Science Publications

Displaying 1-40 of 245 results

  • White Papers // Jun 2012

    A Review of Security System for Smart Home Applications

    Now-a-days, the security level is very important, always emphasized and enhanced system. This system managed to help users to detect human presence around the house precisely. The use of wireless connectivity based on microcontroller facilitates the installation process at home and can prevent anyone hacking into security systems. This system...

    Provided By Science Publications

  • White Papers // May 2012

    Key Success Factors of 3rd Generation Mobile Network Services for M-Commerce in Malaysia

    While there has been a great deal of excitement in view of M-commerce, very little is actually known about conditions and critical success factors for successful introduction of the 3rd generation mobile network services here in Malaysia. This paper investigates the factors for successful diffusion of 3G network services and...

    Provided By Science Publications

  • White Papers // May 2012

    Hardware Design of Wireless Physical Token Ring System for Mobile and Cell Communication

    A wireless network system based on an infrared and Laser scanning Physical Token Ring architecture (W-PTRS) was designed, built and tested successfully. The network provides a different way of utilizing the concept of a token ring network, but with a higher efficiency related to the speed of data transfer and...

    Provided By Science Publications

  • White Papers // Apr 2012

    Release Process on Quality Improvement in Open Source Software Project Management

    This paper has provided an in depth understanding of OSS release process, which is an area of contemporary significance. The core finding of this paper is that in complex OSS projects, the volunteers experience many difficulties with the release approach. These include lack of coordination among OSS developers', who are...

    Provided By Science Publications

  • White Papers // Apr 2012

    Optical System Monitoring Based on Reflection Spectrum of Fiber Bragg Grating

    This paper presents fiber fault monitoring approaches for Fiber-To-The Home (FTTH) with a Passive Optical Network (PON). Current fiber fault monitoring approaches are difficult to be implemented due to its complexity and high loss as the amount of branches increase. Approach: A fiber fault monitoring scheme is proposed whereas Fiber...

    Provided By Science Publications

  • White Papers // Apr 2012

    A Chaotic Block Cipher for Real-Time Multimedia

    The widespread usage of Internet is providing additional channels for a pirate to easily and quickly distribute the copyrighted digital content. As a result, the protection of content is now receiving a significant amount of consideration and strong security technology is required to protect user's sensitive digital data. Cryptography is...

    Provided By Science Publications

  • White Papers // Apr 2012

    Buffer Pocketing and Pre-Checking on Buffer Utilization

    A basic NoC architecture is composed of routers, communication links between routers and a Network-Interface Component (NIC) between each pair of router and processing element. NoC allows much higher bandwidth through parallel communication. Each router can accept at the same time the flits arriving from all of the input channels...

    Provided By Science Publications

  • White Papers // Apr 2012

    Application of Adaptive Neuro-Fuzzy Inference System for Information Security

    Computer networks are expanding at very fast rate and the number of network users is increasing day by day, for full utilization of networks it need to be secured against many threats including malware, which is harmful software with the capability to damage data and systems. Fuzzy rule based classification...

    Provided By Science Publications

  • White Papers // Apr 2012

    A Fault Tolerant Resource Allocation Architecture for Mobile Grid

    In this paper, the authors have developed a fault tolerant technique to improve reliability in mobile grid environment. The proposed technique handles both resource and network failure and present recovery techniques also. When the job is assigned to the node, acknowledgement must reach monitoring agent within certain time interval else...

    Provided By Science Publications

  • White Papers // Apr 2012

    Impact of the Use of Object Request Broker Middleware for Inter-Component Communications in C6416 Digital Signal Processor Based Software Communications Architecture Radio Systems

    Software Communications Architecture (SCA), ORB middleware, ORB express DSP, inter-component communications, stub code, encoding, marshalling are necessary in order to meet the requirements of a wide range of today's communication needs. The advent of software defined radio and the use of the Digital Signal Processor (DSP) as a suitable device...

    Provided By Science Publications

  • White Papers // Apr 2012

    Congestion Free Routing in Adhoc Networks

    A Mobile Ad-Hoc Network (MANET) is a temporary network; the mobile devices in an ad-hoc network are communicating through wireless links without any pre-existing infrastructure. The one major problem of this network is network congestion, it may take place at any intermediate nodes when data packets are traveling from source...

    Provided By Science Publications

  • White Papers // Mar 2012

    A Multipath Energy Efficient Congestion Control Scheme for Wireless Sensor Network

    In the modern technology world, network attacks have become more sophisticated and harder to identify the attack. When many applications like scalable chat services and streaming video, are expected to run over the Internet, the security is necessary in computing and communication became a necessity. The internet today provides less...

    Provided By Science Publications

  • White Papers // Mar 2012

    A Framework for .NET Mobile-Based Application Services

    A Wireless Sensor Network (WSN) is a network composed of distributed autonomous devices using sensors to cooperatively monitor physical or environmental conditions such as temperature, sound, vibration, pressure, motion or pollutants at different locations. WSNs have a wide range of applications in object tracking, object localization, habitat observation, health monitoring...

    Provided By Science Publications

  • White Papers // Mar 2012

    Fuzzy Based Secure Data Aggregation Technique in Wireless Sensor Networks

    One of the up coming technologies is the wireless sensor network and now it has attained much consideration from the field of research. A sensor network consists of numerous small devices which are inexpensive and organize itself into an ad-hoc system. The wireless sensor network monitors the physical environment to...

    Provided By Science Publications

  • White Papers // Mar 2012

    Ensuring Multi Messages Broadcasting in Mobile Ad Hoc Network using Network Coding Approach

    Broadcasting is the most frequently used operation in Mobile Ad hoc NETworks (MANETs) for the dissemination of data and control messages in many applications. Usually, a network backbone is constructed for efficient broadcasting to avoid the broadcast storm problem caused by simple blind flooding, where only selected nodes, called forwarding...

    Provided By Science Publications

  • White Papers // Mar 2012

    New Optical Splitter Design for Application in Fibre-to-the Home Passive Optical Network using Virtual Lab Platform

    In this study, authors present a new design of optical splitter to be applied in FTTH-PON named Multi Ratio Optical Splitter (MROS). MROS was introduced to enhance the power distribution in the optical network. The authors also bring in new approach for designing a new optical device that enable one...

    Provided By Science Publications

  • White Papers // Mar 2012

    Privacy Preserved Collaborative Secure Multiparty Data Mining

    In the current modern business environment, its success is defined by collaboration, team efforts and partnership, rather than lonely spectacular individual efforts in isolation. So the collaboration becomes especially important because of the mutual benefit it brings. Sometimes, such collaboration even occurs among competitors, or among companies that have conflict...

    Provided By Science Publications

  • White Papers // Mar 2012

    Smart Wireless System in Fiber to the Home

    Optical communication systems have begun to be developed by many researchers after finding that the use of copper cable has many disadvantages. These disadvantages include low bit rate, very limited bandwidth and high possibility of influence of magnetic field. The use of fiber optic instead copper cable can solve these...

    Provided By Science Publications

  • White Papers // Mar 2012

    Effective Authentication Technique for Distributed Denial of Service Attacks in Wireless Local Area Networks

    In 802.11-based Wireless LAN (WLAN), there is an improved risk of security attacks. To defeat concealed attacks, there is a necessity to authenticate both access points and wireless stations. The authors propose a defensive technique for DDoS attack in WLAN. This authentication technique includes an Authentication Server (AS) in addition...

    Provided By Science Publications

  • White Papers // Mar 2012

    Efficient Web Usage Miner Using Decisive Induction Rules

    Web usage mining is the technique of extracting useful information from server logs (user's history) and finding out what users are looking for on the Internet. This type of web mining allows for the collection of Web access data for Web pages. Scope: The web usage data provides the paths...

    Provided By Science Publications

  • White Papers // Mar 2012

    Normalized Web Distance Based Web Query Classification

    In the context of the World Wide Web, the user information need is usually translated into queries which are submitted to the search engine. The search engine processes the queries and returns a ranked list of documents which it finds as being appropriate to the query. Spink et al. (2001)...

    Provided By Science Publications

  • White Papers // Mar 2012

    A Study of Knowledge Management Process Practices in Very Small Software Companies

    For many small and very small software companies, implementing controls and structures to properly manage their software development activity is a major challenge. Administering software development in this way is usually achieved through the introduction of a software process. A software process essentially describes the way an organization develops its...

    Provided By Science Publications

  • White Papers // Mar 2012

    A Dynamic Resource Allocation Method for Parallel Data Processing in Cloud Computing

    Cloud computing has the potential to dramatically change the landscape of the current IT industry. For companies that only have to process large amounts of data occasionally running their own data center is obviously not an option. Instead, Cloud computing has emerged as a promising approach to rent a large...

    Provided By Science Publications

  • White Papers // Feb 2012

    Customer-Made 3?3 Polymer Optical Fiber Splitter Based on Green Technology Using Fusion Technique

    Copper wire is a conventional conductor that used for data transmission from one place to another place. However, the use of copper wire has many shortcomings such as the transmitted signal will be affected by electrical characteristics such as resistance and interference that resulting during the data transmission and dependence...

    Provided By Science Publications

  • White Papers // Feb 2012

    An Evolutionary Algorithmic Approach based Optimal Web Service Selection for Composition With Quality of Service

    Many companies are now using the Web as a platform to communicate with their partners. The level of usability is very high which lead to the success of web today. The Web and its technologies allow them to provide Web services to individuals as well as other businesses. Web services...

    Provided By Science Publications

  • White Papers // Feb 2012

    Computation of Private Key Based on Divide-By-Prime for Luc Cryptosystems

    Public key cryptosystem is a way that is used a secret communication between the sender and receiver, without needing for a secret key exchange and it can used for create a digital signature. Public key cryptosystem is a widely used technology around the world, which enables information to be transmission...

    Provided By Science Publications

  • White Papers // Feb 2012

    A Cross Layer Frame Work for Enhanced Quality of Service Provisioning in Worldwide Interoperability for Microwave Access Networks

    Providing QoS-guaranteed services is necessary for next generation wireless networks, including IEEE 802.16 standard based networks. Such networks are envisioned to support multimedia services with different QoS requirements for different applications including voice, data and real time, or streaming video/audio. However, the aforementioned standards define only QoS architecture and signaling,...

    Provided By Science Publications

  • White Papers // Jan 2012

    Flexible Topology Migration in Optical Cross Add and Drop Multiplexer in Metropolitan Ring Network

    In general, there are two types of optical node that used in present optical network where it depends on what type of topology that is implemented. OXC-based optical node is selected as a node distribution in the mesh network while OADM-based optical node is suitable for use in ring topology...

    Provided By Science Publications

  • White Papers // Jan 2012

    Artificial Bee Colony based Energy Aware and Energy Efficient Routing Protocol

    Network becomes very important technology in the day to day life style of modern computer era, in which the wireless communication become very popular for the last few years. In the same manner, the other wireless network, i.e., ad-hoc network is very popular among the researchers in the past few...

    Provided By Science Publications

  • White Papers // Jan 2012

    An Analysis and Overview of Wireless Routing Protocols

    In the past few years, the wireless communication emerges enormously in the computer communication industry. Based on its higher demands and necessity, there are many research issues in the wireless communication such as Optimal routing protocols, Traffic Management, Providing QoS, Offering reliable services, Effective Transport Control Protocol (TCP), Medium Access...

    Provided By Science Publications

  • White Papers // Jan 2012

    Intelligent Model for Traffic Safety Applications

    There are several research projects on cooperatively detecting vehicles from approaching ramps, invisible corners, intersections, vehicles in the wrong lane, vehicles traveling at extremely dangerous speeds and vehicles wrongly stopping or running on a motorway shoulder. Before going to Safety against Dangerous vehicle and situations, generally the authors make use...

    Provided By Science Publications

  • White Papers // Jan 2012

    Efficient Sensor Stream Data Processing System to use Cache Technique for Ubiquitous Sensor Network Application Service

    Recently, with the development of Ubiquitous Sensor Network (USN) technology, necessary data for environmental monitoring, logistics surveillance, building management could be received through a wireless network from various small sensors. With the development of these technologies, various types of sensors were used in USN environments and sensor data generated from...

    Provided By Science Publications

  • White Papers // Jan 2012

    A Distributed Coverage and Target Tracking Algorithm for Wireless Sensor Networks

    The use of small, inexpensive, low-power, distributed devices, which have the potential of local processing and wireless communication, have been made a reality owing to the recent technological improvements. These kinds of nodes are known as sensor nodes. The ability of each sensor node is restricted in terms of limited...

    Provided By Science Publications

  • White Papers // Jan 2012

    High Performance Computing on Fast Lock Delay Locked Loop With Low Power State and Simultaneous Switching Noise Reduction

    In recent years, the performance is the most important in real time image and video applications. As circuit speed increases with shrinking device dimension, the clock frequencies increase and the effects of clock skew and jitter on a system becomes an increasingly larger percentage of Data Valid window (tDQV). If...

    Provided By Science Publications

  • White Papers // Jan 2012

    Mobile Agents in Heterogeneous Networks: A Look on Performance

    Mobile agents can be seen as a new paradigm for distributed computing. One characteristic of mobile agents is their autonomy and pro-activity. This paper present a framework designed on top of PMADE (Platform for Mobile Agent Distribution and Execution) to support research in this domain. The authors' framework consists of...

    Provided By Science Publications

  • White Papers // Jan 2012

    Gravity Assist and Scattering Off AGB Stars Off Molecular Clouds

    The scattering of stellar orbits by galactic molecular clouds is studied in hope of explaining isotopic peculiarities of presolar grains from Asymptotic Giant Branch (AGB) stars. Silicon isotopic anomalies found in the mainstream Silicon Carbide (SiC) grains are observed to have heavy isotopes enriched. To explain the isotopic heaviness the...

    Provided By Science Publications

  • White Papers // Jan 2012

    Analysis of Virus Algorithms

    Security of wired and wireless networks is the most challengeable in today's computer world. The aim of this paper was to give brief introduction about viruses and worms, their creators and characteristics of algorithms used by viruses. Here wired and wireless network viruses are elaborated. Also viruses are compared with...

    Provided By Science Publications

  • White Papers // Jan 2012

    A Channel Adaptive Energy Efficient and Fair Scheduling Media Access Control Protocol for Mobile AdHoc Networks

    In recent years, more attention has been given to ad-hoc wireless networking, enabling many interesting usage scenarios however several challenges are being posed. Conventionally, cellular telephony and Internet connectivity via radio modems applied wireless networking. The fixed, wired base station was provided with single hop connectivity by these systems. The...

    Provided By Science Publications

  • White Papers // Jan 2012

    A Network Management Framework Using Mobile Agents

    Network management of heterogeneous networks is still hard to achieve automatically and efficiently. In this paper, the authors present a framework that has the ability to perform network management tasks on heterogeneous networks using mobile agents. This framework handles the inability of many network devices to run mobile agents. While...

    Provided By Science Publications

  • White Papers // Jan 2012

    Home Agent Architecture and Algorithms for Mobility Management in Mobile IP Networks

    This paper proposes new Home Agent architecture and algorithms for real-time mobility management in mobile IP networks. The proposed architecture and algorithms offer a better performance based on the Call-to-Mobility Ratio (CMR) and require less time for the location update and the tunneling compared with the Mobile IP model. These...

    Provided By Science Publications