Interscience Open Access Journals

Displaying 281-320 of 434 results

  • White Papers // Jan 2012

    An Efficient Authentication Protocol for Security in Mobile Ad Hoc Networks

    Mobile Ad hoc NETworks (MANETs) is a collection of mobile nodes that communicate by forming a network dynamically that lacks fixed infrastructure and centralized control. Secure routing is of at most importance in such networks because of dynamically changing topologies, absence of centralized monitoring points and lack of clear lines...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Simulation of DSDV Protocol

    An ad-hoc network is the cooperative engagement of a collection of Mobile Hosts without the required intervention of any centralized Access Point. This Application is the innovative design for the operation of such ad-hoc networks. The basic idea of the design is to operate each Mobile Host as a specialized...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Preemptive Routing & Intrusion Detection for MANETs

    An ad-hoc network will often change rapidly in topology, this courses for routes in the network to often disappear and new to arise. The Ad-hoc On-Demand Distance Vector Routing Protocol(AODV), is based on the principle of discover routes as needed. In this paper, the authors will extend the definition of...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Embedded Smart Car Security System on Face Detection

    In this proposed embedded car security system, FDS (Face Detection System) is used to detect the face of the driver and compare it with the predefined face. For example, in the night when the car's owner is sleeping and someone theft the car then FDS obtains images by one tiny...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    A Lime Light on the Emerging Trends of Web Mining

    The World Wide Web is a huge, information center for a variety of applications. Web contains a dynamic and rich collection of hyperlink information. It allows Web page access, usage of information and provides numerous sources for data mining. The goal of Web mining is to discover the pattern of...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    A Novel Traffic Tracking System Based on Division of Video Into Frames and Processing

    This paper is to visualize and analyze video. Videos are sequence of image frames. In this work, algorithm will be developed to analyze a frame and the same will be applied to all frames in a video. It is expected see unwanted objects in video frame, which can be removed...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Mechanism to Mitigate Application Layer DDoS Attack With a Light Weight Trust Approach

    New application layer DDoS attacks is a continuous critical threat to which network layer solutions is not applicable as attackers are indistinguishable based on packets or protocols. The increase in Internet-based transactions and communications offers new opportunities for hackers to disrupt business operations with DDoS attacks to prevent legitimate users...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Research on Data Mining Using Neural Networks

    The application of neural networks in the data mining has become wider. Data mining is the search for relationships and global patterns that exist in large databases but are 'Hidden' among the vast amount of data, such as a relationship between patient data and their medical diagnosis. These relationships represent...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Cross-Layer System for Cluster Based Data Access in MANET'S

    The objective of cooperative caching is to improve data availability, improve access efficiency and reduce query delay in mobile Ad-Hoc networks. Many types of cache replacement algorithms like LRU, LFU, LFRU, LRU-MIN and LFU-MIN are used to improve data accessibility and reduce query delay in cluster based cooperative caching in...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Software Inspection Improves Quality of Software Product

    An electronic tender system (e-tender) streamlines the tender process and thereby saves time and cost. Security requirements for e-tendering systems have not been closely scrutinized in the literature. In addition to the security concerns of conventional e-tender systems - authentication, integrity, privacy, and non-repudiation are provided. This paper identifies key...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Secure E-Tendering Using Identity Based Encryption From Bilinear Pairings

    An electronic tender system (e-tender) streamlines the tender process and thereby saves time and cost. Security requirements for e-tendering systems have not been closely scrutinized in the paper. In addition to the security concerns of conventional e-tender systems - authentication, integrity, privacy, and non-repudiation are provided. This paper identifies key...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Implementation of RED Algorithm to Detect Malicious Packet Losses

    The authors consider the problem of detecting whether a compromised router is maliciously manipulating its stream of packets. In particular, they are concerned with a simple yet effective attack in which a router selectively drops packets destined for some victim. Unfortunately, it is quite challenging to attribute a missing packet...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    A Combined Two Step Approach for Detecting Input Validation Attacks Against Web Applications

    Internet becomes a part of the daily life. Almost very service by the internet will be provided with the help of web applications with these the people can say that without the web application they cannot do anything over the internet but at the same time web applications are mostly...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Intelligent Software Agent Applied To Digital Forensic and Its Usefulness

    Due to the large amount of information produced, accumulated, and distributed via electronic means, it is necessary for forensic experts during crime investigation to increase their abilities to search for important evidence in a timely manner because this is essential to the success of digital forensic examinations. The inadequacy of...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Flaws in Endair-A Secure Routing Protocol for MANETS

    Routing is the one of the essential criteria at network level in mobile ad hoc networks. Ad hoc network routing protocols are difficult to design, and secure because unable to handle rapid node mobility and network topology changes. It has been realized by many researchers, and several "Secure" routing protocols...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Application of Data Mining Using Bayesian Belief Network To Classify Quality of Web Services

    In this paper, the authors employed Na?ve Bayes, Augmented Na?ve Bayes, Tree Augmented Na?ve Bayes, Sons & Spouses, Markov Blanket, Augmented Markov Blanket, Semi Supervised and Bayesian network techniques to rank web services. The Bayesian Network is demonstrated on a dataset taken from literature. The dataset consists of 364 web...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    A Novel Steganographic Algorithm and Hashing to Improve Authentication Using Mobile Phones

    Security has become major issue in all online services. Strong authentication is provided conveniently using mobile phone as security token. While sending security token to user mobile via GSM network, it is vulnerable to several attacks. The authors can avoid them using Steganography which enforces the security of hashing algorithms....

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Role of Web Services in Migration of Legacy System to Service-Oriented Architecture

    Managing the convolution of systems is considered as a key confront in computing and is transact with numerous expansion projected at enhanced computerization. Service-Oriented Architectures (SOA) are predicted to facilitate the prerequisite of a large quantity of varied and contending web services which the potential users will be capable to...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Improving Software Modularity Using AOP

    Software modularity is a software design technique that increases the level to which software is composed of separate interchangeable components called modules. The modules are devised by breaking down the program functions. Each module accomplishes one function and contains all that is necessary to accomplish it. Modules represent a separation...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Model Based Software Development: Issues & Challenges

    One of the goals of software design is to model a system in such a way that it is easily understandable. Nowadays the tendency for software development is changing from manual coding to automatic code generation; it is becoming model-based. This is a response to the software crisis, in which...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Modeling and Simulation of a Single Phase Matrix Converter With Reduce Switch Count as a Buck/Boost Rectifier With Close Loop Control

    This Paper focused on Buck/Boost Rectification by Single Phase Matrix Converter with fewer numbers of switches. The conventional matrix converter consists of 4 bidirectional switches, i.e., 8 set of IGBT/MOSFET with anti parallel diodes. In this proposed matrix converter, only six switches are used. The switch commutation arrangements are also...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Clustering Algorithms for High Dimensional Data - A Survey of Issues and Existing Approaches

    Clustering is the most prominent data mining technique used for grouping the data into clusters based on distance measures. With the advent growth of high dimensional data such as microarray gene expression data, and grouping high dimensional data into clusters will encounter the similarity between the objects in the full...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Requisite for Web Usage Mining - A Survey

    The World Wide Web (Web) has been providing an important and indispensable platform for receiving information and disseminating information as well as interacting with society on the Internet. With its astronomical growth over the past decade, the web becomes huge, diverse and dynamic. The application of data mining techniques to...

    Provided By Interscience Open Access Journals

  • White Papers // Nov 2011

    A Modified Approach to the New Lossless Data Compression Method

    This paper proposed the modified approach to the new lossless data compression method. It is developed based on hiding data reversibly with a location map. It performs same as the earlier algorithm but it stands on lossless strategy where as the former approach could not do it. It can compress...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2011

    Min Max Normalization Based Data Perturbation Method for Privacy Protection

    Data mining system contain large amount of private and sensitive data such as healthcare, financial and criminal records. These private and sensitive data can not be share to every one, so privacy protection of data is required in data mining system for avoiding privacy leakage of data. Data perturbation is...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2011

    GPS Based Bluetooth Broadcasting - Long Range Solution

    In this paper, GPS based Bluetooth broadcasting for long range is proposed. System model for Long range broadcasting of messages with multiple piconets and dynamically created threshold devices, based on GPS information is presented. The authors' simulation results have shown that, message can be received by those devices which are...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2011

    Multi-Gigabit Pattern for Data in Network Security

    In the current scenario network security is emerging the world. Matching large sets of patterns against an incoming stream of data is a fundamental task in several fields such as network security or computational biology. High-speed network Intrusion Detection Systems (IDS) rely on efficient pattern matching techniques to analyze the...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2011

    VANET: Performance Comparison of BNGF Method in Different Vehicular Traffic Scenarios

    A Vehicular Ad hoc NETwork (VANET) is a wireless ad hoc network that is formed between vehicles on an on demand basis. A lot of research work around the world is being conducted to design the routing protocols for VANETs. In this paper, the authors examine the significance Greedy Forwarding...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2011

    A Soft Computing Platform for Minimizing the Bullwhip Effect

    An unmanaged supply chain is not inherently stable. The bullwhip effect occurs when the demand order variability's in the supply chain are amplified as they moved up the supply chain. Distorted information from one end of a supply chain to the other can lead to tremendous inefficiencies. In this paper...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2011

    Reduction of Context Switches Due to Task Synchronization in Uniprocessor and Multiprocessor Platform

    The problem of frequent context switches in multitasking is a real scheduling overhead which wastes extra CPU cycles, memory and causes much delay in scheduling. This paper focuses on reducing the context switches that result due to blocking when jobs are required to synchronize. The Priority Ceiling Protocol (PCP) is...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2011

    Performance Analysis of ESPRIT Algorithm for Smart Antenna System

    ESPRIT is a high-resolution signal parameter estimation technique based on the translational invariance structure of a sensor array. The ESPRIT algorithm is an attractive solution to many parameter estimation problems due to its low computational cost. The performance of DOA using estimation signal parameter via a rotational invariant technique is...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2011

    Development of a Fuzzy Logic Based Software for Automation of a Single Pool Irrigation Canal

    A fuzzy logic based software for automation of a single pool irrigation canal is presented. Purpose of the software is to control downstream discharge and water level of the canal, by adjusting discharge release from the upstream end and upstream gate settings. The software is developed on a fuzzy control...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2011

    A High Performance DDR3 SDRAM Controller

    The paper presents the implementation of compliant DDR3 memory controller. It discusses the overall architecture of the DDR3 controller along with the detailed design and operation of its individual sub blocks, the pipelining implemented in the design to increase the design throughput. It also discusses the advantages of DDR3 memories...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2011

    EARM: An Efficient and Adaptive File Replication With Consistency Maintenance in P2P Systems

    In p2p systems, file replication and replica consistency maintenance are most widely used techniques for better system performance. Most of the file replication methods replicates file in all nodes or at two ends in a client-server query path or close to the server, leading to low replica utilization, produces unnecessary...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2011

    Proposed Design for Circular Antenna and Half Ring Antenna for UWB Application

    In this paper, Ultra wideband planar circular patch and half circular ring patch antennas are proposed. These newly simulated structures are proposed for fabrication. The antennas are suitable for operating frequency of 7.5 GHz. It is shown that return loss of the both the antennas at 7.5 GHz is better...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2011

    MBER Space Time Equalization Assisted Multiuser Detection

    A novel Minimum Bit-Error Rate (MBER) Space-Time-Equalization (STE)-based Multi-User Detector (MUD) is proposed for multiple-receive-antenna-assisted space-division multiple-access systems. It is shown that the MBER-STE-aided MUD significantly outperforms the standard minimum mean-square error design in terms of the achievable Bit-Error Rate (BER). Adaptive implementations of the MBER STE are considered, and...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    A New Implementation of Attribute Reduction Using Quick Relative Reduct Algorithm

    Knowledge discovery or data mining is the process of finding previously unknown and potentially interesting patterns and relations in large databases. The so-called \"Curse of dimensionality\" pertinent to many learning algorithms, denotes the drastic increase in computational complexity and classification error with data having a great number of dimensions. Beside...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    A Framework for Semantic Web Mining Model

    The web is transforming from a web of data to web services. This trend is provided to compose the services from existing services. Service mining framework is used to find the web services from existing services. This framework is a seven step process to find services but this model finds...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    An Efficient and Secure Key Management Scheme for Hierarchical Access Control Based on ECC

    In a key management scheme for hierarchy based access control, each security class having higher clearance can derive the cryptographic secret keys of its other security classes having lower clearances. In 2006 Jeng-Wang proposed an efficient scheme on access control in user hierarchy based on elliptic curve cryptosystem. Their scheme...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Comparisons Various Versions of GridFTP Protocols

    The GridFTP protocol has become a popular data movement tool used to build distributed grid-oriented applications. The GridFTP protocol extends the FTP protocol defined by and extended in some other IETF documents by adding certain features designed to improve the performance of data movement over a wide area network, to...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2011

    VANET: Performance Comparison of BNGF Method in Different Vehicular Traffic Scenarios

    A Vehicular Ad hoc NETwork (VANET) is a wireless ad hoc network that is formed between vehicles on an on demand basis. A lot of research work around the world is being conducted to design the routing protocols for VANETs. In this paper, the authors examine the significance Greedy Forwarding...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Designing of an Automated Power Meter Reading With Zigbee Communication

    This paper presents the design and implementation of Automatic Power Meter (APM), The APM is implemented using an ARM and Zigbee Based power meter Communication Module. The design presents a new methodology for avoiding the high construction and maintenance costs in the existing meter reading technology. Using an APM with...

    Provided By Interscience Open Access Journals

  • White Papers // Nov 2011

    A Modified Approach to the New Lossless Data Compression Method

    This paper proposed the modified approach to the new lossless data compression method. It is developed based on hiding data reversibly with a location map. It performs same as the earlier algorithm but it stands on lossless strategy where as the former approach could not do it. It can compress...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Extending UML for Multidimensional Modeling in Data Warehouse

    Multidimensional modeling is the foundation of data warehouses, MD databases, and On-Line Analytical Processing (OLAP) applications. Nowadays Dimensional modeling and object-orientation are becoming growing interest areas. In the past few years; there have been many proposals, for representing the MD properties at the conceptual level. However, none of them has...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2012

    Fast and Scalable Pattern Matching for Memory Architecture

    Multi-pattern matching is known to require intensive memory accesses and is often a performance bottleneck. Hence, specialized hardware-accelerated algorithms are being developed for line-speed packet processing. While several pattern matching algorithms have already been developed for such applications, the authors find that most of them suffer from scalability issues. They...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2010

    Dual-Failure Survivability for Multi Quality Data Using Single pcycle

    Dual-failure scenarios are a real possibility in today's optical networks and it is becoming more and more important foe carriers and network operators to consider them when designing their networks. The p-Cycle is a recent approach in optical network protection. The p-Cycle use preconnected cycles of spare capacity to restore...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2010

    Time Analysis of the State Space of Real-Time Preemptive Systems

    The authors present in this paper an algorithm making it possible an efficient time analysis of the state space of preemptive real time systems modeled using Time Petri Nets with inhibitor arcs. For this effect, they discuss how to determine from the reachability graph linear and quantitative properties of the...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2010

    An Alternate Idea for Storage Optimization in Search Engine

    The authors propose an alternate indexing storage technique of Search Engine. In this approach, they achieve reduced space complexity. They try to decrease time complexity for faster data retrieval and decrease storage space for efficient utilization of space. This paper provides an algorithm of indexing mechanism by which effective storage...

    Provided By Interscience Open Access Journals

  • White Papers // Nov 2010

    A Statistical Approach for Voiced Speech Detection

    Detection of Voice in speech signal is a challenging problem in developing high-performance systems used in noisy environments. In this paper, the authors present an efficient algorithm for robust voiced speech detection and for the application to variable-rate speech coding. The key idea of the algorithm is considering speech energy...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2010

    Applications of Two Dimensional Cellular Automata Rules for Block Cipher in Cryptography

    Cellular Automaton is an idealized parallel processing machine which is an array (1-D, 2-D) of numbers or symbols called cell values together with an updating rule. A cell value is updated based on this updating rule, which involves the cell value as well as other cell values in a particular...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2010

    Designing a Cryptosystem by Implementing Reversible Sequential Switching M/C - A Symmetric Key Approach

    This paper introduces an abstract model of reversible sequential machine in designing the cryptosystem based on the symmetric key approach. A reversible sequential machine is a one-to-one mapping old state and input to new state and output. Reversible computing machine is the mapping of old computational state to new computational...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2010

    Cryptanalysis of the Fast Lightweight Mutual Authentication Protocol

    Security counts as a critical barrier to continuing growth of RFID industry due to lack of a proper high performance lightweight protocol-based solution. Amongst recent developments the Fast Lightweight Mutual Authentication Protocol (FLMAP) has been accepted for its superior speed and low complexity features. Here, the authors examine the security...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2010

    Semantic Learning and Web Image Mining With Image Recognition and Classification

    Image mining is more than just an extension of data mining to image domain. Web Image mining is a technique commonly used to extract knowledge directly from images on WWW. Since, main targets of conventional Web mining are numerical and textual data, Web mining for image data is on demand....

    Provided By Interscience Open Access Journals

  • White Papers // Nov 2010

    Studying Security Issues in HPC (Super Computer) Environment

    HPC has evolved from being a buzzword to becoming one of the most exciting areas in the field of Information Technology & Computer Science. Organizations are increasingly looking to HPC to improve operational efficiency, reduce expenditure over time and improve the computational power. Using Super Computers hosted on a particular...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2010

    Development of Optical Character Recognition Software Package for Mobile Phones

    Optical Character Recognition (OCR) is a technique through which any textual information contained in images are extracted and converted into editable text format. The various OCR software packages which are available in desktop computer with scanner suffer from one primary constraint-MOBILITY. The authors have developed an OCR application for mobile...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2010

    Probabilistic Neural Network Based Approach for Handwritten Character Recognition

    In this paper, recognition system for totally unconstrained handwritten characters for south Indian language of Kannada is proposed. The proposed feature extraction technique is based on Fourier Transform and well known Principal Component Analysis (PCA). The system trains the appropriate frequency band images followed by PCA feature extraction scheme. For...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2010

    Time Domain Signal Detection for MIMO OFDM

    The MIMO techniques with OFDM is regarded as a promising solution for increasing data rates, for wireless access qualities of future wireless local area networks, fourth generation wireless communication systems, and for high capacity, as well as better performance. Hence as part of continued research, in this paper an attempt...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2011

    Performance Analysis of a Cellular System Using C-OFDM Techniques

    The basic idea of COFDM is to split the modulation samples of incoming data stream onto a large number of carriers instead of modulating a unique carrier. Therefore, COFDM is an effective technique for combating multi-path fading and for high-bit-rate transmission over wireless channel. In a single carrier system a...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2010

    Practical Quantum Cryptography for Secure Free-Space Communications

    Quantum Cryptography is an emerging technology in which two parties may simultaneously generate shared, secret cryptographic key material using the transmission of quantum states of light. The security of these transmissions is based on the inviolability of the laws of quantum mechanics and information - theoretically secure post-processing methods. An...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2010

    Design and Implementation of a (2,2) and a (2,3) Visual Cryptographic Scheme

    In this paper two methods for (2, 2) and (2, 3) Visual Cryptographic Scheme(VCS) is proposed. The first scheme considers 4 pixels of input image at a time and generates 4 output pixels in each share. As 4 output pixels are generated from 4 input pixels dimension and aspect ratio...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2010

    A Simple Scheme for Visual Cryptography

    Here an algorithm is proposed to implement (2, 2) secret sharing problem which reduces the size (resolution) of the generated shares. Instead of considering one pixel at a time to generate the share, two consecutive pixels of the original image are considered row wise. Finally a pixel share having six...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2010

    Elliptic Curve Cryptosystem for Email Encryption

    The idea of information security lead to the evolution of cryptography. In other words, cryptography is the science of keeping information secure. It involves encryption and decryption of messages. The core of cryptography lies in the keys involved in encryption and decryption and maintaining the secrecy of the keys. Another...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2010

    Cellular Automata Based Data Security Scheme in Computer Network Using Single Electron Device

    The internet conceptualized new ways of social interaction, activities globally. Internet serves billions of users worldwide. By the end of 2011it is expected that 22% of the world's population will regularly surf internet. Beside this, internet incorporated high risks for e-users by enabling intruders to gain access via security holes....

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2010

    Call Routing in Contact Center

    Now a day companies uses the contact center to provide service to customer. One of the important challenges of today contact center solution is to align the customer to the most appropriate agent within the time constrain. Call routing is used to for the alignment of customer with agent. Call...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2010

    Enabling Mainframe Assets to Services for SOA

    Service-Oriented Architecture (SOA) is a mechanism for achieving interoperability between heterogeneous systems. SOA enables existing legacy systems to expose their functionality as services, without making significant changes to the legacy systems. Migration towards a Service-Oriented Approach (SOA) not only standardizes interaction, but also allows for more flexibility in the existing...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2010

    Next Gen Smart and Connected Systems

    With the kind of technological advancements such as cloud computing, virtualization, computing grids, etc, that the people are seeing today, soon the hardware and software producers will be under severe pressure to deliver cheaper and cost effective solutions and to combine them with innovate commercial models such as "Pay as...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2010

    Comparison of 3GPP LTE and 3GPP2 UMB

    In the last years, technology evolution in mobile communications is mainly motivated by three relevant agents: the market globalization and liberalization and the increasing competence among vendors and operators coming from this new framework, the popularization of IEEE 802 wireless technologies within the mobile communications sector and, finally, the exponential...

    Provided By Interscience Open Access Journals

  • White Papers // Nov 2010

    Next Generation Middleware Technology for Mobile Computing

    Current advances in portable devices, wireless technologies, and distributed systems have created a mobile computing environment that is characterized by a large scale of dynamism. Diversities in network connectivity, platform capability, and resource availability can significantly affect the application performance. Traditional middleware systems are not prepared to offer proper support...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2010

    Wireless Sensor Networks for Indoor Environment Monitoring Using Lab View

    Wireless Sensor Networks (WSNs) have gained worldwide attention in recent years, particularly with the rapid progress in Micro-Electro-Mechanical Systems (MEMS) technology which has facilitated the development of smart sensors. These sensors are small, with limited processing and computing resources, and they are inexpensive compared to traditional sensors. These sensor nodes...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2010

    Minimizing Link Utilization in Selfish Overlay Routing

    The rapid growth and increasing requirements for service quality, reliability had made everyone to choose the traffic engineering essential for the large public networks. The multi Protocol label switching is a protocol used when there is interaction between the traffic engineering and the overlay networks. This Multi-Protocol Labeled Switching (MPLS)...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2010

    Capacity Enhancement in WLAN Using MIMO

    Increasing demand for high-performance 4G broadband wireless is enabled by the use of multiple antennas at both transmitter and receiver ends. Multiple antenna technologies enable high capacities suited for Internet and multimedia services, and also dramatically increase range and reliability. The combination of Multiple-Input Multiple-Output (MIMO) signal processing with Orthogonal...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2010

    Distributed Computing for Ubiquitous Systems

    Distributed computing provides a strong foundation on top of which a powerful ubiquitous system can be realized. However, distributed computing is not solely sufficient for the ubiquitous systems - a completely new era of computer world which is not based on the conventional mainframes or PCs but on the virtually...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2010

    Analysis and Design of Circular Shape Microstrip Antenna for Wireless Communication System

    The circular microstrip antenna element is formed by radiating disk closely spaced above a ground plane. It is modeled as a cylindrical cavity with magnetic walls which can be resonant in the transverse magnetic modes. This circular shape microstrip antenna is analysed using cavity model and fields within the cylindrical...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2010

    Mining Wireless Sensor Network Data: An Adaptive Approach Based on Artificial Neural Networks Algorithm

    This paper proposes a layered modular architecture to adaptively perform data mining tasks in large sensor networks. The architecture consists in a lower layer which performs data aggregation in a modular fashion and in an upper layer which employs an adaptive local learning technique to extract a prediction model from...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2010

    Network Management System for (FUTON-Like) Radio-Over-Fiber Infrastructure

    EU-Project FUTON Radio-over-Fiber (RoF) infrastructure proposes high transmission rates at small antenna costs, implying competitive CAPEX for next generation networks. But to be cost-efficient, it needs to employ new network architectures and intelligent technology solutions for decreasing network operational costs. The RoF Network Manager manages the network equipment on the...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2010

    An Improvement in Stability of MANET Using Flow Admission Control Algorithm

    An ad hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any centralized administration or standard support services. However, flows transported across mobile ad hoc wireless networks suffer from route breakups caused by nodal mobility. In a network that aims to support...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2010

    Soft Clustering: An Overview

    Document clustering has been extensively investigated as a methodology for improving document retrieval process. In Traditional clustering algorithm each documents belongs to exactly one cluster & hence cannot detect the multiple themes of a document where as soft clustering algorithm each document can belong to multiple clusters. This paper gives...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    User Authentication Techniques for Wireless Sensor Networks : A Survey

    A Wireless Sensor Network (WSN) consisting of a large number of tiny sensors can be an effective tool for gathering data in diverse kinds of environments. The data collected by each sensor node is communicated to the base station, which forwards the data to the end user. In wireless sensor...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    Simulation and Analysis of Impact of Buffering of Voice Calls in Integrated Voice and Data Communication System

    Queuing theory and Markov chain analysis plays vital role in analyzing real-life problems. It is applied to wired network, wireless network and mobile communication to analyze the packet traffic in packet switched network. In this simulation and analysis, integrated communication system such as voice and data is simulated with different...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Carrier to Noise Ratio Performance Evaluation for Optical SSB Signal in Radio Over Fiber System

    The optical and wireless communication systems convergence will activate the potential capacity of photonic technology for providing the expected growth in interactive video, voice communication and data traffic services that are cost effective and a green communication service. The last decade growth of the broadband internet projects the number of...

    Provided By Interscience Open Access Journals