Serials Publiations

Displaying 1-40 of 151 results

  • White Papers // Sep 2014

    A Mobility Aware Algorithm to Manage Network Performance over Mobile Ad-Hoc Network

    Over the past decade or so, there has been rapid growth in wireless and mobile applications technologies. More recently, an increasing emphasis has been on the potential of infrastructure less wireless mobile networks that are easy, fast and inexpensive to set up, with the view that such technologies will enable...

    Provided By Serials Publiations

  • White Papers // Sep 2014

    Fingerprint Matching Using Minutiae Points

    This is a crucial stage as one needs to extract the right features in optimal way. Image or vector of the numbers with specific properties is used for creating template. Fingerprints are rich in details called minutiae, which can be used as identification marks for fingerprint verification. This paper is...

    Provided By Serials Publiations

  • White Papers // Sep 2014

    ETL-Extract, Transform & Load Testing

    Data is most important part in any organization. Data is backbone of any report and reports are the baseline on which all the vital management decisions are taken. Most of the companies are constructing their data warehouse to store and monitor real time data as well as historical data. Many...

    Provided By Serials Publiations

  • White Papers // Sep 2014

    FPGAC: - High Level Synthesis Tool

    The rapidly increasing System-on-Chip (SoC) complexity is forcing researchers to shift from RTL and raise the level of abstraction, i.e. opting for High Level Synthesis (HLS). Despite failures of starting generations of commercial high level synthesis tools. The authors strongly believe that current time is turning point for shifting to...

    Provided By Serials Publiations

  • White Papers // Sep 2014

    A Composite Approach for Biometric Template Security

    Biometrics is used for authentication by means of physical or behavioral characteristics of user. It can be divided into unimodal biometric and multimodal biometric. But unimodal biometrics is not much secure as it have some problems like noisy data, spoof attacks etc. So the authors use multimodal biometrics for more...

    Provided By Serials Publiations

  • White Papers // Sep 2014

    Mobile Ad-hoc Network Performance Analysis: A Survey

    Wireless mobile ad hoc network in a sell organized network having dynamic topology and nodes uses shared channel with wireless links for communication with each other. In mobile environment, nodes can join and leave the network any time and there is no provision to monitor and control their activities. Due...

    Provided By Serials Publiations

  • White Papers // Sep 2014

    Conceptual Study of Agile Software Development

    In this paper, the authors consist of comparative study of agile processes. Agile processes have important applications in the areas of software project management, software schedule management, etc. In particular the aim of agile processes is to satisfy the customer, faster development times with lower defects rate. Agile development is...

    Provided By Serials Publiations

  • White Papers // Sep 2014

    Frequent Pattern mining Using Novel FP-Growth Approach

    With the advancement in technology, information is exponentially increasing day-by-day. With such abundant information, methods are required to analyze the welter of information and extract fruitful knowledge. With the help of data mining, information obtained can be used in a number of applications like product evaluations, medicine & science and...

    Provided By Serials Publiations

  • White Papers // Sep 2014

    An Improved Approach to Multibiometrics Security

    Unimodal systems use one biometric trait for authentication. Though unimodal systems enjoy the advantage of simplicity, yet there are some problems with these systems. To address these problems, multimodal systems are used, which combines the evidences of multiple traits. It will make the system more reliable and robust and thus...

    Provided By Serials Publiations

  • White Papers // Sep 2014

    Security of Remote Devices with Personal Identification Card using Biometrics

    In the present days the world has been relying upon the technology. The advancement in technology has gone to such a level that human being can't even expect a single day without it as human being has became habitual of these technology. Every part of the human life like medicinal,...

    Provided By Serials Publiations

  • White Papers // Sep 2014

    FLCPlus: A Light-Weight Open-Source Library In C++ For Fuzzy Logic Controller

    Recent trends in software development for intelligent control and robotics have invoked a lot of research organizations to work on them. The philosophy of open source and free software and hardware made research and development of new products became faster and much more efficient. One such intelligent control mechanism is...

    Provided By Serials Publiations

  • White Papers // Sep 2014

    Comparative Analysis of Ant-Based Technique with Primitive Approaches for Improvising End-To-End Delay Utilization Factor

    An ad hoc network is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any existing network infrastructure or centralized administration. In this paper, AntHocNet (AHN), an algorithm for routing in mobile ad hoc networks. It is a hybrid algorithm, which combines reactive path...

    Provided By Serials Publiations

  • White Papers // Sep 2014

    Self Determining Detection of Distributed Denial of Service Attacks

    Wireless sensor networks are mostly vulnerable to attacks. It's difficult to find/track attacker due to mobility. Indeed, the number of new attacks as well as their sophistication is continuously increasing. Diametrically opposite strategy has been studied in the last few years such as Unsupervised Anomaly Detection (UAD). UAD uses data...

    Provided By Serials Publiations

  • White Papers // Sep 2014

    Securing Biometric System using Multibiometrics

    A biometric system is a pattern recognition system that makes a personal verification and identification by establishing the authenticity on the basis of a particular physiological or behavioral characteristic possessed by the user. Biometrics provides a better solution for increased security requirements and privacy protection than traditional recognition methods such...

    Provided By Serials Publiations

  • White Papers // Sep 2014

    Adaptive Message Passing in Vehicular Ad-hoc Networks

    A Vehicular Ad-hoc NETwork, or VANET, is a form of mobile ad-hoc network, to provide communications among nearby vehicles and between vehicles and nearby fixed equipment, usually described as roadside equipment. VANET defines protocols for intelligent way of using vehicular network. A vehicle in VANET is a mobile node which...

    Provided By Serials Publiations

  • White Papers // Sep 2014

    Performance Evaluation of Ad-Hoc on-Demand Distance Vector Routing Protocol and its Multi-Path Variant AOMDV

    In this paper, the authors represent a simulation based comparison of two variants of a MANET routing protocol viz. ad-hoc on-demand distance vector. Simulation is through network simulator 2.35. Packet delivery ratio, average end to end delay and throughput have been used as comparison matrices. Simulation results shows, that AOMDV...

    Provided By Serials Publiations

  • White Papers // Sep 2014

    Enhancing the Lifetime of Wireless Sensor Networks and Balancing the Load Using LEACH Protocol and Iterative Deepening A Algorithm

    Wireless Sensor Networks (WSN) consists of number of autonomous sensor nodes which is to share and forward the information between source and destination without a need of mid-organizer. For designing a WSN's, the most important tribulations in its infrastructure is source boundaries and also the localization and power consumption are...

    Provided By Serials Publiations

  • White Papers // Sep 2014

    Security Model based on Network coding & Homomorphic Encryption for Content Distribution in VANET

    Vehicular Ad hoc NETworks (VANETs), which are the main focus of engineers yearning to turn cars into intelligent machines that communicate for safety and comfort purposes. Vehicular Ad-hoc NETworks (VANETs) have recently attracted extensive attentions as a promising technology for revolutionizing the transportation systems. VANETs consist of entities including infrastructure...

    Provided By Serials Publiations

  • White Papers // Sep 2014

    Vulnerability to Fingerprint Biometric Systems- An Overview

    A biometric is defined as a unique, measurable, biological characteristic or trait for automatically recognizing or verifying the identity of a human being. These days, biometric technologies are typically used to analyze human characteristics for security purposes. In spite of numerous advantages of biometric based personal authentication systems over traditional...

    Provided By Serials Publiations

  • White Papers // Sep 2014

    Survey on Software Quality Assurance

    Software Quality Assurance (SQA) contains of the complete software development process - observing and improving the process. It completely makes sure that any of the decided standards and measures is followed and make sure that errors are detected and solved. SQA is something aiming for the prevention and if accomplished...

    Provided By Serials Publiations

  • White Papers // Sep 2014

    Parallelization of Synthetic Aperture Radar (SAR) Imaging Algorithms on GPU

    The increased demand for higher resolution and detailed SAR imaging builds up a pressure on the processing power of the existing systems for real time or near real time processing. Exploitation of GPU processing power could suffice the increasing demands in processing. The processing of initial SAR systems was based...

    Provided By Serials Publiations

  • White Papers // Sep 2014

    Sentiment Analysis and Big Data Processing

    The explosion of Web 2.0 has led to increased activity in blogging, tagging, and contributing to RSS, social book-marking, and social networking. As a result there has been an eruption of interest in people to mine these vast resources of data to see it's sentiment. Sentiment analysis or opinion mining...

    Provided By Serials Publiations

  • White Papers // Sep 2014

    Randomness Analysis of A5/1 Stream Cipher for Secure Mobile Communication

    Information security over mobile communication networks is vital for secure communication. The GSM voice calls are encrypted using a family of algorithms cooperatively called A5. Global System for Mobile communication (GSM) uses A5/1 stream cipher in order to provide privacy on air communication. A5/1 algorithm uses LFSR to generate key...

    Provided By Serials Publiations

  • White Papers // Sep 2014

    Rapid and Compact Generic Binary-to-BCD Conversion Circuit for Less Powerful Computational Devices

    Conversion of binary representation into BCD is a very frequently used operation in modern computers due to the exponential increase in the demand for decimal arithmetic. Decimal data processing applications have developed exponentially in recent years thus increasing the need to have hardware support for decimal arithmetic. Most conversion algorithms...

    Provided By Serials Publiations

  • White Papers // Sep 2014

    A Comparative Study of Different Biometric Technologies

    Biometrics refers to the use of distinctive physiological (fingerprint, face, retina etc.) and behavioral (gait, signature etc.) characteristics for authentication. Every person has distinct physiological and behavioral characteristics. Traditional methods of establishing a person's identity include knowledge-based (e.g., passwords) and token-based (e.g., ID cards) mechanisms. These can easily be lost,...

    Provided By Serials Publiations

  • White Papers // Sep 2014

    Microcontroller Based Geo-Boundary Scanning System for Vehicle Security Using GPS-GSM Technology

    The vehicle security method has been proposed in this paper based on the GPS and GSM technology. The system has been considered for security of people's vehicles inside or outside the premises. The system based on a high performance eight bit microcontroller interfaced to a highly sensitive GPS module, a...

    Provided By Serials Publiations

  • White Papers // Sep 2014

    A Practical Model based Approach for Vehicle Security Using Global Positioning System and GSM Technology

    The safety of private and public vehicles is major concern now-a-days and GPS based vehicle security cum tracking system ensure their security and safety. Despite of various technologies that are floating in the global market to deter the car theft and tracking it, there are still some security gaps where...

    Provided By Serials Publiations

  • White Papers // Sep 2014

    A Prime Number based Framework for Frequent Pattern Mining

    One of the most popular data mining techniques is association rule mining. Frequent pattern mining is part of that. Plentiful literature dedicated to this paper and remarkable progress has been made, ranging from efficient and scalable algorithms for frequent pattern mining in transaction databases to various research frontiers. Starting from...

    Provided By Serials Publiations

  • White Papers // Sep 2014

    Agile Software Development Life Cycle in IT Industry

    Agility means to wipe away the heaviness that is present in the traditional software development methodologies and promote fast response to changing requirements. Agile Software Development(ASD) is a group of software development methods based on iterative and incremental development, where requirements and solutions evolve through collaboration between self-organizing and cross...

    Provided By Serials Publiations

  • White Papers // Sep 2014

    Study and Review of the Global System for Mobile Communications (GSM)

    In earlier period communication is integral part of the people society. Mobile communication can provide fastest growth to their telecommunication, GSM is a European mobile communication 900MHz band. GSM has provide various advance features to their telecommunication. In this paper, the authors can describe the phases, architecture and features of...

    Provided By Serials Publiations

  • White Papers // Sep 2014

    Study of Wireless Communication Technologies: Bluetooth, WI-FI, Cellular and WiMAX

    A rush forward of research activities in wireless communication has been seen in last decade. There are new points of view on how to communicate effectively over wireless channels from this research drive. This paper is to study the basics as well as new research developments. The authors studied four...

    Provided By Serials Publiations

  • White Papers // Sep 2014

    Analysis of Cryptography Techniques

    Today, the information is a large source and the security of that information is a major challenge. The generation doesn't care that how many techniques are available for transferring the data but they only care about the security of their information. Everyone wants their information to remain secured. While thinking...

    Provided By Serials Publiations

  • White Papers // Sep 2014

    A Survey on Peer-to-Peer File Sharing using Network Coding in Delay Tolerant Networks

    Peer-to-peer file sharing using network coding for Delay Tolerant Network (DTN) is becoming increasingly popular. However, the transmission of file is very challenging because of the time-varying and unreliable wireless channels, no end-to-end connectivity, and system performance in terms of throughput, reliability, link stress and frequent peer join and leave...

    Provided By Serials Publiations

  • White Papers // Jun 2014

    Literature Review of Worldwide Interoperability of Microwave Access (WiMax) Technology

    WiMAX stands for World-wide interoperability of Microwave Access. Along with the development of mobile communication and broadband technology, WiMax has become a hot spot for global telecom operators and manufacturers. WiMAX promises to deliver the Internet throughout the globe, and connect the \"Last mile\" of broadband wireless connectivity services. WiMAX...

    Provided By Serials Publiations

  • White Papers // Jun 2014

    Cryptography by Swapping Bits: Algorithm SKG 2.0

    The Internet technology is being used almost in every field. The security and originality of data has now become very challenging. So it is not safe to send confidential data from one computer to another computer. The confidential data may be bank statements, bank transaction, military information, confidential data of...

    Provided By Serials Publiations

  • White Papers // Jun 2014

    An Integrated Symmetric Key Cryptosystem: Algorithm SKG 1.1

    With the increased use of technology specially internet, it is not safe to send confidential data from one computer to another computer. The confidential data may be bank statements, bank transaction, military information, confidential data of companies etc. Hence the data should be protected from any unwanted intruder otherwise any...

    Provided By Serials Publiations

  • White Papers // Jun 2014

    Secure Identity using Multimodal Biometrics

    Unimodal biometric systems have to contend with a variety of problems such as noisy data, intra-class variations, restricted degrees of freedom, non-universality, spoof attacks, and unacceptable error rates. Multimodal biometric systems elegantly address several of these problems present in unimodal systems. By combining multiple sources of information, such as palm...

    Provided By Serials Publiations

  • White Papers // Jun 2014

    Protecting Identity using Multimodal Biometrics

    Multimodal biometric systems elegantly address several of these problems present in unimodal systems. By combining multiple sources of information, such as palm print and hand geometry, face and fingerprints, face and ear biometric, these systems improve matching performance, increase population coverage, deter spoofing, and facilitate indexing. Various fusion levels and...

    Provided By Serials Publiations

  • White Papers // Jun 2014

    Compendium of Software Cost and Effort Estimation Techniques

    In software cost and effort estimation is a very vital task in the software industry. It involves in estimating the effort and cost in terms of money to complete the project on-time and in on-schedule. This paper gives the bird's eye view about the software effort estimation techniques which will...

    Provided By Serials Publiations

  • White Papers // Jun 2014

    Implementation of Two Steps Clustering Using Telecommunication System

    Clusters define in a similar mode as \"Continuous regions of space containing a relatively high density of points, separated from other such regions by regions containing a relatively low density of points\". The goal of clustering methods is to extract an existing 'Natural' cluster structure. However, different methods may come...

    Provided By Serials Publiations

  • White Papers // Jun 2011

    A Novel Approach of Broadcasting in AODV Routing Protocol of MANETs

    A Mobile Ad hoc NETwork (MANET) is a special type of wireless mobile network which forms a temporary network without the aid of an established infrastructure or a centralized administration. Each node in MANET is a router. If a source node is unable to send a message directly to its...

    Provided By Serials Publiations

  • White Papers // Jun 2014

    Literature Review of Worldwide Interoperability of Microwave Access (WiMax) Technology

    WiMAX stands for World-wide interoperability of Microwave Access. Along with the development of mobile communication and broadband technology, WiMax has become a hot spot for global telecom operators and manufacturers. WiMAX promises to deliver the Internet throughout the globe, and connect the \"Last mile\" of broadband wireless connectivity services. WiMAX...

    Provided By Serials Publiations

  • White Papers // Jun 2014

    Cryptography by Swapping Bits: Algorithm SKG 2.0

    The Internet technology is being used almost in every field. The security and originality of data has now become very challenging. So it is not safe to send confidential data from one computer to another computer. The confidential data may be bank statements, bank transaction, military information, confidential data of...

    Provided By Serials Publiations

  • White Papers // Jun 2014

    An Integrated Symmetric Key Cryptosystem: Algorithm SKG 1.1

    With the increased use of technology specially internet, it is not safe to send confidential data from one computer to another computer. The confidential data may be bank statements, bank transaction, military information, confidential data of companies etc. Hence the data should be protected from any unwanted intruder otherwise any...

    Provided By Serials Publiations

  • White Papers // Jun 2014

    Secure Identity using Multimodal Biometrics

    Unimodal biometric systems have to contend with a variety of problems such as noisy data, intra-class variations, restricted degrees of freedom, non-universality, spoof attacks, and unacceptable error rates. Multimodal biometric systems elegantly address several of these problems present in unimodal systems. By combining multiple sources of information, such as palm...

    Provided By Serials Publiations

  • White Papers // Jun 2014

    Protecting Identity using Multimodal Biometrics

    Multimodal biometric systems elegantly address several of these problems present in unimodal systems. By combining multiple sources of information, such as palm print and hand geometry, face and fingerprints, face and ear biometric, these systems improve matching performance, increase population coverage, deter spoofing, and facilitate indexing. Various fusion levels and...

    Provided By Serials Publiations

  • White Papers // Jun 2014

    Compendium of Software Cost and Effort Estimation Techniques

    In software cost and effort estimation is a very vital task in the software industry. It involves in estimating the effort and cost in terms of money to complete the project on-time and in on-schedule. This paper gives the bird's eye view about the software effort estimation techniques which will...

    Provided By Serials Publiations

  • White Papers // Jun 2014

    Implementation of Two Steps Clustering Using Telecommunication System

    Clusters define in a similar mode as \"Continuous regions of space containing a relatively high density of points, separated from other such regions by regions containing a relatively low density of points\". The goal of clustering methods is to extract an existing 'Natural' cluster structure. However, different methods may come...

    Provided By Serials Publiations

  • White Papers // Jun 2014

    TCP Traffic Based Performance Investigations of MANET Routing Protocols Using NS2.35

    An ad-hoc network is a dynamically changing network of mobile devices that communicate without the support of a fixed structure. TCP is a connection oriented transport protocol that provides reliable, in-order delivery of data to the TCP receiver. Hence, its use over mobile ad-hoc networks is a certainty. This paper...

    Provided By Serials Publiations

  • White Papers // Jun 2013

    Mechanism for Detection and Reaction Wormhole Attack in AODV

    The lack of centralized infrastructure in ad hoc network makes it vulnerable to various attacks. MANET routing disrupts if participating node do not perform its intended function and start performing malicious activity. A specific attack called Wormhole attack enables an attacker to record packets at one location in the network,...

    Provided By Serials Publiations

  • White Papers // Jun 2013

    Secutrity Issues in Wireless Sensor Networks

    Wireless sensor networks is a grouping of wireless networking and entrenched system technology that monitors physical or environmental situation, such as temperature, sound, quivering, strain, motion or pollutant, at different locations and a spoofing attack is a one of the most common online attack in which one person or program...

    Provided By Serials Publiations

  • White Papers // Sep 2012

    Dual Band Microstrip Patch Antenna for GSM and WiMAX Application

    Microstrip patch antennas have been widely used in a various useful applications, due to their low weight and low profile conformability, easy and cheap realization. In this paper, an attempt has been made to investigate new microstrip antenna structure for GSM 1800 band and WiMAX system applications. CST MWS and...

    Provided By Serials Publiations

  • White Papers // Sep 2012

    Security Risk Management with Networked Information System: A Review

    Nonprofits aren't immune to \"Network Security\", computers are making crime easier at nonprofit organizations. Network security is a branch of technology known as information security as applied to computers and networks. The term computer system security means the collective processes and mechanism by which sensitive and valuable information and services...

    Provided By Serials Publiations

  • White Papers // Dec 2012

    Implementation of PWM Technique Using Artificial Neural Networks over Wireless Medium

    An Artificial Neural Network (ANN) is a flexible mathematical structure which is capable of identifying complex nonlinear relationships between input and output data sets. The proposed paper is one such attempt of implementing a PWM technique using artificial neural network schema. In this paper, a three dimensional accelerometer and a...

    Provided By Serials Publiations

  • White Papers // May 2012

    Oscillation-Based Test Technique for Analog Cores in Mixed-Signal Integrated Circuits Using the Field Programmable Analog Array Technology

    Modern System-on-Chip (SoC) designs are increasingly mixed-signal Very Large Scale Integrated (VLSI) designs that require efficient design and testing methodologies to manage the design complexity and the time-to-market constraints. Also, in mixed-signal Integrated Circuits (ICs), testing analog cores is the most difficult task and it's one of the major cost...

    Provided By Serials Publiations

  • White Papers // Sep 2014

    A Mobility Aware Algorithm to Manage Network Performance over Mobile Ad-Hoc Network

    Over the past decade or so, there has been rapid growth in wireless and mobile applications technologies. More recently, an increasing emphasis has been on the potential of infrastructure less wireless mobile networks that are easy, fast and inexpensive to set up, with the view that such technologies will enable...

    Provided By Serials Publiations

  • White Papers // Sep 2014

    Fingerprint Matching Using Minutiae Points

    This is a crucial stage as one needs to extract the right features in optimal way. Image or vector of the numbers with specific properties is used for creating template. Fingerprints are rich in details called minutiae, which can be used as identification marks for fingerprint verification. This paper is...

    Provided By Serials Publiations

  • White Papers // Sep 2014

    ETL-Extract, Transform & Load Testing

    Data is most important part in any organization. Data is backbone of any report and reports are the baseline on which all the vital management decisions are taken. Most of the companies are constructing their data warehouse to store and monitor real time data as well as historical data. Many...

    Provided By Serials Publiations

  • White Papers // Sep 2013

    QOS Estimation of IEEE 802.3 Under the Influence of Intra- Domain Routing Protocols

    With the growing need to distribute applications across multiple networks and the availability of high capacity, high-performance intermediate switching nodes and networks, an efficient routing mechanism has become the core requirement. This paper evaluates the various performance parameters of IEEE 802.3 LAN including network convergence time, end to end delay,...

    Provided By Serials Publiations

  • White Papers // Dec 2013

    Wide Bandwidth Slotted Microstrip Patch Antenna for Wireless Applications

    For many applications microstrip antenna is well suited because of its properties like lightweight, planar structure and ease of fabricating but has limitation of low band width. In this paper, a design technique for enhancing bandwidth of microstrip patch antenna is proposed. Improvement in bandwidth is obtained by using slots...

    Provided By Serials Publiations

  • White Papers // Dec 2013

    IP Based Distributed Smart Camera Surveillance System for Forest Application

    Real time video surveillance is becoming increasingly important in forest security. Many efforts have been made in this field, to detect and track the human and human activities in scene and recognize simple motion such as walking and running. This paper presents a real time video surveillance system with distributed...

    Provided By Serials Publiations

  • White Papers // Jun 2013

    Various Antennas and Its Applications in Wireless Domain: A Review Paper

    In this paper, the authors present some details on antenna theory and discuss various antenna types and applications in wireless domain. The fundamental equations and principles of antenna theory are also discussed. Five different types of antennas are presented: dipoles and monopoles, loop antennas, patch antennas, helical antennas and horn...

    Provided By Serials Publiations

  • White Papers // Jun 2013

    Dual Stubs U Slot Loaded Penta Band Rectangular Microstrip Antenna for WLAN and WiMax Applications

    In this paper, a novel dual open stub U slots loaded rectangular microstrip antenna is presented for penta band and compact operation. The presented antenna design has a volume of 8

    Provided By Serials Publiations

  • White Papers // Jun 2013

    A Novel Technique of Performance Analysis and Improvement of Public-Key Cryptosystem

    Internet is the worldwide, publicly accessible network of interconnected computers consisting of the normal and malicious users; it may be difficult to distinguish the legal and illegitimates user. The malicious user could, for example, try to generate false messages, eavesdrop messages or try to block the legal user's availability to...

    Provided By Serials Publiations

  • White Papers // Jun 2013

    Effect of Mobility and Node Density on the Performance of Routing Protocols in VANETs Using Intelligent Driver Model

    Due to high mobility and unpredictable movement of nodes, Vehicular Ad hoc NETworks (VANETs) are distinguished from Mobile Ad hoc NETworks (MANETs). This paper tests routing protocols namely Ad hoc On-demand Distance Vector (AODV), Ad hoc On-demand Multipath Distance Vector (AOMDV), Dynamic Source Routing (DSR) and Destination Sequence Distance Vector...

    Provided By Serials Publiations

  • White Papers // Mar 2013

    Augmenting Mobility Model Algorithms

    A Mobile Ad-hoc NETwork (MANET) is a collection of an infrastructure less self organized network of flexible wireless nodes without a centralized control or infrastructure. Many wireless networking problems have to be solved for the efficient design and deployment of these communications devices that operate in a Mobile Ad-hoc NETwork...

    Provided By Serials Publiations

  • White Papers // Jun 2014

    Implementation of MATLAB-GUI based Fuzzy Logic Controllers for Liquid Level Control System

    In this paper, the authors present the design and implementation of MATLAB Graphical User Interface (GUI) based fuzzy and Integrated Fuzzy Logic Controllers (IFLC) for liquid level control system. The control algorithms are developed in MATLAB. The fuzzy tool box in MATLAB is used to design fuzzy logic controller. An...

    Provided By Serials Publiations

  • White Papers // Jun 2014

    Information Security Using Controlled NOT Gate : Algorithm SKG 3.00

    In this paper, the author has introduced a unique cryptographic method, called algorithm SKG 3.00, for data encryption and decryption of any text file at four stages first, by converting each character into corresponding binary code using 8-bit ASCII code thus the authors get 8N bits for a text of...

    Provided By Serials Publiations

  • White Papers // Jun 2014

    Adaptive MIMO-OFDM Technology for 4G & Study of 4G Communication for Social Networks

    Modern communication protocols often require very complex and time-consuming operations. The communication industry is one of the fastest growing industries. The cellular systems started in the 80's with 1G have now reached to 4G. The growing demand of high data rates are increasing exponentially with time. The typical goals of...

    Provided By Serials Publiations

  • White Papers // Jun 2014

    Investigating Dielectric Materials for U-KOCH Micro-strip Antenna for Wireless Application

    Low cost, low profile, small volumes of microstrip antenna has made their presence in real world application. A low-cost multiband Printed-Circuit-Board (PCB) antenna that employs Koch fractal geometry will be studied. The proposed antenna will be simulated using the finite-element method for three different dielectric materials and the return loss...

    Provided By Serials Publiations

  • White Papers // Jun 2014

    E-Shaped Microstrip Antenna Array With Improved Gain for Wireless Applications

    Because of the booming demand in wireless communication system applications, micro strip patch antennas have attracted much interest due to their low profile, light weight, ease of fabrication and compatibility with printed circuits. E-shaped microstrip antenna array operating at 2.4 GHz. Design antenna is found to possess predictable high gain...

    Provided By Serials Publiations

  • White Papers // Jun 2014

    A Review on Optimizing COCOTS Model in Component Based Software Engineering Approach

    The field of software engineering and software technology is developing very fast. That is, the authors introduce new concepts, methods, techniques and tools - or change existing ones and emphasize their value. A major turn in software engineering leading to component ware has dramatically changed the shape of software development....

    Provided By Serials Publiations

  • White Papers // Jun 2014

    Survey of Meta Clustering Algorithm

    Meta clustering is a clustering of clustering's that groups similar base-level clustering's together, clustering algorithm belonging to the domain of soft computing. Meta clustering algorithm is using applications of fuzzy c-means algorithm to create soft clustering. Fuzzy c-means is a prominent example for such soft computing clustering algorithms with many...

    Provided By Serials Publiations

  • White Papers // Jun 2014

    Comparison of Random Based Mobility Model using TCP Traffic for AODV and DSDV MANET's Routing Protocols

    In Mobile Ad hoc NETwork (MANETS), no fixed infrastructure is available. Different wireless hosts are free to move from one location to another without any centralized administration, so, the topology changes rapidly or unpredictably. Every node operates as router as well as an end system. Routing in MANETs has been...

    Provided By Serials Publiations

  • White Papers // Jun 2014

    A Survey on Optimization of APRIORI Algorithm for high Performance

    There are several mining algorithms of association rules. One of the most popular algorithms is Apriori that is used to extract frequent itemsets from large database. Based on this algorithm, this paper indicates the limitation of the original Apriori algorithm of wasting time for scanning the whole database searching on...

    Provided By Serials Publiations

  • White Papers // Jun 2014

    Enhancing security by Authenticating the Diffie-Hellman Key Exchange Algorithm using RSA

    The ability to distribute cryptographic keys has been a challenge for centuries. The Diffie-Hellman was the first practical solution to the problem. Diffie-Hellman is designed to provide two systems to share a secret key that can be used later. However, if the key exchange takes place in certain mathematical environment...

    Provided By Serials Publiations

  • White Papers // Jun 2014

    Routing Information Protocol Using OPNET

    The increasing demand of computer communication networks are growing rapidly day-by-day. With the growing need to distribute applications across multiple networks and the availability of high capacity, high-performance intermediate switching nodes, and networks, an efficient routing mechanism has become the core requirement. This paper primarily focuses on the design and...

    Provided By Serials Publiations

  • White Papers // Jun 2014

    Literature Review of Wide band Code Division Multiple Access (WCDMA)

    Wide band Code Division Multiple Access (WCDMA) is the third generation air interface application which is widely used in present. As the result of this technology communication over network increased. In this paper, the authors will study about how the communication process improves in compression to last years. This paper...

    Provided By Serials Publiations

  • White Papers // Sep 2013

    Analysis and Implementation of Improved - LEACH Protocol for Wireless Sensor Network (I-LEACH)

    In the Wireless Sensor Networks (WSNs), the sensor nodes (called motes) are usually scattered in a sensor field an area in which the sensor nodes are deployed. These motes are small in size and have limited processing power, memory and battery life. The motes in these networks are coordinate to...

    Provided By Serials Publiations

  • White Papers // Sep 2013

    An Enhanced Approach in Data Mining for Outlier Detection Based on Local Outlier Factor (LOF)

    The detection of outliers has recently become a very significant problem criterion in many commercial applications. This problem is further difficult by the fact that in many cases, the difference between outliers and normal data is very much unclear. In this paper, a modified approach for LOF (Local Outlier Factor)...

    Provided By Serials Publiations