INTI University College

Displaying 1-20 of 20 results

  • White Papers // Jan 2012

    Performance Analysis of Multipath Channel Model for Power Line Communication With OFDM System

    Now-a-days Power Line Communications have been the subject of an important research work. Power line communication is an attractive alternative choice for traditional networks due to its ability to offer broadband internet access, cable television telephone service and home automation. At the same time, the growing demand for multimedia communications...

    Provided By INTI University College

  • White Papers // Sep 2011

    Optimal Routing Protocol for TCP-NewReno in Wireless Mobile Ad-Hoc Networks

    Wireless communication has already entered in the people daily life. A particular model of wireless networks is Mobile Ad hoc NETwork (MANET) which can be made operational anywhere without the need for any fixed backbone infrastructure. Due to the absence of fixed backbone there are a plenty of problems in...

    Provided By INTI University College

  • White Papers // Sep 2011

    Solution to the Access Network of the Celia Sanchez Manduley Hospital in Granma Province

    The present investigation consists on proposing a feasible access network for the Celia S?nchez Manduley Hospital in Manzanillo, Granma province, which has been developed from the study of broadband wired access technologies and the provincial SDH network. An analysis of the current state of communications, existing in the center, has...

    Provided By INTI University College

  • White Papers // Sep 2011

    Factors Affecting Malaysian Mobile Banking Adoption: An Empirical Analysis

    This paper aims to investigate the factors that influence Malaysians' intention to adopt mobile banking by extending the renowned framework of Technology Acceptance Model (TAM). A self-administrated questionnaire had been developed and distributed in Malaysia. Out of the 400 questionnaires, only 175 useable questionnaires were returned, yielding a response rate...

    Provided By INTI University College

  • White Papers // Sep 2011

    Performance Analysis of Collision Avoidance MAC Protocol in Multi-Hop Wireless Ad-Hoc Network

    Performance analysis of 802.11Medium Access Control (MAC) protocol has been carried out either by means of simulation or by means of analytical models with simplified back-off rule assumptions. Binary Exponential Back-off (BEB) is the widely used back-off mechanism in many contention-based IEEE 802.11 MAC protocols for its simplicity and good...

    Provided By INTI University College

  • White Papers // May 2011

    Modeling and Analysis of Production System Using Operational Petri Nets With Resources Sharing

    In this paper a new approach of modeling of a Production System (PS) introduced which based on new class of Petri nets called the Operational Petri Net with Resources (OPPNR) sharing. The authors divide the whole modeling procedure of production system into two stages in first stage a subnets are...

    Provided By INTI University College

  • White Papers // May 2011

    BER Performance Evaluation of FFT-OFDM and DWT-OFDM

    Orthogonal Frequency Division Multiplexing (OFDM) is a special form of multi carrier transmission which has found its application in a number of wireless and wire-line systems. In an OFDM scheme, a large number of orthogonal, overlapping, narrow band sub-channels or subcarriers, transmitted in parallel, divide the available transmission bandwidth. The...

    Provided By INTI University College

  • White Papers // Jan 2011

    Exploring the Individual Characteristics on the Adoption of Broadband: An Empirical Analysis

    This paper empirically investigates the factors that affect the users' intention to adopt broadband by incorporating individual characteristics with the conventional Technology Acceptance Model (TAM). The research was conducted in Malaysia using a self-administered questionnaire. Out of the 350 questionnaires, only 172 are usable, thus yielding a response rate of...

    Provided By INTI University College

  • White Papers // Jan 2011

    Simulating Denial of Service Attack Using WiMAX Experimental Setup

    The IEEE802.16 Wireless Metropolitan Area Network (WMAN) is set to revolutionize the delivery of Broadband Wireless Access (BWA) not unlike how the IEEE802.11 Wi-Fi standard popularized wireless access to the masses. Designed to operate over distances as large as 50km at speeds of up to 74Mbps, it will serve many...

    Provided By INTI University College

  • White Papers // Jan 2011

    Performance of OFDM in the Variation of the Path Quantity in Power Line Communications

    Power line communication is an attractive alternative to traditional networks due to its ability to offer broadband internet access, telephone service, cable television and home automation. These are collectively known as in-home services using the existing power delivery network. However, the problems affecting power line communication transmission (e.g. multipath noise,...

    Provided By INTI University College

  • White Papers // Jan 2011

    A Blending of a Generalized Playfair Cipher and a Modified Hill Cipher

    In this paper, the authors have developed a block cipher by including the features of a generalized Play-fair cipher and a modified Hill cipher. This cipher involves multiplication with the key matrix, and the concepts such as interweaving, intertwining, and iteration. In this cipher, they have taken the entire plaintext...

    Provided By INTI University College

  • White Papers // Nov 2010

    Cleaning Various Noise Patterns in Web Pages for Web Data Extraction

    Cleaning Web pages before mining becomes critical for improving performance of information retrieval and information extraction. With the exponentially growing amount of information available on the Internet, an effective technique for users to discern the useful information from the unnecessary information is urgently required. So, the authors investigate to remove...

    Provided By INTI University College

  • White Papers // Nov 2010

    Electromagnetic Radiation Towards Adult Human Head From Handheld Mobile Phones

    As the number of mobile phone usage increased exponentially nowadays, issues related to the electromagnetic radiation produce by mobile phone is becoming a big concern in the society. Mobile phone produced electromagnetic wave, and when placed near the ear skull, will produce electromagnetic radiation so called thermal effect. The transfer...

    Provided By INTI University College

  • White Papers // Nov 2010

    Establishment of IPv6 Network on Intranet Environment

    Internet Protocol Version Six (IPv6) is the next generation internet protocol. It is not yet possible to completely migrate to IPv6, but several transitions mechanisms are available to allow IPv6 and IPv4 coexist together in the same network infrastructure. The main benefit of this protocol is a larger address space...

    Provided By INTI University College

  • White Papers // Nov 2010

    Evaluation of the IEEE 802.11p-Based TDMA MAC Method for Road Side-to-Vehicle Communications

    Wireless Vehicular Communications (WVC) has been identified as a key technology for Intelligent Transportation Systems (ITS) for a few years ago. IEEE 802.11p is the proposed standard for physical and MAC layer of WVC devices. The main objective of the standard is to change the frame format and increase delay...

    Provided By INTI University College

  • White Papers // Sep 2010

    Does Employee Alignment Affect Business-IT Alignment? an Empirical Analysis

    In this paper, the authors investigate if employee alignment will influence the business-IT alignment in organizations. The authors measured employee alignment through perceived organizational trust, perceived communications on business-IT strategies to employees, perceived employee commitment to business-IT strategies and perceived knowledge on business-IT strategies. Structural Equation Modeling (SEM) is used...

    Provided By INTI University College

  • White Papers // Jun 2010

    Improving Supply Chain Traceability Using RFID Technology

    One of the major issues in the supply chain management is product loss or shrinkage. Radio-Frequency Identification (RFID) as an emerging technology has generated enormous amount of interest in the supply chain arena to reduce the phenomena. RFID technology has been used to provide a more efficient way to identify...

    Provided By INTI University College

  • White Papers // Jun 2010

    Semantic XML Filtering Technique of Multiple XPath Queries Using NFA Representation

    Now-a-days, XML data filtering methods are applied in most web applications. The various filtering mechanisms have been developed for XML data such as XFilter, YFilter, AFilter and TwigX-Guide. In this paper, the authors develop a new XML filtering mechanism which is based on ontology to get semantic information. In their...

    Provided By INTI University College

  • White Papers // Jun 2010

    Enhanced Features Ranking and Selection Using Recursive Feature Elimination(RFE) and K-Nearest Neighbor Algorithms in Support Vector Machine for Intrusion Detection System

    Today, as the increasing the amount of using internet, there are so most information interchanges are performed in that internet. So, the methods used as intrusion detective tools for protecting network systems against diverse attacks are became too important. The available of IDS are getting more powerful. Support Vector Machine...

    Provided By INTI University College

  • White Papers // Jun 2010

    Design of Multimedia Messaging Service for Mobile Telemedicine System

    The growth of Information and Communication Technologies (ICTs) has already revealed an impact on the people modern society. Mobile messaging technologies have already been considered as a key field for variety of research to pick up the knowledge how ICTs can help the modern society people, who are dynamically shifting...

    Provided By INTI University College

  • White Papers // Sep 2011

    Optimal Routing Protocol for TCP-NewReno in Wireless Mobile Ad-Hoc Networks

    Wireless communication has already entered in the people daily life. A particular model of wireless networks is Mobile Ad hoc NETwork (MANET) which can be made operational anywhere without the need for any fixed backbone infrastructure. Due to the absence of fixed backbone there are a plenty of problems in...

    Provided By INTI University College

  • White Papers // Nov 2010

    Cleaning Various Noise Patterns in Web Pages for Web Data Extraction

    Cleaning Web pages before mining becomes critical for improving performance of information retrieval and information extraction. With the exponentially growing amount of information available on the Internet, an effective technique for users to discern the useful information from the unnecessary information is urgently required. So, the authors investigate to remove...

    Provided By INTI University College

  • White Papers // Nov 2010

    Electromagnetic Radiation Towards Adult Human Head From Handheld Mobile Phones

    As the number of mobile phone usage increased exponentially nowadays, issues related to the electromagnetic radiation produce by mobile phone is becoming a big concern in the society. Mobile phone produced electromagnetic wave, and when placed near the ear skull, will produce electromagnetic radiation so called thermal effect. The transfer...

    Provided By INTI University College

  • White Papers // Jun 2010

    Semantic XML Filtering Technique of Multiple XPath Queries Using NFA Representation

    Now-a-days, XML data filtering methods are applied in most web applications. The various filtering mechanisms have been developed for XML data such as XFilter, YFilter, AFilter and TwigX-Guide. In this paper, the authors develop a new XML filtering mechanism which is based on ontology to get semantic information. In their...

    Provided By INTI University College

  • White Papers // Jun 2010

    Enhanced Features Ranking and Selection Using Recursive Feature Elimination(RFE) and K-Nearest Neighbor Algorithms in Support Vector Machine for Intrusion Detection System

    Today, as the increasing the amount of using internet, there are so most information interchanges are performed in that internet. So, the methods used as intrusion detective tools for protecting network systems against diverse attacks are became too important. The available of IDS are getting more powerful. Support Vector Machine...

    Provided By INTI University College

  • White Papers // Jun 2010

    Design of Multimedia Messaging Service for Mobile Telemedicine System

    The growth of Information and Communication Technologies (ICTs) has already revealed an impact on the people modern society. Mobile messaging technologies have already been considered as a key field for variety of research to pick up the knowledge how ICTs can help the modern society people, who are dynamically shifting...

    Provided By INTI University College

  • White Papers // Jun 2010

    Improving Supply Chain Traceability Using RFID Technology

    One of the major issues in the supply chain management is product loss or shrinkage. Radio-Frequency Identification (RFID) as an emerging technology has generated enormous amount of interest in the supply chain arena to reduce the phenomena. RFID technology has been used to provide a more efficient way to identify...

    Provided By INTI University College

  • White Papers // Jan 2012

    Performance Analysis of Multipath Channel Model for Power Line Communication With OFDM System

    Now-a-days Power Line Communications have been the subject of an important research work. Power line communication is an attractive alternative choice for traditional networks due to its ability to offer broadband internet access, cable television telephone service and home automation. At the same time, the growing demand for multimedia communications...

    Provided By INTI University College

  • White Papers // Sep 2011

    Solution to the Access Network of the Celia Sanchez Manduley Hospital in Granma Province

    The present investigation consists on proposing a feasible access network for the Celia S?nchez Manduley Hospital in Manzanillo, Granma province, which has been developed from the study of broadband wired access technologies and the provincial SDH network. An analysis of the current state of communications, existing in the center, has...

    Provided By INTI University College

  • White Papers // Sep 2011

    Factors Affecting Malaysian Mobile Banking Adoption: An Empirical Analysis

    This paper aims to investigate the factors that influence Malaysians' intention to adopt mobile banking by extending the renowned framework of Technology Acceptance Model (TAM). A self-administrated questionnaire had been developed and distributed in Malaysia. Out of the 400 questionnaires, only 175 useable questionnaires were returned, yielding a response rate...

    Provided By INTI University College

  • White Papers // Sep 2011

    Performance Analysis of Collision Avoidance MAC Protocol in Multi-Hop Wireless Ad-Hoc Network

    Performance analysis of 802.11Medium Access Control (MAC) protocol has been carried out either by means of simulation or by means of analytical models with simplified back-off rule assumptions. Binary Exponential Back-off (BEB) is the widely used back-off mechanism in many contention-based IEEE 802.11 MAC protocols for its simplicity and good...

    Provided By INTI University College

  • White Papers // Jan 2011

    Exploring the Individual Characteristics on the Adoption of Broadband: An Empirical Analysis

    This paper empirically investigates the factors that affect the users' intention to adopt broadband by incorporating individual characteristics with the conventional Technology Acceptance Model (TAM). The research was conducted in Malaysia using a self-administered questionnaire. Out of the 350 questionnaires, only 172 are usable, thus yielding a response rate of...

    Provided By INTI University College

  • White Papers // Jan 2011

    Simulating Denial of Service Attack Using WiMAX Experimental Setup

    The IEEE802.16 Wireless Metropolitan Area Network (WMAN) is set to revolutionize the delivery of Broadband Wireless Access (BWA) not unlike how the IEEE802.11 Wi-Fi standard popularized wireless access to the masses. Designed to operate over distances as large as 50km at speeds of up to 74Mbps, it will serve many...

    Provided By INTI University College

  • White Papers // Jan 2011

    Performance of OFDM in the Variation of the Path Quantity in Power Line Communications

    Power line communication is an attractive alternative to traditional networks due to its ability to offer broadband internet access, telephone service, cable television and home automation. These are collectively known as in-home services using the existing power delivery network. However, the problems affecting power line communication transmission (e.g. multipath noise,...

    Provided By INTI University College

  • White Papers // Jan 2011

    A Blending of a Generalized Playfair Cipher and a Modified Hill Cipher

    In this paper, the authors have developed a block cipher by including the features of a generalized Play-fair cipher and a modified Hill cipher. This cipher involves multiplication with the key matrix, and the concepts such as interweaving, intertwining, and iteration. In this cipher, they have taken the entire plaintext...

    Provided By INTI University College

  • White Papers // May 2011

    Modeling and Analysis of Production System Using Operational Petri Nets With Resources Sharing

    In this paper a new approach of modeling of a Production System (PS) introduced which based on new class of Petri nets called the Operational Petri Net with Resources (OPPNR) sharing. The authors divide the whole modeling procedure of production system into two stages in first stage a subnets are...

    Provided By INTI University College

  • White Papers // May 2011

    BER Performance Evaluation of FFT-OFDM and DWT-OFDM

    Orthogonal Frequency Division Multiplexing (OFDM) is a special form of multi carrier transmission which has found its application in a number of wireless and wire-line systems. In an OFDM scheme, a large number of orthogonal, overlapping, narrow band sub-channels or subcarriers, transmitted in parallel, divide the available transmission bandwidth. The...

    Provided By INTI University College

  • White Papers // Nov 2010

    Establishment of IPv6 Network on Intranet Environment

    Internet Protocol Version Six (IPv6) is the next generation internet protocol. It is not yet possible to completely migrate to IPv6, but several transitions mechanisms are available to allow IPv6 and IPv4 coexist together in the same network infrastructure. The main benefit of this protocol is a larger address space...

    Provided By INTI University College

  • White Papers // Nov 2010

    Evaluation of the IEEE 802.11p-Based TDMA MAC Method for Road Side-to-Vehicle Communications

    Wireless Vehicular Communications (WVC) has been identified as a key technology for Intelligent Transportation Systems (ITS) for a few years ago. IEEE 802.11p is the proposed standard for physical and MAC layer of WVC devices. The main objective of the standard is to change the frame format and increase delay...

    Provided By INTI University College

  • White Papers // Sep 2010

    Does Employee Alignment Affect Business-IT Alignment? an Empirical Analysis

    In this paper, the authors investigate if employee alignment will influence the business-IT alignment in organizations. The authors measured employee alignment through perceived organizational trust, perceived communications on business-IT strategies to employees, perceived employee commitment to business-IT strategies and perceived knowledge on business-IT strategies. Structural Equation Modeling (SEM) is used...

    Provided By INTI University College