University of Asia Pacific

Displaying 1-5 of 5 results

  • White Papers // Feb 2011

    JXTA & Web Services Using Secret Key Based Encryption

    JXTA is a P2P (Peer-To-Peer) Semantic Web application, which is aimed to accommodate heterogeneous resource metadata repositories in a P2P manner., the main focus of research in cellular domain has shifted to "Web Service Security" The aim of this paper will be to develop a distributed service discovery mechanism. JXTA's...

    Provided By University of Asia Pacific

  • White Papers // Feb 2011

    Performance Comparison of AWGN, Flat Fading and Frequency Selective Fading Channel for Wireless Communication System Using 4QPSK

    In this paper, first build up a wireless communication simulator including Gray coding, modulation, different channel models (AWGN, flat fading and frequency selective fading channels), channel estimation, adaptive equalization, and demodulation. Next, test the effect of different channel models to the data and image in receiver with constellation and BER...

    Provided By University of Asia Pacific

  • White Papers // Feb 2011

    An Electronic Eye: Sight in Semiconductor

    This paper presents a model of the eye movement. Using the natural process of seeing any object by the eye, a simple block diagram was considered. From this block diagram the mathematical model of eye movement was developed. The developed model was then converted into state equations which were used...

    Provided By University of Asia Pacific

  • White Papers // Feb 2011

    IT Adoption for Supply Chain Integration in Retail Sector

    Application of Information Technology (IT) in Supply Chain Integration (SCI) has enabled Organizations to meet everchanging dynamic global markets. The present paper tries to investigate important determinants for IT adoption and tests the value of Supply Chain co-ordination and Organization strategies in enhancing performance. The Indian Retail Sector due to...

    Provided By University of Asia Pacific

  • White Papers // Feb 2011

    An Efficient, Simple and Scalable Automatic Generation of VPN Security Policies

    IPSec (Suite of protocols for IP layer Security) policies are widely deployed in firewalls or security gateways to restrict access or protect information, which is one of major mechanisms for Virtual Private Network (VPN). It is critical for policies to be specified and configured correctly because the security treatment (e.g....

    Provided By University of Asia Pacific

  • White Papers // Feb 2011

    Performance Comparison of AWGN, Flat Fading and Frequency Selective Fading Channel for Wireless Communication System Using 4QPSK

    In this paper, first build up a wireless communication simulator including Gray coding, modulation, different channel models (AWGN, flat fading and frequency selective fading channels), channel estimation, adaptive equalization, and demodulation. Next, test the effect of different channel models to the data and image in receiver with constellation and BER...

    Provided By University of Asia Pacific

  • White Papers // Feb 2011

    An Electronic Eye: Sight in Semiconductor

    This paper presents a model of the eye movement. Using the natural process of seeing any object by the eye, a simple block diagram was considered. From this block diagram the mathematical model of eye movement was developed. The developed model was then converted into state equations which were used...

    Provided By University of Asia Pacific

  • White Papers // Feb 2011

    JXTA & Web Services Using Secret Key Based Encryption

    JXTA is a P2P (Peer-To-Peer) Semantic Web application, which is aimed to accommodate heterogeneous resource metadata repositories in a P2P manner., the main focus of research in cellular domain has shifted to "Web Service Security" The aim of this paper will be to develop a distributed service discovery mechanism. JXTA's...

    Provided By University of Asia Pacific

  • White Papers // Feb 2011

    IT Adoption for Supply Chain Integration in Retail Sector

    Application of Information Technology (IT) in Supply Chain Integration (SCI) has enabled Organizations to meet everchanging dynamic global markets. The present paper tries to investigate important determinants for IT adoption and tests the value of Supply Chain co-ordination and Organization strategies in enhancing performance. The Indian Retail Sector due to...

    Provided By University of Asia Pacific

  • White Papers // Feb 2011

    An Efficient, Simple and Scalable Automatic Generation of VPN Security Policies

    IPSec (Suite of protocols for IP layer Security) policies are widely deployed in firewalls or security gateways to restrict access or protect information, which is one of major mechanisms for Virtual Private Network (VPN). It is critical for policies to be specified and configured correctly because the security treatment (e.g....

    Provided By University of Asia Pacific