Sciweavers

CORR
2010
Springer
138views Education» more  CORR 2010»
13 years 11 months ago
ICT in Universities of the Western Himalayan Region of India II: A Comparative SWOT Analysis
This study presents a comparative SWOT analysis to comprehend the pattern of development of ICT within six universities of western Himalayan region of India. With the objective of...
Dhirendra Sharma, Vikram Singh
CORR
2010
Springer
94views Education» more  CORR 2010»
13 years 11 months ago
Unidirectional Error Correcting Codes for Memory Systems: A Comparative Study
In order to achieve fault tolerance, highly reliable system often require the ability to detect errors as soon as they occur and prevent the speared of erroneous information throu...
Muzhir Al-Ani, Qeethara Al-Shayea
CORR
2010
Springer
150views Education» more  CORR 2010»
13 years 11 months ago
Framework for Visualizing Model-Driven Software Evolution and its Application
Software Visualization encompasses the development and evaluation of methods for graphically representing different aspects of methods of software, including its structure, execut...
Akepogu Anand Rao, Karanam Madhavi
CORR
2010
Springer
186views Education» more  CORR 2010»
13 years 11 months ago
Significant Interval and Frequent Pattern Discovery in Web Log Data
There is a considerable body of work on sequence mining of Web Log Data We are using One Pass frequent Episode discovery (or FED) algorithm, takes a different approach than the tr...
Kanak Saxena, Rahul Shukla
CORR
2010
Springer
90views Education» more  CORR 2010»
13 years 11 months ago
RFID Applications: An Introductory and Exploratory Study
RFID is not a new technology and has passed through many decades of use in military, airline, library, security, healthcare, sports, animal farms and other areas. Industries use R...
Kamran Ahsan, Hanifa Shah, Paul Kingston
CORR
2010
Springer
153views Education» more  CORR 2010»
13 years 11 months ago
Adaptation of TURN protocol to SIP protocol
Today, SIP is a protocol par Excellence in the field of communication over Internet. But, the fact that it belongs to the application layer constitutes a weakness vis-
Mustapha Guezouri, Ahmed Blaha, Mokhtar Keche
CORR
2010
Springer
53views Education» more  CORR 2010»
13 years 11 months ago
Phase-Only Planar Antenna Array Synthesis with Fuzzy Genetic Algorithms
This paper describes a new method for the synthesis of planar antenna arrays using fuzzy genetic algorithms (FGAs) by optimizing phase excitation coefficients to best meet a desir...
Boufeldja Kadri, Miloud Boussahla, Fethi Tarik Ben...
CORR
2010
Springer
150views Education» more  CORR 2010»
13 years 11 months ago
Existence and Global Logarithmic Stability of Impulsive Neural Networks with Time Delay
The stability and convergence of the neural networks are the fundamental characteristics in the Hopfield type networks. Since time delay is ubiquitous in most physical and biologi...
A. K. Ojha, Dushmanta Mallick, C. Mallick
CORR
2010
Springer
59views Education» more  CORR 2010»
13 years 11 months ago
Efficient Password-Typed Key Agreement Scheme
In this paper, we will study Lee, Kim and Yoo, a verifier password typed key agreement scheme and demonstrate that the scheme is not secure. Then, the authors will propose an enha...
Sattar J. Aboud
CORR
2010
Springer
117views Education» more  CORR 2010»
13 years 11 months ago
Node Disjoint Multipath Routing Considering Link and Node Stability protocol: A characteristic Evaluation
Mobile Ad hoc Networks are highly dynamic networks. Quality of Service (QoS) routing in such networks is usually limited by the network breakage due to either node mobility or ene...
Shuchita Upadhayaya, Charu Gandhi