TechniaJOURNAL

Displaying 1-40 of 42 results

  • White Papers // Jul 2014

    Workflow Management in Cloud- Using Paas based WF Engine (An Unorthodox Approach)

    With the advent of cloud computing, processing of large data-sets and business applications becomes very affordable and less complex. More and more number of applications are designed, developed and deployed every day. It becomes very difficult for a developer and then for a service provider to keep track of logical...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2014

    Novel Algorithm for Terrorist Network Mining

    The evolutionary effect of social network analysis has feasibly enabled the security agencies to include the approach for estimating terrorist networks. The approach in this sense named as terrorist network mining, has helped in successfully achieving the terrorist network behavior on web along with destabilization of network using hierarchy of...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2014

    Evaluating the Performance of TAN-based and REP-based Models for Intrusion Detection

    Security of the computer system and network is at continual risk due the progressive technological advancements in the field of information security. This concern has brought up the necessity of a system or mechanism which constantly keeps an eye on the illegitimate activities. Several mechanisms have been proposed for this...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2014

    Smart Antenna Techniques for Interference Suppression in WCDMA Using LMS Algorithm

    In recent years there has been an explosive growth in the number of wireless users, particularly in the area of mobile communication. This growth has triggered an enormous demand not only for capacity but also for better coverage and higher quality of service without increase in radio frequency spectrum allocated...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2014

    Approaches for the Detection and Prevention of Black Hole Attack in AODV: A Critical Review

    In the modern age wireless network plays a very significant role for the fulfillment of personal, private and business communication needs. Furthermore, due to fast technological advancement its popularity and usage are increasing in rapid fashion. Mobile Ad-hoc NETwork (MANET) which is basically an infrastructure less wireless network empowers the...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2014

    Space Time Communication Scheme for MIMO Rayleigh and Rice Fading Channels

    The performance of Multiple-Input Multiple-Output (MIMO) communication system over the Rayleigh and Rican fading channels is studied in this paper for achieving the diversity gain using root-check LDPC codes which are designed for block-fading channels together with spatial multiplexing. It is seen that performance of MIMO system increases significantly when...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2014

    Home Monitoring System Using Wireless Sensor Network Via Internet

    Wireless Sensor Networks (WSNs) have become indispensable for different purposes like monitoring and security realization of smart homes. This paper focuses on development of WSN which can be used to construct a system for monitoring a smart home. During the implementation of this paper, the wireless sensor nodes are used...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2014

    Genetic Based Optimization of Social Network with Special Reference to Terrorist Network Mining

    The wide scope of social network analysis has led the law enforcement agencies to study the behavior of social network. The main objective of this paper is to identify the key nodes (suspicious nodes) present in the network. Recently, Terrorist network mining (special branch of social network analysis) has gained...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2014

    A Survey on Advanced Routing Protocols in MANETs

    Mobile Ad-hoc NETworks (MANETs) have emerged as a key technology for next generation wireless networking because of their advantages over other wireless networks. Several routing protocols have been proposed in recent years for possible deployment of Mobile Ad hoc NETworks (MANETs). In this paper, a review of various routing protocols...

    Provided By TechniaJOURNAL

  • White Papers // Jan 2014

    A New Soft Set Based Association Rule Mining Algorithm

    In this paper a new algorithm has been proposed. Proposed algorithm is suitable for mining association rules containing only Predetermined Data Items (PDIs). In case of databases having uncertain and redundant data, traditional algorithms are not able to offer desired accuracy and performance during mining process. Considering this fact soft...

    Provided By TechniaJOURNAL

  • White Papers // Jan 2014

    Noise Reduction and Pre-processing techniques in Handwritten Character Recognition using Neural Networks

    Language identification and interpretation of handwritten characters is one of the challenges faced in various industries. For example, it is always a big challenge in data interpretation from cheques in banks, language identification and translated messages from ancient script in the form of manuscripts, palm scripts and stone carvings to...

    Provided By TechniaJOURNAL

  • White Papers // Jan 2013

    Data Security Issues & Requirements in Cloud Computing

    The cloud computing has been an emerging technology that has been changing the way of delivering the IT services, on the theme of virtualization of storage, bandwidth, infrastructure as well as software But many organizations are still not willing to confide in the services because of lack of control on...

    Provided By TechniaJOURNAL

  • White Papers // Jan 2013

    Optimization of OFDM Systems Using Genetic Algorithm in FPGA

    In this paper subcarrier and power allocation to each user at base-station maximize the user data rates, subject to constraints on total power and bit error rate. First, each sub-channel is assigned to the user with best channel-to-noise ratio for the channel, with random power distributed by water filling algorithm....

    Provided By TechniaJOURNAL

  • White Papers // Jan 2013

    An Analysis of Network Survivability with Variable Transmission Range and Mobility on AODV over MANET

    In Mobile Ad-hoc NETworks (MANETs), mobile devices are equipped with power (energy). In order to utilize this energy equipped devices efficiently for transmission of data packets, many energy aware routing strategies are followed. Effective transmission power control is a critical issue in the design and performance of wireless ad hoc...

    Provided By TechniaJOURNAL

  • White Papers // Jan 2013

    Balanced Scorecard Approach to Evaluate Business Performance Measurement Using Web Tools in E-Tourism

    The application of Information Communication Technology (ICT) to enhance e-Tourism application can provide competitive advantage to business activity. Several applications using ICT to enhance e-Tourism business are outlined in relation to the revolution of wireless technology and Web2.0. It is vital for companies to determine the type of ICT that...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2012

    From Grid Computing to Cloud Computing & Security Issues in Cloud Computing

    The cloud is a next generation platform that provides dynamic resource pools, virtualization and high availability. In starting the concept of the Distributed Computing and the Grid Computing is discussed. Then the focus was on the concept of Cloud Computing and its characteristics. This paper provides a brief introduction to...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2012

    A UWB Triangular Shape, Triangular Patch Antenna Array type Antenna for 3G Mobile Communication in India

    In this work, the authors present a triangular shape array micro-strip patch antenna. In this antenna a triangular shaped patch antenna made up from an array of again triangular shaped patch antenna is fed by proximity coupling. The ground plane of the antenna is a square shaped patch antenna and...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2012

    Performance Analysis for a Network having Standby Redundant Unit with Waiting in Repair

    In this paper, the authors deal with a complex network having n-identical units in series and two identical standby units for evaluation of its ability measures. The authors have been used supplementary variables technique to formulate the mathematical equations for various flow-states. These mathematical equations have been solved by the...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2012

    Performance Analysis of Postcoded OFDM Systems

    OFDM has been proven to be a viable technique to overcome multipath fading in wireless channels. While OFDM systems convert a multipath fading channel into a series of equivalent flat fading channels they lack the inherent diversity available in multipath channels. Theoretically an uncoded OFDM system needs a simple receiver...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2012

    Security Aspects in Multimedia

    In the today's world, various media types such as text, audio, image and video entered in network arena. Reasons for this is sharing and acquiring the data in a quicker period of time and this is amply supported by the considerable cheap availability of resources like high bandwidth. This step...

    Provided By TechniaJOURNAL

  • White Papers // Jan 2012

    Efficient Grid Resource Selection Based on Performance Measures

    Grid computing system is the one where individual entities share their resources with others in their own domain as well as with other domain. Resource discovery and resource selection are the crucial tasks in grid scheduling and resource management. The goal of resource discovery and selection is to identify list...

    Provided By TechniaJOURNAL

  • White Papers // Jan 2012

    Biometric Measurement of Human Emotions

    Computers have become commonplace in modern life and as they increase in popularity, they also increase in complexity. It is not surprising that emotions have been a point of interest for researchers for centuries, however, even after considerable research effort over many years, there is no definitive answer to the...

    Provided By TechniaJOURNAL

  • White Papers // Jan 2012

    Effect of Pulse Shaping On BER Performance of QAM Modulated OFDM Signal

    Pulse shaping of a signal at base-band forms a more important tool in controlling and analyzing the parameters like ISI, the modulated signal envelope uniformity, the phase continuity as these parameters lead to the efficient spectral confinement of a binary signal which is a future and now-a-days a major important...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2011

    Implementation of Online Signature Verification Using Advance RISC Processor

    Signature is socially accepted authentication method & is widely used as proof of identity in the people daily life. In this paper, the authors have discussed on the implementation of the online signature verifier using the advanced RISC processor. In that the signatures are generated & stored in the permanent...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2011

    Transitive Dependencies Tracking in Minimum- Process Checkpointing Protocol for Mobile Ad hoc Networks

    In ad-hoc network every node is self-organized and can communicate directly with all other nodes. An ad-hoc mobile network is composed of mobile terminals that communicate with each other through broadcast radio transmissions within the transmissions power range. Compared to the wired distributed computing system, ad-hoc wireless networks have certain...

    Provided By TechniaJOURNAL

  • White Papers // Jan 2011

    Palmprint Recognition Using Image Processing

    In today's world, biometrics system is used almost everywhere for the security and personal recognition. The palmprint is one of the most reliable physiological characteristics that can be used to distinguish between individuals. The primary objective of this paper is to present a palmprint recognition system using minimum resources. The...

    Provided By TechniaJOURNAL

  • White Papers // Jan 2011

    Studies on Performance of Pulse Shaped OFDM Signal

    The Orthogonal Frequency Division Multiplexing (OFDM) transmission system is one of the optimum versions of the multi-carrier transmission scheme. The OFDM is referred in the literature as multi-carrier, multi-tone and Fourier transform based modulation scheme. The OFDM is a promising candidate for achieving high data rate transmission in mobile environment....

    Provided By TechniaJOURNAL

  • White Papers // Jan 2011

    Rotation Visual Cryptography Using Basic (2, 2) Scheme

    Visual cryptography scheme is the concept of encrypting a secret image into n (more than one) shares. Rotation Visual Cryptography Scheme (RVCS) allows four secret images to be encrypted into two shares. Using Human Visual System, again the four secret images can be easily recovered by placing the two shares...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2010

    A Novel Algorithm for Collision Avoidance in Wireless Ad Hoc Networks

    When multiple nodes desire to transmit in a network, a set of rules generally known as routing and collision avoidance protocols are needed to avoid collisions and to retransmit lost data. The authors suggest a novel yet efficient technique for AD HOC network management using uniform Latin square matrix. Each...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2010

    Analysis of Some Minimum-process Coordinated Checkpointing Algorithms for Mobile Computing Systems

    Checkpoint is defined as designated place in a program at which normal process is interrupted specifically to preserve the status information necessary to allow resumption of processing at a later time. A distributed system is a collection of independent entities that cooperate to solve a problem that cannot be individually...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2010

    Performance Evaluation of LCA2, Highest- Connectivity, Max-Min D-Cluster Algorithms in Mobile Ad hoc Networks

    This paper compare and evaluate the performance of LCA2, Highest-connectivity, Max-Min D-cluster Algorithms of Mobile Ad hoc NETworks (MANETs) on NS-2 simulator. Wireless networks have become increasingly popular in the computing industry. There are currently two variations of mobile wireless networks infrastructure and infrastructureless networks. The infrastructure networks, also known...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2010

    The challenges and offerings of Cloud Computing with the needs of Indian Economic System

    Cloud Computing is in existence from quite some time now, but in India the concept is fairly new. Therefore there are a lot of problem to be faced. There is a sense of panic when a company surrenders its data to a third party. This paper has taken up these...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2010

    IARMSG: Incremental Association Rule Mining for Automatic Worm Signature Generation

    In recent era, Internet worms are one of serious threats which have been a major cause of intrusion attempts. Traditional Intrusion Detection Systems (IDS) store all known worm signatures and monitors real time traffic to find out these signatures and prevent possible intrusion attempts. This approach is not useful for...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2009

    Integrated Wireless Information Technologies for Improving Agriculture Transport Logistics in Thailand

    Thailand is one of the world's largest agricultural product producers and road transportation plays a crucial role in logistics. The intention of this paper is to review the current agricultural logistics situation in Thailand regarding efficiency issues, together with results from a field survey investigation. The research proposes a framework...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2009

    Antnet: Modified Routing Algorithm for Packet Switched Networks

    Antnet is an agent based routing algorithm based on real ants' behavior. Ants are able to find shortest path to food source .In real life, ants drop some kind of chemical substances to mark the path that they used. Then on their way back they choose the path with the...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2009

    A Preemptive Multipath Routing Protocol for Mobile Adhoc Networks

    Mobile Ad hoc NETworks (MANET) very often suffer from route failures due to the mobility of nodes. This effects an ongoing data transmission resulting in pre-computed routes becoming invalid. So it is important for a routing protocol to recover from such failures by providing redundant paths which are robust. With...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2009

    Increasing Lifetime of Wireless Sensor Networks by Changing Active & Sleep Mode

    A model to identify the lifetime of target tracking wireless sensor network is proposed. The model is a static cluster-based architecture and aims to provide two factors. First, it is to increase the lifetime of target tracking wireless sensor network. Secondly, it is to enable good localization result with low...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2009

    Ad hoc Mobile Wireless Network Routing Protocols- A Review

    Mobile Ad hoc NETworks(MANET) represent complex distributed systems that comprise wireless mobile nodes that can freely and dynamically self organize into arbitrary and temporary ad hoc network topologies, allowing people and devices to seamlessly internet work in areas with no preexisting communication infrastructure e.g., disaster recovery environments. An ad-hoc network...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2009

    Autonomously Tuned High Q MOEM Ringresonators for WDM Optical Network Applications

    The beam forming network offers several advantages when implemented in the optical domain. The major benefits of phased-array antenna systems are their high gain and possibility of electronic beam steering and shaping, which is together called beam forming. A phased-array antenna system consists of multiple antenna elements with corresponding tunable...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2009

    Find-k: A New Algorithm for Finding the k in Partitioning Clustering Algorithms

    Document clustering is an automatic grouping of text documents into clusters. These documents are clustered in such a way that documents within a cluster have high similarity in comparison to one another, and are dissimilar to documents in other clusters. Fast and high-quality document clustering algorithms play an important role...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2012

    From Grid Computing to Cloud Computing & Security Issues in Cloud Computing

    The cloud is a next generation platform that provides dynamic resource pools, virtualization and high availability. In starting the concept of the Distributed Computing and the Grid Computing is discussed. Then the focus was on the concept of Cloud Computing and its characteristics. This paper provides a brief introduction to...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2012

    A UWB Triangular Shape, Triangular Patch Antenna Array type Antenna for 3G Mobile Communication in India

    In this work, the authors present a triangular shape array micro-strip patch antenna. In this antenna a triangular shaped patch antenna made up from an array of again triangular shaped patch antenna is fed by proximity coupling. The ground plane of the antenna is a square shaped patch antenna and...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2010

    A Novel Algorithm for Collision Avoidance in Wireless Ad Hoc Networks

    When multiple nodes desire to transmit in a network, a set of rules generally known as routing and collision avoidance protocols are needed to avoid collisions and to retransmit lost data. The authors suggest a novel yet efficient technique for AD HOC network management using uniform Latin square matrix. Each...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2010

    Analysis of Some Minimum-process Coordinated Checkpointing Algorithms for Mobile Computing Systems

    Checkpoint is defined as designated place in a program at which normal process is interrupted specifically to preserve the status information necessary to allow resumption of processing at a later time. A distributed system is a collection of independent entities that cooperate to solve a problem that cannot be individually...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2010

    Performance Evaluation of LCA2, Highest- Connectivity, Max-Min D-Cluster Algorithms in Mobile Ad hoc Networks

    This paper compare and evaluate the performance of LCA2, Highest-connectivity, Max-Min D-cluster Algorithms of Mobile Ad hoc NETworks (MANETs) on NS-2 simulator. Wireless networks have become increasingly popular in the computing industry. There are currently two variations of mobile wireless networks infrastructure and infrastructureless networks. The infrastructure networks, also known...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2010

    The challenges and offerings of Cloud Computing with the needs of Indian Economic System

    Cloud Computing is in existence from quite some time now, but in India the concept is fairly new. Therefore there are a lot of problem to be faced. There is a sense of panic when a company surrenders its data to a third party. This paper has taken up these...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2009

    Integrated Wireless Information Technologies for Improving Agriculture Transport Logistics in Thailand

    Thailand is one of the world's largest agricultural product producers and road transportation plays a crucial role in logistics. The intention of this paper is to review the current agricultural logistics situation in Thailand regarding efficiency issues, together with results from a field survey investigation. The research proposes a framework...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2009

    Antnet: Modified Routing Algorithm for Packet Switched Networks

    Antnet is an agent based routing algorithm based on real ants' behavior. Ants are able to find shortest path to food source .In real life, ants drop some kind of chemical substances to mark the path that they used. Then on their way back they choose the path with the...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2009

    A Preemptive Multipath Routing Protocol for Mobile Adhoc Networks

    Mobile Ad hoc NETworks (MANET) very often suffer from route failures due to the mobility of nodes. This effects an ongoing data transmission resulting in pre-computed routes becoming invalid. So it is important for a routing protocol to recover from such failures by providing redundant paths which are robust. With...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2009

    Increasing Lifetime of Wireless Sensor Networks by Changing Active & Sleep Mode

    A model to identify the lifetime of target tracking wireless sensor network is proposed. The model is a static cluster-based architecture and aims to provide two factors. First, it is to increase the lifetime of target tracking wireless sensor network. Secondly, it is to enable good localization result with low...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2009

    Ad hoc Mobile Wireless Network Routing Protocols- A Review

    Mobile Ad hoc NETworks(MANET) represent complex distributed systems that comprise wireless mobile nodes that can freely and dynamically self organize into arbitrary and temporary ad hoc network topologies, allowing people and devices to seamlessly internet work in areas with no preexisting communication infrastructure e.g., disaster recovery environments. An ad-hoc network...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2009

    Autonomously Tuned High Q MOEM Ringresonators for WDM Optical Network Applications

    The beam forming network offers several advantages when implemented in the optical domain. The major benefits of phased-array antenna systems are their high gain and possibility of electronic beam steering and shaping, which is together called beam forming. A phased-array antenna system consists of multiple antenna elements with corresponding tunable...

    Provided By TechniaJOURNAL

  • White Papers // Jan 2012

    Efficient Grid Resource Selection Based on Performance Measures

    Grid computing system is the one where individual entities share their resources with others in their own domain as well as with other domain. Resource discovery and resource selection are the crucial tasks in grid scheduling and resource management. The goal of resource discovery and selection is to identify list...

    Provided By TechniaJOURNAL

  • White Papers // Jan 2013

    Data Security Issues & Requirements in Cloud Computing

    The cloud computing has been an emerging technology that has been changing the way of delivering the IT services, on the theme of virtualization of storage, bandwidth, infrastructure as well as software But many organizations are still not willing to confide in the services because of lack of control on...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2009

    Find-k: A New Algorithm for Finding the k in Partitioning Clustering Algorithms

    Document clustering is an automatic grouping of text documents into clusters. These documents are clustered in such a way that documents within a cluster have high similarity in comparison to one another, and are dissimilar to documents in other clusters. Fast and high-quality document clustering algorithms play an important role...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2011

    Implementation of Online Signature Verification Using Advance RISC Processor

    Signature is socially accepted authentication method & is widely used as proof of identity in the people daily life. In this paper, the authors have discussed on the implementation of the online signature verifier using the advanced RISC processor. In that the signatures are generated & stored in the permanent...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2009

    Sentence Clustering-based Summarization of Multiple Text Documents

    With the rapid growth of the World Wide Web, information overload is becoming a problem for an increasingly large number of people. Automatic multi document summarization can be an indispensable solution to reduce the information overload problem on the web. This kind of summarization facility helps users to see at...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2014

    Workflow Management in Cloud- Using Paas based WF Engine (An Unorthodox Approach)

    With the advent of cloud computing, processing of large data-sets and business applications becomes very affordable and less complex. More and more number of applications are designed, developed and deployed every day. It becomes very difficult for a developer and then for a service provider to keep track of logical...

    Provided By TechniaJOURNAL

  • White Papers // Jan 2013

    Optimization of OFDM Systems Using Genetic Algorithm in FPGA

    In this paper subcarrier and power allocation to each user at base-station maximize the user data rates, subject to constraints on total power and bit error rate. First, each sub-channel is assigned to the user with best channel-to-noise ratio for the channel, with random power distributed by water filling algorithm....

    Provided By TechniaJOURNAL

  • White Papers // Jan 2014

    A New Soft Set Based Association Rule Mining Algorithm

    In this paper a new algorithm has been proposed. Proposed algorithm is suitable for mining association rules containing only Predetermined Data Items (PDIs). In case of databases having uncertain and redundant data, traditional algorithms are not able to offer desired accuracy and performance during mining process. Considering this fact soft...

    Provided By TechniaJOURNAL

  • White Papers // Jan 2011

    Palmprint Recognition Using Image Processing

    In today's world, biometrics system is used almost everywhere for the security and personal recognition. The palmprint is one of the most reliable physiological characteristics that can be used to distinguish between individuals. The primary objective of this paper is to present a palmprint recognition system using minimum resources. The...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2010

    IARMSG: Incremental Association Rule Mining for Automatic Worm Signature Generation

    In recent era, Internet worms are one of serious threats which have been a major cause of intrusion attempts. Traditional Intrusion Detection Systems (IDS) store all known worm signatures and monitors real time traffic to find out these signatures and prevent possible intrusion attempts. This approach is not useful for...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2009

    Comparison of Various Feature Encoding Schemes for Implementation of Secured Biometric Template

    In this paper, the authors provide a comparison among different feature encoding schemes used for implementation of biometric system using Iris pattern and suggests which feature encoding scheme is best suited for the creation of biometric template. This paper also proposes an encryption method to secure the templates. The advantage...

    Provided By TechniaJOURNAL

  • White Papers // Jan 2011

    Studies on Performance of Pulse Shaped OFDM Signal

    The Orthogonal Frequency Division Multiplexing (OFDM) transmission system is one of the optimum versions of the multi-carrier transmission scheme. The OFDM is referred in the literature as multi-carrier, multi-tone and Fourier transform based modulation scheme. The OFDM is a promising candidate for achieving high data rate transmission in mobile environment....

    Provided By TechniaJOURNAL

  • White Papers // Jan 2012

    Biometric Measurement of Human Emotions

    Computers have become commonplace in modern life and as they increase in popularity, they also increase in complexity. It is not surprising that emotions have been a point of interest for researchers for centuries, however, even after considerable research effort over many years, there is no definitive answer to the...

    Provided By TechniaJOURNAL

  • White Papers // Jan 2012

    Effect of Pulse Shaping On BER Performance of QAM Modulated OFDM Signal

    Pulse shaping of a signal at base-band forms a more important tool in controlling and analyzing the parameters like ISI, the modulated signal envelope uniformity, the phase continuity as these parameters lead to the efficient spectral confinement of a binary signal which is a future and now-a-days a major important...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2011

    Transitive Dependencies Tracking in Minimum- Process Checkpointing Protocol for Mobile Ad hoc Networks

    In ad-hoc network every node is self-organized and can communicate directly with all other nodes. An ad-hoc mobile network is composed of mobile terminals that communicate with each other through broadcast radio transmissions within the transmissions power range. Compared to the wired distributed computing system, ad-hoc wireless networks have certain...

    Provided By TechniaJOURNAL

  • White Papers // Jan 2011

    Rotation Visual Cryptography Using Basic (2, 2) Scheme

    Visual cryptography scheme is the concept of encrypting a secret image into n (more than one) shares. Rotation Visual Cryptography Scheme (RVCS) allows four secret images to be encrypted into two shares. Using Human Visual System, again the four secret images can be easily recovered by placing the two shares...

    Provided By TechniaJOURNAL

  • White Papers // Jan 2013

    An Analysis of Network Survivability with Variable Transmission Range and Mobility on AODV over MANET

    In Mobile Ad-hoc NETworks (MANETs), mobile devices are equipped with power (energy). In order to utilize this energy equipped devices efficiently for transmission of data packets, many energy aware routing strategies are followed. Effective transmission power control is a critical issue in the design and performance of wireless ad hoc...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2012

    Performance Analysis for a Network having Standby Redundant Unit with Waiting in Repair

    In this paper, the authors deal with a complex network having n-identical units in series and two identical standby units for evaluation of its ability measures. The authors have been used supplementary variables technique to formulate the mathematical equations for various flow-states. These mathematical equations have been solved by the...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2012

    Performance Analysis of Postcoded OFDM Systems

    OFDM has been proven to be a viable technique to overcome multipath fading in wireless channels. While OFDM systems convert a multipath fading channel into a series of equivalent flat fading channels they lack the inherent diversity available in multipath channels. Theoretically an uncoded OFDM system needs a simple receiver...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2012

    Security Aspects in Multimedia

    In the today's world, various media types such as text, audio, image and video entered in network arena. Reasons for this is sharing and acquiring the data in a quicker period of time and this is amply supported by the considerable cheap availability of resources like high bandwidth. This step...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2014

    Novel Algorithm for Terrorist Network Mining

    The evolutionary effect of social network analysis has feasibly enabled the security agencies to include the approach for estimating terrorist networks. The approach in this sense named as terrorist network mining, has helped in successfully achieving the terrorist network behavior on web along with destabilization of network using hierarchy of...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2014

    Evaluating the Performance of TAN-based and REP-based Models for Intrusion Detection

    Security of the computer system and network is at continual risk due the progressive technological advancements in the field of information security. This concern has brought up the necessity of a system or mechanism which constantly keeps an eye on the illegitimate activities. Several mechanisms have been proposed for this...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2014

    Smart Antenna Techniques for Interference Suppression in WCDMA Using LMS Algorithm

    In recent years there has been an explosive growth in the number of wireless users, particularly in the area of mobile communication. This growth has triggered an enormous demand not only for capacity but also for better coverage and higher quality of service without increase in radio frequency spectrum allocated...

    Provided By TechniaJOURNAL

  • White Papers // Jan 2013

    Balanced Scorecard Approach to Evaluate Business Performance Measurement Using Web Tools in E-Tourism

    The application of Information Communication Technology (ICT) to enhance e-Tourism application can provide competitive advantage to business activity. Several applications using ICT to enhance e-Tourism business are outlined in relation to the revolution of wireless technology and Web2.0. It is vital for companies to determine the type of ICT that...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2014

    Approaches for the Detection and Prevention of Black Hole Attack in AODV: A Critical Review

    In the modern age wireless network plays a very significant role for the fulfillment of personal, private and business communication needs. Furthermore, due to fast technological advancement its popularity and usage are increasing in rapid fashion. Mobile Ad-hoc NETwork (MANET) which is basically an infrastructure less wireless network empowers the...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2014

    Space Time Communication Scheme for MIMO Rayleigh and Rice Fading Channels

    The performance of Multiple-Input Multiple-Output (MIMO) communication system over the Rayleigh and Rican fading channels is studied in this paper for achieving the diversity gain using root-check LDPC codes which are designed for block-fading channels together with spatial multiplexing. It is seen that performance of MIMO system increases significantly when...

    Provided By TechniaJOURNAL

  • White Papers // Jan 2014

    Noise Reduction and Pre-processing techniques in Handwritten Character Recognition using Neural Networks

    Language identification and interpretation of handwritten characters is one of the challenges faced in various industries. For example, it is always a big challenge in data interpretation from cheques in banks, language identification and translated messages from ancient script in the form of manuscripts, palm scripts and stone carvings to...

    Provided By TechniaJOURNAL

  • White Papers // Jul 2014

    Home Monitoring System Using Wireless Sensor Network Via Internet

    Wireless Sensor Networks (WSNs) have become indispensable for different purposes like monitoring and security realization of smart homes. This paper focuses on development of WSN which can be used to construct a system for monitoring a smart home. During the implementation of this paper, the wireless sensor nodes are used...

    Provided By TechniaJOURNAL