Interscience Open Access Journals

Displaying 241-280 of 434 results

  • White Papers // Jan 2012

    Automata for Web Services Fault Monitoring and Diagnosis

    Like any software, web service fault management is also required to go through different phases of fault management lifecycle. Model based diagnosis has been a well established practice for its several positive aspects including cognitively being better understood by development and testing teams. Automata is a simple and formally well...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    STM: Lock-Free Synchronization

    Current parallel programming uses low-level programming constructs like threads and explicit synchronization (for example, locks, semaphores and monitors) to coordinate thread execution which makes these programs difficult to design, program and debug. In this paper, the authors present Software Transactional Memory (STM) which is a promising new approach for programming...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Checkpointing Orchestrated Web Services

    Web Services are built on service-oriented architecture which is based on the notion of building applications by discovering and orchestrating services available on the web. Complex business processes can be realized by discovering and orchestrating already available services on the web. In order to make these orchestrated web services resilient...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Performance Analysis of MIMO SFBC CI-COFDM System Against the Nonlinear Distortion and Narrowband Interference

    Carrier Interferometry Coded Orthogonal Frequency Division Multiplexing (CI-COFDM) system has been widely studied in multi-carrier communication system. The CI-COFDM system spreads each coded information symbol across all N sub-carriers using orthogonal CI spreading codes. The CI-COFDM system shows the advantages of Peak to Average Power Ratio (PAPR) reduction, frequency diversity...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Simulation of a Real-Time Bus Arrival Predictor Using RFID and LabVIEW

    Most college and office goers in India use the public buses for daily commuting. The bus network caters to the need of thousands who find it an affordable means of transport. However, the absence of real-time updates in the system poses some very serious problems during the exit period. Large...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Optimal Allocation of FACTS Devices by Using Multi-Objective Optimal Power Flow and Genetic Algorithms

    The introduction of the Flexible AC Transmission System (FACTS) in the power system reduces the losses, reduces the cost of the generation, improves the stability and also improves the load capability of the system. Some application of the Flexible AC Transmission System (FACTS) technologies to existing high voltage power system...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    The Design and Development of Microstrip Patch Antenna Using Simulation Studies by ADS

    The matching network of a Microstrip Patch Antenna at 10.65 GHz was designed and developed using the software Advanced Design System (ADS). ADS is powerful software for designing microwave electronic circuits. The Microstrip Patch antenna thus developed was tested at 10m Far Field Antenna Anechoic Chamber and Momentum Simulation studies...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Carrier to Noise Ratio Performance Evaluation for Optical SSB Signal in Radio Over Fiber System

    The optical and wireless communication systems convergence will activate the potential capacity of photonic technology for providing the expected growth in interactive video, voice communication and data traffic services that are cost effective and a green communication service. The last decade growth of the broadband internet projects the number of...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    A UML Framework for Socially Responsive Resource Usage Protocol

    Everything available in the people environment which can be used to satisfy their needs, provided, it is technologically accessible, economically feasible and culturally acceptable can be termed as 'Resource'. Therefore, planning is essentially required for judicious use of resources. It has importance in a country like India, which has enormous...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Digital Watermarking Technique Used for Security of Digital Images During Broadcasting and Telecasting by Using DWT

    Signals are any time varying quantity having lot of Information and have its own frequency. Signal can be classified into random signal, periodic signals, and non-periodic signals, discrete or digital signal. Signal may contain various data like audio, video, or in text format. Signal also has information like images. But...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Analyzing the Performance of Data Dissemination Algorithms to Application Requirements in Wireless Sensor Network

    A Wireless Sensor Network (WSN) is a collection of thousands of tiny sensor nodes having the capability of wireless communication, limited computation and sensing. Many data dissemination protocols have been proposed for multi-hop communication in sensor networks, each evaluated in some scenario. Many protocols are designed to exploit application requirements,...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Study of Wireless Sensor Network in SCADA System for Power Plant

    In this paper, study of wireless SCADA system which is powerful setup for monitoring and controlling the various applications from remotely placed is presented. All communication between GSM modem and user are wireless based, this translates into lowest cost compared to all other systems. Wireless based solutions have universally accepted,...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Performance Comparison of Routing Protocols in MANET Varying Network Size

    A Mobile Ad hoc NETwork (MANET) consists of mobile wireless nodes in which the communication between nodes is carried out without any centralized control. MANET is a self organized and self configurable network where the mobile nodes move arbitrarily. The mobile nodes can receive and forward packets as a router....

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Dual Bootstrap Server Based Super peer Overlay Construction

    Many two-layer hierarchy unstructured Peer-To-Peer (P2P) systems, comprising of superpeers and ordinary peers improved the performance of large scale P2P systems. The construction and maintenance of the superpeer overlay network play an important role in improving the performance P2P systems. One efficient method of constructing the superpeer overlay network is...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Evaluation of Proactive, Reactive and Hybrid Ad Hoc Routing Protocol for Various Battery Models in VANET Using Qualnet

    In VANET high speed is the real characteristic which leads frequent breakdown, interference etc. In this paper, the authors studied various Ad hoc routing protocols, Reactive, Proactive & Hybrid, taking in to consideration various VANET parameters like speed, altitude etc in real traffic scenario and evaluated them for various battery...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Autonomic Diffusion Based Spray Routing in Intermittently Connected Mobile Networks With Multiple Copies

    Intermittently connected mobile Network systems represent a challenging environment for networking research, due to the problems of ensuring messages delivery in spite of frequent disconnections and random meeting patterns. These networks fall into general category of Delay Tolerant Networks. There are many real networks that follow this model, for example,...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    An Improved Hybrid Peer-to-Peer System With Caching for Distributed Data Sharing

    Peer-to-peer overlay networks are widely used in distributed systems. Based on whether a regular topology is maintained among peers, peer-to-peer networks can be divided into two categories: structured peer-to-peer networks in which peers are connected by a regular topology, and unstructured peer-to-peer networks in which the topology is arbitrary. Structured...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    A Multipurpose Image Processing Technique for Wireless and Wired Networks

    One of the most important and challenging goal of current and future communication network is transmission of high quality images from sender to receiver side quickly with least error where limitation of bandwidth is a prime problem. Here, the authors will discuss a new approach towards compressing and decompressing with...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Resilient GIA

    The core activity of any P2P system is File Sharing. In any system where many peers are connected, several replicas of same file may be present but the challenge, especially in an unstructured p2p overlay, is to make sure that there exist certain copies of the latest version for performing...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Data Partitioning for Semantic Web

    Semantic web database is an RDF database. Tremendous increase can be seen in semantic web data, as real life applications of semantic web are using this data. Efficient management of this data at a larger scale, and efficient query performance are the two major concerns. This work aims at analyzing...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    A Correctness Criterion for Eager Approach Validation for Transactional Memory System

    With rise of multi-core systems, Software Transactional Memory (STM) has garnered significant interest as an elegant alternative for developing concurrent code. A (memory) transaction is an unit of code in execution in memory. A Software Transactional Memory system (STM) ensures that a transaction appears either to execute atomically (even in...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    The Effect of Social Online Networking Service on Public Libraries Via Critical Systems Heuristics (CSH) :A Case Study

    Libraries can provide numerous services for users on the use of Web 2.0 technology by promoting library services. In the interactive Web 2.0 environment; (SON) took hold. The Purpose of this paper is to discuss on the impact of Social Online Networking (SON) on library services by a qualitative evaluation...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    QoS Analysis for Scheduling Schemes in Wireless Networks

    In wireless environment, the periodic moments of wireless networks may cause the fluctuation of available bandwidth by varying with time and location. The periodic fluctuation disturbs the resource distribution and Quality of Service (QoS). QoS design is the fundamental functionality of the networking router to enable differentiated delivery and to...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Implementation of a Modem for Narrow Bandwidth Channel Using 6713 DSK

    As communication plays an important role in day to day life, the effective and efficient voice transmission is to be maintained. This paper mainly deals with voice transmission over a channel and implemented using 6713 DSK. For this purpose, some modulation schemes and voice coders are implemented. So two points...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Tunable Microstrip Filters for Modern Wireless Communications

    Microwave filters are essential components for a large variety of modern communication systems. Filters engage in many recreating roles in RF and microwave applications. Forthcoming technologies like wireless communications are racing with RF and microwave filters in performance, physical and cost parameters. Developing technologies in materials and fabrications are defining...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    A New Hammerstein Model for Non-Linear System Identification

    In this paper, a newer type of black box nonlinear model in Hammerstein structure is proposed. The model has wavelet network coupled with Orthonormal basis functions which is capable of modeling a class of non-linear systems with acceptable accuracy. Wavelet basis functions have the property of localization in both the...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Enhancing Spectrum Efficiency of Cognitive Radio Waveforms Using SD-SMSE Framework

    Spectrum overcrowding continues to present is a fundamental challenge for both military and commercial communications. Recent studies suggest that spectrum congestion is primarily due to inefficient usage rather than spectrum availability. Dynamic Spectrum Access (DSA) and Cognitive Radio (CR) are two techniques being considered to improve spectrum efficiency and utilization....

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Probabilistic Model for Intrusion Detection in Wireless Sensor Network

    Intrusion detection in Wireless Sensor Network (WSN) is important through the view of security in WSN. Sensor Deployment Strategy gives an extent to security in WSNs. This paper compares the probability of intrusion detection in both the Poisson as well as Gaussian deployment strategies. It focuses on maximizing intrusion detection...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    An Efficient Load Balancing Clustering Scheme for Data Centric Wireless Sensor Networks

    Clustering is an efficient approach to capitalize the energy of energy constraint sensor nodes in wireless sensor networks. Clustering schemes do not guarantee formation of clusters with equal number of nodes. So data frames transmitted by the nodes vary. TDMA schedule of nodes of smaller cluster is smaller than others...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Multi User Diversity Evaluation in MIMO HSDPA Downlink Channels

    A multiple transmit antenna, single receive antenna (per receiver) downlink channel with limited channel feedback is considered. Given a constraint on the total system-wide channel feedback, the following question is considered: is it preferable to get low-rate feedback from a large number of receivers or to receive high-rate/high-quality feedback from...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Design of AMBA AXI4 Protocol for System-on-Chip Communication

    Advanced Microcontroller Bus Architecture (AMBA) protocol family provides metric-driven verification of protocol compliance, enabling comprehensive testing of interface Intellectual Property (IP) blocks and System-on-Chip (SoC) designs. The AMBA advanced eXtensible Interface 4 (AXI4) update to AMBA AXI3 includes the following: support for burst lengths up to 256 beats, updated write...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Seamless Handover Between UMTS and GPRS

    UMTS is one step ahead from the 2.5G network GPRS and supports faster data rates with wide coverage area. GPRS and UMTS are already deployed in many countries but seamless handover between GPRS and UMTS still remains as a stumbling block for the service providers to fulfill the continuously increasing...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    A Trust Based Sensor Protocol for Information Dissemination in a Point to Point Media

    Securing the information dissemination is an important issue in wireless sensor network. Previously, there is no available work on the integrated design of trust model and SPIN-PP protocol (sensor Protocols for Information via Negotiation) for information dissemination in wireless sensor networks. In this paper, to improve the quality of this...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Goal Programming Approach for Selection of COTS Components in Designing a Fault Tolerant Modular Software System under Consensus Recovery Block Scheme

    The application of computer systems has now crossed many different fields. Systems are becoming more software intensive. The requirements of the customer for a more reliable software led to the fact that software reliability is now an important research area. One method to improve software reliability is by the application...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    SMS Text Compression Through IDBE (Intelligent Dictionary Based Encoding) for Effective Mobile Storage Utilization

    Effective storage utilization is the key concept for better working of any operating system. Even operating systems used for mobile phones are not an exception for this fact. This paper proposes a technique for maximizing the utilization of the storage space present in mobile phones. Thus, it is important to...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Secure Efficient On-Demand Insider Attacks Multicast Routing Protocol in Wireless Networks

    Wireless multicast routing send and receives the data source to destination. High error rates, unfixed and changeable self of the signal power and broadcast change with time and environment regularly result in not effective links. These services more weak to internal attacks coming from compromised nodes that behave randomly to...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Spectral Minutiae Fingerprint Recognition System

    Biometrics refers to the automatic recognition of individuals based on their physiological and/or behavioral characteristics, such as faces, finger prints, iris, and gait. In this paper, the authors focus on the application of finger print recognition system. The spectral minutiae fingerprint recognition is a method to represent a minutiae set...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Facial Expression Recognition System Using Facial Characteristic Points and ID3

    Facial expression is one of the most powerful, natural, and abrupt means for human beings which have the knack to communicate emotion and regulate inter-personal behaviour. In this paper, the authors present a novel approach for facial expression detection using decision tree. Facial expression information is mostly concentrate on facial...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Implementation of MHMIP and Comparing the Performance With MIP and DHMIP in Mobile Networks

    Managing the mobility efficiently in wireless networks causes critical issue, in order to support mobile users. To support global mobility in IP networks the Mobile Internet Protocol (MIP) has been proposed. The Hierarchical MIP (HMIP) and Dynamic HMIP (DHMIP) strategies are also proposed for providing high signaling delay. The authors'...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    CMA Channel Equalization Through an Adaptive MMSE Equalizer Based RLS Algorithm

    The adaptive algorithm has been widely used in the digital signal processing like channel estimation, channel equalization, echo cancellation, and so on. One of the most important adaptive algorithms is the RLS algorithm. The authors present in this paper n multiple objective optimization approach to fast blind channel equalization. By...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    A Study of Artifical Intelligence in Intrusion Detection Systems

    Artificial Intelligence could make the use of Intrusion Detection Systems a lot easier than it is today. They could learn the preferences of the security officers and show the kind of alerts first that the officer has previously been most interested. As always, the hardest thing with learning AIs, is...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    A Attack on E-Mail Encryption Protocols by Chosen Ciphertext Method

    Several security protocols (PGP, PEM, MOSS, S/MIME, PKCS#7, CMS, etc.) have been developed to provide confidentiality and authentication of electronic mail. These protocols are widely used and trusted for private communication over the Internet. The authors point out a potentially serious security hole in these protocols: any encrypted message can...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    An Extensive Simulation Analysis of AODV Protocol With IEEE 802.11 MAC for Chain Topology in MANET

    A Mobile Ad hoc NETwork (MANET) represents system of wireless mobile nodes that can self-organize freely and dynamically into arbitrary and temporary network topology. Routing is the task of directing data packets from a source node to a given destination. The main method for evaluating the performance of MANETs is...

    Provided By Interscience Open Access Journals

  • White Papers // Mar 2012

    An Approach for Customer Behavior Analysis Using Web Mining

    Customer satisfaction is the key secret of success for all industries regardless of whether it is web enabled or not. This paper focuses the role of web mining in achieving a viable edge in business. Web mining is becoming the tool for success for those who adopt electronic means of...

    Provided By Interscience Open Access Journals

  • White Papers // Mar 2012

    Cloud Computing: A Survey

    Cloud computing provides huge computing services to the business for improving the organizational growth. Basic requirement needed for this technology is Internet but provides higher capability when compared to the Internet. Cloud computing is a combination of computation, software, data access and also provides storage services. In Cloud, storage of...

    Provided By Interscience Open Access Journals

  • White Papers // Mar 2012

    A New Generation Peer-to-Peer Advanced Botnet

    A botnet is a network of compromised computers that are infected with code that allows an unauthorized user to control them via the Internet. Botnets are one of the most serious threats to today's Internet. Most current botnets have centralized Command and Control (C&C) architecture. However, Peer-To-Peer (P2P) structured botnets...

    Provided By Interscience Open Access Journals

  • White Papers // Mar 2012

    An Integrated Approach for Measuring Software Quality and Code Readability

    In this paper, the authors explore the concept of code readability and investigate its relation to software quality. This is a new approach to measuring the complexity of software systems. Software industry uses software metrics to measure the complexity of software systems for software cost estimation, software development control, software...

    Provided By Interscience Open Access Journals

  • White Papers // Mar 2012

    Secure Web System Development

    The recent development in the field of Web system technology has transformed the software industry radically by integrating a wide range of web users, vendors, and enterprise applications worldwide. In Web-based system, a security requirement is a critical issue. This difficulty is due to the complexity level of such systems...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    An Effective Time Management Schema in WSNs

    WSN usually consists of a large number of resource constraint sensor nodes that are generally deployed in unattended/hostile environments and Existing security designs mostly provide a hop-by-hop security paradigm. Furthermore, existing security designs are also vulnerable to many types of Denial of Service (DoS) attacks, such as random node capture...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Periodically Updating the Content in Mobile Ad Hoc Network With Secured Synchronization

    The content and presence updates were used to transmit updates to nearby nodes over an ad hoc network using duty cycles; the authors' algorithms synchronize the transmissions of nodes periodically. By this approach, nodes can save battery power without missing updates from their neighbours by switching off their network cards....

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    An Improvement of Centroid Algorithm Based on Distance in Wireless Sensor Network

    In Wireless Sensor Network (WSN), estimating the exact position of sensor node is an important research problem and its location accuracy impacts the efficiency of localization algorithms. In this paper improved centroid range free localization method is proposed and comparison with conventional centroid is done by varying different parameters such...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Improving Routing Efficiency Based on Random Direction Mobility Model in Manets

    Major issue arising in Mobile Ad hoc NETworks (MANETs) is the selection of the optimal path between any two nodes. A method that has been advocated to improve routing efficiency is to select the most stable path so as to reduce the latency and the overhead due to re-routing instability...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    A Rake Receiver Design for Ultra Wide Band Application

    In this paper, the authors describe the design and implementation of a rake receiver for use with Ultra Wide Band (UWB) systems. The rake receiver uses Spread Spectrum Modulation (SSM) aided by kasami sequence generator. The combination is found to be effective in dealing with multipath fading and signal to...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    The New Adaptive Active Constellation Extension Algorithm for Par Minimization in OFDM Systems

    In this paper, the peak-to-average ratio reduction in OFDM systems is implemented by the Adaptive Active Constellation Extension (ACE) technique which is more simple and attractive for practical downlink implementation purpose. However, in normal constellation method the authors cannot achieve the minimum PAR if the target clipping level is much...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Implementation and Comparison of Wavelet Transform and Fourier Transform in Wi-Max OFDM System

    WIMAX wireless communication is based on OFDM technology which enables going towards 4G Based on IEEE 802.16d-2004. But the reliability of OFDM is limited with the problems of time varying nature of the channel. This can reduced by adding cyclic prefix or guard interval between each block of data symbols....

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Underground Wireless Communication Channel Modeling and Simulation Using 0.3GMSK Modulation Considering Penetration and Scattering Loss

    Wireless communication inside mines and tunnels is very different from that in terrestrial environment because of the strong attenuation of signals. Here, the authors are developing an empirical model for the underground wireless communication channel based on experimental data which help in predicting the average received signal strength at a...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2013

    Rate Compatible Punctured Turbo-Coded Hybrid ARQ for OFDM System

    Now-a-day's Orthogonal Frequency Division Multiplexing (OFDM) is under intense research for broadband wireless transmission because of its robustness against multipath fading. A major concern in data communication such as OFDM is to control transmission errors caused by the channel noise so that error free data can be delivered to the...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Investigation of Capacity Gains in MIMO Correlated Rician Fading Channels Systems

    This paper investigate the effect of Rician fading and correlation on the capacity and diversity of MIMO channels. The use of antenna arrays at both sides of the wireless communication link (MIMO systems) can increase channel capacity provided the propagation medium is rich scattering or Rayleigh fading and the antenna...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Secure and Reliable Power Supply with Challenges-Smart Grid

    Smart Grid implementations will certainly increase the quantity, quality and use of information available from advanced sensing, computing and communications hardware as well as software. There is virtually universal agreement that it is necessary to upgrade the electric grid to increase overall system efficiency and reliability. Many technologies currently in...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Simulation of Adaptive Channel Equalization for BPSK,QPSK and 8-PSK Schemes

    The distortion and inter symbol interference caused by multipath effects of channel degrades the quality of signal transmission in transmission system of digital baseband. Adaptive channel equalization is used commonly to compensate these effects so as to increase the reliability of propagation. Recursive Least Squares (RLS) algorithm is most commonly...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Statistical Analysis of Wsn Based Indoor Positioning Localization Schemes with Kalman Filtering

    Wireless Sensor Network (WSN) is used for determining the Indoor Positioning of objects and persons since recent years. WSN has been implemented in indoor positioning applications such as real time tracking of humans/objects, patient monitoring in health care, navigation, warehouses for inventory monitoring, shopping malls, etc. But one of the...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Inter Carrier Interference and Signal to Interference Ratio of Various Pulse Shaping Functions Used in Ofdm System with Carrier Frequency Offset

    Orthogonal Frequency Division Multiplexing (OFDM) is the important modulation of choice for fourth generation broadband multimedia wireless systems. This paper is focused on the problem of reducing the Inter-Carrier Interference (ICI) and signal to noise ratio in the transmission over OFDM using various pulse shaping methods. Here, the authors have...

    Provided By Interscience Open Access Journals

  • White Papers // Sep 2012

    Design & Implementation of Teacher Student Interaction System Using Zigbee & RFID

    Research of the past years has led to numerous novel developments and approaches for Wireless Sensor Networks (WSNs). However, most previous work has focused on either mathematical analysis or theoretical algorithms with extensive simulation results. In this paper, in order to realistically understand the complexity of WSNs, a ZigBee/IEEE 802.15.4...

    Provided By Interscience Open Access Journals

  • White Papers // Sep 2012

    A Survey of the Effect of Network Parameters on Communication Links in Wireless Sensor Networks

    Sensor networks are a collection of large number of low-cost, low-power, multifunctional, and small sensors. a transceiver and a power source .Wireless sensor networks hold the promise of many new applications in the area of monitoring and control. Examples include target tracking, intrusion detection, wildlife habitat monitoring, climate control and...

    Provided By Interscience Open Access Journals

  • White Papers // May 2013

    Optimal Route Selection Strategy for QoS Improvement

    An ad-hoc mobile network is a collection of mobile nodes that are dynamically and arbitrarily located in such a manner that the interconnections between nodes are capable of changing on a continual basis. Ad-hoc nodes operating in a single path, single channel model might experience packet loss and high latency...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Improving Localization Accuracy in Wireless Sensor Networks

    The most fundamental problem of wireless sensor networks is localization (finding the geographical location of the sensors). Most of the localization algorithms proposed for sensor networks are based on Sequential Monte Carlo (SMC) method. To achieve high accuracy in localization it requires high seed node density and it also suffers...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Performance Evaluation of Relaying Schemes for Wireless Communication Systems

    The evaluation of MIMO (Multiple-Input Multiple-Output) Relay wireless system is carried out and compared against the performance of a SISO (Single-Input Single-Output) Relay wireless system. The encoding scheme used in MIMO is Alamouti coding and decoding is done by the Maximum Likelihood (ML) detector. A comparison is made between the...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    A Fuzzy Based Approach in Multihop Network

    The proposed system utilizes the concept of multi hop communication in Wireless Sensor Networks (WSNs). On the other hand, the single hop communication leads to more power dissipation in the nodes at the time of transmitting sensed data. The proposed system rectifies the above mentioned problem with the multi hop...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Amorphous Event Prevention in Wireless Sensor Network

    In many applications wireless sensor can be used to detect the events in those applications. With the advances in sensing, communication, and computation, there is an increasing need to track mobile events such as air pollutant diffusion, toxic gas leakage, or wildfire spreading using mobile sensors such as robots. Lots...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Attacks in Mobile Ad Hoc Networks: Detection and Counter Measure

    In Wireless Ad-hoc network Stealthy packet dropping is a suite of four attacks; misrouting, power control, identity delegation, and colluding collision - that can be easily launched against multi hop wireless ad hoc network. Stealthy packet dropping disrupts the packet from reaching the destination through malicious behavior at an intermediate...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Novel Defence Mechanism Against On Demand Adhoc Routing Protocol for Mobile Adhoc Networks

    To access multimedia data mobile users like to use their own consumer electronic devices anywhere and at anytime. Hence, the authors expect that wireless ad hoc networks will be widely used in the near future since these networks form the topology with low cost on the fly. However, consumer electronic...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    A Security Architecture for Real-World Applications of Wireless Sensor Network

    With the recent capability of being applicable in enormous fields, the Wireless Sensor Networks (WSN) has drawn attention of researchers and industries in diverse areas. Being deployed in areas that are hostile, WSN pose lots of difficulties and challenges to the research fraternity. In this paper, the authors discuss a...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Increasing the Lifetime of Heterogeneous Sensor Network by using Genetic-Fuzzy Clustering

    Wireless Sensor Network is composed of hundreds or thousands of sensor nodes which have computational, energy and memory limitation. Its duty is to receive information from its surrounding environment, analyze and process data and to send the received data to other nodes or base station. In these networks, sensor nodes...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Analysis of Unipath and Multipath Routing Protocols in Mobile Adhoc Networks

    A MANET is an interconnection of mobile devices by wireless links, which forms a dynamic topology. Routing protocols play a vital role in transmission of data across the network. The two major classifications of routing protocols are unipath and multipath. In this paper, the authors have evaluated the performance of...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Hierarchical Routing Protocols for Wireless Sensor Network-A Survey

    Wireless Sensor Networks are a web of sensor nodes with a set of processor and limited memory unit embedded in it. Reliable routing of packets from the sensor node to its base station is the most important task for the networks. The routing protocols applied for the other networks cannot...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Wireless Network Security Threats and their Solutions: A Short Study

    With continual advances in technology, wireless accessibility is being deployed increasingly in office and public environments, as it is having huge benefits. But it is also coupled with the security threats and risks that will adversely affect the performance of the organization. To get rid of these threats, firstly these...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Performance Comparison of Spread Spectrum Modulation for Wireless Channels Using Ann - Assisted Pseudo - Noise Sequence Generator

    One of the challenging issues in Spread-Spectrum Modulation (SSM) is the design of the Pseudo - Random or Pseudo - Noise (PN) sequence generator. Though several approaches are available that deals with the PN - sequence generator, there always exists the possibility of exploring the use of innovative methods through...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Secure E-Tendering Using Identity Based Encryption From Bilinear Pairings

    An electronic tender system (e-tender) streamlines the tender process and thereby saves time and cost. Security requirements for e-tendering systems have not been closely scrutinized in the paper. In addition to the security concerns of conventional e-tender systems - authentication, integrity, privacy, and non-repudiation are provided. This paper identifies key...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Implementation of RED Algorithm to Detect Malicious Packet Losses

    The authors consider the problem of detecting whether a compromised router is maliciously manipulating its stream of packets. In particular, they are concerned with a simple yet effective attack in which a router selectively drops packets destined for some victim. Unfortunately, it is quite challenging to attribute a missing packet...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    A Combined Two Step Approach for Detecting Input Validation Attacks Against Web Applications

    Internet becomes a part of the daily life. Almost very service by the internet will be provided with the help of web applications with these the people can say that without the web application they cannot do anything over the internet but at the same time web applications are mostly...

    Provided By Interscience Open Access Journals