Serials Publiations

Displaying 1-40 of 151 results

  • White Papers // Sep 2014

    A Mobility Aware Algorithm to Manage Network Performance over Mobile Ad-Hoc Network

    Over the past decade or so, there has been rapid growth in wireless and mobile applications technologies. More recently, an increasing emphasis has been on the potential of infrastructure less wireless mobile networks that are easy, fast and inexpensive to set up, with the view that such technologies will enable...

    Provided By Serials Publiations

  • White Papers // Sep 2014

    Fingerprint Matching Using Minutiae Points

    This is a crucial stage as one needs to extract the right features in optimal way. Image or vector of the numbers with specific properties is used for creating template. Fingerprints are rich in details called minutiae, which can be used as identification marks for fingerprint verification. This paper is...

    Provided By Serials Publiations

  • White Papers // Sep 2014

    ETL-Extract, Transform & Load Testing

    Data is most important part in any organization. Data is backbone of any report and reports are the baseline on which all the vital management decisions are taken. Most of the companies are constructing their data warehouse to store and monitor real time data as well as historical data. Many...

    Provided By Serials Publiations

  • White Papers // Sep 2014

    Securing Biometric System using Multibiometrics

    A biometric system is a pattern recognition system that makes a personal verification and identification by establishing the authenticity on the basis of a particular physiological or behavioral characteristic possessed by the user. Biometrics provides a better solution for increased security requirements and privacy protection than traditional recognition methods such...

    Provided By Serials Publiations

  • White Papers // Sep 2014

    Adaptive Message Passing in Vehicular Ad-hoc Networks

    A Vehicular Ad-hoc NETwork, or VANET, is a form of mobile ad-hoc network, to provide communications among nearby vehicles and between vehicles and nearby fixed equipment, usually described as roadside equipment. VANET defines protocols for intelligent way of using vehicular network. A vehicle in VANET is a mobile node which...

    Provided By Serials Publiations

  • White Papers // Sep 2014

    Performance Evaluation of Ad-Hoc on-Demand Distance Vector Routing Protocol and its Multi-Path Variant AOMDV

    In this paper, the authors represent a simulation based comparison of two variants of a MANET routing protocol viz. ad-hoc on-demand distance vector. Simulation is through network simulator 2.35. Packet delivery ratio, average end to end delay and throughput have been used as comparison matrices. Simulation results shows, that AOMDV...

    Provided By Serials Publiations

  • White Papers // Sep 2014

    Enhancing the Lifetime of Wireless Sensor Networks and Balancing the Load Using LEACH Protocol and Iterative Deepening A Algorithm

    Wireless Sensor Networks (WSN) consists of number of autonomous sensor nodes which is to share and forward the information between source and destination without a need of mid-organizer. For designing a WSN's, the most important tribulations in its infrastructure is source boundaries and also the localization and power consumption are...

    Provided By Serials Publiations

  • White Papers // Sep 2014

    Security Model based on Network coding & Homomorphic Encryption for Content Distribution in VANET

    Vehicular Ad hoc NETworks (VANETs), which are the main focus of engineers yearning to turn cars into intelligent machines that communicate for safety and comfort purposes. Vehicular Ad-hoc NETworks (VANETs) have recently attracted extensive attentions as a promising technology for revolutionizing the transportation systems. VANETs consist of entities including infrastructure...

    Provided By Serials Publiations

  • White Papers // Sep 2014

    Vulnerability to Fingerprint Biometric Systems- An Overview

    A biometric is defined as a unique, measurable, biological characteristic or trait for automatically recognizing or verifying the identity of a human being. These days, biometric technologies are typically used to analyze human characteristics for security purposes. In spite of numerous advantages of biometric based personal authentication systems over traditional...

    Provided By Serials Publiations

  • White Papers // Sep 2014

    Survey on Software Quality Assurance

    Software Quality Assurance (SQA) contains of the complete software development process - observing and improving the process. It completely makes sure that any of the decided standards and measures is followed and make sure that errors are detected and solved. SQA is something aiming for the prevention and if accomplished...

    Provided By Serials Publiations

  • White Papers // Sep 2014

    Parallelization of Synthetic Aperture Radar (SAR) Imaging Algorithms on GPU

    The increased demand for higher resolution and detailed SAR imaging builds up a pressure on the processing power of the existing systems for real time or near real time processing. Exploitation of GPU processing power could suffice the increasing demands in processing. The processing of initial SAR systems was based...

    Provided By Serials Publiations

  • White Papers // Sep 2014

    Sentiment Analysis and Big Data Processing

    The explosion of Web 2.0 has led to increased activity in blogging, tagging, and contributing to RSS, social book-marking, and social networking. As a result there has been an eruption of interest in people to mine these vast resources of data to see it's sentiment. Sentiment analysis or opinion mining...

    Provided By Serials Publiations

  • White Papers // Sep 2014

    Randomness Analysis of A5/1 Stream Cipher for Secure Mobile Communication

    Information security over mobile communication networks is vital for secure communication. The GSM voice calls are encrypted using a family of algorithms cooperatively called A5. Global System for Mobile communication (GSM) uses A5/1 stream cipher in order to provide privacy on air communication. A5/1 algorithm uses LFSR to generate key...

    Provided By Serials Publiations

  • White Papers // Sep 2014

    Rapid and Compact Generic Binary-to-BCD Conversion Circuit for Less Powerful Computational Devices

    Conversion of binary representation into BCD is a very frequently used operation in modern computers due to the exponential increase in the demand for decimal arithmetic. Decimal data processing applications have developed exponentially in recent years thus increasing the need to have hardware support for decimal arithmetic. Most conversion algorithms...

    Provided By Serials Publiations

  • White Papers // Sep 2014

    A Comparative Study of Different Biometric Technologies

    Biometrics refers to the use of distinctive physiological (fingerprint, face, retina etc.) and behavioral (gait, signature etc.) characteristics for authentication. Every person has distinct physiological and behavioral characteristics. Traditional methods of establishing a person's identity include knowledge-based (e.g., passwords) and token-based (e.g., ID cards) mechanisms. These can easily be lost,...

    Provided By Serials Publiations

  • White Papers // Sep 2014

    Microcontroller Based Geo-Boundary Scanning System for Vehicle Security Using GPS-GSM Technology

    The vehicle security method has been proposed in this paper based on the GPS and GSM technology. The system has been considered for security of people's vehicles inside or outside the premises. The system based on a high performance eight bit microcontroller interfaced to a highly sensitive GPS module, a...

    Provided By Serials Publiations

  • White Papers // Sep 2014

    A Practical Model based Approach for Vehicle Security Using Global Positioning System and GSM Technology

    The safety of private and public vehicles is major concern now-a-days and GPS based vehicle security cum tracking system ensure their security and safety. Despite of various technologies that are floating in the global market to deter the car theft and tracking it, there are still some security gaps where...

    Provided By Serials Publiations

  • White Papers // Sep 2014

    A Prime Number based Framework for Frequent Pattern Mining

    One of the most popular data mining techniques is association rule mining. Frequent pattern mining is part of that. Plentiful literature dedicated to this paper and remarkable progress has been made, ranging from efficient and scalable algorithms for frequent pattern mining in transaction databases to various research frontiers. Starting from...

    Provided By Serials Publiations

  • White Papers // Sep 2014

    Agile Software Development Life Cycle in IT Industry

    Agility means to wipe away the heaviness that is present in the traditional software development methodologies and promote fast response to changing requirements. Agile Software Development(ASD) is a group of software development methods based on iterative and incremental development, where requirements and solutions evolve through collaboration between self-organizing and cross...

    Provided By Serials Publiations

  • White Papers // Sep 2014

    Study and Review of the Global System for Mobile Communications (GSM)

    In earlier period communication is integral part of the people society. Mobile communication can provide fastest growth to their telecommunication, GSM is a European mobile communication 900MHz band. GSM has provide various advance features to their telecommunication. In this paper, the authors can describe the phases, architecture and features of...

    Provided By Serials Publiations

  • White Papers // Sep 2014

    Study of Wireless Communication Technologies: Bluetooth, WI-FI, Cellular and WiMAX

    A rush forward of research activities in wireless communication has been seen in last decade. There are new points of view on how to communicate effectively over wireless channels from this research drive. This paper is to study the basics as well as new research developments. The authors studied four...

    Provided By Serials Publiations

  • White Papers // Sep 2014

    Analysis of Cryptography Techniques

    Today, the information is a large source and the security of that information is a major challenge. The generation doesn't care that how many techniques are available for transferring the data but they only care about the security of their information. Everyone wants their information to remain secured. While thinking...

    Provided By Serials Publiations

  • White Papers // Sep 2014

    A Survey on Peer-to-Peer File Sharing using Network Coding in Delay Tolerant Networks

    Peer-to-peer file sharing using network coding for Delay Tolerant Network (DTN) is becoming increasingly popular. However, the transmission of file is very challenging because of the time-varying and unreliable wireless channels, no end-to-end connectivity, and system performance in terms of throughput, reliability, link stress and frequent peer join and leave...

    Provided By Serials Publiations

  • White Papers // Sep 2014

    FPGAC: - High Level Synthesis Tool

    The rapidly increasing System-on-Chip (SoC) complexity is forcing researchers to shift from RTL and raise the level of abstraction, i.e. opting for High Level Synthesis (HLS). Despite failures of starting generations of commercial high level synthesis tools. The authors strongly believe that current time is turning point for shifting to...

    Provided By Serials Publiations

  • White Papers // Sep 2014

    A Composite Approach for Biometric Template Security

    Biometrics is used for authentication by means of physical or behavioral characteristics of user. It can be divided into unimodal biometric and multimodal biometric. But unimodal biometrics is not much secure as it have some problems like noisy data, spoof attacks etc. So the authors use multimodal biometrics for more...

    Provided By Serials Publiations

  • White Papers // Sep 2014

    Mobile Ad-hoc Network Performance Analysis: A Survey

    Wireless mobile ad hoc network in a sell organized network having dynamic topology and nodes uses shared channel with wireless links for communication with each other. In mobile environment, nodes can join and leave the network any time and there is no provision to monitor and control their activities. Due...

    Provided By Serials Publiations

  • White Papers // Sep 2014

    Conceptual Study of Agile Software Development

    In this paper, the authors consist of comparative study of agile processes. Agile processes have important applications in the areas of software project management, software schedule management, etc. In particular the aim of agile processes is to satisfy the customer, faster development times with lower defects rate. Agile development is...

    Provided By Serials Publiations

  • White Papers // Sep 2014

    Frequent Pattern mining Using Novel FP-Growth Approach

    With the advancement in technology, information is exponentially increasing day-by-day. With such abundant information, methods are required to analyze the welter of information and extract fruitful knowledge. With the help of data mining, information obtained can be used in a number of applications like product evaluations, medicine & science and...

    Provided By Serials Publiations

  • White Papers // Sep 2014

    An Improved Approach to Multibiometrics Security

    Unimodal systems use one biometric trait for authentication. Though unimodal systems enjoy the advantage of simplicity, yet there are some problems with these systems. To address these problems, multimodal systems are used, which combines the evidences of multiple traits. It will make the system more reliable and robust and thus...

    Provided By Serials Publiations

  • White Papers // Sep 2014

    Security of Remote Devices with Personal Identification Card using Biometrics

    In the present days the world has been relying upon the technology. The advancement in technology has gone to such a level that human being can't even expect a single day without it as human being has became habitual of these technology. Every part of the human life like medicinal,...

    Provided By Serials Publiations

  • White Papers // Sep 2014

    FLCPlus: A Light-Weight Open-Source Library In C++ For Fuzzy Logic Controller

    Recent trends in software development for intelligent control and robotics have invoked a lot of research organizations to work on them. The philosophy of open source and free software and hardware made research and development of new products became faster and much more efficient. One such intelligent control mechanism is...

    Provided By Serials Publiations

  • White Papers // Sep 2014

    Comparative Analysis of Ant-Based Technique with Primitive Approaches for Improvising End-To-End Delay Utilization Factor

    An ad hoc network is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any existing network infrastructure or centralized administration. In this paper, AntHocNet (AHN), an algorithm for routing in mobile ad hoc networks. It is a hybrid algorithm, which combines reactive path...

    Provided By Serials Publiations

  • White Papers // Sep 2014

    Self Determining Detection of Distributed Denial of Service Attacks

    Wireless sensor networks are mostly vulnerable to attacks. It's difficult to find/track attacker due to mobility. Indeed, the number of new attacks as well as their sophistication is continuously increasing. Diametrically opposite strategy has been studied in the last few years such as Unsupervised Anomaly Detection (UAD). UAD uses data...

    Provided By Serials Publiations

  • White Papers // Jun 2014

    Literature Review of Worldwide Interoperability of Microwave Access (WiMax) Technology

    WiMAX stands for World-wide interoperability of Microwave Access. Along with the development of mobile communication and broadband technology, WiMax has become a hot spot for global telecom operators and manufacturers. WiMAX promises to deliver the Internet throughout the globe, and connect the \"Last mile\" of broadband wireless connectivity services. WiMAX...

    Provided By Serials Publiations

  • White Papers // Jun 2014

    Cryptography by Swapping Bits: Algorithm SKG 2.0

    The Internet technology is being used almost in every field. The security and originality of data has now become very challenging. So it is not safe to send confidential data from one computer to another computer. The confidential data may be bank statements, bank transaction, military information, confidential data of...

    Provided By Serials Publiations

  • White Papers // Jun 2014

    An Integrated Symmetric Key Cryptosystem: Algorithm SKG 1.1

    With the increased use of technology specially internet, it is not safe to send confidential data from one computer to another computer. The confidential data may be bank statements, bank transaction, military information, confidential data of companies etc. Hence the data should be protected from any unwanted intruder otherwise any...

    Provided By Serials Publiations

  • White Papers // Jun 2014

    Secure Identity using Multimodal Biometrics

    Unimodal biometric systems have to contend with a variety of problems such as noisy data, intra-class variations, restricted degrees of freedom, non-universality, spoof attacks, and unacceptable error rates. Multimodal biometric systems elegantly address several of these problems present in unimodal systems. By combining multiple sources of information, such as palm...

    Provided By Serials Publiations

  • White Papers // Jun 2014

    Protecting Identity using Multimodal Biometrics

    Multimodal biometric systems elegantly address several of these problems present in unimodal systems. By combining multiple sources of information, such as palm print and hand geometry, face and fingerprints, face and ear biometric, these systems improve matching performance, increase population coverage, deter spoofing, and facilitate indexing. Various fusion levels and...

    Provided By Serials Publiations

  • White Papers // Jun 2014

    Compendium of Software Cost and Effort Estimation Techniques

    In software cost and effort estimation is a very vital task in the software industry. It involves in estimating the effort and cost in terms of money to complete the project on-time and in on-schedule. This paper gives the bird's eye view about the software effort estimation techniques which will...

    Provided By Serials Publiations

  • White Papers // Jun 2014

    Implementation of Two Steps Clustering Using Telecommunication System

    Clusters define in a similar mode as \"Continuous regions of space containing a relatively high density of points, separated from other such regions by regions containing a relatively low density of points\". The goal of clustering methods is to extract an existing 'Natural' cluster structure. However, different methods may come...

    Provided By Serials Publiations

  • White Papers // Jun 2011

    A Novel Approach of Broadcasting in AODV Routing Protocol of MANETs

    A Mobile Ad hoc NETwork (MANET) is a special type of wireless mobile network which forms a temporary network without the aid of an established infrastructure or a centralized administration. Each node in MANET is a router. If a source node is unable to send a message directly to its...

    Provided By Serials Publiations

  • White Papers // Nov 2011

    Performance of Two-Level Two Pulse Position Modulation Scheme in Optical Communication

    This paper investigates a new modulation scheme to achieve good power and spectral efficiencies with a coded modulation system. For IM/DD in optical Communication, PPM and MPPM have good power efficiencies but low spectral efficiencies. On the other hand, PAM achieves excellent spectral efficiencies. This new modulation scheme combines multiple...

    Provided By Serials Publiations

  • White Papers // Nov 2011

    Review of Various QoS Multiple Paths/Trees Based Routing Protocols in Mobile Ad-Hoc Network

    Mobile Ad-hoc NETwork (MANET) is a collection of mobile wireless nodes, in which the communication is carried out without any centralized control. MANET is a self organized, self configurable network having no infrastructure, and in which the mobile nodes move arbitrarily. Routing is a critical issue and an efficient routing...

    Provided By Serials Publiations

  • White Papers // Nov 2011

    Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network

    Ad hoc network is a collection of nodes which move independently and freely to communicate with other node through wireless links. These networks are logically represented as a set of clusters by grouping nodes which are in close proximity with one another. Clusterheads form the backbone and this clusterhead is...

    Provided By Serials Publiations

  • White Papers // Nov 2011

    Signal Intensity in Optical Fibers Under the Influence of Dispersion and Non Linearity

    Focus on development of broadband optical communication systems is incredible since it offers combination of wide bandwidth and low losses unmatched by any other transmission medium, but group velocity dispersion and fiber non linearities remain inherent limitations of such systems there by degrading the performance. Fiber non linearity have become...

    Provided By Serials Publiations

  • White Papers // Nov 2011

    Error Probability of RS Code Over Wireless Channel

    Reed-Solomon codes are an important class of error correcting codes used in many applications related to communications and digital storage. The fundamental operations in Reed-Solomon encoding and decoding involve Galois field arithmetic. Computer simulation tool, MATLAB is used to create and run extensively the entire simulation model for performance evaluation....

    Provided By Serials Publiations

  • White Papers // Nov 2011

    Research Survey of Load Balancing Clusters in Wireless Adhoc Network

    Wireless Ad hoc network is a combination of nodes that move freely and communicate with other nodes in wireless network. Most of the nodes may be identical in their capabilities, but some nodes are selected to form the backbone of wireless network. These nodes are known as clusterheads. The wireless...

    Provided By Serials Publiations

  • White Papers // Apr 2012

    Design of a Special Shaped Microstrip Antenna With Wide Band Characteristics

    Conformal antenna will play a vital role in near future in various applications such as high speed aircraft, missiles, airplanes, satellites etc. In this paper a special shaped conformal microstrip antenna has been proposed with wideband characteristics. This antenna can be used for 4.19-5.20 GHz, 5.70-6.22 GHz, 8.04-8.81 GHz and...

    Provided By Serials Publiations

  • White Papers // Apr 2012

    Design of Aperture Coupled Micro-Strip Patch Antenna for Wireless Communication Applications at 10Ghz (X BAND)

    In this paper, a simple aperture coupled microstrip antenna at a frequency of 10GHz is presented. Here, substrates with different thickness, one using 0.762mm and second with 0.508mm, are considered. In this, various parameters have been varied for the optimization of antenna design using 3D electromagnetic simulator. This antenna is...

    Provided By Serials Publiations

  • White Papers // Apr 2012

    Design and Development of Triple Frequency Compact Microstrip Patch Antenna Array for Wireless Application

    Microstrip patch antenna arrays are very popular in present wireless communication system, especially when the signal propagates through different fading environment. It is very important to design compact communication tool to fulfill multi-purpose demands of communication world. In this paper, a double layered 2-element, slotted patch antenna array structure is...

    Provided By Serials Publiations

  • White Papers // Apr 2012

    Microstrip Linear Phased Array for Smart Antenna Applications

    In this paper, the authors have proposed microstrip phase antenna arrays for smart antenna applications designed at 2.7GHz frequency. The antenna array simulations are carried out by using IE3D software. The simulated antennas are fabricated using glass epoxy substrate with dielectric constant 4.4. The fabricated arrays are tested practically for...

    Provided By Serials Publiations

  • White Papers // Apr 2012

    Implementation of 3-D Ray Tracing Propagation Model for Indoor Wireless Communication

    Wireless and mobile broadband communication systems are planned to operate at the mm-wave band, due to the spectrum availability and wider bandwidth requirements. It is important to characterize the radio propagation channel to ensure satisfactory performance of a wireless communication system. This paper classifies the propagation models and discusses the...

    Provided By Serials Publiations

  • White Papers // Apr 2012

    Wireless Data Access and Supervisory Control System

    The analog and continuous time signals measured by the sensor and modified by the signal conditioning circuitry must convert into the form a computer can understand. This is what is referred to here as data acquisition. The continuous analog voltages could be directly used to control the analog mechanism. However,...

    Provided By Serials Publiations

  • White Papers // Apr 2012

    Open Stub Loaded Rectangular Microstrip Antenna for WLAN and WiMAX Applications

    This paper presents a simple design of open stub loaded rectangular microstrip antenna for multiband operation. Two open stubs of suitable dimensions are placed at two diagonally opposite corners on the rectangular radiating patch. The antenna operates between 3.555 to 8.66 GHz at five independent frequency bands with almost constant...

    Provided By Serials Publiations

  • White Papers // May 2012

    Realization of Optical OFDM System Using Frequency Combs and Optical Modulators

    At both the ends of transmitter and receiver the realization of terabit per second high speed and high spectral-efficiency optical transmission is required. This paper describes the use of much lower speed electronics and optoelectronics through parallel processing of coherent optical frequency combs .The coherent and parallel processing enables Electrical-to-Optical...

    Provided By Serials Publiations

  • White Papers // May 2012

    Numerical Analysis of Stacked Three Layer Rectangular Microstrip Patch Antenna at Ultra Wide Band Frequency

    Microstrip patch antennas are well suited for low volume profile, light weight and easy integration. In this paper numerical analysis of stacked three layer Rectangular Microstrip patch antenna with parasitic elements is given. It is found that the antenna exhibits dual resonance. The %Bandwidth is directly depends on height of...

    Provided By Serials Publiations

  • White Papers // May 2012

    Pulse Position Based Modulation Techniques for Optical Communication

    Intensity Modulation with Direct Modulation (IM/DM) favors low duty cycle modulation schemes such as Pulse Position Modulation (PPM) and Multiple PPM (MPPM). In this paper, the channel model over IM/DD is introduced. Then, a brief summary is given about some of the modulation techniques used in this area. Finally, some...

    Provided By Serials Publiations

  • White Papers // May 2012

    Novel Dragon Shape UHF RFID Tag Antenna

    Novel modified dragon shape UHF RFID tag antenna is proposed where both flexibility and compactness features are achieved. Choosing LCP material as antenna substrate and modified dragon curve as antenna shape both flexibility and compactness features are achieved, respectively. Induced EMF method is used considering wire radius effect to obtain...

    Provided By Serials Publiations

  • White Papers // Nov 2011

    Design of Energy-Efficient Wireless Sensor Networks Using Cooperative MIMO Techniques

    To prolong the lifetime of wireless sensors network energy efficient transmission method is required so that energy consumption must be minimized while satisfying given throughput and delay requirements. In this paper, the authors analyze the performance of cooperative Multiple-Input Multiple-Output (MIMO) based communication in wireless sensors networks. In this paper,...

    Provided By Serials Publiations

  • White Papers // Apr 2012

    Real Time Implementation of Scada System for Ratio Control Based Filling Plant

    The objective of this paper is to design, develop and testing of the "Real time implementation of SCADA system for ratio control based bottle filling plant". This paper will provide low operational cost, low power consumption, accuracy and flexibility to the system and at the same time it will provide...

    Provided By Serials Publiations

  • White Papers // Dec 2013

    A Technical Analysis of Recommender Systems for Web Personalization based on Data Mining Methods

    The rapid progress of internet technologies in last few years has imposed a heavy information burden on users. This raises the requirement of personalized website design. The benefit of present approach for personalized website design is its cost-effective features, but on the other hand current approach cannot easily provide a...

    Provided By Serials Publiations

  • White Papers // Dec 2013

    FPGA-based implementation of UART

    In this paper the authors focus on the hardware implementation of a high throughput Universal Asynchronous Receiver & Transmitter (UART) using FPGA. The UART described in this paper consist of the transmitter, the receiver and the baud rate generator. This has been implemented using verilog hardware description language and simulated...

    Provided By Serials Publiations

  • White Papers // Jun 2013

    Discovery and Ranking of Outliers using Weighted Association Rule Mining with Clustering

    Data mining is an important issue in the development of knowledge-based systems. To ensure the correctness of data mining results, outlier mining is absolutely necessary. Discovery and ranking of outliers using weighted association rule mining with clustering aims to discover hidden as well as interesting patterns which are different from...

    Provided By Serials Publiations

  • White Papers // Dec 2013

    A Comparative Analysis of Outlier Mining Techniques with Emphasis on Density Based Technique: Local Outlier Factor

    Outlier can be termed as an observation that does not follow the normal characteristics of the system, hence it is very far from other data points in the system. This property of outlier makes it very suspicions that it may be generated by a different mechanism followed by other data...

    Provided By Serials Publiations

  • White Papers // Dec 2012

    Comparative Study on Load Balancing Techniques in Distributed Systems

    Scalability becomes the basic need for distributed systems. With the increase of users, load on application servers also keep increasing. This requires a critical action to balance the load on servers. Load balancing is the concept of balancing load on servers using various load balancing techniques. In this paper the...

    Provided By Serials Publiations

  • White Papers // Dec 2012

    Design and Implementation of Access the Contents in the Data Warehouse

    In this paper the authors describe the design & implementation of data analysis tools. Many tools & database systems use the decision making process. The increasing processing techniques are more powerful analytical tool. There are a number of data analysis tools that any organization should consider a data warehouse, which...

    Provided By Serials Publiations

  • White Papers // Dec 2012

    Secure and Scalable Operational Model in Real Time Banking Using Cloud Computing

    Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services of the internet. Cloud computing allows consumers and businesses to use applications without installation and access their personal files at any computer with internet access. Cloud computing is an emerging computing paradigm...

    Provided By Serials Publiations

  • White Papers // Dec 2012

    Implementation of Data Analysis Tools for Business Purpose

    In this paper the authors decide implementation of data analysis tool in data warehouse. The data analysis tools are used in data warehousing to prepare the data and to access data populates the warehouse, thus enhancing usability of the company. This paper discusses on the problems in data access that...

    Provided By Serials Publiations

  • White Papers // Dec 2012

    Discovering Software Reuses Patterns and Scaling Requirement Using Data Mining

    A data mining and data warehousing implementation strategy for software reuse is an integrated, time variant collection of data about software components, requirements. It aims at supporting project decisions and logical continuation of data warehousing for mining knowledge about software requirements and reuse components decisions and for software objective settings...

    Provided By Serials Publiations

  • White Papers // Jan 2014

    Challenges in Middleware Design in Distributed Systems A Comparative study: Web Services, Java RMI, CORBA and DCOM

    Collaborative and remote applications provide sharing of distributed resources and services on demand. Middleware enables interoperability between applications that run on different operating systems, by supplying services so the application can exchange data in a standards-based way. But such system mostly fails to support the basic requirement robustness, reliability for...

    Provided By Serials Publiations

  • White Papers // Dec 2012

    Data Mining: Foundation & Techniques

    The computing technology has significantly influenced the people lives and the major impacts of this effect are business data processing and scientific computing. Earlier the development of computer techniques for business, computer professionals were concerned with designing files to store the data so that information could be efficiently retrieved. The...

    Provided By Serials Publiations

  • White Papers // Dec 2012

    Enhance the Managerial Planning Using Probability Based Decision Tree

    Managerial planning is the most basic function of management. The important activity of planning is forecasting of business, market trend, commodity trends and other functions which affect performance. Planning is the function that determines in advance what should be done. It is a road map to lead an organization from...

    Provided By Serials Publiations

  • White Papers // Dec 2012

    Graph Pattern Mining: A Survey of Issues and Approaches

    Most of the internet data that is available in public that are analyzed/archived is graph structured in nature. Graphs form a powerful modeling tool in many areas that include chemistry, biology, www etc. Hence there is a demand for efficiently querying such large graph data. Graph pattern matching problem is...

    Provided By Serials Publiations

  • White Papers // Dec 2012

    Bitmap Indexing Technique for Data warehousing and Data mining

    Sophisticated analytical tools, techniques and increase in processing power have resulted in development of new areas of database management as data warehousing and data mining. On Line Analytical Processing (OLAP), data warehousing and data mining provide this functionality. This paper focuses on automating aspects of the warehouse and omits the...

    Provided By Serials Publiations

  • White Papers // Dec 2013

    Outlier Detection Techniques for Wireless Sensor Networks using Clustering and Support Vector Machines

    Wireless sensor networks are vulnerable to many types of security attacks, including false data injection, data forgery, and eaves dropping. Sensor nodes can be compromised by intruders, and the compromised nodes can distort data integrity by injecting false data. The transmission of false data depletes the constrained battery power and...

    Provided By Serials Publiations

  • White Papers // Dec 2013

    BPEL Based Scheduling in Multi-Agent System for Business Applications

    To develop the proficient and full-bodied business application in the multifaceted business scenario is the leading confront for software developers. Mostly business applications consists the scheduling phenomenon for managing the numerous economic transaction during their operation. Hence to run the operation smooth and robustly, the multi-agent system is found as...

    Provided By Serials Publiations

  • White Papers // Dec 2013

    Data Management in Grid Computing

    A grid is a collection of machines, sometimes referred to as nodes, resources, members, clients, hosts, engines, and many other terms. Grid computing is being used in various applications. Many grid applications such as weather forecasting, astrophysics deal with large amounts of data. Data intensive applications involve a high degree...

    Provided By Serials Publiations

  • White Papers // Dec 2013

    Ant Colony Optimization Technique: Robust Data Pre-processing Procedure Support Vector Clustering

    In this paper the authors present robust data preprocessing and minimization of core, outlier and noise procedure for Support Vector Clustering (SVC). Cluster labeling is time consuming in the SVC training procedure. This paper is to reduce the execution time of SVC procedure as well as to improve the ability...

    Provided By Serials Publiations

  • White Papers // Mar 2014

    Association Rule Mining: An Overview

    Association Rule Mining (ARM) has been the area of interest for many researchers for a long time and continues to be the same. It is one of the important tasks of data mining. It aims at discovering relationships among various items in the database. This paper is to present a...

    Provided By Serials Publiations

  • White Papers // Mar 2014

    Optimized Data Aggregation Protocol in WSN for Automation of water Sprinklers

    In this paper the authors aim to identify an efficient data aggregation protocol and further enhance it for achieving better network life time also to use this aggregation protocol for automation of an application like automation of water sprinklers. Among various data aggregation techniques cluster-based data aggregation approach is chosen....

    Provided By Serials Publiations