Interscience Open Access Journals

Displaying 321-360 of 428 results

  • White Papers // Jul 2011

    Improving Routing Efficiency Based on Random Direction Mobility Model in Manets

    Major issue arising in Mobile Ad hoc NETworks (MANETs) is the selection of the optimal path between any two nodes. A method that has been advocated to improve routing efficiency is to select the most stable path so as to reduce the latency and the overhead due to re-routing instability...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    A Comparative Study on Privacy Preserving Association Rule Mining Algorithms

    The field of privacy has seen rapid advances in recent years because of the increases in the ability to store data. In particular, recent advances in the data mining field have lead to increased concerns about privacy. Privacy-preserving data mining has been studied extensively, because of the wide proliferation of...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Combining Retrieval With Ontology Browsing

    The Semantic Web provides a way to encode information and knowledge on web pages in a form that is easier for computers to understand and process. For Semantic Web documents to have an impact, they will have to be compatible with Web based indexing and retrieval. There are techniques to...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Effective Method of Age Dependent Face Recognition

    This Automatic age dependent face recognition system is developed. This approach is based on the Principle Component Analysis (PCA). Eigen face approach is used for both age prediction and face recognition. Face database is created by aging groups individually. The age prediction is carried out by projecting a new face...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Performance Comparison of Rule Based Classification Algorithms

    Classification based on Predictive Association Rules (CPAR) is a kind of association classification methods which combines the advantages of both associative classification and traditional rule-based classification. For rule generation, CPAR is more efficient than traditional rule-based classification because much repeated calculation is avoided and multiple literals can be selected to...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Selection of Optimal Discount of Retail Assortments with Data Mining Approach

    Recently, the capabilities of generating and collecting data have been increasing rapidly. Widespread use of bar codes for most commercial products, the computerization of many business, and the advance in data collection tools have provided the users with huge amount of retail data. This explosive growth in data and databases...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    A System for Outlier Detection of High Dimensional Data

    In high dimensional data large no of outliers are embedded in low dimensional subspaces known as projected outliers, but most of existing outlier detection techniques are unable to find these projected outliers, because these methods perform detection of abnormal patterns in full data space. So, outlier detection in high dimensional...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Authenticated Connection establishment in Web Applications using Steganography

    A web application is an application that is accessed over a network such as the Internet or an intranet. Web applications are popular due to the ubiquity of web browsers, and the convenience of using a web browser as a client, sometimes called a thin client. The ability to update...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Model Based Approach to Prevent SQL Injection Attacks on .NET Applications

    Web applications support static and dynamic queries to access the database. Dynamic queries take input from the user and use that input to form the query. A user can give malicious input to the application which results in an incorrect query or an unauthorized query and performs vulnerable action on...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    An Efficient Regression Testing by Computing Coverage Data for Software Evolution

    Software systems is evolve continuously during development and maintenance. After software is modified regression testing is applied to software to ensure that It behaves intended and modifications not negatively impacts its original functionality. It is time consuming to rerun test suite T of program Pi on modified program Pi+1. So,...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Dynamic Detection of Packet Losses by CRDP

    TCP has provided the primary means to transfer data reliably across the Internet; however, TCP has imposed limitations on several applications. Measurement and estimation of packet loss characteristics are challenging due to the relatively rare occurrence and typically short duration of packet loss episodes. While active probe tools are commonly...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Star Varietal Cube: A New Large Scale Parallel Interconnection Network

    This paper proposes a new interconnection network topology, called the Star varietal-cube SVC (n, m), for large scale multicomputer systems. The authors take advantage of the hierarchical structure of the Star graph network and the Varietal hypercube to obtain an efficient method for constructing the new topology. The Star graph...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Detection of Phishing Websites and Secure Transactions

    Phishing is an electronic online identity theft in which the attackers use a combination of social engineering and web site spoofing techniques to trick a user into revealing confidential information. It steals the user's personal identity data and financial credentials. Most of the phishing attacks emerge as spoofed E-Mails appearing...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Integrated Approach of Malicious Website Detection

    With the advent and the rising popularity of Internet, security is becoming one of the focal point. At present, Web sites have become the attacker's main target. The attackers uses the strategy of embedding the HTML tags, the script tag to include web-based Trojan scripting or redirector scripting, the embedded...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    An Implementation of Botnet Detection Algorithm for Grid Networks

    Grid is an emerging technology that aims at utilizing resources efficiently and effectively, A botnet is a collection of infected computers and the common attacks are a Distributed Denial Of Service attack (DDOS) is any type of attack on a networking structure to disable a server from servicing its clients....

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Embedded Wireless Based Communications in Oilfield & Providing Security System

    The area of the oilfield is much wider. Oil exhauster continuous working for 24 hours. As the problem of petroleum being stolen, transmission line being stolen, and transformer being stolen exists which requires the strong secures management system. With Consideration of the objective condition restriction of geographical environment, the implementation...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Detecting & Eliminating Rogue Access Point in IEEE 802.11 WLAN

    Rogue Access Points (RAPs) is one of the leading security threats in current network scenario, if not properly handled in time could lead from minor network faults to serious network failure. Most of the current solutions to detect rogue access points are not automated and are dependent on a specific...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Attacks in Wireless Networks

    Communications in wireless networks has been facilitating numerous emerging applications that require packet delivery from one or more senders to multiple receivers. Communications are susceptible to various kinds of attacks due to insecure wireless channels. Communications in wireless networks remains a challenging and critical issue. This paper presents recent advances...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Dynamic Thread Pool Based Service Tracking Manager

    The Service Tracking Manager (STM) application is a management software that integrates, collects, and manages alerts/events information from Casino Management Systems. It allows casinos to track alerts and events at different locations. Casinos staff attends to various kinds of requests. The requests can be for providing customer service, handle events...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Performance Analysis of Secured Synchronous Stream Ciphers

    The new information and communication technologies require adequate security. In the past decades, the authors have witnessed an explosive growth of the digital storage and communication of data, triggered by some important breakthroughs such as the Internet and the expansive growth of wireless communications. In the world of cryptography, stream...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Group-Key Management Model for Worldwide Wireless Mesh Networks

    Wireless Mesh Network (WMN) is an upcoming wireless network technology and is mainly used to provide broadband internet in remote locations. It is characterized by minimum fixed infrastructure requirement and is operated in an open medium, such that any user within the range covered by mesh routers may access the...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Secure Biometric Cryptosystem for Distributed System

    Information (biometric) security is concerned with the assurance of confidentiality, integrity, and availability of information in all forms, biometric information is very sophisticated in terms of all, in this paper, the authors are focusing on data pattern along with all security assurance, so that they can improve the matching performance...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    A Novel Approach for Privacy Preserving in Video Using Extended Euclidean Algorithm Based on Chinese Remainder Theorem

    The development in the modern technology paved a path in the utilization of surveillance cameras in streets, offices and other areas but this significantly leads a threat to the privacy of visitors, passengers or employees, leakage of information etc.. To overcome this threat, privacy and security needs to be incorporated...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    An Efficient Approach Formulation of Social Groups of User Calls of GSM

    The people are living in a world of wireless technology. The most widely used wireless i.e. mobile computing device today is the Mobile phone, can be used not only for voice and data communications but also as a computing device running context aware applications. In this paper, the authors present...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Designing of an Automated Power Meter Reading With Zigbee Communication

    This paper presents the design and implementation of Automatic Power Meter (APM), The APM is implemented using an ARM and Zigbee Based power meter Communication Module. The design presents a new methodology for avoiding the high construction and maintenance costs in the existing meter reading technology. Using an APM with...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Extending UML for Multidimensional Modeling in Data Warehouse

    Multidimensional modeling is the foundation of data warehouses, MD databases, and On-Line Analytical Processing (OLAP) applications. Nowadays Dimensional modeling and object-orientation are becoming growing interest areas. In the past few years; there have been many proposals, for representing the MD properties at the conceptual level. However, none of them has...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Review on Main Memory Database

    The idea of using Main Memory DataBase (MMDB) as physical memory is not new but is in existence quite since a decade. MMDB have evolved from a period when they were only used for caching or in high-speed data systems to a time now in twenty first century when they...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    An Effective Time Management Schema in WSNs

    WSN usually consists of a large number of resource constraint sensor nodes that are generally deployed in unattended/hostile environments and Existing security designs mostly provide a hop-by-hop security paradigm. Furthermore, existing security designs are also vulnerable to many types of Denial of Service (DoS) attacks, such as random node capture...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Periodically Updating the Content in Mobile Ad Hoc Network With Secured Synchronization

    The content and presence updates were used to transmit updates to nearby nodes over an ad hoc network using duty cycles; the authors' algorithms synchronize the transmissions of nodes periodically. By this approach, nodes can save battery power without missing updates from their neighbours by switching off their network cards....

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    An Improvement of Centroid Algorithm Based on Distance in Wireless Sensor Network

    In Wireless Sensor Network (WSN), estimating the exact position of sensor node is an important research problem and its location accuracy impacts the efficiency of localization algorithms. In this paper improved centroid range free localization method is proposed and comparison with conventional centroid is done by varying different parameters such...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Audio Streaming Over Low Data Rate Wireless System

    Audio applications over wireless networks have recently emerged as a promising research field. However, the limits in terms of communication bandwidth and transmission power have withstood the design of low-power embedded nodes for audio communication. In this paper, the authors describe the implementation details of an embedded system for the...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Wireless Testing Tool for Wireless Routers

    Wireless test tool is a powerful tool for wireless network monitor and analyzer for 802.11 a/b/g/n networks. Loaded with many user-friendly features, Wireless test tool for Wi-Fi combines performance and flexibility with an ease of use in the industry. Wireless test tool for Wi-Fi captures every packet on the air...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    False Data Detection in Wireless Sensor Network With Secure Communication

    The security of wireless sensor networks is a challenging problem in the process of data aggregation. As data are send though sensor network confidentiality plays and important role between sink and destination. An efficient secure data aggregation is proposed to enhance the data security of wireless sensor networks. In wireless...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Dynamic Transmission Power Assignment for Energy Conservation Routing in MANETs

    Wireless networks are formed by the devices that run on batteries, having limited amount of energy. Different actions of the nodes like transmitting, receiving, processing etc consume available energy. In order to increase the system's life-time, energy consumption has to be minimized. The Power Assignment Minimum Expected Energy and Reliable...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Reliable Routings in Networks With Generalized Link Failure Events

    Traditional methods for ensuring reliable transmissions in circuit-switched networks rely on the pre computation of a backup path for every working path or for every network link. These methods work fine as long as the network experiences only single link failures. They do not guarantee undisturbed communication, however, in the...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Object Detection Using Am-Fm Features

    This paper presents a template-based approach to detect objects of interest from real images. The authors rely on AM-FM models and specifically, on the Dominant Component Analysis (DCA) for feature extraction. They incorporate the results from AM-FM models for object detection. In order to detect the object of interest from...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Mobile Communication

    Consumers demand more from their technology. Whether it be a television, cellular phone, or refrigerator, the latest technology purchase must have new features. With the advent of the Internet, the most-wanted feature is better, faster access to information. Cellular subscribers pay extra on top of their basic bills for such...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Role of Feature Selection in Intrusion Detection Systems for 802.11 Networks

    Intrusion Detection Systems are important for protecting network and its resources from illegal penetration. For 802.11network, the features used for training and testing the intrusion detection systems consist of basic information related to the TCP/IP header, with no considerable attention to the features associated with lower level protocol frames. The...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Design and Implementation of an Enhanced DDS Based Digital Modulator for Multiple Modulation Schemes

    This paper deals with the design & implementation of a Digital Modulator based on the FPGA. The design is implemented using the Enhanced Direct Digital Synthesis (DDS) Technology. The basic DDS architecture is enhanced with the minimum hardware to facilitate the complete system level support for different kinds of Modulations...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Performance Comparison of IACO,AODV Networking Routing Protocols

    There are several standard protocols for Mobile Ad hoc NETworks (MANET) that have been developed for devices with higher computing features. The Efficient routing protocols can provide significant benefits to mobile ad hoc networks, in terms of both performance and reliability. Many routing protocols for such networks have been proposed...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Automata for Web Services Fault Monitoring and Diagnosis

    Like any software, web service fault management is also required to go through different phases of fault management lifecycle. Model based diagnosis has been a well established practice for its several positive aspects including cognitively being better understood by development and testing teams. Automata is a simple and formally well...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    STM: Lock-Free Synchronization

    Current parallel programming uses low-level programming constructs like threads and explicit synchronization (for example, locks, semaphores and monitors) to coordinate thread execution which makes these programs difficult to design, program and debug. In this paper, the authors present Software Transactional Memory (STM) which is a promising new approach for programming...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Checkpointing Orchestrated Web Services

    Web Services are built on service-oriented architecture which is based on the notion of building applications by discovering and orchestrating services available on the web. Complex business processes can be realized by discovering and orchestrating already available services on the web. In order to make these orchestrated web services resilient...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Goal Programming Approach for Selection of COTS Components in Designing a Fault Tolerant Modular Software System under Consensus Recovery Block Scheme

    The application of computer systems has now crossed many different fields. Systems are becoming more software intensive. The requirements of the customer for a more reliable software led to the fact that software reliability is now an important research area. One method to improve software reliability is by the application...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    SMS Text Compression Through IDBE (Intelligent Dictionary Based Encoding) for Effective Mobile Storage Utilization

    Effective storage utilization is the key concept for better working of any operating system. Even operating systems used for mobile phones are not an exception for this fact. This paper proposes a technique for maximizing the utilization of the storage space present in mobile phones. Thus, it is important to...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Secure Efficient On-Demand Insider Attacks Multicast Routing Protocol in Wireless Networks

    Wireless multicast routing send and receives the data source to destination. High error rates, unfixed and changeable self of the signal power and broadcast change with time and environment regularly result in not effective links. These services more weak to internal attacks coming from compromised nodes that behave randomly to...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Spectral Minutiae Fingerprint Recognition System

    Biometrics refers to the automatic recognition of individuals based on their physiological and/or behavioral characteristics, such as faces, finger prints, iris, and gait. In this paper, the authors focus on the application of finger print recognition system. The spectral minutiae fingerprint recognition is a method to represent a minutiae set...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Object Detection Using Am-Fm Features

    This paper presents a template-based approach to detect objects of interest from real images. The authors rely on AM-FM models and specifically, on the Dominant Component Analysis (DCA) for feature extraction. They incorporate the results from AM-FM models for object detection. In order to detect the object of interest from...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Mobile Communication

    Consumers demand more from their technology. Whether it be a television, cellular phone, or refrigerator, the latest technology purchase must have new features. With the advent of the Internet, the most-wanted feature is better, faster access to information. Cellular subscribers pay extra on top of their basic bills for such...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Role of Feature Selection in Intrusion Detection Systems for 802.11 Networks

    Intrusion Detection Systems are important for protecting network and its resources from illegal penetration. For 802.11network, the features used for training and testing the intrusion detection systems consist of basic information related to the TCP/IP header, with no considerable attention to the features associated with lower level protocol frames. The...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Design and Implementation of an Enhanced DDS Based Digital Modulator for Multiple Modulation Schemes

    This paper deals with the design & implementation of a Digital Modulator based on the FPGA. The design is implemented using the Enhanced Direct Digital Synthesis (DDS) Technology. The basic DDS architecture is enhanced with the minimum hardware to facilitate the complete system level support for different kinds of Modulations...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Detecting & Eliminating Rogue Access Point in IEEE 802.11 WLAN

    Rogue Access Points (RAPs) is one of the leading security threats in current network scenario, if not properly handled in time could lead from minor network faults to serious network failure. Most of the current solutions to detect rogue access points are not automated and are dependent on a specific...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Attacks in Wireless Networks

    Communications in wireless networks has been facilitating numerous emerging applications that require packet delivery from one or more senders to multiple receivers. Communications are susceptible to various kinds of attacks due to insecure wireless channels. Communications in wireless networks remains a challenging and critical issue. This paper presents recent advances...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    A Trust Based Sensor Protocol for Information Dissemination in a Point to Point Media

    Securing the information dissemination is an important issue in wireless sensor network. Previously, there is no available work on the integrated design of trust model and SPIN-PP protocol (sensor Protocols for Information via Negotiation) for information dissemination in wireless sensor networks. In this paper, to improve the quality of this...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Analyzing the Performance of Data Dissemination Algorithms to Application Requirements in Wireless Sensor Network

    A Wireless Sensor Network (WSN) is a collection of thousands of tiny sensor nodes having the capability of wireless communication, limited computation and sensing. Many data dissemination protocols have been proposed for multi-hop communication in sensor networks, each evaluated in some scenario. Many protocols are designed to exploit application requirements,...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Study of Wireless Sensor Network in SCADA System for Power Plant

    In this paper, study of wireless SCADA system which is powerful setup for monitoring and controlling the various applications from remotely placed is presented. All communication between GSM modem and user are wireless based, this translates into lowest cost compared to all other systems. Wireless based solutions have universally accepted,...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Performance Comparison of Routing Protocols in MANET Varying Network Size

    A Mobile Ad hoc NETwork (MANET) consists of mobile wireless nodes in which the communication between nodes is carried out without any centralized control. MANET is a self organized and self configurable network where the mobile nodes move arbitrarily. The mobile nodes can receive and forward packets as a router....

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Dual Bootstrap Server Based Super peer Overlay Construction

    Many two-layer hierarchy unstructured Peer-To-Peer (P2P) systems, comprising of superpeers and ordinary peers improved the performance of large scale P2P systems. The construction and maintenance of the superpeer overlay network play an important role in improving the performance P2P systems. One efficient method of constructing the superpeer overlay network is...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Evaluation of Proactive, Reactive and Hybrid Ad Hoc Routing Protocol for Various Battery Models in VANET Using Qualnet

    In VANET high speed is the real characteristic which leads frequent breakdown, interference etc. In this paper, the authors studied various Ad hoc routing protocols, Reactive, Proactive & Hybrid, taking in to consideration various VANET parameters like speed, altitude etc in real traffic scenario and evaluated them for various battery...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Autonomic Diffusion Based Spray Routing in Intermittently Connected Mobile Networks With Multiple Copies

    Intermittently connected mobile Network systems represent a challenging environment for networking research, due to the problems of ensuring messages delivery in spite of frequent disconnections and random meeting patterns. These networks fall into general category of Delay Tolerant Networks. There are many real networks that follow this model, for example,...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    An Improved Hybrid Peer-to-Peer System With Caching for Distributed Data Sharing

    Peer-to-peer overlay networks are widely used in distributed systems. Based on whether a regular topology is maintained among peers, peer-to-peer networks can be divided into two categories: structured peer-to-peer networks in which peers are connected by a regular topology, and unstructured peer-to-peer networks in which the topology is arbitrary. Structured...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    A Multipurpose Image Processing Technique for Wireless and Wired Networks

    One of the most important and challenging goal of current and future communication network is transmission of high quality images from sender to receiver side quickly with least error where limitation of bandwidth is a prime problem. Here, the authors will discuss a new approach towards compressing and decompressing with...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    ICMP, SNMP: Collaborative Approach to Network Discovery and Monitoring

    The algorithm and realization technique of network topology discovery is a very important technical indicator for a network management system's quality. Based on the knowledge of the network topology discovery theory, the research on ICMP and SNMP programming for Windows, this paper proposes a method of developing the common network...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    The Future of IP SAN Using SCVM

    The SCVM, which stands for Storage Concentrator Virtual Machine, creates IP SAN storage as virtual machine, providing the user with the ability to consolidate their virtual data center. The SCVM can fully manage and has features for the storage over local as well as networked VMs. This can be attained...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    Impact of Routing Protocol on Performance of Wireless Ad Hoc Vehicular Network

    Vehicular Ad Hoc NETwork (VANET) is an emerging new technology integrating ad hoc network, Wireless LAN (WLAN) and cellular technology to achieve intelligent inter-vehicle communications and improve road traffic safety and efficiency. VANETs are distinguished from other kinds of ad hoc networks by their hybrid network architectures, node movement characteristics,...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    Localization in Wireless Sensor Network Using MDS

    In this paper, determining the localization of nodes in a Wireless Sensor Network is a very important task, which involves collaboration between sensor nodes. Localization is a fundamental service since it is relevant to many applications and to the network main functions, such as: routing, communication, cluster creation, network coverage,...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    Effective Analysis of Different Parameters in Ad Hoc Network for Different Protocols

    A wireless Ad-hoc network consists of wireless nodes communicating without the need for a centralized administration, in which all nodes potentially contribute to the routing process. A user can move anytime in an ad hoc scenario and, as a result, such a network needs to have routing protocols which can...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Data Partitioning for Semantic Web

    Semantic web database is an RDF database. Tremendous increase can be seen in semantic web data, as real life applications of semantic web are using this data. Efficient management of this data at a larger scale, and efficient query performance are the two major concerns. This work aims at analyzing...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    A Correctness Criterion for Eager Approach Validation for Transactional Memory System

    With rise of multi-core systems, Software Transactional Memory (STM) has garnered significant interest as an elegant alternative for developing concurrent code. A (memory) transaction is an unit of code in execution in memory. A Software Transactional Memory system (STM) ensures that a transaction appears either to execute atomically (even in...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    The Effect of Social Online Networking Service on Public Libraries Via Critical Systems Heuristics (CSH) :A Case Study

    Libraries can provide numerous services for users on the use of Web 2.0 technology by promoting library services. In the interactive Web 2.0 environment; (SON) took hold. The Purpose of this paper is to discuss on the impact of Social Online Networking (SON) on library services by a qualitative evaluation...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Modeling and Simulation of a Single Phase Matrix Converter With Reduce Switch Count as a Buck/Boost Rectifier With Close Loop Control

    This Paper focused on Buck/Boost Rectification by Single Phase Matrix Converter with fewer numbers of switches. The conventional matrix converter consists of 4 bidirectional switches, i.e., 8 set of IGBT/MOSFET with anti parallel diodes. In this proposed matrix converter, only six switches are used. The switch commutation arrangements are also...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2011

    A Soft Computing Platform for Minimizing the Bullwhip Effect

    An unmanaged supply chain is not inherently stable. The bullwhip effect occurs when the demand order variability's in the supply chain are amplified as they moved up the supply chain. Distorted information from one end of a supply chain to the other can lead to tremendous inefficiencies. In this paper...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2011

    Reduction of Context Switches Due to Task Synchronization in Uniprocessor and Multiprocessor Platform

    The problem of frequent context switches in multitasking is a real scheduling overhead which wastes extra CPU cycles, memory and causes much delay in scheduling. This paper focuses on reducing the context switches that result due to blocking when jobs are required to synchronize. The Priority Ceiling Protocol (PCP) is...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2011

    Performance Analysis of ESPRIT Algorithm for Smart Antenna System

    ESPRIT is a high-resolution signal parameter estimation technique based on the translational invariance structure of a sensor array. The ESPRIT algorithm is an attractive solution to many parameter estimation problems due to its low computational cost. The performance of DOA using estimation signal parameter via a rotational invariant technique is...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2011

    Development of a Fuzzy Logic Based Software for Automation of a Single Pool Irrigation Canal

    A fuzzy logic based software for automation of a single pool irrigation canal is presented. Purpose of the software is to control downstream discharge and water level of the canal, by adjusting discharge release from the upstream end and upstream gate settings. The software is developed on a fuzzy control...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Review on Main Memory Database

    The idea of using Main Memory DataBase (MMDB) as physical memory is not new but is in existence quite since a decade. MMDB have evolved from a period when they were only used for caching or in high-speed data systems to a time now in twenty first century when they...

    Provided By Interscience Open Access Journals

  • White Papers // Mar 2012

    Web Search Using Improved Concept Based Query Refinement

    The information extracted from Web pages can be used for effective query expansion. The aspect needed to improve accuracy of web search engines is the inclusion of metadata, not only to analyze Web content, but also to interpret. With the Web of today being unstructured and semantically heterogeneous, keyword-based queries...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2010

    Applications of Two Dimensional Cellular Automata Rules for Block Cipher in Cryptography

    Cellular Automaton is an idealized parallel processing machine which is an array (1-D, 2-D) of numbers or symbols called cell values together with an updating rule. A cell value is updated based on this updating rule, which involves the cell value as well as other cell values in a particular...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2010

    Designing a Cryptosystem by Implementing Reversible Sequential Switching M/C - A Symmetric Key Approach

    This paper introduces an abstract model of reversible sequential machine in designing the cryptosystem based on the symmetric key approach. A reversible sequential machine is a one-to-one mapping old state and input to new state and output. Reversible computing machine is the mapping of old computational state to new computational...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2010

    Cryptanalysis of the Fast Lightweight Mutual Authentication Protocol

    Security counts as a critical barrier to continuing growth of RFID industry due to lack of a proper high performance lightweight protocol-based solution. Amongst recent developments the Fast Lightweight Mutual Authentication Protocol (FLMAP) has been accepted for its superior speed and low complexity features. Here, the authors examine the security...

    Provided By Interscience Open Access Journals