Science Publications

Displaying 1-40 of 386 results

  • White Papers // Jul 2010

    Evaluation of Ad Hoc on Demand Distance Vector Routing Protocol in HetMAN Architecture

    Mobile Ad hoc NETwork (MANET), a type of network with special characteristics, needs a special mechanism to bear with its ad hoc behavior. Approach: The important issue in MANET is routing protocol. Routing protocol is a standard used to determine the route path taken during the transmission of data. Results:...

    Provided By Science Publications

  • White Papers // Jan 2010

    Heterogeneous GPRS-WLAN Integration Based on Ad-Hoc Networks

    In heterogeneous architecture vertical handoffs let users have service from both GPRS and WLAN without any session termination and seamless to the end user. In international literature there are many researches trying to propose the merging of WLAN and GPRS networks into one heterogeneous interworking system. The loose coupling and...

    Provided By Science Publications

  • White Papers // Jan 2010

    Mobile Agents in Wireless LAN and Cellular Data Networks

    Advancing technology in wireless communication offers users anytime, anywhere access to information and network resources without restricting them to the fixed network infrastructure. Mobile computing represents a shift in the distributed systems paradigm. The potential of decoupled and disconnected operation, location-dependent computation and communication and powerful portable computing devices gives...

    Provided By Science Publications

  • White Papers // Apr 2010

    e-Learning Management System Using Service Oriented Architecture

    Service-based architectures take legacy application functionality and expose it to the Internet in a reliable, highly available, scalable, flexible, manageable and secure manner, easy and reliable internet-based method to create and access learning. Web service technology has emerged as a new paradigm of distributed computing. The Service-based architectures are layered...

    Provided By Science Publications

  • White Papers // Jan 2010

    Operating System Support for Wireless Sensor Networks

    In a wireless sensor network, several sensor nodes obtain local data and communicate among themselves in order to create a global vision of an object of study. The idea of a self-managed network of low-power, autonomous devices, that collects data from an environment and propagates information through a wireless link...

    Provided By Science Publications

  • White Papers // Jan 2010

    An Approach for Detecting Attacks in Mobile Adhoc Networks

    The security of data becomes more important with the increased use of commercial applications over wireless network environments. The authors presented an approach to handle various attacks for wireless networks. There were several problems of security in wireless networks due to intruders and different type of attacks such as Node...

    Provided By Science Publications

  • White Papers // Sep 2010

    Forecasting Financial Market Annual Performance Measures: Further Evidence

    Forecasting is simple; producing accurate forecasts is the essential task. Experience suggests that financial managers often assume that because models used in forecasting are appropriate that they are effective. This study addresses this assumption. Effective is taken to mean forecasts where the Absolute Percentage Error (APE) is equal to or...

    Provided By Science Publications

  • White Papers // Mar 2010

    Automated Position System Implementation Over Vehicular Ad Hoc Networks in 2-Dimension Space

    The real world scenario have changed from the wired connection to wireless connection. Over the years software development has responded to the increasing growth of wireless connectivity in developing network enabled software. The problem arises in the wireless domain due to random packet loss in transport layer and as well...

    Provided By Science Publications

  • White Papers // Jan 2011

    Adaptive Hybrid Mobile Agent Protocol for Wireless Multihop Internet Access

    A Mobile Ad Hoc NETwork (MANET) is an autonomous network that can be formed without of any established infrastructure. It consists of mobile nodes equipped with a wireless interface that are free to move and communicate. The mobile nodes act as host and routers, which has routing capabilities that create...

    Provided By Science Publications

  • White Papers // May 2011

    Authentication Based and Optimized Routing Technique in Mobile Ad Hoc Networks

    As the technology for ad hoc wireless networks gains maturity, comprehensive security solutions based on realistic trust models and addressing all prevalent issues like routing key management and cooperation enforcement are expected to appear. The solutions presented in this paper only cover a subset of threats and are far from...

    Provided By Science Publications

  • White Papers // Jan 2011

    Experimental Evaluation of Medium Access Schemes in 802.11 Wireless Networks

    Deployment of real time services over 802.11 wireless networks requires Quality of Service (QoS) differentiation mechanisms for different traffic types. This required investigations into the performance of the Medium Access Control (MAC) schemes like Distributed Coordinated Function (DCF) and Enhanced DCF with respect to the stringent QoS requirements imposed by...

    Provided By Science Publications

  • White Papers // Sep 2009

    A Performance Study of Reactive Multicast Routing Protocols in Virtual Class Room Using Mobile Ad Hoc Network

    A great deal of excitement has recently propelled Mobile Learning to the forefront of educational technology. The exponential growth of mobile technology in the recent years, increase in the availability of high-bandwidth network, advances in wireless technologies and popularity of handheld devices, have opened up new accessibility opportunities for education....

    Provided By Science Publications

  • White Papers // Jul 2010

    Business Continuity Planning: Are We Prepared for Future Disasters

    ? Natural and man-made disasters could cause a lot of monetary, mortality and morbidity losses for the business' operations such as: Activities, products and services. In order to minimize losses from such disasters, it is essential to prepare and implement effective business continuity plans that could deal with abnormal conditions....

    Provided By Science Publications

  • White Papers // Feb 2010

    Exploring Critical Determinants in Deploying Mobile Commerce Technology

    The research's problem lies in the fact that deploying m-commerce technology in Jordan represents the first serious trail to understand and explore the critical determinants that affect deploying mobile commerce technology. Approach: This research applied TAM model using the following variables: Perceived trust, perceived usefulness, perceived ease of use, social...

    Provided By Science Publications

  • White Papers // Jan 2010

    Building an e-Government e-Trust Infrastructure

    This paper presents a Trust Model for e-Government implementation. In the first part of the paper, the trust definition from different points of view (psychology, philosophy, linguistic, sociology, and mathematics) was presented. Most people think that to build trust between the government and its customers or citizens. However, this was...

    Provided By Science Publications

  • White Papers // Mar 2010

    Advanced Information Technology of Slot-Switching Network Schemes for on All-Optical Variable-Length Packet

    The purpose of this paper was to investigate all optical packet switching, because it was the key to the success of the future Internet. It can meet the stringent bandwidth requirement of future Internet applications, such as real-time video streaming. Due to the lack of optical Random Access Memory (RAM),...

    Provided By Science Publications

  • White Papers // Aug 2009

    TCP Optimal Performance in Wireless Networks Applications

    Currently, most data applications on wire line networks use TCP/IP as an end-to-end flow and congestion avoidance protocol. TCP provides excellent performance for data transfer in networks with stationary users when congestion is mainly due to packet loss and unusual long delays. For wireless or wire line networks, standard TCP...

    Provided By Science Publications

  • White Papers // Mar 2010

    UML Diagrams Generator: A New CASE Tool to Construct the Use-Case and Class Diagrams From an Event Table

    Building UML diagrams is a very important and time consuming task for both requirements and design phases. However, some of these diagrams, such as use-case and class diagrams can be considered as a transition between the two phases. Approach: Through this study, the event table will be used to derive...

    Provided By Science Publications

  • White Papers // Jan 2010

    Developing a Secure Web Service Architecture for SVG Image Delivery

    Web Services are substantially growing and become vital for businesses and organizations. A major concern, especially for mission-critical applications is Security. This study focuses on developing Scalable Vector Graphics (SVG) as Web services. In particular, the authors develop a service oriented architecture that securely manages SVG Web services using the...

    Provided By Science Publications

  • White Papers // Dec 2009

    Multiple Constraints for Ant Based Multicast Routing in Mobile Ad Hoc Networks

    A Mobile Ad Hoc Network (MANET) is a kind of wireless ad hoc network and is a self-configuring network of mobile routers (and associated hosts) connected by wireless links-the union of which forms an arbitrary topology. The routers are free to move randomly and organize themselves arbitrarily; thus, the network's...

    Provided By Science Publications

  • White Papers // Apr 2010

    Memory Storage Issues of Temporal Database Applications on Relational Database Management Systems

    Many existing database applications manage time-varying data. These database applications are referred to as temporal databases or time-oriented database applications that are considered as repositories of time-dependent data. Many proposals have been introduced for developing time-oriented database applications, some of which suggest building support for Temporal Database Management Systems (TDBMS)...

    Provided By Science Publications

  • White Papers // Jan 2010

    A Free Educational Java Framework for Graph Algorithms

    In the teaching of graph theory algorithms it is important that students can experiment them on numerical instances in order to fully understand their logical meaning and to learn how they can be implemented. The framework, which is currently in use at the University of Bologna, and is available on-line,...

    Provided By Science Publications

  • White Papers // Jan 2010

    JBOOM: Java Based Object Oriented Model of Software Configuration Management

    Most of the present Software Configuration Management systems deal with version and configurations in the form of files and directories, the need today is to have a Software Configuration Management system that handles versions and configurations directly in terms of functions (Program Module). A major objective of this research is...

    Provided By Science Publications

  • White Papers // Jan 2010

    Improving the Quality of Service Guarantee in an Asynchronous Transfer Mode (ATM) Network

    This study presents a technique for improving the Quality of Service (QoS) guarantee in an ATM network. In the proposed model, it was assumed that high priority traffic have been allocated a switch resource to guarantee a given QoS and low priority cells are allowed to enter the buffer, to...

    Provided By Science Publications

  • White Papers // Aug 2009

    Distributed Clusterhead Architecture for Mobile Ad Hoc Networks

    Mobile Ad Hoc Network (MANET) consists of dynamic topology as nodes in the network are mobile, and connected via wireless links. The nodes are grouped in clusters for the purpose of routing. Nodes within the cluster communicate directly. However, nodes communicate outside the cluster through a centralized node that is...

    Provided By Science Publications

  • White Papers // Nov 2009

    The Impact Of CRM On The Customer Satisfaction In Agricultural Bank

    The last several years saw the rise of Customer Relationship Management (CRM) as important business approach. CRM is a strategy that goes beyond increasing transaction volume. Its objectives are to increase profitability, revenue and customer satisfaction. To achieve CRM, a companywide set of tools, technologies and procedures promote the relationship...

    Provided By Science Publications

  • White Papers // Oct 2009

    Chemical Composition of Propolis From Different Regions in Java and Their Cytotoxic Activity

    Propolis samples from tropical zones, such as Java (Indonesia) with its vast biodiversity, have become a subject of increasing scientific and economic attention. The association of the chemical composition of propolis from different geographic regions with cytotoxic activities led to the identification of active principles, a fundamental tool to achieve...

    Provided By Science Publications

  • White Papers // Feb 2014

    VHDL Design and Hardware Realization of HybridArtificial Intelligence Architecture

    Evolutionary Algorithms (EAs) use Genetic Algorithm (GA) in many optimization problems to efficiently compute the function value in less time. In this paper, the weight optimization of the Artificial Neural Network (ANN), using the Back Propagation Network (BPN), is tested and presented with GA. The combined architecture of neuro-genetic (hybrid...

    Provided By Science Publications

  • White Papers // Mar 2010

    Design and Field Programmable Gate Array Implementation of Basic Building Blocks for Power-Efficient Baugh-Wooley Multipliers

    The power-efficient multiplier plays an important role of Very Large Scale Integration (VLSI) systems, as demands on portable computing and communication systems are growing. These multipliers often follows Baugh-Wooley algorithm. Multiplication is an important and essential operation in many algorithms used in Digital Signal Processing (DSP). Over the years the...

    Provided By Science Publications

  • White Papers // Jan 2015

    Communication Architecture Synthesis for Multi-Bus SoC

    In the System-on-Chip (SoC) design, the synthesis of communication architecture constitutes the bottleneck which can affect the performances of the system. Various schemes and protocols can be necessary, just as various topologies of interconnection. To reduce the complexity of the communications refinement, the authors present in this paper a model...

    Provided By Science Publications

  • White Papers // Oct 2011

    A Method for Human Resource Risk Management in Mobile Workforce Brokering Systems

    Addressing Human Resource (HR) risks such as: emergency leave, unexpected absence or resignation is a determinative activity in successful execution of business processes performed by workforces of an organization. However, according to HR risks are less regarded in comparison with other types of risks such as financial or safety. Managing...

    Provided By Science Publications

  • White Papers // Dec 2013

    E-Service Quality and Its Effect on Consumers' Perceptions Trust

    E-service quality measurement in online shopping has been receiving increasing attention currently and as a result, many studies have tried to highlight major dimensions of e-service quality linked with online environment. Excellent e-service quality is an important matter for online vendor. It is the factor that will enable them to...

    Provided By Science Publications

  • White Papers // Mar 2011

    Mining Rare Itemset with Automated Support Thresholds

    Data mining is widely used in a variety of application areas such as banking, marketing and retail industry. Frequent item set mining is a technique used in data mining to discover hidden associations that arise between various data items. In retail industry, the market basket analysis is intended for discovering...

    Provided By Science Publications

  • White Papers // Nov 2014

    From Data Mining and Knowledge Discovery to Big Data Analytics and Knowledge Extraction for Applications in Science

    Data mining for "Knowledge discovery in databases" and associated computational operations first introduced in the mid-1990 s can no longer cope with the analytical issues relating to the so-called "Big data". The recent buzzword big data refers to large volumes of diverse, dynamic, complex, longitudinal and/or distributed data generated from...

    Provided By Science Publications

  • White Papers // Mar 2015

    A Modified Key Partitioning for Bigdata Using MapReduce in Hadoop

    In the period of big data, massive amounts of structured and unstructured data are being created every day by a multitude of ever present sources. Big data is complicated to work with and needs extremely parallel software executing on a huge number of computers. MapReduce is a current programming model...

    Provided By Science Publications

  • White Papers // Mar 2013

    Gate Replacement Technique for Reducing Leakage Current in Wallace Tree Multiplier

    Leakage power has become more significant in the power dissipation of today's CMOS circuits. This affects the portable battery operated devices directly. The multipliers are the main key for designing an energy efficient processor, where the multiplier design decides the digital signal processors efficiency. In this paper, gate replacement technique...

    Provided By Science Publications

  • White Papers // Aug 2010

    Low Power Multiplier Design Using Latches and Flip-Flops

    The proposed BZFAD architecture lowers the power dissipation and area when compared to a conventional shift and add multiplier. A multiplexer with one hot encoded bus selector is used for avoiding the switching activity due to the shifting of the multiplier register. Feeder and bypass registers are used for avoiding...

    Provided By Science Publications

  • White Papers // Nov 2010

    On-Chip Implementation of Pipeline Digit-Slicing Multiplier-Less Butterfly for Fast Fourier Transform Architecture

    FFT plays an important role in many Digital Signals Processing (DSP) applications such as in communication systems and image processing. It is an efficient algorithm to compute the Discrete Fourier Transform (DFT). DFT is the main and important procedure in data analysis, system design and implementation. In order to reduce...

    Provided By Science Publications

  • White Papers // Jan 2015

    A Novel Fault Tolerant Reversible Gate for Nanotechnology Based Systems

    In this paper, the authors propose a novel reversible logic gate, NFT. It is a parity preserving reversible logic gate, that is, the parity of the outputs matches that of the inputs. They demonstrate that the NFT gate can implement all Boolean functions. It renders a wide class of circuit...

    Provided By Science Publications

  • White Papers // Jan 2014

    Performance Analysis of High Efficiency Low Density Parity-Check Code Decoder for Low Power Applications

    In this paper, the authors propose a low power, high efficient Low Density Parity-Check (LDPC) code decoder architecture for error detection and correction applications. LDPC codes have been adopted in latest wireless standards such as satellite and mobile communications since they possess superior error-detecting and correcting capabilities. As technology scales,...

    Provided By Science Publications