Interscience Open Access Journals

Displaying 241-280 of 428 results

  • White Papers // Jan 2012

    Design of AMBA AXI4 Protocol for System-on-Chip Communication

    Advanced Microcontroller Bus Architecture (AMBA) protocol family provides metric-driven verification of protocol compliance, enabling comprehensive testing of interface Intellectual Property (IP) blocks and System-on-Chip (SoC) designs. The AMBA advanced eXtensible Interface 4 (AXI4) update to AMBA AXI3 includes the following: support for burst lengths up to 256 beats, updated write...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Seamless Handover Between UMTS and GPRS

    UMTS is one step ahead from the 2.5G network GPRS and supports faster data rates with wide coverage area. GPRS and UMTS are already deployed in many countries but seamless handover between GPRS and UMTS still remains as a stumbling block for the service providers to fulfill the continuously increasing...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    QoS Analysis for Scheduling Schemes in Wireless Networks

    In wireless environment, the periodic moments of wireless networks may cause the fluctuation of available bandwidth by varying with time and location. The periodic fluctuation disturbs the resource distribution and Quality of Service (QoS). QoS design is the fundamental functionality of the networking router to enable differentiated delivery and to...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Implementation of a Modem for Narrow Bandwidth Channel Using 6713 DSK

    As communication plays an important role in day to day life, the effective and efficient voice transmission is to be maintained. This paper mainly deals with voice transmission over a channel and implemented using 6713 DSK. For this purpose, some modulation schemes and voice coders are implemented. So two points...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Resilient GIA

    The core activity of any P2P system is File Sharing. In any system where many peers are connected, several replicas of same file may be present but the challenge, especially in an unstructured p2p overlay, is to make sure that there exist certain copies of the latest version for performing...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    A UML Framework for Socially Responsive Resource Usage Protocol

    Everything available in the people environment which can be used to satisfy their needs, provided, it is technologically accessible, economically feasible and culturally acceptable can be termed as 'Resource'. Therefore, planning is essentially required for judicious use of resources. It has importance in a country like India, which has enormous...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Automata for Web Services Fault Monitoring and Diagnosis

    Like any software, web service fault management is also required to go through different phases of fault management lifecycle. Model based diagnosis has been a well established practice for its several positive aspects including cognitively being better understood by development and testing teams. Automata is a simple and formally well...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    STM: Lock-Free Synchronization

    Current parallel programming uses low-level programming constructs like threads and explicit synchronization (for example, locks, semaphores and monitors) to coordinate thread execution which makes these programs difficult to design, program and debug. In this paper, the authors present Software Transactional Memory (STM) which is a promising new approach for programming...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Checkpointing Orchestrated Web Services

    Web Services are built on service-oriented architecture which is based on the notion of building applications by discovering and orchestrating services available on the web. Complex business processes can be realized by discovering and orchestrating already available services on the web. In order to make these orchestrated web services resilient...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    A Trust Based Sensor Protocol for Information Dissemination in a Point to Point Media

    Securing the information dissemination is an important issue in wireless sensor network. Previously, there is no available work on the integrated design of trust model and SPIN-PP protocol (sensor Protocols for Information via Negotiation) for information dissemination in wireless sensor networks. In this paper, to improve the quality of this...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Analyzing the Performance of Data Dissemination Algorithms to Application Requirements in Wireless Sensor Network

    A Wireless Sensor Network (WSN) is a collection of thousands of tiny sensor nodes having the capability of wireless communication, limited computation and sensing. Many data dissemination protocols have been proposed for multi-hop communication in sensor networks, each evaluated in some scenario. Many protocols are designed to exploit application requirements,...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Study of Wireless Sensor Network in SCADA System for Power Plant

    In this paper, study of wireless SCADA system which is powerful setup for monitoring and controlling the various applications from remotely placed is presented. All communication between GSM modem and user are wireless based, this translates into lowest cost compared to all other systems. Wireless based solutions have universally accepted,...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Performance Comparison of Routing Protocols in MANET Varying Network Size

    A Mobile Ad hoc NETwork (MANET) consists of mobile wireless nodes in which the communication between nodes is carried out without any centralized control. MANET is a self organized and self configurable network where the mobile nodes move arbitrarily. The mobile nodes can receive and forward packets as a router....

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Dual Bootstrap Server Based Super peer Overlay Construction

    Many two-layer hierarchy unstructured Peer-To-Peer (P2P) systems, comprising of superpeers and ordinary peers improved the performance of large scale P2P systems. The construction and maintenance of the superpeer overlay network play an important role in improving the performance P2P systems. One efficient method of constructing the superpeer overlay network is...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Evaluation of Proactive, Reactive and Hybrid Ad Hoc Routing Protocol for Various Battery Models in VANET Using Qualnet

    In VANET high speed is the real characteristic which leads frequent breakdown, interference etc. In this paper, the authors studied various Ad hoc routing protocols, Reactive, Proactive & Hybrid, taking in to consideration various VANET parameters like speed, altitude etc in real traffic scenario and evaluated them for various battery...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Autonomic Diffusion Based Spray Routing in Intermittently Connected Mobile Networks With Multiple Copies

    Intermittently connected mobile Network systems represent a challenging environment for networking research, due to the problems of ensuring messages delivery in spite of frequent disconnections and random meeting patterns. These networks fall into general category of Delay Tolerant Networks. There are many real networks that follow this model, for example,...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    An Improved Hybrid Peer-to-Peer System With Caching for Distributed Data Sharing

    Peer-to-peer overlay networks are widely used in distributed systems. Based on whether a regular topology is maintained among peers, peer-to-peer networks can be divided into two categories: structured peer-to-peer networks in which peers are connected by a regular topology, and unstructured peer-to-peer networks in which the topology is arbitrary. Structured...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    A Multipurpose Image Processing Technique for Wireless and Wired Networks

    One of the most important and challenging goal of current and future communication network is transmission of high quality images from sender to receiver side quickly with least error where limitation of bandwidth is a prime problem. Here, the authors will discuss a new approach towards compressing and decompressing with...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Data Partitioning for Semantic Web

    Semantic web database is an RDF database. Tremendous increase can be seen in semantic web data, as real life applications of semantic web are using this data. Efficient management of this data at a larger scale, and efficient query performance are the two major concerns. This work aims at analyzing...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    A Correctness Criterion for Eager Approach Validation for Transactional Memory System

    With rise of multi-core systems, Software Transactional Memory (STM) has garnered significant interest as an elegant alternative for developing concurrent code. A (memory) transaction is an unit of code in execution in memory. A Software Transactional Memory system (STM) ensures that a transaction appears either to execute atomically (even in...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    The Effect of Social Online Networking Service on Public Libraries Via Critical Systems Heuristics (CSH) :A Case Study

    Libraries can provide numerous services for users on the use of Web 2.0 technology by promoting library services. In the interactive Web 2.0 environment; (SON) took hold. The Purpose of this paper is to discuss on the impact of Social Online Networking (SON) on library services by a qualitative evaluation...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Digital Watermarking Technique Used for Security of Digital Images During Broadcasting and Telecasting by Using DWT

    Signals are any time varying quantity having lot of Information and have its own frequency. Signal can be classified into random signal, periodic signals, and non-periodic signals, discrete or digital signal. Signal may contain various data like audio, video, or in text format. Signal also has information like images. But...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Performance Analysis of MIMO SFBC CI-COFDM System Against the Nonlinear Distortion and Narrowband Interference

    Carrier Interferometry Coded Orthogonal Frequency Division Multiplexing (CI-COFDM) system has been widely studied in multi-carrier communication system. The CI-COFDM system spreads each coded information symbol across all N sub-carriers using orthogonal CI spreading codes. The CI-COFDM system shows the advantages of Peak to Average Power Ratio (PAPR) reduction, frequency diversity...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Simulation of a Real-Time Bus Arrival Predictor Using RFID and LabVIEW

    Most college and office goers in India use the public buses for daily commuting. The bus network caters to the need of thousands who find it an affordable means of transport. However, the absence of real-time updates in the system poses some very serious problems during the exit period. Large...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Optimal Allocation of FACTS Devices by Using Multi-Objective Optimal Power Flow and Genetic Algorithms

    The introduction of the Flexible AC Transmission System (FACTS) in the power system reduces the losses, reduces the cost of the generation, improves the stability and also improves the load capability of the system. Some application of the Flexible AC Transmission System (FACTS) technologies to existing high voltage power system...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    The Design and Development of Microstrip Patch Antenna Using Simulation Studies by ADS

    The matching network of a Microstrip Patch Antenna at 10.65 GHz was designed and developed using the software Advanced Design System (ADS). ADS is powerful software for designing microwave electronic circuits. The Microstrip Patch antenna thus developed was tested at 10m Far Field Antenna Anechoic Chamber and Momentum Simulation studies...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Carrier to Noise Ratio Performance Evaluation for Optical SSB Signal in Radio Over Fiber System

    The optical and wireless communication systems convergence will activate the potential capacity of photonic technology for providing the expected growth in interactive video, voice communication and data traffic services that are cost effective and a green communication service. The last decade growth of the broadband internet projects the number of...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Research on Data Mining Using Neural Networks

    The application of neural networks in the data mining has become wider. Data mining is the search for relationships and global patterns that exist in large databases but are 'Hidden' among the vast amount of data, such as a relationship between patient data and their medical diagnosis. These relationships represent...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Cross-Layer System for Cluster Based Data Access in MANET'S

    The objective of cooperative caching is to improve data availability, improve access efficiency and reduce query delay in mobile Ad-Hoc networks. Many types of cache replacement algorithms like LRU, LFU, LFRU, LRU-MIN and LFU-MIN are used to improve data accessibility and reduce query delay in cluster based cooperative caching in...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Software Inspection Improves Quality of Software Product

    An electronic tender system (e-tender) streamlines the tender process and thereby saves time and cost. Security requirements for e-tendering systems have not been closely scrutinized in the literature. In addition to the security concerns of conventional e-tender systems - authentication, integrity, privacy, and non-repudiation are provided. This paper identifies key...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Secure E-Tendering Using Identity Based Encryption From Bilinear Pairings

    An electronic tender system (e-tender) streamlines the tender process and thereby saves time and cost. Security requirements for e-tendering systems have not been closely scrutinized in the paper. In addition to the security concerns of conventional e-tender systems - authentication, integrity, privacy, and non-repudiation are provided. This paper identifies key...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Implementation of RED Algorithm to Detect Malicious Packet Losses

    The authors consider the problem of detecting whether a compromised router is maliciously manipulating its stream of packets. In particular, they are concerned with a simple yet effective attack in which a router selectively drops packets destined for some victim. Unfortunately, it is quite challenging to attribute a missing packet...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    A Combined Two Step Approach for Detecting Input Validation Attacks Against Web Applications

    Internet becomes a part of the daily life. Almost very service by the internet will be provided with the help of web applications with these the people can say that without the web application they cannot do anything over the internet but at the same time web applications are mostly...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Intelligent Software Agent Applied To Digital Forensic and Its Usefulness

    Due to the large amount of information produced, accumulated, and distributed via electronic means, it is necessary for forensic experts during crime investigation to increase their abilities to search for important evidence in a timely manner because this is essential to the success of digital forensic examinations. The inadequacy of...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Flaws in Endair-A Secure Routing Protocol for MANETS

    Routing is the one of the essential criteria at network level in mobile ad hoc networks. Ad hoc network routing protocols are difficult to design, and secure because unable to handle rapid node mobility and network topology changes. It has been realized by many researchers, and several "Secure" routing protocols...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Application of Data Mining Using Bayesian Belief Network To Classify Quality of Web Services

    In this paper, the authors employed Na?ve Bayes, Augmented Na?ve Bayes, Tree Augmented Na?ve Bayes, Sons & Spouses, Markov Blanket, Augmented Markov Blanket, Semi Supervised and Bayesian network techniques to rank web services. The Bayesian Network is demonstrated on a dataset taken from literature. The dataset consists of 364 web...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    A Novel Steganographic Algorithm and Hashing to Improve Authentication Using Mobile Phones

    Security has become major issue in all online services. Strong authentication is provided conveniently using mobile phone as security token. While sending security token to user mobile via GSM network, it is vulnerable to several attacks. The authors can avoid them using Steganography which enforces the security of hashing algorithms....

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Role of Web Services in Migration of Legacy System to Service-Oriented Architecture

    Managing the convolution of systems is considered as a key confront in computing and is transact with numerous expansion projected at enhanced computerization. Service-Oriented Architectures (SOA) are predicted to facilitate the prerequisite of a large quantity of varied and contending web services which the potential users will be capable to...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Improving Software Modularity Using AOP

    Software modularity is a software design technique that increases the level to which software is composed of separate interchangeable components called modules. The modules are devised by breaking down the program functions. Each module accomplishes one function and contains all that is necessary to accomplish it. Modules represent a separation...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Model Based Software Development: Issues & Challenges

    One of the goals of software design is to model a system in such a way that it is easily understandable. Nowadays the tendency for software development is changing from manual coding to automatic code generation; it is becoming model-based. This is a response to the software crisis, in which...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Design and Modification of Circular Monpole UWB Antenna for WPAN Application

    The basic circular monopole antenna exhibits a 10 dB return loss bandwidth over the entire frequency band, the paper proposed a modified version of simple circular monopole antenna for WPAN application. The antenna offers excellent performance in the range of 2-12 GHz.. The antenna is designed on FR4 substrate and...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Tunable Microstrip Filters for Modern Wireless Communications

    Microwave filters are essential components for a large variety of modern communication systems. Filters engage in many recreating roles in RF and microwave applications. Forthcoming technologies like wireless communications are racing with RF and microwave filters in performance, physical and cost parameters. Developing technologies in materials and fabrications are defining...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    A New Hammerstein Model for Non-Linear System Identification

    In this paper, a newer type of black box nonlinear model in Hammerstein structure is proposed. The model has wavelet network coupled with Orthonormal basis functions which is capable of modeling a class of non-linear systems with acceptable accuracy. Wavelet basis functions have the property of localization in both the...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Enhancing Spectrum Efficiency of Cognitive Radio Waveforms Using SD-SMSE Framework

    Spectrum overcrowding continues to present is a fundamental challenge for both military and commercial communications. Recent studies suggest that spectrum congestion is primarily due to inefficient usage rather than spectrum availability. Dynamic Spectrum Access (DSA) and Cognitive Radio (CR) are two techniques being considered to improve spectrum efficiency and utilization....

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Probabilistic Model for Intrusion Detection in Wireless Sensor Network

    Intrusion detection in Wireless Sensor Network (WSN) is important through the view of security in WSN. Sensor Deployment Strategy gives an extent to security in WSNs. This paper compares the probability of intrusion detection in both the Poisson as well as Gaussian deployment strategies. It focuses on maximizing intrusion detection...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    An Efficient Load Balancing Clustering Scheme for Data Centric Wireless Sensor Networks

    Clustering is an efficient approach to capitalize the energy of energy constraint sensor nodes in wireless sensor networks. Clustering schemes do not guarantee formation of clusters with equal number of nodes. So data frames transmitted by the nodes vary. TDMA schedule of nodes of smaller cluster is smaller than others...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Multi User Diversity Evaluation in MIMO HSDPA Downlink Channels

    A multiple transmit antenna, single receive antenna (per receiver) downlink channel with limited channel feedback is considered. Given a constraint on the total system-wide channel feedback, the following question is considered: is it preferable to get low-rate feedback from a large number of receivers or to receive high-rate/high-quality feedback from...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Design of AMBA AXI4 Protocol for System-on-Chip Communication

    Advanced Microcontroller Bus Architecture (AMBA) protocol family provides metric-driven verification of protocol compliance, enabling comprehensive testing of interface Intellectual Property (IP) blocks and System-on-Chip (SoC) designs. The AMBA advanced eXtensible Interface 4 (AXI4) update to AMBA AXI3 includes the following: support for burst lengths up to 256 beats, updated write...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Seamless Handover Between UMTS and GPRS

    UMTS is one step ahead from the 2.5G network GPRS and supports faster data rates with wide coverage area. GPRS and UMTS are already deployed in many countries but seamless handover between GPRS and UMTS still remains as a stumbling block for the service providers to fulfill the continuously increasing...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    QoS Analysis for Scheduling Schemes in Wireless Networks

    In wireless environment, the periodic moments of wireless networks may cause the fluctuation of available bandwidth by varying with time and location. The periodic fluctuation disturbs the resource distribution and Quality of Service (QoS). QoS design is the fundamental functionality of the networking router to enable differentiated delivery and to...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Implementation of a Modem for Narrow Bandwidth Channel Using 6713 DSK

    As communication plays an important role in day to day life, the effective and efficient voice transmission is to be maintained. This paper mainly deals with voice transmission over a channel and implemented using 6713 DSK. For this purpose, some modulation schemes and voice coders are implemented. So two points...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2012

    Credit Card Forgery Identification System With Location Based Tracking Using Mobiles With GPS

    In Mobile networks the user's location, passwords might be used as authentication factor to provide security services for remote client authentication. In addition there are many typical authentication factors. In Location based Remote client Authentication Protocol for mobile environment (LRAP), combines several authentication factors to securely authenticate a mobile user....

    Provided By Interscience Open Access Journals

  • White Papers // Mar 2012

    A QoS Aware Vertical Handover in Mobile Network

    The convergence of heterogeneous wireless access technologies characterizes the 4G wireless networks. In such converged systems, the seamless and efficient handoff between different access technologies (vertical handoff) is essential and remains a challenging problem. The heterogeneous co-existence of access technologies with largely different characteristics creates a decision problem of determining...

    Provided By Interscience Open Access Journals

  • White Papers // Mar 2012

    Live Streaming Using Peer Division Multiplexing

    A Number of commercial Peer-To-Peer (P2P) systems for live streaming have been introduced in recent years. The behavior of the popular systems has been extensively studied in several measurement papers. However, these studies have to rely on a "Black-box" approach, where packet traces are collected from a single or a...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Dynamic Thread Pool Based Service Tracking Manager

    The Service Tracking Manager (STM) application is a management software that integrates, collects, and manages alerts/events information from Casino Management Systems. It allows casinos to track alerts and events at different locations. Casinos staff attends to various kinds of requests. The requests can be for providing customer service, handle events...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Performance Analysis of Secured Synchronous Stream Ciphers

    The new information and communication technologies require adequate security. In the past decades, the authors have witnessed an explosive growth of the digital storage and communication of data, triggered by some important breakthroughs such as the Internet and the expansive growth of wireless communications. In the world of cryptography, stream...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Group-Key Management Model for Worldwide Wireless Mesh Networks

    Wireless Mesh Network (WMN) is an upcoming wireless network technology and is mainly used to provide broadband internet in remote locations. It is characterized by minimum fixed infrastructure requirement and is operated in an open medium, such that any user within the range covered by mesh routers may access the...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Secure Biometric Cryptosystem for Distributed System

    Information (biometric) security is concerned with the assurance of confidentiality, integrity, and availability of information in all forms, biometric information is very sophisticated in terms of all, in this paper, the authors are focusing on data pattern along with all security assurance, so that they can improve the matching performance...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    A Novel Approach for Privacy Preserving in Video Using Extended Euclidean Algorithm Based on Chinese Remainder Theorem

    The development in the modern technology paved a path in the utilization of surveillance cameras in streets, offices and other areas but this significantly leads a threat to the privacy of visitors, passengers or employees, leakage of information etc.. To overcome this threat, privacy and security needs to be incorporated...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    An Efficient and Secure Key Management Scheme for Hierarchical Access Control Based on ECC

    In a key management scheme for hierarchy based access control, each security class having higher clearance can derive the cryptographic secret keys of its other security classes having lower clearances. In 2006 Jeng-Wang proposed an efficient scheme on access control in user hierarchy based on elliptic curve cryptosystem. Their scheme...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Dynamic Detection of Packet Losses by CRDP

    TCP has provided the primary means to transfer data reliably across the Internet; however, TCP has imposed limitations on several applications. Measurement and estimation of packet loss characteristics are challenging due to the relatively rare occurrence and typically short duration of packet loss episodes. While active probe tools are commonly...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    An Efficient Approach Formulation of Social Groups of User Calls of GSM

    The people are living in a world of wireless technology. The most widely used wireless i.e. mobile computing device today is the Mobile phone, can be used not only for voice and data communications but also as a computing device running context aware applications. In this paper, the authors present...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Star Varietal Cube: A New Large Scale Parallel Interconnection Network

    This paper proposes a new interconnection network topology, called the Star varietal-cube SVC (n, m), for large scale multicomputer systems. The authors take advantage of the hierarchical structure of the Star graph network and the Varietal hypercube to obtain an efficient method for constructing the new topology. The Star graph...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Detection of Phishing Websites and Secure Transactions

    Phishing is an electronic online identity theft in which the attackers use a combination of social engineering and web site spoofing techniques to trick a user into revealing confidential information. It steals the user's personal identity data and financial credentials. Most of the phishing attacks emerge as spoofed E-Mails appearing...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Integrated Approach of Malicious Website Detection

    With the advent and the rising popularity of Internet, security is becoming one of the focal point. At present, Web sites have become the attacker's main target. The attackers uses the strategy of embedding the HTML tags, the script tag to include web-based Trojan scripting or redirector scripting, the embedded...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    An Implementation of Botnet Detection Algorithm for Grid Networks

    Grid is an emerging technology that aims at utilizing resources efficiently and effectively, A botnet is a collection of infected computers and the common attacks are a Distributed Denial Of Service attack (DDOS) is any type of attack on a networking structure to disable a server from servicing its clients....

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Embedded Wireless Based Communications in Oilfield & Providing Security System

    The area of the oilfield is much wider. Oil exhauster continuous working for 24 hours. As the problem of petroleum being stolen, transmission line being stolen, and transformer being stolen exists which requires the strong secures management system. With Consideration of the objective condition restriction of geographical environment, the implementation...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Facial Expression Recognition System Using Facial Characteristic Points and ID3

    Facial expression is one of the most powerful, natural, and abrupt means for human beings which have the knack to communicate emotion and regulate inter-personal behaviour. In this paper, the authors present a novel approach for facial expression detection using decision tree. Facial expression information is mostly concentrate on facial...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Implementation of MHMIP and Comparing the Performance With MIP and DHMIP in Mobile Networks

    Managing the mobility efficiently in wireless networks causes critical issue, in order to support mobile users. To support global mobility in IP networks the Mobile Internet Protocol (MIP) has been proposed. The Hierarchical MIP (HMIP) and Dynamic HMIP (DHMIP) strategies are also proposed for providing high signaling delay. The authors'...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    CMA Channel Equalization Through an Adaptive MMSE Equalizer Based RLS Algorithm

    The adaptive algorithm has been widely used in the digital signal processing like channel estimation, channel equalization, echo cancellation, and so on. One of the most important adaptive algorithms is the RLS algorithm. The authors present in this paper n multiple objective optimization approach to fast blind channel equalization. By...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    An Efficient Authentication Protocol for Security in Mobile Ad Hoc Networks

    Mobile Ad hoc NETworks (MANETs) is a collection of mobile nodes that communicate by forming a network dynamically that lacks fixed infrastructure and centralized control. Secure routing is of at most importance in such networks because of dynamically changing topologies, absence of centralized monitoring points and lack of clear lines...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Simulation of DSDV Protocol

    An ad-hoc network is the cooperative engagement of a collection of Mobile Hosts without the required intervention of any centralized Access Point. This Application is the innovative design for the operation of such ad-hoc networks. The basic idea of the design is to operate each Mobile Host as a specialized...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Preemptive Routing & Intrusion Detection for MANETs

    An ad-hoc network will often change rapidly in topology, this courses for routes in the network to often disappear and new to arise. The Ad-hoc On-Demand Distance Vector Routing Protocol(AODV), is based on the principle of discover routes as needed. In this paper, the authors will extend the definition of...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Embedded Smart Car Security System on Face Detection

    In this proposed embedded car security system, FDS (Face Detection System) is used to detect the face of the driver and compare it with the predefined face. For example, in the night when the car's owner is sleeping and someone theft the car then FDS obtains images by one tiny...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2011

    GPS Based Bluetooth Broadcasting - Long Range Solution

    In this paper, GPS based Bluetooth broadcasting for long range is proposed. System model for Long range broadcasting of messages with multiple piconets and dynamically created threshold devices, based on GPS information is presented. The authors' simulation results have shown that, message can be received by those devices which are...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2011

    Min Max Normalization Based Data Perturbation Method for Privacy Protection

    Data mining system contain large amount of private and sensitive data such as healthcare, financial and criminal records. These private and sensitive data can not be share to every one, so privacy protection of data is required in data mining system for avoiding privacy leakage of data. Data perturbation is...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2011

    Multi-Gigabit Pattern for Data in Network Security

    In the current scenario network security is emerging the world. Matching large sets of patterns against an incoming stream of data is a fundamental task in several fields such as network security or computational biology. High-speed network Intrusion Detection Systems (IDS) rely on efficient pattern matching techniques to analyze the...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2011

    VANET: Performance Comparison of BNGF Method in Different Vehicular Traffic Scenarios

    A Vehicular Ad hoc NETwork (VANET) is a wireless ad hoc network that is formed between vehicles on an on demand basis. A lot of research work around the world is being conducted to design the routing protocols for VANETs. In this paper, the authors examine the significance Greedy Forwarding...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Designing of an Automated Power Meter Reading With Zigbee Communication

    This paper presents the design and implementation of Automatic Power Meter (APM), The APM is implemented using an ARM and Zigbee Based power meter Communication Module. The design presents a new methodology for avoiding the high construction and maintenance costs in the existing meter reading technology. Using an APM with...

    Provided By Interscience Open Access Journals

  • White Papers // Nov 2011

    A Modified Approach to the New Lossless Data Compression Method

    This paper proposed the modified approach to the new lossless data compression method. It is developed based on hiding data reversibly with a location map. It performs same as the earlier algorithm but it stands on lossless strategy where as the former approach could not do it. It can compress...

    Provided By Interscience Open Access Journals