Academy Publisher

Displaying 1-40 of 2670 results

  • White Papers // Dec 2014

    Efficient Scheme for Channel Estimation in OFDM System

    The choice of channel estimation is of fundamental importance in OFDM receiver designs, which further involves a trade-off between complexity and estimation accuracy. In pilot-symbol-aided OFDM system, the Least Square (LS) estimator suffers from inherent additive Gaussian noise and Inter Carrier Interference (ICI), although the estimator exhibits lower complexity and...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Performance of Decode and Forward MIMO Relaying Using STBC for Wireless Uplink

    In this paper, the authors compare the performance of a decode and forward relay assisted wireless uplink with direct wireless uplink in the presence of rayleigh fading where source is equipped with single Transmit antenna (Tx), relay is equipped with multiple transmit and Receive antennas (Rx), and destination has multiple...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    On Efficient Design of LDPC Decoders for Wireless Sensor Networks

    Low Density Parity Check (LDPC) codes are error-correcting codes that offer huge advantages in terms of coding gain, throughput and power dissipation in digital communication systems. Error correction algorithms are often implemented in hardware for fast processing to meet the real-time needs of communication systems. However, traditional hardware implementation of...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Performance Comparison of RFID Tag at UHF Band and Millimeter-Wave Band

    The Ultra High Frequency (UHF) band spectrum will likely be congested in near future since the next generation wireless as well as Radio Frequency IDentification (RFID) system users will witness the use of UHF band technology with increased demand of bandwidth, bit rate, frequency spectrum and power consumption. The alternate...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Keeping Desired QoS by a Partial Coverage Algorithm for Cluster-Based Wireless Sensor Networks

    Many studies were done on design algorithms to completely cover an area. The authors can call the issue as a complete coverage problem. Although there were many researches about proposing a partial coverage issue; almost all of the studies only focus on lengthening the lifespan of Wireless Sensor Networks (WSNs)...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Achieving VoIP Guarantee in Wireless Local Area Networks

    Recently, Voice over Internet Protocol (VoIP) has gained much attention in Wireless Local Area Networks (WLANs). Although IEEE 802.11e Enhanced Distributed Channel Access (EDCA) has been standardized to provide voice traffic with Quality of Service (QoS) support, the voice quality could still be severely degraded by the traffic transmitted from...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    DOA Estimation for Coherent Sources in Impulsive Noise Environments

    Direction-of-Arrival (DOA) estimation of coherent sources is a significant problem in impulsive noise environments. In this paper, a robust estimation algorithm which combines the ideas of Spatial Smoothing (SS) and INFinity-norm normalization (INF) is presented referred to as INF-SSR. The proposed algorithm exploits the Root - MUSIC technique to computer...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Source-Directed Path Diversity in the Interdomain Routing

    The Internet has abundant path redundancy, especially in the inter-domain routing. However, current routing system cannot exploit the Internet path diversity and utilize the disjoint end-to-end paths efficiently. The unawareness of sources to the path selection and the best paths advertisement mechanism in the inter-domain routing make it difficult to...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Markov Chain Based Trust Management Scheme for Wireless Sensor Networks

    As the effective supplement to traditional cryptography security, trust management plays a key role for detecting malicious behaviors in wireless sensor networks. In this paper, the authors consider a sensor network wherein nodes have fixed number of states and probabilities of state transitions can be specified. They introduce Markov chain...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    A Hybrid Classifier Using Reduced Signatures for Automated Soft-Failure Diagnosis in Network End-User Devices

    The authors present an automated system for the diagnosis of both known and unknown soft-failures in end-User Devices (UDs). Known faults that cause network performance degradation are used to train the classifier-based system in a supervised manner while unknown faults are automatically detected and clustered to identify the existence of...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    e-ONE:Enhanced ONE for Simulating Challenged Network Scenarios

    Delay Tolerant Network (DTN) empowers sparse mobile ad-hoc networks and other challenged network environments, such as interplanetary communication network or deep sea communication network, where traditional networking protocols either fail to work completely or do not work well. The Opportunistic Networking Environment (ONE) Simulator has gained considerable popularity as an...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    A Load-Balanced On-Demand Routing for LEO Satellite Networks

    Due to population distribution and economic flourish diversity, the Low Earth Orbit (LEO) satellite network carries unbalanced traffic load, which leads that parts of satellite links are congested while others are underutilized. Furthermore, the congested inter-satellite links result in high queuing delay and packet dropping ratio. To ensure an intelligent...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    The Faults of Data Security and Privacy in the Cloud Computing

    According to Winkler, public cloud is based on the standard cloud computing model, in which a service provider makes resources, such as applications and storage, available to the general public over the Internet. Public cloud services may be free or offered on a pay-per-usage model. The main benefits of using...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    TTAF: TCP Timeout Adaptivity Based on Fast Retransmit over MANET

    Transmission Control Protocol (TCP) is one of the most widely deployed transport layer protocols. It responds to all packet losses, either due to congestion or link breakages, by invoking various congestion control mechanisms. All these mechanisms imply a reduction in the amount of transmitted data. Computing a proper value of...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    On-Line Data Retrieval Algorithm with Restart Strategy in Wireless Networks

    With rapid development of technologies in mobile environment, data dissemination has become an important role for obtaining their requested information of clients in many applications. There are three major approaches to disseminate information between server and clients: unicast, multicast and broadcast. Data retrieval is an efficient scheme for data dissemination...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Trail Coverage : A Coverage Model for Efficient Intruder Detection Near Geographical Obstacles in WSNs

    In Wireless Sensor Network (WSNs), the coverage strategy for achieving higher performance in intruder detection probability near irregular geographical obstacles inside a military terrain, is studied in this paper. The real life problem of the of intruder detection near irregular geographical obstacles has not been focused so far, in which...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Verifying Online User Identity Using Stylometric Analysis for Short Messages

    Stylometry consists of the analysis of linguistic styles and writing characteristics of the authors for identification, characterization, or verification purposes. In this paper, the authors investigate authorship verification for the purpose of user authentication process. In this setting, authentication consists of comparing sample writing of an individual against the model...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Topology Control Mechanism Based on Link Available Probability in Aeronautical Ad Hoc Network

    In this paper, the authors consider traffic network with high-speed mobility nodes scenario; and give a new network topology control mechanism to rise the routing path duration in Aeronautical ad hoc network. The mechanism can use different methods to construct topology according to the node densities. For network regions having...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    An Energy-Efficient Routing Mechanism Based On Genetic Ant Colony Algorithm for Wireless Body Area Networks

    As an important branch of Wireless Sensor Network (WSN), Wireless Body Area Network (WBAN) has received extensive attention of various fields as it is portable and removable. However, energy consumption is highlighting increasingly as nodes are hard to be recharged or replaced. Up to now, many energy efficient routing algorithms...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    An Improved Mix Transmission Algorithm for Privacy-Preserving

    With the rapid development of the Internet Of Things (IOT), personal privacy has been realized as the most important security issue in wireless sensor networks, especially in the Body Area Network (BAN) used in the medical field. Traditional encryption methods cannot defense against the attacks in which the communication signal...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Study of Downlink Scheduling Algorithms in LTE Networks

    Long Term Evolution (LTE) is one of the fastest growing technologies which supports variety of applications like video conferencing, video streaming, VoIP, file transfer, web browsing etc. In order to support multiple applications, Radio Resource Management (RRM) procedure is one of the key design roles for improving the system performance....

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Delay and Jitter in Networks with IPP Traffic: Theoretical Model

    In this paper, the authors analyze delay and jitter in networks with traffic modeled as Interrupted Poisson Process (IPP), and relatively small traffic loads. In one-node analysis, they estimate the probability for delay bounds violation, and they obtain expression for the jitter, with respect to phase probabilities, traffic load, and...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    An Adaptative Energy Efficient Routing Protocol for MANET

    The dynamic nature of Mobile Ad hoc NETwork (MANET) has several constraints like scalability, robust connectivity and limited power constraints. So an efficient routing protocol is required. It should be adaptable and able to maintain stable routes in spite of the dynamic network connectivity. This paper proposes a hybrid protocol,...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    A Novel Method to Improve the Accuracy of the RSSI Techniques Based on RSSI-D

    In this paper, a novel method is proposed to estimate the distance between sensor nodes based on a statistical model of GMM, which is established with the offline RSSI values, called RSSI-D. In order to estimate the arguments of RSSI-D with unobserved latent variables, EM is used to calculate the...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    SIP-Based QoS in IP Telephony

    In this paper, the authors analyze the factors resulting to the degradation of the quality of service in Voice over IP (VoIP) telephony. SIP protocol is used to explore the QoS characteristics of different Codec. The system is designed for an IP telephony service provider with other GSM operator network...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    A Resource-Efficient System for Detection and Verification of Anomalies Using Mobile Agents in Wireless Sensor Networks

    Sensor readings are vulnerable to in situ and in transit anomalies. A well designed anomaly detection system should be able to identify the source of anomalies through in situ verification of suspicious behavior of sensor nodes. One approach for in situ verification is physical diagnosis of sensor nodes, which is...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Simulation and Performance Analysis of the IEEE1588 PTP With Kalman Filtering in Multi-Hop Wireless Sensor Networks

    As the Wireless Sensor Networks (WSNs) find wider and wider applications, time synchronization has emerged as a key technology to improve network performance and enable WSNs in time-sensitive applications. The recently proposed IEEE 1588 Precision Time synchronization Protocol (PTP) has shown its capability for the wired Ethernet, but its performance...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Enhancing Channel Coordination Scheme Caused by Corrupted Nakagami Signal and Mobility Models on the IEEE 1609.4 Standard

    Ensuring high saturated throughput of SCHs and reducing the transmission delay of service packets on CCHs are one of the most challenging issues in multichannel operations IEEE 1609.4 standard. Moreover, multiple issues due to its highly dynamic topology, the high mobility, the change trajectory, and Nakagami propagation channel caused by...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Detecting Access Point Spoofing Attacks Using Partitioning-Based Clustering

    The impersonation of wireless Access Point (AP) poses an unprecedented number of threats that can compromise a wireless client's identity, personal data, and network integrity. The AP impersonation attack is conducted by establishing rogue AP with spoofed Service Set IDentifier (SSID) and MAC address same as the target legitimate AP....

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Error Performance Analysis of Multiuser CDMA Systems with Space-time Coding in Rician Fading Channel

    In this paper, the error performance of multiuser CDMA system with space-time coding is studied in Rician fading channel, and the corresponding Bit Error Rate (BER) and Symbol Error Rate (SER) analysis are presented. Based on the performance analysis, a simple and effective multiuser receiver scheme is developed. The scheme...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    A Hybrid Optimization Algorithm for Bayesian Network Structure Learning Based on Database

    The process of learning Bayesian networks includes structure learning and parameters learning. During the process, learning the structure of Bayesian networks based on a large database is a NP hard problem. The paper presents a new hybrid algorithm by integrating the algorithms of MMPC (Max-Min Parents and Children), PSO (Particle...

    Provided By Academy Publisher

  • White Papers // Nov 2014

    Pollution-Free Regenerating Codes with Fast Reconstruction Verification for Verifiable Cloud Storage

    In this paper, the authors present an efficient mechanism to guarantee the integrity of cloud storage systems using network-coding-based regenerating codes. Regenerating codes are a special type of erasure codes with the property that regenerating a failed encoded server, can be done using significantly less information than the size of...

    Provided By Academy Publisher

  • White Papers // Nov 2014

    A Peer-To-Peer Membership Management Protocol for Wireless Mesh Networks

    There are a wide variety of terminal devices in wireless mesh networks. In order to manage the heterogeneous networks efficiently and to solve the mismatching problem between the physical network and its P2P overlay, a membership management protocol for the P2P overlay in wireless mesh networks is proposed - BA-gossip...

    Provided By Academy Publisher

  • White Papers // Nov 2014

    Study on the Improvement of ELGamal Cryptosystem Based on Elliptic Curve

    Since proposed, ELGamal cryptosystem occupies very important position in network security and it has wide application. Compared with RSA algorithm, elliptic curve encryption algorithm has significant advantages, and it is suitable for application in the environment with limited resources. In this paper, the principle of ELGamal cryptosystem based on elliptic...

    Provided By Academy Publisher

  • White Papers // Nov 2014

    An Optimized Frequent Item Query Algorithm for Uncertain Streaming Data

    Recently, sensors are used in many fields, and the data generated are uncertain streaming data. Frequent item query is one of the most query primitives in this kind of data. In this paper, the authors study frequent item query for uncertain streaming data. First, they propose a basic frequent item...

    Provided By Academy Publisher

  • White Papers // Nov 2014

    Research on Service Controlling Algorithm of Electric Power Communication Network Based on QoS Traffic Recognition and Routing Optimization

    With rapid progress in power communication networking, the present power communication network has become an integrated transmission network that supports various services (e.g., control data, service data, voices, and images). Compared with traditional network services, real-time services in the present power communication network have stricter requirements on delays, delay jitters,...

    Provided By Academy Publisher

  • White Papers // Nov 2014

    Dynamic Effective Resource Allocation Based on Cloud Computing Learning Model

    In cloud computing field, a service-provider offers large number of resources for customers with a relatively low cost. However, any resource allocation model has to consider computational resources as well as network resources to accurately reflect practical demands. In order to rationally allocate the limited resources to users and improve...

    Provided By Academy Publisher

  • White Papers // Nov 2014

    Broadcast Encryption Based on Bidirectional Remote Authentication Scheme

    In order to ensure the established mobile ad hoc networks against unauthorized user access, the authors need the identity authentication of the nodes in the network. Using the password for remote authentication in network is more and more attractive. This paper analyzes the remote password authentication scheme based on threshold...

    Provided By Academy Publisher

  • White Papers // Nov 2014

    Data Migration Model and Algorithm Between Heterogeneous Databases Based on Web Service

    To solve the problems of data conversion between heterogeneous databases that arising from the progress of data migration, the paper presents an improved model of data migration and a data conversion algorithm based on the research on data synchronization via web service. The data migration model is divided into legacy...

    Provided By Academy Publisher

  • White Papers // Nov 2014

    Research and Implementation of the Localization Algorithm Based on RSSI Technology

    The efficiency of sensor localization is a key issue in the Internet of things. There are possibilities for improvements in existing sensor localization systems, such as design complexity, cost. To address these issues, a location algorithm based on Distributed Range-Free Localization (DRFL) is proposed. In this positioning system can be...

    Provided By Academy Publisher

  • White Papers // Oct 2009

    A Self-Optimized Multipath Routing Protocol for Wireless Sensor Networks

    Wireless sensor networks (WSNs) are becoming a progressively important and a challenging research area. Advancements in WSN enable a wide range of environmental monitoring and object tracking applications. Moreover, multihop routing in WSN is affected by new nodes constantly entering or leaving the network. Therefore, the self-optimized and self-aware mechanism...

    Provided By Academy Publisher

  • White Papers // Nov 2009

    Implementation of Adaptive Filter Algorithm for Underwater Acoustic System

    This paper describes development of adaptive filter algorithm for an UnderWater Acoustic Telemetry (UWAT) system for communication between the off - shore Underwater Device (UD) and on-shore communication system. In this system, FSK modulation and de-modulation techniques are used with centre frequency of 38 KHz with baud rate of 300Hz....

    Provided By Academy Publisher

  • White Papers // Aug 2010

    Security Research of VPN Technology Based on MPLS

    The VPN technology based on MPLS is the current mainstream VPN technology that uses isolations of routing and address or other information technologies to resist attacking and marking spoofing, in which the security of data transmission are guaranteed to a certain extent. In this paper, Securities of MPLS VPN are...

    Provided By Academy Publisher

  • White Papers // Nov 2009

    Performance of Routing Protocols for Mobile Adhoc and Wireless Sensor Networks: A Comparative Study

    Mobile Ad hoc Networks (MANETs) as well as Wireless Sensor Networks (WSNs) suffer from various challenges like low bandwidth, overhead and velocity of nodes. This research contribution is the characterization study between MANETs and WSNs environment with respect to various routing protocols. This study investigates the routing protocols corresponding to...

    Provided By Academy Publisher

  • White Papers // Jul 2010

    Research of Network Mass Storage Mode Based on SAN

    In the face of new needs of the current network storage, the traditional DAS, NAS and advanced SAN network storage technology are analyzed, and the technical differences between the three technologies are compared. The redundant technology and main performance indicator system are analyzed by using system reliability theory, and thus...

    Provided By Academy Publisher

  • White Papers // Sep 2009

    Global Optimization of Multi Radio Mesh Access Point Location in Underground Area

    This paper shows that with a proper placement of Mesh multi radio devices in a confined area, it is possible to reduce the congestion in the WMN (Wireless Mesh Network) by 50 to 60 percent according to the loaded traffic. The best portal deployment is obtained by minimizing the maximum...

    Provided By Academy Publisher

  • White Papers // Nov 2009

    Threats and Vulnerabilities in Wireless Mesh Networks

    Wireless Mesh Networks (WMN) encompass a new area of technology set to play an important role in the next generation wireless mobile networks. WMN is characterized by dynamic self-organization, self-configuration and self-healing to enable flexible integration, quick deployment, easy maintenance, low costs, high scalability, and reliable services. Security of such...

    Provided By Academy Publisher

  • White Papers // Dec 2009

    An Extension of WSDL for Flexible Web Service Invocation With Large Data

    Traditional web services are limited in the request-reply framework, where service invocation can only be bundled together with all relevant data in a single message. However, more and more services require large datasets (e.g., multimedia and scientific data). Under the WSDL standards, these datasets must be ported to an appropriate...

    Provided By Academy Publisher

  • White Papers // Aug 2010

    Research on Virtual Digital Campus Platform

    In the course of construction, datacenters encounter many problems, such as low-efficient resource usage, difficult management and maintenance. In order to resolve those problems, this paper introduces virtualization technology. After proposing virtualization technology and its classification, it presents the design of digital campus architecture based on VMware Infrastructure, and discusses...

    Provided By Academy Publisher

  • White Papers // May 2010

    Media-Oriented Service Composition With Service Overlay Networks: Challenges, Approaches and Future Trends

    The massive and timely delivery of media is gradually integrating itself with the dynamic composition of media-oriented services so that new types of customized media services can be created according to the diverse demand of end users. The resulting effective and differentiated networking support will become one of the most...

    Provided By Academy Publisher

  • White Papers // May 2009

    Edusat-E-Learning Through Satellite - Reaching the Unreached

    E-learning is referred to the use of networked information and communications technology in designing, delivering, selecting and extending learning. It is the convergence of learning and the Internet. The universalisation of education has become the top priority, especially for the developing countries. But the extension of quality education to remote...

    Provided By Academy Publisher

  • White Papers // Nov 2009

    Ensemble Voting System for Anomaly Based Network Intrusion Detection

    The growing dependence of modern society on telecommunication and information networks has become inevitable. Therefore, the security aspects of such networks play a strategic role in ensuring protection of data against misuse. Intrusion Detection systems (IDS) are meant to detect intruders who elude the "First line" protection. Data mining techniques...

    Provided By Academy Publisher

  • White Papers // Dec 2009

    Integration Middleware for Mobile Supply Chain Management

    According to the mobile supply chain management features and considering the limitations and obstacles in the mobile environment. This paper proposes a multi-agent integration middleware for mobile supply chain management, aiming to solve information integration and data synchronization problem without worrying about network or terminal heterogeneity in mobile environment, which...

    Provided By Academy Publisher

  • White Papers // Nov 2009

    Design Issues of 'Vulnerabilities and Suspicious Behavior Detection System' in Storage Area Network (SAN)

    Current accelerated demand of business continuity of operations in 24 ? 7 work environment has increased the importance and amount of the data stored on computers and Storage Area Networks (SAN). A lot of security issues are pending related to the performance and ability of such high-speed network architecture. There...

    Provided By Academy Publisher

  • White Papers // Jun 2009

    A United Access Control Model for Systems in Collaborative Commerce

    The latest researches on access control model are dramatically different from conventional ones. Nowadays, most attention is paid to accessing across organizational boundaries. So, how to identify the applicant and determine authorization with limited information; how to express and exchange control rules expediently; how to protect confidential information and enhance...

    Provided By Academy Publisher

  • White Papers // Aug 2010

    Design and Implementation of Vulnerability Scanning Distributed System

    In this paper, the authors discussed the basic principle and the common shortcoming in the existing network vulnerability scanning systems. Based on these, distributed system based components of network vulnerability scanning system and the communication and collaboration of Agents are been described in detail. The system uses plug-in technology to...

    Provided By Academy Publisher

  • White Papers // Aug 2009

    Key Management and Authentication in Ad Hoc Network Based on Mobile Agent

    Key management and authentication is important to security of Mobile Ad Hoc network (MANET). Based on the (t, n) threshold cryptography, this paper introduced mobile agents to exchange private key and network topological information with nodes in the network. This method avoids a centralized certification authority to distribute the public...

    Provided By Academy Publisher

  • White Papers // Jul 2010

    Agent-Based Grid Service Composition Research

    Grid technology and Agent technology are two distributed computing modes which develop parallely. They have their own advantages and disadvantages in application. By analyzing the characteristics of Grid and Agent, this paper states the possibility and necessity to combine the advantages of these two models and proposes some programs for...

    Provided By Academy Publisher

  • White Papers // Apr 2010

    Research and Application of Enterprise Search Based on Database Security Services

    With the development of internet and the build of enterprise information, How to organize the information and make it accessible and useful? Especially, how to support the information security services? They have been become a hot topic of internet and enterprise information. This paper discussed the enterprise search systems based...

    Provided By Academy Publisher

  • White Papers // Dec 2009

    Mobile Agent System for Supply Chain Management

    In the 21st century, competition between companies has been turned into the competition between their supply chains. To satisfy the rapidly changing demands in global market, agile capability and flexibility have been the new requirements in today's Supply Chain Management (SCM). Some intelligent activities, such as negotiation, decision and collaboration,...

    Provided By Academy Publisher

  • White Papers // Nov 2009

    An EAI Integration Framework Based on J2EE

    J2EE technologies to provide a range of middleware services to simplify a number of complex questions related to enterprise solutions development, deployment and management. J2EE Connector system can reduce the range of integration and simplify application development, so it gets easier to implement EIS integration by means of tools. Combining...

    Provided By Academy Publisher

  • White Papers // Nov 2009

    An Improved Packet Loss Recovery in VoIP Using Combined Source and Receiver Based Technique

    Voice over Internet Protocol is an upcoming technology that enables voice communication through the Internet. The transmission of audio data over packet switched networks faces lot of difficulties by a variety of network impairments such as packet loss, delay, echo, network security and throughput. This paper focuses on packet loss...

    Provided By Academy Publisher

  • White Papers // Dec 2009

    A Multi-Attribute Assessment Method for e-Commerce Risks

    Based on multi-attribute decision making theory, a multi-attribute assessment framework for E- commerce risks is presented. The paper applies an improved Evidential Reasoning (ER) approach to support evaluation decision, and uses a credit interval to figure scoring result and allow something absent. E-Commerce risks include environmental risks, management risks, technical...

    Provided By Academy Publisher

  • White Papers // Nov 2009

    Mobile Agent Based Distributed System Computing in Network

    Mobile agents are emerging as a promising paradigm for the design and implementation of distributed applications. While mobile agents have generated considerable excitement in the research community, they have not translated into a significant number of real-world applications. One of the main reasons for this is lack of work that...

    Provided By Academy Publisher

  • White Papers // Aug 2009

    Cross-Layering in an Industrial Wireless Sensor Network: Case Study of OCARI

    Wireless sensor networks are adapted to monitoring applications. Specific solutions have to be developed for industrial environments in order to deal with the harsh radio conditions and the QoS (Quality Of Service) requirements of industrial applications. In this paper, they present the main protocols used in the OCARI project, and...

    Provided By Academy Publisher

  • White Papers // Feb 2010

    Special Issue: Delay Tolerant Networks, Architecture, and Applications

    Delay-Tolerant Networking (DTN) enables communication in sparse mobile ad-hoc networks and other challenged environments where traditional networking fails and new routing and application protocols are required. Past experience with DTN routing and application protocols has shown that their performance is highly dependent on the underlying mobility and node characteristics. Evaluating...

    Provided By Academy Publisher

  • White Papers // Apr 2010

    Research on Security Policy and Framework

    Policies are rules that govern the choices in behaviors of a system. Security policies define what actions are permitted or not permitted, for what or for whom, and under what conditions. In this paper, the present situation of research on policy is overviewed, including policy and security policy definition, policy...

    Provided By Academy Publisher

  • White Papers // Sep 2009

    A Converged Charging Framework for Mobile Voice and Data Applications

    The evolution of an integrated mobile communication environment enables service deployment and content delivery offered by independent providers through heterogeneous network infrastructures. In a few months, a mobile user will be able to access value added services through several wireless public access networks (i.e., 3G cellular, Wireless LAN or WAN)...

    Provided By Academy Publisher

  • White Papers // Apr 2010

    Policy-Based Autonomic Mobile Network Resource Management Architecture

    In this paper, the authors establish a policy-based autonomic mobile network resource management architecture, then put forward the policies definition and hierarchies of the autonomic management system. The authors also present the various specific policy forms and the working mechanism of autonomic mobile resource distribution processes. Through the simulation experiments,...

    Provided By Academy Publisher

  • White Papers // May 2009

    Design and Development of ARM Processor Based Web Server

    As the World-Wide Web (WWW) continues to evolve, it is clear that its underlying technologies are useful for much more than just browsing the web. Web browsers have become the de facto standard user interface for a variety of applications including embedded real time applications such as Remote Data Acquisition...

    Provided By Academy Publisher

  • White Papers // Nov 2009

    Design, Development and Investigation on an Embedded System Based Control for Networking Mobile Robots

    In today's hi-tech and hi-precision world, robot finds its application in many areas to carryout operations that are either routine, highly complex and critical, hazardous or of high-precision nature. Robots when networked offer many benefits such as increased maneuverability and efficiency. This paper makes a survey on the present developmental...

    Provided By Academy Publisher

  • White Papers // Nov 2009

    Intellectualized High-Precision Environmental Parameter Monitor Based on Embedding System

    A kind of intellectualized high-precision environmental parameter monitor based on Embedding System is developed. The monitor adopts ARM microprocessor as core device, it has advantages of high precision and intellectualization, and has the function of thermometer, hygrometer and barometer which make the monitor precisely measure temperature, humidity and air pressure...

    Provided By Academy Publisher

  • White Papers // Nov 2009

    Efficient Memory Mapping in GSM Phones

    With the advancement in the technology that too wireless technology usage of cell phones is becoming significant. A cell phone have become versatile and portable electronics equipment rather than only used for receiving and making calls with the increased uses of cell phone the memory requirement of cell phone are...

    Provided By Academy Publisher

  • White Papers // Nov 2009

    Efficient Method for Identifying Location and Removal of Data Redundancy for RFID Data

    Radio Frequency IDentification (RFID) Technology has gained a significant momentum, in the past few years. This technology plays an essential role in object tracking in supply chain management applications and library management applications. RFID Technology holds the promise to simplify baggage handling, clinical laboratory procedures and other tasks by providing...

    Provided By Academy Publisher

  • White Papers // Aug 2009

    A Planar Group-Based Architecture to Scale Ad-Hoc and Sensor Networks

    It is known that grouping nodes gives better performance to the group and to the whole system, thereby avoiding unnecessary message forwarding and additional overheads while allows to scale the network considerably. Many routing protocols for ad-hoc networks and sensor networks have been designed, but none of them is based...

    Provided By Academy Publisher

  • White Papers // Nov 2009

    A Real-Time Intrusion Detection System Based on PSO-SVM

    The success of any Intrusion Detection System (IDS) is a complicated problem due to its nonlinearity and the quantitative or qualitative network traffic data stream with irrelevant and redundant features. How to choose the effective and key features to IDS is very important topic in information security. Support Vector Machine...

    Provided By Academy Publisher

  • White Papers // Dec 2009

    Agent Based Distributed Intrusion Detection System (ABDIDS)

    This paper introduce (ABDIDS), a simple pattern attack ontology that allows agent based intrusion detection system to detect network traffic anomalies at a higher level more than most current intrusion detection systems do. The cooperative agent architecture has been presented. It has been shown how some attributes in network communication...

    Provided By Academy Publisher

  • White Papers // Aug 2009

    Sources Selection Methodology for Hidden Web Data Integration

    In the internet-scale hidden web data integration, the problem of sources (web databases) selection has been a primary challenge. This paper proposes a novel approach for web databases selection of internet-scale hidden web data integration. This approach is based on a benefit function that evaluates how much benefit the web...

    Provided By Academy Publisher

  • White Papers // Nov 2009

    Security Border Gateway for Securing Mobile IP Networks

    Security support is a key feature for mobile computing environments. But to construct a secure mobile environment is a daunting task because of some contradictions between the nature of mobile environment and its associated applications. This paper proposes a solution on secure data transfer among different networks using Mobile IP....

    Provided By Academy Publisher

  • White Papers // Dec 2009

    Model Based Security Policy Assessment for e-Business Environment

    The key to profitability for e-business is ensuring data integrity, service availability, and user information confidentiality along the entire e-services chain. Both staffs and IT system components need to compare secure policy with performance in an e-business environment. Currently, most efforts set focus on e-business process analysis and value-chain analysis,...

    Provided By Academy Publisher