Sciweavers

Share
warning: Creating default object from empty value in /var/www/modules/taxonomy/taxonomy.module on line 1416.
ARTCOM
2009
IEEE
11 years 6 months ago
Public Key Cryptosystems Based on Chaotic-Chebyshev Polynomials
Gnanajeyaraman Rajaram, K. Ramar, Prasadh K. K. Pi...
ARTCOM
2009
IEEE
11 years 6 months ago
Load Balancing in Multi ECU Configuration
—Electronic Control Units (ECUs) are nowadays employed in automotives for discharging various functionalities within the vehicle. It has become the fundamental building block of ...
Rajeshwari Hegde, K. S. Gurumurthy
ARTCOM
2009
IEEE
11 years 6 months ago
ANFIS Approach for Navigation of Mobile Robots
— This paper, discusses about navigation control of mobile robot using adaptive neuro-fuzzy inference system (ANFIS) in a real word dynamic environment. In the ANFIS controller a...
Mukesh Kumar Singh, Dayal R. Parhi, Jayanta Kumar ...
ARTCOM
2009
IEEE
11 years 6 months ago
Chunker for Tamil
This paper presents the Part Of Speech tagger and Chunker for Tamil using Machine learning techniques. Part Of Speech tagging and chunking are the fundamental processing steps for...
V. Dhanalakshmi, P. Padmavathy, M. Anand Kumar, K....
ARTCOM
2009
IEEE
11 years 6 months ago
Image Segmentation - A Survey of Soft Computing Approaches
—Soft Computing is an emerging field that consists of complementary elements of fuzzy logic, neural computing and evolutionary computation. Soft computing techniques have found w...
N. Senthilkumaran, R. Rajesh
AICT
2009
IEEE
144views Communications» more  AICT 2009»
11 years 6 months ago
Fingerprinting-Based Localization in WiMAX Networks Depending on SCORE Measurements
—Recently, localization in wireless networks has gained a lot of interest; especially after some of the most interesting positioning application areas have emerged in wireless co...
Mussa Bshara, Leo Van Biesen
AICT
2009
IEEE
172views Communications» more  AICT 2009»
11 years 6 months ago
A Practical Characterization of 802.11 Access Points in Paris
Unlike other wireless technologies, the deployment of 802.11 networks is not limited to operators: access points can easily be installed by end-users for domestic use. This singul...
Guillaume Valadon, Florian Le Goff, Christophe Ber...
AICT
2009
IEEE
164views Communications» more  AICT 2009»
11 years 6 months ago
A Method of Admission Control Based on Both Resource Requests and Traffic Measurement and Its Dynamics under On/Off Model Traffi
Abstract: A method of admission control based on both resource requests by applications and class-based traffic measurement results was developed. In this method, a wide range of a...
Yasusi Kanada
AICT
2009
IEEE
226views Communications» more  AICT 2009»
11 years 6 months ago
Optimizing MBMS Power Allocation through HSDPA Transmissions
— Multimedia Broadcast Multicast Service (MBMS) epitomizes the increasing popularity of enhanced end-user experience in Universal Mobile Telecommunications System (UMTS), since i...
Antonios G. Alexiou, Christos Bouras, Evangelos Re...

Publication
247views
12 years 9 months ago
A Survey of Protocols and Open Issues in ATM Multipoint Communication
Asynchronous transfer mode (ATM) networks must define multicast capabilities in order to efficiently support numerous applications, such as video conferencing and distributed appli...
Sonia Fahmy, Raj Jain, Shivkumar Kalyanaraman, Roh...
books