Research In Motion

Displaying 1-40 of 305 results

  • White Papers // Jun 2014

    Mobile Mapping System for Updation of Existing Topo Map and Creation of Value Addition

    The miniaturization of GPS receivers and computing devices has evolved the technique of mobile mapping. In this technique, any mobile computing device, like laptop, running a mobile GIS software, is connected to a mobile GPS like Pretec card GPS with or without external antenna. The mobile GIS software can be...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Empirical Study of ERP Implementation Strategies-Filling Gaps Between the Success and Failure of ERP Implementation Process

    In businesses, implementation of new ERP system is as important as finding the right solution of new enterprise resource planning systems. Understanding and selecting the best practice out of the available huge strategies for implementation the ERP software is very difficult. The aim of this paper is to provide consolidated...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Flight Simulation Using Graphical User Interface

    The use of flight simulation by generating a dynamic model of an aircraft has become an innate need of all aviation industries. It is a method through which the in-flight reactions of an aircraft against different parametric dimensions, environmental conditions and control inputs can be visualized through the developed outputs...

    Provided By Research In Motion

  • White Papers // Jun 2014

    Dynamic Rule Based Traffic Analysis in NIDS

    A set of rules are used to detect or prevent the hostile data traffic in a network. In dynamic computing environment, security challenges are increasing day-by-day. It is so important to detect the abnormal behavior in a packet. There are lots of techniques and tools are used to determine the...

    Provided By Research In Motion

  • White Papers // Jun 2014

    Vulnerability Analysis of Hash Tables to Sophisticated DDoS Attacks

    In recent years, everybody experienced a flow of DDoS attacks threatening the welfare of the internet. These are launched by unauthorized users whose only motivation is to degrade the performance of other, innocent, users. The traditional systems turn out to be quite vulnerable to these attacks. This paper is to...

    Provided By Research In Motion

  • White Papers // Jun 2014

    Credit Card Fraud Detection Using Self Organised Map

    Self Organizing Maps (SOMs) are most well-known, unsupervised approach of neural network that is used for clustering and are very efficient in handling large and high dimensional dataset. As SOMs can be applied on large complex set, so it can be implemented to detect credit card fraud. Online banking and...

    Provided By Research In Motion

  • White Papers // Jun 2014

    A Hybrid Approach to Detect Zero Day Phishing Websites

    Phishing is a significant problem that tricks unsuspecting users into revealing private information involving fraudulent email and websites. This causes tremendous economic loss every year. In this paper, the authors proposed a novel hybrid phish detection method based on phishing blacklists and phishing properties. They used some fresh phish from...

    Provided By Research In Motion

  • White Papers // May 2014

    Intelligent Lighting Control Using Android Application

    In this era, where smartness is the key, automatic systems are preferred over manual ones. An important application of smart technology is efficient energy utilization, which is the need of the hour. Energy consumption can be minimized by using lighting responsibly i.e. to switch off whenever not required and by...

    Provided By Research In Motion

  • White Papers // Jan 2007

    Testability Analysis of Framework Based Software at Requirement Analysis Phase

    Dependency on automated systems in every sphere of the people life has raised a demand for enhanced quality and productivity along with the improved business performance of the software system. Researchers and practitioners in the field of software engineering are striving to achieve the same by applying many techniques. Reuse-oriented...

    Provided By Research In Motion

  • White Papers // May 2014

    A Review of Software Testing Techniques

    Software testing is important to reduce errors, maintenance and overall software costs. One of the major problems in software testing area is how to get a suitable set of test cases to test a software system. The authors identify a number of concepts that every software engineering student and faculty...

    Provided By Research In Motion

  • White Papers // May 2014

    Hardware Implementation of Software Radio Receivers

    In this paper, the authors describe the hardware design and implementation of an inexpensive Software Defined Radio (SDR). SDRs use a hardware front end but can change their operational frequency, bandwidth requirement and various standards by implementing various software algorithms. Rather than using analog blocks for design of radios, as...

    Provided By Research In Motion

  • White Papers // Jun 2014

    Software Assistance for Analysis of Osteoarthritic Patients: A Review

    Man is a machine is a common adage and as this machine grew up it tend to get affected by diseases. The contributing factors include deficiency of proteins, vitamins, increased levels of salts, injury, accidents etc. Arthritis is one amongst the problems affecting elderly people generally caused by wear and...

    Provided By Research In Motion

  • White Papers // Jun 2014

    A Strategic Approach to Software Testing

    In this paper, the authors provide a precise summery of a survey of software testing approach and technique. This reviews some of the common approaches in the integration testing of object-oriented program are also included. It helps in evaluating the effectiveness of testing by providing data on different coverage items....

    Provided By Research In Motion

  • White Papers // Jul 2014

    Dynamically Managing the Software Components in Deployment Based Architecture

    The significance of reconfiguration of software systems was to fix errors, improve performance, and enhanced functionality previously. Static reconfiguration needed to stop, restart and re-execute the system during processing. Application disruption can be reduced to improve Quality of Service (QoS) during the system transformation using the technique of dynamic reconfiguration....

    Provided By Research In Motion

  • White Papers // Jan 2014

    Short Circuit Analysis of a Power Grid using MiPower Software

    In this paper, the authors describe the system characteristics during short circuit condition and will act as a path to design the protective scheme for the undertaken circuit. The most severe short circuit condition i.e. 3 phase to ground fault is tested on actual 72 bus system considering a 220...

    Provided By Research In Motion

  • White Papers // Jan 2007

    An Object Oriented Design Approach for Modification of Rotten Code Using Regression Testing & Refactoring

    Design is the crucial step while working on any user story during the sprint in an agile culture of software development. A good design can generate good code and moving further in the journey, a good code would have less or minimum bugs by utilizing benefits of various principles of...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Platform Independent Mobile Application Development

    In today's world, technology making things easier and potable. As people still facing problem in carrying and handling laptops along with them. For solving this problem, Mobile application developer developing application to solve this problem. So mobile application developer developing application as per user requirement. But due to various platform,...

    Provided By Research In Motion

  • White Papers // Dec 2012

    Supersensitive Electrometer and Electrostatic Data Storage Using Single Electron Transistor

    Since the beginning of human kind, the need for storing information has been very important. The age has bought the user from storing them on papers to the magnetic storage which today are the major storage systems. This paper explains the objective in which discusses the functionality of the Single...

    Provided By Research In Motion

  • White Papers // May 2014

    Data Integrity for Secure Dynamic Cloud Storage System Using TPA

    Using dynamic cloud storage system, users can remotely store their data and can enjoy on-demand high quality applications and services from shared pool of configurable computing services, without the burden of local data storage and maintenance. As clients no longer possess their data locally the clients should be equipped with...

    Provided By Research In Motion

  • White Papers // Jan 2014

    Power Quality Improvement in Grid Connected Battery Storage Energy Source at Distribution Level

    Today, increase the demand of electrical energy at various level i.e. industrial, home appliance, irrigation etc. Electrical energy limited because total energy requirement is supplied by the burning of fossil fuels and it is limited. In this paper, the authors present a control strategy of three phase four wire grid...

    Provided By Research In Motion

  • White Papers // Jul 2014

    LESIPT: Lightweight Enhanced Secure Incentive Protocol with Trusted Value for Multi-hop Wireless Networks

    In multi-hop wireless networks the communications rely on intermediate nodes that require collaboration; however, selfish nodes make use of the cooperative nodes to relay their packets and do not relay other nodes' packets. In this paper, the authors propose LESIPT: Lightweight Enhanced Secure Incentive Protocol with Trusted value for multi-hop...

    Provided By Research In Motion

  • White Papers // Jul 2014

    Performance Analysis of Artificial Nueral Network Based Shuntactive Power Filter

    In this paper, the authors investigate a 3-wire Shunt Active Power Filter (SAPF) with Artificial Neural Network (ANN) smart controllers for mitigating the harmonics of the distribution system. To improve the performance of the conventional controller based on hysteresis controller and take advantage of smart-controllers, a feed forward-type (trained by...

    Provided By Research In Motion

  • White Papers // Jun 2014

    Hybrid Query Generation Schemas for Full Text Retrieval in P2P Networks

    Now-a-days millions of users to search and download desired data such as Napster and Gnutella as they are Peer-To-Peer (P2P) files sharing applications. In order to improve performance in unstructured P2Ps replication strategies are used. Efficient and effective full-text retrieval over unstructured p2p networks was developed in order to address...

    Provided By Research In Motion

  • White Papers // Jul 2014

    A 33kV Distribution Network Feeder Reconfiguration by Using REPSO for Voltage Profile Improvement

    The complexity of modern power system has contributed to the high power losses and over load in the distribution network. Due to that reason, Feeder Reconfiguration (FR) is required to identify the best topology network in order to fulfill the power demand with reduced power losses while stabilizing the magnitude...

    Provided By Research In Motion

  • White Papers // Jul 2014

    Robotic Control with Android & PC Using X-Bee

    In this paper, the authors concerned with the Android-Arduino communication and computer-communication by integrating mobile wheel robots with X-Bee communication protocol. Arduino controls tasks such as obstacle and collision avoidances following, autonomously movement, and indoor localization of group robots are implemented toward an autonomously control of robot. Mobile robotics is...

    Provided By Research In Motion

  • White Papers // Jul 2014

    Location-Aware E-passport: Enhancing Security and Privacy

    In E-passport identification process reading RFID are used. In the related work RFID's are embedded inside a chip which is holding the information of authentication. In this paper the implementation of E-passport using mobile devices to authenticate and access information stored by using context aware information to get access to...

    Provided By Research In Motion

  • White Papers // Jul 2014

    CB-Asymmetric Coplanar L Strip-Fed Dual Band Antenna for GSM/WLAN Application

    In this paper is to give a conductor backed asymmetric coplanar inverted Lstrip fed antenna for dual band applications. The antenna exhibit resonance at 1. 8GHz (1. 6-1. 85GHz) and 5. 2GHz (5. 08-5. 35GHz) with impedance band width of about 150MHz and 200MHz (return loss>-10dB) which is used for...

    Provided By Research In Motion

  • White Papers // Jul 2014

    Analysis of Gateway Relocation Strategies in 802.16 Heterogeneous Networks

    IEEE 802.16-series are expected to provide broadband wireless access for a variety of multimedia services. To minimize handover delay and packet loss the authors defined a two-tiered mobility management in WiMAX Forum. WiMAX standards define the Access Service Network GateWay ASN GW relocation procedures and do not identifying when the...

    Provided By Research In Motion

  • White Papers // Jul 2014

    A Graphical Password Authentication System for Touch Screen Based Devices

    Mobile devices equipped with touch screens dominate the current mobile market because of high flexibility and good usability. Many privacy sensitive applications run on such devices. For authentication typing a text password is challenging task in touch screen based devices. A graphical based password is one of the most promising...

    Provided By Research In Motion

  • White Papers // Jun 2014

    Performance Improvement of IEEE 802. 11a Receivers Using DFT Based Channel Estimator with LS Channel Estimator

    In this paper, the performance of one of the most widely deployed Wireless Local Area Networks (WLANs) based on IEEE 802. 11a standard has been analyzed using different modulation technique and convolution coding rates. The IEEE 802. 11a standard uses Orthogonal Frequency Division Multiplexing (OFDM) technique. In this paper, the...

    Provided By Research In Motion

  • White Papers // Jun 2014

    Effective Redundancy Management of Multipath Routing Against Packet Modifier and Packet Sniffing Attack

    Many Wireless Sensor Networks (WSNs) are deployed in an unattended environment in which energy replenishment is impossible. Due to limited resources, a WSN must not only satisfy the application specific QoS requirements such as reliability, timeliness and security, but also minimize energy consumption to prolong the system useful lifetime. In...

    Provided By Research In Motion

  • White Papers // May 2014

    Error Rate Analysis of STBC-OFDM System with Efficient Channel Coding Technique at Low SNR

    With increasing data driven needs in recent times, reliable high data rate wireless communication systems have gained special interest and poised a substantial research challenge. Multiple Input Multiple Output-Orthogonal Frequency Division Multiplexing (MIMO OFDM) system has gained great popularity for its capability of high rate transmission and its robustness against...

    Provided By Research In Motion

  • White Papers // Jun 2014

    A Brief Study on Technical Challenges in Migrating from 3G to 4G

    Mobile communication is the fastest growing field to provide mobile Internet to the users. The increased usage of social networking sites and multimedia applications on the Internet requires tremendous bandwidth. There are various techniques evolving in mobile and wireless communications for offering high data rate, reliability, long coverage, and high...

    Provided By Research In Motion

  • White Papers // Jun 2014

    The Comparative Study of Peak-to-Average Power Ratio Reduction Techniques for LTE OFDM System & Its Effect

    Orthogonal Frequency Division Multiplexing (OFDM) is a multicarrier modulation technique which uses orthogonal subcarriers to convey information. Orthogonal Frequency Division Multiplexing (OFDM) has been adopted as a standard for various high data rate wireless communication systems due to the high spectral bandwidth efficiency, robustness to frequency selective fading channels, well...

    Provided By Research In Motion

  • White Papers // Jul 2014

    Design of Reconfigurable Multi-Band Microstrip Patch Antenna with Ground Slit for WLAN & WiMax Applications

    With the rapid growth of the wireless mobile communication technology, the future technologies needs a very small antenna and also the need of wide band and multi band antenna is increased to avoid using two antennas. The multi-band antenna is one of the most important elements and commonly used in...

    Provided By Research In Motion

  • White Papers // Jun 2014

    Applying the LMS and RLS Beamforming Algorithms on Actual Linear and Planar Antenna Array

    After revolution in wireless communication system, it is observed that the number of users and the requirements of wireless services increase at exponential rate. The wireless services need wider convergence area and higher transmission quality rises. The smart antenna system is used to achieve wireless services demands by using Direction...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Appraising Vehicular ADHOC Networks Routing Protocols Using NS2

    Vehicular Ad-hoc NETworks (VANET) are a subset of Mobile Ad-hoc Networks which have acknowledged considerable responsiveness in many vehicular developments and manufacturing clusters. In this paper, the authors have been simulated the Dynamic Source Routing protocol (DSR) and Destination Source Distance Vector routing protocol (DSDV) over Ad-hoc On-demand Distance Vector...

    Provided By Research In Motion

  • White Papers // Jul 2014

    An Efficient Adaptive Location and Detection Based Mobile Ad-Hoc Networks with Cross Layer Security (AELDCS)

    Mobile nodes are connected without any centralized administration in MANET. Due to that, a mobile client is easily affected by means of several attacks. Due to these approaches, the engagement is totally partitioned and more packet congestion occurs. To provide an integrity of data packets and avoiding more congestion, there...

    Provided By Research In Motion

  • White Papers // Jan 2014

    Review on Routing Protocols on Mobile Adhoc Networks

    Mobile Ad-hoc NETwork (MANET) is a network which is capable of autonomous operations which operates without base stations and without centralized administration. Node cooperate to provide services. In the mobile ad hoc network every node is router as well as host. They support dynamic topology and have limited energy and...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Survey on Path Optimization in Ad Hoc Networks

    Ad hoc networks are useful in various fields due to their various characteristics. There are various applications which require immediate transmission of messages. Therefore routing is the main problem faced by ad hoc networks. There are various existing routing algorithm that are used for path optimization but these all protocols...

    Provided By Research In Motion