Cyber Journals

Displaying 1-40 of 59 results

  • White Papers // Jul 2012

    Research Handover on Mobile IP

    Combining the advantages of FMIPv6 and HMIPv6 (FHMIPv6) is more suitable for time - sensitive services. The authors propose an improvement based on it by optimizing the address configuration stage on MN (Mobile Node) and setting handover initiation stage on MAP (Mobility Anchor Point) so that the handover delay and...

    Provided By Cyber Journals

  • White Papers // May 2012

    Secure Group-Based Public Key Management for Mobile Ad Hoc Networks

    Public Key Infrastructures (PKIs) perform an important role for security solutions on Mobile Ad Hoc NETworks (MANETs). Changes in network paradigms and the increasing dependence of people on technology compel the development of more dependable and robust PKIs. However, designing PKIs for MANETs is a demanding task. These networks are...

    Provided By Cyber Journals

  • White Papers // May 2012

    Simulation and Comparison of the RASC and the BSMA Wireless Medium Access Protocols

    In wireless communication, there are different medium access techniques that allow users to share a common channel. Each protocol is entitled to do its best to avoid collision. In this paper, the authors have selected two random access protocols for simulation and comparison purposes. The first protocol is the Random...

    Provided By Cyber Journals

  • White Papers // Apr 2012

    Bistable Region of Backoff Algorithms With Contention Window in Slotted ALOHA Systems

    It has been widely recognized that bistable behavior of random access protocols may suddenly deteriorate the performance of the system due to the unexpected slip into an undesired stable operating point. The catastrophe theory succeeds in presenting the bistable region of random access protocols, where packet retransmissions occur in a...

    Provided By Cyber Journals

  • White Papers // Feb 2012

    Real-Time Flow Counting in IP Networks: Strict Analysis and Design Issues

    Real-time flow counting is significant for Internet Protocol (IP)network management because it enables operators to take appropriate action against anomalies or performance degradation. Most flow counting methods proposed in the literature are based on the linear counting algorithm, which was originally developed for database system applications. This paper first strictly...

    Provided By Cyber Journals

  • White Papers // Jan 2012

    Matching Between Important Points Using Dynamic Time Warping for Online Signature Verification

    Online signature verification is one of the biometric features which can be used as a common method for identity verification. According to the previous studies, calculation of similarities between the signatures with an extended regression approach, as compared with the Euclidean distance and Dynamic Time Warping (DTW), gives a better...

    Provided By Cyber Journals

  • White Papers // Jan 2012

    Securing MIMO Space-Time Block Coding Technique Over a Wireless Communication Links

    A secure space-time block coding (i.e., a joint encryption and coding) scheme can provide both data secrecy and data reliability in one process to tackle problems in an insecure and unreliable communication channel. In this paper, an adaptive secure space-time block coding scheme based upon a normal Alamouti STBC codes...

    Provided By Cyber Journals

  • White Papers // Jan 2012

    An SCCC Turbo Decoder for DVB-T

    The Digital Video Broadcasting - Terrestrial (DVBT) standard represents the dominant solution for the implementation of digital television in Europe. DVB-T requires error control protection in order to provide the best Quality of Service at the receiver. The current error protection scheme is Reed Solomon coding combined with convolutional encoding....

    Provided By Cyber Journals

  • White Papers // Dec 2011

    An Indoor Tracking System Based on Bluetooth Technology

    Implementations of tracking systems have become prevalent issues in modern technology due to its advantage of location detection of objects. Objects are usually tracked using trackers based on GPS, GSM, RFID and Bluetooth signal strength implementation. These mechanisms usually require line-of-sight operations, limited coverage and low-level programming language for accessing...

    Provided By Cyber Journals

  • White Papers // Dec 2011

    Performance of Random Relaying of MDS Codeword Blocks in Cooperative Multi-Hop Networks Over Random Error Channels

    The authors propose random relaying of MDS codeword blocks in cooperative multi-hop networks and evaluate its performance over random error channels by means of an absorbing Markov chain. The proposed scheme can apply to cooperative multi-hop networks with the arbitrary number of relay nodes at each hop stage and require...

    Provided By Cyber Journals

  • White Papers // Dec 2011

    Real-Time Measurement of Flows Classified According to Their Application for IP Networks

    In the management of Internet Protocol networks, the number of flows is an important performance metric because it has useful applications in areas such as port scan detection, denial-of-service detection, and traffic analysis. Real-time counting of flows is particularly important because network operators can take immediate actions against detected network...

    Provided By Cyber Journals

  • White Papers // Dec 2011

    A 12b 100MS/s Highly Power Efficient Pipelined ADC for Communication Applications

    12 bits 100 MS/s pipelined ADC with a high ENOB is proposed for communication applications especially for Wireless Networks. The proposed ADC achieves low power, high resolution and high speed operation due to deliberately design of a low power high performance operational amplifier for the pipeline stages. In addition, more...

    Provided By Cyber Journals

  • White Papers // Dec 2011

    A Low Voltage Highly Linear CMOS Down Conversion Mixer

    In this paper a new low voltage CMOS mixer is proposed which is highly linear. Linearity is provided by adjusting the value of a resistor and sizing the aspect ratio of a PMOS transistor at the RF stage of a well known low voltage CMOS mixer. Simulation results of improved...

    Provided By Cyber Journals

  • White Papers // Dec 2011

    Parallel Self-Sorting System for Objects

    Conventional sorting algorithms make use of such data structures as array, file and list which define access methods of the items to be sorted. These traditional methods - exchange sort, divide and conquer sort, selection sort and insertion sort - require supervisory control program. The supervisory control program has access...

    Provided By Cyber Journals

  • White Papers // Dec 2011

    Partial Traffic Engineering Over Cost Metric Network and Analysis on Its Oversubscription Capability

    Traffic Engineering (TE) is promising to provide a more efficient traffic accommodation while cost metric routing such as OSPF, which sets routes so as to minimize link cost, is widespreadly used. However, a path setting by TE does not offer cost minimum paths, which may be the best paths from...

    Provided By Cyber Journals

  • White Papers // Nov 2011

    A New Antenna Selection Algorithm in Cognitive MIMO Systems

    Utilization of multiple antenna transmission technique is a potential solution to co-channel interference problems in coexisting environments. However, additional system cost and complexities associated with multiple antennas limit their application in CR Systems. In this paper, the authors introduce antenna selection in cognitive MIMO systems and propose low complexity antenna...

    Provided By Cyber Journals

  • White Papers // Nov 2011

    Autonomic Computing Applied to Network Security: A Survey

    The constant increase in the number of computer network attack attempts has pushed researchers community to devise better security strategies. However, the rapid growth both in quantity and complexity of components and services offered in today's networks has increased the difficulty of administering these, making approaches based only on human...

    Provided By Cyber Journals

  • White Papers // Oct 2011

    Performance Enhancement of Large-Size NFC Multi-Touch System

    Multi-touch technology interfaces are becoming omnipresent due to its user-friendly human-machine interaction. Medium to large size multi-touch interfaces are implemented using camera based systems, capacity, resistive or pressure sensing systems or LED system. This paper presents security and performance vulnerabilities of multi-touch systems implemented in a multi-user environment. The paper...

    Provided By Cyber Journals

  • White Papers // Oct 2011

    A Simplified Delay-Guaranteed Traffic Engineering Method

    As the streaming of multimedia-rich contents such as videos and music is an increasingly popular Internet service, more traffic flows require real-time performance. For this reason, Traffic Engineering (TE) with consideration of real-time traffic delay requirements is essential to accommodate traffic effectively and lower the link congestion occurrence rate. Most...

    Provided By Cyber Journals

  • White Papers // Oct 2011

    Analysis of Call Admission Control for Multiservice Cognitive Radio Networks

    In Cognitive Radio Networks (CRNs), Call Admission Control (CAC) is an important functionality to ensure the Quality of Service (QoS) for Secondary Users (SUs). A Call Admission Control (CAC) scheme for multi-service Cognitive Radio Networks (CRNs) is investigated here. The authors adopt a Markov chain model to describe the procedure...

    Provided By Cyber Journals

  • White Papers // Oct 2011

    Incident-Avoidance Routing in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are being deployed widely thanks to recent advances in wireless communication technologies. Many WSNs may form in hostile environments, especially in military applications. Sensor nodes are thus prone to different types of attacks such as jamming, collision attacks, and eavesdropping. Once a sensor node is compromised,...

    Provided By Cyber Journals

  • White Papers // Oct 2011

    Environmental Monitoring Platform Based on a Heterogeneous Wireless Sensor Network

    In museums, to conserve the existing artwork is a vital issue. To achieve this purpose, it is fundamental to monitor its environment, either in storage or exhibition rooms. The deployment of a Wireless Sensor Network (WSN) can help to implement these measurements continuously, in a real-time basis, and in a...

    Provided By Cyber Journals

  • White Papers // Oct 2011

    Minimizing Shadowing Effects on Mobile Ad Hoc Networks

    Simple two-ray model and FRIIS free-space model have been widely used in the literatures as the propagation models for the performance analysis of Mobile Ad hoc NETwork (MANET). These models do not represent real world scenarios where the environmental clutter varies widely for a given distance between two mobile nodes....

    Provided By Cyber Journals

  • White Papers // Oct 2011

    Analysis and Implementation of a Fast Hash Function Based Upon Elliptic Curves

    Hash functions are probably the most popular component employed in cryptographic applications for their well known advantages they provide over digital communication links. Hash algorithms bearing the chaos and chaotic behaviors have attracted many attentions due to their full unpredictability. The proposed hash algorithm is based on elliptic functions with...

    Provided By Cyber Journals

  • White Papers // Oct 2011

    A Novel Computational Analog Block for Using in Analog Processors

    In this paper, the authors propose a computational analogue block which can be used to realize functions such as squaring, harmonic mean calculation, and vector summing. As presented block can be programmed to realize mentioned functions, it can be efficiently employed in systems and applications demanding programmable mathematical blocks like...

    Provided By Cyber Journals

  • White Papers // Sep 2011

    A Survey of IEEE 802.11p MAC Protocol

    The 802.11p standard has attracted much attention as part of the WAVE protocol in VANETs. The 802.11p MAC protocol is very challenging owing to the characteristics of VANETs. In this paper, a survey of the IEEE 802.11p MAC protocol in vehicular environments is presented. Firstly, the existing evaluations of 802.11p...

    Provided By Cyber Journals

  • White Papers // Sep 2011

    Influence of Mutual Coupling on the Transmission Strategy Design for MIMO Correlated Rayleigh Fading Channels

    The influence of mutual coupling among Multiple Input Multiple Output antenna (MIMO) systems is usually not negligible due to limited antenna spacing available in practice. A thorough understanding of such influence, however, is not available in the literature, although it is important to the design of a transmission strategy. In...

    Provided By Cyber Journals

  • White Papers // Sep 2011

    L-DRAND: A Localized Distributed TDMA Scheduling Algorithm With Distance-Measurement for Sensor Networks

    This paper proposes a distributed TDMA slot scheduling algorithm which the slot allocation priority is controlled by distance measurement information. In the proposed scheme, named L-DRAND, Lamport's bakery algorithm for mutual exclusion is applied for prioritized slot allocation based on the distance measurement information between nodes. This method aims at...

    Provided By Cyber Journals

  • White Papers // Sep 2011

    Restoration in WDM Mesh Networks by Finite Differences

    Fully optical fiber networks that transmit large quantities of information due to multiple applications or because they serve large urban areas need to be maintained fault-free at all times of their operation. The protection and restoration strategies are critical because they provide optical network survivability from a variety of failure...

    Provided By Cyber Journals

  • White Papers // Sep 2011

    RFID Reader Deployment Strategy Using Genetic Algorithm

    Recently, auto Identification system develop strongly and apply a lot of fieds. The almost system in there is Radio Frequency IDentification (RFID) system. According to the chip and wireless technological fast-growing, system RFID becomes more and more improve every aspect. However, putting reader anywhere to carry out better combined operations...

    Provided By Cyber Journals

  • White Papers // Sep 2011

    Wavelet Transform Effect on MIMO-OFDM System Performance

    Although latest generations for mobile communications systems have provided flexible expansion in system capacity, they faced great challenge in performance enhancement especially in the presence of bad fading channel conditions. In this paper a modified MIMO OFDM system will be introduced that is capable of mitigating fading channel distortion even...

    Provided By Cyber Journals

  • White Papers // Sep 2011

    WPAN Interference Cancellation From OFDM Based WLAN : Strategic Comparisons of Coexistence Techniques

    WLAN and WPAN operate in the same 2.4GHz ISM band. So whenever they operate nearby interfere with each other, results in performance degradation for both the system in terms of bit error rate or throughput. In this paper, the authors give an algorithm for estimating and canceling the narrow-band WPAN...

    Provided By Cyber Journals

  • White Papers // Aug 2011

    Enhanced Iterative-Based ZP-OFDM Receiver in Multi-Relay Cooperative Networks

    Zero-Padding Orthogonal Frequency Division Multiplexing (ZP-OFDM) has recently been introduced to avoid coded-OFDM's high decoding complexity. Various sub-optimal ZP-OFDM receivers have been developed in the literature to tradeoff performance with implementation complexity. In this paper, the authors propose a new iterative detection scheme for ZP-OFDM transmissions tailored to broadband cooperative...

    Provided By Cyber Journals

  • White Papers // Aug 2011

    Mismatched Wavelets: Information Hiding and Edge Detection

    Wavelets and other tight frames have been used for numerous signal and image processing applications. These transforms consist of two or more filters that are applied in "Analysis" and "Synthesis" operators. In general, these operators are designed such that perfect reconstruction is preserved. This paper introduces mismatched wavelets, in which...

    Provided By Cyber Journals

  • White Papers // Aug 2011

    Protocol Proxy for OSPF Emulation

    This paper proposes a protocol proxy scheme that can emulate the Open Shortest Path First (OSPF) protocol in an effective and flexible manner. It is implemented in the authors' developed network emulator, which is used to test network controllers for IP optical network management. In the protocol scheme, OSPF protocol...

    Provided By Cyber Journals

  • White Papers // Aug 2011

    A Scheme to Estimate One-Way Delay Variations for Diagnosing Network Traffic Conditions

    Real-time applications over the Internet, such as Voice-over-IP and video streaming services, are increasingly being applied to practical communication services so how to evaluate service qualities and how to diagnosis the cause of service degradation has become one of the key issue for QoS management. Various kinds of measurement metrics...

    Provided By Cyber Journals

  • White Papers // Aug 2011

    A Simple Estimation Scheme for Upper Bound of Link Utilization Based on RTT Measurement

    This paper proposes a scheme based on Round-Trip Time (RTT) measurement to estimate the upper bound of link utilization. In conventional active measurement schemes, probe packets are temporarily transmitted at greater than the available bandwidth through the link under test to estimate its utilization rate. This degrades the quality of...

    Provided By Cyber Journals

  • White Papers // Jul 2011

    An Alternative Backup Route With a Loop Free Routing Table Short Distance in Adhoc Wireless

    In a Mobile Ad hoc wireless NETworks (MANET), nodes communicate with each other via packet radios. However, in a MANET network, the mobility of the nodes and power limitations lead to an increased loss of connectivity between the mobile nodes when changing the route between nodes, which requires the routing...

    Provided By Cyber Journals

  • White Papers // Jul 2011

    An Improved Window Based on Cosine Hyperbolic Function

    A new simple form window with the application of FIR filter design based on the exponential function is proposed in this paper. An improved window having a closed simple formula which is symmetric ameliorates ripple ratio in comparison with cosine hyperbolic window. The proposed window has been derived in the...

    Provided By Cyber Journals

  • White Papers // Jul 2011

    Optimal Power Allocation for Correlated Rayleigh Fading MIMO Wireless Systems With Statistic Information Feedback

    In telecommunication field, channel capacity is the tightest upper bound on the amount of information that can be reliably transmitted over a communications channel. In this paper, the authors investigate how to increase information throughput to approach the capacity of a wireless communications system using Multiple-Input Multiple-Output (MIMO) technique. When...

    Provided By Cyber Journals

  • White Papers // Mar 2011

    Jointly Iterative Decoding of Low-Density Parity Check Codes (LDPC) Coded Continues Phase Modulation (CPM)

    This paper investigates the performance of a Low-Density Parity Check codes (LDPC)-coded system transmitted over A WGN channels using octal partial response Continuous Phase Modulation (CPM). The system provides an attractive option for spectral efficient communications systems. The CPM modulator can be decomposed into a ring Continuous-Phase Encoder (CPE) followed...

    Provided By Cyber Journals

  • White Papers // Oct 2011

    Performance Enhancement of Large-Size NFC Multi-Touch System

    Multi-touch technology interfaces are becoming omnipresent due to its user-friendly human-machine interaction. Medium to large size multi-touch interfaces are implemented using camera based systems, capacity, resistive or pressure sensing systems or LED system. This paper presents security and performance vulnerabilities of multi-touch systems implemented in a multi-user environment. The paper...

    Provided By Cyber Journals

  • White Papers // May 2011

    Cycle Analysis in Expanded QC LDPC Codes

    A Quasi-Cyclic (QC) Low-Density Parity-Check (LDPC) code can be viewed as the protograph code with circulant permutation matrices. In this paper, the authors use permutation matrices to form protograph LDPC codes. In protograph LDPC codes, they present cycle relationships of the mother matrix and the protograph LDPC code. It is...

    Provided By Cyber Journals

  • White Papers // May 2011

    Performance Evaluation of Stochastic Algorithms for Linear Antenna Arrays Synthesis Under Constrained Conditions

    Particle Swarm Optimization (PSO) is a high performance optimization technique recently introduced to solve antenna array synthesis problems to handle multiple degrees of freedom. An important problem facing the user of PSO is its parameters selection, as well as an efficient scheme to improve the optimization process. This paper proposes...

    Provided By Cyber Journals

  • White Papers // Dec 2011

    An Indoor Tracking System Based on Bluetooth Technology

    Implementations of tracking systems have become prevalent issues in modern technology due to its advantage of location detection of objects. Objects are usually tracked using trackers based on GPS, GSM, RFID and Bluetooth signal strength implementation. These mechanisms usually require line-of-sight operations, limited coverage and low-level programming language for accessing...

    Provided By Cyber Journals

  • White Papers // Dec 2011

    Performance of Random Relaying of MDS Codeword Blocks in Cooperative Multi-Hop Networks Over Random Error Channels

    The authors propose random relaying of MDS codeword blocks in cooperative multi-hop networks and evaluate its performance over random error channels by means of an absorbing Markov chain. The proposed scheme can apply to cooperative multi-hop networks with the arbitrary number of relay nodes at each hop stage and require...

    Provided By Cyber Journals

  • White Papers // Dec 2011

    Real-Time Measurement of Flows Classified According to Their Application for IP Networks

    In the management of Internet Protocol networks, the number of flows is an important performance metric because it has useful applications in areas such as port scan detection, denial-of-service detection, and traffic analysis. Real-time counting of flows is particularly important because network operators can take immediate actions against detected network...

    Provided By Cyber Journals

  • White Papers // Dec 2011

    A 12b 100MS/s Highly Power Efficient Pipelined ADC for Communication Applications

    12 bits 100 MS/s pipelined ADC with a high ENOB is proposed for communication applications especially for Wireless Networks. The proposed ADC achieves low power, high resolution and high speed operation due to deliberately design of a low power high performance operational amplifier for the pipeline stages. In addition, more...

    Provided By Cyber Journals

  • White Papers // Dec 2011

    A Low Voltage Highly Linear CMOS Down Conversion Mixer

    In this paper a new low voltage CMOS mixer is proposed which is highly linear. Linearity is provided by adjusting the value of a resistor and sizing the aspect ratio of a PMOS transistor at the RF stage of a well known low voltage CMOS mixer. Simulation results of improved...

    Provided By Cyber Journals

  • White Papers // Dec 2011

    Parallel Self-Sorting System for Objects

    Conventional sorting algorithms make use of such data structures as array, file and list which define access methods of the items to be sorted. These traditional methods - exchange sort, divide and conquer sort, selection sort and insertion sort - require supervisory control program. The supervisory control program has access...

    Provided By Cyber Journals

  • White Papers // Dec 2010

    Design of an Addressable Internetworked Microscale Sensor

    The use of nanoscale structures in sensing applications has been heavily investigated in recent years, with many significant breakthroughs that suggest a bright future for the technology. Silicon nanowires have received particular attention for their use as sense elements because of their large surface area-to-volume ratios and ability to be...

    Provided By Cyber Journals

  • White Papers // Dec 2010

    Modeling and Control of a Two Wheeled Machine: A Genetic Algorithm-Based Optimization Approach

    This paper carries out design and implementation of a PID control algorithm utilizing genetic algorithm as an optimization technique for a novel design of a two-wheeled vehicle with an extended rod. The vehicle design offers an additional feature to the conventional inverted pendulum on two wheels. The Intermediate Body (IB)...

    Provided By Cyber Journals

  • White Papers // May 2011

    Design and Analysis of Low Frequency Transmitter and Receiver for an Insecure Shallow Water Acoustic Channel of the Persian Gulf

    Underwater acoustic communications presents unique challenges that are being overcome with advances in signal processing algorithms and related hardware technologies. The accurate simulation and performance comparison of various algorithms is essential for building an optimized and robust communications system. This paper describes part of a project designed, based on the...

    Provided By Cyber Journals

  • White Papers // May 2011

    Securing the OLSR Routing Protocol for Ad Hoc Detecting and Avoiding Wormhole Attack

    A major problem facing researchers today in the field of ad hoc networks is safety and preservation of the integrity of such networks. Among the many attacks recorded in the literature, wormhole attack remains a severe attack and not completely solved, particularly in ad hoc network configuration where OLSR is...

    Provided By Cyber Journals

  • White Papers // Jan 2011

    FPGA Based Efficient WCDMA DUC for Software Radios

    This paper presents an efficient method to design & implement WCDMA based digital up converter for Software Radios. The Park McClellan algorithm has been proposed for optimal filter length to reduce hardware requirements. A computationally efficient polyphase decomposition structure is also proposed to optimize both speed and area. The embedded...

    Provided By Cyber Journals

  • White Papers // Jan 2011

    Reconfigurable Optimized WCDMA DDC for Software Defined Radios

    In this paper an optimized approach is presented to design & implement WCDMA based digital down converter for software defined radios. The proposed DDC is designed using Park McClellan algorithm to achieve optimal filter order for hardware reduction. A computationally efficient polyphase decomposition structure is presented to enhance the speed...

    Provided By Cyber Journals

  • White Papers // Jan 2011

    Security Risk Assessment Framework for Network Layer

    Security assessment is a crucial process in the application deployment. The network layer plays an important role in the computer infrastructure. Network infrastructure generally consists of firewall, router, and switches etc. The vulnerabilities and technology gaps in the network assets may lead to serious problems in the security and application...

    Provided By Cyber Journals

  • White Papers // Feb 2011

    Integration of Protocols FHMIPv6/MPLS in Hybrid Networks

    Currently, the authors are working on the integration of the FHMIPv6/MPLS protocol to provide QoS in hybrids scenarios the quality of service values were obtained when a handover occurred and the results were satisfactory. In general, terms, they can affirm that during a handover, not only metrics such as delay...

    Provided By Cyber Journals

  • White Papers // Nov 2011

    A New Antenna Selection Algorithm in Cognitive MIMO Systems

    Utilization of multiple antenna transmission technique is a potential solution to co-channel interference problems in coexisting environments. However, additional system cost and complexities associated with multiple antennas limit their application in CR Systems. In this paper, the authors introduce antenna selection in cognitive MIMO systems and propose low complexity antenna...

    Provided By Cyber Journals

  • White Papers // Nov 2011

    Autonomic Computing Applied to Network Security: A Survey

    The constant increase in the number of computer network attack attempts has pushed researchers community to devise better security strategies. However, the rapid growth both in quantity and complexity of components and services offered in today's networks has increased the difficulty of administering these, making approaches based only on human...

    Provided By Cyber Journals

  • White Papers // Aug 2011

    Enhanced Iterative-Based ZP-OFDM Receiver in Multi-Relay Cooperative Networks

    Zero-Padding Orthogonal Frequency Division Multiplexing (ZP-OFDM) has recently been introduced to avoid coded-OFDM's high decoding complexity. Various sub-optimal ZP-OFDM receivers have been developed in the literature to tradeoff performance with implementation complexity. In this paper, the authors propose a new iterative detection scheme for ZP-OFDM transmissions tailored to broadband cooperative...

    Provided By Cyber Journals

  • White Papers // May 2011

    Analysis of the Latest Trends in Mobile Commerce Using the NFC Technology

    The aim of this paper is to propose new mobile commerce proximity payment architecture, based on the analysis of existing solutions and current and future market needs. The idea is to change a Mobile Device into a reliable and secure payment tool, available to everyone and with possibility to securely...

    Provided By Cyber Journals

  • White Papers // Dec 2011

    Partial Traffic Engineering Over Cost Metric Network and Analysis on Its Oversubscription Capability

    Traffic Engineering (TE) is promising to provide a more efficient traffic accommodation while cost metric routing such as OSPF, which sets routes so as to minimize link cost, is widespreadly used. However, a path setting by TE does not offer cost minimum paths, which may be the best paths from...

    Provided By Cyber Journals

  • White Papers // Oct 2011

    A Simplified Delay-Guaranteed Traffic Engineering Method

    As the streaming of multimedia-rich contents such as videos and music is an increasingly popular Internet service, more traffic flows require real-time performance. For this reason, Traffic Engineering (TE) with consideration of real-time traffic delay requirements is essential to accommodate traffic effectively and lower the link congestion occurrence rate. Most...

    Provided By Cyber Journals

  • White Papers // Oct 2011

    Analysis of Call Admission Control for Multiservice Cognitive Radio Networks

    In Cognitive Radio Networks (CRNs), Call Admission Control (CAC) is an important functionality to ensure the Quality of Service (QoS) for Secondary Users (SUs). A Call Admission Control (CAC) scheme for multi-service Cognitive Radio Networks (CRNs) is investigated here. The authors adopt a Markov chain model to describe the procedure...

    Provided By Cyber Journals

  • White Papers // Oct 2011

    Incident-Avoidance Routing in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are being deployed widely thanks to recent advances in wireless communication technologies. Many WSNs may form in hostile environments, especially in military applications. Sensor nodes are thus prone to different types of attacks such as jamming, collision attacks, and eavesdropping. Once a sensor node is compromised,...

    Provided By Cyber Journals

  • White Papers // Oct 2011

    Environmental Monitoring Platform Based on a Heterogeneous Wireless Sensor Network

    In museums, to conserve the existing artwork is a vital issue. To achieve this purpose, it is fundamental to monitor its environment, either in storage or exhibition rooms. The deployment of a Wireless Sensor Network (WSN) can help to implement these measurements continuously, in a real-time basis, and in a...

    Provided By Cyber Journals

  • White Papers // Oct 2011

    Minimizing Shadowing Effects on Mobile Ad Hoc Networks

    Simple two-ray model and FRIIS free-space model have been widely used in the literatures as the propagation models for the performance analysis of Mobile Ad hoc NETwork (MANET). These models do not represent real world scenarios where the environmental clutter varies widely for a given distance between two mobile nodes....

    Provided By Cyber Journals

  • White Papers // Oct 2011

    Analysis and Implementation of a Fast Hash Function Based Upon Elliptic Curves

    Hash functions are probably the most popular component employed in cryptographic applications for their well known advantages they provide over digital communication links. Hash algorithms bearing the chaos and chaotic behaviors have attracted many attentions due to their full unpredictability. The proposed hash algorithm is based on elliptic functions with...

    Provided By Cyber Journals

  • White Papers // Oct 2011

    A Novel Computational Analog Block for Using in Analog Processors

    In this paper, the authors propose a computational analogue block which can be used to realize functions such as squaring, harmonic mean calculation, and vector summing. As presented block can be programmed to realize mentioned functions, it can be efficiently employed in systems and applications demanding programmable mathematical blocks like...

    Provided By Cyber Journals

  • White Papers // Sep 2011

    A Survey of IEEE 802.11p MAC Protocol

    The 802.11p standard has attracted much attention as part of the WAVE protocol in VANETs. The 802.11p MAC protocol is very challenging owing to the characteristics of VANETs. In this paper, a survey of the IEEE 802.11p MAC protocol in vehicular environments is presented. Firstly, the existing evaluations of 802.11p...

    Provided By Cyber Journals

  • White Papers // Sep 2011

    Influence of Mutual Coupling on the Transmission Strategy Design for MIMO Correlated Rayleigh Fading Channels

    The influence of mutual coupling among Multiple Input Multiple Output antenna (MIMO) systems is usually not negligible due to limited antenna spacing available in practice. A thorough understanding of such influence, however, is not available in the literature, although it is important to the design of a transmission strategy. In...

    Provided By Cyber Journals

  • White Papers // Sep 2011

    L-DRAND: A Localized Distributed TDMA Scheduling Algorithm With Distance-Measurement for Sensor Networks

    This paper proposes a distributed TDMA slot scheduling algorithm which the slot allocation priority is controlled by distance measurement information. In the proposed scheme, named L-DRAND, Lamport's bakery algorithm for mutual exclusion is applied for prioritized slot allocation based on the distance measurement information between nodes. This method aims at...

    Provided By Cyber Journals

  • White Papers // Sep 2011

    Restoration in WDM Mesh Networks by Finite Differences

    Fully optical fiber networks that transmit large quantities of information due to multiple applications or because they serve large urban areas need to be maintained fault-free at all times of their operation. The protection and restoration strategies are critical because they provide optical network survivability from a variety of failure...

    Provided By Cyber Journals

  • White Papers // Sep 2011

    RFID Reader Deployment Strategy Using Genetic Algorithm

    Recently, auto Identification system develop strongly and apply a lot of fieds. The almost system in there is Radio Frequency IDentification (RFID) system. According to the chip and wireless technological fast-growing, system RFID becomes more and more improve every aspect. However, putting reader anywhere to carry out better combined operations...

    Provided By Cyber Journals

  • White Papers // Sep 2011

    Wavelet Transform Effect on MIMO-OFDM System Performance

    Although latest generations for mobile communications systems have provided flexible expansion in system capacity, they faced great challenge in performance enhancement especially in the presence of bad fading channel conditions. In this paper a modified MIMO OFDM system will be introduced that is capable of mitigating fading channel distortion even...

    Provided By Cyber Journals

  • White Papers // Sep 2011

    WPAN Interference Cancellation From OFDM Based WLAN : Strategic Comparisons of Coexistence Techniques

    WLAN and WPAN operate in the same 2.4GHz ISM band. So whenever they operate nearby interfere with each other, results in performance degradation for both the system in terms of bit error rate or throughput. In this paper, the authors give an algorithm for estimating and canceling the narrow-band WPAN...

    Provided By Cyber Journals

  • White Papers // Aug 2011

    Mismatched Wavelets: Information Hiding and Edge Detection

    Wavelets and other tight frames have been used for numerous signal and image processing applications. These transforms consist of two or more filters that are applied in "Analysis" and "Synthesis" operators. In general, these operators are designed such that perfect reconstruction is preserved. This paper introduces mismatched wavelets, in which...

    Provided By Cyber Journals

  • White Papers // Aug 2011

    Protocol Proxy for OSPF Emulation

    This paper proposes a protocol proxy scheme that can emulate the Open Shortest Path First (OSPF) protocol in an effective and flexible manner. It is implemented in the authors' developed network emulator, which is used to test network controllers for IP optical network management. In the protocol scheme, OSPF protocol...

    Provided By Cyber Journals

  • White Papers // Jul 2011

    An Alternative Backup Route With a Loop Free Routing Table Short Distance in Adhoc Wireless

    In a Mobile Ad hoc wireless NETworks (MANET), nodes communicate with each other via packet radios. However, in a MANET network, the mobility of the nodes and power limitations lead to an increased loss of connectivity between the mobile nodes when changing the route between nodes, which requires the routing...

    Provided By Cyber Journals