TechniaJOURNAL

Displaying 1-23 of 23 results

  • White Papers // Jul 2014

    Workflow Management in Cloud- Using Paas based WF Engine (An Unorthodox Approach)

    With the advent of cloud computing, processing of large data-sets and business applications becomes very affordable and less complex. More and more number of applications are designed, developed and deployed every day. It becomes very difficult for a developer and then for a service provider to keep track of logical...

    Provided By TechniaJOURNAL

  • White Papers // Jan 2014

    A New Soft Set Based Association Rule Mining Algorithm

    In this paper a new algorithm has been proposed. Proposed algorithm is suitable for mining association rules containing only Predetermined Data Items (PDIs). In case of databases having uncertain and redundant data, traditional algorithms are not able to offer desired accuracy and performance during mining process. Considering this fact soft...

    Provided By TechniaJOURNAL

  • White Papers // Jan 2013

    Data Security Issues & Requirements in Cloud Computing

    The cloud computing has been an emerging technology that has been changing the way of delivering the IT services, on the theme of virtualization of storage, bandwidth, infrastructure as well as software But many organizations are still not willing to confide in the services because of lack of control on...

    Provided By TechniaJOURNAL

  • White Papers // Jan 2013

    Optimization of OFDM Systems Using Genetic Algorithm in FPGA

    In this paper subcarrier and power allocation to each user at base-station maximize the user data rates, subject to constraints on total power and bit error rate. First, each sub-channel is assigned to the user with best channel-to-noise ratio for the channel, with random power distributed by water filling algorithm....

    Provided By TechniaJOURNAL

  • White Papers // Jul 2012

    From Grid Computing to Cloud Computing & Security Issues in Cloud Computing

    The cloud is a next generation platform that provides dynamic resource pools, virtualization and high availability. In starting the concept of the Distributed Computing and the Grid Computing is discussed. Then the focus was on the concept of Cloud Computing and its characteristics. This paper provides a brief introduction to...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2012

    A UWB Triangular Shape, Triangular Patch Antenna Array type Antenna for 3G Mobile Communication in India

    In this work, the authors present a triangular shape array micro-strip patch antenna. In this antenna a triangular shaped patch antenna made up from an array of again triangular shaped patch antenna is fed by proximity coupling. The ground plane of the antenna is a square shaped patch antenna and...

    Provided By TechniaJOURNAL

  • White Papers // Jan 2012

    Efficient Grid Resource Selection Based on Performance Measures

    Grid computing system is the one where individual entities share their resources with others in their own domain as well as with other domain. Resource discovery and resource selection are the crucial tasks in grid scheduling and resource management. The goal of resource discovery and selection is to identify list...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2011

    Implementation of Online Signature Verification Using Advance RISC Processor

    Signature is socially accepted authentication method & is widely used as proof of identity in the people daily life. In this paper, the authors have discussed on the implementation of the online signature verifier using the advanced RISC processor. In that the signatures are generated & stored in the permanent...

    Provided By TechniaJOURNAL

  • White Papers // Jan 2011

    Palmprint Recognition Using Image Processing

    In today's world, biometrics system is used almost everywhere for the security and personal recognition. The palmprint is one of the most reliable physiological characteristics that can be used to distinguish between individuals. The primary objective of this paper is to present a palmprint recognition system using minimum resources. The...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2010

    A Novel Algorithm for Collision Avoidance in Wireless Ad Hoc Networks

    When multiple nodes desire to transmit in a network, a set of rules generally known as routing and collision avoidance protocols are needed to avoid collisions and to retransmit lost data. The authors suggest a novel yet efficient technique for AD HOC network management using uniform Latin square matrix. Each...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2010

    Analysis of Some Minimum-process Coordinated Checkpointing Algorithms for Mobile Computing Systems

    Checkpoint is defined as designated place in a program at which normal process is interrupted specifically to preserve the status information necessary to allow resumption of processing at a later time. A distributed system is a collection of independent entities that cooperate to solve a problem that cannot be individually...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2010

    Performance Evaluation of LCA2, Highest- Connectivity, Max-Min D-Cluster Algorithms in Mobile Ad hoc Networks

    This paper compare and evaluate the performance of LCA2, Highest-connectivity, Max-Min D-cluster Algorithms of Mobile Ad hoc NETworks (MANETs) on NS-2 simulator. Wireless networks have become increasingly popular in the computing industry. There are currently two variations of mobile wireless networks infrastructure and infrastructureless networks. The infrastructure networks, also known...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2010

    The challenges and offerings of Cloud Computing with the needs of Indian Economic System

    Cloud Computing is in existence from quite some time now, but in India the concept is fairly new. Therefore there are a lot of problem to be faced. There is a sense of panic when a company surrenders its data to a third party. This paper has taken up these...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2010

    IARMSG: Incremental Association Rule Mining for Automatic Worm Signature Generation

    In recent era, Internet worms are one of serious threats which have been a major cause of intrusion attempts. Traditional Intrusion Detection Systems (IDS) store all known worm signatures and monitors real time traffic to find out these signatures and prevent possible intrusion attempts. This approach is not useful for...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2009

    Integrated Wireless Information Technologies for Improving Agriculture Transport Logistics in Thailand

    Thailand is one of the world's largest agricultural product producers and road transportation plays a crucial role in logistics. The intention of this paper is to review the current agricultural logistics situation in Thailand regarding efficiency issues, together with results from a field survey investigation. The research proposes a framework...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2009

    Antnet: Modified Routing Algorithm for Packet Switched Networks

    Antnet is an agent based routing algorithm based on real ants' behavior. Ants are able to find shortest path to food source .In real life, ants drop some kind of chemical substances to mark the path that they used. Then on their way back they choose the path with the...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2009

    A Preemptive Multipath Routing Protocol for Mobile Adhoc Networks

    Mobile Ad hoc NETworks (MANET) very often suffer from route failures due to the mobility of nodes. This effects an ongoing data transmission resulting in pre-computed routes becoming invalid. So it is important for a routing protocol to recover from such failures by providing redundant paths which are robust. With...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2009

    Increasing Lifetime of Wireless Sensor Networks by Changing Active & Sleep Mode

    A model to identify the lifetime of target tracking wireless sensor network is proposed. The model is a static cluster-based architecture and aims to provide two factors. First, it is to increase the lifetime of target tracking wireless sensor network. Secondly, it is to enable good localization result with low...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2009

    Ad hoc Mobile Wireless Network Routing Protocols- A Review

    Mobile Ad hoc NETworks(MANET) represent complex distributed systems that comprise wireless mobile nodes that can freely and dynamically self organize into arbitrary and temporary ad hoc network topologies, allowing people and devices to seamlessly internet work in areas with no preexisting communication infrastructure e.g., disaster recovery environments. An ad-hoc network...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2009

    Autonomously Tuned High Q MOEM Ringresonators for WDM Optical Network Applications

    The beam forming network offers several advantages when implemented in the optical domain. The major benefits of phased-array antenna systems are their high gain and possibility of electronic beam steering and shaping, which is together called beam forming. A phased-array antenna system consists of multiple antenna elements with corresponding tunable...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2009

    Comparison of Various Feature Encoding Schemes for Implementation of Secured Biometric Template

    In this paper, the authors provide a comparison among different feature encoding schemes used for implementation of biometric system using Iris pattern and suggests which feature encoding scheme is best suited for the creation of biometric template. This paper also proposes an encryption method to secure the templates. The advantage...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2009

    Find-k: A New Algorithm for Finding the k in Partitioning Clustering Algorithms

    Document clustering is an automatic grouping of text documents into clusters. These documents are clustered in such a way that documents within a cluster have high similarity in comparison to one another, and are dissimilar to documents in other clusters. Fast and high-quality document clustering algorithms play an important role...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2009

    Sentence Clustering-based Summarization of Multiple Text Documents

    With the rapid growth of the World Wide Web, information overload is becoming a problem for an increasingly large number of people. Automatic multi document summarization can be an indispensable solution to reduce the information overload problem on the web. This kind of summarization facility helps users to see at...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2012

    From Grid Computing to Cloud Computing & Security Issues in Cloud Computing

    The cloud is a next generation platform that provides dynamic resource pools, virtualization and high availability. In starting the concept of the Distributed Computing and the Grid Computing is discussed. Then the focus was on the concept of Cloud Computing and its characteristics. This paper provides a brief introduction to...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2012

    A UWB Triangular Shape, Triangular Patch Antenna Array type Antenna for 3G Mobile Communication in India

    In this work, the authors present a triangular shape array micro-strip patch antenna. In this antenna a triangular shaped patch antenna made up from an array of again triangular shaped patch antenna is fed by proximity coupling. The ground plane of the antenna is a square shaped patch antenna and...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2010

    A Novel Algorithm for Collision Avoidance in Wireless Ad Hoc Networks

    When multiple nodes desire to transmit in a network, a set of rules generally known as routing and collision avoidance protocols are needed to avoid collisions and to retransmit lost data. The authors suggest a novel yet efficient technique for AD HOC network management using uniform Latin square matrix. Each...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2010

    Analysis of Some Minimum-process Coordinated Checkpointing Algorithms for Mobile Computing Systems

    Checkpoint is defined as designated place in a program at which normal process is interrupted specifically to preserve the status information necessary to allow resumption of processing at a later time. A distributed system is a collection of independent entities that cooperate to solve a problem that cannot be individually...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2010

    Performance Evaluation of LCA2, Highest- Connectivity, Max-Min D-Cluster Algorithms in Mobile Ad hoc Networks

    This paper compare and evaluate the performance of LCA2, Highest-connectivity, Max-Min D-cluster Algorithms of Mobile Ad hoc NETworks (MANETs) on NS-2 simulator. Wireless networks have become increasingly popular in the computing industry. There are currently two variations of mobile wireless networks infrastructure and infrastructureless networks. The infrastructure networks, also known...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2010

    The challenges and offerings of Cloud Computing with the needs of Indian Economic System

    Cloud Computing is in existence from quite some time now, but in India the concept is fairly new. Therefore there are a lot of problem to be faced. There is a sense of panic when a company surrenders its data to a third party. This paper has taken up these...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2009

    Integrated Wireless Information Technologies for Improving Agriculture Transport Logistics in Thailand

    Thailand is one of the world's largest agricultural product producers and road transportation plays a crucial role in logistics. The intention of this paper is to review the current agricultural logistics situation in Thailand regarding efficiency issues, together with results from a field survey investigation. The research proposes a framework...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2009

    Antnet: Modified Routing Algorithm for Packet Switched Networks

    Antnet is an agent based routing algorithm based on real ants' behavior. Ants are able to find shortest path to food source .In real life, ants drop some kind of chemical substances to mark the path that they used. Then on their way back they choose the path with the...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2009

    A Preemptive Multipath Routing Protocol for Mobile Adhoc Networks

    Mobile Ad hoc NETworks (MANET) very often suffer from route failures due to the mobility of nodes. This effects an ongoing data transmission resulting in pre-computed routes becoming invalid. So it is important for a routing protocol to recover from such failures by providing redundant paths which are robust. With...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2009

    Increasing Lifetime of Wireless Sensor Networks by Changing Active & Sleep Mode

    A model to identify the lifetime of target tracking wireless sensor network is proposed. The model is a static cluster-based architecture and aims to provide two factors. First, it is to increase the lifetime of target tracking wireless sensor network. Secondly, it is to enable good localization result with low...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2009

    Ad hoc Mobile Wireless Network Routing Protocols- A Review

    Mobile Ad hoc NETworks(MANET) represent complex distributed systems that comprise wireless mobile nodes that can freely and dynamically self organize into arbitrary and temporary ad hoc network topologies, allowing people and devices to seamlessly internet work in areas with no preexisting communication infrastructure e.g., disaster recovery environments. An ad-hoc network...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2009

    Autonomously Tuned High Q MOEM Ringresonators for WDM Optical Network Applications

    The beam forming network offers several advantages when implemented in the optical domain. The major benefits of phased-array antenna systems are their high gain and possibility of electronic beam steering and shaping, which is together called beam forming. A phased-array antenna system consists of multiple antenna elements with corresponding tunable...

    Provided By TechniaJOURNAL

  • White Papers // Jan 2013

    Data Security Issues & Requirements in Cloud Computing

    The cloud computing has been an emerging technology that has been changing the way of delivering the IT services, on the theme of virtualization of storage, bandwidth, infrastructure as well as software But many organizations are still not willing to confide in the services because of lack of control on...

    Provided By TechniaJOURNAL

  • White Papers // Jan 2012

    Efficient Grid Resource Selection Based on Performance Measures

    Grid computing system is the one where individual entities share their resources with others in their own domain as well as with other domain. Resource discovery and resource selection are the crucial tasks in grid scheduling and resource management. The goal of resource discovery and selection is to identify list...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2009

    Comparison of Various Feature Encoding Schemes for Implementation of Secured Biometric Template

    In this paper, the authors provide a comparison among different feature encoding schemes used for implementation of biometric system using Iris pattern and suggests which feature encoding scheme is best suited for the creation of biometric template. This paper also proposes an encryption method to secure the templates. The advantage...

    Provided By TechniaJOURNAL

  • White Papers // Jan 2011

    Palmprint Recognition Using Image Processing

    In today's world, biometrics system is used almost everywhere for the security and personal recognition. The palmprint is one of the most reliable physiological characteristics that can be used to distinguish between individuals. The primary objective of this paper is to present a palmprint recognition system using minimum resources. The...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2010

    IARMSG: Incremental Association Rule Mining for Automatic Worm Signature Generation

    In recent era, Internet worms are one of serious threats which have been a major cause of intrusion attempts. Traditional Intrusion Detection Systems (IDS) store all known worm signatures and monitors real time traffic to find out these signatures and prevent possible intrusion attempts. This approach is not useful for...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2009

    Find-k: A New Algorithm for Finding the k in Partitioning Clustering Algorithms

    Document clustering is an automatic grouping of text documents into clusters. These documents are clustered in such a way that documents within a cluster have high similarity in comparison to one another, and are dissimilar to documents in other clusters. Fast and high-quality document clustering algorithms play an important role...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2011

    Implementation of Online Signature Verification Using Advance RISC Processor

    Signature is socially accepted authentication method & is widely used as proof of identity in the people daily life. In this paper, the authors have discussed on the implementation of the online signature verifier using the advanced RISC processor. In that the signatures are generated & stored in the permanent...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2009

    Sentence Clustering-based Summarization of Multiple Text Documents

    With the rapid growth of the World Wide Web, information overload is becoming a problem for an increasingly large number of people. Automatic multi document summarization can be an indispensable solution to reduce the information overload problem on the web. This kind of summarization facility helps users to see at...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2014

    Workflow Management in Cloud- Using Paas based WF Engine (An Unorthodox Approach)

    With the advent of cloud computing, processing of large data-sets and business applications becomes very affordable and less complex. More and more number of applications are designed, developed and deployed every day. It becomes very difficult for a developer and then for a service provider to keep track of logical...

    Provided By TechniaJOURNAL

  • White Papers // Jan 2013

    Optimization of OFDM Systems Using Genetic Algorithm in FPGA

    In this paper subcarrier and power allocation to each user at base-station maximize the user data rates, subject to constraints on total power and bit error rate. First, each sub-channel is assigned to the user with best channel-to-noise ratio for the channel, with random power distributed by water filling algorithm....

    Provided By TechniaJOURNAL

  • White Papers // Jan 2014

    A New Soft Set Based Association Rule Mining Algorithm

    In this paper a new algorithm has been proposed. Proposed algorithm is suitable for mining association rules containing only Predetermined Data Items (PDIs). In case of databases having uncertain and redundant data, traditional algorithms are not able to offer desired accuracy and performance during mining process. Considering this fact soft...

    Provided By TechniaJOURNAL