Research In Motion

Displaying 1-40 of 305 results

  • White Papers // Jan 2014

    Authentication & Verification of Secure Parking Using OCR Technique

    Intelligent Transportation System (ITS) has become an integral part of the Transportation Industry these days and it consists of License Plate Recognition (LPR) System. License Plate Recognition is also called Car Plate Recognition (CPR) or Automatic Number Plate Recognition (ANPR) System. In this paper an attempt has been made to...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Refinement of Web Search using Word Sense Disambiguation and Intent Mining

    Searching or retrieving information on the Internet using any web search engine displays documents in enormous amounts. Information retrieval is the activity of tracing and obtaining relevant information from a collection of information resources. It is a challenging task for retrieving relevant information over the Internet. Although there are search...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Instant Messaging Service on Android Smartphones and Personal Computers

    Android is an operating system for Smartphone's, tablets and now will be used for personal computers also. It includes a touch screen user interface, widgets, camera, network data monitoring and all the other features that enable a cell phone to be called a Smartphone. Basically, multi-purpose chat application allows users...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Big Data Analytic and Mining with Machine Learning Algorithm

    Big data concern large-volume, complex, growing data sets with multiple, autonomous sources. With the fast development of networking, data storage, and the data collection capacity, big data are now rapidly expanding in all science and engineering domains, including physical, biological and biomedical sciences. This data-driven model involves demand-driven aggregation of...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Cloud Computing with Azure PaaS for Educational Institutions

    Many universities provide the provision for online admissions, filling exam form online, declaring results online. Filling exam form online requires uploading the previous semester mark sheets and verifying subject for the current semester. Lacs of students are hitting the university server at certain duration to fill online exam form, which...

    Provided By Research In Motion

  • White Papers // Sep 2013

    Multiple Distinguishing Factors Based Measure for Data Misuseability Detection

    Data Anantapur (Autonomous), India. is valuable for any business. The power of organization lies in the data it maintains. Preserving such data and securing it has to be given paramount importance. Misuse of such data is a challenge to organizations. The data in an organization is used by the insiders....

    Provided By Research In Motion

  • White Papers // Sep 2013

    Analysis of Parallelization Techniques and Tools

    Parallel computing solves computationally large problems by partitioning into multiple tasks and running simultaneously on multicore or multiprocessor environment based on shared or distributed memory architectures. New multicore era demands software programmer to develop parallel programs to completely utilize the hardware parallelism. Writing parallel program manually for complex problem is...

    Provided By Research In Motion

  • White Papers // Jan 2007

    Low Power SRAM Design with Reduced Read/Write Time

    In this paper the authors explore the design and analysis of Static Random Access Memories (SRAMs) which focuses on optimizing delay and power. CMOS SRAM cell consumes very less power and have less read and write time. Higher cell ratios can decrease the read and write time and improve stability....

    Provided By Research In Motion

  • White Papers // Jan 2007

    MARTE Genetic Algorithm for Uncovering Scenarios Leading to Data Races in Concurrent Systems

    Identifying the concurrency problems early in the design process is most important. Because, these problems caused to disturbance or damage when building larger and more complex systems. The recent trend is Model Driven Development (MDD), so there is a method used for the detecting concurrency problems, which is based on...

    Provided By Research In Motion

  • White Papers // Jan 2007

    SADS - Self Annihilating Data Storage system in Cloud Storage Service

    Personal data stored in the cloud may contain account numbers, passwords, notes, and other important information that could be used and misused by a miscreant, a competitor, or a court of law. These data are cached, copied, and archived by Cloud Service Providers (CSPs), often without users' authorization and control....

    Provided By Research In Motion

  • White Papers // Jan 2007

    Self Annihilating Data Storage and Location Based nonterminating Video Streaming Services for Mobile Users in CLOUD Environment

    Cloud computing has become a popular buzzword and it has been widely used to refer to different technologies, services, and concepts. With the use of cloud computing, here the authors are trying to give the location based efficient video information to the mobile users. Location Based Service (LBS) is an...

    Provided By Research In Motion

  • White Papers // May 2013

    Emulation of FTP Service Using Virtual Honeypot

    Security, over the last decade, has become a huge priority for the network administrators. They dedicate lots of time to make sure that each network has the best and latest security patches, firewalls, and intrusion detection systems. Unfortunately, the security patches such as firewalls and intrusion detection systems are not...

    Provided By Research In Motion

  • White Papers // Jan 2007

    Survey Paper on Workflow Scheduling Algorithms Used in Cloud Computing

    Cloud computing is one of the emerging technologies which expand the boundary of internet by using the centralized servers to maintain data and resources. It enables the users and the consumers to use various applications provided by the cloud provider. But one of the major problems in front of this...

    Provided By Research In Motion

  • White Papers // Feb 2014

    CMiS: A Cloud Computing Based Management Information System

    Cloud computing is gaining its importance in day to day business scenario because of its scalability, robustness and cost saving capabilities. Management information system is one of the major components of any business organization. It helps to adopt future operating strategy, to determine day to day operating procedure, analysis of...

    Provided By Research In Motion

  • White Papers // Jun 2014

    Performance Analysis of Intrusion Detection System over Mobile Cloud System

    The usage of Smartphone is increasing day-by-day and the security is a great concern for web accessing, in the smart phone for example the authors are performing banking transactions by using smart phones like transferring the amount from one account to another account to their mobile phones. there is no...

    Provided By Research In Motion

  • White Papers // Jun 2014

    Data Experience Elevation through Network Intervention

    The main element or the main factor driving the mobile network communication is the data. Data mainly refers to packet data connection that a mobile handsets use to fetch information from the internet also known as World Wide Web (WWW). 3G also known as the 3rd generation internet is the...

    Provided By Research In Motion

  • White Papers // Jul 2014

    An Efficient Model for Share Market Prediction Using Data Mining Techniques

    Share market acts as one of the key role for building economy of any developing nation. It is highly complex to determine booms and crashes in the market, so it became one of the interesting and challenging topics for all the business researchers to predict an accurate share value. In...

    Provided By Research In Motion

  • White Papers // Jun 2014

    Fault Data Aggregator Recovery Process in Wireless Sensor Networks

    A wireless sensor network is collected with thousands of miniature resource insufficient sensor nodes, set with controller, transceivers and non-rechargeable batteries. The transmission of data from each sensor node to other nodes consumes more energy than data processing in the controller unit of sensor nodes. To enlarge the network lifetime...

    Provided By Research In Motion

  • White Papers // Jul 2014

    A Survey on Multi-Relational Database based Classification Approaches

    In real world, data are stored in multiple relational databases. many problems like expensive join operation and semantic losses in classifying objects stored in multiple tables (relations) involves. Multi relational classification is the process of building a classifier based on information stored in multiple relations This approach has been developed...

    Provided By Research In Motion

  • White Papers // Jul 2014

    Performance and Analysis of Reconfigurable Video Game Design Using FPGA

    FPGA (Field Programmable Gate Array) is widely used in different applications like image processing, signal processing, and digital system design, wired and wireless communications. Due to reconfigurability nature of FPGA a video game is designed in Spartan-3E target device. The video game is designed in three different hardware description programming...

    Provided By Research In Motion

  • White Papers // Jul 2014

    Visualization of Big Data: Its Tools and Challenges

    The rapid development of the heterogeneous networking and social websites is leading to the exponential growth in the amount of the data. To examine the bulky amount of data, from concealed patterns and unidentified correlations, the big data analysts require visualization tools. The visualization tools help in gaining insight about...

    Provided By Research In Motion

  • White Papers // Jun 2014

    Notation based Content Extraction from Disparate Databases Using Ontology

    In knowledge-discovery and data mining, the method of finding huge volumes of data for patterns using tools such as categorization, clustering, etc. is very common. The data thus has received too many parameters. For someone who is a non skilled in data mining, the obtained policy are too far away,...

    Provided By Research In Motion

  • White Papers // Jul 2014

    Survey Paper on Concurrency control mechanisms in a Distributed Database Environment

    In this paper, the various mechanisms used for concurrency control in a distributed database are summarized and their respective advantages and disadvantages are listed. Distributed databases have become a large part of the current information era. Millions of users access the data stored on these databases at a time. This...

    Provided By Research In Motion

  • White Papers // Jul 2014

    Replication in a simply Distributed, Mobile Ad-hoc, Cloud, Internet and Peer to Peer Environment: A Multi Dimensional Analysis and the scope for extension

    Replication has been a popular technique that provides increased data or service availability in case of failure or crash of server or the node which is responsible to serve the requested data or service. Replication improves data availability, data accessibility, fault tolerance and reliability of the network that is targeted...

    Provided By Research In Motion

  • White Papers // Jul 2014

    Mining High Profit Itemsets using Heuristic Rule Framing Algorithm from Transactional Database

    Data mining is the process of eliciting data from the Brobdingnagian datasets. It is hard to compute when the database is having irrelevant data and also it occupies more space. The authors' normal lives will fully moving beyond to the computers. So the number of data to be stored has...

    Provided By Research In Motion

  • White Papers // May 2014

    Secure Data Transaction Using Cryptographic Algorithm in ARM

    Wireless network is the contrivance used to transmit data over wide field and its significance is mounting worldly in many crucial applications medical, industries, military etc. Authentication is the security factor must be implied for secure data transmission. Encrypted data is usable and beneficial in the field where invader interruption...

    Provided By Research In Motion

  • White Papers // Jun 2014

    Cluster Based Secure Aggregation(CBSA) in WSN Using Pairwise Key Establishment Technique

    Sensor nodes are commonly endowed with data monitoring and broadcasting capabilities. It will communicate the collected data through the radio transceiver to the sink node either directly or through the intermediate nodes. In networking more sensor nodes are required to identify the network fault and also used to identify the...

    Provided By Research In Motion

  • White Papers // May 2014

    Data Based Prediction and Control of a Non-Linear Process

    Real time non-linear processes consists of disturbances and noise, which makes it difficult to control the quality of the end product. Actuated by this the authors present a simple data based prediction and control technique to improve the product quality. The strategy involves modeling by system identification using N4SID method...

    Provided By Research In Motion

  • White Papers // May 2014

    Aligning Knowledge Bases Using Mining Rule

    The semantic web has faced an exponent progress in the last decade, and now it possesses a number of Knowledge Bases (KBs). The KBs is connected to the Web of data by using the linked open data. On the other hand the links between the KBs do not concern much...

    Provided By Research In Motion

  • White Papers // Jul 2014

    Location-Aware E-passport: Enhancing Security and Privacy

    In E-passport identification process reading RFID are used. In the related work RFID's are embedded inside a chip which is holding the information of authentication. In this paper the implementation of E-passport using mobile devices to authenticate and access information stored by using context aware information to get access to...

    Provided By Research In Motion

  • White Papers // Jul 2014

    CB-Asymmetric Coplanar L Strip-Fed Dual Band Antenna for GSM/WLAN Application

    In this paper is to give a conductor backed asymmetric coplanar inverted Lstrip fed antenna for dual band applications. The antenna exhibit resonance at 1. 8GHz (1. 6-1. 85GHz) and 5. 2GHz (5. 08-5. 35GHz) with impedance band width of about 150MHz and 200MHz (return loss>-10dB) which is used for...

    Provided By Research In Motion

  • White Papers // Jul 2014

    LESIPT: Lightweight Enhanced Secure Incentive Protocol with Trusted Value for Multi-hop Wireless Networks

    In multi-hop wireless networks the communications rely on intermediate nodes that require collaboration; however, selfish nodes make use of the cooperative nodes to relay their packets and do not relay other nodes' packets. In this paper, the authors propose LESIPT: Lightweight Enhanced Secure Incentive Protocol with Trusted value for multi-hop...

    Provided By Research In Motion

  • White Papers // Jul 2014

    Automatic Fall Detection for Elderly - Providing Timely Aid Using GSM Modem

    The number of persons above the age of 60 years is fast growing, especially in India. Falls are one of the major problems in the elderly and are considered one of the \"Geriatric Giants\". In the paper, the authors propose a camera based automatic fall detection method to facilitate the...

    Provided By Research In Motion

  • White Papers // Jul 2014

    A 33kV Distribution Network Feeder Reconfiguration by Using REPSO for Voltage Profile Improvement

    The complexity of modern power system has contributed to the high power losses and over load in the distribution network. Due to that reason, Feeder Reconfiguration (FR) is required to identify the best topology network in order to fulfill the power demand with reduced power losses while stabilizing the magnitude...

    Provided By Research In Motion

  • White Papers // Jul 2014

    Robotic Control with Android & PC Using X-Bee

    In this paper, the authors concerned with the Android-Arduino communication and computer-communication by integrating mobile wheel robots with X-Bee communication protocol. Arduino controls tasks such as obstacle and collision avoidances following, autonomously movement, and indoor localization of group robots are implemented toward an autonomously control of robot. Mobile robotics is...

    Provided By Research In Motion

  • White Papers // Jul 2014

    Performance Analysis of Artificial Nueral Network Based Shuntactive Power Filter

    In this paper, the authors investigate a 3-wire Shunt Active Power Filter (SAPF) with Artificial Neural Network (ANN) smart controllers for mitigating the harmonics of the distribution system. To improve the performance of the conventional controller based on hysteresis controller and take advantage of smart-controllers, a feed forward-type (trained by...

    Provided By Research In Motion

  • White Papers // Jun 2014

    Hybrid Query Generation Schemas for Full Text Retrieval in P2P Networks

    Now-a-days millions of users to search and download desired data such as Napster and Gnutella as they are Peer-To-Peer (P2P) files sharing applications. In order to improve performance in unstructured P2Ps replication strategies are used. Efficient and effective full-text retrieval over unstructured p2p networks was developed in order to address...

    Provided By Research In Motion

  • White Papers // Jul 2014

    Analysis of Gateway Relocation Strategies in 802.16 Heterogeneous Networks

    IEEE 802.16-series are expected to provide broadband wireless access for a variety of multimedia services. To minimize handover delay and packet loss the authors defined a two-tiered mobility management in WiMAX Forum. WiMAX standards define the Access Service Network GateWay ASN GW relocation procedures and do not identifying when the...

    Provided By Research In Motion

  • White Papers // Jul 2014

    A Graphical Password Authentication System for Touch Screen Based Devices

    Mobile devices equipped with touch screens dominate the current mobile market because of high flexibility and good usability. Many privacy sensitive applications run on such devices. For authentication typing a text password is challenging task in touch screen based devices. A graphical based password is one of the most promising...

    Provided By Research In Motion

  • White Papers // Dec 2012

    Supersensitive Electrometer and Electrostatic Data Storage Using Single Electron Transistor

    Since the beginning of human kind, the need for storing information has been very important. The age has bought the user from storing them on papers to the magnetic storage which today are the major storage systems. This paper explains the objective in which discusses the functionality of the Single...

    Provided By Research In Motion