The World

Displaying 1-40 of 186 results

  • White Papers // Jan 2014

    Authentication Using Private Weighted Questioning

    In this paper, the authors present a strong authentication method by examining each user with certain private information related to that user. The proposed method constructs a database for all authenticated users. Each record in this database is assigned to individual users. Some of the fields of user's record are...

    Provided By The World

  • White Papers // Jan 2014

    Analysis of K-Anonymity for Homogeneity Attack

    Now-a-days, the authors are dealing with a massive amount of data that contain person-specific information. From the person-specific data it is easy to extract the sensitive information about a person by the process of linking. The size of data is increasing exponentially day-by-day. It is as much important to provide...

    Provided By The World

  • White Papers // Jan 2014

    A Single Sign-On Based Integrated Model for E-Banking Services Through Cloud Computing

    With increasing advances in technology, there's a need to learn and use new technologies. Necessity of e-banking, and mainly internet banking and their importance and role in decreasing distances and increasing service providing speed is obvious but impose many challenges to executives. Prevailing over people's distrust to the internet is...

    Provided By The World

  • White Papers // Jan 2014

    Swarm Intelligence Based Fuzzy with Personalized Ontology Model for Web Information Gathering

    Ontology is expansively used to represent the knowledge clarification and formalization of user profiles for gathering personalized web information. For representing user profiles from both global information and local information several models have been studied in literature. Personalized user profile based ontology model revise user profiles for mutually a world...

    Provided By The World

  • White Papers // Jan 2014

    Extreme Learning Machine Algorithm to Discover New Attributes From Unseen sites

    In this paper, the authors develop a learning framework for adding the information or knowledge extraction methods based wrapper methods for new attribute discovery, it aims at automatically adapting a formerly learning wrapper beginning the source web site to an innovative unobserved site for information extraction. One exclusive distinguishing of...

    Provided By The World

  • White Papers // Dec 2013

    Radon Transform and Symbolic Linear Discriminant Analysis Based 3D Face Recognition Using KNN and SVM

    In spite of over two decades of intense research, illumination and pose invariance remain prohibitively challenging aspects of face recognition for most practical application. Many recent events, such as terrorist attacks, have exposed the serious weaknesses in most sophisticated security systems. Automatic face recognition has long been established as one...

    Provided By The World

  • White Papers // Dec 2013

    Extraction of Shape-Invariant Gait Features for Human Gait Recognition

    In appearance based human gait recognition, minimizing the variations of different cofactors such as viewing angles, carrying objects, clothing are the key challenging problems. To extract the shape-invariant gait features the authors have adopted a qualitative spatial and temporal reasoning based feature extraction technique. They extract the Space Time Shapes...

    Provided By The World

  • White Papers // Dec 2013

    Secure Routing in Wireless Mobile Ad-hoc Network

    Mobile Ad-hoc NETwork (MANET) has become particularly vulnerable to intrusion, as they operate in open medium, and use cooperative strategies for network communications. The black hole attack is one of such security risks. In this paper, a malicious node falsely advertise shortest path to the destination node with an intension...

    Provided By The World

  • White Papers // Dec 2013

    Association Rules Mining Using Improved Frequent Pattern Tree Algorithm

    Web mining can be broadly defined as discovery and analysis of useful information from the World Wide Web (WWW). Web usage mining can be described as the discovery and analysis of user accessibility pattern, during the mining of log files and associated data from a particular web site, in order...

    Provided By The World

  • White Papers // Dec 2013

    Efficient Search Based On Relativity Context Using Web Mining Techniques

    In this paper, the author present an efficient method for keyword based searching using the relativity context of keyword on the basis of information available on social networking sites. To do that the author designed an standard application and by using social networking sites by which the author can get...

    Provided By The World

  • White Papers // Dec 2013

    Real-World Applications of Distributed Clustering Mechanism in Dense Wireless Sensor Networks

    Wireless sensors and wireless sensor networks have come up to the forefront of the scientific community freshly. Clustering is a flourishing topology control approach, which can lengthen the lifetime and raise scalability for wireless sensor networks. The most well-liked criterion for distributed clustering methodology is to choose cluster heads with...

    Provided By The World

  • White Papers // Nov 2013

    Multimodal Biometrics Based System for Efficient Human Recognition

    In this paper, the authors propose the multimodal biometrics system for identity verification using four traits i.e., face, fingerprint, iris and signature. The proposed system is designed for applications where the training database contains a face, iris, two fingerprint images and/or one or two signature image(s) for each individual. The...

    Provided By The World

  • White Papers // Nov 2013

    Creating Minimized Data Sets by Using Horizontal Aggregations in SQL for Data Mining Analysis

    Mining historical data can help in discovering actionable knowledge. However, mining activities cannot be done directly on the regular databases. In order to perform data mining, it is required to prepare datasets that will be useful for mining process. Preparing datasets manually for data mining is a challenging task as...

    Provided By The World

  • White Papers // Nov 2013

    Analysis of Association Mining Through Enhanced Apriori Algorithm

    To select interesting rules from the set of all possible rules, constraints on various measures of significance and interest can be used. The best-known constraints are minimum thresholds on support and confidence. Association rule mining is an important field of knowledge discovery in database. Association Rule mining discovers uncover relationships...

    Provided By The World

  • White Papers // Nov 2013

    A Universal Session Based Bit Level Block Encoding Technique to Enhance the Information Security

    In this paper, a session based symmetric key cryptographic technique has been proposed and it is termed as Matrix Based Block Encoding Technique (MBBET). MBBET consider the input plain text as a stream of finite number of binary bits. This binary bit stream is chopped into manageable-sized blocks. The bits...

    Provided By The World

  • White Papers // Nov 2013

    TEFS, Trust and Cloud Computing

    Cloud computing is an emerging topic amongst IT personnel. Pay-as-you-go is the basis of cloud computing. It makes data services to be available in enormous speed and with greater ease but the data reside outside the organization's boundaries. Trusting the cloud provider is inevitable. Building Trust is the need of...

    Provided By The World

  • White Papers // Nov 2013

    Enhancing Seekable Sequential Key Generators along with FSS Scheme for Secure Logging in the Cloud

    The need for secure logging is well-understood by the security professionals, together with each researchers and practitioners. The flexibility to the accuracy verifies all (or some) log entries is very important to any application using secure logging techniques. During this paper, the authors start by examining progressive in secure logging...

    Provided By The World

  • White Papers // Nov 2013

    A Novel Approach To Sogi Grid Synchronization System For Three-Phase Grid-Connected Power Converters Under Unstable Conditions

    The high penetration of renewable energy sources such as wind power and photo voltaics experienced in the last decades is a good example, as both generation systems are connected to the grid by means of power electronics-based power processors that should not only control the power delivered to the network,...

    Provided By The World

  • White Papers // Nov 2013

    Web Service Classification Using Efficient Neural Networks

    Classification is a widely used mechanism for facilitating web service discovery. Existing methods for automatic web service classification only consider the case where the category set is small. When the category set is big, the conventional classification methods usually require a large sample collection, which is hardly available in real...

    Provided By The World

  • White Papers // Nov 2013

    Fast and Efficient Technique for Mining Frequent Closed Sequences

    Frequent patter mining has been around ever since the data mining domain came into popularity. However, there was an argument in this domain that one should min only closed frequent patterns instead of mining all frequent patterns. The reason being that the former gives rise to very compact and efficient...

    Provided By The World

  • White Papers // Nov 2013

    A Study to Determine How Best Cloud Computing Enables Sustainable Competitive Advantage

    Cloud computing is an evolving paradigm. The definition characterizes important aspects of cloud computing and is intended to serve as a means for broad comparisons of cloud services and deployment strategies, and to provide a baseline for discussion from what is cloud computing to how to best use cloud computing....

    Provided By The World

  • White Papers // Nov 2013

    Detection of Cuts to improve performance in Wireless Sensor Networks

    A wireless sensor network can get separated into multiple connected components due to the failure of some of its nodes, which is called a \"Cut\". In this paper, the authors consider the problem of detecting cuts by the remaining nodes of a wireless sensor network. They propose an algorithm that...

    Provided By The World

  • White Papers // Nov 2013

    A Secure Communication in Artifical Neural Networks

    In this paper, the authors discuss about neural network approach to intrusion detection. Misuse detection is the process of attempting to identify instances of network attacks by comparing current activity against the expected actions of an intruder. Most current approaches to misuse detection involve the use of rule-based expert systems...

    Provided By The World

  • White Papers // Nov 2013

    Adaptive Noise Cancellation Using Combined Adjusted Step Size LMS Algorithm and Active Tap Detection

    In this paper, a new idea to combine Adjusted Step Size Least Mean Square (ASSLMS) algorithm with standard LMS active tap detection technique is presented .Then the combined method is used for estimating unknown time-invariant (stationary) and time varying (non-stationary) Finite Impulse Response (FIR) channel for Adaptive Noise Cancellation (ANC)...

    Provided By The World

  • White Papers // Nov 2013

    Modular Clusterization Product Design Support System

    Modular design approach is widely used in consumer products, machinery and software design. This paper presents the design of a software system to assist designers in clustering modules during product design. Use of scientifically justifiable means of product development which are systematic and less rigorous in a research and development...

    Provided By The World

  • White Papers // Nov 2013

    Link Independent and Node Independent Algorithms for Efficient Multipath Routing

    Link-independent and node-independent DAGs satisfy the property that any path from a source to the root on one DAG is link-disjoint (node-disjoint) with any path from the source to the root on the other DAG. To achieve resilient multipath routing, first introduce the concept of Independent Directed Acyclic Graphs (IDAGs)....

    Provided By The World

  • White Papers // Oct 2013

    Doubly truncated Multivariate Gaussian mixture model for Face images

    In this paper, the authors introduce a face recognition algorithm based on doubly truncated multivariate Gaussian mixture model with DCT. The truncation on the feature vector has a significant influence in improving the recognition rate of the system using EM algorithm with K-means or hierarchical clustering, the model parameters are...

    Provided By The World

  • White Papers // Oct 2013

    Providing Secure Authentication by Graphical Password Using Grabbing Technique

    Authentication plays a vital role in protecting resources against illegal use. Various graphical password schemes have been projected as alternatives to text-based password. Authentication is the initial stage of information security. Authentication process requires users to remember the passwords and recollect them during log-in time. Hence the images are used...

    Provided By The World

  • White Papers // Oct 2013

    An Advanced Survey on Cloud Storage for Enterprise

    Storage as a Service is a business model in which a large company rents space in their storage infrastructure to a smaller company, individual and up to large company. In the enterprise, SaaS vendors are targeting secondary storage applications by promoting SaaS as a convenient way to manage backups. Cloud...

    Provided By The World

  • White Papers // Oct 2013

    A Review on Biometric Authentication Techniques

    Advancement in the information technology field also makes the security of the information an important part of it. Therefore, security becomes a major issue and the need for authentication even become more important. The prevailing methods of human identification such as identification of documents and PIN are not able to...

    Provided By The World

  • White Papers // Oct 2013

    A Comparative Study of the Communication Architectures for Wireless Sensor Networks

    Wireless networks have evolved within a short span of time. A set of sensor nodes forming a cooperative network is known as Wireless Sensor Network (WSN). The future is going to be a global network connected through wireless sensors which respond to queries and events registered. In this work, an...

    Provided By The World

  • White Papers // Oct 2013

    The P Vs NP Problem: A Method for Solving NP-Complete Problems by Use of Graph Embodiment on a Quantum Computation Paradigm Using a Relational Database Query

    The relationship between the complexity class P and NP is one of the most fascinating and unresolved question in theoretical computer science. The classical computational paradigm, hedged on Turing paper may be by itself the limiting factor. To investigate this relationship, a method for solving a query problem on a...

    Provided By The World

  • White Papers // Oct 2013

    A Novel and Cyclic Approach to Solve a Classification Problem

    In this paper, the authors propose a novel solution to solve the classification problems in the area of data mining. They are more concentrated on classification problem because the current test data set will become as training data set after a period of time, hence classification model must face the...

    Provided By The World

  • White Papers // Oct 2013

    Weighted Fuzzy Soft Matrix Theory and its Decision Making

    In this paper, the authors use soft set theory in decision making in banking system. A new efficient solution procedure has been developed to solve fuzzy soft set based real life decision making problems involving multiple decision makers. In this paper new technique of applying threshold for selecting an optimal...

    Provided By The World

  • White Papers // Oct 2013

    Alternative Design Exploration using K-Nearest Neighbor Technique and Semantic Web Technology in an Energy Simulation Tool

    An energy simulation tool is a tool that is used to calculate energy demand of a building. The existing energy simulation tools carry out alternative design exploration using optimization method. This method works by varying its parameters to obtain better energy performance. The method needs to calculate energy performance every...

    Provided By The World

  • White Papers // Oct 2013

    Auditing Cloud Storage for Continuous Storage Security

    Cloud storage permits users to remotely store their knowledge and revel in the on-demand top quality cloud applications while not the burden of native hardware and software package management. Though the advantages are clear, such a service is addition relinquishing users' physical possession of their outsourced knowledge, which necessarily poses...

    Provided By The World

  • White Papers // Sep 2013

    An Effective Combination Technique for Artificial Intelligence Based Ensembles for Intrusion Detection

    Artificial intelligence based techniques capitulate better performance in identifying the intrusions than other conventional approaches used in this field, but no single classifier is capable of identifying intrusions with acceptable accuracy. So, there is a necessity of integrating more than one classifier. This paper mainly focuses on constructing an ensemble...

    Provided By The World

  • White Papers // Sep 2013

    Bloom Vector Join for Sensor Query Processing

    Sensors are low-cost devices which sense and disseminate information about the environment around them. A set of such nodes which can communicate by radio transmission form a sensor network, which communicates with the outside world through a sink node. In view of their low cost and ad-hoc nature of deployment,...

    Provided By The World

  • White Papers // Sep 2013

    Network Intrusion Detection and Response System for Mobile Ad Hoc Networks

    As wireless network growing rapidly it becomes very important to have intrusion detection system in it. Mobile ad hoc networks are particularly vulnerable to Denial of Service attacks (DoS) due to their open decentralized architecture, highly dynamic topology and shared wireless medium in which they exist. The authors implemented the...

    Provided By The World

  • White Papers // Sep 2013

    Enhancing Distributed Accountability by Using Proxy Re-Encryption Scheme

    In cloud computing environment resources are shared among various clients and it's important for system provider to allocate the necessary resources for the clients. And IT infrastructure proceeds as the amount increases to grow, cloud computing is a new way of virtualization technologies that enable management of virtual machines over...

    Provided By The World

  • White Papers // Nov 2012

    A Survey on Query Response Time Optimization Approaches for Reliable Data Communication in Wireless Sensor Network

    Wireless sensor network is an application specific network. There are various factors which affects reliability in Wireless Sensor Network some of them are energy consumption, high packet loss, congestion, and large response time. There are different parameters, which affects query response time. Whenever Sink [Base Station] needs data, it sends...

    Provided By The World

  • White Papers // Sep 2012

    Decision Trees for Handling Uncertain Data to Identify Bank Frauds

    Classification is a classical problem in machine learning and data mining. In traditional decision tree classification, a feature of a tuple is either categorical or numerical. The decision tree algorithms are used for classify the certain and numerical data for many applications. In existing system they implement the extended the...

    Provided By The World

  • White Papers // Jan 2013

    Security Algorithms to Prevent Denial of Service (DoS) Attacks in WLAN

    This paper proposes security algorithms which are used to mitigate the Media Access Control (MAC) layer Denial of Service (DoS) attacks in WLAN infrastructure networks. This paper is aimed to attend the DoS attacks due to the susceptibility of the MAC layer's management frames. The management frames are sent unencrypted;...

    Provided By The World

  • White Papers // Jan 2013

    Sampling and Reconstruction of Wireless UWB Pulses by Multi-Stage Exponential Filter

    In wireless Ultra WideBand (UWB) technology the sampling and reconstruction of short impulses (Diracs) is an important research object in signal processing society. In this paper, the authors introduce a Multi-Stage Exponential Filter (MSEF) for sampling and reconstruction of the UWB pulses. The MSEF is constructed from a cascade of...

    Provided By The World

  • White Papers // Aug 2012

    A Study on the Security and Routing Protocols for Ad-Hoc Network

    A Mobile Ad-hoc NETwork (MANET) is a self-configuring infrastructure less network of mobile devices connected by wireless. ad hoc is a Latin word which means "For this purpose". Each device in a MANET is free to move independently in any direction, and will therefore change its links to other devices...

    Provided By The World

  • White Papers // Oct 2012

    Capacity of a Equalizer Based MIMO System

    In wireless communications, spectrum is a scarce resource and hence imposes a high cost on the high data rate transmission. It has been demonstrated that multiple antenna system provides very promising gain in capacity without increasing the use of spectrum, reliability, throughput, power consumption and less sensitivity to fading, hence...

    Provided By The World

  • White Papers // Dec 2012

    Microstrip Antenna: Design Aspects

    The rapid growth and demand of wireless based applications for commercial and personal communication increases the demand of microstrip antennas with the advantage of being low cost, low profile, small size, capable of being integrated with VLSI design. However microstrip antennas have some inherent limitations i.e. narrow bandwidth, low gain,...

    Provided By The World

  • White Papers // Jan 2013

    Intrusion Detection Using Pipelining of Layers With Conditional Random Fields in Multicore Processors

    An intrusion detection system is a predictable element of any computer network system. Now a day's intrusion detection faces a number of key challenging issues. The challenges like detect malicious activities and the large amount of network traffic. In this paper these two issues are addressed using Conditional Random Fields...

    Provided By The World

  • White Papers // Jan 2013

    Lifetime Analysis of MANET in Presence of Selfish Nodes

    The MANETs are self-configuring and decentralized networks without having a fixed infrastructure. In such a network, each node acts as an end-system as well as a relay node (or router). Most of the routing algorithms designed for a MANET are based on the assumption that every node in the network...

    Provided By The World

  • White Papers // Jan 2013

    A Novel Approach on Applications, Research Challenges and Mining for Mobile Crowdsensing

    A new phase of the information society - The Internet of things in which the web will not only link computers but potentially every object created by mankind. An emerging category of devices at the edge of the Internet are consumer centric mobile sensing and computing devices, such as smart...

    Provided By The World

  • White Papers // Jan 2013

    Trusted Dissemation of Data in Opportunistic Network

    With the rapid evolution of network diversity and the development of short range wireless communication technologies, a new network known as opportunistic networks emerges, this kind of network falls into two fields-Mobile Ad-hoc NETwork (MANET) and Delay Tolerant Network (DTN). Opportunistic network thus comprises the methods and features of Delay...

    Provided By The World

  • White Papers // Jan 2013

    Adoption of Cloud Computing in Distance Learning

    The use of distance courses in learning is growing exponentially. To better support faculty and students for teaching and learning, distance learning programs need to constantly innovate and optimize their IT infrastructures. The new IT paradigm called "Cloud computing" has the potential to transform the way that IT resources are...

    Provided By The World

  • White Papers // Jan 2013

    Development of Communication Protocol Conversion Equipment Based on Embedded MCU and RTX51

    Using the embedded multi-MCU and high-speed dual-port RAM data sharing technology, communication protocol conversion equipment based on embedded multi-MCU and real-time multitasking operating system RTX51 has been researched and developed, which adopts RS232 or RS485 communication interfaces for lower machines such as data acquisition I/O modules, smart intelligent instruments and...

    Provided By The World

  • White Papers // Jan 2013

    Analysis of Cluster Based Routing Protocol for Mobile Wireless Sensor Network

    Technological advances in communications and computation have enabled the development of low-cost, low-power, small in size, and multifunctional sensor nodes in a wireless sensor network. Since the radio transmission and reception consumes a lot of energy, one of the important issues in Wireless Sensor Network (WSN) is the inherent limited...

    Provided By The World

  • White Papers // Jan 2013

    Augmentation Data Security Aspects of Cloud Computing

    Cloud computing environments consisting of different modules that handle the security and trust issues of key components. One of the modules is responsible for authentication and identity management. This paper focuses on the issues related to the data security aspect of cloud computing. This paper surveys recent research related to...

    Provided By The World

  • White Papers // Jan 2013

    An Energy-Efficient Congestion Based Clustering Protocol for Wireless Sensor Network Using Round Robin Scheduling Technique

    A wireless sensor networks consists of spatially distributed autonomous sensors nodes called motes. Clustering is an effective way for prolonging the lifetime of a wireless sensor network. Current clustering algorithms consumes much time in setup phase and they hardly consider the congestion problem at the base station and inter-cluster communication...

    Provided By The World

  • White Papers // Jun 2012

    Delay Based End to End Internet Congestion Control Using Natural Logic

    The problem of network congestion management is a major issue and a high priority, especially given the growing size, demand, and speed (bandwidth) of the increasingly integrated services networks. Delay-based algorithms become the preferred approach for end-to-end congestion control as networks scale up in capacity. Their advantage is small at...

    Provided By The World

  • White Papers // Jan 2013

    An Efficient Resource Allocation Protocol for Multimedia Wireless Networks

    In the next generation high-speed wireless networks are expected to support multimedia applications (video, voice, and data). As such, it is important that these networks provide Quality-of-Service (QoS) guarantees. Unlike wired networks, communication entities in wireless networks change their connectivity via handoff when user moves from one cell to another....

    Provided By The World

  • White Papers // Jan 2013

    Implementation of Light Weight Internet Controlled Web Server in Embedded Systems

    This paper presents an implementation of a plat form independent embedded web server and its integration into a network of wireless sensor nodes. This allows the user to monitor the operation of the WSN remotely, to periodically download the sensed data, and to change the operation mode of the network....

    Provided By The World

  • White Papers // Jan 2013

    Security and Congestion Control Schema Using Randomized Dispersive Routes in Heterogeneous Networks

    Generally traffic and the sensor network security have many challenges in the transmission of data in the network. The existing schemes consider homogeneous sensor networks which have poor performance and scalability. Due to many-to-one traffic pattern, sensors may communicate with small portion of its neighbors. Key management is the critical...

    Provided By The World

  • White Papers // Jan 2013

    Secure Data Accumulation by Ant Agents in Wireless Sensor Network Using Randomized Dispersive Routing Mechanism

    In this paper, the authors discuss the implementation of data accumulation in wireless sensor networks and also the methods to increase the security of the accumulated data using dispersive routing techniques like NRRP (Non Repetitive Random Propagation). The data accumulation is accomplished by the concept of Honey Ants and ant...

    Provided By The World

  • White Papers // Jan 2013

    Deploying Virtual Cluster Nodes Distributed Over Different Cloud Providers for On-Demand Resource Provisioning

    Cloud computing technologies can offer important benefits for IT organizations and data centers running MTC applications such as elasticity and rapid provisioning, enabling the organization to increase or decrease its infrastructure capacity within minutes, according to the computing necessities; pay as you go model, allowing organizations to purchase and pay...

    Provided By The World

  • White Papers // Jan 2013

    An Efficient Routing Approach to Provide Security in Wireless Networks

    Wireless ad hoc network is autonomous, infrastructure less and may be mobile depending on its type of application. Secure transmission of information in wireless ad hoc environment is an important concern. In this paper, the authors propose to use shared cryptography to secure message communication in ad hoc network. In...

    Provided By The World

  • White Papers // Jan 2013

    Co-Operative Distributed Intrusion Detection in Wireless Ad-Hoc Network

    Intrusion detection in wireless ad hoc networks is a challenging task because these networks change their topologies dynamically, lack concentration points where aggregated traffic can be analyzed, utilize infrastructure protocols that are susceptible to manipulation, and rely on noisy, intermittent wireless communications. Security remains a major challenge for these networks...

    Provided By The World

  • White Papers // Jan 2013

    Video Signal Transmission Through DWDM Network

    In this paper, the authors proposed a procedure, which determines where the interruption of the quality of transmission starts. Based on the algorithm, simulations of transmission for specific values are executed. The analysis of the results showed how the BER and Q-factor change depending on the length of the fiber,...

    Provided By The World

  • White Papers // Jan 2013

    Parameter Estimation of Price-Demand Model for Cloud Data Services

    Cloud applications that offer data management services are emerging. Such clouds support caching of data in order to provide quality query services. The users can query the cloud data, paying the price for the infrastructure they use. Cloud management necessitates an economy that manages the service of multiple users in...

    Provided By The World

  • White Papers // Jan 2013

    Resistant Protocol to Resist Large-Scale Online Password Guessing Attacks

    Passwords, passphrases and security codes are used in virtually every interaction between users and information systems. Unfortunately, with such a central role in security, easily guessed passwords are often the weakest link. They grant attackers access to system resources; and bring them significantly closer to being able to access other...

    Provided By The World

  • White Papers // Jan 2013

    Anonymous Processing of Query in Road Networks

    The increasing availability of location aware mobile devices has given rise to a flurry of Location-Based Services (LBS). Due to the nature of spatial queries, an LBS needs the user position in order to process the requests. On the other hand, revealing exact user locations to (potentially untrusted) LBS may...

    Provided By The World

  • White Papers // Jan 2013

    Optimisation of the VLSI Architecture in Wireless Sensor Network

    Optimisation of VLSI architecture in Wireless Sensor Network (WSN) scheme for fusion centre to detect the faults of sensor nodes via Efficient Collaborative Sensor Fault Detection (ECSFD), these scheme identifies the sensor node fault percentage and its efficiency of the particular sensor node. In real world most of the applications...

    Provided By The World

  • White Papers // Jan 2013

    Reduction of Latency in an Asynchronous Communication System With Error Correction Capabilities

    This paper introduces a new family of Error-Correction Unordered (ECU) codes for global communication, called zero - sum. It is the combination of delay insensitive codes and fault tolerance of error correcting codes. Two important feature of this code are that they are systematic and weighted. For this code, a...

    Provided By The World

  • White Papers // Jan 2013

    Autonomic Computing Using Clouds

    Cloud computing offerings today that are suitable to host enterprise architectures. But while these offerings provide clear benefit to corporations by providing capabilities complementary to what they have, the fact that they can help to elastically scale enterprise architectures should not be understood to also mean that simply scaling in...

    Provided By The World

  • White Papers // Jan 2013

    Reducing Multipath Effects in Indoor Channel for Acquisition of GPS Based Pseudolite Signals

    The Global Positioning System (GPS) is an extremely mature technique in the navigation and positioning field. However, there are still some limits in some aspects and for some special applications. The main limitation of the GPS use indoors are the low signal power and the presence of multi-paths, which may...

    Provided By The World

  • White Papers // Jan 2013

    Performance Evaluation of Basic Compression Technique for Wireless Text Data

    The continuous growth of mobile, desktop and wired and wireless digital communication technologies has made the extensive use of the text data unavoidable. The basic characteristics of text data like transmission rate, bandwidth, redundancy, bulk capacity and co-relation among text data makes basic compression algorithms mandatory. The research exploration in...

    Provided By The World

  • White Papers // Jan 2013

    Web Based Audio/video Playback System Through Text Based SMS Using GSM and S3C2440

    In recent years, data service has been gaining popularity in embedded system. Most of the audio/video devices today consists of either a internal memory or consists of an interface in the form of I/O device and are being controlled by legacy Infra Red (IR) based remote controllers which has limited...

    Provided By The World

  • White Papers // Jan 2013

    LDPC Architecture Using Memory Bypassing Scheme

    Error correcting codes insert redundancy into the transmitted data stream so that the receiver can detect and possibly correct errors that occur during transmission. In VLSI design, area of the chip, speed and power consumption are. Its performance is close to Shannon's capacity limits. Inherent parallelism of the message passing...

    Provided By The World

  • White Papers // Jan 2013

    TDOA Computation Using Multicarrier Modulation for Sensor Networks With Efficient Bandwidth

    Locating accurate positions of the nodes is normally required in Sensor Networks which are attempting to locate and track an emitter or sources of signals. GPS is normally used as it provides high accuracy position measurement, but it has its own limitations. In this paper, the authors propose a Bandwidth...

    Provided By The World

  • White Papers // Jan 2013

    Probabilistic Approach for Speech Intelligibility Improvement and Noise Reduction

    Unlike the most speech enhancement algorithms improve speech quality, they may not improve speech intelligibility in noise, this paper focuses on the development of an algorithm that can be optimized for a specific acoustic environment and improve speech intelligibility. Ideal binary time-frequency masking is a signal separation technique that retains...

    Provided By The World

  • White Papers // Jan 2013

    Concept of Storage Virtualization Used in Networks

    Storage Virtualization was the first tutorial of the SNIA (Storage Networking Industrial Association) Education Committee. Development began in summer 2001 and continues to this day as the authors incorporate new material and address new developments in the storage virtualization segment. At the time of writing this booklet, the tutorial team...

    Provided By The World

  • White Papers // Aug 2013

    Design of Clustered Architecture for Cooperative Spectrum Sensing With Optimization of Number of Clusters

    The main idea behind this paper is to use an appropriate routing protocol for cognitive network which becomes a major necessity now a days. As the available radio frequency for wireless communication gets lesser day by day because of licensing, so the authors need to have some way to use...

    Provided By The World

  • White Papers // Aug 2013

    Personalized Mobile Search Engine by Analyzing Query Travel Patterns With Association Rule Mining

    Mobile based search engine the major problem is that the interaction between mobile users and search results are managed by small numeral of factors in the mobile phones. In order to manage these problem collect user query and their relevant result to satisfy the user profile according to the interest....

    Provided By The World