Blekinge Institute of Technology

Displaying 1-17 of 17 results

  • White Papers // May 2013

    Developments in Business Intelligence Software

    In today's economy the requirements in Business Intelligence (BI) environments are changing dramatically. This paper tested underlying constructs. Hypothesis one sought to test if vendors seek to provide complete BI solutions following all four stages of the Competitive Intelligence (CI) cycle. The evaluation of BI vendors indicates that all vendors...

    Provided By Blekinge Institute of Technology

  • White Papers // Mar 2013

    Comparative Analysis of Voting Schemes for Ensemble-Based Malware Detection

    Malicious software (malware) represents a threat to the security and the privacy of computer users. Traditional signature-based and heuristic-based methods are inadequate for detecting some forms of malware. This paper presents a malware detection method based on supervised learning. The main contributions of the paper are two ensemble learning algorithms,...

    Provided By Blekinge Institute of Technology

  • White Papers // May 2012

    Performance of Cognitive Radio Spectrum Access With Intra-And Inter-Handoff

    Opportunistic Spectrum Access (OSA) is a technology that allows unlicensed users to access spectrum holes and to provide so efficient use of radio resources. Most studies done on OSA focus on the situation when the unlicensed user performs the spectrum handoff only within a single cognitive radio network (so-called intra-handoff)....

    Provided By Blekinge Institute of Technology

  • White Papers // May 2012

    Cognitive Radio Networks With Elastic Traffic

    The authors model and evaluate an infrastructure based cognitive radio network where impatient unlicensed or Secondary Users (SUs) offer elastic traffic. The interference created by SUs to the licensed users is analyzed when the secondary network uses two different spectrum access schemes, the conventional random access scheme and a new...

    Provided By Blekinge Institute of Technology

  • White Papers // Apr 2012

    Visitor Schedule Management System- An Intelligent Decision Support Systems

    Travelling salesman problem is a problem which is of high interest for researchers, industry professionals, and academicians. Visitor or salesman used to face lot of problems with respect to scheduling based on meeting top ranked clients. Even excel sheet made the work tedious. So, these flaws propelled one to design...

    Provided By Blekinge Institute of Technology

  • White Papers // Mar 2012

    MIMO Cooperative Multiple-Relay Networks With OSTBCs Over Nakagami-M Fading

    In this paper, the performance of a dual-hop Multiple-Input Multiple-Output (MIMO) cooperative multiple-relay network using Orthogonal Space-Time Block Coding (OSTBC) transmission is examined. The fading environment is modeled as independent, not identical distributed (i.n.i.d.) Nakagami-m fading. Also, the authors consider the case that each terminal in the network has multiple-antennas,...

    Provided By Blekinge Institute of Technology

  • White Papers // Feb 2012

    Beamforming in Two-Way Fixed Gain Amplify-and-Forward Relay Systems With CCI

    The authors analyze the outage performance of a two-way fixed gain Amplify-and-Forward (AF) relay system with beamforming, arbitrary antenna correlation, and Co-Channel Interference (CCI). Assuming CCI at the relay, they derive the exact individual user outage probability in closed-form. Additionally, while neglecting CCI, they also investigate the system outage probability...

    Provided By Blekinge Institute of Technology

  • White Papers // Nov 2011

    Multi-Keyhole Effect in MIMO AF Relay Downlink Transmission With Space-Time Block Codes

    Multi-keyhole bridges the gap between single keyhole and full-scattering Multiple-Input Multiple-Output (MIMO) channels. In this paper, the authors, therefore, investigate the multikey-hole effect on the MIMO Amplify-and-Forward (AF) relay downlink transmission with orthogonal space-time block codes. In particular, they derive the analytical Symbol Error Rate (SER) expression for the considered...

    Provided By Blekinge Institute of Technology

  • White Papers // Sep 2011

    Decisive Factors for Quality of Experience of OpenID Authentication Using EAP

    When using the web, long response times are bones of contention for users, i.e., they damp the Quality of Experience (QoE). Though, if one knows the cause of the long response time one may examine what could be done to eliminate the obstacle. In this paper, the authors determine the...

    Provided By Blekinge Institute of Technology

  • White Papers // Dec 2010

    A Survey of Routing Protocols of Wireless Sensor Networks

    Networked micro-sensor technology is a key technology for the future. It has been identified as one of the most important technologies for the 21st century and is regarded to revolutionize information gathering and processing in applications (Heinzelman et al., 1999). Advances in Micro-Electro-Mechanical Systems (MEMS) and low-power integrated digital electronics...

    Provided By Blekinge Institute of Technology

  • White Papers // Dec 2010

    Strategies for Connectivity Configuration to Access e-Learning Resources: Case of Rural Secondary Schools in Tanzania

    In response to address different development challenges, Tanzania is striving to achieve its fourth attribute of the National Development Vision, i.e. to have a well educated and learned society by the year 2025. One of the most cost effective methods that can reach a large part of the society in...

    Provided By Blekinge Institute of Technology

  • White Papers // Aug 2010

    An Interactive e-Learning Management System (e-LMS): A Solution to Tanzanian Secondary Schools' Education

    Information and Communications Technologies (ICT) has been integrated in education in many developing and developed countries alike, but the use of ICT in Tanzanian schools is dismal. Many Tanzanian secondary schools have no computers. The few schools with computers use them primarily for secretarial services and computer literacy training. The...

    Provided By Blekinge Institute of Technology

  • White Papers // Jan 2010

    Measurements of Application-Perceived Throughput in DAB, GPRS, UMTS and WLAN Environments

    Communication services are expected to deliver the desired information in a timely manner without challenging the user's patience. The corresponding offers by networks are reflected in user- or applications-perceived throughput, which is measured end-to-end for different mobile and wireless networks, namely Digital Audio Broadcast (DAB), General Packet Radio Service (GPRS),...

    Provided By Blekinge Institute of Technology

  • White Papers // Oct 2009

    Erlang Capacity of UMTS Using Perceptual-Based Power Control: An Analytical Framework

    An analytical framework for calculation of Erlang capacity per cell of UMTS with perceptual-based power control is derived. A comparison of the capacity of the system using the proposed power control algorithm with its conventional counterpart is performed. This is supported by numerical results on Erlang capacity over a variety...

    Provided By Blekinge Institute of Technology

  • White Papers // Jun 2009

    Performance Prediction of Multi-Agent Based Simulation Applications on the Grid

    A major requirement for Grid application developers is ensuring performance and scalability of their applications. Predicting the performance of an application demands understanding its specific features. This paper discusses performance modeling and prediction of Multi-Agent Based Simulation (MABS) applications on the Grid. An experiment conducted using a synthetic MABS workload...

    Provided By Blekinge Institute of Technology

  • White Papers // Feb 2007

    [A-Z]UI: Evolution of User Interfaces From GUI Towards Ubiquitous Interfaces

    This paper gives an overview of evolution of different user interfaces: GUI (Graphical User Interface), WUI (Web User Interface), VUI (Voice User Interfaces), TUI (Tangible User Interfaces); and UUI (Ubiquitous User Interface); and illustrates how Computer-Human interaction gradually amend the concept of interaction from foreground activities into both foreground and...

    Provided By Blekinge Institute of Technology

  • White Papers // Dec 2006

    A Socially-Aware Operating System for Trustworthy Computing

    In the last few years the people have observed two key trends. First is the rise in popularity of OSNs, which allow human social relationships to be captured digitally and utilized by many different online applications. In the virtual world users interact with people and entities using almost the same...

    Provided By Blekinge Institute of Technology

  • White Papers // Nov 2011

    Multi-Keyhole Effect in MIMO AF Relay Downlink Transmission With Space-Time Block Codes

    Multi-keyhole bridges the gap between single keyhole and full-scattering Multiple-Input Multiple-Output (MIMO) channels. In this paper, the authors, therefore, investigate the multikey-hole effect on the MIMO Amplify-and-Forward (AF) relay downlink transmission with orthogonal space-time block codes. In particular, they derive the analytical Symbol Error Rate (SER) expression for the considered...

    Provided By Blekinge Institute of Technology

  • White Papers // Feb 2012

    Beamforming in Two-Way Fixed Gain Amplify-and-Forward Relay Systems With CCI

    The authors analyze the outage performance of a two-way fixed gain Amplify-and-Forward (AF) relay system with beamforming, arbitrary antenna correlation, and Co-Channel Interference (CCI). Assuming CCI at the relay, they derive the exact individual user outage probability in closed-form. Additionally, while neglecting CCI, they also investigate the system outage probability...

    Provided By Blekinge Institute of Technology

  • White Papers // May 2012

    Performance of Cognitive Radio Spectrum Access With Intra-And Inter-Handoff

    Opportunistic Spectrum Access (OSA) is a technology that allows unlicensed users to access spectrum holes and to provide so efficient use of radio resources. Most studies done on OSA focus on the situation when the unlicensed user performs the spectrum handoff only within a single cognitive radio network (so-called intra-handoff)....

    Provided By Blekinge Institute of Technology

  • White Papers // Mar 2012

    MIMO Cooperative Multiple-Relay Networks With OSTBCs Over Nakagami-M Fading

    In this paper, the performance of a dual-hop Multiple-Input Multiple-Output (MIMO) cooperative multiple-relay network using Orthogonal Space-Time Block Coding (OSTBC) transmission is examined. The fading environment is modeled as independent, not identical distributed (i.n.i.d.) Nakagami-m fading. Also, the authors consider the case that each terminal in the network has multiple-antennas,...

    Provided By Blekinge Institute of Technology

  • White Papers // Oct 2009

    Erlang Capacity of UMTS Using Perceptual-Based Power Control: An Analytical Framework

    An analytical framework for calculation of Erlang capacity per cell of UMTS with perceptual-based power control is derived. A comparison of the capacity of the system using the proposed power control algorithm with its conventional counterpart is performed. This is supported by numerical results on Erlang capacity over a variety...

    Provided By Blekinge Institute of Technology

  • White Papers // Mar 2013

    Comparative Analysis of Voting Schemes for Ensemble-Based Malware Detection

    Malicious software (malware) represents a threat to the security and the privacy of computer users. Traditional signature-based and heuristic-based methods are inadequate for detecting some forms of malware. This paper presents a malware detection method based on supervised learning. The main contributions of the paper are two ensemble learning algorithms,...

    Provided By Blekinge Institute of Technology

  • White Papers // Feb 2007

    [A-Z]UI: Evolution of User Interfaces From GUI Towards Ubiquitous Interfaces

    This paper gives an overview of evolution of different user interfaces: GUI (Graphical User Interface), WUI (Web User Interface), VUI (Voice User Interfaces), TUI (Tangible User Interfaces); and UUI (Ubiquitous User Interface); and illustrates how Computer-Human interaction gradually amend the concept of interaction from foreground activities into both foreground and...

    Provided By Blekinge Institute of Technology

  • White Papers // Jan 2010

    Measurements of Application-Perceived Throughput in DAB, GPRS, UMTS and WLAN Environments

    Communication services are expected to deliver the desired information in a timely manner without challenging the user's patience. The corresponding offers by networks are reflected in user- or applications-perceived throughput, which is measured end-to-end for different mobile and wireless networks, namely Digital Audio Broadcast (DAB), General Packet Radio Service (GPRS),...

    Provided By Blekinge Institute of Technology

  • White Papers // Dec 2010

    Strategies for Connectivity Configuration to Access e-Learning Resources: Case of Rural Secondary Schools in Tanzania

    In response to address different development challenges, Tanzania is striving to achieve its fourth attribute of the National Development Vision, i.e. to have a well educated and learned society by the year 2025. One of the most cost effective methods that can reach a large part of the society in...

    Provided By Blekinge Institute of Technology

  • White Papers // Aug 2010

    An Interactive e-Learning Management System (e-LMS): A Solution to Tanzanian Secondary Schools' Education

    Information and Communications Technologies (ICT) has been integrated in education in many developing and developed countries alike, but the use of ICT in Tanzanian schools is dismal. Many Tanzanian secondary schools have no computers. The few schools with computers use them primarily for secretarial services and computer literacy training. The...

    Provided By Blekinge Institute of Technology

  • White Papers // Jun 2009

    Performance Prediction of Multi-Agent Based Simulation Applications on the Grid

    A major requirement for Grid application developers is ensuring performance and scalability of their applications. Predicting the performance of an application demands understanding its specific features. This paper discusses performance modeling and prediction of Multi-Agent Based Simulation (MABS) applications on the Grid. An experiment conducted using a synthetic MABS workload...

    Provided By Blekinge Institute of Technology

  • White Papers // Dec 2010

    A Survey of Routing Protocols of Wireless Sensor Networks

    Networked micro-sensor technology is a key technology for the future. It has been identified as one of the most important technologies for the 21st century and is regarded to revolutionize information gathering and processing in applications (Heinzelman et al., 1999). Advances in Micro-Electro-Mechanical Systems (MEMS) and low-power integrated digital electronics...

    Provided By Blekinge Institute of Technology

  • White Papers // Apr 2012

    Visitor Schedule Management System- An Intelligent Decision Support Systems

    Travelling salesman problem is a problem which is of high interest for researchers, industry professionals, and academicians. Visitor or salesman used to face lot of problems with respect to scheduling based on meeting top ranked clients. Even excel sheet made the work tedious. So, these flaws propelled one to design...

    Provided By Blekinge Institute of Technology

  • White Papers // Sep 2011

    Decisive Factors for Quality of Experience of OpenID Authentication Using EAP

    When using the web, long response times are bones of contention for users, i.e., they damp the Quality of Experience (QoE). Though, if one knows the cause of the long response time one may examine what could be done to eliminate the obstacle. In this paper, the authors determine the...

    Provided By Blekinge Institute of Technology

  • White Papers // May 2012

    Cognitive Radio Networks With Elastic Traffic

    The authors model and evaluate an infrastructure based cognitive radio network where impatient unlicensed or Secondary Users (SUs) offer elastic traffic. The interference created by SUs to the licensed users is analyzed when the secondary network uses two different spectrum access schemes, the conventional random access scheme and a new...

    Provided By Blekinge Institute of Technology

  • White Papers // Dec 2006

    A Socially-Aware Operating System for Trustworthy Computing

    In the last few years the people have observed two key trends. First is the rise in popularity of OSNs, which allow human social relationships to be captured digitally and utilized by many different online applications. In the virtual world users interact with people and entities using almost the same...

    Provided By Blekinge Institute of Technology

  • White Papers // May 2013

    Developments in Business Intelligence Software

    In today's economy the requirements in Business Intelligence (BI) environments are changing dramatically. This paper tested underlying constructs. Hypothesis one sought to test if vendors seek to provide complete BI solutions following all four stages of the Competitive Intelligence (CI) cycle. The evaluation of BI vendors indicates that all vendors...

    Provided By Blekinge Institute of Technology