Science Publications

Displaying 1-40 of 389 results

  • White Papers // Jan 2010

    An Approach for Detecting Attacks in Mobile Adhoc Networks

    The security of data becomes more important with the increased use of commercial applications over wireless network environments. The authors presented an approach to handle various attacks for wireless networks. There were several problems of security in wireless networks due to intruders and different type of attacks such as Node...

    Provided By Science Publications

  • White Papers // Jan 2010

    Mobile Agents in Wireless LAN and Cellular Data Networks

    Advancing technology in wireless communication offers users anytime, anywhere access to information and network resources without restricting them to the fixed network infrastructure. Mobile computing represents a shift in the distributed systems paradigm. The potential of decoupled and disconnected operation, location-dependent computation and communication and powerful portable computing devices gives...

    Provided By Science Publications

  • White Papers // Jan 2010

    Operating System Support for Wireless Sensor Networks

    In a wireless sensor network, several sensor nodes obtain local data and communicate among themselves in order to create a global vision of an object of study. The idea of a self-managed network of low-power, autonomous devices, that collects data from an environment and propagates information through a wireless link...

    Provided By Science Publications

  • White Papers // Mar 2010

    Automated Position System Implementation Over Vehicular Ad Hoc Networks in 2-Dimension Space

    The real world scenario have changed from the wired connection to wireless connection. Over the years software development has responded to the increasing growth of wireless connectivity in developing network enabled software. The problem arises in the wireless domain due to random packet loss in transport layer and as well...

    Provided By Science Publications

  • White Papers // Sep 2010

    Forecasting Financial Market Annual Performance Measures: Further Evidence

    Forecasting is simple; producing accurate forecasts is the essential task. Experience suggests that financial managers often assume that because models used in forecasting are appropriate that they are effective. This study addresses this assumption. Effective is taken to mean forecasts where the Absolute Percentage Error (APE) is equal to or...

    Provided By Science Publications

  • White Papers // Apr 2010

    e-Learning Management System Using Service Oriented Architecture

    Service-based architectures take legacy application functionality and expose it to the Internet in a reliable, highly available, scalable, flexible, manageable and secure manner, easy and reliable internet-based method to create and access learning. Web service technology has emerged as a new paradigm of distributed computing. The Service-based architectures are layered...

    Provided By Science Publications

  • White Papers // Aug 2009

    Distributed Clusterhead Architecture for Mobile Ad Hoc Networks

    Mobile Ad Hoc Network (MANET) consists of dynamic topology as nodes in the network are mobile, and connected via wireless links. The nodes are grouped in clusters for the purpose of routing. Nodes within the cluster communicate directly. However, nodes communicate outside the cluster through a centralized node that is...

    Provided By Science Publications

  • White Papers // Apr 2010

    Memory Storage Issues of Temporal Database Applications on Relational Database Management Systems

    Many existing database applications manage time-varying data. These database applications are referred to as temporal databases or time-oriented database applications that are considered as repositories of time-dependent data. Many proposals have been introduced for developing time-oriented database applications, some of which suggest building support for Temporal Database Management Systems (TDBMS)...

    Provided By Science Publications

  • White Papers // Jan 2010

    Improving the Quality of Service Guarantee in an Asynchronous Transfer Mode (ATM) Network

    This study presents a technique for improving the Quality of Service (QoS) guarantee in an ATM network. In the proposed model, it was assumed that high priority traffic have been allocated a switch resource to guarantee a given QoS and low priority cells are allowed to enter the buffer, to...

    Provided By Science Publications

  • White Papers // Nov 2009

    The Impact Of CRM On The Customer Satisfaction In Agricultural Bank

    The last several years saw the rise of Customer Relationship Management (CRM) as important business approach. CRM is a strategy that goes beyond increasing transaction volume. Its objectives are to increase profitability, revenue and customer satisfaction. To achieve CRM, a companywide set of tools, technologies and procedures promote the relationship...

    Provided By Science Publications

  • White Papers // Dec 2009

    Multiple Constraints for Ant Based Multicast Routing in Mobile Ad Hoc Networks

    A Mobile Ad Hoc Network (MANET) is a kind of wireless ad hoc network and is a self-configuring network of mobile routers (and associated hosts) connected by wireless links-the union of which forms an arbitrary topology. The routers are free to move randomly and organize themselves arbitrarily; thus, the network's...

    Provided By Science Publications

  • White Papers // Oct 2009

    Chemical Composition of Propolis From Different Regions in Java and Their Cytotoxic Activity

    Propolis samples from tropical zones, such as Java (Indonesia) with its vast biodiversity, have become a subject of increasing scientific and economic attention. The association of the chemical composition of propolis from different geographic regions with cytotoxic activities led to the identification of active principles, a fundamental tool to achieve...

    Provided By Science Publications

  • White Papers // Jan 2010

    A Free Educational Java Framework for Graph Algorithms

    In the teaching of graph theory algorithms it is important that students can experiment them on numerical instances in order to fully understand their logical meaning and to learn how they can be implemented. The framework, which is currently in use at the University of Bologna, and is available on-line,...

    Provided By Science Publications

  • White Papers // Jan 2010

    JBOOM: Java Based Object Oriented Model of Software Configuration Management

    Most of the present Software Configuration Management systems deal with version and configurations in the form of files and directories, the need today is to have a Software Configuration Management system that handles versions and configurations directly in terms of functions (Program Module). A major objective of this research is...

    Provided By Science Publications

  • White Papers // Jul 2010

    Evaluation of Ad Hoc on Demand Distance Vector Routing Protocol in HetMAN Architecture

    Mobile Ad hoc NETwork (MANET), a type of network with special characteristics, needs a special mechanism to bear with its ad hoc behavior. Approach: The important issue in MANET is routing protocol. Routing protocol is a standard used to determine the route path taken during the transmission of data. Results:...

    Provided By Science Publications

  • White Papers // Sep 2009

    A Performance Study of Reactive Multicast Routing Protocols in Virtual Class Room Using Mobile Ad Hoc Network

    A great deal of excitement has recently propelled Mobile Learning to the forefront of educational technology. The exponential growth of mobile technology in the recent years, increase in the availability of high-bandwidth network, advances in wireless technologies and popularity of handheld devices, have opened up new accessibility opportunities for education....

    Provided By Science Publications

  • White Papers // Mar 2010

    Advanced Information Technology of Slot-Switching Network Schemes for on All-Optical Variable-Length Packet

    The purpose of this paper was to investigate all optical packet switching, because it was the key to the success of the future Internet. It can meet the stringent bandwidth requirement of future Internet applications, such as real-time video streaming. Due to the lack of optical Random Access Memory (RAM),...

    Provided By Science Publications

  • White Papers // Aug 2009

    TCP Optimal Performance in Wireless Networks Applications

    Currently, most data applications on wire line networks use TCP/IP as an end-to-end flow and congestion avoidance protocol. TCP provides excellent performance for data transfer in networks with stationary users when congestion is mainly due to packet loss and unusual long delays. For wireless or wire line networks, standard TCP...

    Provided By Science Publications

  • White Papers // Jan 2010

    Building an e-Government e-Trust Infrastructure

    This paper presents a Trust Model for e-Government implementation. In the first part of the paper, the trust definition from different points of view (psychology, philosophy, linguistic, sociology, and mathematics) was presented. Most people think that to build trust between the government and its customers or citizens. However, this was...

    Provided By Science Publications

  • White Papers // Jan 2010

    Developing a Secure Web Service Architecture for SVG Image Delivery

    Web Services are substantially growing and become vital for businesses and organizations. A major concern, especially for mission-critical applications is Security. This study focuses on developing Scalable Vector Graphics (SVG) as Web services. In particular, the authors develop a service oriented architecture that securely manages SVG Web services using the...

    Provided By Science Publications

  • White Papers // Feb 2010

    Exploring Critical Determinants in Deploying Mobile Commerce Technology

    The research's problem lies in the fact that deploying m-commerce technology in Jordan represents the first serious trail to understand and explore the critical determinants that affect deploying mobile commerce technology. Approach: This research applied TAM model using the following variables: Perceived trust, perceived usefulness, perceived ease of use, social...

    Provided By Science Publications

  • White Papers // Mar 2010

    UML Diagrams Generator: A New CASE Tool to Construct the Use-Case and Class Diagrams From an Event Table

    Building UML diagrams is a very important and time consuming task for both requirements and design phases. However, some of these diagrams, such as use-case and class diagrams can be considered as a transition between the two phases. Approach: Through this study, the event table will be used to derive...

    Provided By Science Publications

  • White Papers // Jan 2010

    Heterogeneous GPRS-WLAN Integration Based on Ad-Hoc Networks

    In heterogeneous architecture vertical handoffs let users have service from both GPRS and WLAN without any session termination and seamless to the end user. In international literature there are many researches trying to propose the merging of WLAN and GPRS networks into one heterogeneous interworking system. The loose coupling and...

    Provided By Science Publications

  • White Papers // Jul 2010

    Business Continuity Planning: Are We Prepared for Future Disasters

    ? Natural and man-made disasters could cause a lot of monetary, mortality and morbidity losses for the business' operations such as: Activities, products and services. In order to minimize losses from such disasters, it is essential to prepare and implement effective business continuity plans that could deal with abnormal conditions....

    Provided By Science Publications

  • White Papers // Jan 2012

    A Backpropagation Neural Network for Computer Network Security

    In this paper, an efficient and scalable technique for computer network security is presented. On one hand, the decryption scheme and the public key creation used in this work are based on a multi-layer neural network that is trained by back-propagation learning algorithm. On the other hand, the encryption scheme...

    Provided By Science Publications

  • White Papers // Jan 2012

    A New Type of Network Security Protocol Using Hybrid Encryption in Virtual Private Networking

    Today wireless communications is acting as a major role in networks. Through year-end 2006, the employee's ability to install unmanaged access points will result is more than 50% of enterprises exposing sensitive information through the wireless Virtual Private Networks (VPN). It enables them to send the data between two computers...

    Provided By Science Publications

  • White Papers // Jan 2012

    Computer Security: A Survey of Methods and Systems

    In this paper, the authors have reviewed studies which survey all aspects of computer security including attackers and attacks, software bugs and viruses as well as different intrusion detection systems and ways to evaluate such systems. The aim was to develop a survey of security related issues which would provide...

    Provided By Science Publications

  • White Papers // Dec 2009

    Efficient Approach for Security Information Retrieval by Using Grid

    The results achieved by simulation, which was in-cooperated with the Computer Graphics approach and then applied together and the results observed were promising. The number of Columns and Rows can be increased to any length, that is, to yield a larger size of Mini-Grid and Main-Grids. Secondly, this technique can...

    Provided By Science Publications

  • White Papers // Feb 2011

    Increasing Effectiveness of IDS to Improve Security in Intranet

    The mobility based node reputation scheme for secured MANET presented in this study maintains the consistent knowledge about the node's communication spree, whether trusted or untrusted one. The proposed reputation scheme is used in improving the efficiency of overall network data transfer between different nodes. The neighbor node utilization rate...

    Provided By Science Publications

  • White Papers // Dec 2009

    On-Chip Implementation of High Resolution High Speed Floating Point Adder/Subtractor With Reducing Mean Latency for OFDM

    Recently Orthogonal Frequency Division Multiplexing (OFDM) techniques have received immense attention in high-speed data communication systems such as Wireless local Area Network (WAN), digital audio/video broadcasting and beyond 3G research. OFDM is a multi-carrier transmission technique, which divides the available spectrum into many carriers, each one being modulated by a...

    Provided By Science Publications

  • White Papers // Aug 2011

    Evaluation of Multiple Input Multiple Output (MIMO) System Capacity With Spatial Correlations

    Wireless communication is rapidly becoming the most popular solution to deliver voice and data services due to flexibility and mobility that can be offered at moderate infrastructure costs. Today's wireless technologies just won't get them to the hyper-connectivity of uninterrupted access from any mobile device with unlimited bandwidth at real-time...

    Provided By Science Publications

  • White Papers // Dec 2009

    Bluetooth Wireless Monitoring, Managing and Control for Inter Vehicle in Vehicular Ad-Hoc Networks

    The car users expect more and more accessories available in their cars, but the accessories available needed manage by driver manually and not properly manage by smart system. All these accessories are able to control by user manually using different and standalone controllers. Besides, the controller itself uses RF technology...

    Provided By Science Publications

  • White Papers // Aug 2009

    Bluetooth Wireless Network Authentication Using Radio Frequency Communication Protocol

    Wireless networks serve as the transport mechanism between devices. Wireless networks can be categorized into three group based on their coverage range: Wireless Wide Area Network (WWAN), Wireless Local Area Network (WLAN) and Wireless Personal Area Networks (WPAN). WWAN includes wide coverage area technologies such as 2G cellular, Cellular Digital...

    Provided By Science Publications

  • White Papers // Jan 2012

    Design, Modeling and Implementation of Pic Based Wireless Control System to Eliminate Blind Spots in Vehicle Side Mirrors

    A PIC controlled IR system for the control of vehicle side mirror system movements for the purpose of revealing blind spots is designed and implemented. The designed and built system allows the side view mirrors to be adjusted based on the driver head movement. The infrared-based head tracking system maps...

    Provided By Science Publications

  • White Papers // Jan 2012

    A Comparative Study Between Various Protocols of MANET Networks

    Multicast Ad-Hoc On-Demand Distance Vector (MAODV) protocol keeps sending control packets within static periods whether there was sending of data packets or not, and it was not concerned with the amount of these data packets. Based on this, many people found out that there are a high number of control...

    Provided By Science Publications

  • White Papers // Aug 2009

    Adding Quality of Service Extensions to the Enhanced Associativity Based Routing Protocol for Mobile Ad Hoc Networks (MANET)

    This paper described how to discover routes that can satisfy QoS service requirements by using extensions to the Enhanced Associativity Bases Routing Protocol (EABR). These extensions were added to the messages used during route discovery. These extensions specify the service requirements, which must be met by nodes re-broadcasting a route...

    Provided By Science Publications

  • White Papers // Dec 2009

    Distributed Real Time Architecture for Data Placement in Wireless Sensor Networks

    Reliable and correct behavior of sensor network based on infrastructure can be critical for human life, environment, decision-making and consequence of misbehavior can be catastrophic. Therefore development of reliable, stable and secure solutions that work provably correct even in unreliable and un-trusted environment is extremely important. The analysis of the...

    Provided By Science Publications

  • White Papers // Jan 2012

    Discrete Simulation Framework for Wireless Cellular Networks

    The aim of the discrete simulation framework is to deal with issues of the next generation of wireless cellular networks (e.g., multimedia traffic, radio resource management and mobility, etc.) and to provide a platform for current and future investigations involving wireless cellular networks. The simulator is built from the scratch...

    Provided By Science Publications

  • White Papers // May 2012

    Hardware Design of Wireless Physical Token Ring System for Mobile and Cell Communication

    A wireless network system based on an infrared and Laser scanning Physical Token Ring architecture (W-PTRS) was designed, built and tested successfully. The network provides a different way of utilizing the concept of a token ring network, but with a higher efficiency related to the speed of data transfer and...

    Provided By Science Publications

  • White Papers // Dec 2009

    Energy Efficient Hidden Markov Model Based Target Tracking Mechanism in Wireless Sensor Networks

    Wireless Sensor Networks (WSN) have become one of the most promising and interesting areas over the past few years. These networks are very large systems comprised of small sized, low power, low-cost sensor devices which collect information about the physical environment. The flexibility, self-organization, fault tolerance, high sensing fidelity, low-cost...

    Provided By Science Publications