Science Publications

Displaying 1-40 of 245 results

  • White Papers // Jun 2012

    A Review of Security System for Smart Home Applications

    Now-a-days, the security level is very important, always emphasized and enhanced system. This system managed to help users to detect human presence around the house precisely. The use of wireless connectivity based on microcontroller facilitates the installation process at home and can prevent anyone hacking into security systems. This system...

    Provided By Science Publications

  • White Papers // May 2012

    Key Success Factors of 3rd Generation Mobile Network Services for M-Commerce in Malaysia

    While there has been a great deal of excitement in view of M-commerce, very little is actually known about conditions and critical success factors for successful introduction of the 3rd generation mobile network services here in Malaysia. This paper investigates the factors for successful diffusion of 3G network services and...

    Provided By Science Publications

  • White Papers // May 2012

    Hardware Design of Wireless Physical Token Ring System for Mobile and Cell Communication

    A wireless network system based on an infrared and Laser scanning Physical Token Ring architecture (W-PTRS) was designed, built and tested successfully. The network provides a different way of utilizing the concept of a token ring network, but with a higher efficiency related to the speed of data transfer and...

    Provided By Science Publications

  • White Papers // Apr 2012

    Release Process on Quality Improvement in Open Source Software Project Management

    This paper has provided an in depth understanding of OSS release process, which is an area of contemporary significance. The core finding of this paper is that in complex OSS projects, the volunteers experience many difficulties with the release approach. These include lack of coordination among OSS developers', who are...

    Provided By Science Publications

  • White Papers // Apr 2012

    Optical System Monitoring Based on Reflection Spectrum of Fiber Bragg Grating

    This paper presents fiber fault monitoring approaches for Fiber-To-The Home (FTTH) with a Passive Optical Network (PON). Current fiber fault monitoring approaches are difficult to be implemented due to its complexity and high loss as the amount of branches increase. Approach: A fiber fault monitoring scheme is proposed whereas Fiber...

    Provided By Science Publications

  • White Papers // Apr 2012

    A Chaotic Block Cipher for Real-Time Multimedia

    The widespread usage of Internet is providing additional channels for a pirate to easily and quickly distribute the copyrighted digital content. As a result, the protection of content is now receiving a significant amount of consideration and strong security technology is required to protect user's sensitive digital data. Cryptography is...

    Provided By Science Publications

  • White Papers // Apr 2012

    Buffer Pocketing and Pre-Checking on Buffer Utilization

    A basic NoC architecture is composed of routers, communication links between routers and a Network-Interface Component (NIC) between each pair of router and processing element. NoC allows much higher bandwidth through parallel communication. Each router can accept at the same time the flits arriving from all of the input channels...

    Provided By Science Publications

  • White Papers // Apr 2012

    Application of Adaptive Neuro-Fuzzy Inference System for Information Security

    Computer networks are expanding at very fast rate and the number of network users is increasing day by day, for full utilization of networks it need to be secured against many threats including malware, which is harmful software with the capability to damage data and systems. Fuzzy rule based classification...

    Provided By Science Publications

  • White Papers // Apr 2012

    A Fault Tolerant Resource Allocation Architecture for Mobile Grid

    In this paper, the authors have developed a fault tolerant technique to improve reliability in mobile grid environment. The proposed technique handles both resource and network failure and present recovery techniques also. When the job is assigned to the node, acknowledgement must reach monitoring agent within certain time interval else...

    Provided By Science Publications

  • White Papers // Apr 2012

    Impact of the Use of Object Request Broker Middleware for Inter-Component Communications in C6416 Digital Signal Processor Based Software Communications Architecture Radio Systems

    Software Communications Architecture (SCA), ORB middleware, ORB express DSP, inter-component communications, stub code, encoding, marshalling are necessary in order to meet the requirements of a wide range of today's communication needs. The advent of software defined radio and the use of the Digital Signal Processor (DSP) as a suitable device...

    Provided By Science Publications

  • White Papers // Apr 2012

    Congestion Free Routing in Adhoc Networks

    A Mobile Ad-Hoc Network (MANET) is a temporary network; the mobile devices in an ad-hoc network are communicating through wireless links without any pre-existing infrastructure. The one major problem of this network is network congestion, it may take place at any intermediate nodes when data packets are traveling from source...

    Provided By Science Publications

  • White Papers // Mar 2012

    A Multipath Energy Efficient Congestion Control Scheme for Wireless Sensor Network

    In the modern technology world, network attacks have become more sophisticated and harder to identify the attack. When many applications like scalable chat services and streaming video, are expected to run over the Internet, the security is necessary in computing and communication became a necessity. The internet today provides less...

    Provided By Science Publications

  • White Papers // Mar 2012

    A Framework for .NET Mobile-Based Application Services

    A Wireless Sensor Network (WSN) is a network composed of distributed autonomous devices using sensors to cooperatively monitor physical or environmental conditions such as temperature, sound, vibration, pressure, motion or pollutants at different locations. WSNs have a wide range of applications in object tracking, object localization, habitat observation, health monitoring...

    Provided By Science Publications

  • White Papers // Mar 2012

    Fuzzy Based Secure Data Aggregation Technique in Wireless Sensor Networks

    One of the up coming technologies is the wireless sensor network and now it has attained much consideration from the field of research. A sensor network consists of numerous small devices which are inexpensive and organize itself into an ad-hoc system. The wireless sensor network monitors the physical environment to...

    Provided By Science Publications

  • White Papers // Mar 2012

    Ensuring Multi Messages Broadcasting in Mobile Ad Hoc Network using Network Coding Approach

    Broadcasting is the most frequently used operation in Mobile Ad hoc NETworks (MANETs) for the dissemination of data and control messages in many applications. Usually, a network backbone is constructed for efficient broadcasting to avoid the broadcast storm problem caused by simple blind flooding, where only selected nodes, called forwarding...

    Provided By Science Publications

  • White Papers // Mar 2012

    New Optical Splitter Design for Application in Fibre-to-the Home Passive Optical Network using Virtual Lab Platform

    In this study, authors present a new design of optical splitter to be applied in FTTH-PON named Multi Ratio Optical Splitter (MROS). MROS was introduced to enhance the power distribution in the optical network. The authors also bring in new approach for designing a new optical device that enable one...

    Provided By Science Publications

  • White Papers // Mar 2012

    Privacy Preserved Collaborative Secure Multiparty Data Mining

    In the current modern business environment, its success is defined by collaboration, team efforts and partnership, rather than lonely spectacular individual efforts in isolation. So the collaboration becomes especially important because of the mutual benefit it brings. Sometimes, such collaboration even occurs among competitors, or among companies that have conflict...

    Provided By Science Publications

  • White Papers // Mar 2012

    Effective Authentication Technique for Distributed Denial of Service Attacks in Wireless Local Area Networks

    In 802.11-based Wireless LAN (WLAN), there is an improved risk of security attacks. To defeat concealed attacks, there is a necessity to authenticate both access points and wireless stations. The authors propose a defensive technique for DDoS attack in WLAN. This authentication technique includes an Authentication Server (AS) in addition...

    Provided By Science Publications

  • White Papers // Mar 2012

    Efficient Web Usage Miner Using Decisive Induction Rules

    Web usage mining is the technique of extracting useful information from server logs (user's history) and finding out what users are looking for on the Internet. This type of web mining allows for the collection of Web access data for Web pages. Scope: The web usage data provides the paths...

    Provided By Science Publications

  • White Papers // Mar 2012

    Smart Wireless System in Fiber to the Home

    Optical communication systems have begun to be developed by many researchers after finding that the use of copper cable has many disadvantages. These disadvantages include low bit rate, very limited bandwidth and high possibility of influence of magnetic field. The use of fiber optic instead copper cable can solve these...

    Provided By Science Publications

  • White Papers // Mar 2012

    Normalized Web Distance Based Web Query Classification

    In the context of the World Wide Web, the user information need is usually translated into queries which are submitted to the search engine. The search engine processes the queries and returns a ranked list of documents which it finds as being appropriate to the query. Spink et al. (2001)...

    Provided By Science Publications

  • White Papers // Mar 2012

    A Study of Knowledge Management Process Practices in Very Small Software Companies

    For many small and very small software companies, implementing controls and structures to properly manage their software development activity is a major challenge. Administering software development in this way is usually achieved through the introduction of a software process. A software process essentially describes the way an organization develops its...

    Provided By Science Publications

  • White Papers // Mar 2012

    A Dynamic Resource Allocation Method for Parallel Data Processing in Cloud Computing

    Cloud computing has the potential to dramatically change the landscape of the current IT industry. For companies that only have to process large amounts of data occasionally running their own data center is obviously not an option. Instead, Cloud computing has emerged as a promising approach to rent a large...

    Provided By Science Publications

  • White Papers // Feb 2012

    Customer-Made 3?3 Polymer Optical Fiber Splitter Based on Green Technology Using Fusion Technique

    Copper wire is a conventional conductor that used for data transmission from one place to another place. However, the use of copper wire has many shortcomings such as the transmitted signal will be affected by electrical characteristics such as resistance and interference that resulting during the data transmission and dependence...

    Provided By Science Publications

  • White Papers // Feb 2012

    An Evolutionary Algorithmic Approach based Optimal Web Service Selection for Composition With Quality of Service

    Many companies are now using the Web as a platform to communicate with their partners. The level of usability is very high which lead to the success of web today. The Web and its technologies allow them to provide Web services to individuals as well as other businesses. Web services...

    Provided By Science Publications

  • White Papers // Feb 2012

    Computation of Private Key Based on Divide-By-Prime for Luc Cryptosystems

    Public key cryptosystem is a way that is used a secret communication between the sender and receiver, without needing for a secret key exchange and it can used for create a digital signature. Public key cryptosystem is a widely used technology around the world, which enables information to be transmission...

    Provided By Science Publications

  • White Papers // Feb 2012

    A Cross Layer Frame Work for Enhanced Quality of Service Provisioning in Worldwide Interoperability for Microwave Access Networks

    Providing QoS-guaranteed services is necessary for next generation wireless networks, including IEEE 802.16 standard based networks. Such networks are envisioned to support multimedia services with different QoS requirements for different applications including voice, data and real time, or streaming video/audio. However, the aforementioned standards define only QoS architecture and signaling,...

    Provided By Science Publications

  • White Papers // Jan 2012

    Flexible Topology Migration in Optical Cross Add and Drop Multiplexer in Metropolitan Ring Network

    In general, there are two types of optical node that used in present optical network where it depends on what type of topology that is implemented. OXC-based optical node is selected as a node distribution in the mesh network while OADM-based optical node is suitable for use in ring topology...

    Provided By Science Publications

  • White Papers // Jan 2012

    Artificial Bee Colony based Energy Aware and Energy Efficient Routing Protocol

    Network becomes very important technology in the day to day life style of modern computer era, in which the wireless communication become very popular for the last few years. In the same manner, the other wireless network, i.e., ad-hoc network is very popular among the researchers in the past few...

    Provided By Science Publications

  • White Papers // Jan 2012

    An Analysis and Overview of Wireless Routing Protocols

    In the past few years, the wireless communication emerges enormously in the computer communication industry. Based on its higher demands and necessity, there are many research issues in the wireless communication such as Optimal routing protocols, Traffic Management, Providing QoS, Offering reliable services, Effective Transport Control Protocol (TCP), Medium Access...

    Provided By Science Publications

  • White Papers // Jan 2012

    Intelligent Model for Traffic Safety Applications

    There are several research projects on cooperatively detecting vehicles from approaching ramps, invisible corners, intersections, vehicles in the wrong lane, vehicles traveling at extremely dangerous speeds and vehicles wrongly stopping or running on a motorway shoulder. Before going to Safety against Dangerous vehicle and situations, generally the authors make use...

    Provided By Science Publications

  • White Papers // Jan 2012

    Efficient Sensor Stream Data Processing System to use Cache Technique for Ubiquitous Sensor Network Application Service

    Recently, with the development of Ubiquitous Sensor Network (USN) technology, necessary data for environmental monitoring, logistics surveillance, building management could be received through a wireless network from various small sensors. With the development of these technologies, various types of sensors were used in USN environments and sensor data generated from...

    Provided By Science Publications

  • White Papers // Jan 2012

    A Distributed Coverage and Target Tracking Algorithm for Wireless Sensor Networks

    The use of small, inexpensive, low-power, distributed devices, which have the potential of local processing and wireless communication, have been made a reality owing to the recent technological improvements. These kinds of nodes are known as sensor nodes. The ability of each sensor node is restricted in terms of limited...

    Provided By Science Publications

  • White Papers // Jan 2012

    High Performance Computing on Fast Lock Delay Locked Loop With Low Power State and Simultaneous Switching Noise Reduction

    In recent years, the performance is the most important in real time image and video applications. As circuit speed increases with shrinking device dimension, the clock frequencies increase and the effects of clock skew and jitter on a system becomes an increasingly larger percentage of Data Valid window (tDQV). If...

    Provided By Science Publications

  • White Papers // Jan 2012

    A New Algorithm for Fractal Coding Using Self Organizing Map

    This paper addresses to an improved SOM based fractal compression technique which is used to test the possibility of the fractal compression to medical imaging. The two newly proposed methods competes the standard fractal image compression algorithms. Since the proposed algorithm is regenerating feature rich portions of the images without...

    Provided By Science Publications

  • White Papers // Jan 2012

    Ant Colony Optimization for Capacitated Vehicle Routing Problem

    The Capacitated Vehicle Routing Problem (CVRP) is a well-known combinatorial optimization problem which is concerned with the distribution of goods between the depot and customers. It is of economic importance to businesses as approximately 10-20% of the final cost of the goods is contributed by the transportation process. This problem...

    Provided By Science Publications

  • White Papers // Jan 2012

    Video Retrieval using Histogram and Sift Combined with Graph-based Image Segmentation

    Content-Based Video Retrieval (CBVR) is still an open hard problem because of the semantic gap between low-level features and high-level features, largeness of database, keyframe's content, choosing feature. In this paper, the authors introduce a new approach for this problem based on Scale-Invariant Feature Transform (SIFT) feature, a new metric...

    Provided By Science Publications

  • White Papers // Jan 2012

    Secure Packet Encryption and Key Exchange System in Mobile Ad hoc Network

    Mobile Ad-hoc Network is infrastructureless network supported by no fixed trusted infrastructure. The packets had a chance to drop or hacked by eavesdropper during transmission. So, encryption method is required for sending and receiving packet in secret manner. In this approach, the block and key size had been increased by...

    Provided By Science Publications

  • White Papers // Jan 2012

    Intelligent OkiKoSenPBX1 Security Patrol Robot Via Network and Map-Based Route Planning

    A robot is a machine designed to execute one or more tasks repeatedly, with speed and precision. There are different types of robots as there are tasks for them to perform. Security robots are protecting property and documenting facilities autonomously around the world. An important aspect of robotic security systems...

    Provided By Science Publications

  • White Papers // Jan 2012

    Security Manager - Key to Restrict the Attacks in Bluetooth

    Bluetooth is the technology that utilizes radio frequency waves as a way to communicate wirelessly between digital devices. The Bluetooth user has the choice of point-to-point or point-to-multipoint links whereby communication can be held between two devices, or up to eight. When devices are communicating with each other they are...

    Provided By Science Publications

  • White Papers // Mar 2010

    Advanced Information Technology of Slot-Switching Network Schemes for on All-Optical Variable-Length Packet

    The purpose of this paper was to investigate all optical packet switching, because it was the key to the success of the future Internet. It can meet the stringent bandwidth requirement of future Internet applications, such as real-time video streaming. Due to the lack of optical Random Access Memory (RAM),...

    Provided By Science Publications

  • White Papers // Aug 2009

    TCP Optimal Performance in Wireless Networks Applications

    Currently, most data applications on wire line networks use TCP/IP as an end-to-end flow and congestion avoidance protocol. TCP provides excellent performance for data transfer in networks with stationary users when congestion is mainly due to packet loss and unusual long delays. For wireless or wire line networks, standard TCP...

    Provided By Science Publications

  • White Papers // Mar 2010

    UML Diagrams Generator: A New CASE Tool to Construct the Use-Case and Class Diagrams From an Event Table

    Building UML diagrams is a very important and time consuming task for both requirements and design phases. However, some of these diagrams, such as use-case and class diagrams can be considered as a transition between the two phases. Approach: Through this study, the event table will be used to derive...

    Provided By Science Publications

  • White Papers // Jan 2010

    Developing a Secure Web Service Architecture for SVG Image Delivery

    Web Services are substantially growing and become vital for businesses and organizations. A major concern, especially for mission-critical applications is Security. This study focuses on developing Scalable Vector Graphics (SVG) as Web services. In particular, the authors develop a service oriented architecture that securely manages SVG Web services using the...

    Provided By Science Publications

  • White Papers // Feb 2010

    Exploring Critical Determinants in Deploying Mobile Commerce Technology

    The research's problem lies in the fact that deploying m-commerce technology in Jordan represents the first serious trail to understand and explore the critical determinants that affect deploying mobile commerce technology. Approach: This research applied TAM model using the following variables: Perceived trust, perceived usefulness, perceived ease of use, social...

    Provided By Science Publications

  • White Papers // Jan 2010

    Heterogeneous GPRS-WLAN Integration Based on Ad-Hoc Networks

    In heterogeneous architecture vertical handoffs let users have service from both GPRS and WLAN without any session termination and seamless to the end user. In international literature there are many researches trying to propose the merging of WLAN and GPRS networks into one heterogeneous interworking system. The loose coupling and...

    Provided By Science Publications

  • White Papers // Jul 2010

    Business Continuity Planning: Are We Prepared for Future Disasters

    ? Natural and man-made disasters could cause a lot of monetary, mortality and morbidity losses for the business' operations such as: Activities, products and services. In order to minimize losses from such disasters, it is essential to prepare and implement effective business continuity plans that could deal with abnormal conditions....

    Provided By Science Publications

  • White Papers // Dec 2009

    Multiple Constraints for Ant Based Multicast Routing in Mobile Ad Hoc Networks

    A Mobile Ad Hoc Network (MANET) is a kind of wireless ad hoc network and is a self-configuring network of mobile routers (and associated hosts) connected by wireless links-the union of which forms an arbitrary topology. The routers are free to move randomly and organize themselves arbitrarily; thus, the network's...

    Provided By Science Publications

  • White Papers // Apr 2010

    Memory Storage Issues of Temporal Database Applications on Relational Database Management Systems

    Many existing database applications manage time-varying data. These database applications are referred to as temporal databases or time-oriented database applications that are considered as repositories of time-dependent data. Many proposals have been introduced for developing time-oriented database applications, some of which suggest building support for Temporal Database Management Systems (TDBMS)...

    Provided By Science Publications

  • White Papers // Jan 2010

    Improving the Quality of Service Guarantee in an Asynchronous Transfer Mode (ATM) Network

    This study presents a technique for improving the Quality of Service (QoS) guarantee in an ATM network. In the proposed model, it was assumed that high priority traffic have been allocated a switch resource to guarantee a given QoS and low priority cells are allowed to enter the buffer, to...

    Provided By Science Publications

  • White Papers // Nov 2009

    The Impact Of CRM On The Customer Satisfaction In Agricultural Bank

    The last several years saw the rise of Customer Relationship Management (CRM) as important business approach. CRM is a strategy that goes beyond increasing transaction volume. Its objectives are to increase profitability, revenue and customer satisfaction. To achieve CRM, a companywide set of tools, technologies and procedures promote the relationship...

    Provided By Science Publications

  • White Papers // Jan 2009

    Human Computer Interaction Approach In Developing Customer Relationship Management

    Many published studies have found that more than 50% of Customer Relationship Management (CRM) system implementations have failed due to the failure of system usability and does not fulfilled user expectation. This paper presents the issues that contributed to the failures of CRM system and proposed a prototype of CRM...

    Provided By Science Publications

  • White Papers // Aug 2009

    Distributed Clusterhead Architecture for Mobile Ad Hoc Networks

    Mobile Ad Hoc Network (MANET) consists of dynamic topology as nodes in the network are mobile, and connected via wireless links. The nodes are grouped in clusters for the purpose of routing. Nodes within the cluster communicate directly. However, nodes communicate outside the cluster through a centralized node that is...

    Provided By Science Publications

  • White Papers // Oct 2009

    Chemical Composition of Propolis From Different Regions in Java and Their Cytotoxic Activity

    Propolis samples from tropical zones, such as Java (Indonesia) with its vast biodiversity, have become a subject of increasing scientific and economic attention. The association of the chemical composition of propolis from different geographic regions with cytotoxic activities led to the identification of active principles, a fundamental tool to achieve...

    Provided By Science Publications

  • White Papers // Jan 2010

    A Free Educational Java Framework for Graph Algorithms

    In the teaching of graph theory algorithms it is important that students can experiment them on numerical instances in order to fully understand their logical meaning and to learn how they can be implemented. The framework, which is currently in use at the University of Bologna, and is available on-line,...

    Provided By Science Publications

  • White Papers // Jan 2010

    JBOOM: Java Based Object Oriented Model of Software Configuration Management

    Most of the present Software Configuration Management systems deal with version and configurations in the form of files and directories, the need today is to have a Software Configuration Management system that handles versions and configurations directly in terms of functions (Program Module). A major objective of this research is...

    Provided By Science Publications

  • White Papers // Apr 2009

    Optimal Power Control With Overhearing Avoidance for Wireless Sensor Networks

    Extending lifetime of the battery operated wireless sensor nodes through the design of low power medium access control protocols dealt in this study. Approach: In this study energy efficient Optimal Power Control MAC with Overhearing Avoidance (OPC-OA) was proposed. The transmission power of every node was dynamically changed for the...

    Provided By Science Publications

  • White Papers // Jan 2010

    Operating System Support for Wireless Sensor Networks

    In a wireless sensor network, several sensor nodes obtain local data and communicate among themselves in order to create a global vision of an object of study. The idea of a self-managed network of low-power, autonomous devices, that collects data from an environment and propagates information through a wireless link...

    Provided By Science Publications

  • White Papers // Mar 2010

    Automated Position System Implementation Over Vehicular Ad Hoc Networks in 2-Dimension Space

    The real world scenario have changed from the wired connection to wireless connection. Over the years software development has responded to the increasing growth of wireless connectivity in developing network enabled software. The problem arises in the wireless domain due to random packet loss in transport layer and as well...

    Provided By Science Publications

  • White Papers // Jan 2010

    An Approach for Detecting Attacks in Mobile Adhoc Networks

    The security of data becomes more important with the increased use of commercial applications over wireless network environments. The authors presented an approach to handle various attacks for wireless networks. There were several problems of security in wireless networks due to intruders and different type of attacks such as Node...

    Provided By Science Publications

  • White Papers // Sep 2010

    Forecasting Financial Market Annual Performance Measures: Further Evidence

    Forecasting is simple; producing accurate forecasts is the essential task. Experience suggests that financial managers often assume that because models used in forecasting are appropriate that they are effective. This study addresses this assumption. Effective is taken to mean forecasts where the Absolute Percentage Error (APE) is equal to or...

    Provided By Science Publications

  • White Papers // Apr 2010

    e-Learning Management System Using Service Oriented Architecture

    Service-based architectures take legacy application functionality and expose it to the Internet in a reliable, highly available, scalable, flexible, manageable and secure manner, easy and reliable internet-based method to create and access learning. Web service technology has emerged as a new paradigm of distributed computing. The Service-based architectures are layered...

    Provided By Science Publications

  • White Papers // Jan 2010

    Mobile Agents in Wireless LAN and Cellular Data Networks

    Advancing technology in wireless communication offers users anytime, anywhere access to information and network resources without restricting them to the fixed network infrastructure. Mobile computing represents a shift in the distributed systems paradigm. The potential of decoupled and disconnected operation, location-dependent computation and communication and powerful portable computing devices gives...

    Provided By Science Publications

  • White Papers // Jul 2010

    Evaluation of Ad Hoc on Demand Distance Vector Routing Protocol in HetMAN Architecture

    Mobile Ad hoc NETwork (MANET), a type of network with special characteristics, needs a special mechanism to bear with its ad hoc behavior. Approach: The important issue in MANET is routing protocol. Routing protocol is a standard used to determine the route path taken during the transmission of data. Results:...

    Provided By Science Publications

  • White Papers // Jan 2011

    Experimental Evaluation of Medium Access Schemes in 802.11 Wireless Networks

    Deployment of real time services over 802.11 wireless networks requires Quality of Service (QoS) differentiation mechanisms for different traffic types. This required investigations into the performance of the Medium Access Control (MAC) schemes like Distributed Coordinated Function (DCF) and Enhanced DCF with respect to the stringent QoS requirements imposed by...

    Provided By Science Publications

  • White Papers // May 2011

    Authentication Based and Optimized Routing Technique in Mobile Ad Hoc Networks

    As the technology for ad hoc wireless networks gains maturity, comprehensive security solutions based on realistic trust models and addressing all prevalent issues like routing key management and cooperation enforcement are expected to appear. The solutions presented in this paper only cover a subset of threats and are far from...

    Provided By Science Publications

  • White Papers // Jan 2011

    Adaptive Hybrid Mobile Agent Protocol for Wireless Multihop Internet Access

    A Mobile Ad Hoc NETwork (MANET) is an autonomous network that can be formed without of any established infrastructure. It consists of mobile nodes equipped with a wireless interface that are free to move and communicate. The mobile nodes act as host and routers, which has routing capabilities that create...

    Provided By Science Publications

  • White Papers // Oct 2009

    An Effective Location-Based Power Conservation Scheme for Mobile Ad Hoc Networks

    One of the major issues in current reactive routing protocols for Mobile Ad Hoc NETworks (MANETs) is the high bandwidth and power consumptions during the routing process. In this paper, the authors proposed and evaluated the performance of an efficient Location-Based Power Conservation (LBPC) scheme for MANETs. Approach: in this...

    Provided By Science Publications

  • White Papers // Mar 2012

    Effective Authentication Technique for Distributed Denial of Service Attacks in Wireless Local Area Networks

    In 802.11-based Wireless LAN (WLAN), there is an improved risk of security attacks. To defeat concealed attacks, there is a necessity to authenticate both access points and wireless stations. The authors propose a defensive technique for DDoS attack in WLAN. This authentication technique includes an Authentication Server (AS) in addition...

    Provided By Science Publications

  • White Papers // Mar 2012

    Efficient Web Usage Miner Using Decisive Induction Rules

    Web usage mining is the technique of extracting useful information from server logs (user's history) and finding out what users are looking for on the Internet. This type of web mining allows for the collection of Web access data for Web pages. Scope: The web usage data provides the paths...

    Provided By Science Publications

  • White Papers // Jan 2012

    A New Algorithm for Fractal Coding Using Self Organizing Map

    This paper addresses to an improved SOM based fractal compression technique which is used to test the possibility of the fractal compression to medical imaging. The two newly proposed methods competes the standard fractal image compression algorithms. Since the proposed algorithm is regenerating feature rich portions of the images without...

    Provided By Science Publications

  • White Papers // Jan 2012

    Ant Colony Optimization for Capacitated Vehicle Routing Problem

    The Capacitated Vehicle Routing Problem (CVRP) is a well-known combinatorial optimization problem which is concerned with the distribution of goods between the depot and customers. It is of economic importance to businesses as approximately 10-20% of the final cost of the goods is contributed by the transportation process. This problem...

    Provided By Science Publications

  • White Papers // Jan 2012

    Video Retrieval using Histogram and Sift Combined with Graph-based Image Segmentation

    Content-Based Video Retrieval (CBVR) is still an open hard problem because of the semantic gap between low-level features and high-level features, largeness of database, keyframe's content, choosing feature. In this paper, the authors introduce a new approach for this problem based on Scale-Invariant Feature Transform (SIFT) feature, a new metric...

    Provided By Science Publications

  • White Papers // Mar 2012

    New Optical Splitter Design for Application in Fibre-to-the Home Passive Optical Network using Virtual Lab Platform

    In this study, authors present a new design of optical splitter to be applied in FTTH-PON named Multi Ratio Optical Splitter (MROS). MROS was introduced to enhance the power distribution in the optical network. The authors also bring in new approach for designing a new optical device that enable one...

    Provided By Science Publications

  • White Papers // Mar 2012

    Privacy Preserved Collaborative Secure Multiparty Data Mining

    In the current modern business environment, its success is defined by collaboration, team efforts and partnership, rather than lonely spectacular individual efforts in isolation. So the collaboration becomes especially important because of the mutual benefit it brings. Sometimes, such collaboration even occurs among competitors, or among companies that have conflict...

    Provided By Science Publications

  • White Papers // Mar 2012

    Fuzzy Based Secure Data Aggregation Technique in Wireless Sensor Networks

    One of the up coming technologies is the wireless sensor network and now it has attained much consideration from the field of research. A sensor network consists of numerous small devices which are inexpensive and organize itself into an ad-hoc system. The wireless sensor network monitors the physical environment to...

    Provided By Science Publications

  • White Papers // Jan 2012

    Secure Packet Encryption and Key Exchange System in Mobile Ad hoc Network

    Mobile Ad-hoc Network is infrastructureless network supported by no fixed trusted infrastructure. The packets had a chance to drop or hacked by eavesdropper during transmission. So, encryption method is required for sending and receiving packet in secret manner. In this approach, the block and key size had been increased by...

    Provided By Science Publications

  • White Papers // Mar 2012

    Ensuring Multi Messages Broadcasting in Mobile Ad Hoc Network using Network Coding Approach

    Broadcasting is the most frequently used operation in Mobile Ad hoc NETworks (MANETs) for the dissemination of data and control messages in many applications. Usually, a network backbone is constructed for efficient broadcasting to avoid the broadcast storm problem caused by simple blind flooding, where only selected nodes, called forwarding...

    Provided By Science Publications

  • White Papers // Mar 2012

    A Framework for .NET Mobile-Based Application Services

    A Wireless Sensor Network (WSN) is a network composed of distributed autonomous devices using sensors to cooperatively monitor physical or environmental conditions such as temperature, sound, vibration, pressure, motion or pollutants at different locations. WSNs have a wide range of applications in object tracking, object localization, habitat observation, health monitoring...

    Provided By Science Publications

  • White Papers // Mar 2012

    A Multipath Energy Efficient Congestion Control Scheme for Wireless Sensor Network

    In the modern technology world, network attacks have become more sophisticated and harder to identify the attack. When many applications like scalable chat services and streaming video, are expected to run over the Internet, the security is necessary in computing and communication became a necessity. The internet today provides less...

    Provided By Science Publications