Interscience Open Access Journals

Displaying 241-280 of 434 results

  • White Papers // Jan 2012

    Tunable Microstrip Filters for Modern Wireless Communications

    Microwave filters are essential components for a large variety of modern communication systems. Filters engage in many recreating roles in RF and microwave applications. Forthcoming technologies like wireless communications are racing with RF and microwave filters in performance, physical and cost parameters. Developing technologies in materials and fabrications are defining...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    A New Hammerstein Model for Non-Linear System Identification

    In this paper, a newer type of black box nonlinear model in Hammerstein structure is proposed. The model has wavelet network coupled with Orthonormal basis functions which is capable of modeling a class of non-linear systems with acceptable accuracy. Wavelet basis functions have the property of localization in both the...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Enhancing Spectrum Efficiency of Cognitive Radio Waveforms Using SD-SMSE Framework

    Spectrum overcrowding continues to present is a fundamental challenge for both military and commercial communications. Recent studies suggest that spectrum congestion is primarily due to inefficient usage rather than spectrum availability. Dynamic Spectrum Access (DSA) and Cognitive Radio (CR) are two techniques being considered to improve spectrum efficiency and utilization....

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Probabilistic Model for Intrusion Detection in Wireless Sensor Network

    Intrusion detection in Wireless Sensor Network (WSN) is important through the view of security in WSN. Sensor Deployment Strategy gives an extent to security in WSNs. This paper compares the probability of intrusion detection in both the Poisson as well as Gaussian deployment strategies. It focuses on maximizing intrusion detection...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    An Efficient Load Balancing Clustering Scheme for Data Centric Wireless Sensor Networks

    Clustering is an efficient approach to capitalize the energy of energy constraint sensor nodes in wireless sensor networks. Clustering schemes do not guarantee formation of clusters with equal number of nodes. So data frames transmitted by the nodes vary. TDMA schedule of nodes of smaller cluster is smaller than others...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Multi User Diversity Evaluation in MIMO HSDPA Downlink Channels

    A multiple transmit antenna, single receive antenna (per receiver) downlink channel with limited channel feedback is considered. Given a constraint on the total system-wide channel feedback, the following question is considered: is it preferable to get low-rate feedback from a large number of receivers or to receive high-rate/high-quality feedback from...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Design of AMBA AXI4 Protocol for System-on-Chip Communication

    Advanced Microcontroller Bus Architecture (AMBA) protocol family provides metric-driven verification of protocol compliance, enabling comprehensive testing of interface Intellectual Property (IP) blocks and System-on-Chip (SoC) designs. The AMBA advanced eXtensible Interface 4 (AXI4) update to AMBA AXI3 includes the following: support for burst lengths up to 256 beats, updated write...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Seamless Handover Between UMTS and GPRS

    UMTS is one step ahead from the 2.5G network GPRS and supports faster data rates with wide coverage area. GPRS and UMTS are already deployed in many countries but seamless handover between GPRS and UMTS still remains as a stumbling block for the service providers to fulfill the continuously increasing...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    QoS Analysis for Scheduling Schemes in Wireless Networks

    In wireless environment, the periodic moments of wireless networks may cause the fluctuation of available bandwidth by varying with time and location. The periodic fluctuation disturbs the resource distribution and Quality of Service (QoS). QoS design is the fundamental functionality of the networking router to enable differentiated delivery and to...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Implementation of a Modem for Narrow Bandwidth Channel Using 6713 DSK

    As communication plays an important role in day to day life, the effective and efficient voice transmission is to be maintained. This paper mainly deals with voice transmission over a channel and implemented using 6713 DSK. For this purpose, some modulation schemes and voice coders are implemented. So two points...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Resilient GIA

    The core activity of any P2P system is File Sharing. In any system where many peers are connected, several replicas of same file may be present but the challenge, especially in an unstructured p2p overlay, is to make sure that there exist certain copies of the latest version for performing...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    A UML Framework for Socially Responsive Resource Usage Protocol

    Everything available in the people environment which can be used to satisfy their needs, provided, it is technologically accessible, economically feasible and culturally acceptable can be termed as 'Resource'. Therefore, planning is essentially required for judicious use of resources. It has importance in a country like India, which has enormous...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Automata for Web Services Fault Monitoring and Diagnosis

    Like any software, web service fault management is also required to go through different phases of fault management lifecycle. Model based diagnosis has been a well established practice for its several positive aspects including cognitively being better understood by development and testing teams. Automata is a simple and formally well...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    STM: Lock-Free Synchronization

    Current parallel programming uses low-level programming constructs like threads and explicit synchronization (for example, locks, semaphores and monitors) to coordinate thread execution which makes these programs difficult to design, program and debug. In this paper, the authors present Software Transactional Memory (STM) which is a promising new approach for programming...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Checkpointing Orchestrated Web Services

    Web Services are built on service-oriented architecture which is based on the notion of building applications by discovering and orchestrating services available on the web. Complex business processes can be realized by discovering and orchestrating already available services on the web. In order to make these orchestrated web services resilient...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    A Trust Based Sensor Protocol for Information Dissemination in a Point to Point Media

    Securing the information dissemination is an important issue in wireless sensor network. Previously, there is no available work on the integrated design of trust model and SPIN-PP protocol (sensor Protocols for Information via Negotiation) for information dissemination in wireless sensor networks. In this paper, to improve the quality of this...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Analyzing the Performance of Data Dissemination Algorithms to Application Requirements in Wireless Sensor Network

    A Wireless Sensor Network (WSN) is a collection of thousands of tiny sensor nodes having the capability of wireless communication, limited computation and sensing. Many data dissemination protocols have been proposed for multi-hop communication in sensor networks, each evaluated in some scenario. Many protocols are designed to exploit application requirements,...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Study of Wireless Sensor Network in SCADA System for Power Plant

    In this paper, study of wireless SCADA system which is powerful setup for monitoring and controlling the various applications from remotely placed is presented. All communication between GSM modem and user are wireless based, this translates into lowest cost compared to all other systems. Wireless based solutions have universally accepted,...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Performance Comparison of Routing Protocols in MANET Varying Network Size

    A Mobile Ad hoc NETwork (MANET) consists of mobile wireless nodes in which the communication between nodes is carried out without any centralized control. MANET is a self organized and self configurable network where the mobile nodes move arbitrarily. The mobile nodes can receive and forward packets as a router....

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Dual Bootstrap Server Based Super peer Overlay Construction

    Many two-layer hierarchy unstructured Peer-To-Peer (P2P) systems, comprising of superpeers and ordinary peers improved the performance of large scale P2P systems. The construction and maintenance of the superpeer overlay network play an important role in improving the performance P2P systems. One efficient method of constructing the superpeer overlay network is...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Evaluation of Proactive, Reactive and Hybrid Ad Hoc Routing Protocol for Various Battery Models in VANET Using Qualnet

    In VANET high speed is the real characteristic which leads frequent breakdown, interference etc. In this paper, the authors studied various Ad hoc routing protocols, Reactive, Proactive & Hybrid, taking in to consideration various VANET parameters like speed, altitude etc in real traffic scenario and evaluated them for various battery...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Autonomic Diffusion Based Spray Routing in Intermittently Connected Mobile Networks With Multiple Copies

    Intermittently connected mobile Network systems represent a challenging environment for networking research, due to the problems of ensuring messages delivery in spite of frequent disconnections and random meeting patterns. These networks fall into general category of Delay Tolerant Networks. There are many real networks that follow this model, for example,...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    An Improved Hybrid Peer-to-Peer System With Caching for Distributed Data Sharing

    Peer-to-peer overlay networks are widely used in distributed systems. Based on whether a regular topology is maintained among peers, peer-to-peer networks can be divided into two categories: structured peer-to-peer networks in which peers are connected by a regular topology, and unstructured peer-to-peer networks in which the topology is arbitrary. Structured...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    A Multipurpose Image Processing Technique for Wireless and Wired Networks

    One of the most important and challenging goal of current and future communication network is transmission of high quality images from sender to receiver side quickly with least error where limitation of bandwidth is a prime problem. Here, the authors will discuss a new approach towards compressing and decompressing with...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Data Partitioning for Semantic Web

    Semantic web database is an RDF database. Tremendous increase can be seen in semantic web data, as real life applications of semantic web are using this data. Efficient management of this data at a larger scale, and efficient query performance are the two major concerns. This work aims at analyzing...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    A Correctness Criterion for Eager Approach Validation for Transactional Memory System

    With rise of multi-core systems, Software Transactional Memory (STM) has garnered significant interest as an elegant alternative for developing concurrent code. A (memory) transaction is an unit of code in execution in memory. A Software Transactional Memory system (STM) ensures that a transaction appears either to execute atomically (even in...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    The Effect of Social Online Networking Service on Public Libraries Via Critical Systems Heuristics (CSH) :A Case Study

    Libraries can provide numerous services for users on the use of Web 2.0 technology by promoting library services. In the interactive Web 2.0 environment; (SON) took hold. The Purpose of this paper is to discuss on the impact of Social Online Networking (SON) on library services by a qualitative evaluation...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Digital Watermarking Technique Used for Security of Digital Images During Broadcasting and Telecasting by Using DWT

    Signals are any time varying quantity having lot of Information and have its own frequency. Signal can be classified into random signal, periodic signals, and non-periodic signals, discrete or digital signal. Signal may contain various data like audio, video, or in text format. Signal also has information like images. But...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Performance Analysis of MIMO SFBC CI-COFDM System Against the Nonlinear Distortion and Narrowband Interference

    Carrier Interferometry Coded Orthogonal Frequency Division Multiplexing (CI-COFDM) system has been widely studied in multi-carrier communication system. The CI-COFDM system spreads each coded information symbol across all N sub-carriers using orthogonal CI spreading codes. The CI-COFDM system shows the advantages of Peak to Average Power Ratio (PAPR) reduction, frequency diversity...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Simulation of a Real-Time Bus Arrival Predictor Using RFID and LabVIEW

    Most college and office goers in India use the public buses for daily commuting. The bus network caters to the need of thousands who find it an affordable means of transport. However, the absence of real-time updates in the system poses some very serious problems during the exit period. Large...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Optimal Allocation of FACTS Devices by Using Multi-Objective Optimal Power Flow and Genetic Algorithms

    The introduction of the Flexible AC Transmission System (FACTS) in the power system reduces the losses, reduces the cost of the generation, improves the stability and also improves the load capability of the system. Some application of the Flexible AC Transmission System (FACTS) technologies to existing high voltage power system...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    The Design and Development of Microstrip Patch Antenna Using Simulation Studies by ADS

    The matching network of a Microstrip Patch Antenna at 10.65 GHz was designed and developed using the software Advanced Design System (ADS). ADS is powerful software for designing microwave electronic circuits. The Microstrip Patch antenna thus developed was tested at 10m Far Field Antenna Anechoic Chamber and Momentum Simulation studies...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Carrier to Noise Ratio Performance Evaluation for Optical SSB Signal in Radio Over Fiber System

    The optical and wireless communication systems convergence will activate the potential capacity of photonic technology for providing the expected growth in interactive video, voice communication and data traffic services that are cost effective and a green communication service. The last decade growth of the broadband internet projects the number of...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Research on Data Mining Using Neural Networks

    The application of neural networks in the data mining has become wider. Data mining is the search for relationships and global patterns that exist in large databases but are 'Hidden' among the vast amount of data, such as a relationship between patient data and their medical diagnosis. These relationships represent...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Cross-Layer System for Cluster Based Data Access in MANET'S

    The objective of cooperative caching is to improve data availability, improve access efficiency and reduce query delay in mobile Ad-Hoc networks. Many types of cache replacement algorithms like LRU, LFU, LFRU, LRU-MIN and LFU-MIN are used to improve data accessibility and reduce query delay in cluster based cooperative caching in...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Software Inspection Improves Quality of Software Product

    An electronic tender system (e-tender) streamlines the tender process and thereby saves time and cost. Security requirements for e-tendering systems have not been closely scrutinized in the literature. In addition to the security concerns of conventional e-tender systems - authentication, integrity, privacy, and non-repudiation are provided. This paper identifies key...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Secure E-Tendering Using Identity Based Encryption From Bilinear Pairings

    An electronic tender system (e-tender) streamlines the tender process and thereby saves time and cost. Security requirements for e-tendering systems have not been closely scrutinized in the paper. In addition to the security concerns of conventional e-tender systems - authentication, integrity, privacy, and non-repudiation are provided. This paper identifies key...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Implementation of RED Algorithm to Detect Malicious Packet Losses

    The authors consider the problem of detecting whether a compromised router is maliciously manipulating its stream of packets. In particular, they are concerned with a simple yet effective attack in which a router selectively drops packets destined for some victim. Unfortunately, it is quite challenging to attribute a missing packet...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    A Combined Two Step Approach for Detecting Input Validation Attacks Against Web Applications

    Internet becomes a part of the daily life. Almost very service by the internet will be provided with the help of web applications with these the people can say that without the web application they cannot do anything over the internet but at the same time web applications are mostly...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Intelligent Software Agent Applied To Digital Forensic and Its Usefulness

    Due to the large amount of information produced, accumulated, and distributed via electronic means, it is necessary for forensic experts during crime investigation to increase their abilities to search for important evidence in a timely manner because this is essential to the success of digital forensic examinations. The inadequacy of...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    A Trust Based Sensor Protocol for Information Dissemination in a Point to Point Media

    Securing the information dissemination is an important issue in wireless sensor network. Previously, there is no available work on the integrated design of trust model and SPIN-PP protocol (sensor Protocols for Information via Negotiation) for information dissemination in wireless sensor networks. In this paper, to improve the quality of this...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Analyzing the Performance of Data Dissemination Algorithms to Application Requirements in Wireless Sensor Network

    A Wireless Sensor Network (WSN) is a collection of thousands of tiny sensor nodes having the capability of wireless communication, limited computation and sensing. Many data dissemination protocols have been proposed for multi-hop communication in sensor networks, each evaluated in some scenario. Many protocols are designed to exploit application requirements,...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Study of Wireless Sensor Network in SCADA System for Power Plant

    In this paper, study of wireless SCADA system which is powerful setup for monitoring and controlling the various applications from remotely placed is presented. All communication between GSM modem and user are wireless based, this translates into lowest cost compared to all other systems. Wireless based solutions have universally accepted,...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Performance Comparison of Routing Protocols in MANET Varying Network Size

    A Mobile Ad hoc NETwork (MANET) consists of mobile wireless nodes in which the communication between nodes is carried out without any centralized control. MANET is a self organized and self configurable network where the mobile nodes move arbitrarily. The mobile nodes can receive and forward packets as a router....

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Dual Bootstrap Server Based Super peer Overlay Construction

    Many two-layer hierarchy unstructured Peer-To-Peer (P2P) systems, comprising of superpeers and ordinary peers improved the performance of large scale P2P systems. The construction and maintenance of the superpeer overlay network play an important role in improving the performance P2P systems. One efficient method of constructing the superpeer overlay network is...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Evaluation of Proactive, Reactive and Hybrid Ad Hoc Routing Protocol for Various Battery Models in VANET Using Qualnet

    In VANET high speed is the real characteristic which leads frequent breakdown, interference etc. In this paper, the authors studied various Ad hoc routing protocols, Reactive, Proactive & Hybrid, taking in to consideration various VANET parameters like speed, altitude etc in real traffic scenario and evaluated them for various battery...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Autonomic Diffusion Based Spray Routing in Intermittently Connected Mobile Networks With Multiple Copies

    Intermittently connected mobile Network systems represent a challenging environment for networking research, due to the problems of ensuring messages delivery in spite of frequent disconnections and random meeting patterns. These networks fall into general category of Delay Tolerant Networks. There are many real networks that follow this model, for example,...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    An Improved Hybrid Peer-to-Peer System With Caching for Distributed Data Sharing

    Peer-to-peer overlay networks are widely used in distributed systems. Based on whether a regular topology is maintained among peers, peer-to-peer networks can be divided into two categories: structured peer-to-peer networks in which peers are connected by a regular topology, and unstructured peer-to-peer networks in which the topology is arbitrary. Structured...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    A Multipurpose Image Processing Technique for Wireless and Wired Networks

    One of the most important and challenging goal of current and future communication network is transmission of high quality images from sender to receiver side quickly with least error where limitation of bandwidth is a prime problem. Here, the authors will discuss a new approach towards compressing and decompressing with...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    ICMP, SNMP: Collaborative Approach to Network Discovery and Monitoring

    The algorithm and realization technique of network topology discovery is a very important technical indicator for a network management system's quality. Based on the knowledge of the network topology discovery theory, the research on ICMP and SNMP programming for Windows, this paper proposes a method of developing the common network...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    The Future of IP SAN Using SCVM

    The SCVM, which stands for Storage Concentrator Virtual Machine, creates IP SAN storage as virtual machine, providing the user with the ability to consolidate their virtual data center. The SCVM can fully manage and has features for the storage over local as well as networked VMs. This can be attained...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    Impact of Routing Protocol on Performance of Wireless Ad Hoc Vehicular Network

    Vehicular Ad Hoc NETwork (VANET) is an emerging new technology integrating ad hoc network, Wireless LAN (WLAN) and cellular technology to achieve intelligent inter-vehicle communications and improve road traffic safety and efficiency. VANETs are distinguished from other kinds of ad hoc networks by their hybrid network architectures, node movement characteristics,...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    Localization in Wireless Sensor Network Using MDS

    In this paper, determining the localization of nodes in a Wireless Sensor Network is a very important task, which involves collaboration between sensor nodes. Localization is a fundamental service since it is relevant to many applications and to the network main functions, such as: routing, communication, cluster creation, network coverage,...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    Effective Analysis of Different Parameters in Ad Hoc Network for Different Protocols

    A wireless Ad-hoc network consists of wireless nodes communicating without the need for a centralized administration, in which all nodes potentially contribute to the routing process. A user can move anytime in an ad hoc scenario and, as a result, such a network needs to have routing protocols which can...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Data Partitioning for Semantic Web

    Semantic web database is an RDF database. Tremendous increase can be seen in semantic web data, as real life applications of semantic web are using this data. Efficient management of this data at a larger scale, and efficient query performance are the two major concerns. This work aims at analyzing...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    A Correctness Criterion for Eager Approach Validation for Transactional Memory System

    With rise of multi-core systems, Software Transactional Memory (STM) has garnered significant interest as an elegant alternative for developing concurrent code. A (memory) transaction is an unit of code in execution in memory. A Software Transactional Memory system (STM) ensures that a transaction appears either to execute atomically (even in...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    The Effect of Social Online Networking Service on Public Libraries Via Critical Systems Heuristics (CSH) :A Case Study

    Libraries can provide numerous services for users on the use of Web 2.0 technology by promoting library services. In the interactive Web 2.0 environment; (SON) took hold. The Purpose of this paper is to discuss on the impact of Social Online Networking (SON) on library services by a qualitative evaluation...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Modeling and Simulation of a Single Phase Matrix Converter With Reduce Switch Count as a Buck/Boost Rectifier With Close Loop Control

    This Paper focused on Buck/Boost Rectification by Single Phase Matrix Converter with fewer numbers of switches. The conventional matrix converter consists of 4 bidirectional switches, i.e., 8 set of IGBT/MOSFET with anti parallel diodes. In this proposed matrix converter, only six switches are used. The switch commutation arrangements are also...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2011

    A Soft Computing Platform for Minimizing the Bullwhip Effect

    An unmanaged supply chain is not inherently stable. The bullwhip effect occurs when the demand order variability's in the supply chain are amplified as they moved up the supply chain. Distorted information from one end of a supply chain to the other can lead to tremendous inefficiencies. In this paper...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2011

    Reduction of Context Switches Due to Task Synchronization in Uniprocessor and Multiprocessor Platform

    The problem of frequent context switches in multitasking is a real scheduling overhead which wastes extra CPU cycles, memory and causes much delay in scheduling. This paper focuses on reducing the context switches that result due to blocking when jobs are required to synchronize. The Priority Ceiling Protocol (PCP) is...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2011

    Performance Analysis of ESPRIT Algorithm for Smart Antenna System

    ESPRIT is a high-resolution signal parameter estimation technique based on the translational invariance structure of a sensor array. The ESPRIT algorithm is an attractive solution to many parameter estimation problems due to its low computational cost. The performance of DOA using estimation signal parameter via a rotational invariant technique is...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2011

    Development of a Fuzzy Logic Based Software for Automation of a Single Pool Irrigation Canal

    A fuzzy logic based software for automation of a single pool irrigation canal is presented. Purpose of the software is to control downstream discharge and water level of the canal, by adjusting discharge release from the upstream end and upstream gate settings. The software is developed on a fuzzy control...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Review on Main Memory Database

    The idea of using Main Memory DataBase (MMDB) as physical memory is not new but is in existence quite since a decade. MMDB have evolved from a period when they were only used for caching or in high-speed data systems to a time now in twenty first century when they...

    Provided By Interscience Open Access Journals

  • White Papers // Mar 2012

    Web Search Using Improved Concept Based Query Refinement

    The information extracted from Web pages can be used for effective query expansion. The aspect needed to improve accuracy of web search engines is the inclusion of metadata, not only to analyze Web content, but also to interpret. With the Web of today being unstructured and semantically heterogeneous, keyword-based queries...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2010

    Applications of Two Dimensional Cellular Automata Rules for Block Cipher in Cryptography

    Cellular Automaton is an idealized parallel processing machine which is an array (1-D, 2-D) of numbers or symbols called cell values together with an updating rule. A cell value is updated based on this updating rule, which involves the cell value as well as other cell values in a particular...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2010

    Designing a Cryptosystem by Implementing Reversible Sequential Switching M/C - A Symmetric Key Approach

    This paper introduces an abstract model of reversible sequential machine in designing the cryptosystem based on the symmetric key approach. A reversible sequential machine is a one-to-one mapping old state and input to new state and output. Reversible computing machine is the mapping of old computational state to new computational...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2010

    Cryptanalysis of the Fast Lightweight Mutual Authentication Protocol

    Security counts as a critical barrier to continuing growth of RFID industry due to lack of a proper high performance lightweight protocol-based solution. Amongst recent developments the Fast Lightweight Mutual Authentication Protocol (FLMAP) has been accepted for its superior speed and low complexity features. Here, the authors examine the security...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2010

    Semantic Learning and Web Image Mining With Image Recognition and Classification

    Image mining is more than just an extension of data mining to image domain. Web Image mining is a technique commonly used to extract knowledge directly from images on WWW. Since, main targets of conventional Web mining are numerical and textual data, Web mining for image data is on demand....

    Provided By Interscience Open Access Journals

  • White Papers // Nov 2010

    Studying Security Issues in HPC (Super Computer) Environment

    HPC has evolved from being a buzzword to becoming one of the most exciting areas in the field of Information Technology & Computer Science. Organizations are increasingly looking to HPC to improve operational efficiency, reduce expenditure over time and improve the computational power. Using Super Computers hosted on a particular...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2010

    Development of Optical Character Recognition Software Package for Mobile Phones

    Optical Character Recognition (OCR) is a technique through which any textual information contained in images are extracted and converted into editable text format. The various OCR software packages which are available in desktop computer with scanner suffer from one primary constraint-MOBILITY. The authors have developed an OCR application for mobile...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2010

    Probabilistic Neural Network Based Approach for Handwritten Character Recognition

    In this paper, recognition system for totally unconstrained handwritten characters for south Indian language of Kannada is proposed. The proposed feature extraction technique is based on Fourier Transform and well known Principal Component Analysis (PCA). The system trains the appropriate frequency band images followed by PCA feature extraction scheme. For...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2010

    Time Domain Signal Detection for MIMO OFDM

    The MIMO techniques with OFDM is regarded as a promising solution for increasing data rates, for wireless access qualities of future wireless local area networks, fourth generation wireless communication systems, and for high capacity, as well as better performance. Hence as part of continued research, in this paper an attempt...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2010

    Practical Quantum Cryptography for Secure Free-Space Communications

    Quantum Cryptography is an emerging technology in which two parties may simultaneously generate shared, secret cryptographic key material using the transmission of quantum states of light. The security of these transmissions is based on the inviolability of the laws of quantum mechanics and information - theoretically secure post-processing methods. An...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2010

    Design and Implementation of a (2,2) and a (2,3) Visual Cryptographic Scheme

    In this paper two methods for (2, 2) and (2, 3) Visual Cryptographic Scheme(VCS) is proposed. The first scheme considers 4 pixels of input image at a time and generates 4 output pixels in each share. As 4 output pixels are generated from 4 input pixels dimension and aspect ratio...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2010

    A Simple Scheme for Visual Cryptography

    Here an algorithm is proposed to implement (2, 2) secret sharing problem which reduces the size (resolution) of the generated shares. Instead of considering one pixel at a time to generate the share, two consecutive pixels of the original image are considered row wise. Finally a pixel share having six...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2010

    Elliptic Curve Cryptosystem for Email Encryption

    The idea of information security lead to the evolution of cryptography. In other words, cryptography is the science of keeping information secure. It involves encryption and decryption of messages. The core of cryptography lies in the keys involved in encryption and decryption and maintaining the secrecy of the keys. Another...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2010

    Cellular Automata Based Data Security Scheme in Computer Network Using Single Electron Device

    The internet conceptualized new ways of social interaction, activities globally. Internet serves billions of users worldwide. By the end of 2011it is expected that 22% of the world's population will regularly surf internet. Beside this, internet incorporated high risks for e-users by enabling intruders to gain access via security holes....

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2010

    Call Routing in Contact Center

    Now a day companies uses the contact center to provide service to customer. One of the important challenges of today contact center solution is to align the customer to the most appropriate agent within the time constrain. Call routing is used to for the alignment of customer with agent. Call...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2010

    Enabling Mainframe Assets to Services for SOA

    Service-Oriented Architecture (SOA) is a mechanism for achieving interoperability between heterogeneous systems. SOA enables existing legacy systems to expose their functionality as services, without making significant changes to the legacy systems. Migration towards a Service-Oriented Approach (SOA) not only standardizes interaction, but also allows for more flexibility in the existing...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2010

    Next Gen Smart and Connected Systems

    With the kind of technological advancements such as cloud computing, virtualization, computing grids, etc, that the people are seeing today, soon the hardware and software producers will be under severe pressure to deliver cheaper and cost effective solutions and to combine them with innovate commercial models such as "Pay as...

    Provided By Interscience Open Access Journals