Science Publications

Displaying 1-40 of 384 results

  • White Papers // Apr 2015

    Organization Information Ecology and E-Commerce Adoption: Effect on Organizational SMEs Performance

    Electronic Commerce (EC) has recently become the subject of interest of many researchers involved in behavioral and technology acceptance. EC was heavily studied in developed countries, but there are only a few narrowly focused studies on EC adoption in developing countries, especially in the context of Small and Medium Enterprises...

    Provided By Science Publications

  • White Papers // Apr 2015

    Coupling Routing Algorithm and Data Encoding for Low Power Networks on Chip

    The routing algorithm used in a Network-on-Chip (NoC) has a strong impact on both the functional and non-functional indices of the overall system. Traditionally, routing algorithms have been designed considering performance and cost as the main objectives. In this paper, the authors focus on two important non-functional metrics, namely, power...

    Provided By Science Publications

  • White Papers // Mar 2015

    A Modified Key Partitioning for Bigdata Using MapReduce in Hadoop

    In the period of big data, massive amounts of structured and unstructured data are being created every day by a multitude of ever present sources. Big data is complicated to work with and needs extremely parallel software executing on a huge number of computers. MapReduce is a current programming model...

    Provided By Science Publications

  • White Papers // Mar 2015

    Document Clustering Based on Firefly Algorithm

    Document clustering is widely used in information retrieval however; existing clustering techniques suffer from local optima problem in determining the k-number of clusters. Various efforts have been put to address such drawback and this includes the utilization of swarm-based algorithms such as particle swarm optimization and ant colony optimization. This...

    Provided By Science Publications

  • White Papers // Mar 2015

    Integrating Correlation Clustering and Agglomerative Hierarchical Clustering for Holistic Schema Matching

    Holistic schema matching is the process of carrying off several numbers of schemas as an input and outputs the correspondences among them. Treating large number of schemas may consume longer time with poor quality. Therefore, several clustering approaches have been proposed in order to reduce the search space by partitioning...

    Provided By Science Publications

  • White Papers // Jan 2015

    Mining Level-Crossing Association Rules From Large Databases

    Existing algorithms for mining association rule at multiple concept level, restricted mining strong association among the concept at same level of a hierarchy. However, mining level-crossing association rule at multiple concept level may lead to the discovery of mining strong association among at different level of hierarchy. In this paper,...

    Provided By Science Publications

  • White Papers // Jan 2015

    Testing Virtual Reconfigurable Circuit Designed for a Fault Tolerant System

    In this paper, the authors describe about the testing of Virtual Reconfigurable Circuit (VRC) designed and implemented for a fault tolerant system which averages the (three) sensor inputs. The circuits that are to be tested are those which are successfully evolved in this system under different situations such as all...

    Provided By Science Publications

  • White Papers // Jan 2015

    Functional Link Artificial Neural Network for Classification Task in Data Mining

    In solving classification task of data mining, the traditional algorithm such as multi-layer perceptron takes longer time to optimize the weight vectors. At the same time, the complexity of the network increases as the number of layers increases. In this paper, the authors have used Functional Link Artificial Neural Networks...

    Provided By Science Publications

  • White Papers // Jan 2015

    Some P-RAM Algorithms for Sparse Linear Systems

    In this paper, the authors will explain the method of representing a sparse matrix in parallel by using PRAM model. PRAM model is a shared memory model. According to the researchers, the PRAM model will survive as a theoretically convenient model of parallel computation and as a starting point for...

    Provided By Science Publications

  • White Papers // Jan 2015

    Exploring Spatial ARM (Spatial Association Rule Mining) for Geo-Decision Support System

    Geographical Decision Support System (Geo-DSS) is a demanding field, since enormous amount of spatial data have been collected in various applications, ranging from remote sensing to GIS, computer cartography, environmental assessment and planning. Although, some efforts were made to combine spatial mining with spatial decision support system but mostly researchers...

    Provided By Science Publications

  • White Papers // Jan 2015

    pmonpp: Pthread Monitor Preprocessor

    Monitors have become an exceedingly important synchronization mechanism because they are a natural generalization of the object-oriented programming. A monitor construct encapsulates private data with public methods to operate on that data. Although, the p-thread library contains dozens of functions for threading and synchronization, it does not provide direct support...

    Provided By Science Publications

  • White Papers // Jan 2015

    An Iterative Method for Algorithms Implementation on a Limited Dynamically Reconfigurable Hardware

    In this paper, the authors propose a framework and a combined temporal partitioning and design space exploration method for run time reconfigurable processors. Their objective is to help designers to implement an algorithm in limited FPGA area resources while respecting the execution time constraint. The algorithm to be implemented is...

    Provided By Science Publications

  • White Papers // Jan 2015

    Stochastically Simulating Low Morale - A Risk Factor Effect on Risk Management

    One of the proposed purposes for software process simulation is the management of software development risks, usually discussed within the category of project planning/management. One of the proposed purposes for software process simulation is the management of software development risks, usually discussed within the category of project planning and management....

    Provided By Science Publications

  • White Papers // Jan 2015

    Towards a Temporal Multilevel Secure Database (TMSDB)

    Standard relational databases are used to store the state of reality at a single moment of time. Temporal databases are used to store time-varying data. Multi-level secure databases are used to securely store highly sensitive data. Each of these databases serves its purpose well, but if the authors were to...

    Provided By Science Publications

  • White Papers // Jan 2015

    Effect of Data Processing on Data Quality

    Geographical Information Systems (GISs) are computer based system that is used to store, manipulate and analyze a very wide variety of subjects and fields dealing with: civil engineering, environment, natural science, administration, industry and economy. This leads to great variety of resources. This variety of resources and the large available...

    Provided By Science Publications

  • White Papers // Jan 2015

    Performance Analysis of Data Mining Tools Cumulating with a Proposed Data Mining Middleware

    Data mining has becoming increasingly popular in helping to reveal important knowledge from the organization's databases and has led to the emergence of a variety of data mining tools to help in decision making. Present paper described a test bed to investigate five major data mining tools, namely IBM intelligent...

    Provided By Science Publications

  • White Papers // Jan 2015

    FPGA Implementation of Power Aware FIR Filter Using Reduced Transition Pipelined Variable Precision Gating

    With the emergence of portable computing and communication system, power awareness is one of the major objectives of VLSI design. This is its ability to scale power consumption based on the time-varying nature of inputs. Even though the system is not designed for being power aware, systems display variations in...

    Provided By Science Publications

  • White Papers // Jan 2015

    Effective Load Metric and Efficient Initial Job Placement for Dynamic Load Balancing in Cluster

    High performance clusters are being configured specially to give data centers that require extreme performance and the processing power they need. When the data is accessed across clusters the data latency time has significant impact on the performance. In the literature it is given that memory and I/O have become...

    Provided By Science Publications

  • White Papers // Jan 2015

    A Novel Reconfigurable Execution Core for Merged DSP Microcontroller

    In this paper, the authors present an execution core which can be reconfigured either for calculation of digital convolution or for computation of discrete orthogonal transform by appropriate local buffer initialization of processing cells. It is shown that the data flow pattern can be changed by a single bit control...

    Provided By Science Publications

  • White Papers // Jan 2015

    An Efficient Approach for Computing Silhouette Coefficients

    One popular approach for finding the best number of clusters (K) in a data set is through computing the silhouette coefficients. The silhouette coefficients for different values of K, are first found and then the maximum value of these coefficients is chosen. However, computing the silhouette coefficient for different Ks...

    Provided By Science Publications

  • White Papers // Jan 2015

    Low Power Hardware Implementation of High Speed FFT Core

    Fourier transforms play an important role in many digital signal processing applications including speech, signal and image processing. Applications based on Fast Fourier Transform (FFT) such as signal and image processing requires high computational power. This paper proposes the implementation of radix-4 based parallel pipelined fast fourier transform processor which...

    Provided By Science Publications

  • White Papers // Jan 2015

    Implementing a Large Data Bus VLIW Microprocessor

    Microprocessors have grown tremendously in its computing and data crunching capability since the early days of the invention of a microprocessor. Today, most microprocessors in the market are at 32 bits, while the latest microprocessors from IBM, Intel and AMD are at 64 bits. To further grow the computational capability...

    Provided By Science Publications

  • White Papers // Jan 2015

    Distributed Shared Memory Consistency Object-Based Model

    Distributed Shared Memory (DSM) systems represent a successful hybrid of two parallel computer classes: shared-memory multiprocessors and distributed computer systems. They provide the shared memory abstraction in systems with physically distributed memories and consequently combine the advantages of both approaches. A novel model that describes consistency in shared memory was...

    Provided By Science Publications

  • White Papers // Jan 2015

    Teaching Computer Organization and Architecture Using Simulation and FPGA Applications

    In this paper, the authors present the design concepts and realization of incorporating micro-operation simulation and FPGA implementation into a teaching tool for computer organization and architecture. This teaching tool helps computer engineering and computer science students to be familiarized practically with computer organization and architecture through the development of...

    Provided By Science Publications

  • White Papers // Jan 2015

    A Secure Time-Stamp Based Concurrency Control Protocol for Distributed Databases

    In distributed database systems the global database is partitioned into a collection of local databases stored at different sites. In this era of growing technology and fast communication media, security has an important role to play. In this paper, the authors presented a Secure Concurrency Control Protocol (SCCP) based on...

    Provided By Science Publications

  • White Papers // Jan 2015

    Communication Architecture Synthesis for Multi-Bus SoC

    In the System-on-Chip (SoC) design, the synthesis of communication architecture constitutes the bottleneck which can affect the performances of the system. Various schemes and protocols can be necessary, just as various topologies of interconnection. To reduce the complexity of the communications refinement, the authors present in this paper a model...

    Provided By Science Publications

  • White Papers // Jan 2015

    A Novel Fault Tolerant Reversible Gate for Nanotechnology Based Systems

    In this paper, the authors propose a novel reversible logic gate, NFT. It is a parity preserving reversible logic gate, that is, the parity of the outputs matches that of the inputs. They demonstrate that the NFT gate can implement all Boolean functions. It renders a wide class of circuit...

    Provided By Science Publications

  • White Papers // Jan 2015

    Performance Analysis of a 32-Bit Multiplier with a Carry-Look-Ahead Adder and a 32-Bit Multiplier with a Ripple Adder Using VHDL

    In this paper, the authors present a performance analysis of two different multipliers for unsigned data, one uses a carry-look-ahead adder and the second one uses a ripple adder. The paper's main focus is on the speed of the multiplication operation on these 32-bit multipliers which are modeled using VHDL,...

    Provided By Science Publications

  • White Papers // Jan 2015

    Efficient Reversible Montgomery Multiplier and Its Application to Hardware Cryptography

    Power analysis is a physical attack to crypto-systems such as smart card, tamperproof "Black box" and micro-chip. It exploits the fact that the power dissipation of an electronic circuit depends on the actions performed in it. The researchers describe Simple Power Analysis (SPA) and Differential Power Analysis (DPA) attacks which...

    Provided By Science Publications

  • White Papers // Dec 2014

    Android Based Energy Aware Framework for Porting Legacy Applications

    Trend is growing towards using complex multimedia functions on smaller devices. In this paper, the authors explore the effect of migrating legacy signal processing software applications algorithms from large form factor devices to the smaller one such as handheld mobile devices known as Energy Conscious Mobile Computing Systems (EConMCS). They...

    Provided By Science Publications

  • White Papers // Dec 2014

    Area Efficient Distributed Arithmetic Discrete Cosine Transform Using Modified Wallace Tree Multiplier

    In this paper, by using the modified Wallace tree multiplier, an error compensated adder tree is constructed in order to round off truncation errors and to obtain high through put discrete cosine transform design. Peak Signal to Noise Ratio (PSNR) is met efficiently since modified Wallace tree method is an...

    Provided By Science Publications

  • White Papers // Dec 2014

    RTOS Implementation of Non-Linear System Using Multi Tasking, Scheduling and Critical Section

    RTOS based embedded systems are designed with priority based multiple tasks. Inter task communication and data corruptions are major constraints in multi-tasking RTOS system. This paper the authors describe about the solution for these issues with an example real-time Liquid level control system. Message queue and mail box are used...

    Provided By Science Publications

  • White Papers // Nov 2014

    From Data Mining and Knowledge Discovery to Big Data Analytics and Knowledge Extraction for Applications in Science

    Data mining for "Knowledge discovery in databases" and associated computational operations first introduced in the mid-1990 s can no longer cope with the analytical issues relating to the so-called "Big data". The recent buzzword big data refers to large volumes of diverse, dynamic, complex, longitudinal and/or distributed data generated from...

    Provided By Science Publications

  • White Papers // Nov 2014

    Resource Broker Management by Adopting Self-Adaptive Multi-Instance Broker Scheduling in Grid Computing

    A grid resource broker seeks to assign the appropriate jobs to the appropriate resources as part of resource management in the multi-grid environment. Multi instances of the broker system provide multiple instances of brokers to simultaneously process jobs between multiple resources in a hierarchical cluster grid environment. In this paper,...

    Provided By Science Publications

  • White Papers // Oct 2014

    The Impact of Cognitive Trust and E-WOM on Purchase Intention in C2C E-Commerce Site

    In the last few years, the number of Internet users in Indonesia was growing rapidly as many people started to use e-commerce sites. Utilization of C2C (Customer-To-Customer) e-commerce in particular has a risk that may reduce people interest in online shopping. Of the many factors that may influence online shopping...

    Provided By Science Publications

  • White Papers // Sep 2014

    A Novel Approach for User Navigation Pattern Discovery and Analysis for Web Usage Mining

    Websites on the internet are useful source of information in the authors' day-to-day activity. Web Usage Mining (WUM) is one of the major applications of data mining, artificial intelligence and so on to the web data to predict the user's visiting behaviors and obtains their interests by analyzing the patterns....

    Provided By Science Publications

  • White Papers // Aug 2014

    A Comparative Performance Analysis of Multiple-Input Multiple-Output Using MATLAB with Zero Forcing and Minimum Mean Square Error Equalizers

    One of the major bottlenecks encountered in the wireless channel has been multipath propagation. Over the years, methods have been devised to reduce its effect on the quality of information being transmitted. Multiple-Input Multiple-Output (MIMO) can be used to reduce power consumption and increase capacity it can also reduce both...

    Provided By Science Publications

  • White Papers // Aug 2014

    Inverse Discrete Fourier Transform-Discrete Fourier Transform Techniques for Generating and Receiving Spectrally Efficient Frequency Division Multiplexing Signals

    Demand from wireless communications has always necessitated a search for techniques to save the precious wireless spectrum. Orthogonal Frequency Division Multiplexing (OFDM) has been proposed as a multi-carrier scheme that provides immunity against the frequency selective channel, therefore, enabling efficient utilization of the spectrum. In OFDM, the subcarriers are placed...

    Provided By Science Publications

  • White Papers // Aug 2014

    Dynamic Partial Reconfiguration Contribution on System on Programmable Chip Architecture for Motor Drive Implementation

    Now-a-days, due to technology advances and also with the increasingly requirements from applications supported by contemporary embedded systems, they became more and more complex, which have a direct impact on the design of such systems. Besides low cost and tight time to market, other constraints, like for instance the limited...

    Provided By Science Publications

  • White Papers // Aug 2014

    Comparative of Mediator Approach for Database Integration

    Six applications which are based on mediator approach have been reviewed in this paper. In practice, the mediator is used to integrate and access data from different data sources. The important characteristics for the implementation of mediator approach have been identified. This includes types of data, file format and object...

    Provided By Science Publications

  • White Papers // Jan 2010

    An Approach for Detecting Attacks in Mobile Adhoc Networks

    The security of data becomes more important with the increased use of commercial applications over wireless network environments. The authors presented an approach to handle various attacks for wireless networks. There were several problems of security in wireless networks due to intruders and different type of attacks such as Node...

    Provided By Science Publications

  • White Papers // Jan 2010

    Mobile Agents in Wireless LAN and Cellular Data Networks

    Advancing technology in wireless communication offers users anytime, anywhere access to information and network resources without restricting them to the fixed network infrastructure. Mobile computing represents a shift in the distributed systems paradigm. The potential of decoupled and disconnected operation, location-dependent computation and communication and powerful portable computing devices gives...

    Provided By Science Publications

  • White Papers // Jan 2010

    Operating System Support for Wireless Sensor Networks

    In a wireless sensor network, several sensor nodes obtain local data and communicate among themselves in order to create a global vision of an object of study. The idea of a self-managed network of low-power, autonomous devices, that collects data from an environment and propagates information through a wireless link...

    Provided By Science Publications

  • White Papers // Mar 2010

    Automated Position System Implementation Over Vehicular Ad Hoc Networks in 2-Dimension Space

    The real world scenario have changed from the wired connection to wireless connection. Over the years software development has responded to the increasing growth of wireless connectivity in developing network enabled software. The problem arises in the wireless domain due to random packet loss in transport layer and as well...

    Provided By Science Publications

  • White Papers // Sep 2010

    Forecasting Financial Market Annual Performance Measures: Further Evidence

    Forecasting is simple; producing accurate forecasts is the essential task. Experience suggests that financial managers often assume that because models used in forecasting are appropriate that they are effective. This study addresses this assumption. Effective is taken to mean forecasts where the Absolute Percentage Error (APE) is equal to or...

    Provided By Science Publications

  • White Papers // Apr 2010

    e-Learning Management System Using Service Oriented Architecture

    Service-based architectures take legacy application functionality and expose it to the Internet in a reliable, highly available, scalable, flexible, manageable and secure manner, easy and reliable internet-based method to create and access learning. Web service technology has emerged as a new paradigm of distributed computing. The Service-based architectures are layered...

    Provided By Science Publications

  • White Papers // Apr 2010

    Memory Storage Issues of Temporal Database Applications on Relational Database Management Systems

    Many existing database applications manage time-varying data. These database applications are referred to as temporal databases or time-oriented database applications that are considered as repositories of time-dependent data. Many proposals have been introduced for developing time-oriented database applications, some of which suggest building support for Temporal Database Management Systems (TDBMS)...

    Provided By Science Publications

  • White Papers // Jan 2010

    Improving the Quality of Service Guarantee in an Asynchronous Transfer Mode (ATM) Network

    This study presents a technique for improving the Quality of Service (QoS) guarantee in an ATM network. In the proposed model, it was assumed that high priority traffic have been allocated a switch resource to guarantee a given QoS and low priority cells are allowed to enter the buffer, to...

    Provided By Science Publications

  • White Papers // Nov 2009

    The Impact Of CRM On The Customer Satisfaction In Agricultural Bank

    The last several years saw the rise of Customer Relationship Management (CRM) as important business approach. CRM is a strategy that goes beyond increasing transaction volume. Its objectives are to increase profitability, revenue and customer satisfaction. To achieve CRM, a companywide set of tools, technologies and procedures promote the relationship...

    Provided By Science Publications

  • White Papers // Dec 2009

    Multiple Constraints for Ant Based Multicast Routing in Mobile Ad Hoc Networks

    A Mobile Ad Hoc Network (MANET) is a kind of wireless ad hoc network and is a self-configuring network of mobile routers (and associated hosts) connected by wireless links-the union of which forms an arbitrary topology. The routers are free to move randomly and organize themselves arbitrarily; thus, the network's...

    Provided By Science Publications

  • White Papers // Oct 2009

    Chemical Composition of Propolis From Different Regions in Java and Their Cytotoxic Activity

    Propolis samples from tropical zones, such as Java (Indonesia) with its vast biodiversity, have become a subject of increasing scientific and economic attention. The association of the chemical composition of propolis from different geographic regions with cytotoxic activities led to the identification of active principles, a fundamental tool to achieve...

    Provided By Science Publications

  • White Papers // Jan 2010

    A Free Educational Java Framework for Graph Algorithms

    In the teaching of graph theory algorithms it is important that students can experiment them on numerical instances in order to fully understand their logical meaning and to learn how they can be implemented. The framework, which is currently in use at the University of Bologna, and is available on-line,...

    Provided By Science Publications

  • White Papers // Jan 2010

    JBOOM: Java Based Object Oriented Model of Software Configuration Management

    Most of the present Software Configuration Management systems deal with version and configurations in the form of files and directories, the need today is to have a Software Configuration Management system that handles versions and configurations directly in terms of functions (Program Module). A major objective of this research is...

    Provided By Science Publications

  • White Papers // Jul 2010

    Evaluation of Ad Hoc on Demand Distance Vector Routing Protocol in HetMAN Architecture

    Mobile Ad hoc NETwork (MANET), a type of network with special characteristics, needs a special mechanism to bear with its ad hoc behavior. Approach: The important issue in MANET is routing protocol. Routing protocol is a standard used to determine the route path taken during the transmission of data. Results:...

    Provided By Science Publications

  • White Papers // Sep 2009

    A Performance Study of Reactive Multicast Routing Protocols in Virtual Class Room Using Mobile Ad Hoc Network

    A great deal of excitement has recently propelled Mobile Learning to the forefront of educational technology. The exponential growth of mobile technology in the recent years, increase in the availability of high-bandwidth network, advances in wireless technologies and popularity of handheld devices, have opened up new accessibility opportunities for education....

    Provided By Science Publications

  • White Papers // Mar 2010

    Advanced Information Technology of Slot-Switching Network Schemes for on All-Optical Variable-Length Packet

    The purpose of this paper was to investigate all optical packet switching, because it was the key to the success of the future Internet. It can meet the stringent bandwidth requirement of future Internet applications, such as real-time video streaming. Due to the lack of optical Random Access Memory (RAM),...

    Provided By Science Publications

  • White Papers // Jan 2010

    Building an e-Government e-Trust Infrastructure

    This paper presents a Trust Model for e-Government implementation. In the first part of the paper, the trust definition from different points of view (psychology, philosophy, linguistic, sociology, and mathematics) was presented. Most people think that to build trust between the government and its customers or citizens. However, this was...

    Provided By Science Publications

  • White Papers // Jan 2010

    Developing a Secure Web Service Architecture for SVG Image Delivery

    Web Services are substantially growing and become vital for businesses and organizations. A major concern, especially for mission-critical applications is Security. This study focuses on developing Scalable Vector Graphics (SVG) as Web services. In particular, the authors develop a service oriented architecture that securely manages SVG Web services using the...

    Provided By Science Publications

  • White Papers // Feb 2010

    Exploring Critical Determinants in Deploying Mobile Commerce Technology

    The research's problem lies in the fact that deploying m-commerce technology in Jordan represents the first serious trail to understand and explore the critical determinants that affect deploying mobile commerce technology. Approach: This research applied TAM model using the following variables: Perceived trust, perceived usefulness, perceived ease of use, social...

    Provided By Science Publications

  • White Papers // Mar 2010

    UML Diagrams Generator: A New CASE Tool to Construct the Use-Case and Class Diagrams From an Event Table

    Building UML diagrams is a very important and time consuming task for both requirements and design phases. However, some of these diagrams, such as use-case and class diagrams can be considered as a transition between the two phases. Approach: Through this study, the event table will be used to derive...

    Provided By Science Publications

  • White Papers // Jan 2010

    Heterogeneous GPRS-WLAN Integration Based on Ad-Hoc Networks

    In heterogeneous architecture vertical handoffs let users have service from both GPRS and WLAN without any session termination and seamless to the end user. In international literature there are many researches trying to propose the merging of WLAN and GPRS networks into one heterogeneous interworking system. The loose coupling and...

    Provided By Science Publications

  • White Papers // Jul 2010

    Business Continuity Planning: Are We Prepared for Future Disasters

    ? Natural and man-made disasters could cause a lot of monetary, mortality and morbidity losses for the business' operations such as: Activities, products and services. In order to minimize losses from such disasters, it is essential to prepare and implement effective business continuity plans that could deal with abnormal conditions....

    Provided By Science Publications

  • White Papers // Jan 2012

    A Backpropagation Neural Network for Computer Network Security

    In this paper, an efficient and scalable technique for computer network security is presented. On one hand, the decryption scheme and the public key creation used in this work are based on a multi-layer neural network that is trained by back-propagation learning algorithm. On the other hand, the encryption scheme...

    Provided By Science Publications

  • White Papers // Jan 2012

    A New Type of Network Security Protocol Using Hybrid Encryption in Virtual Private Networking

    Today wireless communications is acting as a major role in networks. Through year-end 2006, the employee's ability to install unmanaged access points will result is more than 50% of enterprises exposing sensitive information through the wireless Virtual Private Networks (VPN). It enables them to send the data between two computers...

    Provided By Science Publications

  • White Papers // Jan 2012

    Computer Security: A Survey of Methods and Systems

    In this paper, the authors have reviewed studies which survey all aspects of computer security including attackers and attacks, software bugs and viruses as well as different intrusion detection systems and ways to evaluate such systems. The aim was to develop a survey of security related issues which would provide...

    Provided By Science Publications

  • White Papers // Dec 2009

    Efficient Approach for Security Information Retrieval by Using Grid

    The results achieved by simulation, which was in-cooperated with the Computer Graphics approach and then applied together and the results observed were promising. The number of Columns and Rows can be increased to any length, that is, to yield a larger size of Mini-Grid and Main-Grids. Secondly, this technique can...

    Provided By Science Publications

  • White Papers // Feb 2011

    Increasing Effectiveness of IDS to Improve Security in Intranet

    The mobility based node reputation scheme for secured MANET presented in this study maintains the consistent knowledge about the node's communication spree, whether trusted or untrusted one. The proposed reputation scheme is used in improving the efficiency of overall network data transfer between different nodes. The neighbor node utilization rate...

    Provided By Science Publications

  • White Papers // Dec 2009

    On-Chip Implementation of High Resolution High Speed Floating Point Adder/Subtractor With Reducing Mean Latency for OFDM

    Recently Orthogonal Frequency Division Multiplexing (OFDM) techniques have received immense attention in high-speed data communication systems such as Wireless local Area Network (WAN), digital audio/video broadcasting and beyond 3G research. OFDM is a multi-carrier transmission technique, which divides the available spectrum into many carriers, each one being modulated by a...

    Provided By Science Publications

  • White Papers // Aug 2011

    Evaluation of Multiple Input Multiple Output (MIMO) System Capacity With Spatial Correlations

    Wireless communication is rapidly becoming the most popular solution to deliver voice and data services due to flexibility and mobility that can be offered at moderate infrastructure costs. Today's wireless technologies just won't get them to the hyper-connectivity of uninterrupted access from any mobile device with unlimited bandwidth at real-time...

    Provided By Science Publications

  • White Papers // Dec 2009

    Bluetooth Wireless Monitoring, Managing and Control for Inter Vehicle in Vehicular Ad-Hoc Networks

    The car users expect more and more accessories available in their cars, but the accessories available needed manage by driver manually and not properly manage by smart system. All these accessories are able to control by user manually using different and standalone controllers. Besides, the controller itself uses RF technology...

    Provided By Science Publications

  • White Papers // Jan 2012

    Design, Modeling and Implementation of Pic Based Wireless Control System to Eliminate Blind Spots in Vehicle Side Mirrors

    A PIC controlled IR system for the control of vehicle side mirror system movements for the purpose of revealing blind spots is designed and implemented. The designed and built system allows the side view mirrors to be adjusted based on the driver head movement. The infrared-based head tracking system maps...

    Provided By Science Publications

  • White Papers // Jan 2012

    A Comparative Study Between Various Protocols of MANET Networks

    Multicast Ad-Hoc On-Demand Distance Vector (MAODV) protocol keeps sending control packets within static periods whether there was sending of data packets or not, and it was not concerned with the amount of these data packets. Based on this, many people found out that there are a high number of control...

    Provided By Science Publications

  • White Papers // Dec 2009

    Distributed Real Time Architecture for Data Placement in Wireless Sensor Networks

    Reliable and correct behavior of sensor network based on infrastructure can be critical for human life, environment, decision-making and consequence of misbehavior can be catastrophic. Therefore development of reliable, stable and secure solutions that work provably correct even in unreliable and un-trusted environment is extremely important. The analysis of the...

    Provided By Science Publications

  • White Papers // Jan 2012

    Discrete Simulation Framework for Wireless Cellular Networks

    The aim of the discrete simulation framework is to deal with issues of the next generation of wireless cellular networks (e.g., multimedia traffic, radio resource management and mobility, etc.) and to provide a platform for current and future investigations involving wireless cellular networks. The simulator is built from the scratch...

    Provided By Science Publications

  • White Papers // May 2012

    Hardware Design of Wireless Physical Token Ring System for Mobile and Cell Communication

    A wireless network system based on an infrared and Laser scanning Physical Token Ring architecture (W-PTRS) was designed, built and tested successfully. The network provides a different way of utilizing the concept of a token ring network, but with a higher efficiency related to the speed of data transfer and...

    Provided By Science Publications

  • White Papers // Dec 2009

    Energy Efficient Hidden Markov Model Based Target Tracking Mechanism in Wireless Sensor Networks

    Wireless Sensor Networks (WSN) have become one of the most promising and interesting areas over the past few years. These networks are very large systems comprised of small sized, low power, low-cost sensor devices which collect information about the physical environment. The flexibility, self-organization, fault tolerance, high sensing fidelity, low-cost...

    Provided By Science Publications

  • White Papers // Jan 2012

    Performance Analysis of Clustering Protocols in Mobile Ad Hoc Networks

    Network clustering is an important technique widely used in efficient MANETs network management, hierarchical routing protocol design, network modeling, Quality of Service, etc. Recently many researchers are focusing on clustering which is one of the fundamental problems in mobile ad hoc networks. This paper presents the descriptions of recently proposed...

    Provided By Science Publications

  • White Papers // Jan 2011

    Experimental Evaluation of Medium Access Schemes in 802.11 Wireless Networks

    Deployment of real time services over 802.11 wireless networks requires Quality of Service (QoS) differentiation mechanisms for different traffic types. This required investigations into the performance of the Medium Access Control (MAC) schemes like Distributed Coordinated Function (DCF) and Enhanced DCF with respect to the stringent QoS requirements imposed by...

    Provided By Science Publications

  • White Papers // Jan 2011

    Adaptive Hybrid Mobile Agent Protocol for Wireless Multihop Internet Access

    A Mobile Ad Hoc NETwork (MANET) is an autonomous network that can be formed without of any established infrastructure. It consists of mobile nodes equipped with a wireless interface that are free to move and communicate. The mobile nodes act as host and routers, which has routing capabilities that create...

    Provided By Science Publications

  • White Papers // Nov 2011

    Fuzzy Velocity Biased-Ad Hoc on Demand Distance Vector to Improve Throughput in Dynamic Mobile Network

    Mobile Ad hoc NETwork (MANET) is infrastructure less networks of mobile nodes linked with wireless connectivity (Corson and Macker, 1999), which are dynamic in nature, to transfer data. Wireless mobile networks based on cellular concept depends on infrastructure support of base stations which acts as access points to the mobile...

    Provided By Science Publications