Maxwell Science Publication

Displaying 1-18 of 18 results

  • White Papers // Jun 2013

    Research on Data Integration Based on Cloud Computing

    With the rapid development of Internet, websites become important medium for spreading and exchanging of information. Abundant information can be found on the web, which realizes the information sharing and improves the utilization of resources in some sense. In this paper, the authors give some strategies for selecting the data...

    Provided By Maxwell Science Publication

  • White Papers // Jun 2013

    Priority User Access for Social Network Security

    Attacking the information of any institute that used social network may affect their business and can cause huge financial losses whose value is immeasurable. Social networking sites are the place where the users not only post their messages but also submit personal details. The weaken security of users' accounts in...

    Provided By Maxwell Science Publication

  • White Papers // Apr 2013

    Novel Security Conscious Evaluation Criteria for Web Service Composition

    In this paper, the authors aim to present a new mathematical based evaluation method for service composition with respects to security aspects. Web service composition as complex problem solver in service computing has become one of the recent challenging issues in today's web environment. It makes a new added value...

    Provided By Maxwell Science Publication

  • White Papers // Feb 2013

    Secure Access to Private Services in Intranet for Mobile Clients

    With wide adoption of Service Computing and Mobile Computing, people tend to invoke services with mobile devices, requiring accurate and real-time feedback from services at any time and any place. Among these services, some are private to limited users and require identity authorization before use; hence secure access control in...

    Provided By Maxwell Science Publication

  • White Papers // Jun 2012

    Strategic Use of Database Marketing for Marketing Decicion-Making

    The purpose of this paper is to examine the current uses of database marketing, intelligence building and marketing decision-making; as well as identifying the future uses of database marketing in marketing decision-making. The paper adopted a descriptive research approach in describing the current uses of database marketing and its associated...

    Provided By Maxwell Science Publication

  • White Papers // Jun 2012

    Grid Resource Allocation: A Review

    As computing technology improves the accessibility to computing resources increases, the demands put on resources gets higher and higher. A grid is a large-scale, heterogeneous, dynamic collection of independent systems, geographically distributed and interconnected with high speed networks. Furthermore, in grid, the resource allocation is a process of allocating user...

    Provided By Maxwell Science Publication

  • White Papers // Jun 2012

    A Case Study on Satellite Image Fusion Techniques

    Many image fusion algorithms and software tools have been developed for combining images of different spectral and spatial resolution. The resultant color image is of high resolution and is used in different remote sensing applications which involve wide range of spatial, spectral, radiometric and temporal resolutions. This paper presents a...

    Provided By Maxwell Science Publication

  • White Papers // Jun 2012

    A Novel Cryptographic Key Generation Method Using Image Features

    Several methods in steganography and cryptography have been proposed for secured communication. But many compromises are there in them. Steganography which deals with security using multimedia has a very big disadvantage of increase in the information size. Cryptography which deals with encryption using the keys generated by various algorithms has...

    Provided By Maxwell Science Publication

  • White Papers // Apr 2012

    Performance Comparison of IEEE 802.11e EDCA and 802.11b DCF Under Non- Saturation Condition Using Network Simulator

    In this paper, throughput and delay performance of IEEE 802.11b and 802.11e is presented under non-saturation conditions. In order to improve the performance of IEEE 802.11b, the IEEE 802.11e has been proposed to improve the Quality of Services (QoS) for multimedia application. The standard 802.11b CSMA/CA contention mechanism does not...

    Provided By Maxwell Science Publication

  • White Papers // Mar 2012

    Hybrid Cloud Computing in E-Governance: Related Security Risks and Solutions

    This paper gives insights on security issues and related solutions in hybrid cloud computing especially in e-governance. Cloud computing is rapidly picking its speed and popularity in Information and Communication Technology (ICT) world. The main factors behind its popularity and universal acceptability are pay per use, rapid elasticity, on demand...

    Provided By Maxwell Science Publication

  • White Papers // Mar 2011

    Simulated Annealing in Telecommunication Network Planning

    Fixed Wireless Access (FWA) systems overall design procedure is time consuming and critical for their successful commercial deployment as well as their efficient operation and management. This paper describes the mathematical model for the base station location problem in FWA-networks and solves the problem using simulated annealing while minimizing the...

    Provided By Maxwell Science Publication

  • White Papers // Mar 2011

    Informative Motif Detection Using Data Mining

    Motif finding in biological sequences is a fundamental problem in computational biology with important applications in understanding gene regulation, protein family identification and determination of functionally and structurally important identities. The large amounts of biological data let them solve the problem of discovering patterns in biological sequences computationally. In this...

    Provided By Maxwell Science Publication

  • White Papers // Nov 2010

    Computing Rule Confidence Using Rough Set and Data Mining

    Rough Set theory is a new mathematical tool to deal with representation, learning, vagueness, uncertainty and generalization of knowledge. It has been used in machine learning, knowledge discovery, decision support system s and pattern recognition. It can abstract underlying rules from data. Confidence is the criterion to scaling the reliability...

    Provided By Maxwell Science Publication

  • White Papers // Sep 2010

    Using Server Clusterization to Establish Fault-Tolerant Internet Connectivity

    This paper discusses the issue of providing tolerance to hardware and software faults in Internet system as well as issues related to clusterization of servers. A replication scheme is presented, and a detailed dependability analysis of this scheme is performed. The proposed model was designed mainly for fault-tolerant internet system...

    Provided By Maxwell Science Publication

  • White Papers // Aug 2009

    Performance Assessment of Some CPU Scheduling Algorithms

    The problem of scheduling which computer process run at what time on the Central Processing Unit (CPU) or the processor is explored. Three basic CPU scheduling algorithms (namely first come first serve, priority scheduling and shortest job first) were discussed and evaluated on four CPU scheduling objectives or goals (average...

    Provided By Maxwell Science Publication

  • White Papers // Aug 2009

    Low Power MPEG Video Player Using Dynamic Voltage Scaling

    In static voltage mechanism MPEG video player, takes more energy. In the authors' paper Dynamic Voltage/frequency Scaling (DVS) mechanism is implemented and the player scales the voltage level for the frames of next interval based on decoding time prediction. The decoding time of a frame is predicted by the size...

    Provided By Maxwell Science Publication

  • White Papers // Aug 2009

    An Approach to Minimize the Impact of Residual MAI in MMSE Multiuser Detector

    Capacity of CDMA system is interference limited. Multiuser detection is one of the methods used to enhance the capacity of CDMA system. In this paper, an improved MMSE based multiuser detector is proposed. The conventional detector is optimized to combat the Additive White Guassian Noise (AWGN), while MMSE detector has...

    Provided By Maxwell Science Publication

  • White Papers // Aug 2009

    Mobile Phone Technology in Banking System: Its Economic Effect

    Globally, various initiatives use the mobile phone to provide financial services to those with or without access to traditional banks. This paper outlined vividly the use of mobile phone in the banking industry, its economic implications, and in general a systematic look into the various forms of mobile banking with...

    Provided By Maxwell Science Publication

  • White Papers // Sep 2010

    Using Server Clusterization to Establish Fault-Tolerant Internet Connectivity

    This paper discusses the issue of providing tolerance to hardware and software faults in Internet system as well as issues related to clusterization of servers. A replication scheme is presented, and a detailed dependability analysis of this scheme is performed. The proposed model was designed mainly for fault-tolerant internet system...

    Provided By Maxwell Science Publication

  • White Papers // Mar 2011

    Simulated Annealing in Telecommunication Network Planning

    Fixed Wireless Access (FWA) systems overall design procedure is time consuming and critical for their successful commercial deployment as well as their efficient operation and management. This paper describes the mathematical model for the base station location problem in FWA-networks and solves the problem using simulated annealing while minimizing the...

    Provided By Maxwell Science Publication

  • White Papers // Mar 2011

    Informative Motif Detection Using Data Mining

    Motif finding in biological sequences is a fundamental problem in computational biology with important applications in understanding gene regulation, protein family identification and determination of functionally and structurally important identities. The large amounts of biological data let them solve the problem of discovering patterns in biological sequences computationally. In this...

    Provided By Maxwell Science Publication

  • White Papers // Mar 2012

    Hybrid Cloud Computing in E-Governance: Related Security Risks and Solutions

    This paper gives insights on security issues and related solutions in hybrid cloud computing especially in e-governance. Cloud computing is rapidly picking its speed and popularity in Information and Communication Technology (ICT) world. The main factors behind its popularity and universal acceptability are pay per use, rapid elasticity, on demand...

    Provided By Maxwell Science Publication

  • White Papers // Jun 2012

    Strategic Use of Database Marketing for Marketing Decicion-Making

    The purpose of this paper is to examine the current uses of database marketing, intelligence building and marketing decision-making; as well as identifying the future uses of database marketing in marketing decision-making. The paper adopted a descriptive research approach in describing the current uses of database marketing and its associated...

    Provided By Maxwell Science Publication

  • White Papers // Jun 2012

    Grid Resource Allocation: A Review

    As computing technology improves the accessibility to computing resources increases, the demands put on resources gets higher and higher. A grid is a large-scale, heterogeneous, dynamic collection of independent systems, geographically distributed and interconnected with high speed networks. Furthermore, in grid, the resource allocation is a process of allocating user...

    Provided By Maxwell Science Publication

  • White Papers // Jun 2012

    A Case Study on Satellite Image Fusion Techniques

    Many image fusion algorithms and software tools have been developed for combining images of different spectral and spatial resolution. The resultant color image is of high resolution and is used in different remote sensing applications which involve wide range of spatial, spectral, radiometric and temporal resolutions. This paper presents a...

    Provided By Maxwell Science Publication

  • White Papers // Jun 2012

    A Novel Cryptographic Key Generation Method Using Image Features

    Several methods in steganography and cryptography have been proposed for secured communication. But many compromises are there in them. Steganography which deals with security using multimedia has a very big disadvantage of increase in the information size. Cryptography which deals with encryption using the keys generated by various algorithms has...

    Provided By Maxwell Science Publication

  • White Papers // Feb 2013

    Secure Access to Private Services in Intranet for Mobile Clients

    With wide adoption of Service Computing and Mobile Computing, people tend to invoke services with mobile devices, requiring accurate and real-time feedback from services at any time and any place. Among these services, some are private to limited users and require identity authorization before use; hence secure access control in...

    Provided By Maxwell Science Publication

  • White Papers // Jun 2013

    Priority User Access for Social Network Security

    Attacking the information of any institute that used social network may affect their business and can cause huge financial losses whose value is immeasurable. Social networking sites are the place where the users not only post their messages but also submit personal details. The weaken security of users' accounts in...

    Provided By Maxwell Science Publication

  • White Papers // Apr 2013

    Novel Security Conscious Evaluation Criteria for Web Service Composition

    In this paper, the authors aim to present a new mathematical based evaluation method for service composition with respects to security aspects. Web service composition as complex problem solver in service computing has become one of the recent challenging issues in today's web environment. It makes a new added value...

    Provided By Maxwell Science Publication

  • White Papers // Jun 2013

    Research on Data Integration Based on Cloud Computing

    With the rapid development of Internet, websites become important medium for spreading and exchanging of information. Abundant information can be found on the web, which realizes the information sharing and improves the utilization of resources in some sense. In this paper, the authors give some strategies for selecting the data...

    Provided By Maxwell Science Publication

  • White Papers // Apr 2012

    Performance Comparison of IEEE 802.11e EDCA and 802.11b DCF Under Non- Saturation Condition Using Network Simulator

    In this paper, throughput and delay performance of IEEE 802.11b and 802.11e is presented under non-saturation conditions. In order to improve the performance of IEEE 802.11b, the IEEE 802.11e has been proposed to improve the Quality of Services (QoS) for multimedia application. The standard 802.11b CSMA/CA contention mechanism does not...

    Provided By Maxwell Science Publication

  • White Papers // Aug 2009

    Performance Assessment of Some CPU Scheduling Algorithms

    The problem of scheduling which computer process run at what time on the Central Processing Unit (CPU) or the processor is explored. Three basic CPU scheduling algorithms (namely first come first serve, priority scheduling and shortest job first) were discussed and evaluated on four CPU scheduling objectives or goals (average...

    Provided By Maxwell Science Publication

  • White Papers // Aug 2009

    Low Power MPEG Video Player Using Dynamic Voltage Scaling

    In static voltage mechanism MPEG video player, takes more energy. In the authors' paper Dynamic Voltage/frequency Scaling (DVS) mechanism is implemented and the player scales the voltage level for the frames of next interval based on decoding time prediction. The decoding time of a frame is predicted by the size...

    Provided By Maxwell Science Publication

  • White Papers // Aug 2009

    An Approach to Minimize the Impact of Residual MAI in MMSE Multiuser Detector

    Capacity of CDMA system is interference limited. Multiuser detection is one of the methods used to enhance the capacity of CDMA system. In this paper, an improved MMSE based multiuser detector is proposed. The conventional detector is optimized to combat the Additive White Guassian Noise (AWGN), while MMSE detector has...

    Provided By Maxwell Science Publication

  • White Papers // Aug 2009

    Mobile Phone Technology in Banking System: Its Economic Effect

    Globally, various initiatives use the mobile phone to provide financial services to those with or without access to traditional banks. This paper outlined vividly the use of mobile phone in the banking industry, its economic implications, and in general a systematic look into the various forms of mobile banking with...

    Provided By Maxwell Science Publication

  • White Papers // Nov 2010

    Computing Rule Confidence Using Rough Set and Data Mining

    Rough Set theory is a new mathematical tool to deal with representation, learning, vagueness, uncertainty and generalization of knowledge. It has been used in machine learning, knowledge discovery, decision support system s and pattern recognition. It can abstract underlying rules from data. Confidence is the criterion to scaling the reliability...

    Provided By Maxwell Science Publication