Cairo University

Displaying 1-40 of 41 results

  • White Papers // Oct 2013

    DBCLUM: Density-Based Clustering and Merging Algorithm

    Clustering is a primary method for DB mining. The clustering process becomes very challenge when the data is different densities, different sizes, different shapes, or has noise and outlier. Many existing algorithms are designed to find clusters. But, these algorithms lack to discover clusters of different shapes, densities and sizes....

    Provided By Cairo University

  • White Papers // Sep 2013

    A Statistical Data Fusion Technique in Virtual Data Integration Environment

    Recently, many applications require data to be integrated from different data sources in order to satisfy user queries. Therefore, it was the emergence of using virtual data integration. Data fusion in the virtual data integration environment starts after detecting and clustering duplicated records from the different integrated data sources. It...

    Provided By Cairo University

  • White Papers // May 2013

    A Novel Approach for Handling Security in Cloud Computing Services

    The rapid advances in cloud computing has introduced a variety of security issues; each requires certain skills and knowledge. While developing business services requires conducting analysis and design for the business activities that does not include common security functions for these services. Currently there is no framework existing from the...

    Provided By Cairo University

  • White Papers // Apr 2013

    Scalable Multi-Tenant Authorization in Highly-Collaborative Cloud Applications

    Collaborative applications have lately gained extra momentum due to two recent phenomena: data explosion and cloud computing. With more and more data and applications being hosted in the ''Cloud'', it becomes easier for organizations with varying levels of mutual trust to share and collaborate over resources. However, a pressing challenge...

    Provided By Cairo University

  • White Papers // Feb 2013

    Avoiding WIMAX Interference on Ultra Wide Band MB-OFDM System by Cognitive Radio

    This paper considers the ECMA-368 standard based on MultiBand Orthogonal Frequency Division Multiplexing (MB-OFDM) as an Ultra WideBand (UWB) system in the presence of interference from an IEEE 802.16 WiMAX systems operating at 3.5 GHz. Simulations are conducted following the standards and adopting the IEEE 802.15.3a channel model CM1. This...

    Provided By Cairo University

  • White Papers // Dec 2012

    Dead Code Elimination Based Pointer Analysis for Multithreaded Programs

    This paper presents a new approach for optimizing multithreaded programs with pointer constructs. The approach has applications in the area of certified code (proof-carrying code) where a justification or a proof for the correctness of each optimization is required. The optimization meant here is that of dead code elimination. Towards...

    Provided By Cairo University

  • White Papers // Nov 2012

    Performance Evaluation of a Coordinated Time-Domain EICIC Framework Based on ABSF in Heterogeneous LTE-Advanced Networks

    Enhanced Inter-Cell Interference Coordination (eICIC) is a proposed framework by the 3GPP to handle Inter-Cell Interference (ICI) in Heterogeneous Network (HetNet) environments. Almost-Blank Sub-Frame (ABSF) is one of the time-domain techniques proposed in the eICIC framework as a candidate for deployment in LTE release 10 (LTE-Advanced). In this paper, a...

    Provided By Cairo University

  • White Papers // Nov 2012

    A Decision Support System for Performance Evaluation

    In this paper, the authors present a model based Decision Support System (DSS) for evaluating performance. Performance evaluation in business is difficult. Multicriteria methods are used for evaluation of performance of public and private organizations. The proposed system is based on financial ratios and some methods such as Analytic Hierarchy...

    Provided By Cairo University

  • White Papers // Nov 2012

    Hardware Implementation of the Message Digest Procedure MDP-384

    The message digest procedure MDP-384 is a cryptographic hash function improvement of the hash function MDP-192 which is based on the principles provided by Markel's work, Rivest MD-5, SHA-1 and RIPEMD. MDP-384 accepts a variable-size input message and returns a fixed-size string as 384-bit long hash that utilizes twelve variables...

    Provided By Cairo University

  • White Papers // Sep 2012

    A Cloud based P Systems Algorithm

    A P system is a computability model which is biochemically inspired, it is a general distributed model, highly parallel, nondeterministic, based on the notion of a membrane structure. Till this moment, there is no exact idea about the real implementation of P systems. P systems are used in solving NP-complete...

    Provided By Cairo University

  • White Papers // Sep 2012

    Textual Signs Reading for Indoor Semantic Map Construction

    Semantic maps have come up to facilitate high-level human robot interaction like "Deliver a laptop for maintenance". Textual signs posted on the walls and room doors in indoor environments are environment features that could be easily identified by service robots. These signs provide some semantic information like the function of...

    Provided By Cairo University

  • White Papers // Sep 2012

    Task Allocation in Distributed Artificial Intelligence Using Boids Model

    Decentralized multi-agent approach is a promising research field particularly in the area of performance improvement by handling task allocation and communication time. Some recent research has focused on developing the learning process to be better suited for specific problems; other efforts had proven that a generalized solution is better off...

    Provided By Cairo University

  • White Papers // Aug 2012

    Virtual Business Collaboration Conceptual Knowledge Model (VBCKM)

    Within the context of virtual business collaboration modeling, many recent works have been accepted to consider some essential virtual business collaborative models. Practical dynamic virtual organization may be a combination of those models and some other elemental features with some modifications to meet the business opportunity requirements. Therefore, some guidelines...

    Provided By Cairo University

  • White Papers // Jun 2012

    Performance Examination of AES Encryption Algorithms with Constant and Dynamic Rotation

    Lately, Rijndael has been standard by the NIST as the Advanced Encryption Standard (AES). This makes the AES essential and necessary on Federal agencies for protection data. The authors say what occurs when reconfigure the structure of the Advanced Encryption Standard (AES), especially in constant rotation and replaced it with...

    Provided By Cairo University

  • White Papers // May 2012

    Fuzzy-Based Adaptive Cross Layer Routing Protocol for Delay Sensitive Applications in MANET

    In order for Mobile Ad hoc NETworks (MANET) to support service requirements of multimedia and real-time applications, the underlying routing protocol must provide Quality of Service (QoS) in terms of average End-To-End Delay (ETED). Towards this end, the authors investigate a number of conventional routing protocols, such as AODV (reactive...

    Provided By Cairo University

  • White Papers // Apr 2012

    Proposed Relay Selection Scheme for Physical Layer Security in Cognitive Radio Networks

    Cognitive Radio (CR) technology is one of the strong candidate technologies to solve the spectrum scarcity problems. In this paper, the authors tackle the problem of secure data transmission between a secondary user transmitter and receiver through a relay in the presence of an eavesdropper in a cognitive radio network....

    Provided By Cairo University

  • White Papers // Mar 2012

    Fair Allocation of Backhaul Resources in Multi-Cell MIMO Coordinated Beamforming

    Coordinated beamforming in multipoint MIMO networks has been introduced to increase the overall capacity of wireless networks. In coordinated beamforming, the channel state information between the different MIMO access points/base stations in one hand, and the mobile stations on the other hand, needs to be shared among the MIMO nodes....

    Provided By Cairo University

  • White Papers // Mar 2012

    Exploiting Interference Alignment for Sum Rate Enhancement in D2D-Enabled Cellular Networks

    Spectrally-efficient and low-latency support of local media services is expected to be provided by enabling underlay direct Device-To-Device (D2D) communication mode in future cellular networks. Interference Alignment (IA) can enhance the capacity of a wireless network by providing more degrees of freedom. In this paper, the authors propose using IA...

    Provided By Cairo University

  • White Papers // Mar 2012

    Resource Allocation Strategies Based on the Signal- to-Leakage-Plus-Noise Ratio in LTE-A CoMP Systems

    In this paper, the authors present two novel Resource Allocation (RA) strategies based on the Signal-to-Leakage-plus-Noise-Ratio (SLNR) for the DownLink (DL) of Coordinated Multi Point (CoMP) transmission in LTE-Advanced (LTE-A) system. The proposed RA strategies select the UEs that can efficiently share the same Resource Block (RB) without degrading the...

    Provided By Cairo University

  • White Papers // Feb 2012

    Interference Alignment Performance on MIMO X Channels With Imperfect Channel Knowledge

    Interference Alignment (IA) can achieve the optimal degrees of freedom in interference-limited wireless systems. Popular IA schemes assume perfect global knowledge of the MIMO channels at all transmitters and receivers. In this paper, the authors investigate the error rate performance of interference alignment in MIMO M?2 X systems at practical...

    Provided By Cairo University

  • White Papers // Feb 2012

    Design of a High Performance Implementation of a Tree-Based Multicast Key Distribution Protocol

    The key distribution problem is considered one of the most important issues for providing secure multicast communication. Logical Key Hierarchy (LKH) protocols are considered one of the best solutions proposed for solving the scalability of multicast key distribution protocols. The use of LKH protocols reduces the computation complexity cost from...

    Provided By Cairo University

  • White Papers // Jan 2012

    Resource Allocation Strategies Based on the Signalto-Leakage-Plus-Noise Ratio in LTE-A CoMP Systems

    In this paper, the authors present two novel Resource Allocation (RA) strategies based on the Signal-to-Leakage-plus-Noise-Ratio (SLNR) for the DownLink (DL) of Coordinated Multi Point (CoMP) transmission in LTE-Advanced (LTE-A) system. The proposed RA strategies select the UEs that can efficiently share the same Resource Block (RB) without degrading the...

    Provided By Cairo University

  • White Papers // Jan 2012

    GALS-Based LPSP: Performance Analysis of a Novel Architecture for Low Power High Performance Security Processors

    The past two decades have witnessed a revolution in the use of electronic devices in the users' daily activities. Increasingly, such activities involve the exchange of personal and sensitive data by means of portable and light weight devices. This implied the use of security applications in devices with tight processing...

    Provided By Cairo University

  • White Papers // Sep 2011

    An IDS for Detecting Misbehavior Nodes in Optimized Link State Routing Protocol

    Several approaches have been proposed for Intrusion Detection Systems (IDS) in Mobile Ad-hoc NETworks (MANETs). Due to lack of MANETs infrastructure and well defined perimeter MANETs are susceptible to a variety of attacker types. To develop a strong security scheme it is necessary to understand how malicious nodes can attack...

    Provided By Cairo University

  • White Papers // Aug 2011

    IR-HARQ vs. Joint Channel-Network Coding for Cooperative Wireless Communication

    Wireless communication systems demand the use of many coding techniques for data retransmission between sending and receiving end points to achieve the required system capacity over variant channel conditions. Different developed techniques are introduced such as channel coding, network coding and joint coding to achieve this target. As an improvement...

    Provided By Cairo University

  • White Papers // Jul 2011

    Achievable Degrees of Freedom of the K-User Interference Channel With Partial Cooperation

    In this paper, the authors consider the K-user interference channel with partial cooperation, where a strict subset of the K users cooperates. For the -user interference channel with cooperating subsets of length M, the outer bound of the total degrees of freedom is KM/(M+1). In this paper, they propose a...

    Provided By Cairo University

  • White Papers // Jun 2011

    Joint Power and Backhaul Bits Allocation for Coordinated Multi-Point Transmission

    In this paper, the authors study the problem of backhaul sharing in network MIMO. In case of a backhaul of limited number of bits, they investigate how to allocate these bits jointly with the base-stations power among users in order to maximize the sum-rate under fairness constraints. Firstly, they study...

    Provided By Cairo University

  • White Papers // Mar 2011

    HITS: A History-Based Intelligent Transportation System

    Transportation is the driving force of any country. Today the authors are facing an explosion in the number of motor vehicles that affects the daily routines. Intelligent Transportation Systems (ITS) aim to provide efficient tools that solve traffic problems. Predicting route congestions during different day periods can help drivers choose...

    Provided By Cairo University

  • White Papers // Feb 2011

    Clustering Moving Objects Using Segments Slopes

    Given a set of moving object trajectories, the authors show how to cluster those using k-means clustering approach. The proposed clustering algorithm is competitive with the k-means clustering because it specifies the value of "k" based on the segment's slope of the moving object trajectories. The advantage of this approach...

    Provided By Cairo University

  • White Papers // Jan 2011

    A Time Parameterized Technique for Clustering Moving Object Trajectories

    Today portable devices as mobile phones, laptops, Personal Digital Assistants(PDAs), and many other mobile devices are ubiquitous. Along with the rapid advances in positioning and wireless technologies, moving object position information has become easier to acquire. This availability of location information triggered the need for clustering and classifying location information...

    Provided By Cairo University

  • White Papers // Oct 2010

    Towards a Spiking Neural P Systems OS

    This paper is an attempt to incorporate the idea of spiking neural P systems as an early seed into the area of Operating System Design, regarding their capability to solve some classical computer science problems. It is reflecting the power of such systems to simulate well known parallel computational models,...

    Provided By Cairo University

  • White Papers // Oct 2010

    DW Access Control Model

    Data warehouse collects and integrates critical data of organization from multiple sources and stores them for a long time in multidimensional model. This nature motivates researchers to propose set of models to secure these data. In this paper, the authors present an enhanced authorization model in order to close open...

    Provided By Cairo University

  • White Papers // Sep 2010

    Multiple Description Coding Based Network Coding

    In this paper, the authors present a proposal for transmitting images using Multiple Description Coding (MDC) techniques over multiple links in a mesh network, while using network coding technique to add protection paths. In pure MDC, the losses of one or two of the multiple descriptions degrade the received image...

    Provided By Cairo University

  • White Papers // Aug 2010

    Agent Based Cloud Storage System

    Cloud computing technology is envisioned as the next generation architecture of IT Enterprise. It is defined as a set of scalable data servers or chunk servers that provide computing and storage services to clients. The cloud storage is a relatively basic and widely applied service which can provide users with...

    Provided By Cairo University

  • White Papers // Jun 2010

    Using UML to Model Web Services for Automatic Composition

    There is a great interest paid to the web services paradigm nowadays. One of the most important problems related to the web service paradigm is the automatic composition of web services. Several frameworks have been proposed to achieve this novel goal. The most recent and richest framework (model) is the...

    Provided By Cairo University

  • White Papers // Apr 2010

    Parallel Decentralized Network for the Detection of Unknown Signals Through Wireless Nakagami Fading Channels

    In this paper analytical and simulation results for the decentralized detection of unknown signals are introduced. Parallel sensor network scheme is assumed. Additive White Gaussian Noise (AWGN) and Nakagami fading are assumed in both links, that is, from the source to the decentralized local sensors and from the sensors to...

    Provided By Cairo University

  • White Papers // Jan 2010

    A Survey on Anomaly Detection Methods for Ad Hoc Networks

    Mobile ad hoc networks have recently been the topic of extensive research. The interest in such networks stems from their ability to provide temporary and instant wireless networking solutions in situations where cellular infrastructures are lacking and are expensive or infeasible to deploy. Despite their desirable characteristics, vital problems concerning...

    Provided By Cairo University

  • White Papers // Sep 2009

    Quality Based Rank-Level Fusion in Multibiometric Systems

    Multibiometric systems fuse evidences from multiple biometric sources typically resulting in better recognition accuracy. These systems can consolidate information at various levels. For systems operating in the identification mode, rank level fusion presents a viable option. In this paper, several simple but powerful modifications are suggested to enhance the performance...

    Provided By Cairo University

  • White Papers // Aug 2009

    Distributed Flooding-Based Storage Algorithms for Large-Scale Sensor Networks

    Wireless sensor networks consist of small devices (nodes) with limited CPU, bandwidth, and power. They can be deployed in isolated, tragedy, and obscured fields to monitor objects, detect fires, temperature, flood, and other disaster incidents. They can also be used in areas difficult to reach or where it is danger...

    Provided By Cairo University

  • White Papers // Feb 2009

    BPI: XML Query Evaluation Using Bitmapped Path Indices

    This paper introduces a new technique for fast computation of structural join "Pattern Trees" in XML. Using a small amount of pre-computed path information, typically small enough to fit easily in main memory, the authors are able to render structural join computation almost independent of data set size. The technique...

    Provided By Cairo University

  • White Papers // Jan 2009

    Biometric Authentication Using Fast Correlation of Near Infrared Hand Vein Patterns

    This paper presents a hand vein authentication system using fast spatial correlation of hand vein patterns. In order to evaluate the system performance, a prototype was designed and a dataset of 50 persons of different ages above 16 and of different gender, each has 10 images per person was acquired...

    Provided By Cairo University

  • White Papers // Jun 2010

    Using UML to Model Web Services for Automatic Composition

    There is a great interest paid to the web services paradigm nowadays. One of the most important problems related to the web service paradigm is the automatic composition of web services. Several frameworks have been proposed to achieve this novel goal. The most recent and richest framework (model) is the...

    Provided By Cairo University

  • White Papers // Feb 2009

    BPI: XML Query Evaluation Using Bitmapped Path Indices

    This paper introduces a new technique for fast computation of structural join "Pattern Trees" in XML. Using a small amount of pre-computed path information, typically small enough to fit easily in main memory, the authors are able to render structural join computation almost independent of data set size. The technique...

    Provided By Cairo University

  • White Papers // Jan 2010

    A Survey on Anomaly Detection Methods for Ad Hoc Networks

    Mobile ad hoc networks have recently been the topic of extensive research. The interest in such networks stems from their ability to provide temporary and instant wireless networking solutions in situations where cellular infrastructures are lacking and are expensive or infeasible to deploy. Despite their desirable characteristics, vital problems concerning...

    Provided By Cairo University

  • White Papers // Sep 2009

    Quality Based Rank-Level Fusion in Multibiometric Systems

    Multibiometric systems fuse evidences from multiple biometric sources typically resulting in better recognition accuracy. These systems can consolidate information at various levels. For systems operating in the identification mode, rank level fusion presents a viable option. In this paper, several simple but powerful modifications are suggested to enhance the performance...

    Provided By Cairo University

  • White Papers // Jan 2011

    A Time Parameterized Technique for Clustering Moving Object Trajectories

    Today portable devices as mobile phones, laptops, Personal Digital Assistants(PDAs), and many other mobile devices are ubiquitous. Along with the rapid advances in positioning and wireless technologies, moving object position information has become easier to acquire. This availability of location information triggered the need for clustering and classifying location information...

    Provided By Cairo University

  • White Papers // Mar 2011

    HITS: A History-Based Intelligent Transportation System

    Transportation is the driving force of any country. Today the authors are facing an explosion in the number of motor vehicles that affects the daily routines. Intelligent Transportation Systems (ITS) aim to provide efficient tools that solve traffic problems. Predicting route congestions during different day periods can help drivers choose...

    Provided By Cairo University

  • White Papers // Feb 2011

    Clustering Moving Objects Using Segments Slopes

    Given a set of moving object trajectories, the authors show how to cluster those using k-means clustering approach. The proposed clustering algorithm is competitive with the k-means clustering because it specifies the value of "k" based on the segment's slope of the moving object trajectories. The advantage of this approach...

    Provided By Cairo University

  • White Papers // Aug 2009

    Distributed Flooding-Based Storage Algorithms for Large-Scale Sensor Networks

    Wireless sensor networks consist of small devices (nodes) with limited CPU, bandwidth, and power. They can be deployed in isolated, tragedy, and obscured fields to monitor objects, detect fires, temperature, flood, and other disaster incidents. They can also be used in areas difficult to reach or where it is danger...

    Provided By Cairo University

  • White Papers // Apr 2010

    Parallel Decentralized Network for the Detection of Unknown Signals Through Wireless Nakagami Fading Channels

    In this paper analytical and simulation results for the decentralized detection of unknown signals are introduced. Parallel sensor network scheme is assumed. Additive White Gaussian Noise (AWGN) and Nakagami fading are assumed in both links, that is, from the source to the decentralized local sensors and from the sensors to...

    Provided By Cairo University

  • White Papers // Aug 2011

    IR-HARQ vs. Joint Channel-Network Coding for Cooperative Wireless Communication

    Wireless communication systems demand the use of many coding techniques for data retransmission between sending and receiving end points to achieve the required system capacity over variant channel conditions. Different developed techniques are introduced such as channel coding, network coding and joint coding to achieve this target. As an improvement...

    Provided By Cairo University

  • White Papers // May 2012

    Fuzzy-Based Adaptive Cross Layer Routing Protocol for Delay Sensitive Applications in MANET

    In order for Mobile Ad hoc NETworks (MANET) to support service requirements of multimedia and real-time applications, the underlying routing protocol must provide Quality of Service (QoS) in terms of average End-To-End Delay (ETED). Towards this end, the authors investigate a number of conventional routing protocols, such as AODV (reactive...

    Provided By Cairo University

  • White Papers // Mar 2012

    Fair Allocation of Backhaul Resources in Multi-Cell MIMO Coordinated Beamforming

    Coordinated beamforming in multipoint MIMO networks has been introduced to increase the overall capacity of wireless networks. In coordinated beamforming, the channel state information between the different MIMO access points/base stations in one hand, and the mobile stations on the other hand, needs to be shared among the MIMO nodes....

    Provided By Cairo University

  • White Papers // Mar 2012

    Exploiting Interference Alignment for Sum Rate Enhancement in D2D-Enabled Cellular Networks

    Spectrally-efficient and low-latency support of local media services is expected to be provided by enabling underlay direct Device-To-Device (D2D) communication mode in future cellular networks. Interference Alignment (IA) can enhance the capacity of a wireless network by providing more degrees of freedom. In this paper, the authors propose using IA...

    Provided By Cairo University

  • White Papers // Mar 2012

    Resource Allocation Strategies Based on the Signal- to-Leakage-Plus-Noise Ratio in LTE-A CoMP Systems

    In this paper, the authors present two novel Resource Allocation (RA) strategies based on the Signal-to-Leakage-plus-Noise-Ratio (SLNR) for the DownLink (DL) of Coordinated Multi Point (CoMP) transmission in LTE-Advanced (LTE-A) system. The proposed RA strategies select the UEs that can efficiently share the same Resource Block (RB) without degrading the...

    Provided By Cairo University

  • White Papers // Feb 2012

    Design of a High Performance Implementation of a Tree-Based Multicast Key Distribution Protocol

    The key distribution problem is considered one of the most important issues for providing secure multicast communication. Logical Key Hierarchy (LKH) protocols are considered one of the best solutions proposed for solving the scalability of multicast key distribution protocols. The use of LKH protocols reduces the computation complexity cost from...

    Provided By Cairo University

  • White Papers // Nov 2012

    Hardware Implementation of the Message Digest Procedure MDP-384

    The message digest procedure MDP-384 is a cryptographic hash function improvement of the hash function MDP-192 which is based on the principles provided by Markel's work, Rivest MD-5, SHA-1 and RIPEMD. MDP-384 accepts a variable-size input message and returns a fixed-size string as 384-bit long hash that utilizes twelve variables...

    Provided By Cairo University

  • White Papers // Oct 2010

    Towards a Spiking Neural P Systems OS

    This paper is an attempt to incorporate the idea of spiking neural P systems as an early seed into the area of Operating System Design, regarding their capability to solve some classical computer science problems. It is reflecting the power of such systems to simulate well known parallel computational models,...

    Provided By Cairo University

  • White Papers // Apr 2012

    Proposed Relay Selection Scheme for Physical Layer Security in Cognitive Radio Networks

    Cognitive Radio (CR) technology is one of the strong candidate technologies to solve the spectrum scarcity problems. In this paper, the authors tackle the problem of secure data transmission between a secondary user transmitter and receiver through a relay in the presence of an eavesdropper in a cognitive radio network....

    Provided By Cairo University

  • White Papers // Dec 2012

    Dead Code Elimination Based Pointer Analysis for Multithreaded Programs

    This paper presents a new approach for optimizing multithreaded programs with pointer constructs. The approach has applications in the area of certified code (proof-carrying code) where a justification or a proof for the correctness of each optimization is required. The optimization meant here is that of dead code elimination. Towards...

    Provided By Cairo University

  • White Papers // Sep 2012

    A Cloud based P Systems Algorithm

    A P system is a computability model which is biochemically inspired, it is a general distributed model, highly parallel, nondeterministic, based on the notion of a membrane structure. Till this moment, there is no exact idea about the real implementation of P systems. P systems are used in solving NP-complete...

    Provided By Cairo University

  • White Papers // Sep 2012

    Textual Signs Reading for Indoor Semantic Map Construction

    Semantic maps have come up to facilitate high-level human robot interaction like "Deliver a laptop for maintenance". Textual signs posted on the walls and room doors in indoor environments are environment features that could be easily identified by service robots. These signs provide some semantic information like the function of...

    Provided By Cairo University

  • White Papers // Sep 2012

    Task Allocation in Distributed Artificial Intelligence Using Boids Model

    Decentralized multi-agent approach is a promising research field particularly in the area of performance improvement by handling task allocation and communication time. Some recent research has focused on developing the learning process to be better suited for specific problems; other efforts had proven that a generalized solution is better off...

    Provided By Cairo University

  • White Papers // Nov 2012

    Performance Evaluation of a Coordinated Time-Domain EICIC Framework Based on ABSF in Heterogeneous LTE-Advanced Networks

    Enhanced Inter-Cell Interference Coordination (eICIC) is a proposed framework by the 3GPP to handle Inter-Cell Interference (ICI) in Heterogeneous Network (HetNet) environments. Almost-Blank Sub-Frame (ABSF) is one of the time-domain techniques proposed in the eICIC framework as a candidate for deployment in LTE release 10 (LTE-Advanced). In this paper, a...

    Provided By Cairo University

  • White Papers // Nov 2012

    A Decision Support System for Performance Evaluation

    In this paper, the authors present a model based Decision Support System (DSS) for evaluating performance. Performance evaluation in business is difficult. Multicriteria methods are used for evaluation of performance of public and private organizations. The proposed system is based on financial ratios and some methods such as Analytic Hierarchy...

    Provided By Cairo University

  • White Papers // Feb 2013

    Avoiding WIMAX Interference on Ultra Wide Band MB-OFDM System by Cognitive Radio

    This paper considers the ECMA-368 standard based on MultiBand Orthogonal Frequency Division Multiplexing (MB-OFDM) as an Ultra WideBand (UWB) system in the presence of interference from an IEEE 802.16 WiMAX systems operating at 3.5 GHz. Simulations are conducted following the standards and adopting the IEEE 802.15.3a channel model CM1. This...

    Provided By Cairo University

  • White Papers // May 2013

    A Novel Approach for Handling Security in Cloud Computing Services

    The rapid advances in cloud computing has introduced a variety of security issues; each requires certain skills and knowledge. While developing business services requires conducting analysis and design for the business activities that does not include common security functions for these services. Currently there is no framework existing from the...

    Provided By Cairo University

  • White Papers // Feb 2012

    Interference Alignment Performance on MIMO X Channels With Imperfect Channel Knowledge

    Interference Alignment (IA) can achieve the optimal degrees of freedom in interference-limited wireless systems. Popular IA schemes assume perfect global knowledge of the MIMO channels at all transmitters and receivers. In this paper, the authors investigate the error rate performance of interference alignment in MIMO M?2 X systems at practical...

    Provided By Cairo University

  • White Papers // Jul 2011

    Achievable Degrees of Freedom of the K-User Interference Channel With Partial Cooperation

    In this paper, the authors consider the K-user interference channel with partial cooperation, where a strict subset of the K users cooperates. For the -user interference channel with cooperating subsets of length M, the outer bound of the total degrees of freedom is KM/(M+1). In this paper, they propose a...

    Provided By Cairo University

  • White Papers // Jun 2011

    Joint Power and Backhaul Bits Allocation for Coordinated Multi-Point Transmission

    In this paper, the authors study the problem of backhaul sharing in network MIMO. In case of a backhaul of limited number of bits, they investigate how to allocate these bits jointly with the base-stations power among users in order to maximize the sum-rate under fairness constraints. Firstly, they study...

    Provided By Cairo University

  • White Papers // Jan 2012

    Resource Allocation Strategies Based on the Signalto-Leakage-Plus-Noise Ratio in LTE-A CoMP Systems

    In this paper, the authors present two novel Resource Allocation (RA) strategies based on the Signal-to-Leakage-plus-Noise-Ratio (SLNR) for the DownLink (DL) of Coordinated Multi Point (CoMP) transmission in LTE-Advanced (LTE-A) system. The proposed RA strategies select the UEs that can efficiently share the same Resource Block (RB) without degrading the...

    Provided By Cairo University

  • White Papers // Sep 2010

    Multiple Description Coding Based Network Coding

    In this paper, the authors present a proposal for transmitting images using Multiple Description Coding (MDC) techniques over multiple links in a mesh network, while using network coding technique to add protection paths. In pure MDC, the losses of one or two of the multiple descriptions degrade the received image...

    Provided By Cairo University

  • White Papers // Jun 2012

    Performance Examination of AES Encryption Algorithms with Constant and Dynamic Rotation

    Lately, Rijndael has been standard by the NIST as the Advanced Encryption Standard (AES). This makes the AES essential and necessary on Federal agencies for protection data. The authors say what occurs when reconfigure the structure of the Advanced Encryption Standard (AES), especially in constant rotation and replaced it with...

    Provided By Cairo University

  • White Papers // Aug 2012

    Virtual Business Collaboration Conceptual Knowledge Model (VBCKM)

    Within the context of virtual business collaboration modeling, many recent works have been accepted to consider some essential virtual business collaborative models. Practical dynamic virtual organization may be a combination of those models and some other elemental features with some modifications to meet the business opportunity requirements. Therefore, some guidelines...

    Provided By Cairo University

  • White Papers // Apr 2013

    Scalable Multi-Tenant Authorization in Highly-Collaborative Cloud Applications

    Collaborative applications have lately gained extra momentum due to two recent phenomena: data explosion and cloud computing. With more and more data and applications being hosted in the ''Cloud'', it becomes easier for organizations with varying levels of mutual trust to share and collaborate over resources. However, a pressing challenge...

    Provided By Cairo University

  • White Papers // Aug 2010

    Agent Based Cloud Storage System

    Cloud computing technology is envisioned as the next generation architecture of IT Enterprise. It is defined as a set of scalable data servers or chunk servers that provide computing and storage services to clients. The cloud storage is a relatively basic and widely applied service which can provide users with...

    Provided By Cairo University

  • White Papers // Sep 2013

    A Statistical Data Fusion Technique in Virtual Data Integration Environment

    Recently, many applications require data to be integrated from different data sources in order to satisfy user queries. Therefore, it was the emergence of using virtual data integration. Data fusion in the virtual data integration environment starts after detecting and clustering duplicated records from the different integrated data sources. It...

    Provided By Cairo University

  • White Papers // Jan 2012

    GALS-Based LPSP: Performance Analysis of a Novel Architecture for Low Power High Performance Security Processors

    The past two decades have witnessed a revolution in the use of electronic devices in the users' daily activities. Increasingly, such activities involve the exchange of personal and sensitive data by means of portable and light weight devices. This implied the use of security applications in devices with tight processing...

    Provided By Cairo University

  • White Papers // Oct 2013

    DBCLUM: Density-Based Clustering and Merging Algorithm

    Clustering is a primary method for DB mining. The clustering process becomes very challenge when the data is different densities, different sizes, different shapes, or has noise and outlier. Many existing algorithms are designed to find clusters. But, these algorithms lack to discover clusters of different shapes, densities and sizes....

    Provided By Cairo University

  • White Papers // Oct 2010

    DW Access Control Model

    Data warehouse collects and integrates critical data of organization from multiple sources and stores them for a long time in multidimensional model. This nature motivates researchers to propose set of models to secure these data. In this paper, the authors present an enhanced authorization model in order to close open...

    Provided By Cairo University