The World

Displaying 1-40 of 262 results

  • White Papers // May 2014

    Distribution of Updated Data in Wireless Broadcasting Environment

    Wireless data broadcast is a popular data dissemination method in mobile computing environments because of its capability of concurrently disseminating data to multiple users. When an application involves wireless mobile clients that run multiple-operation transactions and dynamically update the server database, those updates have to be appear in the next...

    Provided By The World

  • White Papers // May 2014

    Survey on Students' Academic Failure and Dropout using Data Mining Techniques

    Educational data mining is in the habit of learn the data available in the field of education and show up the hidden knowledge from it. Classification methods like decision trees, machine learning, rule mining, etc can be applied on the educational data for forecasting the student's behavior, performance of them...

    Provided By The World

  • White Papers // May 2014

    Ranking Spatial Data by Quality Preferences Using Spatial Techniques

    The quality of features of an object is ranked based on the spatial preference query. For example, using a Landed property agency database of flats for lease, a customer may want to rank the flats with respect to the correctness of their location, defined after aggregating the qualities of other...

    Provided By The World

  • White Papers // May 2014

    Testing Cloud Application System Resiliency by Wrecking the System

    When application architecture moves to the public cloud, failures and outages are inevitable. Rather than panicking when failures strike at the worst time, one should prepare for failures in good times. The best way to tackle failure is to fail often. This cycle of failing instances deliberately and then testing...

    Provided By The World

  • White Papers // Apr 2014

    A Complete Survey on application of Frequent Pattern Mining and Association Rule Mining on Crime Pattern Mining

    Frequent pattern (itemset) mining plays an important role in association rule mining. The apriori & FP-growth algorithms are the most famous algorithms which can be used for frequent pattern mining. This paper presents the survey of various frequent pattern mining and rule mining algorithm which can be applied to crime...

    Provided By The World

  • White Papers // Apr 2014

    The Searching of Relevant Query

    Many internet users are increasingly search complex task-oriented goals on the internet, for example making travel arrangements and administrate finances or planning purchases. They are usually breaking down the tasks into some codependent steps and issue multiple queries around these steps repeatedly after long time. To give a good support...

    Provided By The World

  • White Papers // Apr 2014

    Data Accountability in Cloud Using CIA Framework

    The major feature of cloud service is that the user's data is processed on remote machines. In this scenario data owner does not know, on which machine his data will get processed. Due to this users fears of losing control of their own data and there are chances that the...

    Provided By The World

  • White Papers // Mar 2014

    Multimodal Biometrics Using Mobile Phone

    Today with greater advancement in mobile phone technologies capable of recognizing a biometric feature for recognizing an individual, the authors' proposed model is based on multimodal biometrics using face and fingerprint. Multimodal gives a greater accuracy and security when compared to unimodal biometrics. The match score is a measure of...

    Provided By The World

  • White Papers // Mar 2014

    A Cross-Layer Implementation and Efficiency Improvement Using Cross-Layer Detection and Allocation Algorithm

    The IEEE 802.15.4 standard is designed to achieve low-power transmissions in low-rate and short distance Wireless Personal Area Networks (WPANs). In IEEE 802.15.4 CSMA/CA protocol is used. This protocol cannot avoid the hidden node collision. The hidden node collision is called as Hidden Device Problem (HDP). Due to the hidden...

    Provided By The World

  • White Papers // Mar 2014

    A Review of Cross-Layered Approach in Wireless Sensor Networks

    Sensor networks offer many attractive low cost solutions to monitor environmental conditions. In almost all of its applications there is no existing infrastructure for communication. Therefore, it is crucial for sensor nodes to survive on small sources of energy and communicate using a wireless channel. For this the communication need...

    Provided By The World

  • White Papers // Mar 2014

    Cloud Computing: The Technology for Next Generation

    Cloud computing is increasingly becoming popular model for the next generation internet in which computational resources are made available online to the user on demand. Cloud computing is based on the concept of sharing computer resources online without worrying about owning the infrastructure, software or the service. The users can...

    Provided By The World

  • White Papers // Mar 2014

    Analysis of Clustering Uncertain Data Based on Review Features

    Clustering uncertain data is an important task. Now-a-days for collecting information particularly reviews for a product is becoming important through web. As the number of customer reviews is increasing day by day, it is important to develop an efficient and effective technique to extract product features mentioned in customer reviews....

    Provided By The World

  • White Papers // Mar 2014

    Semantic Similarity Based Data Alignment and Best Feature Extraction using PSO for Annotating Search Results from Web Databases

    Due to the development of search engines databases through web reachable all the way through HTML based search boundary in now day's analysis of data in deep manner from database or web search engines also important to return exact information in search result web pages. In generally the data units...

    Provided By The World

  • White Papers // Feb 2014

    Enhancing Data Privacy in Data Extraction With Big Data

    Big data concerns large-volume, complex, growing data sets with multiple, autonomous sources. With the fast development of networking, data storage, and the data collection capacity, Big Data is now rapidly expanding in all science and engineering domains, including physical, biological and bio-medical sciences. In this paper, the authors concentrate on...

    Provided By The World

  • White Papers // Feb 2014

    Efficient Attribute Selection to Stand Out in the Market

    Mining of frequent item sets is one of the most fundamental problems in data mining applications. The author proposed algorithm which guides the seller to select the best attributes of a new product to be inserted in the database so that it stands out in the existing competitive products, due...

    Provided By The World

  • White Papers // Feb 2014

    Provide Security and Data Backup For Cloud Computing using RDBS

    Today in cloud computing, generate the data in e-form are huge in amount. To sustain this data powerfully, there is an essential of data recovery services. To cater this, in this paper, the authors recommend a Remote Data Backup Server(RDBS). The Remote Data Backup Server (RDBS) is a server which...

    Provided By The World

  • White Papers // Feb 2014

    Analyzing Education Data Through Association Rules: A Case Study

    Data mining has attracted popular interest recently, due to the high demand for transforming huge amounts of data found in databases and other information repositories into useful knowledge. The rapid progress in the field owes to the joint efforts of researchers and developers in data mining, data warehousing, database systems,...

    Provided By The World

  • White Papers // Feb 2014

    The Major Traits of Cyber Security: Case Study on Server Hardening

    Information in and around the globe has so much to be linked up with the cyber infrastructure. This sophisticated infrastructure is said to be secure to some extent, perhaps the vulnerabilities always exists and paves way for catastrophes. The security concerns for the same have grown in recent times of...

    Provided By The World

  • White Papers // Feb 2014

    A Cloud Computing Ambiance of Progressive Source Portion Through Virtual Machine

    Today, cloud computing is on demand as it offers dynamic flexible resource allocation, for reliable and guaranteed services in pay-as-you-use manner, to cloud service users. So there must be a provision that all resources are made available to requesting users in efficient manner to satisfy customer's need. The emerging cloud...

    Provided By The World

  • White Papers // Feb 2014

    Design of Efficient Hardware Utilization Fault Coverage Circuit

    A new fault coverage test pattern generator using a Linear Feedback Shift Register (LFSR) called FC-LFSR can perform fault analysis and reduce the power of a circuit during test by generating three intermediate patterns between the random patterns by reducing the hardware utilization. The goal of having intermediate patterns is...

    Provided By The World

  • White Papers // Feb 2014

    Maintaining Log Management to the Cloud and Providing Confidentiality

    Securely maintaining log records over extended periods of time is very important to the proper functioning of any organization. Integrity of the log files and that of the logging process need to be ensured at all times. In addition, as log files often contain sensitive information, confidentiality and privacy of...

    Provided By The World

  • White Papers // Feb 2014

    Comparative Analysis of Google File System and Hadoop Distributed File System

    Cloud computing is a new technology which comes from distributed computing, parallel computing, grid computing and other computing technologies. In cloud computing, the data storage and computing are not in the local computer and server but in the amount of computers distributed in the internet. Several distributed file systems are...

    Provided By The World

  • White Papers // Feb 2014

    Data Centric Knowledge Management System

    The purpose of the Data Centric Knowledge Management System (DCKMS) is to centralize knowledge generated by employees working within and across functional areas, and to organize that knowledge such that it can be easily accessed, searched, browsed, navigated, and curated. DCKMS is a web based application which allows employees of...

    Provided By The World

  • White Papers // Feb 2014

    OMC Used in Clouds for Maximum Profit

    To maximize the profit, a service provider should understand both service charges and business costs, and how they are determined by the characteristics of the applications and the configuration of a multi server system. The problem of optimal multi server configuration for profit maximization in a cloud computing environment is...

    Provided By The World

  • White Papers // Feb 2014

    A Secure Cloud Storage System with Secure Data Forwarding

    Cloud computing presents a new way to enhancement the current utilize and delivery model for IT services based on the Internet, by providing for dynamically scalable and often virtualized resources as a service over the internet. To date, there are a number of notable commercial and individual cloud computing services,...

    Provided By The World

  • White Papers // Feb 2014

    Using Checkpoint For Implementing Fault- Tolerant On Desktop Grids

    Grid computing uses massive power of idle cycles of PC's. Desktop grids is nothing using the idle cycles of desktop PC's for computing large scale applications. There are many fields which requires large scale massive power such as scientific fields to handle complex and demanding problems. Desktop grids uses widely...

    Provided By The World

  • White Papers // Feb 2014

    Enhancing Cloud Resources for Implementing IPTV Services using Virtualization

    Implementation of IPTV service delivery through virtualization is of practical interest in many applications such as detecting an IPTV service delivery failure. The intrusion detection is defined as a mechanism for an IPTV service delivery through virtualization to detect the existence of inappropriate, incorrect, or anomalous moving attackers. In this...

    Provided By The World

  • White Papers // Feb 2014

    An Exposure Towards Fault Tolerant Memory System

    There has been a rising demand for well-organized and reliable digital storage as well as transmission systems in the recent years. Only memory cells were vulnerable to faults of transient in addition to the supporting circuitry around the memory however due to the enhance in the rate of soft error...

    Provided By The World

  • White Papers // Feb 2014

    Large Web Search Engine for Cluster filtering Processing

    Data cleaning and integration is typically the most expensive step in the KDD process. A key part, known as record linkage or de-duplication, is identifying which records in a database refer to the same entities. This problem is traditionally solved separately for each candidate record pair. The authors propose to...

    Provided By The World

  • White Papers // Feb 2014

    Mobile Ad-Hoc Networks in the Battlefield with 4G Support

    Information is power, nowhere be this truer than on the battlefield, where the ability to talk clearly and rapidly pass on information spells the difference between survival and death? This technology adopts Wireless technology on the platform of permanent networks, advanced antennae technologies and more advanced wireless security technologies. Next...

    Provided By The World

  • White Papers // Feb 2014

    Robust and an Energy Efficient AOMDV Protocol for Improved Quality of Service (QoS) in MANET

    The authors focus on drawbacks of Ad hoc On-demand Multipath Distance Vector (AOMDV) protocol. This protocol has two major drawbacks: the relief routes are not maintained. Source node does not know if a given relief route is still valid when it is needed. The use of an obsolete path leads...

    Provided By The World

  • White Papers // Feb 2014

    Security Challenges of Routing Protocols in MANETS: An Overview

    Mobile Ad hoc NETworks (MANETS) are a set of mobile nodes that form temporary network without aid of any existing network infrastructure or central access point. The nodes communicate with each other by interchange of packets, which for those nodes not in wireless range goes hop by hop. So lack...

    Provided By The World

  • White Papers // Feb 2014

    Robust Methodology for Prolonging Lifespan of Wireless Sensor Networks

    Maximizing the lifetime of Wireless Sensor Networks (WSNs) is a challenging problem. Although some methods exist to address the problem in homogenous WSNs, research on this problem in heterogeneous WSNs have progressed at a slow pace. Here, the authors propose an ACO-based approach that can maximize the lifetime of heterogeneous...

    Provided By The World

  • White Papers // Feb 2014

    KRS Techniques in Testing

    In this paper, the authors deal with the introducing of new unit code testing technique called KRS unit code test, and new test approach called KRS approach, the combination of KRS unit code test and KRS approach is called KRS technique of testing. The paper is introducing a new way...

    Provided By The World

  • White Papers // Feb 2014

    Prevent Jamming Attacks in Wireless Networks Using Cryptographic Primitives

    Jamming is typically referred as an intentional interference attack which is left due to the open nature of u medium. Due to their nature, wireless sensor network are probably the category of wireless networks most vulnerable to radio channel jamming. This intentional interference with wireless transmission launch pad for mounting...

    Provided By The World

  • White Papers // Feb 2014

    Malwise System for Packed and Polymorphic Malware

    Signature based malware detection systems have been a much used response to the pervasive problem of malware. Identification of malware variants is essential to a detection system and is made possible by identifying invariant characteristics in related samples. To classify the packed and polymorphic malware, this paper proposes a novel...

    Provided By The World

  • White Papers // Feb 2014

    Advancements in Smart Grid Technology Using Fi-Wi Architecture

    In this paper, the authors provide a detailed study regarding the application of Fi-Wi architecture in smart grids. Fiber-wireless technology, known in short as \"Fi-Wi\", is a combination of optical fiber-based network and wireless network. Fi-Wi has recently come forward as one of the emerging future network technologies. The smart...

    Provided By The World

  • White Papers // Feb 2014

    3D Password Authentication

    Users now-a-days are provided with major password stereotypes such as textual passwords, biometric scanning, tokens or cards (such as an ATM) etc. Current authentication systems suffer from many weaknesses. Textual passwords are commonly used; however, users do not follow their requirements. Users tend to choose meaningful words from dictionary or...

    Provided By The World

  • White Papers // Feb 2014

    Contemporary Attacks and Applications on Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are an active research area in computer science and telecommunication with crucial pool of knowledge not only for underlying networking applications, but also for security associated configurations. The surfacing of sensor networks as one of the dominant technology trends in the coming decades has posed numerous...

    Provided By The World

  • White Papers // Feb 2014

    New Design Strategy of a MAC Protocol Algorithm for Wireless Networks for Better Throughput

    IEEE 802.11 is the basic standard for wireless networks in ad hoc mode. Wireless terminals are generally connected by batteries which provide limited transmission power and limited amount of energy. In this paper, the authors design a new MAC protocol algorithm for better spatial reuse, better throughput and a smaller...

    Provided By The World

  • White Papers // Nov 2012

    A Survey on Query Response Time Optimization Approaches for Reliable Data Communication in Wireless Sensor Network

    Wireless sensor network is an application specific network. There are various factors which affects reliability in Wireless Sensor Network some of them are energy consumption, high packet loss, congestion, and large response time. There are different parameters, which affects query response time. Whenever Sink [Base Station] needs data, it sends...

    Provided By The World

  • White Papers // Sep 2012

    Decision Trees for Handling Uncertain Data to Identify Bank Frauds

    Classification is a classical problem in machine learning and data mining. In traditional decision tree classification, a feature of a tuple is either categorical or numerical. The decision tree algorithms are used for classify the certain and numerical data for many applications. In existing system they implement the extended the...

    Provided By The World

  • White Papers // Jan 2013

    Security Algorithms to Prevent Denial of Service (DoS) Attacks in WLAN

    This paper proposes security algorithms which are used to mitigate the Media Access Control (MAC) layer Denial of Service (DoS) attacks in WLAN infrastructure networks. This paper is aimed to attend the DoS attacks due to the susceptibility of the MAC layer's management frames. The management frames are sent unencrypted;...

    Provided By The World

  • White Papers // Jan 2013

    Sampling and Reconstruction of Wireless UWB Pulses by Multi-Stage Exponential Filter

    In wireless Ultra WideBand (UWB) technology the sampling and reconstruction of short impulses (Diracs) is an important research object in signal processing society. In this paper, the authors introduce a Multi-Stage Exponential Filter (MSEF) for sampling and reconstruction of the UWB pulses. The MSEF is constructed from a cascade of...

    Provided By The World

  • White Papers // Aug 2012

    A Study on the Security and Routing Protocols for Ad-Hoc Network

    A Mobile Ad-hoc NETwork (MANET) is a self-configuring infrastructure less network of mobile devices connected by wireless. ad hoc is a Latin word which means "For this purpose". Each device in a MANET is free to move independently in any direction, and will therefore change its links to other devices...

    Provided By The World

  • White Papers // Oct 2012

    Capacity of a Equalizer Based MIMO System

    In wireless communications, spectrum is a scarce resource and hence imposes a high cost on the high data rate transmission. It has been demonstrated that multiple antenna system provides very promising gain in capacity without increasing the use of spectrum, reliability, throughput, power consumption and less sensitivity to fading, hence...

    Provided By The World

  • White Papers // Dec 2012

    Microstrip Antenna: Design Aspects

    The rapid growth and demand of wireless based applications for commercial and personal communication increases the demand of microstrip antennas with the advantage of being low cost, low profile, small size, capable of being integrated with VLSI design. However microstrip antennas have some inherent limitations i.e. narrow bandwidth, low gain,...

    Provided By The World

  • White Papers // Jan 2013

    Intrusion Detection Using Pipelining of Layers With Conditional Random Fields in Multicore Processors

    An intrusion detection system is a predictable element of any computer network system. Now a day's intrusion detection faces a number of key challenging issues. The challenges like detect malicious activities and the large amount of network traffic. In this paper these two issues are addressed using Conditional Random Fields...

    Provided By The World

  • White Papers // Jan 2013

    Lifetime Analysis of MANET in Presence of Selfish Nodes

    The MANETs are self-configuring and decentralized networks without having a fixed infrastructure. In such a network, each node acts as an end-system as well as a relay node (or router). Most of the routing algorithms designed for a MANET are based on the assumption that every node in the network...

    Provided By The World

  • White Papers // Jan 2013

    A Novel Approach on Applications, Research Challenges and Mining for Mobile Crowdsensing

    A new phase of the information society - The Internet of things in which the web will not only link computers but potentially every object created by mankind. An emerging category of devices at the edge of the Internet are consumer centric mobile sensing and computing devices, such as smart...

    Provided By The World

  • White Papers // Jan 2013

    Trusted Dissemation of Data in Opportunistic Network

    With the rapid evolution of network diversity and the development of short range wireless communication technologies, a new network known as opportunistic networks emerges, this kind of network falls into two fields-Mobile Ad-hoc NETwork (MANET) and Delay Tolerant Network (DTN). Opportunistic network thus comprises the methods and features of Delay...

    Provided By The World

  • White Papers // Jan 2013

    Adoption of Cloud Computing in Distance Learning

    The use of distance courses in learning is growing exponentially. To better support faculty and students for teaching and learning, distance learning programs need to constantly innovate and optimize their IT infrastructures. The new IT paradigm called "Cloud computing" has the potential to transform the way that IT resources are...

    Provided By The World

  • White Papers // Jan 2013

    Development of Communication Protocol Conversion Equipment Based on Embedded MCU and RTX51

    Using the embedded multi-MCU and high-speed dual-port RAM data sharing technology, communication protocol conversion equipment based on embedded multi-MCU and real-time multitasking operating system RTX51 has been researched and developed, which adopts RS232 or RS485 communication interfaces for lower machines such as data acquisition I/O modules, smart intelligent instruments and...

    Provided By The World

  • White Papers // Jan 2013

    Analysis of Cluster Based Routing Protocol for Mobile Wireless Sensor Network

    Technological advances in communications and computation have enabled the development of low-cost, low-power, small in size, and multifunctional sensor nodes in a wireless sensor network. Since the radio transmission and reception consumes a lot of energy, one of the important issues in Wireless Sensor Network (WSN) is the inherent limited...

    Provided By The World

  • White Papers // Jan 2013

    Augmentation Data Security Aspects of Cloud Computing

    Cloud computing environments consisting of different modules that handle the security and trust issues of key components. One of the modules is responsible for authentication and identity management. This paper focuses on the issues related to the data security aspect of cloud computing. This paper surveys recent research related to...

    Provided By The World

  • White Papers // Jan 2013

    An Energy-Efficient Congestion Based Clustering Protocol for Wireless Sensor Network Using Round Robin Scheduling Technique

    A wireless sensor networks consists of spatially distributed autonomous sensors nodes called motes. Clustering is an effective way for prolonging the lifetime of a wireless sensor network. Current clustering algorithms consumes much time in setup phase and they hardly consider the congestion problem at the base station and inter-cluster communication...

    Provided By The World

  • White Papers // Jun 2012

    Delay Based End to End Internet Congestion Control Using Natural Logic

    The problem of network congestion management is a major issue and a high priority, especially given the growing size, demand, and speed (bandwidth) of the increasingly integrated services networks. Delay-based algorithms become the preferred approach for end-to-end congestion control as networks scale up in capacity. Their advantage is small at...

    Provided By The World

  • White Papers // Jan 2013

    An Efficient Resource Allocation Protocol for Multimedia Wireless Networks

    In the next generation high-speed wireless networks are expected to support multimedia applications (video, voice, and data). As such, it is important that these networks provide Quality-of-Service (QoS) guarantees. Unlike wired networks, communication entities in wireless networks change their connectivity via handoff when user moves from one cell to another....

    Provided By The World

  • White Papers // Jan 2013

    Implementation of Light Weight Internet Controlled Web Server in Embedded Systems

    This paper presents an implementation of a plat form independent embedded web server and its integration into a network of wireless sensor nodes. This allows the user to monitor the operation of the WSN remotely, to periodically download the sensed data, and to change the operation mode of the network....

    Provided By The World

  • White Papers // Jan 2013

    Security and Congestion Control Schema Using Randomized Dispersive Routes in Heterogeneous Networks

    Generally traffic and the sensor network security have many challenges in the transmission of data in the network. The existing schemes consider homogeneous sensor networks which have poor performance and scalability. Due to many-to-one traffic pattern, sensors may communicate with small portion of its neighbors. Key management is the critical...

    Provided By The World

  • White Papers // Jan 2013

    Secure Data Accumulation by Ant Agents in Wireless Sensor Network Using Randomized Dispersive Routing Mechanism

    In this paper, the authors discuss the implementation of data accumulation in wireless sensor networks and also the methods to increase the security of the accumulated data using dispersive routing techniques like NRRP (Non Repetitive Random Propagation). The data accumulation is accomplished by the concept of Honey Ants and ant...

    Provided By The World

  • White Papers // Jan 2013

    Deploying Virtual Cluster Nodes Distributed Over Different Cloud Providers for On-Demand Resource Provisioning

    Cloud computing technologies can offer important benefits for IT organizations and data centers running MTC applications such as elasticity and rapid provisioning, enabling the organization to increase or decrease its infrastructure capacity within minutes, according to the computing necessities; pay as you go model, allowing organizations to purchase and pay...

    Provided By The World

  • White Papers // Jan 2013

    An Efficient Routing Approach to Provide Security in Wireless Networks

    Wireless ad hoc network is autonomous, infrastructure less and may be mobile depending on its type of application. Secure transmission of information in wireless ad hoc environment is an important concern. In this paper, the authors propose to use shared cryptography to secure message communication in ad hoc network. In...

    Provided By The World

  • White Papers // Jan 2013

    Co-Operative Distributed Intrusion Detection in Wireless Ad-Hoc Network

    Intrusion detection in wireless ad hoc networks is a challenging task because these networks change their topologies dynamically, lack concentration points where aggregated traffic can be analyzed, utilize infrastructure protocols that are susceptible to manipulation, and rely on noisy, intermittent wireless communications. Security remains a major challenge for these networks...

    Provided By The World

  • White Papers // Jan 2013

    Video Signal Transmission Through DWDM Network

    In this paper, the authors proposed a procedure, which determines where the interruption of the quality of transmission starts. Based on the algorithm, simulations of transmission for specific values are executed. The analysis of the results showed how the BER and Q-factor change depending on the length of the fiber,...

    Provided By The World

  • White Papers // Jan 2013

    Parameter Estimation of Price-Demand Model for Cloud Data Services

    Cloud applications that offer data management services are emerging. Such clouds support caching of data in order to provide quality query services. The users can query the cloud data, paying the price for the infrastructure they use. Cloud management necessitates an economy that manages the service of multiple users in...

    Provided By The World

  • White Papers // Jan 2013

    Resistant Protocol to Resist Large-Scale Online Password Guessing Attacks

    Passwords, passphrases and security codes are used in virtually every interaction between users and information systems. Unfortunately, with such a central role in security, easily guessed passwords are often the weakest link. They grant attackers access to system resources; and bring them significantly closer to being able to access other...

    Provided By The World

  • White Papers // Jan 2013

    Anonymous Processing of Query in Road Networks

    The increasing availability of location aware mobile devices has given rise to a flurry of Location-Based Services (LBS). Due to the nature of spatial queries, an LBS needs the user position in order to process the requests. On the other hand, revealing exact user locations to (potentially untrusted) LBS may...

    Provided By The World

  • White Papers // Jan 2013

    Optimisation of the VLSI Architecture in Wireless Sensor Network

    Optimisation of VLSI architecture in Wireless Sensor Network (WSN) scheme for fusion centre to detect the faults of sensor nodes via Efficient Collaborative Sensor Fault Detection (ECSFD), these scheme identifies the sensor node fault percentage and its efficiency of the particular sensor node. In real world most of the applications...

    Provided By The World

  • White Papers // Apr 2012

    An Analysis and Comparison of Multi-Hop Ad-Hoc Wireless Routing Protocols for Mobile Node

    A Mobile Ad-Hoc NETwork (MANET) is a group of wireless nodes and distributed throughout the network. In MANET each node using the multi hops wireless links without an infrastructure or centralized administration. Now days, a variety of routing protocols targeted specifically at this environment have been developed and some performance...

    Provided By The World

  • White Papers // Apr 2012

    Use of Data Mining in Emergency Evacuation Planning

    Evacuating large numbers of people during a natural disaster or terrorist attack is a vital challenge for emergency management professionals. This is even a continuous pressure on the management in the hurricane zones. Hurricanes Katrina and Rita vividly illustrated this problem. Miles-long traffic jams on the highways during any evacuation...

    Provided By The World

  • White Papers // Aug 2012

    Skin Tone Based Secrete Communication Using DWT

    Steganography is the art of hiding the existence of data in another transmission medium to achieve secret communication. It does not replace cryptography but rather boosts the security using its obscurity features. Steganography method used in this paper is based on biometrics. And the biometric feature used to implement Steganography...

    Provided By The World

  • White Papers // Aug 2012

    Design and Verification of Performance of 32 Bit High Speed Truncation-Error -Tolerant Adder

    In this paper, the authors have proposed an architecture for high speed Truncation Adder Algorithm. In modern VLSI technology, the occurrence of all kinds of errors has become inevitable. By adopting an emerging concept in VLSI design and test, Error Tolerance (ET), a novel Error-Tolerant Adder (ETA) is proposed. The...

    Provided By The World

  • White Papers // Aug 2012

    Mobile Cloud a New Vehicle for Learning: M-Learning Its Issues and Challenges

    Today, the people are witnessing the emergence of a connected, mobile society, with a variety of information sources and means of communication available at home, office, organizations and in the community at large. To be always connected there are many ways like mobile, tablet etc. Although, cloud computing has established...

    Provided By The World

  • White Papers // Oct 2012

    Rapid Face Recognition Technology Using Eigenfaces and Gabor Filter

    Face recognition is one of biometric methods, to identify given face image using main features of face. Face recognition system is a computer application for automatically identifying or verifying a person from a digital image. Gabor filters have proven themselves to be a powerful tool for feature extraction. Proposed methodology...

    Provided By The World

  • White Papers // Oct 2012

    The Development of Road Lighting Intelligent Control System Based on Wireless Network Control

    Energy problem is a social focus now-a-days. Energy-saving and environmental protection is the policy of China. According to the people national conditions, road lighting system of their country is still emerging technologies. In this paper, to reach the purpose of energy saving, it introduces an information method to deal with...

    Provided By The World

  • White Papers // Aug 2012

    Channel Capacity of MIMO System Over NAKAGAMI- M Fading Channel

    Multiple Input and Multiple Output (MIMO) system have the potential to achieve very high capacities, depending on the propagation environment. A MIMO system provides multiple independent transmission channels, thus, leading (under certain conditions) to a channel capacity that increases linearly with the number of antenna elements. It is well known...

    Provided By The World

  • White Papers // Aug 2012

    Analysis and Implementation of FP & Q-FP Tree with Minimum CPU Utilization in Association Rule Mining

    Association rule mining, one of the most important and well researched techniques of data mining, was first introduced in. It aims to extract interesting correlations, frequent patterns, associations or casual structures among sets of items in the transaction databases or other data repositories. However, no method has been shown to...

    Provided By The World

  • White Papers // Aug 2012

    Energy Efficient Geographical Routing Protocol with Location Awareness in Mobile AdHoc Network

    A Mobile Ad hoc NETwork (MANET) is a kind of wireless ad-hoc network, and is a self configuring network of mobile routers (and associated hosts) connected by wireless links the union of which forms an arbitrary topology. The routers are free to move randomly and organize themselves arbitrarily, thus the...

    Provided By The World

  • White Papers // Oct 2012

    Analysis on AES Algorithm Using Symmetric Cryptography

    In this paper, the authors present the protection of long lived private key & public key using cryptographic schemes is one of the most important issues for information security. Any cryptographic scheme that reveals private key and public key will soon its security absolutely disintegrates. Public key are used in...

    Provided By The World