Science Publications

Displaying 1-40 of 307 results

  • White Papers // Mar 2015

    A Modified Key Partitioning for Bigdata Using MapReduce in Hadoop

    In the period of big data, massive amounts of structured and unstructured data are being created every day by a multitude of ever present sources. Big data is complicated to work with and needs extremely parallel software executing on a huge number of computers. MapReduce is a current programming model...

    Provided By Science Publications

  • White Papers // Jan 2015

    FPGA Implementation of Power Aware FIR Filter Using Reduced Transition Pipelined Variable Precision Gating

    With the emergence of portable computing and communication system, power awareness is one of the major objectives of VLSI design. This is its ability to scale power consumption based on the time-varying nature of inputs. Even though the system is not designed for being power aware, systems display variations in...

    Provided By Science Publications

  • White Papers // Jan 2015

    Effective Load Metric and Efficient Initial Job Placement for Dynamic Load Balancing in Cluster

    High performance clusters are being configured specially to give data centers that require extreme performance and the processing power they need. When the data is accessed across clusters the data latency time has significant impact on the performance. In the literature it is given that memory and I/O have become...

    Provided By Science Publications

  • White Papers // Jan 2015

    A Novel Reconfigurable Execution Core for Merged DSP Microcontroller

    In this paper, the authors present an execution core which can be reconfigured either for calculation of digital convolution or for computation of discrete orthogonal transform by appropriate local buffer initialization of processing cells. It is shown that the data flow pattern can be changed by a single bit control...

    Provided By Science Publications

  • White Papers // Jan 2015

    An Efficient Approach for Computing Silhouette Coefficients

    One popular approach for finding the best number of clusters (K) in a data set is through computing the silhouette coefficients. The silhouette coefficients for different values of K, are first found and then the maximum value of these coefficients is chosen. However, computing the silhouette coefficient for different Ks...

    Provided By Science Publications

  • White Papers // Jan 2015

    Low Power Hardware Implementation of High Speed FFT Core

    Fourier transforms play an important role in many digital signal processing applications including speech, signal and image processing. Applications based on Fast Fourier Transform (FFT) such as signal and image processing requires high computational power. This paper proposes the implementation of radix-4 based parallel pipelined fast fourier transform processor which...

    Provided By Science Publications

  • White Papers // Jan 2015

    Implementing a Large Data Bus VLIW Microprocessor

    Microprocessors have grown tremendously in its computing and data crunching capability since the early days of the invention of a microprocessor. Today, most microprocessors in the market are at 32 bits, while the latest microprocessors from IBM, Intel and AMD are at 64 bits. To further grow the computational capability...

    Provided By Science Publications

  • White Papers // Jan 2015

    Distributed Shared Memory Consistency Object-Based Model

    Distributed Shared Memory (DSM) systems represent a successful hybrid of two parallel computer classes: shared-memory multiprocessors and distributed computer systems. They provide the shared memory abstraction in systems with physically distributed memories and consequently combine the advantages of both approaches. A novel model that describes consistency in shared memory was...

    Provided By Science Publications

  • White Papers // Jan 2015

    Teaching Computer Organization and Architecture Using Simulation and FPGA Applications

    In this paper, the authors present the design concepts and realization of incorporating micro-operation simulation and FPGA implementation into a teaching tool for computer organization and architecture. This teaching tool helps computer engineering and computer science students to be familiarized practically with computer organization and architecture through the development of...

    Provided By Science Publications

  • White Papers // Jan 2015

    A Secure Time-Stamp Based Concurrency Control Protocol for Distributed Databases

    In distributed database systems the global database is partitioned into a collection of local databases stored at different sites. In this era of growing technology and fast communication media, security has an important role to play. In this paper, the authors presented a Secure Concurrency Control Protocol (SCCP) based on...

    Provided By Science Publications

  • White Papers // Jan 2015

    Communication Architecture Synthesis for Multi-Bus SoC

    In the System-on-Chip (SoC) design, the synthesis of communication architecture constitutes the bottleneck which can affect the performances of the system. Various schemes and protocols can be necessary, just as various topologies of interconnection. To reduce the complexity of the communications refinement, the authors present in this paper a model...

    Provided By Science Publications

  • White Papers // Jan 2015

    A Novel Fault Tolerant Reversible Gate for Nanotechnology Based Systems

    In this paper, the authors propose a novel reversible logic gate, NFT. It is a parity preserving reversible logic gate, that is, the parity of the outputs matches that of the inputs. They demonstrate that the NFT gate can implement all Boolean functions. It renders a wide class of circuit...

    Provided By Science Publications

  • White Papers // Jan 2015

    Performance Analysis of a 32-Bit Multiplier with a Carry-Look-Ahead Adder and a 32-Bit Multiplier with a Ripple Adder Using VHDL

    In this paper, the authors present a performance analysis of two different multipliers for unsigned data, one uses a carry-look-ahead adder and the second one uses a ripple adder. The paper's main focus is on the speed of the multiplication operation on these 32-bit multipliers which are modeled using VHDL,...

    Provided By Science Publications

  • White Papers // Jan 2015

    Efficient Reversible Montgomery Multiplier and Its Application to Hardware Cryptography

    Power analysis is a physical attack to crypto-systems such as smart card, tamperproof "Black box" and micro-chip. It exploits the fact that the power dissipation of an electronic circuit depends on the actions performed in it. The researchers describe Simple Power Analysis (SPA) and Differential Power Analysis (DPA) attacks which...

    Provided By Science Publications

  • White Papers // Dec 2014

    Android Based Energy Aware Framework for Porting Legacy Applications

    Trend is growing towards using complex multimedia functions on smaller devices. In this paper, the authors explore the effect of migrating legacy signal processing software applications algorithms from large form factor devices to the smaller one such as handheld mobile devices known as Energy Conscious Mobile Computing Systems (EConMCS). They...

    Provided By Science Publications

  • White Papers // Dec 2014

    Area Efficient Distributed Arithmetic Discrete Cosine Transform Using Modified Wallace Tree Multiplier

    In this paper, by using the modified Wallace tree multiplier, an error compensated adder tree is constructed in order to round off truncation errors and to obtain high through put discrete cosine transform design. Peak Signal to Noise Ratio (PSNR) is met efficiently since modified Wallace tree method is an...

    Provided By Science Publications

  • White Papers // Dec 2014

    RTOS Implementation of Non-Linear System Using Multi Tasking, Scheduling and Critical Section

    RTOS based embedded systems are designed with priority based multiple tasks. Inter task communication and data corruptions are major constraints in multi-tasking RTOS system. This paper the authors describe about the solution for these issues with an example real-time Liquid level control system. Message queue and mail box are used...

    Provided By Science Publications

  • White Papers // Nov 2014

    From Data Mining and Knowledge Discovery to Big Data Analytics and Knowledge Extraction for Applications in Science

    Data mining for "Knowledge discovery in databases" and associated computational operations first introduced in the mid-1990 s can no longer cope with the analytical issues relating to the so-called "Big data". The recent buzzword big data refers to large volumes of diverse, dynamic, complex, longitudinal and/or distributed data generated from...

    Provided By Science Publications

  • White Papers // Nov 2014

    Resource Broker Management by Adopting Self-Adaptive Multi-Instance Broker Scheduling in Grid Computing

    A grid resource broker seeks to assign the appropriate jobs to the appropriate resources as part of resource management in the multi-grid environment. Multi instances of the broker system provide multiple instances of brokers to simultaneously process jobs between multiple resources in a hierarchical cluster grid environment. In this paper,...

    Provided By Science Publications

  • White Papers // Jul 2014

    Database Replication in Heterogenous Platform

    The application of diverse database technologies in enterprises today is increasingly a common practice. To provide high availability and survivability of real-time information, a database replication technology that has capability to replicate databases under heterogenous platforms is required. This paper is to find the technology with such capability. In this...

    Provided By Science Publications

  • White Papers // Apr 2014

    Implementation of Central Queue Based Realtime Scheduler for Multiple Source Data Streaming

    Real-time data packet sources are required to remain robust against different security threats. This paper proposes a real-time secure scheduling strategy for data transmission to enhance the communication throughput and reduce the overheads. The proposed system combines real-time scheduling with security service enhancement, error detection and real-time scheduler based on...

    Provided By Science Publications

  • White Papers // Apr 2014

    Robust Memory Management Using Real Time Concepts

    Memory fragmentation is the development of a large number of separate free areas. Memory management in embedded systems demand effective implementation schemes to avoid fragmentation problem. Existing dynamic memory allocation methods fail to suit real time system requirements. Execution times need to be deterministic and this motivates the need for...

    Provided By Science Publications

  • White Papers // Mar 2014

    Logic Gates Design Using AlGaAs/GaAs MODFET Technology

    Very high-speed optical transmission systems are expected to play important roles in future broadband communication networks. This paper enumerates the design of high speed logic gates AND, OR and NOT using AlGaAs/GaAs MODFET. This logic gates having less number of transistors. It can be efficiently used in VLSI ICs. The...

    Provided By Science Publications

  • White Papers // Feb 2014

    VHDL Design and Hardware Realization of HybridArtificial Intelligence Architecture

    Evolutionary Algorithms (EAs) use Genetic Algorithm (GA) in many optimization problems to efficiently compute the function value in less time. In this paper, the weight optimization of the Artificial Neural Network (ANN), using the Back Propagation Network (BPN), is tested and presented with GA. The combined architecture of neuro-genetic (hybrid...

    Provided By Science Publications

  • White Papers // Feb 2014

    All Optical Implementation of High Speed and Low Power Reversible Full Adder Using Semiconductor Optical Amplifier Based Mach-Zehnder Interferometer

    In the recent years, reversible logic design has promising applications in low power computing, optical computing and quantum computing. VLSI design mainly concentrates on low power logic circuit design. In the present scenario, researchers have made implementations of reversible logic gates in optical domain for its low energy consumption and...

    Provided By Science Publications

  • White Papers // Feb 2014

    Novel Reversible Variable Precision Multiplier Using Reversible Logic Gates

    Multipliers play a vital role in digital systems especially in digital processors. There are many algorithms and designs were proposed in the earlier works, but still there is a need and a greater interest in designing a less complex, low power consuming and fastest multipliers. Reversible logic design became the...

    Provided By Science Publications

  • White Papers // Feb 2014

    A New-Threshold Based Job Scheduling for Grid System

    In heterogeneous distributed systems, utility grids have emerged as a new model of service. In this service, workflow scheduling is one of the challenging problems for satisfying user's quality requirements. One of the main issues in work flow scheduling is to minimize the workflow execution cost in terms of time...

    Provided By Science Publications

  • White Papers // Jan 2014

    Performance Analysis of High Efficiency Low Density Parity-Check Code Decoder for Low Power Applications

    In this paper, the authors propose a low power, high efficient Low Density Parity-Check (LDPC) code decoder architecture for error detection and correction applications. LDPC codes have been adopted in latest wireless standards such as satellite and mobile communications since they possess superior error-detecting and correcting capabilities. As technology scales,...

    Provided By Science Publications

  • White Papers // Jan 2014

    Quantitative Evaluation of Job and Resources for Better Selection to Improve Makespan in Grid Scheduling

    In this paper, the authors present the priority based ranking of jobs and resources to improve the makespan in the grid scheduling problem. Grid environment's effectiveness largely depends on scheduler's effectiveness/efficiency as they act as local resource brokers. The scheduler is responsible to select resources/scheduling jobs so that users/application requirements...

    Provided By Science Publications

  • White Papers // Dec 2013

    E-Service Quality and Its Effect on Consumers' Perceptions Trust

    E-service quality measurement in online shopping has been receiving increasing attention currently and as a result, many studies have tried to highlight major dimensions of e-service quality linked with online environment. Excellent e-service quality is an important matter for online vendor. It is the factor that will enable them to...

    Provided By Science Publications

  • White Papers // Dec 2013

    High Speed Probabilistic Adder for Signal Processing Subsystems

    In this paper, the authors propose a new high performance and low power adder using new design style called probabilistic is proposed. The design of a probabilistic adder that achieves low power and high speed operation. The delay and power dissipation are reduced by dividing the adder into two parts...

    Provided By Science Publications

  • White Papers // Dec 2013

    Design of Optimal Carry Skip Adder and Carry Skip BCD Adder Using Reversible Logic Gates

    Reversible logic circuits have the ability to produce zero power dissipation which has found its importance in quantum computing, optical computing and low power digital circuits. The paper presents improved and efficient reversible logic circuits for carry skip adder and carry skip BCD adder. The performance of the proposed architecture...

    Provided By Science Publications

  • White Papers // Nov 2013

    An Improved Design of Reversible Binary to Binary Coded Decimal Converter for Binary Coded Decimal Multiplication

    Reversible logic gates under ideal conditions produce zero power dissipation. This factor highlights the usage of these gates in optical computing, low power CMOS design, quantum optics and quantum computing. The growth of decimal arithmetic in various applications as stressed, the need to propose the paper on reversible binary to...

    Provided By Science Publications

  • White Papers // Nov 2013

    A Case for Hybrid Instruction Encoding for Reducing Code Size in Embedded System-on-Chips Based on RISC Processor Cores

    Embedded computing differs from general purpose computing in several aspects. In most embedded systems, size, cost and power consumption are more important than performance. In embedded System-on-Chips (SoCs), memory is a scarce resource and it poses constraints on chip space, cost and power consumption. Whereas fixed instruction length feature of...

    Provided By Science Publications

  • White Papers // Oct 2013

    Ultra Low Power Single Edge Triggered Delay Flip Flop Based Shift Registers Using 10-Nanometer Carbon Nano Tube Field Effect Transistor

    Carbon Nano-Tube Field Effect Transistor (CNTFET) is currently considered as promising successor of Metal-Oxide Semi-conductor Field EffecT (MOSFET). The scaling down of the metal-oxide semi-conductor device faced serious limits like short channel effect, tunneling through gate oxide layer, associated leakage currents and power dissipation when its dimension shrink down to...

    Provided By Science Publications

  • White Papers // Jul 2013

    Design of 8-4 and 9-4 Compressors Forhigh Speed Multiplication

    In this paper, the authors present higher order compressors which can be effectively used for high speed multiplications. The proposed compressors offer less delay and area. But, the Energy Delay Product (EDP) is slightly higher than lower order compressors. The performance of 8x8, 16x16 and 24x24 multipliers using the proposed...

    Provided By Science Publications

  • White Papers // Jul 2013

    Fuzzy Round Robin CPU Scheduling Algorithm

    One problem in round robin CPU scheduling is that if the time required for the running process is slightly more than time quantum even by a fraction value, then process gets preempted and context switch occurs. This causes more waiting time for that process and more overheads due to unnecessary...

    Provided By Science Publications

  • White Papers // May 2013

    Hardware Modeling of Binary Coded Decimal Adder in Field Programmable Gate Array

    There are insignificant relevant research works available which are involved with the Field Programmable Gate Array (FPGA) based hardware implementation of Binary Coded Decimal (BCD) adder. This is because, the FPGA based hardware realization is quiet new and still developing field of research. The paper illustrates the design and hardware...

    Provided By Science Publications

  • White Papers // Mar 2013

    Gate Replacement Technique for Reducing Leakage Current in Wallace Tree Multiplier

    Leakage power has become more significant in the power dissipation of today's CMOS circuits. This affects the portable battery operated devices directly. The multipliers are the main key for designing an energy efficient processor, where the multiplier design decides the digital signal processors efficiency. In this paper, gate replacement technique...

    Provided By Science Publications

  • White Papers // Nov 2012

    Query Tuning in Oracle Database

    Oracle database is well suited to use for managing and exchanging of corporate data, especially for companies that have large-scale databases. Even though Oracle can work best, however, there are conditions where Oracle does not perform well and consume more time to perform the query transaction. This is when the...

    Provided By Science Publications

  • White Papers // Sep 2009

    A Performance Study of Reactive Multicast Routing Protocols in Virtual Class Room Using Mobile Ad Hoc Network

    A great deal of excitement has recently propelled Mobile Learning to the forefront of educational technology. The exponential growth of mobile technology in the recent years, increase in the availability of high-bandwidth network, advances in wireless technologies and popularity of handheld devices, have opened up new accessibility opportunities for education....

    Provided By Science Publications

  • White Papers // Jul 2010

    Business Continuity Planning: Are We Prepared for Future Disasters

    ? Natural and man-made disasters could cause a lot of monetary, mortality and morbidity losses for the business' operations such as: Activities, products and services. In order to minimize losses from such disasters, it is essential to prepare and implement effective business continuity plans that could deal with abnormal conditions....

    Provided By Science Publications

  • White Papers // Feb 2010

    Exploring Critical Determinants in Deploying Mobile Commerce Technology

    The research's problem lies in the fact that deploying m-commerce technology in Jordan represents the first serious trail to understand and explore the critical determinants that affect deploying mobile commerce technology. Approach: This research applied TAM model using the following variables: Perceived trust, perceived usefulness, perceived ease of use, social...

    Provided By Science Publications

  • White Papers // Jan 2010

    Building an e-Government e-Trust Infrastructure

    This paper presents a Trust Model for e-Government implementation. In the first part of the paper, the trust definition from different points of view (psychology, philosophy, linguistic, sociology, and mathematics) was presented. Most people think that to build trust between the government and its customers or citizens. However, this was...

    Provided By Science Publications

  • White Papers // Mar 2010

    Advanced Information Technology of Slot-Switching Network Schemes for on All-Optical Variable-Length Packet

    The purpose of this paper was to investigate all optical packet switching, because it was the key to the success of the future Internet. It can meet the stringent bandwidth requirement of future Internet applications, such as real-time video streaming. Due to the lack of optical Random Access Memory (RAM),...

    Provided By Science Publications

  • White Papers // Aug 2009

    TCP Optimal Performance in Wireless Networks Applications

    Currently, most data applications on wire line networks use TCP/IP as an end-to-end flow and congestion avoidance protocol. TCP provides excellent performance for data transfer in networks with stationary users when congestion is mainly due to packet loss and unusual long delays. For wireless or wire line networks, standard TCP...

    Provided By Science Publications

  • White Papers // Mar 2010

    UML Diagrams Generator: A New CASE Tool to Construct the Use-Case and Class Diagrams From an Event Table

    Building UML diagrams is a very important and time consuming task for both requirements and design phases. However, some of these diagrams, such as use-case and class diagrams can be considered as a transition between the two phases. Approach: Through this study, the event table will be used to derive...

    Provided By Science Publications

  • White Papers // Jan 2010

    Developing a Secure Web Service Architecture for SVG Image Delivery

    Web Services are substantially growing and become vital for businesses and organizations. A major concern, especially for mission-critical applications is Security. This study focuses on developing Scalable Vector Graphics (SVG) as Web services. In particular, the authors develop a service oriented architecture that securely manages SVG Web services using the...

    Provided By Science Publications

  • White Papers // Dec 2009

    Multiple Constraints for Ant Based Multicast Routing in Mobile Ad Hoc Networks

    A Mobile Ad Hoc Network (MANET) is a kind of wireless ad hoc network and is a self-configuring network of mobile routers (and associated hosts) connected by wireless links-the union of which forms an arbitrary topology. The routers are free to move randomly and organize themselves arbitrarily; thus, the network's...

    Provided By Science Publications

  • White Papers // Apr 2010

    Memory Storage Issues of Temporal Database Applications on Relational Database Management Systems

    Many existing database applications manage time-varying data. These database applications are referred to as temporal databases or time-oriented database applications that are considered as repositories of time-dependent data. Many proposals have been introduced for developing time-oriented database applications, some of which suggest building support for Temporal Database Management Systems (TDBMS)...

    Provided By Science Publications

  • White Papers // Jan 2010

    A Free Educational Java Framework for Graph Algorithms

    In the teaching of graph theory algorithms it is important that students can experiment them on numerical instances in order to fully understand their logical meaning and to learn how they can be implemented. The framework, which is currently in use at the University of Bologna, and is available on-line,...

    Provided By Science Publications

  • White Papers // Jan 2010

    JBOOM: Java Based Object Oriented Model of Software Configuration Management

    Most of the present Software Configuration Management systems deal with version and configurations in the form of files and directories, the need today is to have a Software Configuration Management system that handles versions and configurations directly in terms of functions (Program Module). A major objective of this research is...

    Provided By Science Publications

  • White Papers // Jan 2010

    Improving the Quality of Service Guarantee in an Asynchronous Transfer Mode (ATM) Network

    This study presents a technique for improving the Quality of Service (QoS) guarantee in an ATM network. In the proposed model, it was assumed that high priority traffic have been allocated a switch resource to guarantee a given QoS and low priority cells are allowed to enter the buffer, to...

    Provided By Science Publications

  • White Papers // Aug 2009

    Distributed Clusterhead Architecture for Mobile Ad Hoc Networks

    Mobile Ad Hoc Network (MANET) consists of dynamic topology as nodes in the network are mobile, and connected via wireless links. The nodes are grouped in clusters for the purpose of routing. Nodes within the cluster communicate directly. However, nodes communicate outside the cluster through a centralized node that is...

    Provided By Science Publications

  • White Papers // Nov 2009

    The Impact Of CRM On The Customer Satisfaction In Agricultural Bank

    The last several years saw the rise of Customer Relationship Management (CRM) as important business approach. CRM is a strategy that goes beyond increasing transaction volume. Its objectives are to increase profitability, revenue and customer satisfaction. To achieve CRM, a companywide set of tools, technologies and procedures promote the relationship...

    Provided By Science Publications

  • White Papers // Oct 2009

    Chemical Composition of Propolis From Different Regions in Java and Their Cytotoxic Activity

    Propolis samples from tropical zones, such as Java (Indonesia) with its vast biodiversity, have become a subject of increasing scientific and economic attention. The association of the chemical composition of propolis from different geographic regions with cytotoxic activities led to the identification of active principles, a fundamental tool to achieve...

    Provided By Science Publications

  • White Papers // Jul 2010

    Evaluation of Ad Hoc on Demand Distance Vector Routing Protocol in HetMAN Architecture

    Mobile Ad hoc NETwork (MANET), a type of network with special characteristics, needs a special mechanism to bear with its ad hoc behavior. Approach: The important issue in MANET is routing protocol. Routing protocol is a standard used to determine the route path taken during the transmission of data. Results:...

    Provided By Science Publications

  • White Papers // Jan 2010

    Heterogeneous GPRS-WLAN Integration Based on Ad-Hoc Networks

    In heterogeneous architecture vertical handoffs let users have service from both GPRS and WLAN without any session termination and seamless to the end user. In international literature there are many researches trying to propose the merging of WLAN and GPRS networks into one heterogeneous interworking system. The loose coupling and...

    Provided By Science Publications

  • White Papers // Jan 2010

    Mobile Agents in Wireless LAN and Cellular Data Networks

    Advancing technology in wireless communication offers users anytime, anywhere access to information and network resources without restricting them to the fixed network infrastructure. Mobile computing represents a shift in the distributed systems paradigm. The potential of decoupled and disconnected operation, location-dependent computation and communication and powerful portable computing devices gives...

    Provided By Science Publications

  • White Papers // Apr 2010

    e-Learning Management System Using Service Oriented Architecture

    Service-based architectures take legacy application functionality and expose it to the Internet in a reliable, highly available, scalable, flexible, manageable and secure manner, easy and reliable internet-based method to create and access learning. Web service technology has emerged as a new paradigm of distributed computing. The Service-based architectures are layered...

    Provided By Science Publications

  • White Papers // Jan 2010

    Operating System Support for Wireless Sensor Networks

    In a wireless sensor network, several sensor nodes obtain local data and communicate among themselves in order to create a global vision of an object of study. The idea of a self-managed network of low-power, autonomous devices, that collects data from an environment and propagates information through a wireless link...

    Provided By Science Publications

  • White Papers // Jan 2010

    An Approach for Detecting Attacks in Mobile Adhoc Networks

    The security of data becomes more important with the increased use of commercial applications over wireless network environments. The authors presented an approach to handle various attacks for wireless networks. There were several problems of security in wireless networks due to intruders and different type of attacks such as Node...

    Provided By Science Publications

  • White Papers // Sep 2010

    Forecasting Financial Market Annual Performance Measures: Further Evidence

    Forecasting is simple; producing accurate forecasts is the essential task. Experience suggests that financial managers often assume that because models used in forecasting are appropriate that they are effective. This study addresses this assumption. Effective is taken to mean forecasts where the Absolute Percentage Error (APE) is equal to or...

    Provided By Science Publications

  • White Papers // Mar 2010

    Automated Position System Implementation Over Vehicular Ad Hoc Networks in 2-Dimension Space

    The real world scenario have changed from the wired connection to wireless connection. Over the years software development has responded to the increasing growth of wireless connectivity in developing network enabled software. The problem arises in the wireless domain due to random packet loss in transport layer and as well...

    Provided By Science Publications

  • White Papers // Jan 2011

    Adaptive Hybrid Mobile Agent Protocol for Wireless Multihop Internet Access

    A Mobile Ad Hoc NETwork (MANET) is an autonomous network that can be formed without of any established infrastructure. It consists of mobile nodes equipped with a wireless interface that are free to move and communicate. The mobile nodes act as host and routers, which has routing capabilities that create...

    Provided By Science Publications

  • White Papers // May 2011

    Authentication Based and Optimized Routing Technique in Mobile Ad Hoc Networks

    As the technology for ad hoc wireless networks gains maturity, comprehensive security solutions based on realistic trust models and addressing all prevalent issues like routing key management and cooperation enforcement are expected to appear. The solutions presented in this paper only cover a subset of threats and are far from...

    Provided By Science Publications

  • White Papers // Jan 2011

    Experimental Evaluation of Medium Access Schemes in 802.11 Wireless Networks

    Deployment of real time services over 802.11 wireless networks requires Quality of Service (QoS) differentiation mechanisms for different traffic types. This required investigations into the performance of the Medium Access Control (MAC) schemes like Distributed Coordinated Function (DCF) and Enhanced DCF with respect to the stringent QoS requirements imposed by...

    Provided By Science Publications

  • White Papers // Oct 2009

    An Effective Location-Based Power Conservation Scheme for Mobile Ad Hoc Networks

    One of the major issues in current reactive routing protocols for Mobile Ad Hoc NETworks (MANETs) is the high bandwidth and power consumptions during the routing process. In this paper, the authors proposed and evaluated the performance of an efficient Location-Based Power Conservation (LBPC) scheme for MANETs. Approach: in this...

    Provided By Science Publications

  • White Papers // Apr 2011

    Meta Heuristic Algorithms for Vehicle Routing Problem With Stochastic Demands

    The VRP was first introduced by the authors, where the objective is to find the optimal set of routes for a fleet of vehicles in order to serve a given set of customers. Also a VRP in a broad sense is a generic name given to whole class of problems...

    Provided By Science Publications

  • White Papers // Apr 2011

    Analytical Modeling of IEEE 802.11e Enhanced Distributed Channel Access Under a Non-Saturation Condition

    In recent years, the IEEE 802.11 Wireless Local Area Network (WLAN) has been widely deployed in Indoor wireless Communication and it includes detailed specification of both medium access control and physical layer. The most research area of these two layers is Medium Access Control (MAC) layer in the first sub...

    Provided By Science Publications

  • White Papers // Apr 2011

    Topology Control Using Efficient Power Management

    A Mobile Ad-hoc NETwork (MANET) comprises of a group of mobile host nodes which work without the help of centralized management or any of the pre-existing infrastructure to form a provisional network. A Mobile Ad-hoc NETwork (MANET) is formed when several wireless mobile nodes which posses restricted capability for communication...

    Provided By Science Publications

  • White Papers // May 2011

    Interactive Computing Framework for Engineering Applications

    With the technological advances and the popularization of wireless equipment, wireless networks became a viable alternative from the economical point of view. Consequently, more and more Wireless Local Area Networks (WLANs) are available, including public and private networks, for residential and corporative usage. Hence, the IEEE802.11 WLANs, firstly used for...

    Provided By Science Publications

  • White Papers // Jun 2011

    Comment on "Method of Fingerprint Identification"

    This paper state that fingerprint identification techniques only used in a small database in order to find out an effective algorithm to develop the accuracy in matching process. However, the author founds that in the real application, the fingerprint matching must be in very large database. The author argues that...

    Provided By Science Publications

  • White Papers // Jun 2011

    Extending Binary Large Object Support to Open Grid Services Architecture-Data Access and Integration Middleware Client Toolkit

    Grid is a system that is concerned with the integration, virtualization and management of services and resources in a distributed, heterogeneous environment that supports collection of users and resources i.e., virtual organizations across traditional administrative and organizational domains i.e., real organizations. A grid middleware must ensure to provide ways for...

    Provided By Science Publications

  • White Papers // Jun 2011

    Authenticated Broadcast in Heterogeneous Wireless Sensor Networks Using Chinese Remainder Theorem Algorithm

    Wireless Sensor Networks (WSN's) are quite useful in many applications since they provide a cost effective solution to many real life problems. But it appears that they are more prone to attacks than wired networks .They are susceptible to a variety of attacks, including node capture, physical tampering and denial...

    Provided By Science Publications

  • White Papers // Jun 2011

    Fuzzy Logic Controller for Static Synchronous Series Compensator With Energy Storage System for Transient Stability Analysis

    FACTS controllers are capable of controlling the network condition in a very fast manner and this unique feature of FACTS can be exploited to improve the stability of a power system. The detailed explanations about the FACTS controllers are well documented in the literature. Static Synchronous Series Compensator (SSSC) is...

    Provided By Science Publications

  • White Papers // Jun 2011

    Adaptive Linear Prediction Augmented Autoregressive Integrated Moving Average Based Prediction for VBR Video Traffic

    Traffic Prediction is the process of predicting future network traffic based on the characteristics of the past traffic. It has wide applications in the realm of networking, as it enhances the overall network performance through better resource utilization. Rapid advancements in the hardware, storage and video compression technologies enable the...

    Provided By Science Publications

  • White Papers // Jun 2011

    Impatient Task Mapping in Elastic Cloud Using Genetic Algorithm

    Task scheduling means finding the best resource or Virtual Machine (VM) (cloud computing speaking) for the requested task. It plays an essential role in the system performance because it controls the data flow and the execution order of the incoming tasks. The optimal solution for task scheduling on a heterogeneous...

    Provided By Science Publications

  • White Papers // Jun 2011

    Dynamic Allocation of CPUs in Multicore Processor for Performance Improvement in Network Security Applications

    With the rapid development of chip multiprocessing techniques, multicore architecture has become more and more widely used in intensive computing applications as well as in computer networking systems. The amount of improvement in performance by the use of a multicore processor is dependent on the software algorithms and their implementation....

    Provided By Science Publications

  • White Papers // Jun 2011

    Energy Aware Multiple Constraints Quality of Service Routing Protocol With Dynamic Mobility Prediction for Mobile Ad hoc Networks

    Mobile Ad hoc NETworks (MANETs) can be defined as the infrastructure less, self coordinated, suddenly created wireless networks with a set of mobile nodes. Some of the application areas of MANET are emergency search, military battlefields, rescue sites, meetings and classrooms where participants share information dynamically using their mobile nodes....

    Provided By Science Publications