Research In Motion

Displaying 1-40 of 206 results

  • White Papers // Jul 2014

    Survey Paper on Concurrency control mechanisms in a Distributed Database Environment

    In this paper, the various mechanisms used for concurrency control in a distributed database are summarized and their respective advantages and disadvantages are listed. Distributed databases have become a large part of the current information era. Millions of users access the data stored on these databases at a time. This...

    Provided By Research In Motion

  • White Papers // Jul 2014

    Performance Analysis of Artificial Nueral Network Based Shuntactive Power Filter

    In this paper, the authors investigate a 3-wire Shunt Active Power Filter (SAPF) with Artificial Neural Network (ANN) smart controllers for mitigating the harmonics of the distribution system. To improve the performance of the conventional controller based on hysteresis controller and take advantage of smart-controllers, a feed forward-type (trained by...

    Provided By Research In Motion

  • White Papers // Jul 2014

    LESIPT: Lightweight Enhanced Secure Incentive Protocol with Trusted Value for Multi-hop Wireless Networks

    In multi-hop wireless networks the communications rely on intermediate nodes that require collaboration; however, selfish nodes make use of the cooperative nodes to relay their packets and do not relay other nodes' packets. In this paper, the authors propose LESIPT: Lightweight Enhanced Secure Incentive Protocol with Trusted value for multi-hop...

    Provided By Research In Motion

  • White Papers // Jul 2014

    A Survey on Multi-Relational Database based Classification Approaches

    In real world, data are stored in multiple relational databases. many problems like expensive join operation and semantic losses in classifying objects stored in multiple tables (relations) involves. Multi relational classification is the process of building a classifier based on information stored in multiple relations This approach has been developed...

    Provided By Research In Motion

  • White Papers // Jul 2014

    Implementation of Low Power MAC Using Adaptive Power Control Technique

    Design of a low power 32 bit MAC unit using Adaptive Power Control (APC) system is proposed in this paper. Since many of the Digital Signals Processing (DSP) application require MAC, power reduction in the same would be quite beneficial. The problems concerned with power gated digital circuitries are: energy...

    Provided By Research In Motion

  • White Papers // Jul 2014

    Visualization of Big Data: Its Tools and Challenges

    The rapid development of the heterogeneous networking and social websites is leading to the exponential growth in the amount of the data. To examine the bulky amount of data, from concealed patterns and unidentified correlations, the big data analysts require visualization tools. The visualization tools help in gaining insight about...

    Provided By Research In Motion

  • White Papers // Jul 2014

    Mining High Profit Itemsets using Heuristic Rule Framing Algorithm from Transactional Database

    Data mining is the process of eliciting data from the Brobdingnagian datasets. It is hard to compute when the database is having irrelevant data and also it occupies more space. The authors' normal lives will fully moving beyond to the computers. So the number of data to be stored has...

    Provided By Research In Motion

  • White Papers // Jul 2014

    Hybrid Micro-Grid with Renewables and Energy Storage Addressing Power Quality

    In this paper, the authors propose a hybrid AC/DC microgrid to reduce the number of converter stations for converting DC power to AC power or vice versa, thereby reducing the THD of voltage and current waveforms at the utility grid. The hybrid grid has AC and DC grid connected together...

    Provided By Research In Motion

  • White Papers // Jul 2014

    Performance and Analysis of Reconfigurable Video Game Design Using FPGA

    FPGA (Field Programmable Gate Array) is widely used in different applications like image processing, signal processing, and digital system design, wired and wireless communications. Due to reconfigurability nature of FPGA a video game is designed in Spartan-3E target device. The video game is designed in three different hardware description programming...

    Provided By Research In Motion

  • White Papers // Jul 2014

    A Mixed Approach for Power Dissipation Reduction in Nanometer CMOS VLSI Circuits

    A mixed power dissipation reduction approach has been proposed for CMOS circuits and evaluated using benchmark circuits in 45 nanometer technology. The general approaches for power dissipation reduction will be implemented individually but it proves to be more productive if two of the power dissipation reduction techniques are implemented simultaneously....

    Provided By Research In Motion

  • White Papers // Jul 2014

    Automatic Fall Detection for Elderly - Providing Timely Aid Using GSM Modem

    The number of persons above the age of 60 years is fast growing, especially in India. Falls are one of the major problems in the elderly and are considered one of the \"Geriatric Giants\". In the paper, the authors propose a camera based automatic fall detection method to facilitate the...

    Provided By Research In Motion

  • White Papers // Jul 2014

    A Graphical Password Authentication System for Touch Screen Based Devices

    Mobile devices equipped with touch screens dominate the current mobile market because of high flexibility and good usability. Many privacy sensitive applications run on such devices. For authentication typing a text password is challenging task in touch screen based devices. A graphical based password is one of the most promising...

    Provided By Research In Motion

  • White Papers // Jul 2014

    Comparison of Round Robin CPU Scheduling Algorithm with Various Dynamic Time Quantum

    The Round Robin (RR) CPU scheduling algorithm is a fair scheduling algorithm that gives equal time quantum to all processes. The choice of the time quantum is critical as it affects the algorithm's performance. This paper proposes a new algorithm that enhanced on the Improved Round Robin CPU (IRR) scheduling...

    Provided By Research In Motion

  • White Papers // Jul 2014

    Real Time Delay Application for Digital Circuits with Peripheral Based Digital Clock Using FPGA

    Reconfigurable computer architectures are becoming increasingly popular for many applications. Due to reconfigurability nature of FPGA's, have been very effective to implement peripheral based applications like image processing, video game design and PS2-VGACalculator. FPGA consists of variety of I/O peripherals like seven segment display, Liquid Crystal Display (LCD), and Video...

    Provided By Research In Motion

  • White Papers // Jul 2014

    Analysis of Gateway Relocation Strategies in 802.16 Heterogeneous Networks

    IEEE 802.16-series are expected to provide broadband wireless access for a variety of multimedia services. To minimize handover delay and packet loss the authors defined a two-tiered mobility management in WiMAX Forum. WiMAX standards define the Access Service Network GateWay ASN GW relocation procedures and do not identifying when the...

    Provided By Research In Motion

  • White Papers // Jul 2014

    Location-Aware E-passport: Enhancing Security and Privacy

    In E-passport identification process reading RFID are used. In the related work RFID's are embedded inside a chip which is holding the information of authentication. In this paper the implementation of E-passport using mobile devices to authenticate and access information stored by using context aware information to get access to...

    Provided By Research In Motion

  • White Papers // Jul 2014

    CB-Asymmetric Coplanar L Strip-Fed Dual Band Antenna for GSM/WLAN Application

    In this paper is to give a conductor backed asymmetric coplanar inverted Lstrip fed antenna for dual band applications. The antenna exhibit resonance at 1. 8GHz (1. 6-1. 85GHz) and 5. 2GHz (5. 08-5. 35GHz) with impedance band width of about 150MHz and 200MHz (return loss>-10dB) which is used for...

    Provided By Research In Motion

  • White Papers // Jul 2014

    An Efficient Model for Share Market Prediction Using Data Mining Techniques

    Share market acts as one of the key role for building economy of any developing nation. It is highly complex to determine booms and crashes in the market, so it became one of the interesting and challenging topics for all the business researchers to predict an accurate share value. In...

    Provided By Research In Motion

  • White Papers // Jul 2014

    Replication in a simply Distributed, Mobile Ad-hoc, Cloud, Internet and Peer to Peer Environment: A Multi Dimensional Analysis and the scope for extension

    Replication has been a popular technique that provides increased data or service availability in case of failure or crash of server or the node which is responsible to serve the requested data or service. Replication improves data availability, data accessibility, fault tolerance and reliability of the network that is targeted...

    Provided By Research In Motion

  • White Papers // Jul 2014

    A 33kV Distribution Network Feeder Reconfiguration by Using REPSO for Voltage Profile Improvement

    The complexity of modern power system has contributed to the high power losses and over load in the distribution network. Due to that reason, Feeder Reconfiguration (FR) is required to identify the best topology network in order to fulfill the power demand with reduced power losses while stabilizing the magnitude...

    Provided By Research In Motion

  • White Papers // Jul 2014

    Robotic Control with Android & PC Using X-Bee

    In this paper, the authors concerned with the Android-Arduino communication and computer-communication by integrating mobile wheel robots with X-Bee communication protocol. Arduino controls tasks such as obstacle and collision avoidances following, autonomously movement, and indoor localization of group robots are implemented toward an autonomously control of robot. Mobile robotics is...

    Provided By Research In Motion

  • White Papers // Jul 2014

    A Frame Work for Wireless Embedded Networking Using LPC 2148 with Xbee Series2

    Wireless embedded network that combines embedded systems and wireless communication is an emerging technology. It is widely used in industrial based control and automation where specific communication is established using embedded hardware. In this paper, the real time issues in embedded processor for device to device communication, embedded device with...

    Provided By Research In Motion

  • White Papers // Jun 2014

    Hybrid Query Generation Schemas for Full Text Retrieval in P2P Networks

    Now-a-days millions of users to search and download desired data such as Napster and Gnutella as they are Peer-To-Peer (P2P) files sharing applications. In order to improve performance in unstructured P2Ps replication strategies are used. Efficient and effective full-text retrieval over unstructured p2p networks was developed in order to address...

    Provided By Research In Motion

  • White Papers // Jun 2014

    Cluster Based Secure Aggregation(CBSA) in WSN Using Pairwise Key Establishment Technique

    Sensor nodes are commonly endowed with data monitoring and broadcasting capabilities. It will communicate the collected data through the radio transceiver to the sink node either directly or through the intermediate nodes. In networking more sensor nodes are required to identify the network fault and also used to identify the...

    Provided By Research In Motion

  • White Papers // Jun 2014

    High Speed Carry Select Adder Using Prefix-Adders for ALU Application

    High performance digital adder with low power consumption and reduced area is an important design constraint for advanced processors. For such an adder the speed of operation is restricted by carry propagation from input to output. In carry propagation design, Carry SeLect Adder (CSLA) provides a good compromise between cost...

    Provided By Research In Motion

  • White Papers // Jun 2014

    Ensuring Secure Storage Using Multi-Clouds

    Ensuring the security of cloud computing is a major factor in the cloud computing environment which has many benefits in terms of low cost and accessibility of information, as users often store important information with cloud storage providers, unknowing that these providers may be compromised. Dealing with \"Single cloud\" providers...

    Provided By Research In Motion

  • White Papers // Jun 2014

    Performance Analysis of Intrusion Detection System over Mobile Cloud System

    The usage of Smartphone is increasing day-by-day and the security is a great concern for web accessing, in the smart phone for example the authors are performing banking transactions by using smart phones like transferring the amount from one account to another account to their mobile phones. there is no...

    Provided By Research In Motion

  • White Papers // Jun 2014

    Fault Data Aggregator Recovery Process in Wireless Sensor Networks

    A wireless sensor network is collected with thousands of miniature resource insufficient sensor nodes, set with controller, transceivers and non-rechargeable batteries. The transmission of data from each sensor node to other nodes consumes more energy than data processing in the controller unit of sensor nodes. To enlarge the network lifetime...

    Provided By Research In Motion

  • White Papers // Jun 2014

    Notation based Content Extraction from Disparate Databases Using Ontology

    In knowledge-discovery and data mining, the method of finding huge volumes of data for patterns using tools such as categorization, clustering, etc. is very common. The data thus has received too many parameters. For someone who is a non skilled in data mining, the obtained policy are too far away,...

    Provided By Research In Motion

  • White Papers // Jun 2014

    Highest Humidity Prediction Using Data Mining Techniques

    Predicting the humidity level is important to prevent its adverse effects for instances; climate change studies, rain prediction, agriculture interrelated processes, etc. A systematic collection of humidity related data over the past years are used for prediction. K-Nearest Neighbor (KNN) and Artificial Neural Network (ANN) are effective data-mining techniques for...

    Provided By Research In Motion

  • White Papers // Jun 2014

    Real Time Operating System for Robotics Using AVR Microcontrollers

    In this paper, the authors create an operating system for real-time robotics based on AVR microcontroller operates in the multitask environments. In addition to this, creating a single hardware that performs the multiple tasks without recompiling and/or burning the programs invariably into the controller's memory. The operating system will read...

    Provided By Research In Motion

  • White Papers // Jun 2014

    Performance Gathering and Implementing Portability on Cloud Storage Data

    As information and communication technology develops rapidly. Researchers, Journalists, experts and IT analysts are referring towards the cloud as a technology revolution. Cloud computing is not just a fad anymore. Even in short, cloud computing is completely is affecting almost everyone in real. It is a distributed computing model for...

    Provided By Research In Motion

  • White Papers // Jun 2014

    Cloud Computing and Latest Researches

    Cloud computing refers to the applications delivered as services over the Internet. Cloud computing enables more energy-efficient use of computing power, especially when the computing tasks are of low intensity but under some circumstances cloud computing can consume more energy than conventional computing where each user performs all computing on...

    Provided By Research In Motion

  • White Papers // Jun 2014

    Parametric Analysis of Various Cloud Computing Security Models

    The cloud computing becomes the significant issue in industry and academia with the active advancement in computer hardware and software. Cloud computing provides the future generation of internet based, highly scalable distributed computing systems in which computational resources are offered 'As a service'. Cloud computing has established itself as one...

    Provided By Research In Motion

  • White Papers // Jun 2014

    Homomorphic Encryption Method Applied to Cloud Computing

    Homomorphic encryption is a form of encryption which allows specific types of computations to be carried out on cipher text and obtain an encrypted result which when decrypted matches the result of operations performed on the plaintext. For example, a person can add two encrypted numbers and then the second...

    Provided By Research In Motion

  • White Papers // Jun 2014

    Data Acquisition and Analysis of Solar Photovoltaic System

    Solar energy is most useful resource of renewable energy. Using data processing and applying computer algorithms it can be possible to make this energy system more efficient. This paper represents the principle of on-grid photovoltaic cell system and characteristics of its components. A microcontroller based data acquisition system used to...

    Provided By Research In Motion

  • White Papers // Jun 2014

    ABC Based Multi-Objective Approach for NoC Design Space Exploration

    Network-on-Chip (NoC) has recently emerged as an efficient communication solution for the System-on-Chip (SoC) design. Design space exploration and performance evaluation are the most essential task in NoC design. In this paper, an ABC based design space exploration framework for the NoC design is proposed. The objective of the design...

    Provided By Research In Motion

  • White Papers // Jun 2014

    Data Experience Elevation through Network Intervention

    The main element or the main factor driving the mobile network communication is the data. Data mainly refers to packet data connection that a mobile handsets use to fetch information from the internet also known as World Wide Web (WWW). 3G also known as the 3rd generation internet is the...

    Provided By Research In Motion

  • White Papers // Jun 2014

    Smart LED Display Boards

    The LED display system is aimed at the colleges and universities for displaying day-to-day information continuously or at regular intervals during the working hours. Being GSM- based system, it offers flexibility to display flash news or announcements faster than the programmable system. Everything around the user is becoming smart such...

    Provided By Research In Motion

  • White Papers // Jun 2014

    Landing Gear Retraction System Using Sensors

    In this paper, the authors create a retractable landing gear, because it is used mainly to reduce the drag in the aircrafts. Here, they have made a RC plane where they have kept their landing gears under the wings. They have followed the two axis system where the landing gear...

    Provided By Research In Motion

  • White Papers // Nov 2012

    An Efficient Approach for Cloud Computing Based on Hierarchical Secure Paravirtualization System Resource Model

    Paravirtualization is an enhancement of virtualization technology in which guest operating system is recompiled prior to installation inside a virtual machine. Paravirtualization allows for an interface to the virtual machine that can differ from an underlying hardware. Cloud computing depends on paravirtualization for more efficient system resources like processors and...

    Provided By Research In Motion

  • White Papers // Aug 2009

    BlackBerry Smart Card Reader

    The BlackBerry Smart Card Reader is an accessory that, when used in proximity to certain Bluetooth enabled BlackBerry devices and computers, permits users to authenticate with their smart cards and log in to Bluetooth enabled BlackBerry devices and computers. The BlackBerry Smart Card Reader is designed to perform communicate with...

    Provided By Research In Motion

  • White Papers // Dec 2008

    Enforcing Encryption of Internal and External File Systems on BlackBerry Devices

    The BlackBerry Enterprise Solution encrypts data traffic in transit between the BlackBerry Enterprise Server and the BlackBerry devices automatically. By default, the BlackBerry Enterprise Solution generates the master encryption key and message key that the BlackBerry Enterprise Server and BlackBerry devices use to encrypt and decrypt all data traffic between...

    Provided By Research In Motion

  • White Papers // May 2009

    Pushing It to the Streets: (or to the Device)

    Research In Motion (RIM) has made its name by providing email to wireless devices for more than ten years. It has made wireless email available around the globe and has pioneered a number of the technologies that are needed to provide seamless integration between corporate and desktop email systems and...

    Provided By Research In Motion

  • Case Studies // Mar 2009

    Boosts Productivity and Time Capture With BlackBerry Solution

    UK law firm Addleshaw Goddard, with three offices in London, Leeds and Manchester, has about 1,500 staff members, including 182 partners and over 500 other fee earners. The law firm is ranked 15th in the country according to fee income and sixth by the number of FTSE 100 Clients. Half...

    Provided By Research In Motion

  • Case Studies // Jun 2009

    Leather Goods Manufacturer Improves Customer Service and Productivity With BlackBerry Solution and Newmann

    Valigeria Roncato is a provider of leather suitcases in Italy, Germany, Austria, Belgium and Holland. The company sees annual sales of more than ? 40 million and produces around 1,500 suitcases per day. Commercial managers of the company work in a field to communicate with local stores, manufacturing plants and...

    Provided By Research In Motion

  • Case Studies // Jun 2009

    IT Firm Improves Customer Communication by 20% and Boosts Productivity With BlackBerry Solution and Maximizer Mobile CRM

    Netherlands-based IT company Systony specializes in Customer Relationship Management (CRM) deployment and customized software development for small and medium-sized enterprises (SMEs). Over the past five years, Systony has been using the Maximizer CRM, which is a proven and affordable CRM solution. The solution was able to meet requirements of the...

    Provided By Research In Motion

  • Case Studies // Jun 2009

    Digicore Improves Response Times and Communication With BlackBerry Solution

    South African company Digicore is a provider of asset tracking and management solutions with its C-track system for vehicle owners. Digicore operates in 36 countries and clients of the company include multinational companies such as mining giant BHP Billiton and the energy company Chevron. Digicore employs over 660 people in...

    Provided By Research In Motion

  • Downloads // Mar 2010

    Introducing BlackBerry® Enterprise Server Express

    Get BlackBerry Enterprise Server Express for Free Connect two people via BlackBerry? smartphones and ideas get bigger. Progress happens faster. Answers get smarter. So imagine what happens when you give a business the freedom to connect all its employees. BlackBerry? Enterprise Server Express enables businesses of any size...

    Provided By Research In Motion

  • White Papers // May 2009

    Prorecting the BlackBerry Device Platform Against Malware

    This document describes the third-party Java application control features of the BlackBerry? Enterprise Solution and provides an overview of how you might use those features and place the BlackBerry Enterprise Solution within your corporate network architecture to contain the threat of malware on your BlackBerry? devices and your corporate network.

    Provided By Research In Motion

  • White Papers // May 2009

    BlackBerry Devices with Bluetooth - Security Overview

    This whitepaper from looks at how the BlackBerry? Enterprise Solution is designed to encrypt data in transit at all points between the BlackBerry device and the BlackBerry? Enterprise Server to protect your organization from data loss or alteration.

    Provided By Research In Motion

  • White Papers // May 2009

    BlackBerry Enterprise Server IT Policy

    "This free whitepaper from Research in Motion outlines how IT Managers can assign IT policies to BlackBerry? devices to satisfy organization's security policy requirements and to reflect the needs of users who use the BlackBerry devices"

    Provided By Research In Motion

  • White Papers // May 2009

    BlackBerry Enterprise Solution - Security Technical Overview

    This free to access whitepaper describes the security features of the BlackBerry? Enterprise Solution and provides an overview of the BlackBerry security architecture

    Provided By Research In Motion

  • White Papers // May 2009

    BlackBerry Enterprise Solution and RSA SecurID

    BlackBerry? devices are becoming ubiquitous throughout the enterprise, as organizations improve employee connectivity and communications. The BlackBerry? Enterprise Solution?designed and manufactured by Research In Motion (RIM)?is a flexible, Information Technology (IT)-friendly solution that provides mobile users with secure wireless access to their enterprise email and critical business applications

    Provided By Research In Motion

  • White Papers // May 2009

    Placing the BlackBerry Enterprise Solution in a Segmented Network

    A segmented network is designed to isolate potential attacks within the organization's LAN and contain them on one computer. The BlackBerry? Enterprise Server supports installation in a segmented network, and permits you to run BlackBerry Enterprise Server components in different network segments.

    Provided By Research In Motion

  • White Papers // Apr 2012

    CIO survey: The effect of consumer-led IT

    With the arrival of the smartphone and tablet, the IT industry has seen one of the most profound revolutions since the invention of the silicon chip and the launch of the web. As a Fortune 1000 CIO says, "IT consumerisation is having a dramatic effect on everything we do". From...

    Provided By Research In Motion

  • White Papers // Apr 2012

    Three keys to combining BYOD and security

    Employee devices, from smartphones to tablets, are ubiquitous in the workplace now. They help workers to be more mobile and empower them to make decisions away from their desks. But mobility can be risky if not handled properly, and it's no longer a simple answer of cracking down on bring-your-own-device...

    Provided By Research In Motion

  • White Papers // Apr 2012

    BYOD costs: Balancing savings and risk

    Smartphones and tablets have changed the face of corporate IT. With bring-your-own-device (BYOD), users demand access to the same technologies they have at home. Having to certify, provide and manage consumer-grade devices can add complexity and costs, as well as increasing the risk of data loss and leakage. That's on...

    Provided By Research In Motion

  • White Papers // Apr 2012

    Adapting BYOD security strategies to protect data

    The consumerisation of IT in the workplace goes way beyond bring-your-own-device usage: there is also the issue of social networking sites and services to address. IT security managers face a major headache in engineering a protective security umbrella to keep sensitive data safe. This Research In Motion (RIM) white paper...

    Provided By Research In Motion

  • White Papers // Apr 2012

    How to benefit from mixing business and personal devices

    Working from home used to mean you had to lug home a briefcase full of paper or the heavy company laptop. Now, chances are employees have a laptop or desktop computer of their own at home that is at least as powerful as the one on their desk at work,...

    Provided By Research In Motion

  • White Papers // Apr 2012

    Choosing a consumer-friendly IT strategy

    There are two trends causing IT managers to rethink their strategies: the growing popularity of consumer technology among business users, and the shift of business applications and data to the cloud. These technologies give IT departments both real and perceived difficulties when it comes to integrating them into the business....

    Provided By Research In Motion

  • Webcasts // Jan 2009

    Dealing With Intellectual Property and How to Use This to Enhance the Value of Your Business

    The presenter of this webcast shows how to deal with intellectual property and how to use this to enhance the value of your business.

    Provided By Research In Motion

  • White Papers // Oct 2008

    BlackBerry Push APIs: Accessing the Power of BlackBerry Push Technology

    One of the cornerstones of the BlackBerry solution has been the ability to proactively deliver, or "Push", data to BlackBerry devices. BlackBerry Push Technology has been used to push emails to users and to synchronize calendar information. However, although BlackBerry Push Technology has been available to developers creating enterprise-based solutions...

    Provided By Research In Motion

  • White Papers // May 2009

    Realizing Rapid ROI Through Mobility

    IT teams ratcheting up mobility deployments end up pleasing not only business users, but also the CFO. Here's one reason: They can show a rapid Return On Investment (ROI) in hard dollars with a simple shift in use policy. Savings can prove substantial when IT standardizes on one device type...

    Provided By Research In Motion

  • White Papers // Mar 2009

    BlackBerry Enterprise Solution

    This paper describes the security features that the BlackBerry Enterprise Server version 5.0, BlackBerry Desktop Software version 5.0, and BlackBerry Device Software version 5.0 support, unless otherwise stated. To determine if an earlier software version supports a security feature, see the documentation for earlier versions of the BlackBerry Enterprise Server,...

    Provided By Research In Motion

  • White Papers // Jul 2009

    BlackBerry Internet Service

    The BlackBerry Internet Service uses the security of the wireless network that it connects to. Email messages that are sent between the BlackBerry Internet Service and BlackBerry device are not encrypted. However, email messages that are sent between the BlackBerry Internet Service and messaging server can be encrypted using SSL...

    Provided By Research In Motion

  • White Papers // Jul 2014

    Automatic Fall Detection for Elderly - Providing Timely Aid Using GSM Modem

    The number of persons above the age of 60 years is fast growing, especially in India. Falls are one of the major problems in the elderly and are considered one of the \"Geriatric Giants\". In the paper, the authors propose a camera based automatic fall detection method to facilitate the...

    Provided By Research In Motion

  • White Papers // Jul 2014

    A 33kV Distribution Network Feeder Reconfiguration by Using REPSO for Voltage Profile Improvement

    The complexity of modern power system has contributed to the high power losses and over load in the distribution network. Due to that reason, Feeder Reconfiguration (FR) is required to identify the best topology network in order to fulfill the power demand with reduced power losses while stabilizing the magnitude...

    Provided By Research In Motion

  • White Papers // Jul 2014

    Robotic Control with Android & PC Using X-Bee

    In this paper, the authors concerned with the Android-Arduino communication and computer-communication by integrating mobile wheel robots with X-Bee communication protocol. Arduino controls tasks such as obstacle and collision avoidances following, autonomously movement, and indoor localization of group robots are implemented toward an autonomously control of robot. Mobile robotics is...

    Provided By Research In Motion

  • White Papers // Jul 2014

    Performance Analysis of Artificial Nueral Network Based Shuntactive Power Filter

    In this paper, the authors investigate a 3-wire Shunt Active Power Filter (SAPF) with Artificial Neural Network (ANN) smart controllers for mitigating the harmonics of the distribution system. To improve the performance of the conventional controller based on hysteresis controller and take advantage of smart-controllers, a feed forward-type (trained by...

    Provided By Research In Motion

  • White Papers // Jun 2014

    Hybrid Query Generation Schemas for Full Text Retrieval in P2P Networks

    Now-a-days millions of users to search and download desired data such as Napster and Gnutella as they are Peer-To-Peer (P2P) files sharing applications. In order to improve performance in unstructured P2Ps replication strategies are used. Efficient and effective full-text retrieval over unstructured p2p networks was developed in order to address...

    Provided By Research In Motion

  • White Papers // Jul 2014

    Analysis of Gateway Relocation Strategies in 802.16 Heterogeneous Networks

    IEEE 802.16-series are expected to provide broadband wireless access for a variety of multimedia services. To minimize handover delay and packet loss the authors defined a two-tiered mobility management in WiMAX Forum. WiMAX standards define the Access Service Network GateWay ASN GW relocation procedures and do not identifying when the...

    Provided By Research In Motion

  • White Papers // Jul 2014

    A Graphical Password Authentication System for Touch Screen Based Devices

    Mobile devices equipped with touch screens dominate the current mobile market because of high flexibility and good usability. Many privacy sensitive applications run on such devices. For authentication typing a text password is challenging task in touch screen based devices. A graphical based password is one of the most promising...

    Provided By Research In Motion

  • White Papers // Jul 2014

    Location-Aware E-passport: Enhancing Security and Privacy

    In E-passport identification process reading RFID are used. In the related work RFID's are embedded inside a chip which is holding the information of authentication. In this paper the implementation of E-passport using mobile devices to authenticate and access information stored by using context aware information to get access to...

    Provided By Research In Motion

  • White Papers // Jul 2014

    CB-Asymmetric Coplanar L Strip-Fed Dual Band Antenna for GSM/WLAN Application

    In this paper is to give a conductor backed asymmetric coplanar inverted Lstrip fed antenna for dual band applications. The antenna exhibit resonance at 1. 8GHz (1. 6-1. 85GHz) and 5. 2GHz (5. 08-5. 35GHz) with impedance band width of about 150MHz and 200MHz (return loss>-10dB) which is used for...

    Provided By Research In Motion

  • White Papers // Jul 2014

    LESIPT: Lightweight Enhanced Secure Incentive Protocol with Trusted Value for Multi-hop Wireless Networks

    In multi-hop wireless networks the communications rely on intermediate nodes that require collaboration; however, selfish nodes make use of the cooperative nodes to relay their packets and do not relay other nodes' packets. In this paper, the authors propose LESIPT: Lightweight Enhanced Secure Incentive Protocol with Trusted value for multi-hop...

    Provided By Research In Motion

  • White Papers // Dec 2011

    A Critical Review of Data Warehouse

    Data warehousing and OLAP have become the most important aid for the decision makers of any industry. Basically data warehousing refers to collecting and storing historical data into single repository, which is known as data warehouse and using that warehouse to produce analytical results. Being the helping hand for the...

    Provided By Research In Motion

  • White Papers // Oct 2013

    Deriving Business Intelligence from Unstructured Data

    The bulk of an organization's data is unstructured that is the information that doesn't nicely fit into the typical data-processing format. It remains stored, but unanalyzed. The information hidden or stored in unstructured data can play a critical role in making decisions, understanding and complying with regulations, and conducting other...

    Provided By Research In Motion

  • White Papers // Dec 2011

    A Critical Review on Concept of Green Databases

    Energy consumption in data centre is becoming one of the most important issues in today's world. The hardware designers are making efforts to produce the hardware that minimize the power consumption. But despite of best efforts hardware still consumes more energy even at idle state. Data centers impact the environment...

    Provided By Research In Motion

  • White Papers // Jul 2011

    Mobile Agent Applications within Intrusion Detection Technology

    Intrusion Detection System (IDS), based on mobile agents, that detects intrusion from outside the network segment as well as from inside. Mobile agent technology offers a new computing paradigm in which a program, in the form of a software agent, can suspend its execution on a host computer, transfer itself...

    Provided By Research In Motion