Kakatiya University

Displaying 1-6 of 6 results

  • White Papers // Feb 2013

    An Optimized Algorithm to Adjust the Channel Quality in HSDPA Network

    In this paper, the authors investigate single user throughput optimization in High Speed Downlink Packet Access (HSDPA). Specifically, they propose offline and online optimization algorithms which adjust the Channel Quality Indicator (CQI) used by the network for scheduling of data transmission. In the offline algorithm, a given target BLock Error...

    Provided By Kakatiya University

  • White Papers // Jan 2013

    Network Intrusion Detection Using Support Vector Machines

    The popularization of shared networks and Internet usage demands increases attention on information system security, particularly on intrusion detection. Intrusion detection in the internet is an active area of research. In this paper, the authors apply one of the efficient data mining algorithms called Support Vector Machines (SVM) for network...

    Provided By Kakatiya University

  • White Papers // Jun 2012

    Tracking the Trends of Financial Applications Using Genetic Algorithm

    The generation of profitable trading rules for stock market investments is a difficult task but admired problem. First stage is classifying the prone direction of the price for India Cements Stock Price Index (ICSPI) futures with several technical indicators using artificial intelligence techniques. And second stage is mining the trading...

    Provided By Kakatiya University

  • White Papers // Sep 2011

    Wireless Mobile Ad-Hoc Shortest Path Routing in Delay Tolerant Networks

    Opportunistic delay tolerant networks are organized by the sporadic connectivity between their nodes and the lack of stable paths from sender to receiver. Future connections are mostly unknown in these networks sending used to deliver the messages with effective forwarding data i.e., average intermeeting time between nodes to avoid risks...

    Provided By Kakatiya University

  • White Papers // Apr 2011

    Quality of Service for Mobile Ad-Hoc Wireless Networks

    Mobile Ad-hoc NETwork (MANET) is a wireless network without infrastructure. Nodes can commutate each other without central infrastructure; because they are self organised and self configurable with easy deployment. To commutative each other it is required efficient routing protocols in MANET technology. In these the authors find out an efficient...

    Provided By Kakatiya University

  • White Papers // Jul 2010

    Building Reusable Software Component for Optimization Check in ABAP Coding

    Software component reuse is the software engineering practice of developing new software products from existing components. A reuse library or component reuse repository organizes stores and manages reusable components. This paper describes how a reusable component is created, how it reuses the function and checking if optimized code is being...

    Provided By Kakatiya University

  • White Papers // Jan 2013

    Network Intrusion Detection Using Support Vector Machines

    The popularization of shared networks and Internet usage demands increases attention on information system security, particularly on intrusion detection. Intrusion detection in the internet is an active area of research. In this paper, the authors apply one of the efficient data mining algorithms called Support Vector Machines (SVM) for network...

    Provided By Kakatiya University

  • White Papers // Jun 2012

    Tracking the Trends of Financial Applications Using Genetic Algorithm

    The generation of profitable trading rules for stock market investments is a difficult task but admired problem. First stage is classifying the prone direction of the price for India Cements Stock Price Index (ICSPI) futures with several technical indicators using artificial intelligence techniques. And second stage is mining the trading...

    Provided By Kakatiya University

  • White Papers // Feb 2013

    An Optimized Algorithm to Adjust the Channel Quality in HSDPA Network

    In this paper, the authors investigate single user throughput optimization in High Speed Downlink Packet Access (HSDPA). Specifically, they propose offline and online optimization algorithms which adjust the Channel Quality Indicator (CQI) used by the network for scheduling of data transmission. In the offline algorithm, a given target BLock Error...

    Provided By Kakatiya University

  • White Papers // Jul 2010

    Building Reusable Software Component for Optimization Check in ABAP Coding

    Software component reuse is the software engineering practice of developing new software products from existing components. A reuse library or component reuse repository organizes stores and manages reusable components. This paper describes how a reusable component is created, how it reuses the function and checking if optimized code is being...

    Provided By Kakatiya University

  • White Papers // Apr 2011

    Quality of Service for Mobile Ad-Hoc Wireless Networks

    Mobile Ad-hoc NETwork (MANET) is a wireless network without infrastructure. Nodes can commutate each other without central infrastructure; because they are self organised and self configurable with easy deployment. To commutative each other it is required efficient routing protocols in MANET technology. In these the authors find out an efficient...

    Provided By Kakatiya University

  • White Papers // Sep 2011

    Wireless Mobile Ad-Hoc Shortest Path Routing in Delay Tolerant Networks

    Opportunistic delay tolerant networks are organized by the sporadic connectivity between their nodes and the lack of stable paths from sender to receiver. Future connections are mostly unknown in these networks sending used to deliver the messages with effective forwarding data i.e., average intermeeting time between nodes to avoid risks...

    Provided By Kakatiya University