Now showing items 81-95 of 95

    • Analysis of Geo Positioning System Using RF & DA 

      Kohli, Jaspreet K.; Potgantwar, Amol (Scientific Research Publishing, 2016-04)
      Indoor positioning systems (IPSs) have been intended to provide position information of persons and devices. Higher user percentage of handheld devices such as tablets or mobile phones had led to the development of a number ...
    • A Study of Efficient Power Consumption Wireless Communication Techniques/ Modules for Internet of Things (IoT) Applications 

      Mahmoud, Mahmoud S.; Mohamad, Auday A. H. (Scientific Research Publishing, 2016-04)
      A study of wireless technologies for IoT applications in terms of power consumption has been presented in this paper. The study focuses on the importance of using low power wireless techniques and modules in IoT applications ...
    • Based on Adaptive Backstepping Error Control for Permanent Magnet Synchronous Motor 

      Jiang, Hua; Lin, Da; Liu, Yongchun; Song, Hong (Scientific Research Publishing, 2016-05)
      Permanent Magnet Synchronous Motor (PMSM) displays chaotic phenomenon when PMSM in power on or power off. At present, there are many methods to control chaos in PMSM. However, there appears oscillation in course of control ...
    • An Intelligent Sensor Based System for Real Time Heart Rate Monitoring (HRM) 

      Farin, Nusrat J.; Sharif, S. M. A.; Mobin, Iftekharul (Scientific Research Publishing, 2016-05)
      A method and apparatus for monitoring heart rate of the heart using a wearable system is designed and implemented in this paper. A heart rate receives from heart beat signals and stores the data to a database and after a ...
    • The Effect of Queuing Mechanisms First in First out (FIFO), Priority Queuing (PQ) and Weighted Fair Queuing (WFQ) on Network’s Routers and Applications 

      Mustafa, Mustafa E. G.; Talab, Samani A. (Scientific Research Publishing, 2016-05)
      The paper presents the simulation results of the comparison of three Queuing Mechanisms, First in First out (FIFO), Priority Queuing (PQ), and Weighted Fair Queuing (WFQ). Depending on their effects on the network’s Routers, ...
    • A Tree-Based Distributed Permutation Routing Protocol in Multi-Hop Wireless Sensors Network 

      Bomgni, Alain B.; Fute, Elie T.; Sindjoung, Miguel L. F.; Djamegni, Clémentin T. (Scientific Research Publishing, 2016-06)
      A Wireless Sensors Network (WSN) is an ad-hoc network populated by small hand-held commodity devices, running on batteries called stations or sensors. Often used in hostiles and sometimes unreachable environments, stations ...
    • Generalized Electromagnetic Pollution Monitoring Using WSN 

      Nouh, Sara; Elgaml, Nada; Ali, Nora; Khattab, Ahmed; Daoud, Ramez; Amer, Hassanein (Scientific Research Publishing, 2016-06)
      Wireless Sensor Networks (WSN) have recently become one of the major research areas in the wireless communication field and are implemented in a variety of applications. One of these applications that will be tackled in ...
    • Address Resolution Protocol (ARP): Spoofing Attack and Proposed Defense 

      Al Sukkar, Ghazi; Saifan, Ramzi; Khwaldeh, Sufian; Maqableh, Mahmoud; Jafar, Iyad (Scientific Research Publishing, 2016-07)
      Networks have become an integral part of today’s world. The ease of deployment, low-cost and high data rates have contributed significantly to their popularity. There are many protocols that are tailored to ease the process ...
    • Mobile Ad-Hoc Networks Applications and Its Challenges 

      Raza, Naeem; Aftab, Muhammad U.; Akbar, Muhammad Q.; Ashraf, Omair; Irfan, Muhammad (Scientific Research Publishing, 2016-07)
      Mobile Ad-Hoc Network (MANET) is an infrastructure less wireless network of autonomous collection of mobile nodes (Smart phones, Laptops, iPads, PDAs etc.). Network is self-configured to reconstruct its topology and routing ...
    • A Self-Learning Diagnosis Algorithm Based on Data Clustering 

      Tretyakov, Dmitry (Scientific Research Publishing, 2016-08)
      The article describes an approach to building a self-learning diagnostic algorithm. The self-learning algorithm creates models of the object under consideration. The models are formed periodically through a certain time ...
    • Motion Planning System for Bin Picking Using 3-D Point Cloud 

      Hikizu, Masatoshi; Mikami, Shu; Seki, Hiroaki (Scientific Research Publishing, 2016-08)
      In this paper, we propose a motion planning system for bin picking using 3-D point cloud. The situation that the objects are put miscellaneously like the inside in a house is assumed. In the home, the equipment which makes ...
    • The Possibility of Using RFID System to Automate and Integrate the Attendance of Professors and Students in the Classroom 

      Meghdadi, Majid; Azar, Ahad A. (Scientific Research Publishing, 2016-11)
      One of the most important goals followed in most systems is to increase efficiency, reduce errors and enhance ease of data entry tasks such as better services in organizations. Therefore, the use of intelligent tools is ...
    • Enhancing Multi-Factor Authentication in Modern Computing 

      Iwuoha, Obioha2; Emmanuel, Nwabueze1; Ekwonwune, Emmanuel (2017-07)
      Most network service providers like MTN Nigeria, currently use two-factor authentication for their 4G wireless networks. This exposes the network subscribers to identify theft and users data to security threats like snooping, ...
    • Towards the Development of Best Data Security for Big Data 

      Yuan, Tian (Communication Network, 2017-11)
      Big data is becoming a well-known buzzword and in active use in many areas. Because of the velocity, variety, and volume of big data, security and privacy issues are magnified, which results in the traditional protection ...
    • Practical Approaches to Securing an IT Environment 

      John C, Fuller; Cofie, Penrose; Warsame H, Ali; Emmanuel S., Kolawole (Communication and Network, 2017-11)
      There are a number of IT Security journals available in the literature but none of these research papers have practically specified approaches to secure the IT environment at large. In this paper, more emphases will be ...