Science Publications

Displaying 1-40 of 272 results

  • White Papers // Jan 2015

    FPGA Implementation of Power Aware FIR Filter Using Reduced Transition Pipelined Variable Precision Gating

    With the emergence of portable computing and communication system, power awareness is one of the major objectives of VLSI design. This is its ability to scale power consumption based on the time-varying nature of inputs. Even though the system is not designed for being power aware, systems display variations in...

    Provided By Science Publications

  • White Papers // Jan 2015

    A Secure Time-Stamp Based Concurrency Control Protocol for Distributed Databases

    In distributed database systems the global database is partitioned into a collection of local databases stored at different sites. In this era of growing technology and fast communication media, security has an important role to play. In this paper, the authors presented a Secure Concurrency Control Protocol (SCCP) based on...

    Provided By Science Publications

  • White Papers // Jan 2015

    Distributed Shared Memory Consistency Object-Based Model

    Distributed Shared Memory (DSM) systems represent a successful hybrid of two parallel computer classes: shared-memory multiprocessors and distributed computer systems. They provide the shared memory abstraction in systems with physically distributed memories and consequently combine the advantages of both approaches. A novel model that describes consistency in shared memory was...

    Provided By Science Publications

  • White Papers // Jan 2015

    Teaching Computer Organization and Architecture Using Simulation and FPGA Applications

    In this paper, the authors present the design concepts and realization of incorporating micro-operation simulation and FPGA implementation into a teaching tool for computer organization and architecture. This teaching tool helps computer engineering and computer science students to be familiarized practically with computer organization and architecture through the development of...

    Provided By Science Publications

  • White Papers // Jan 2015

    An Efficient Approach for Computing Silhouette Coefficients

    One popular approach for finding the best number of clusters (K) in a data set is through computing the silhouette coefficients. The silhouette coefficients for different values of K, are first found and then the maximum value of these coefficients is chosen. However, computing the silhouette coefficient for different Ks...

    Provided By Science Publications

  • White Papers // Jan 2015

    Low Power Hardware Implementation of High Speed FFT Core

    Fourier transforms play an important role in many digital signal processing applications including speech, signal and image processing. Applications based on Fast Fourier Transform (FFT) such as signal and image processing requires high computational power. This paper proposes the implementation of radix-4 based parallel pipelined fast fourier transform processor which...

    Provided By Science Publications

  • White Papers // Jan 2015

    Implementing a Large Data Bus VLIW Microprocessor

    Microprocessors have grown tremendously in its computing and data crunching capability since the early days of the invention of a microprocessor. Today, most microprocessors in the market are at 32 bits, while the latest microprocessors from IBM, Intel and AMD are at 64 bits. To further grow the computational capability...

    Provided By Science Publications

  • White Papers // Jan 2015

    Effective Load Metric and Efficient Initial Job Placement for Dynamic Load Balancing in Cluster

    High performance clusters are being configured specially to give data centers that require extreme performance and the processing power they need. When the data is accessed across clusters the data latency time has significant impact on the performance. In the literature it is given that memory and I/O have become...

    Provided By Science Publications

  • White Papers // Jan 2015

    A Novel Reconfigurable Execution Core for Merged DSP Microcontroller

    In this paper, the authors present an execution core which can be reconfigured either for calculation of digital convolution or for computation of discrete orthogonal transform by appropriate local buffer initialization of processing cells. It is shown that the data flow pattern can be changed by a single bit control...

    Provided By Science Publications

  • White Papers // Dec 2014

    Android Based Energy Aware Framework for Porting Legacy Applications

    Trend is growing towards using complex multimedia functions on smaller devices. In this paper, the authors explore the effect of migrating legacy signal processing software applications algorithms from large form factor devices to the smaller one such as handheld mobile devices known as Energy Conscious Mobile Computing Systems (EConMCS). They...

    Provided By Science Publications

  • White Papers // Dec 2014

    Area Efficient Distributed Arithmetic Discrete Cosine Transform Using Modified Wallace Tree Multiplier

    In this paper, by using the modified Wallace tree multiplier, an error compensated adder tree is constructed in order to round off truncation errors and to obtain high through put discrete cosine transform design. Peak Signal to Noise Ratio (PSNR) is met efficiently since modified Wallace tree method is an...

    Provided By Science Publications

  • White Papers // Dec 2014

    RTOS Implementation of Non-Linear System Using Multi Tasking, Scheduling and Critical Section

    RTOS based embedded systems are designed with priority based multiple tasks. Inter task communication and data corruptions are major constraints in multi-tasking RTOS system. This paper the authors describe about the solution for these issues with an example real-time Liquid level control system. Message queue and mail box are used...

    Provided By Science Publications

  • White Papers // Nov 2014

    Resource Broker Management by Adopting Self-Adaptive Multi-Instance Broker Scheduling in Grid Computing

    A grid resource broker seeks to assign the appropriate jobs to the appropriate resources as part of resource management in the multi-grid environment. Multi instances of the broker system provide multiple instances of brokers to simultaneously process jobs between multiple resources in a hierarchical cluster grid environment. In this paper,...

    Provided By Science Publications

  • White Papers // Jul 2014

    Database Replication in Heterogenous Platform

    The application of diverse database technologies in enterprises today is increasingly a common practice. To provide high availability and survivability of real-time information, a database replication technology that has capability to replicate databases under heterogenous platforms is required. This paper is to find the technology with such capability. In this...

    Provided By Science Publications

  • White Papers // Apr 2014

    Implementation of Central Queue Based Realtime Scheduler for Multiple Source Data Streaming

    Real-time data packet sources are required to remain robust against different security threats. This paper proposes a real-time secure scheduling strategy for data transmission to enhance the communication throughput and reduce the overheads. The proposed system combines real-time scheduling with security service enhancement, error detection and real-time scheduler based on...

    Provided By Science Publications

  • White Papers // Apr 2014

    Robust Memory Management Using Real Time Concepts

    Memory fragmentation is the development of a large number of separate free areas. Memory management in embedded systems demand effective implementation schemes to avoid fragmentation problem. Existing dynamic memory allocation methods fail to suit real time system requirements. Execution times need to be deterministic and this motivates the need for...

    Provided By Science Publications

  • White Papers // Feb 2014

    A New-Threshold Based Job Scheduling for Grid System

    In heterogeneous distributed systems, utility grids have emerged as a new model of service. In this service, workflow scheduling is one of the challenging problems for satisfying user's quality requirements. One of the main issues in work flow scheduling is to minimize the workflow execution cost in terms of time...

    Provided By Science Publications

  • White Papers // Jan 2014

    Quantitative Evaluation of Job and Resources for Better Selection to Improve Makespan in Grid Scheduling

    In this paper, the authors present the priority based ranking of jobs and resources to improve the makespan in the grid scheduling problem. Grid environment's effectiveness largely depends on scheduler's effectiveness/efficiency as they act as local resource brokers. The scheduler is responsible to select resources/scheduling jobs so that users/application requirements...

    Provided By Science Publications

  • White Papers // Nov 2013

    A Case for Hybrid Instruction Encoding for Reducing Code Size in Embedded System-on-Chips Based on RISC Processor Cores

    Embedded computing differs from general purpose computing in several aspects. In most embedded systems, size, cost and power consumption are more important than performance. In embedded System-on-Chips (SoCs), memory is a scarce resource and it poses constraints on chip space, cost and power consumption. Whereas fixed instruction length feature of...

    Provided By Science Publications

  • White Papers // Jul 2013

    Fuzzy Round Robin CPU Scheduling Algorithm

    One problem in round robin CPU scheduling is that if the time required for the running process is slightly more than time quantum even by a fraction value, then process gets preempted and context switch occurs. This causes more waiting time for that process and more overheads due to unnecessary...

    Provided By Science Publications

  • White Papers // Nov 2012

    Query Tuning in Oracle Database

    Oracle database is well suited to use for managing and exchanging of corporate data, especially for companies that have large-scale databases. Even though Oracle can work best, however, there are conditions where Oracle does not perform well and consume more time to perform the query transaction. This is when the...

    Provided By Science Publications

  • White Papers // Aug 2012

    Hybridization of Genetic Algorithm With Parallel Implementation of Simulated Annealing for Job Shop Scheduling

    Meta-heuristics is used to solve with the computationally hard optimization problems. Metaheuristics consist of a high level algorithm that guides the search using other particular methods. Metaheuristics can be used as a standalone approach for solving hard combinatorial optimization problems. But now the standalone approach is drastically changed and attention...

    Provided By Science Publications

  • White Papers // Jun 2012

    A Review of Security System for Smart Home Applications

    Now-a-days, the security level is very important, always emphasized and enhanced system. This system managed to help users to detect human presence around the house precisely. The use of wireless connectivity based on microcontroller facilitates the installation process at home and can prevent anyone hacking into security systems. This system...

    Provided By Science Publications

  • White Papers // May 2012

    Key Success Factors of 3rd Generation Mobile Network Services for M-Commerce in Malaysia

    While there has been a great deal of excitement in view of M-commerce, very little is actually known about conditions and critical success factors for successful introduction of the 3rd generation mobile network services here in Malaysia. This paper investigates the factors for successful diffusion of 3G network services and...

    Provided By Science Publications

  • White Papers // May 2012

    Hardware Design of Wireless Physical Token Ring System for Mobile and Cell Communication

    A wireless network system based on an infrared and Laser scanning Physical Token Ring architecture (W-PTRS) was designed, built and tested successfully. The network provides a different way of utilizing the concept of a token ring network, but with a higher efficiency related to the speed of data transfer and...

    Provided By Science Publications

  • White Papers // Apr 2012

    Release Process on Quality Improvement in Open Source Software Project Management

    This paper has provided an in depth understanding of OSS release process, which is an area of contemporary significance. The core finding of this paper is that in complex OSS projects, the volunteers experience many difficulties with the release approach. These include lack of coordination among OSS developers', who are...

    Provided By Science Publications

  • White Papers // Apr 2012

    Optical System Monitoring Based on Reflection Spectrum of Fiber Bragg Grating

    This paper presents fiber fault monitoring approaches for Fiber-To-The Home (FTTH) with a Passive Optical Network (PON). Current fiber fault monitoring approaches are difficult to be implemented due to its complexity and high loss as the amount of branches increase. Approach: A fiber fault monitoring scheme is proposed whereas Fiber...

    Provided By Science Publications

  • White Papers // Apr 2012

    A Chaotic Block Cipher for Real-Time Multimedia

    The widespread usage of Internet is providing additional channels for a pirate to easily and quickly distribute the copyrighted digital content. As a result, the protection of content is now receiving a significant amount of consideration and strong security technology is required to protect user's sensitive digital data. Cryptography is...

    Provided By Science Publications

  • White Papers // Apr 2012

    Buffer Pocketing and Pre-Checking on Buffer Utilization

    A basic NoC architecture is composed of routers, communication links between routers and a Network-Interface Component (NIC) between each pair of router and processing element. NoC allows much higher bandwidth through parallel communication. Each router can accept at the same time the flits arriving from all of the input channels...

    Provided By Science Publications

  • White Papers // Apr 2012

    Application of Adaptive Neuro-Fuzzy Inference System for Information Security

    Computer networks are expanding at very fast rate and the number of network users is increasing day by day, for full utilization of networks it need to be secured against many threats including malware, which is harmful software with the capability to damage data and systems. Fuzzy rule based classification...

    Provided By Science Publications

  • White Papers // Apr 2012

    A Fault Tolerant Resource Allocation Architecture for Mobile Grid

    In this paper, the authors have developed a fault tolerant technique to improve reliability in mobile grid environment. The proposed technique handles both resource and network failure and present recovery techniques also. When the job is assigned to the node, acknowledgement must reach monitoring agent within certain time interval else...

    Provided By Science Publications

  • White Papers // Apr 2012

    Impact of the Use of Object Request Broker Middleware for Inter-Component Communications in C6416 Digital Signal Processor Based Software Communications Architecture Radio Systems

    Software Communications Architecture (SCA), ORB middleware, ORB express DSP, inter-component communications, stub code, encoding, marshalling are necessary in order to meet the requirements of a wide range of today's communication needs. The advent of software defined radio and the use of the Digital Signal Processor (DSP) as a suitable device...

    Provided By Science Publications

  • White Papers // Apr 2012

    Congestion Free Routing in Adhoc Networks

    A Mobile Ad-Hoc Network (MANET) is a temporary network; the mobile devices in an ad-hoc network are communicating through wireless links without any pre-existing infrastructure. The one major problem of this network is network congestion, it may take place at any intermediate nodes when data packets are traveling from source...

    Provided By Science Publications

  • White Papers // Mar 2012

    A Multipath Energy Efficient Congestion Control Scheme for Wireless Sensor Network

    In the modern technology world, network attacks have become more sophisticated and harder to identify the attack. When many applications like scalable chat services and streaming video, are expected to run over the Internet, the security is necessary in computing and communication became a necessity. The internet today provides less...

    Provided By Science Publications

  • White Papers // Mar 2012

    A Framework for .NET Mobile-Based Application Services

    A Wireless Sensor Network (WSN) is a network composed of distributed autonomous devices using sensors to cooperatively monitor physical or environmental conditions such as temperature, sound, vibration, pressure, motion or pollutants at different locations. WSNs have a wide range of applications in object tracking, object localization, habitat observation, health monitoring...

    Provided By Science Publications

  • White Papers // Mar 2012

    Fuzzy Based Secure Data Aggregation Technique in Wireless Sensor Networks

    One of the up coming technologies is the wireless sensor network and now it has attained much consideration from the field of research. A sensor network consists of numerous small devices which are inexpensive and organize itself into an ad-hoc system. The wireless sensor network monitors the physical environment to...

    Provided By Science Publications

  • White Papers // Mar 2012

    Ensuring Multi Messages Broadcasting in Mobile Ad Hoc Network using Network Coding Approach

    Broadcasting is the most frequently used operation in Mobile Ad hoc NETworks (MANETs) for the dissemination of data and control messages in many applications. Usually, a network backbone is constructed for efficient broadcasting to avoid the broadcast storm problem caused by simple blind flooding, where only selected nodes, called forwarding...

    Provided By Science Publications

  • White Papers // Mar 2012

    New Optical Splitter Design for Application in Fibre-to-the Home Passive Optical Network using Virtual Lab Platform

    In this study, authors present a new design of optical splitter to be applied in FTTH-PON named Multi Ratio Optical Splitter (MROS). MROS was introduced to enhance the power distribution in the optical network. The authors also bring in new approach for designing a new optical device that enable one...

    Provided By Science Publications

  • White Papers // Mar 2012

    Privacy Preserved Collaborative Secure Multiparty Data Mining

    In the current modern business environment, its success is defined by collaboration, team efforts and partnership, rather than lonely spectacular individual efforts in isolation. So the collaboration becomes especially important because of the mutual benefit it brings. Sometimes, such collaboration even occurs among competitors, or among companies that have conflict...

    Provided By Science Publications

  • White Papers // Mar 2012

    Effective Authentication Technique for Distributed Denial of Service Attacks in Wireless Local Area Networks

    In 802.11-based Wireless LAN (WLAN), there is an improved risk of security attacks. To defeat concealed attacks, there is a necessity to authenticate both access points and wireless stations. The authors propose a defensive technique for DDoS attack in WLAN. This authentication technique includes an Authentication Server (AS) in addition...

    Provided By Science Publications

  • White Papers // Sep 2009

    A Performance Study of Reactive Multicast Routing Protocols in Virtual Class Room Using Mobile Ad Hoc Network

    A great deal of excitement has recently propelled Mobile Learning to the forefront of educational technology. The exponential growth of mobile technology in the recent years, increase in the availability of high-bandwidth network, advances in wireless technologies and popularity of handheld devices, have opened up new accessibility opportunities for education....

    Provided By Science Publications

  • White Papers // Jan 2010

    Building an e-Government e-Trust Infrastructure

    This paper presents a Trust Model for e-Government implementation. In the first part of the paper, the trust definition from different points of view (psychology, philosophy, linguistic, sociology, and mathematics) was presented. Most people think that to build trust between the government and its customers or citizens. However, this was...

    Provided By Science Publications

  • White Papers // Mar 2010

    Advanced Information Technology of Slot-Switching Network Schemes for on All-Optical Variable-Length Packet

    The purpose of this paper was to investigate all optical packet switching, because it was the key to the success of the future Internet. It can meet the stringent bandwidth requirement of future Internet applications, such as real-time video streaming. Due to the lack of optical Random Access Memory (RAM),...

    Provided By Science Publications

  • White Papers // Aug 2009

    TCP Optimal Performance in Wireless Networks Applications

    Currently, most data applications on wire line networks use TCP/IP as an end-to-end flow and congestion avoidance protocol. TCP provides excellent performance for data transfer in networks with stationary users when congestion is mainly due to packet loss and unusual long delays. For wireless or wire line networks, standard TCP...

    Provided By Science Publications

  • White Papers // Mar 2010

    UML Diagrams Generator: A New CASE Tool to Construct the Use-Case and Class Diagrams From an Event Table

    Building UML diagrams is a very important and time consuming task for both requirements and design phases. However, some of these diagrams, such as use-case and class diagrams can be considered as a transition between the two phases. Approach: Through this study, the event table will be used to derive...

    Provided By Science Publications

  • White Papers // Jan 2010

    Developing a Secure Web Service Architecture for SVG Image Delivery

    Web Services are substantially growing and become vital for businesses and organizations. A major concern, especially for mission-critical applications is Security. This study focuses on developing Scalable Vector Graphics (SVG) as Web services. In particular, the authors develop a service oriented architecture that securely manages SVG Web services using the...

    Provided By Science Publications

  • White Papers // Jan 2010

    Heterogeneous GPRS-WLAN Integration Based on Ad-Hoc Networks

    In heterogeneous architecture vertical handoffs let users have service from both GPRS and WLAN without any session termination and seamless to the end user. In international literature there are many researches trying to propose the merging of WLAN and GPRS networks into one heterogeneous interworking system. The loose coupling and...

    Provided By Science Publications

  • White Papers // Feb 2010

    Exploring Critical Determinants in Deploying Mobile Commerce Technology

    The research's problem lies in the fact that deploying m-commerce technology in Jordan represents the first serious trail to understand and explore the critical determinants that affect deploying mobile commerce technology. Approach: This research applied TAM model using the following variables: Perceived trust, perceived usefulness, perceived ease of use, social...

    Provided By Science Publications

  • White Papers // Jul 2010

    Business Continuity Planning: Are We Prepared for Future Disasters

    ? Natural and man-made disasters could cause a lot of monetary, mortality and morbidity losses for the business' operations such as: Activities, products and services. In order to minimize losses from such disasters, it is essential to prepare and implement effective business continuity plans that could deal with abnormal conditions....

    Provided By Science Publications

  • White Papers // Dec 2009

    Multiple Constraints for Ant Based Multicast Routing in Mobile Ad Hoc Networks

    A Mobile Ad Hoc Network (MANET) is a kind of wireless ad hoc network and is a self-configuring network of mobile routers (and associated hosts) connected by wireless links-the union of which forms an arbitrary topology. The routers are free to move randomly and organize themselves arbitrarily; thus, the network's...

    Provided By Science Publications

  • White Papers // Apr 2010

    Memory Storage Issues of Temporal Database Applications on Relational Database Management Systems

    Many existing database applications manage time-varying data. These database applications are referred to as temporal databases or time-oriented database applications that are considered as repositories of time-dependent data. Many proposals have been introduced for developing time-oriented database applications, some of which suggest building support for Temporal Database Management Systems (TDBMS)...

    Provided By Science Publications

  • White Papers // Jan 2010

    Improving the Quality of Service Guarantee in an Asynchronous Transfer Mode (ATM) Network

    This study presents a technique for improving the Quality of Service (QoS) guarantee in an ATM network. In the proposed model, it was assumed that high priority traffic have been allocated a switch resource to guarantee a given QoS and low priority cells are allowed to enter the buffer, to...

    Provided By Science Publications

  • White Papers // Nov 2009

    The Impact Of CRM On The Customer Satisfaction In Agricultural Bank

    The last several years saw the rise of Customer Relationship Management (CRM) as important business approach. CRM is a strategy that goes beyond increasing transaction volume. Its objectives are to increase profitability, revenue and customer satisfaction. To achieve CRM, a companywide set of tools, technologies and procedures promote the relationship...

    Provided By Science Publications

  • White Papers // Aug 2009

    Distributed Clusterhead Architecture for Mobile Ad Hoc Networks

    Mobile Ad Hoc Network (MANET) consists of dynamic topology as nodes in the network are mobile, and connected via wireless links. The nodes are grouped in clusters for the purpose of routing. Nodes within the cluster communicate directly. However, nodes communicate outside the cluster through a centralized node that is...

    Provided By Science Publications

  • White Papers // Oct 2009

    Chemical Composition of Propolis From Different Regions in Java and Their Cytotoxic Activity

    Propolis samples from tropical zones, such as Java (Indonesia) with its vast biodiversity, have become a subject of increasing scientific and economic attention. The association of the chemical composition of propolis from different geographic regions with cytotoxic activities led to the identification of active principles, a fundamental tool to achieve...

    Provided By Science Publications

  • White Papers // Jan 2010

    A Free Educational Java Framework for Graph Algorithms

    In the teaching of graph theory algorithms it is important that students can experiment them on numerical instances in order to fully understand their logical meaning and to learn how they can be implemented. The framework, which is currently in use at the University of Bologna, and is available on-line,...

    Provided By Science Publications

  • White Papers // Jan 2010

    JBOOM: Java Based Object Oriented Model of Software Configuration Management

    Most of the present Software Configuration Management systems deal with version and configurations in the form of files and directories, the need today is to have a Software Configuration Management system that handles versions and configurations directly in terms of functions (Program Module). A major objective of this research is...

    Provided By Science Publications

  • White Papers // Jan 2010

    Operating System Support for Wireless Sensor Networks

    In a wireless sensor network, several sensor nodes obtain local data and communicate among themselves in order to create a global vision of an object of study. The idea of a self-managed network of low-power, autonomous devices, that collects data from an environment and propagates information through a wireless link...

    Provided By Science Publications

  • White Papers // Mar 2010

    Automated Position System Implementation Over Vehicular Ad Hoc Networks in 2-Dimension Space

    The real world scenario have changed from the wired connection to wireless connection. Over the years software development has responded to the increasing growth of wireless connectivity in developing network enabled software. The problem arises in the wireless domain due to random packet loss in transport layer and as well...

    Provided By Science Publications

  • White Papers // Jan 2010

    An Approach for Detecting Attacks in Mobile Adhoc Networks

    The security of data becomes more important with the increased use of commercial applications over wireless network environments. The authors presented an approach to handle various attacks for wireless networks. There were several problems of security in wireless networks due to intruders and different type of attacks such as Node...

    Provided By Science Publications

  • White Papers // Apr 2010

    e-Learning Management System Using Service Oriented Architecture

    Service-based architectures take legacy application functionality and expose it to the Internet in a reliable, highly available, scalable, flexible, manageable and secure manner, easy and reliable internet-based method to create and access learning. Web service technology has emerged as a new paradigm of distributed computing. The Service-based architectures are layered...

    Provided By Science Publications

  • White Papers // Jan 2010

    Mobile Agents in Wireless LAN and Cellular Data Networks

    Advancing technology in wireless communication offers users anytime, anywhere access to information and network resources without restricting them to the fixed network infrastructure. Mobile computing represents a shift in the distributed systems paradigm. The potential of decoupled and disconnected operation, location-dependent computation and communication and powerful portable computing devices gives...

    Provided By Science Publications

  • White Papers // Sep 2010

    Forecasting Financial Market Annual Performance Measures: Further Evidence

    Forecasting is simple; producing accurate forecasts is the essential task. Experience suggests that financial managers often assume that because models used in forecasting are appropriate that they are effective. This study addresses this assumption. Effective is taken to mean forecasts where the Absolute Percentage Error (APE) is equal to or...

    Provided By Science Publications

  • White Papers // Jul 2010

    Evaluation of Ad Hoc on Demand Distance Vector Routing Protocol in HetMAN Architecture

    Mobile Ad hoc NETwork (MANET), a type of network with special characteristics, needs a special mechanism to bear with its ad hoc behavior. Approach: The important issue in MANET is routing protocol. Routing protocol is a standard used to determine the route path taken during the transmission of data. Results:...

    Provided By Science Publications

  • White Papers // Jan 2011

    Experimental Evaluation of Medium Access Schemes in 802.11 Wireless Networks

    Deployment of real time services over 802.11 wireless networks requires Quality of Service (QoS) differentiation mechanisms for different traffic types. This required investigations into the performance of the Medium Access Control (MAC) schemes like Distributed Coordinated Function (DCF) and Enhanced DCF with respect to the stringent QoS requirements imposed by...

    Provided By Science Publications

  • White Papers // May 2011

    Authentication Based and Optimized Routing Technique in Mobile Ad Hoc Networks

    As the technology for ad hoc wireless networks gains maturity, comprehensive security solutions based on realistic trust models and addressing all prevalent issues like routing key management and cooperation enforcement are expected to appear. The solutions presented in this paper only cover a subset of threats and are far from...

    Provided By Science Publications

  • White Papers // Oct 2009

    An Effective Location-Based Power Conservation Scheme for Mobile Ad Hoc Networks

    One of the major issues in current reactive routing protocols for Mobile Ad Hoc NETworks (MANETs) is the high bandwidth and power consumptions during the routing process. In this paper, the authors proposed and evaluated the performance of an efficient Location-Based Power Conservation (LBPC) scheme for MANETs. Approach: in this...

    Provided By Science Publications

  • White Papers // Jan 2011

    Adaptive Hybrid Mobile Agent Protocol for Wireless Multihop Internet Access

    A Mobile Ad Hoc NETwork (MANET) is an autonomous network that can be formed without of any established infrastructure. It consists of mobile nodes equipped with a wireless interface that are free to move and communicate. The mobile nodes act as host and routers, which has routing capabilities that create...

    Provided By Science Publications

  • White Papers // Apr 2010

    A Trust System Based on Multi Level Virus Detection

    As the number of viruses grew, the old scanning methods had to include larger and larger signature databases and scanning became intolerably slow. Consequently, the developers began to streamline scanners. Instead of scanning the entire file, the entry point is examined for any pointers that would point to a virus...

    Provided By Science Publications

  • White Papers // Jan 2012

    Analysis of Virus Algorithms

    Security of wired and wireless networks is the most challengeable in today's computer world. The aim of this paper was to give brief introduction about viruses and worms, their creators and characteristics of algorithms used by viruses. Here wired and wireless network viruses are elaborated. Also viruses are compared with...

    Provided By Science Publications

  • White Papers // Nov 2011

    Geographical Division Traceback for Distributed Denial of Service

    Internet is highly used in the most of the people day to day life applications. It is a very essential resource for every one of them. It is the people duty to secure this important resource from all the threats. One way of ensuring internet security is making the internet...

    Provided By Science Publications

  • White Papers // Jan 2012

    Artificial Bee Colony based Energy Aware and Energy Efficient Routing Protocol

    Network becomes very important technology in the day to day life style of modern computer era, in which the wireless communication become very popular for the last few years. In the same manner, the other wireless network, i.e., ad-hoc network is very popular among the researchers in the past few...

    Provided By Science Publications

  • White Papers // Jan 2012

    Secure Authentication Technique for Data Aggregation in Wireless Sensor Networks

    Wireless sensor networks comprises of the upcoming technology that has attained noteworthy consideration from the research community. Sensor networks comprise of many small, low cost devices and are naturally self organizing ad hoc systems. The function of the sensor network is monitoring the physical environment, collect and transmit the information...

    Provided By Science Publications

  • White Papers // Nov 2011

    Performance Analysis of Rejection Ratio in Cost Optimized Virtual Private Networks Provisioning Algorithm (COVPA) Using Waxman and Barabasi Model in Cyber Space

    Virtual private networks have provided customers with a secure and low-cost communication environment. Approach: the COVPA, the provisioning algorithm for a Virtual Private Network service, which built and managed VPNs on demand. Results: The COVPA allowed each VPN to have guaranteed resources and customized control and supported a highly dynamic...

    Provided By Science Publications

  • White Papers // Dec 2011

    Solving Two Deadlock Cycles Through Neighbor Replication on Grid Deadlock Detection Model

    Data grid is the solutions that enable especially researcher to make their research on their specific fields. The researcher can know the latest issues that has been done by other researcher according to their fields of research such as method, technology, application and etc that has been used in enhancing...

    Provided By Science Publications

  • White Papers // Jan 2012

    A Distributed Coverage and Target Tracking Algorithm for Wireless Sensor Networks

    The use of small, inexpensive, low-power, distributed devices, which have the potential of local processing and wireless communication, have been made a reality owing to the recent technological improvements. These kinds of nodes are known as sensor nodes. The ability of each sensor node is restricted in terms of limited...

    Provided By Science Publications

  • White Papers // Jan 2012

    High Performance Computing on Fast Lock Delay Locked Loop With Low Power State and Simultaneous Switching Noise Reduction

    In recent years, the performance is the most important in real time image and video applications. As circuit speed increases with shrinking device dimension, the clock frequencies increase and the effects of clock skew and jitter on a system becomes an increasingly larger percentage of Data Valid window (tDQV). If...

    Provided By Science Publications

  • White Papers // Jan 2012

    Efficient Sensor Stream Data Processing System to use Cache Technique for Ubiquitous Sensor Network Application Service

    Recently, with the development of Ubiquitous Sensor Network (USN) technology, necessary data for environmental monitoring, logistics surveillance, building management could be received through a wireless network from various small sensors. With the development of these technologies, various types of sensors were used in USN environments and sensor data generated from...

    Provided By Science Publications

  • White Papers // Jan 2012

    Session Initiation Protocol Security: A Brief Review

    The Session Initiation Protocol (SIP) is an application layer used for signaling protocols specified by the Internet Engineering Task Force (IETF). SIP has recently become the main signaling protocol for Internet applications, thus allowing the implementation of a number of features using SIP, such as video conferencing, online gaming, peer-to-peer...

    Provided By Science Publications

  • White Papers // Jan 2012

    Intelligent Model for Traffic Safety Applications

    There are several research projects on cooperatively detecting vehicles from approaching ramps, invisible corners, intersections, vehicles in the wrong lane, vehicles traveling at extremely dangerous speeds and vehicles wrongly stopping or running on a motorway shoulder. Before going to Safety against Dangerous vehicle and situations, generally the authors make use...

    Provided By Science Publications