Interscience Open Access Journals

Displaying 281-320 of 442 results

  • White Papers // Jan 2012

    Cross-Layer System for Cluster Based Data Access in MANET'S

    The objective of cooperative caching is to improve data availability, improve access efficiency and reduce query delay in mobile Ad-Hoc networks. Many types of cache replacement algorithms like LRU, LFU, LFRU, LRU-MIN and LFU-MIN are used to improve data accessibility and reduce query delay in cluster based cooperative caching in...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Role of Web Services in Migration of Legacy System to Service-Oriented Architecture

    Managing the convolution of systems is considered as a key confront in computing and is transact with numerous expansion projected at enhanced computerization. Service-Oriented Architectures (SOA) are predicted to facilitate the prerequisite of a large quantity of varied and contending web services which the potential users will be capable to...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Improving Software Modularity Using AOP

    Software modularity is a software design technique that increases the level to which software is composed of separate interchangeable components called modules. The modules are devised by breaking down the program functions. Each module accomplishes one function and contains all that is necessary to accomplish it. Modules represent a separation...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Model Based Software Development: Issues & Challenges

    One of the goals of software design is to model a system in such a way that it is easily understandable. Nowadays the tendency for software development is changing from manual coding to automatic code generation; it is becoming model-based. This is a response to the software crisis, in which...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Software Inspection Improves Quality of Software Product

    An electronic tender system (e-tender) streamlines the tender process and thereby saves time and cost. Security requirements for e-tendering systems have not been closely scrutinized in the literature. In addition to the security concerns of conventional e-tender systems - authentication, integrity, privacy, and non-repudiation are provided. This paper identifies key...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Secure E-Tendering Using Identity Based Encryption From Bilinear Pairings

    An electronic tender system (e-tender) streamlines the tender process and thereby saves time and cost. Security requirements for e-tendering systems have not been closely scrutinized in the paper. In addition to the security concerns of conventional e-tender systems - authentication, integrity, privacy, and non-repudiation are provided. This paper identifies key...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Implementation of RED Algorithm to Detect Malicious Packet Losses

    The authors consider the problem of detecting whether a compromised router is maliciously manipulating its stream of packets. In particular, they are concerned with a simple yet effective attack in which a router selectively drops packets destined for some victim. Unfortunately, it is quite challenging to attribute a missing packet...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    A Combined Two Step Approach for Detecting Input Validation Attacks Against Web Applications

    Internet becomes a part of the daily life. Almost very service by the internet will be provided with the help of web applications with these the people can say that without the web application they cannot do anything over the internet but at the same time web applications are mostly...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Intelligent Software Agent Applied To Digital Forensic and Its Usefulness

    Due to the large amount of information produced, accumulated, and distributed via electronic means, it is necessary for forensic experts during crime investigation to increase their abilities to search for important evidence in a timely manner because this is essential to the success of digital forensic examinations. The inadequacy of...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Flaws in Endair-A Secure Routing Protocol for MANETS

    Routing is the one of the essential criteria at network level in mobile ad hoc networks. Ad hoc network routing protocols are difficult to design, and secure because unable to handle rapid node mobility and network topology changes. It has been realized by many researchers, and several "Secure" routing protocols...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Application of Data Mining Using Bayesian Belief Network To Classify Quality of Web Services

    In this paper, the authors employed Na?ve Bayes, Augmented Na?ve Bayes, Tree Augmented Na?ve Bayes, Sons & Spouses, Markov Blanket, Augmented Markov Blanket, Semi Supervised and Bayesian network techniques to rank web services. The Bayesian Network is demonstrated on a dataset taken from literature. The dataset consists of 364 web...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    A Novel Steganographic Algorithm and Hashing to Improve Authentication Using Mobile Phones

    Security has become major issue in all online services. Strong authentication is provided conveniently using mobile phone as security token. While sending security token to user mobile via GSM network, it is vulnerable to several attacks. The authors can avoid them using Steganography which enforces the security of hashing algorithms....

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Modeling and Simulation of a Single Phase Matrix Converter With Reduce Switch Count as a Buck/Boost Rectifier With Close Loop Control

    This Paper focused on Buck/Boost Rectification by Single Phase Matrix Converter with fewer numbers of switches. The conventional matrix converter consists of 4 bidirectional switches, i.e., 8 set of IGBT/MOSFET with anti parallel diodes. In this proposed matrix converter, only six switches are used. The switch commutation arrangements are also...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    A Lime Light on the Emerging Trends of Web Mining

    The World Wide Web is a huge, information center for a variety of applications. Web contains a dynamic and rich collection of hyperlink information. It allows Web page access, usage of information and provides numerous sources for data mining. The goal of Web mining is to discover the pattern of...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    A Novel Traffic Tracking System Based on Division of Video Into Frames and Processing

    This paper is to visualize and analyze video. Videos are sequence of image frames. In this work, algorithm will be developed to analyze a frame and the same will be applied to all frames in a video. It is expected see unwanted objects in video frame, which can be removed...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Mechanism to Mitigate Application Layer DDoS Attack With a Light Weight Trust Approach

    New application layer DDoS attacks is a continuous critical threat to which network layer solutions is not applicable as attackers are indistinguishable based on packets or protocols. The increase in Internet-based transactions and communications offers new opportunities for hackers to disrupt business operations with DDoS attacks to prevent legitimate users...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Goal Programming Approach for Selection of COTS Components in Designing a Fault Tolerant Modular Software System under Consensus Recovery Block Scheme

    The application of computer systems has now crossed many different fields. Systems are becoming more software intensive. The requirements of the customer for a more reliable software led to the fact that software reliability is now an important research area. One method to improve software reliability is by the application...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    SMS Text Compression Through IDBE (Intelligent Dictionary Based Encoding) for Effective Mobile Storage Utilization

    Effective storage utilization is the key concept for better working of any operating system. Even operating systems used for mobile phones are not an exception for this fact. This paper proposes a technique for maximizing the utilization of the storage space present in mobile phones. Thus, it is important to...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Secure Efficient On-Demand Insider Attacks Multicast Routing Protocol in Wireless Networks

    Wireless multicast routing send and receives the data source to destination. High error rates, unfixed and changeable self of the signal power and broadcast change with time and environment regularly result in not effective links. These services more weak to internal attacks coming from compromised nodes that behave randomly to...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Spectral Minutiae Fingerprint Recognition System

    Biometrics refers to the automatic recognition of individuals based on their physiological and/or behavioral characteristics, such as faces, finger prints, iris, and gait. In this paper, the authors focus on the application of finger print recognition system. The spectral minutiae fingerprint recognition is a method to represent a minutiae set...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Facial Expression Recognition System Using Facial Characteristic Points and ID3

    Facial expression is one of the most powerful, natural, and abrupt means for human beings which have the knack to communicate emotion and regulate inter-personal behaviour. In this paper, the authors present a novel approach for facial expression detection using decision tree. Facial expression information is mostly concentrate on facial...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Implementation of MHMIP and Comparing the Performance With MIP and DHMIP in Mobile Networks

    Managing the mobility efficiently in wireless networks causes critical issue, in order to support mobile users. To support global mobility in IP networks the Mobile Internet Protocol (MIP) has been proposed. The Hierarchical MIP (HMIP) and Dynamic HMIP (DHMIP) strategies are also proposed for providing high signaling delay. The authors'...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    CMA Channel Equalization Through an Adaptive MMSE Equalizer Based RLS Algorithm

    The adaptive algorithm has been widely used in the digital signal processing like channel estimation, channel equalization, echo cancellation, and so on. One of the most important adaptive algorithms is the RLS algorithm. The authors present in this paper n multiple objective optimization approach to fast blind channel equalization. By...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    An Efficient Authentication Protocol for Security in Mobile Ad Hoc Networks

    Mobile Ad hoc NETworks (MANETs) is a collection of mobile nodes that communicate by forming a network dynamically that lacks fixed infrastructure and centralized control. Secure routing is of at most importance in such networks because of dynamically changing topologies, absence of centralized monitoring points and lack of clear lines...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Simulation of DSDV Protocol

    An ad-hoc network is the cooperative engagement of a collection of Mobile Hosts without the required intervention of any centralized Access Point. This Application is the innovative design for the operation of such ad-hoc networks. The basic idea of the design is to operate each Mobile Host as a specialized...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Preemptive Routing & Intrusion Detection for MANETs

    An ad-hoc network will often change rapidly in topology, this courses for routes in the network to often disappear and new to arise. The Ad-hoc On-Demand Distance Vector Routing Protocol(AODV), is based on the principle of discover routes as needed. In this paper, the authors will extend the definition of...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Embedded Smart Car Security System on Face Detection

    In this proposed embedded car security system, FDS (Face Detection System) is used to detect the face of the driver and compare it with the predefined face. For example, in the night when the car's owner is sleeping and someone theft the car then FDS obtains images by one tiny...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Clustering Algorithms for High Dimensional Data - A Survey of Issues and Existing Approaches

    Clustering is the most prominent data mining technique used for grouping the data into clusters based on distance measures. With the advent growth of high dimensional data such as microarray gene expression data, and grouping high dimensional data into clusters will encounter the similarity between the objects in the full...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Requisite for Web Usage Mining - A Survey

    The World Wide Web (Web) has been providing an important and indispensable platform for receiving information and disseminating information as well as interacting with society on the Internet. With its astronomical growth over the past decade, the web becomes huge, diverse and dynamic. The application of data mining techniques to...

    Provided By Interscience Open Access Journals

  • White Papers // Nov 2011

    Design of a New Double Pulse Latch Flip Flop

    In this paper, the authors present a new double pulse flip-flop, which is composed of a pulse generator and latch part. DPLFF consumes less power and few transistor compare to other flip-flop. As feature size of the CMOS technology continues to scale down, leakage power has become an ever-increasing important...

    Provided By Interscience Open Access Journals

  • White Papers // Nov 2011

    A Modified Approach to the New Lossless Data Compression Method

    This paper proposed the modified approach to the new lossless data compression method. It is developed based on hiding data reversibly with a location map. It performs same as the earlier algorithm but it stands on lossless strategy where as the former approach could not do it. It can compress...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2011

    Min Max Normalization Based Data Perturbation Method for Privacy Protection

    Data mining system contain large amount of private and sensitive data such as healthcare, financial and criminal records. These private and sensitive data can not be share to every one, so privacy protection of data is required in data mining system for avoiding privacy leakage of data. Data perturbation is...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2011

    A Soft Computing Platform for Minimizing the Bullwhip Effect

    An unmanaged supply chain is not inherently stable. The bullwhip effect occurs when the demand order variability's in the supply chain are amplified as they moved up the supply chain. Distorted information from one end of a supply chain to the other can lead to tremendous inefficiencies. In this paper...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2011

    Reduction of Context Switches Due to Task Synchronization in Uniprocessor and Multiprocessor Platform

    The problem of frequent context switches in multitasking is a real scheduling overhead which wastes extra CPU cycles, memory and causes much delay in scheduling. This paper focuses on reducing the context switches that result due to blocking when jobs are required to synchronize. The Priority Ceiling Protocol (PCP) is...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2011

    Performance Analysis of ESPRIT Algorithm for Smart Antenna System

    ESPRIT is a high-resolution signal parameter estimation technique based on the translational invariance structure of a sensor array. The ESPRIT algorithm is an attractive solution to many parameter estimation problems due to its low computational cost. The performance of DOA using estimation signal parameter via a rotational invariant technique is...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2011

    Development of a Fuzzy Logic Based Software for Automation of a Single Pool Irrigation Canal

    A fuzzy logic based software for automation of a single pool irrigation canal is presented. Purpose of the software is to control downstream discharge and water level of the canal, by adjusting discharge release from the upstream end and upstream gate settings. The software is developed on a fuzzy control...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2011

    GPS Based Bluetooth Broadcasting - Long Range Solution

    In this paper, GPS based Bluetooth broadcasting for long range is proposed. System model for Long range broadcasting of messages with multiple piconets and dynamically created threshold devices, based on GPS information is presented. The authors' simulation results have shown that, message can be received by those devices which are...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2011

    Multi-Gigabit Pattern for Data in Network Security

    In the current scenario network security is emerging the world. Matching large sets of patterns against an incoming stream of data is a fundamental task in several fields such as network security or computational biology. High-speed network Intrusion Detection Systems (IDS) rely on efficient pattern matching techniques to analyze the...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2011

    VANET: Performance Comparison of BNGF Method in Different Vehicular Traffic Scenarios

    A Vehicular Ad hoc NETwork (VANET) is a wireless ad hoc network that is formed between vehicles on an on demand basis. A lot of research work around the world is being conducted to design the routing protocols for VANETs. In this paper, the authors examine the significance Greedy Forwarding...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2011

    A High Performance DDR3 SDRAM Controller

    The paper presents the implementation of compliant DDR3 memory controller. It discusses the overall architecture of the DDR3 controller along with the detailed design and operation of its individual sub blocks, the pipelining implemented in the design to increase the design throughput. It also discusses the advantages of DDR3 memories...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2012

    EBDP Buffer Sizing Strategy 802.11 Based WLANS

    In this paper, the authors present wired routers, for whom the sizing of buffers is an active research topic. The classical rule of thumb for sizing wired buffers is to set buffer sizes to be the product of the bandwidth and the average delay of the flows utilizing this link,...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2012

    Performance Optimization in Networks Serving Heterogeneous Flows

    Channel-aware scheduling strategies have emerged as an effective mechanism for improving the throughput of wireless data users by exploiting rate variations. The improvement in throughput comes however at the expense of an increase in the variability of the service rate received over time. While the larger variability only has a...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2012

    Ontology for Automatic Acquisition Web User Information

    Information retrieval has a well-established tradition of performing laboratory experiments on test collections to compare the relative effectiveness of different retrieval approaches. The experimental design specifies the evaluation criterion to be used to determine if one approach is better than another. Retrieval behavior is sufficiently complex to be difficult to...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2012

    Neighbourhood Load Routing and Multi-Channels in Wireless Mesh Networks

    As an emerging technology, wireless mesh networks are making significant progress in the area of wireless networks in recent years. Routing in Wireless Mesh Network (WMN) is challenging because of the unpredictable variations of the wireless environment. Traditional mechanisms have been proved that the routing performance would get deteriorated and...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2012

    Counting Bloom Filter Architecture in VLSI Network Systems

    The Counting Bloom Filter (CBF) is useful for real time applications where the time and space efficiency is the main consideration in performing a set membership tests. The CBF estimates whether an element is present in a large array or not by allowing false positives and by not permitting false...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2012

    Minimization of Load Based Resources in Cloud Computing Systems

    Cloud computing is a term, which involves virtualization, distributed computing, networking, software and Web services. The authors' objective is to develop an effective load balancing algorithm using Divisible Load Scheduling Theorem to maximize or minimize different performance parameters (throughput, latency for example) for the clouds of different sizes. Central to...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2012

    Evolution of Crowd-Sourcing From Computer to Mobile Systems

    As crowd-sourcing is becoming popular for problem solving and completing a task, it is now very important to use this concept in an advance manner. It can also be used as a distributed and vast source of information. This concept is now evolving in world of mobile systems. This will...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2012

    Simulation and Performance Analysis Evaluation for Multipath Extension of Aodv to Improve End to End Delay, Route Error Sent, Routing Load and Packet Drop Ratio

    This paper describes improvement in standard routing protocol AODV for mobile ad-hoc networks. The mechanism setups multiple optimal paths based on bandwidth and delay. It allows to store multiple optimal paths based on Bandwidth and delay. At time of link failure, it will switch to next available path. To set...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2012

    GSM Based Intelligent Wireless Mobile Patient Monitoring System Using ZIGBEE Communication

    Miniaturization of biomedical sensors helped the fast development and popularization of information processing and wireless data transmission technology, the research of wireless medical monitoring system has became a hot topic. By utilizing the wireless technique to transmit information between medical sensor and monitoring control center, the free space of patients...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2012

    HTCPM: A Hybrid Test Case Prioritization Model for Web and GUI Applications

    Web and Event-Driven Applications (EDS) is a class of applications that is quickly becoming ubiquitous. All EDS take sequences of events (e.g., messages, mouse-clicks) as input, change their state, and produce an output (e.g., events, system calls, text messages), where as in web, user session data gathered as users operate...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    An Efficient Three Step Algorithm for Fast Motion Estimation in Mobile Domain

    The goal of this paper is to find a fast method for motion estimation and motion segmentation using proposed model. Recent day Communication between ends is facilitated by the development in the area of wired and wireless networks. Block matching algorithms are very useful in achieving the efficient and acceptable...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Comparative Analysis of AODV and DSR To Achieve Group Communication in Manet

    Secure group communication is a challenging task with respect to MANET's. Since its introduction as a communication medium, wireless technology found broad application on the battlefield. Robust and reliable group communication plays a major role in developing distributed mobile application in which unannounced disconnections will occur frequently due to the...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Eon of Implementing a Multifaceted Cloud Based Ocr in Apple's Compassionate App Store Milieu

    Cloud architectures discourse key hitches surrounding large-scale data dispensation. In customary data processing it is grim to get as many machines as an application needs. Second, it is difficult to get the machines when one needs them. Third, it is difficult to dispense and harmonize a large-scale job on different...

    Provided By Interscience Open Access Journals

  • White Papers // Mar 2012

    Record Matching for Web Databases by Domain-Specific Query Probing

    Record matching refers to the task of finding entries that refer to the same entity in two or more files, is a vital process in data integration. Most of the record matching methods are supervised, which requires the user to provide training data. These methods are not applicable for web...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Internet Access in Remote Areas Using NXP Microcontroller and GSM Modem

    In India and many developing and under-developed countries, providing internet facility to many school-going students is still a far-fetched concept. In this paper, which is based on the authors' project, they propose a new system which circumvents the internet architecture by using GSM infrastructure to access internet services, albeit on...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Self-Managing Performance in Application Servers - Modelling and Data Architecture

    High performance is always a desired objective in computing systems. Managing performance through manual intervention is a well-known and obvious mechanism. The attempts to self-manage performance with minimal human intervention are pre-dominant in the recent advances of research. Control Systems theory is playing a significant role in building such intelligent...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Automated Swim (Single Window Infrastructure Management) for Cloud

    Data centers manage complex server environments, including physical and virtual machines, across a wide variety of platforms, and often in geographically dispersed locations. Information Technology managers are responsible for ensuring that servers in these increasingly complex environments are properly configured and monitored throughout the IT life cycle. They also face...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Improved Near Duplicate Matching Scheme for E-Mail Spam Detection

    Today the major problem that the people are facing is spam mails or e-mail spam. In recent years there are so many schemes are developed to detect the spam emails. Here the primary idea of the similarity matching scheme for spam detection is to maintain a known spam database, formed...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Smart Worms Defense and Detection

    There are several worm attacks in the recent years, this leads to an essentiality of producing new detection technique for worm attacks. In this paper, the authors present a spectrum based smart worm detection scheme, this is based on the idea of detection of worm in the frequency domain. This...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Use of Web Harvesting Technique

    Web harvesting (Web data extraction) is a computer software technique of extracting information from websites. Usually, such software programs simulate human exploration of the Web by either implementing low-level Hyper-Text Transfer Protocol (HTTP), or embedding certain full-fledged Web browsers. Web harvesting is closely related to Web indexing, which indexes information...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    An Efficient Multi-Constrained Feasible Path Selection for Manet

    Quality-of-Service (QoS) routing in an ad-hoc network is difficult because the network topology may change constantly and the available state information for routing is inherently imprecise. This paper proposes a method for multi-constrained feasible path selection for MANET. The authors introduce the composite function which allows OLSR to find the...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Review of XY Routing Algorithm for Network-on-Chip Architecture

    The Network-on-Chip (NoC) is Network-version of System-on-Chip (SoC) means that on-chip communication is done through packet based networks. In NOC topology, routing algorithm and switching are main terminology. The routing algorithm is one of the key factor in NOC architecture. The routing algorithm, which defines as the path taken by...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Raptor Code Based Secure Storage in Cloud Computing

    The end of this decade is marked by a paradigm shift of the industrial information technology towards a pay-peruse service business model known as cloud computing. Cloud data storage redefines the security issues targeted on customer's outsourced data. To ensure the correctness of users' data in the cloud, the authors...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Improved Security System in Mobile Cloud Access Through Fuzzy Intrusion Detection Technique

    Mobile phones are playing a vital role in every one's life. The computing strategy of mobile internet usage is lower than the mobile usage, this may due to the security threat. In general mobility and cloud computing initializing the global marketing, sales and development activities using mobile platforms to market...

    Provided By Interscience Open Access Journals

  • White Papers // Mar 2012

    Dynamic Resource Management in Large Cloud Environments Using Distributed Gossip Protocol

    Resource management poses particular challenges in large-scale systems, such as server clusters that simultaneously process requests from a large number of clients. The authors mainly focus on the dynamic resource management in large scale cloud environment. Their core contribution centers around outlining a distributed middleware architecture and presenting one of...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Secured Cloud Environment with a New Approach

    Cloud computing is the technology of resource sharing in the present setup, where in the users never look to buy a resource in terms of software, hardware, and many as such only in the name of pay for use it is being used but they have to face big issue...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Testing As A Service (TAAS) - An Enhanced Security Framework for TAAS in Cloud Environment

    Testing becomes an important process not only in terms of exposure but also in terms of performance, safety, usability. Test Environment that directly represents the production environment is too expensive in terms of hardware, software licenses and more people. Cloud computing supports an everything as a service (XaaS) Delivery model....

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Modeling and Simulation of a Single Phase Matrix Converter With Reduce Switch Count as a Buck/Boost Rectifier With Close Loop Control

    This Paper focused on Buck/Boost Rectification by Single Phase Matrix Converter with fewer numbers of switches. The conventional matrix converter consists of 4 bidirectional switches, i.e., 8 set of IGBT/MOSFET with anti parallel diodes. In this proposed matrix converter, only six switches are used. The switch commutation arrangements are also...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2011

    A Soft Computing Platform for Minimizing the Bullwhip Effect

    An unmanaged supply chain is not inherently stable. The bullwhip effect occurs when the demand order variability's in the supply chain are amplified as they moved up the supply chain. Distorted information from one end of a supply chain to the other can lead to tremendous inefficiencies. In this paper...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2011

    Reduction of Context Switches Due to Task Synchronization in Uniprocessor and Multiprocessor Platform

    The problem of frequent context switches in multitasking is a real scheduling overhead which wastes extra CPU cycles, memory and causes much delay in scheduling. This paper focuses on reducing the context switches that result due to blocking when jobs are required to synchronize. The Priority Ceiling Protocol (PCP) is...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2011

    Performance Analysis of ESPRIT Algorithm for Smart Antenna System

    ESPRIT is a high-resolution signal parameter estimation technique based on the translational invariance structure of a sensor array. The ESPRIT algorithm is an attractive solution to many parameter estimation problems due to its low computational cost. The performance of DOA using estimation signal parameter via a rotational invariant technique is...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2011

    Development of a Fuzzy Logic Based Software for Automation of a Single Pool Irrigation Canal

    A fuzzy logic based software for automation of a single pool irrigation canal is presented. Purpose of the software is to control downstream discharge and water level of the canal, by adjusting discharge release from the upstream end and upstream gate settings. The software is developed on a fuzzy control...

    Provided By Interscience Open Access Journals

  • White Papers // Nov 2010

    A Goal Driven Framework for Service Discovery in Service-Oriented Architecture: A Multiagent Based Approach

    Automated service discovery is one of the very important features in any Semantic Web Service (SWS) based framework. Achieving this functionality in e-resource sharing system is not an easy task due to its hugeness and heterogeneity among the available resources. Any efficient automated service discovery will remain worthless until discovered...

    Provided By Interscience Open Access Journals

  • White Papers // Nov 2010

    Web-Based Tool for Automatic Assignment Evaluation

    The demands for teachers in most educational institutions are continually increasing. Teachers have to teach an increasing number of students every year while simultaneously providing meaningful and constructive feedback and correcting assignments in a minimal amount of time. Consequently, results and assessment of student's progress can be considerably delayed. The...

    Provided By Interscience Open Access Journals

  • White Papers // Nov 2010

    Evaluating XPath Expressions on Light Weight BitCube

    XML has become a popular way of storing data and hence has also become a new standard for exchanging and representing data on internet. Many techniques have been proposed for indexing and retrieval of XML documents such as XTree, BitCube. In this paper a indexing structure known as Light Weight...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2012

    An Area Efficient 32-Bit Carry-Select Adder for Low Power Applications

    CSLA is used in many computational systems to alleviate the problem of carry propagation delay by independently generating multiple carries and then select a carry to generate the sum. However, the CSLA is not area efficient because it uses multiple pairs of Ripple Carry Adders (RCA) to generate partial sum...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2012

    Edge-Triggered Pulsed Sequential Elements With SoC Applications

    The System-On-Chip (SoC) design is integrating hundreds of millions of transistors on one chip, whereas packaging and cooling only have a limited ability to remove the excess heat. In this paper, various design techniques for a low power clocking system are surveyed. Among them is an effective way to reduce...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2012

    Load Balancing in Computational Grids Using Ant Colony Optimization Algorithm

    Grid computing is the combination of computer resources from multiple administrative domains for a common goal. Load balancing is one of the critical issues that must be considered in managing a grid computing environment. It is complicated due to the distributed and heterogeneous nature of the resources. An ant colony...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2012

    Novel Techniques to Eradicate Energy Inefficiencies That Abbreviate the Lifetime of the Cell Phone Based WSNs

    The cell phone based WSN of compressed micro-sensors for data acquirement and supervise some surroundings distinctiveness, such as noise, trembling, temperature, and strain. These sensors are entrenched devices accomplished of data communication. In numerous of applications, sensor nodes are deployed over a geo-graphically large region. Due to their configuration, data...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2012

    Clustering Based Classification and Analysis of Data

    This paper presents clustering based document classification and analysis of data. The proposed clustering based classification and analysis of data approach is based on unsupervised and supervised document classification. In this paper unsupervised document and supervised document classification are used. In this approach document collection, text preprocessing, feature selection, indexing,...

    Provided By Interscience Open Access Journals