Traditional multicast authentication schemes manage the different involvement of the receivers by letting the sender: choose the block size, divide a multicast stream into blocks, connect each block with a signature, and spread the effect of the Signature across all the packets in the block. The relationship between packets tends...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Pattern Recognition Algorithms for Cluster Identification Problem

    There are large datasets in high dimensional database to solve the cluster identification problem and for identifying dense clusters in a noisy data. In this paper by using densely intra connected sub graphs the authors' analysis identified the clusters. They have used pattern recognition algorithms for representing the graphs and...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Dynamic Thread Pool Based Service Tracking Manager

    The Service Tracking Manager (STM) application is a management software that integrates, collects, and manages alerts/events information from Casino Management Systems. It allows casinos to track alerts and events at different locations. Casinos staff attends to various kinds of requests. The requests can be for providing customer service, handle events...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Performance Analysis of Secured Synchronous Stream Ciphers

    The new information and communication technologies require adequate security. In the past decades, the authors have witnessed an explosive growth of the digital storage and communication of data, triggered by some important breakthroughs such as the Internet and the expansive growth of wireless communications. In the world of cryptography, stream...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Group-Key Management Model for Worldwide Wireless Mesh Networks

    Wireless Mesh Network (WMN) is an upcoming wireless network technology and is mainly used to provide broadband internet in remote locations. It is characterized by minimum fixed infrastructure requirement and is operated in an open medium, such that any user within the range covered by mesh routers may access the...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Secure Biometric Cryptosystem for Distributed System

    Information (biometric) security is concerned with the assurance of confidentiality, integrity, and availability of information in all forms, biometric information is very sophisticated in terms of all, in this paper, the authors are focusing on data pattern along with all security assurance, so that they can improve the matching performance...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    A Novel Approach for Privacy Preserving in Video Using Extended Euclidean Algorithm Based on Chinese Remainder Theorem

    The development in the modern technology paved a path in the utilization of surveillance cameras in streets, offices and other areas but this significantly leads a threat to the privacy of visitors, passengers or employees, leakage of information etc.. To overcome this threat, privacy and security needs to be incorporated...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    An Efficient and Secure Key Management Scheme for Hierarchical Access Control Based on ECC

    In a key management scheme for hierarchy based access control, each security class having higher clearance can derive the cryptographic secret keys of its other security classes having lower clearances. In 2006 Jeng-Wang proposed an efficient scheme on access control in user hierarchy based on elliptic curve cryptosystem. Their scheme...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Dynamic Detection of Packet Losses by CRDP

    TCP has provided the primary means to transfer data reliably across the Internet; however, TCP has imposed limitations on several applications. Measurement and estimation of packet loss characteristics are challenging due to the relatively rare occurrence and typically short duration of packet loss episodes. While active probe tools are commonly...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2011

    Soft Computing Approach to Automatic Test Pattern Generation for Sequential Vlsi Circuit

    Due to the constant development in the integrated circuits, the automatic test pattern generation problem become more vital for sequential VLSI circuits in these days. Also testing of integrating circuits and systems has become a difficult problem. In this paper, the authors have discussed the problem of the automatic test...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2011

    Ant Colony Optimization: A Computational Intelligence Technique

    Ant Colony Optimization (ACO) is a novel computational technique inspired by a foraging behavior of ants has been successfully applied for solving real world optimization problems. This behavioral pattern inspires artificial ants for the search of solutions to the various types of optimization problems. ACO is a probabilistic search approach...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Design and Modification of Circular Monpole UWB Antenna for WPAN Application

    The basic circular monopole antenna exhibits a 10 dB return loss bandwidth over the entire frequency band, the paper proposed a modified version of simple circular monopole antenna for WPAN application. The antenna offers excellent performance in the range of 2-12 GHz.. The antenna is designed on FR4 substrate and...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Tunable Microstrip Filters for Modern Wireless Communications

    Microwave filters are essential components for a large variety of modern communication systems. Filters engage in many recreating roles in RF and microwave applications. Forthcoming technologies like wireless communications are racing with RF and microwave filters in performance, physical and cost parameters. Developing technologies in materials and fabrications are defining...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    A New Hammerstein Model for Non-Linear System Identification

    In this paper, a newer type of black box nonlinear model in Hammerstein structure is proposed. The model has wavelet network coupled with Orthonormal basis functions which is capable of modeling a class of non-linear systems with acceptable accuracy. Wavelet basis functions have the property of localization in both the...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Enhancing Spectrum Efficiency of Cognitive Radio Waveforms Using SD-SMSE Framework

    Spectrum overcrowding continues to present is a fundamental challenge for both military and commercial communications. Recent studies suggest that spectrum congestion is primarily due to inefficient usage rather than spectrum availability. Dynamic Spectrum Access (DSA) and Cognitive Radio (CR) are two techniques being considered to improve spectrum efficiency and utilization....

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Probabilistic Model for Intrusion Detection in Wireless Sensor Network

    Intrusion detection in Wireless Sensor Network (WSN) is important through the view of security in WSN. Sensor Deployment Strategy gives an extent to security in WSNs. This paper compares the probability of intrusion detection in both the Poisson as well as Gaussian deployment strategies. It focuses on maximizing intrusion detection...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    An Efficient Load Balancing Clustering Scheme for Data Centric Wireless Sensor Networks

    Clustering is an efficient approach to capitalize the energy of energy constraint sensor nodes in wireless sensor networks. Clustering schemes do not guarantee formation of clusters with equal number of nodes. So data frames transmitted by the nodes vary. TDMA schedule of nodes of smaller cluster is smaller than others...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Multi User Diversity Evaluation in MIMO HSDPA Downlink Channels

    A multiple transmit antenna, single receive antenna (per receiver) downlink channel with limited channel feedback is considered. Given a constraint on the total system-wide channel feedback, the following question is considered: is it preferable to get low-rate feedback from a large number of receivers or to receive high-rate/high-quality feedback from...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Design of AMBA AXI4 Protocol for System-on-Chip Communication

    Advanced Microcontroller Bus Architecture (AMBA) protocol family provides metric-driven verification of protocol compliance, enabling comprehensive testing of interface Intellectual Property (IP) blocks and System-on-Chip (SoC) designs. The AMBA advanced eXtensible Interface 4 (AXI4) update to AMBA AXI3 includes the following: support for burst lengths up to 256 beats, updated write...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Seamless Handover Between UMTS and GPRS

    UMTS is one step ahead from the 2.5G network GPRS and supports faster data rates with wide coverage area. GPRS and UMTS are already deployed in many countries but seamless handover between GPRS and UMTS still remains as a stumbling block for the service providers to fulfill the continuously increasing...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Application and Simulation of Route Optimization in Mobile IP

    Mobile Internet Protocol has been proposed by Internet Engineering Task Force (IETF) to support portable IP addresses for mobile devices that often change their network access points to the Internet. In the basic mobile IP protocol, datagrams sent from wired or wireless hosts and destined for the mobile host that...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Dataprefetching Framework for Mobile Behavior Mining Using Co-Smart-Cast Method

    Data Mining is a widely used technique for discovering valuable information in a complex data set. In this paper the authors discussed the main issues about Mobile User Behavior Mining. In mobile transaction database, users in the different user groups may have different behaviors. So that they proposed parameter-less clustering...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Radio Access Network Requirement for New Deployment of WIMAX in Dhaka

    Mobile WiMAX is expected to be the next generation radio-interface, complementing WLAN and challenging EVDO/HSPA/LTE. High speed data rate, reduced latency, better Quality of service, and mobility can allow WiMAX to meet the rapidly growing demand of the users. A study of WiMAX Radio Network Planning (RNP) for an urban...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    A Survey on Mobile Agent Itinerary Planning in Wireless Sensor Networks

    It has been proven recently that using Mobile Agent (MA) in Wireless Sensor Networks (WSNs) can drastically help to obtain the flexibility of application-aware deployment. Normally, in any MA based sensor network, it is an important research issue to find out an optimal itinerary for the MA in order to...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Private Cloud: A Paradigm of Cloud Computing With University Shared Data Center (USDC)

    Cloud computing in academic environment will be benefited by every student and staff where lots of collaboration and safety of data is needed in academia. Academic has various departments and many semesters where lots of students need to access the computing a need for highly available up-to-date software and hardware...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Social Network Analysis for Churn Prediction in Telecom Data

    Social Network Analysis (SNA) is a set of research procedures for identifying group of people who share common structures in systems based on the relations among actors. Grounded in graph and system theories, this approach has proven to be powerful measures for studying networks in various industries like Telecommunication, banking,...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2012

    The Awareness Network of Monitoring and Displaying Actions of Social Networks

    The concept of awareness plays a pivotal role in research in Computer-Supported Cooperative Work. Recently, Software Engineering researchers interested in the collaborative nature of software development have explored the implications of this concept in the design of software development tools. A critical aspect of awareness is the associated coordinative work...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Comparative Analysis of AODV and DSR To Achieve Group Communication in Manet

    Secure group communication is a challenging task with respect to MANET's. Since its introduction as a communication medium, wireless technology found broad application on the battlefield. Robust and reliable group communication plays a major role in developing distributed mobile application in which unannounced disconnections will occur frequently due to the...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    An Efficient Three Step Algorithm for Fast Motion Estimation in Mobile Domain

    The goal of this paper is to find a fast method for motion estimation and motion segmentation using proposed model. Recent day Communication between ends is facilitated by the development in the area of wired and wireless networks. Block matching algorithms are very useful in achieving the efficient and acceptable...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2013

    Maximizing the Lifetime and Security of Wireless Sensor Networks

    Recent technological advances have facilitated the widespread use of Wireless Sensor Networks in many applications such as battle field surveillance, environmental observations, biological detection and industrial diagnostics. In Wireless Sensor Networks, sensor nodes are typically power-constrained with limited lifetime, and so it's necessary to understand however long the network sustains...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2013

    Efficient and Secure Authentication by Using 3-Path Transmission in Ad Hoc Networks

    Ad hoc networks are created dynamically and maintained by the individual nodes comprising the network. They do not require a pre-existing architecture for communication purposes and do not rely on any form of wired infrastructure; in an ad hoc network all communication occurs through a wireless median. The design and...

    Provided By Interscience Open Access Journals

  • White Papers // May 2013

    A Secure Data Forwarding Schema for Cloud Storage Systems

    Cloud computing has been envisioned as the next-generation architecture of IT Enterprise. It moves the application software and databases to the centralized large data centers, where the management of the data and services may not be fully trustworthy. This unique paradigm brings about many new security challenges, which have not...

    Provided By Interscience Open Access Journals

  • White Papers // May 2013

    Reliablity Control Using Loss Recovery Ratio in Wireless Sensor Network

    In Wireless Sensor Network congestion leads to the degradation of communication links that result in the decreased the reliability and waste of energy which one of the scarcest resources of sensor network. In cluster based environment, each sensor senses the information and forwarded to its cluster head and cluster head...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2013

    Wireless Eurynomus A Wireless (802.11) Probe Request Based Attack

    The 802.11 standard for wireless includes a procedure of sending a continuous probe request to find out if there is a nearby Access Point available or not. Most of wireless clients like laptops or smart phones are configured to auto-connect. Due to this auto connect feature any client can be...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2013

    Ultra Wide Band Planer Antenna for Wireless Network Application

    Application of Ultra-WideBand (UWB) technology on wireless communication system has increased considerably in last seven years. This paper presents a planar Antenna for Ultra Wide Band frequency for cover a large bandwidth of 3.1 GHz and 13.1GHz for the resonance frequency of 6.5 and its wide application like WLAN, Wi-MAX,...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2013

    Ant Colony Optimized Routing for Mobile Adhoc Networks (MANET)

    A Mobile Ad-hoc NETwork (MANET) is a collection of wireless mobile nodes forming a temporary network without using centralized access points, infrastructure, or centralized administration. Routing means the act of moving information across an internet work from a source to a destination. The biggest challenge in this kind of networks...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2013

    Load Balancing Protocol for Energy Accomplished Routing in WSN

    Wireless Sensor Networks (WSNs) have been considered as a promising method for reliably monitoring both civil and military environments under hazardous or dangerous conditions. Due to such environments, the power supplies for sensors in the network are not usually rechargeable or replaceable. Therefore, the energy efficiency is critical for the...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2013

    Visualization of Network Traffic

    Network security in today's world is critical. System administrators must quickly perceive the security state of their networks, but they often have only text-based tools to work with. These tools often provide no overview that would help users grasp the big-picture. Network traffic visualization tools have successfully enabled security analysts...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2013

    The Campus Security Tracking System Based on RFID and ZigBee Network

    In this paper, the authors present the Campus Security Tracking system (CST) has been designed and implemented using the RFID and ZigBee network. The CST reads the RFID tags data through FRID & ZigBee node, and then sends it to PC node by a custom wireless protocol on the ZigBee....

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2013

    Wireless Sensor Network with Centralized Embedded Web Server Using ARM 7

    A plat form independent embedded web server and its integration into a network of wireless sensor nodes is implemented here. The embedded web server is designed and built as an expansion module for one of the nodes in the Wireless Sensor Network (WSN). It allows authorized Internet users to establish...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2013

    Implementation and Performance Analysis Evaluation of A New MANET Routing Protocol in Ns-2

    Mobile Ad-hoc NETworks (MANETs) can be defined as a collection of large number of mobile nodes that form temporary network without aid of any existing network infrastructure or central access point. The efficient routing protocols can provide significant benefits to Mobile Ad-hoc NETworks, in terms of both performance and reliability....

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Comparisons Various Versions of GridFTP Protocols

    The GridFTP protocol has become a popular data movement tool used to build distributed grid-oriented applications. The GridFTP protocol extends the FTP protocol defined by and extended in some other IETF documents by adding certain features designed to improve the performance of data movement over a wide area network, to...

    Provided By Interscience Open Access Journals