Jaypee University of Information Technology

Displaying 1-21 of 21 results

  • White Papers // Apr 2013

    Performance of Concatenated Optimized Irregular LDPC Code with Alamouti Coded MIMO-OFDM Systems

    Multiple Input Multiple Output (MIMO) communication systems along with Orthogonal Frequency Division Multiplexing (OFDM) have a great potential for future 4G broadband wireless communications. Recently, Low Density Parity Check codes (LDPC) achieves good error correcting performance and capacity near Shannon's limit. In this paper, the authors considered the performance analysis...

    Provided By Jaypee University of Information Technology

  • White Papers // Feb 2013

    Future of All Technologies - The Cloud and Cyber Physical Systems

    Modern society relies on a web of physical network infrastructures, such as power stations, telecommunication networks and transportation systems. Thanks to technological advances, these infrastructures have become increasingly dependent on one another and have emerged as interdependent networks. While interdependency enables to build systems that are larger, smarter and more...

    Provided By Jaypee University of Information Technology

  • White Papers // Jan 2013

    Performance Analysis and PAPR Reduction of Coded OFDM (with RSCC and Turbo Coding) System Using Modified SLM, PTS and DHT Precoding in Fading Environments

    In wireless communication, parallel transmission of symbols using multi carriers is used to achieve high efficiency in terms of throughput and better transmission quality. Orthogonal Frequency Division Multiplexing (OFDM) is one of the techniques for parallel transmission of information. In multipath environment the performance of orthogonal frequency division multiplexing degrades...

    Provided By Jaypee University of Information Technology

  • White Papers // Jan 2013

    OVSF Based Fair and Multiplexed Priority Calls Assignment CDMA Networks

    Code Division Multiple Access (CDMA) networks uses Orthogonal Variable Spreading Factor (OVSF) codes to support different transmission rates for different users which suffers from code blocking limitation. Multiplexing in digitized world is used for data selection. In this paper, calls are multiplexed to share the capacity of the network fairly...

    Provided By Jaypee University of Information Technology

  • White Papers // Dec 2012

    Load Balancing of Nodes in Cloud Using Ant Colony Optimization

    In this paper, the authors proposed an algorithm for load distribution of workloads among nodes of a cloud by the use of Ant Colony Optimization (ACO). This is a modified approach of ant colony optimization that has been applied from the perspective of cloud or grid network systems with the...

    Provided By Jaypee University of Information Technology

  • White Papers // Sep 2012

    A Benchmark to Select Data Mining Based Classification Algorithms For Business Intelligence And Decision Support Systems

    In today's business scenario, the authors percept major changes in how managers use computerized support in making decisions. As more number of decision-makers use computerized support in decision making, Decision Support Systems (DSS) is developing from its starting as a personal support tool and is becoming the common resource in...

    Provided By Jaypee University of Information Technology

  • White Papers // Jul 2012

    Connectivity and Coverage Preserving Schemes for Surveillance Applications in WSN

    In applications such as surveillance and target monitoring, high degree of coverage and connectivity are required. This paper investigates the problem of energy efficient coverage and connectivity for random placement of nodes such that active sensor nodes are minimized. The authors introduce an algorithm based on Connected Dominating Set (CDS)...

    Provided By Jaypee University of Information Technology

  • White Papers // Apr 2012

    Implementing Watermarking Concept Along with Data Compression in Multimedia Transmission

    This paper presents a technical review for enhancing security and reliability in the transmission of information. In this paper, Watermarking technique along with Data Compression is being described to improve the quality, security and efficiency in the transmission of information. In this paper, the authors provide a measure to remove...

    Provided By Jaypee University of Information Technology

  • White Papers // Mar 2012

    Smooth Cepstrum Calculation Using Modified Bartlett Hanning Window

    Cepstrum is an algorithm for analyzing the speech signals in frequency domain. This is conventional method of fundamental peak picking, i.e. fundamental frequency or pitch. For a speech signal it is necessary to identify the fundamental frequency correctly in order to have robust system for speaker identification and verification. Using...

    Provided By Jaypee University of Information Technology

  • White Papers // Feb 2012

    Code Scattering and Reduction in OVSF Code Blocking for 3G and Beyond Mobile Communication Systems

    Scattered vacant codes in Orthogonal Variable Spreading Factor (OVSF) code based 3G and beyond WCDMA wireless networks leads to code blocking which further gives call blocking. The paper proposes four single code assignment schemes to reduce code scattering. The use of assignment scheme depends upon the type of input calls....

    Provided By Jaypee University of Information Technology

  • White Papers // Nov 2011

    Performance Improvement in OVSF Based CDMA Networks Using Flexible Assignment of Data Calls

    Orthogonal Variable Spreading Factor (OVSF) codes are used to support multimedia calls in CDMA wireless networks. The inefficient use of OVSF code tree reduces the system throughput. The paper discusses a novel code assignment design to provide flexibility of rate variation in data calls maximizing channel utilization. The ongoing call...

    Provided By Jaypee University of Information Technology

  • White Papers // Sep 2011

    Abstract Model of Fault Tolerance Algorithm in Cloud Computing Communication Networks

    The authors discussed in this paper the modeling behavior of the cloud computing communication network through which processors exchange their messages. The goal is to develop an abstract description of a communication network that effectively enforces a TDMA-style access to the communication medium by avoiding that a "Babbling idiot" can...

    Provided By Jaypee University of Information Technology

  • White Papers // Jul 2011

    Integrating New Calls and Performance Improvement in Ovsf Based Cdma Networks

    In Code Division Multiple Access (CDMA), Orthogonal Variable Spreading Factor (OVSF) codes are used to allocate vacant codes when new calls arrive. In this paper, integration is done for allocation of OVSF codes when a quantized or non-quantized call arrives, and further, the voice calls and data calls are treated...

    Provided By Jaypee University of Information Technology

  • White Papers // Jul 2011

    A Framework for Stability and Security of an Operating System Through Process Level

    Today, computer systems are plagued with stability and security problems: applications lose data, web servers are hacked, and the systems crash under heavy load. Many of these problems arise from rare program behavior. This paper detects unusual program behavior and responds by slowing down that behavior. Delays also give users...

    Provided By Jaypee University of Information Technology

  • White Papers // May 2011

    Effective Ways of Secure, Private and Trusted Cloud Computing

    Cloud computing is an Internet-based computing, where shared resources, software and information, are provided to computers and devices on-demand. It provides people the way to share distributed resources and services that belong to different organization. Since cloud computing uses distributed resources in open environment, thus it is important to provide...

    Provided By Jaypee University of Information Technology

  • White Papers // May 2011

    Linear Network Coding on Multi-Mesh of Trees (MMT) Using All to All Broadcast (AAB)

    The authors introduce linear network coding on parallel architecture for multi-source finite acyclic network. In this problem, different messages in diverse time periods are broadcast and every non-source node in the network decodes and encodes the message based on further communication. They wish to minimize the communication steps and time...

    Provided By Jaypee University of Information Technology

  • White Papers // Mar 2011

    Algorithm for Intelligent Network Visualization and Threat Analysis

    Network security is an intriguing field which perplexes many and escapes more. Unfortunately, the issues surrounding network security are not such that the authors can afford for people either to ignore or to disregard policy and precautions put in place to protect users of a computer network. Network security is...

    Provided By Jaypee University of Information Technology

  • White Papers // Feb 2011

    A Framework Based Approach for the Development of Web Based Applications

    J2EE is the current field of research as it provides new advancement to the field of web application development framework. Various open source frameworks are used for web application development. With the development of technology and communication technology, government wants to modernize their working. E-Governance portal can be used to...

    Provided By Jaypee University of Information Technology

  • White Papers // Feb 2011

    Ontology Based Approach for Video Transmission Over the Network

    With the increase in the bandwidth & the transmission speed over the internet, transmission of multimedia objects like video, audio, images has become an easier work. In this paper the authors provide an approach that can be useful for transmission of video objects over the internet without much fuzz. The...

    Provided By Jaypee University of Information Technology

  • White Papers // Jan 2011

    Knowledge Management System Design Using Extended Gaia

    Agent oriented techniques have the potential to significantly improve current practice in software engineering and to extend the range of applications that can feasibly be tackled. Multi agent systems This paper deals with a multi agent learning resource centre. The designing of the various agents is done through Gaia. The...

    Provided By Jaypee University of Information Technology

  • White Papers // Oct 2008

    Optimum Path Computation Algorithms for Multimedia and Real Time Services Over IP-Networks

    Traditional Routing Techniques over internet involves shortest path based on minimum distance, delay, etc. for various applications including E- mail, instant messaging, voice-over-IP, etc. Such a technique is based upon connection-less approach where multiple paths are formed between source and destination. Although such an approach supports faster and less delayed...

    Provided By Jaypee University of Information Technology

  • White Papers // Jan 2013

    Performance Analysis and PAPR Reduction of Coded OFDM (with RSCC and Turbo Coding) System Using Modified SLM, PTS and DHT Precoding in Fading Environments

    In wireless communication, parallel transmission of symbols using multi carriers is used to achieve high efficiency in terms of throughput and better transmission quality. Orthogonal Frequency Division Multiplexing (OFDM) is one of the techniques for parallel transmission of information. In multipath environment the performance of orthogonal frequency division multiplexing degrades...

    Provided By Jaypee University of Information Technology

  • White Papers // Jan 2013

    OVSF Based Fair and Multiplexed Priority Calls Assignment CDMA Networks

    Code Division Multiple Access (CDMA) networks uses Orthogonal Variable Spreading Factor (OVSF) codes to support different transmission rates for different users which suffers from code blocking limitation. Multiplexing in digitized world is used for data selection. In this paper, calls are multiplexed to share the capacity of the network fairly...

    Provided By Jaypee University of Information Technology

  • White Papers // Feb 2012

    Code Scattering and Reduction in OVSF Code Blocking for 3G and Beyond Mobile Communication Systems

    Scattered vacant codes in Orthogonal Variable Spreading Factor (OVSF) code based 3G and beyond WCDMA wireless networks leads to code blocking which further gives call blocking. The paper proposes four single code assignment schemes to reduce code scattering. The use of assignment scheme depends upon the type of input calls....

    Provided By Jaypee University of Information Technology

  • White Papers // Jul 2012

    Connectivity and Coverage Preserving Schemes for Surveillance Applications in WSN

    In applications such as surveillance and target monitoring, high degree of coverage and connectivity are required. This paper investigates the problem of energy efficient coverage and connectivity for random placement of nodes such that active sensor nodes are minimized. The authors introduce an algorithm based on Connected Dominating Set (CDS)...

    Provided By Jaypee University of Information Technology

  • White Papers // Apr 2013

    Performance of Concatenated Optimized Irregular LDPC Code with Alamouti Coded MIMO-OFDM Systems

    Multiple Input Multiple Output (MIMO) communication systems along with Orthogonal Frequency Division Multiplexing (OFDM) have a great potential for future 4G broadband wireless communications. Recently, Low Density Parity Check codes (LDPC) achieves good error correcting performance and capacity near Shannon's limit. In this paper, the authors considered the performance analysis...

    Provided By Jaypee University of Information Technology

  • White Papers // Oct 2008

    Optimum Path Computation Algorithms for Multimedia and Real Time Services Over IP-Networks

    Traditional Routing Techniques over internet involves shortest path based on minimum distance, delay, etc. for various applications including E- mail, instant messaging, voice-over-IP, etc. Such a technique is based upon connection-less approach where multiple paths are formed between source and destination. Although such an approach supports faster and less delayed...

    Provided By Jaypee University of Information Technology

  • White Papers // Feb 2011

    A Framework Based Approach for the Development of Web Based Applications

    J2EE is the current field of research as it provides new advancement to the field of web application development framework. Various open source frameworks are used for web application development. With the development of technology and communication technology, government wants to modernize their working. E-Governance portal can be used to...

    Provided By Jaypee University of Information Technology

  • White Papers // Jan 2011

    Knowledge Management System Design Using Extended Gaia

    Agent oriented techniques have the potential to significantly improve current practice in software engineering and to extend the range of applications that can feasibly be tackled. Multi agent systems This paper deals with a multi agent learning resource centre. The designing of the various agents is done through Gaia. The...

    Provided By Jaypee University of Information Technology

  • White Papers // Feb 2011

    Ontology Based Approach for Video Transmission Over the Network

    With the increase in the bandwidth & the transmission speed over the internet, transmission of multimedia objects like video, audio, images has become an easier work. In this paper the authors provide an approach that can be useful for transmission of video objects over the internet without much fuzz. The...

    Provided By Jaypee University of Information Technology

  • White Papers // May 2011

    Effective Ways of Secure, Private and Trusted Cloud Computing

    Cloud computing is an Internet-based computing, where shared resources, software and information, are provided to computers and devices on-demand. It provides people the way to share distributed resources and services that belong to different organization. Since cloud computing uses distributed resources in open environment, thus it is important to provide...

    Provided By Jaypee University of Information Technology

  • White Papers // May 2011

    Linear Network Coding on Multi-Mesh of Trees (MMT) Using All to All Broadcast (AAB)

    The authors introduce linear network coding on parallel architecture for multi-source finite acyclic network. In this problem, different messages in diverse time periods are broadcast and every non-source node in the network decodes and encodes the message based on further communication. They wish to minimize the communication steps and time...

    Provided By Jaypee University of Information Technology

  • White Papers // Jul 2011

    Integrating New Calls and Performance Improvement in Ovsf Based Cdma Networks

    In Code Division Multiple Access (CDMA), Orthogonal Variable Spreading Factor (OVSF) codes are used to allocate vacant codes when new calls arrive. In this paper, integration is done for allocation of OVSF codes when a quantized or non-quantized call arrives, and further, the voice calls and data calls are treated...

    Provided By Jaypee University of Information Technology

  • White Papers // Sep 2011

    Abstract Model of Fault Tolerance Algorithm in Cloud Computing Communication Networks

    The authors discussed in this paper the modeling behavior of the cloud computing communication network through which processors exchange their messages. The goal is to develop an abstract description of a communication network that effectively enforces a TDMA-style access to the communication medium by avoiding that a "Babbling idiot" can...

    Provided By Jaypee University of Information Technology

  • White Papers // Nov 2011

    Performance Improvement in OVSF Based CDMA Networks Using Flexible Assignment of Data Calls

    Orthogonal Variable Spreading Factor (OVSF) codes are used to support multimedia calls in CDMA wireless networks. The inefficient use of OVSF code tree reduces the system throughput. The paper discusses a novel code assignment design to provide flexibility of rate variation in data calls maximizing channel utilization. The ongoing call...

    Provided By Jaypee University of Information Technology

  • White Papers // Mar 2011

    Algorithm for Intelligent Network Visualization and Threat Analysis

    Network security is an intriguing field which perplexes many and escapes more. Unfortunately, the issues surrounding network security are not such that the authors can afford for people either to ignore or to disregard policy and precautions put in place to protect users of a computer network. Network security is...

    Provided By Jaypee University of Information Technology

  • White Papers // Mar 2012

    Smooth Cepstrum Calculation Using Modified Bartlett Hanning Window

    Cepstrum is an algorithm for analyzing the speech signals in frequency domain. This is conventional method of fundamental peak picking, i.e. fundamental frequency or pitch. For a speech signal it is necessary to identify the fundamental frequency correctly in order to have robust system for speaker identification and verification. Using...

    Provided By Jaypee University of Information Technology

  • White Papers // Apr 2012

    Implementing Watermarking Concept Along with Data Compression in Multimedia Transmission

    This paper presents a technical review for enhancing security and reliability in the transmission of information. In this paper, Watermarking technique along with Data Compression is being described to improve the quality, security and efficiency in the transmission of information. In this paper, the authors provide a measure to remove...

    Provided By Jaypee University of Information Technology

  • White Papers // Sep 2012

    A Benchmark to Select Data Mining Based Classification Algorithms For Business Intelligence And Decision Support Systems

    In today's business scenario, the authors percept major changes in how managers use computerized support in making decisions. As more number of decision-makers use computerized support in decision making, Decision Support Systems (DSS) is developing from its starting as a personal support tool and is becoming the common resource in...

    Provided By Jaypee University of Information Technology

  • White Papers // Jul 2011

    A Framework for Stability and Security of an Operating System Through Process Level

    Today, computer systems are plagued with stability and security problems: applications lose data, web servers are hacked, and the systems crash under heavy load. Many of these problems arise from rare program behavior. This paper detects unusual program behavior and responds by slowing down that behavior. Delays also give users...

    Provided By Jaypee University of Information Technology

  • White Papers // Dec 2012

    Load Balancing of Nodes in Cloud Using Ant Colony Optimization

    In this paper, the authors proposed an algorithm for load distribution of workloads among nodes of a cloud by the use of Ant Colony Optimization (ACO). This is a modified approach of ant colony optimization that has been applied from the perspective of cloud or grid network systems with the...

    Provided By Jaypee University of Information Technology

  • White Papers // Feb 2013

    Future of All Technologies - The Cloud and Cyber Physical Systems

    Modern society relies on a web of physical network infrastructures, such as power stations, telecommunication networks and transportation systems. Thanks to technological advances, these infrastructures have become increasingly dependent on one another and have emerged as interdependent networks. While interdependency enables to build systems that are larger, smarter and more...

    Provided By Jaypee University of Information Technology