IARIA

Displaying 1-40 of 1223 results

  • White Papers // May 2014

    MuTeBench: Turning OLTP-Bench into a Multi-Tenancy Database Benchmark Framework

    Database benchmarks have been used for decades to load test systems and to compare systems or system configurations with each other. However, their methods and assumptions are hardly suitable for multi-tenant cloud database services. Those systems have to provide both performance isolation of a lot of tenants with dynamic workloads...

    Provided By IARIA

  • White Papers // Jan 2014

    Multi-Version Databases on Flash: Append Storage and Access Paths

    New storage technologies, such as flash and non-volatile memories, with fundamentally different properties are appearing. Leveraging their performance and endurance requires a redesign of existing architecture and algorithms in modern high performance databases. Multi-Version Concurrency Control (MVCC) approaches in database systems, maintain multiple time-stamped versions of a tuple. Once a...

    Provided By IARIA

  • White Papers // Jan 2014

    A Diversified Set of Security Features for XMPP Communication Systems Useful in Cloud Computing Federation

    Now-a-days, in the panorama of cloud computing, finding a right compromise between interactivity and security is not trivial at all. Currently, most of cloud providers base their communication systems on the web service technology. The problem is that both cloud architectures and services have started as simple but they are...

    Provided By IARIA

  • White Papers // Jan 2014

    Easy Development of Web Applications using WebODRA2 and a Dedicated IDE

    The modern web requires new ways for creating applications. The authors present their approach combining a web framework with a modern object-oriented database and a dedicated Integrated Development Environment (IDE). It makes it easier to develop web applications by rising the level of abstraction. In contrast to many existing solutions,...

    Provided By IARIA

  • White Papers // Jan 2014

    Security Considerations for Multicast Communication in Power Systems

    Information security is gaining increasingly more importance for real-time automation networks. Multicast communication is used widely especially on field and process level to cope with performance requirements and to ease the handling of communication peers as the destinations need not to be known by the sender. A security design must...

    Provided By IARIA

  • White Papers // Nov 2013

    Towards a Framework for Designing Secure Mobile Enterprise Applications

    Mobile devices like Smartphone's and tablets are not only designed for private use, but also for business use as well. Mobile solutions, such as mobile enterprise resource planning and mobile business intelligence, are now-a-days becoming more common. However, without strong consideration of security, especially in mobile devices, these solutions would...

    Provided By IARIA

  • White Papers // Nov 2013

    Integrated Technologies for Communication Security on Mobile Devices

    In this paper, the authors presented design decisions taken during the construction of a framework for cryptographically secure communication on Android devices. The early prototypes still have many challenges to be overtaken, as follows. The use of cryptosystems for short signatures, elliptic curve cryptography and pairings-based cryptography are some of...

    Provided By IARIA

  • White Papers // Oct 2013

    Pricing the Cloud: An Adaptive Brokerage for Cloud Computing

    Using a multi-agent social simulation model to predict the behavior of cloud computing markets, Rogers & Cliff (R&C) demonstrated the existence of a profitable cloud brokerage capable of benefitting cloud providers and cloud consumers alike. Functionally similar to financial market brokers, the cloud broker matches provider supply with consumer demand....

    Provided By IARIA

  • White Papers // Oct 2013

    Towards a Smart City Security Model

    Even though concepts related to smart cities are well established and spread, those concepts are still very thin when related to Information Security. This paper will present some studies on smart cities, and will show that those studies are based on three macro concepts, system interoperability, applications and frameworks/platforms. Solutions...

    Provided By IARIA

  • White Papers // Oct 2013

    Kongdroid: A Proposal for a Cloud Service for Stress Testing on Android Applications

    In this paper, the authors propose a new and scalable service for stress testing on Android applications. This tool is available through cloud computing resources to support developers in their applications validation, aiming robustness, stability and compatibility, in different devices before commercial deployment. The solution focuses on the generation of...

    Provided By IARIA

  • White Papers // Oct 2013

    Commercialized Practical Network Service Applications From the Integration of Network Distribution and High-Speed Cipher Technologies in Cloud Environments

    In this paper, the authors present the evaluation results of the commercialization of High Security Disaster Recovery Technology (HS-DRT) that uses network distribution and high-speed strong cipher technologies to realize efficient and secure network services. They have commercialized a disaster recovery system and evaluated the performance of the distributed engines...

    Provided By IARIA

  • White Papers // Oct 2013

    A Privacy-Enhanced User-Centric Identity and Access Management Based on Notary

    Identity and Access Management (IAM) systems aim to control of users' attributes for authentication, authorization and accountability processes. Public Key Certificates (PKCs), like the X.509 standard, use asymmetric key pairs to support digital signatures, authentication processes and to increase the trust in the communication. Nevertheless, the PKC does not concern...

    Provided By IARIA

  • White Papers // Sep 2013

    The Data Checking Engine: Monitoring Data Quality

    In the context of data warehousing and business intelligence, data quality is of utmost importance. However, many mid-size Data WareHouse (DWH) projects do not implement a proper data quality process due to huge up-front investments. However, assessing and monitoring data quality is necessary to establish confidence in the DWH data....

    Provided By IARIA

  • White Papers // Sep 2013

    Exploiting Wiktionary for Lightweight Part-of-Speech Tagging for Machine Learning Tasks

    Part-of-speech (PoS) tagging is a crucial part in many natural language machine learning tasks. Current state-of-the-art PoS taggers exhibit excellent qualitative performance, but also contribute heavily to the total runtime of text preprocessing and feature generation, which makes feature engineering a time-consuming task. The authors propose a lightweight dictionary and...

    Provided By IARIA

  • White Papers // Sep 2013

    Discovering and Linking Financial Data on the Web

    The constant publishing of large volumes of financial information by various business sector organizations through its financial statements is a fact that must be exploited by using semantic technologies. This paper describes the use of Linked Data to generate a financial dataset that is part of the ongoing work of...

    Provided By IARIA

  • White Papers // Sep 2013

    Exploring the Tradeoffs of Configurability and Heterogeneity in Multicore Embedded Systems

    Embedded systems, such as Smartphone's, have become ubiquitous due to the versatility of these devices for various applications, which have varying application resource requirements. Due to these variances, system resources should be specialized to the executing applications' resource requirements in order to adhere to design/optimization goals. In multicore systems, core...

    Provided By IARIA

  • White Papers // Sep 2013

    Novel Models and Architectures for Distributed Semantic Data Management

    Semantic data management refers to a range of techniques for the manipulation and usage of data based on its meaning and its rapid growth gives rise to the problems of building novel models and architectures for its distributed management allowing efficient query processing and reasoning. The first part of the...

    Provided By IARIA

  • White Papers // Sep 2013

    Key Performance Indicators for Cloud Computing SLAs

    Reducing IT costs by using cloud computing is tempting for many companies. As cloud rapidly is gaining momentum as alternative mean of providing IT resources, the need for regulated service qualities increases. To attract companies to outsource their services to clouds, providers need to offer service level objectives specified in...

    Provided By IARIA

  • White Papers // Aug 2013

    Advanced Metering and Data Access Infrastructures in Smart Grid Environments

    For securing the provision with electric energy in smart grids, the ascertainment of energy consumption and production is inevitable in order to be able to apply appropriate control algorithms. As energy management is a highly distributed task, a data network has to exist in parallel to the power network for...

    Provided By IARIA

  • White Papers // Aug 2013

    Challenges in Securing Wireless Sensor Networks

    Wireless sensor networks are highly prone to faults and errors due to their restrictive capabilities and limited resources. In this paper, some of the challenges facing the wireless sensor networks such as security, routing, computing capability, and battery power, will be discussed. The authors will focus on both security and...

    Provided By IARIA

  • White Papers // Aug 2013

    The Cloning Attack Vulnerability in WSN Key Management Schemes

    The majority of existing key management schemes in wireless sensors networks suffer from the physically compromised of nodes. This vulnerability allows an adversary to reproduce clones from a compromised node and to inject them into several locations on the network to conduct other types of attacks. Moreover, the joining of...

    Provided By IARIA

  • White Papers // Aug 2013

    Proposed Middleware for Sensor Networks in Cyber-Physical System Environments

    This paper describes the modeling proposal of a middleware for sensor networks in Cyber-Physical (CP) environments adopting the reuse of Designs Patterns, which must favor the coupling in the underlying layers of the middleware and facilitate the communication between components in the upper layers. The authors' main goal is to...

    Provided By IARIA

  • White Papers // Aug 2013

    Estimation of Performance and Availability of Cloud Application Servers Through External Clients

    This paper investigates two aspects of the QoS offered by some cloud providers on the Internet, the availability and the dedicated capacity in terms of how well a user process is isolated from other users of the same application server instance. By using standard components and software utilities, a small...

    Provided By IARIA

  • White Papers // Aug 2013

    Robustness of Security-Oriented Binary Codes Under Non-Uniform Distribution of Codewords

    Robust and partially robust codes are used in cryptographic devices for detecting active side channel attacks on the hardware. The codes are usually designed for uniformly distributed code-words. In practice, however, there are code-words that are much more likely to appear than others. This paper addresses the question of how...

    Provided By IARIA

  • White Papers // Aug 2013

    Fighting Spam by Breaking the Economy of Advertising by Unsolicited Emails

    Unsolicited email (spam) is still a problem for users of the email service. Even though current email anti-spam solutions filter most spam emails, some still are delivered to the inbox of users. A special class of spam emails advertises websites, e.g., online dating sites or online pharmacies. The success rate...

    Provided By IARIA

  • White Papers // Aug 2013

    Risk-Based Dynamic Access Control for a Highly Scalable Cloud Federation

    Cloud computing is already a successful paradigm for distributed computing and is still growing in popularity. However, many problems still linger in the application of this model and some new ideas are emerging to help leverage its features even further. One of these ideas is the cloud federation, which is...

    Provided By IARIA

  • White Papers // Aug 2013

    XMPP Distributed Topology as a Potential Solution for Fog Computing

    Fog computing is potentially harmful towards existing cloud computing systems as well as big data structures. Lack of privacy and potentially unauthorized content distribution are some of many issues to solve. As a possible solution, the authors propose in the following paper the definition of a new network topology as...

    Provided By IARIA

  • White Papers // Aug 2013

    Policy-Aware Provisioning of Cloud Applications

    The automated provisioning of complex composite cloud applications is a major issue and of vital importance in cloud computing. It is key to enable cloud properties such as pay-as-you-go pricing, on-demand self-service, and elasticity. The functional aspects of provisioning such as instantiating virtual machines or installing software components are covered...

    Provided By IARIA

  • White Papers // Jul 2013

    A Topology Visualization Early Warning Distribution Algorithm for Large-Scale Network Security Incidents

    It is of great significance to research the early warning system for large-scale network security incidents. It can improve the network system's emergency response capabilities, alleviate the cyber attacks' damage, and strengthen the system's counterattack ability. A comprehensive early warning system is presented in this paper, which combines active measurement...

    Provided By IARIA

  • White Papers // Jul 2013

    Protecting the Communication Structure in Sensor Networks

    In the near future wireless sensor networks will be employed in a wide variety of applications establishing ubiquitous networks that will pervade society. The inherent vulnerability of these massively deployed networks to a multitude of threats, including physical tampering with nodes exacerbates concerns about privacy and security. For example, Denial...

    Provided By IARIA

  • White Papers // Jul 2013

    The Impact of Requirements on Software Quality Across Three Product Generations

    The authors presented data demonstrating the impact that a well-written and well-reviewed set of requirements had on software defects and other quality indicators between two generations of an Intel product. Quality indicators for the second software product all improved dramatically even with the increased complexity of the newer product. This...

    Provided By IARIA

  • White Papers // Jul 2013

    Simulation of a Security Function Based on Vehicle-to-X Communication and Automotive Lighting

    Crime and feeling of security are pervasive occurrences and can be influenced by lighting conditions. However, lighting improvements are generally concentrated on street lighting. Meanwhile, a vast variety of new technologies, including innovative lighting systems and connected mobility, are entering into the automotive field. Hence, opportunities are not limited only...

    Provided By IARIA

  • White Papers // Jul 2013

    A Time-series Clustering Approach for Sybil Attack Detection in Vehicular Ad hoc Networks

    Sybil attack is a security threat wherein an attacker creates and uses multiple counterfeit identities risking trust and functionality of a peer-to-peer system. Sybil attack in vehicular ad hoc networks is an emergent threat to the services and security of the system. In the highly dynamic environment of vehicular ad...

    Provided By IARIA

  • White Papers // Jul 2013

    A New Bio-Crypto System Approach to Enhance Security of 4G Mobile Networks

    In this paper, the authors examine the vulnerable security elements that MAC management messages in WiMAX initial network entry faces. The paper proposes an innovative hybrid approach to resolve such vulnerability problem and establish secret communication channels via insecure domains. The proposed protocol is based on bio-crypto systems and to...

    Provided By IARIA

  • White Papers // Jul 2013

    HMAC-Based RFID Authentication Protocol with Minimal Retrieval at Server

    In this paper, the authors propose a HMAC-based RFID mutual authentication protocol to improve performance at the back-end server. In existing hash-based protocols, the tag ID is a secret value for privacy, so the back-end server computes a lot of hash operations or modular operations to retrieve the tag ID....

    Provided By IARIA

  • White Papers // Jul 2013

    Experiments in Collaborative Cloud-Based Distance Learning

    Mobile devices have revolutionary changed the process of multimedia consumption in distance learning systems and provide flexible user-oriented experience. M-learning systems typically include different kinds of multimedia resources helping learners to be more interactive and interested in collaboration. The proposed multi-tenancy group collaboration within the cloud-based learning platform (as a...

    Provided By IARIA

  • White Papers // Jul 2013

    OSGiLarva: A Monitoring Framework Supporting OSGi's Dynamicity

    Service-oriented architecture is an approach where software systems are designed in terms of a composition of services. OSGi is a service-oriented framework dedicated to 24/7 Java systems. In this service-oriented programming approach, software is composed of services that may dynamically appear or disappear. In such a case, classical monitoring approaches...

    Provided By IARIA

  • White Papers // Jul 2013

    Optimal Query Operator Materialization Strategy for Hybrid Databases

    Recent research shows that main memory database system provides many different advantages over traditional disk based systems. Furthermore it is shown that the way how data is persisted in such a system is very important. Modern systems provide a hybrid row- and column-oriented storage layer that proves to be optimal...

    Provided By IARIA

  • White Papers // Jul 2013

    Ensembles of Decision Trees for Network Intrusion Detection Systems

    The paper discusses intrusion detection systems built using ensemble approaches, i.e., by combining several machine learning algorithms. The main idea is to exploit the strengths of each algorithm of the ensemble to obtain a robust classifier. Network attacks can be divided into four classes: probe, remote to local, denial of...

    Provided By IARIA

  • White Papers // Jul 2013

    Towards Enhanced Usability of IT Security Mechanisms: How to Design Usable IT Security Mechanisms Using the Example of Email Encryption

    Now-a-days, advanced security mechanisms exist to protect data, systems, and networks. Most of these mechanisms are effective, and security experts can handle them to achieve a sufficient level of security for any given system. However, most of these systems have not been designed with focus on good usability for the...

    Provided By IARIA

  • White Papers // Jul 2011

    Anonymous Key Issuing Protocol for Distributed Sakai-Kasahara Identity-Based Scheme

    Practical implementations of identity based cryptosystems are faced to key escrow problem, which is not always a good property in many realistic scenarios. Thus, efficient key issuing protocols are needed to generate and deliver user's private keys in secure manner without leakage. Three major approaches exist in the literature, the...

    Provided By IARIA

  • White Papers // Jul 2011

    Efficiency Optimisation of Tor Using Diffie-Hellman Chain

    Onion routing is the most common anonymous communication channel. Usually onion routing is specified through asymmetric cipher and thus is inefficient. In Tor (the second generation onion router), it is suggested to employ symmetric cipher to encrypt the packets in onion routing. Obviously, symmetric cipher is much more efficient than...

    Provided By IARIA

  • White Papers // Jul 2011

    StepRoute - A MultiRoute Variant Based on Congestion Intervals

    Congestion-aware routing protocols require network statistics which are timely and as precise as possible. Consequently, there is a need to represent congestion information efficiently and in a scalable manner. Based on the authors' previous work, they propose a routing protocol, called StepRoute, which achieves these objectives, while retaining the functionality...

    Provided By IARIA

  • White Papers // Jul 2011

    A Naming Scheme for Identifiers in a Locator/Identifier-Split Internet Architecture

    Many researchers agreed that splitting the IP address into a locator and an identifier seems to be a promising approach for a Future Internet Architecture. Although this solution addresses the most critical issues of today's architecture, new challenges arise through the mapping system which is necessary to resolve identifiers into...

    Provided By IARIA

  • White Papers // Jul 2011

    Address-Translation-Based Network Virtualization

    Two network-virtualization architectures, namely, network segmentation and network paging, were investigated. They are analogical to two memory-virtualization architectures: segmentation and paging. Network paging, which is relatively new and is based on a type of Network-Address Translation (NAT), is focused on. This architecture requires smaller packet size and has several more...

    Provided By IARIA

  • White Papers // Jul 2011

    Next Generation Access Networks (NGANs) and the Geographical Segmentation of Markets

    Telecom infrastructures are facing unprecedented challenges with increasing demands on network capacity. Next Generation Networks (NGN) allows consumers to choose between different access network technologies to access their service environment. The arrival of NGAN (Next Generation Access Network) has implications for the competitive conditions in access markets that are still...

    Provided By IARIA

  • White Papers // Jul 2011

    Does Cloud Computing Matter? Networking IT and Services Value in Organizations

    In this paper, the authors discuss cloud computing value generation through four company case studies. They argue that cloud computing value is generated through the interactions of organization, IT and services. They further analyze their value networking activities, and then propose ANT as a lens to interpret the cloud computing...

    Provided By IARIA

  • White Papers // Jul 2011

    Motivations and Challenges of Global Mobility With Universal Identity: A Review

    Mobility in the enterprise is derived by both technology availability and the increase in user demand. The merging of 4G and WLAN networks prompts the needs of operators to increase their coverage with a blended service offering that makes best use of their old investments in legacy infrastructure, low price...

    Provided By IARIA

  • White Papers // Jul 2011

    A New Hybrid SPD-Based Scheduling for EPONs

    Dynamic Bandwidth Allocation (DBA) is a key issue of Ethernet PONs. In order to get higher resource utilization and lower packet delay, the problem is always dissolved into grant sizing and grant scheduling. In this paper, the authors explore grant scheduling techniques. They propose a modified Hybrid online and offline...

    Provided By IARIA

  • White Papers // Jul 2011

    Link Emulation on the Data Link Layer in a Linux-Based Future Internet Testbed Environment

    Protocol design and development is not a straightforward process. Each approach must be validated for interactions and side-effects in the existing network environments. But the Internet itself is not a good test environment, since its components are not controllable and certain problem situations (like congestion or error conditions) are difficult...

    Provided By IARIA

  • White Papers // Jul 2011

    User Utility Function as Quality of Experience (QoE)

    The realization of a user-centric paradigm will revolutionize future wireless networks. For this innovative concept to materialize, a paradigm shift is required from a long-term contractual based service delivery to a short-term contractual and dynamic service delivery concept. However this necessitates that translation of user satisfaction into network technical indices,...

    Provided By IARIA

  • White Papers // Jul 2011

    Tuning Self-Similar Traffic to Improve Loss Performance in Small Buffer Routers

    The issue of router buffer sizing is an important research problem and is still open though researchers have debated this for many years. The research method can be classified into two kinds: one is based on queuing theory, the other uses TCP as model. From the point of TCP model,...

    Provided By IARIA

  • White Papers // Jul 2011

    Performance Evaluation of Burst Deflection in OBS Networks Using Multi-Topology Routing

    This paper evaluates the combination of Optical Burst Switching (OBS) and Multi-Topology (MT) routing. Using MT routing, a source router has a choice of sending IP packets on several different paths to the destination. In OBS networks, deflection may reduce burst loss rate. The authors evaluate a deflection method that...

    Provided By IARIA

  • White Papers // Jul 2011

    Outage Performance Analysis of Alamouti STBC in Backward Link for Wireless Cooperative Networks

    In this paper, the authors propose a cooperative diversity scheme to improve the end-to-end outage performance via Alamouti space-time block coding with two transmit antennas at a source node in a backward link and a best-relay selection scheme in a forward link. They derive an exact closed-form expression of the...

    Provided By IARIA

  • White Papers // Jul 2011

    Exact Error Probabilities Analysis of Arbitrary 2-D Modulation-OFDM Systems With I/Q Imbalances in Frequency-Flat Rayleigh Fading Channel

    In-phase and Quadrature (I/Q) amplitude and phase imbalances are inevitably caused by signal processing in the analog components such as I/Q mixers, phase shifters, filters, and analog/digital converters within I/Q branches. In the implementation of a modern wireless communication system, I/Q imbalances act as one of the main impairments degrading...

    Provided By IARIA

  • White Papers // Jul 2011

    Layer Optimization for DHT-Based Peer-to-Peer Network

    Hierarchical architecture has been found to facilitate effective search in P2P network and ensure system scalability in P2P application deployment. However, the lack of appropriate size ratio of super nodes layer and ordinary nodes layer makes the system search performance far from being optimal. Taking advantage of node heterogeneity, this...

    Provided By IARIA

  • White Papers // Jul 2011

    Performance Evaluation of Split Connection Methods for Session-Based Group-Oriented Communications

    Group-oriented communication services have become more attractive due to the diversifying demands of Internet users. In these services, the bandwidth available to the link in the network is inefficiently consumed by multiple TCP connections and these individual connections compete against each other. Thus, current group-oriented services cannot use network resources...

    Provided By IARIA

  • White Papers // Jul 2011

    I2P Data Communication System

    As communication becomes more and more an integral part of the people day to day lives, the need to access information increases as well. Security is currently one of the most important factors to consider in the authors' aim to achieve ubiquitous computing, and with it raises the problem of...

    Provided By IARIA

  • White Papers // Jul 2011

    Experimental IPTV and IPv6 Extended Provisioning in a Virtual Testbed

    The increasing interest in Internet Protocol TeleVision (IPTV) and Internet Protocol Version 6 (IPv6) has driven the need to find a solution to run IPTV and IPv6 outside of a normal public access network. To find new solutions a virtual testbed based on Virtual Private Network (VPN) was built. VPN...

    Provided By IARIA

  • White Papers // Jul 2011

    Analysis of the Implementation of Utility Functions to Define an Optimal Partition of a Multicast Group

    As the optimal use of network resources is a major issue for telecoms operators, the authors started works aiming to, firstly, improve the utilization of network resources by transmitting the IP packets in multicast when possible, secondly, to adapt the format of the data transmitted in multicast to take into...

    Provided By IARIA

  • White Papers // Jul 2011

    A Survey on Robust Wireless JPEG 2000 Images and Video Transmission Systems

    This paper proposes a survey of robust wireless JPEG 2000 images and video transmission systems. The performance of the presented systems is discussed and compared both in terms of time consumption and in terms of robustness against transmission errors. Some opened tracks are then discuss with a special emphasis on...

    Provided By IARIA

  • White Papers // Jul 2011

    Analysis of Reliable and Scalable Video-On-Demand Networks

    Various architectures have been proposed and implemented to handle the rapid growth in demand for video delivering technologies. This paper implements and thoroughly examines various Video-on-Demand (VoD) architectures using the NS2 simulation tool. The simulation tool used for the project provides an efficient platform to analyze different architectures and obtain...

    Provided By IARIA

  • White Papers // Jul 2011

    Usability Evaluation and Study of a Video-Conferencing Service Provided Via the Virtual Conference Centre

    Usability evaluation is a core component of User-Centred Design (UCD) approach and aims primarily to evaluate effectiveness, efficiency and satisfaction when users interacting with a product/service to achieve their goals and needs, influencing their decision to its future adoption (i.e., user acceptance). The focus of this research paper was to...

    Provided By IARIA

  • White Papers // Jul 2011

    Multi-Episodic Dependability Assessments for Large-Scale Networks

    As a network infrastructure expands in size, the number of concurrent outages can be expected to grow in frequency. The purpose of this paper is to investigate through simulation the characteristics of concurrent network outages and how they impact network operators' perspective of network dependability. The dependability investigated includes network...

    Provided By IARIA

  • White Papers // Jul 2011

    Soft Errors Mask Analysis on Program Level

    Computer hardware which consist billions of transistors could fail because of soft errors with the improving of semiconductor technology, and these failure could result in incorrect program execution. However, soft errors could be masked. Most methods of SIFT (Software-Implemented Fault Tolerance) do not take mask into account. In fact, these...

    Provided By IARIA

  • White Papers // Nov 2011

    Locating Zigbee Devices in a Cluster-Tree Wireless Sensor Network: an ESD-Based Integrated Solution

    Recent advances in the technology of wireless electronic devices have made possible to build ad-hoc Wireless Sensor Networks (WSNs) using inexpensive nodes consisting of low power processors, a modest amount of memory and simple wireless transceivers. Over the last years, many novel applications have been envisaged for distributed WSNs in...

    Provided By IARIA

  • White Papers // Jul 2011

    Loss Differentiation and Recovery in TCP Over Wireless Wide-Area Networks

    The increasing speed and coverage of Wireless Wide Area Networks (WWAN) has made technologies such as GPRS, UMTS, or HSDPA a popular way to access the Internet for both mobile and stationary users. However, depending on the scenario, WWAN can suffer from severe IP packet loss due to corruption, which...

    Provided By IARIA

  • White Papers // Jul 2011

    By Use of Frequency Diversity and High Priority in Wireless Packet Retransmissions

    In Orthogonal Frequency Division Multiple Access (OFDMA) systems, the delay of packets has a great impact on Quality of Service (QoS), especially for real-time transmission. The basic concept of resource allocation in an OFDMA system is to allocate a subcarrier to the user with the best channel condition in that...

    Provided By IARIA

  • White Papers // Jul 2011

    Kernel Monitor of Transport Layer Developed for Android Working on Mobile Phone Terminals

    In recent years, with the rapid growth of smart phone market, Android is drawing an attention as software platform of embedded system, used as a personal digital assistance developed by Google. While Android is taken notice for its flexible development of application software and expansion of the system, the authors...

    Provided By IARIA

  • White Papers // Jul 2011

    Path Selection in WiMAX Networks With Mobile Relay Stations

    Introduction of mobile relays into networks based on IEEE 802.16 standard brings new challenges. The paper proposes signaling mechanism for acquisition of channel state information for mobile relays and provides detail analysis of the amount of signaling overhead caused by their introduction. In addition, the investigation whether the connection of...

    Provided By IARIA

  • White Papers // Jul 2011

    Planning With Joint Clustering in Multi-Hop Wireless Mesh and Sensor Networks

    Wide spread deployment of wireless mesh networks for broadband access requires careful deployment and planning in terms of laying down the network infrastructure. Deploying such networks comes with some major inter-related issues including capacity planning, scalability and access reliability. Planning includes determining the number of gateways, optimal placement of gateways...

    Provided By IARIA

  • White Papers // Jul 2011

    Anomaly Detection Framework for Tracing Problems in Radio Networks

    This paper shows a novel concept of using diffusion maps for dimensionality reduction when tracing problems in 3G radio networks. The main goal of the paper is to identify abnormally behaving base station from a large set of data and find out reasons why the identified base stations behave differently....

    Provided By IARIA

  • White Papers // Jul 2011

    A New Path Failure Detection Method for Multi-Homed Transport Layer Protocol

    Through its support for multi-homing, the Stream Control Transmission Protocol (SCTP) is a suitable solution to implement and manage user's mobility by abstracting multiple physical paths into a single end-to-end association. In order to detect the primary path failure, SCTP uses a strategy defined in the RFC2960 and mainly based...

    Provided By IARIA

  • White Papers // Jul 2011

    A Mechanism for Semantic Web Services Discovery in Mobile Environments

    This paper describes SeMoSD (Semantic Mobile Service Discovery), a mechanism for discovery of services in mobile environments based on web services technology. The service discovery mechanism was designed taking into account the resource constraints of mobile devices. Through SeMoSD, mobile devices are able to profit from the use of semantic...

    Provided By IARIA

  • White Papers // Jul 2011

    Towards Efficient Energy Management: Defining HEMS, AMI and Smart Grid Objectives

    Energy consumption has increased considerably in the recent years. The way to reduce and make energy consumption more efficient has become of great interest for researchers. One of the research areas is the reduction of energy consumption in users' residences. Efficiently managing and distributing electricity in the grid will also...

    Provided By IARIA

  • White Papers // Jul 2011

    Scalability of Distributed Dynamic Load Balancing Mechanisms

    A load balancing mechanism for large-scale systems should be distributed and dynamic in order to accomplish scalability and high availability. Also, it should be autonomic in order to ease network management. The recent development in utility computing architectures, such as the so-called cloud computing platforms, has increased the demand for...

    Provided By IARIA

  • White Papers // Jul 2011

    Moving to the Cloud: New Vision Towards Collaborative Delivery for Open-IPTV

    This paper provides a short description and visions about the convergence network architecture for an Open-IPTV model based Cloud. Also, it counts the benefits which derived from adoption of this architecture to mobility and security issues. With the new Open-IPTV model, the migration towards convergence networks between different Content Providers...

    Provided By IARIA

  • White Papers // Jul 2011

    Half-Band FIR Filters for Signal Compression

    An efficient design of equiripple half-band FIR filters for signal compression is presented. Solution of the approximation problem in terms of generating function and zero phase transfer function for the equiripple half-band FIR filter is shown. The equiripple half-band FIR filters are optimal in the Chebyshev sense. The closed form...

    Provided By IARIA

  • White Papers // Jul 2011

    Comb Filters for Communication Technology

    An extension of the design of digital equi-ripple comb FIR filters is presented. The authors introduce the fifth type of comb FIR filter which complements the existing four standard types. The design runs from the filter specifications through the degree formula to the impulse response coefficients, which are evaluated by...

    Provided By IARIA

  • White Papers // Nov 2011

    Significance of Semantic Web in Facilitating HCI in Mobile and Ubiquitous Learning

    Mobile devices are being widely used in education for many purposes such as an instruction tool for learning. However, mobile devices suffer from the limitation of capabilities and resources. Potential solutions to this issue must consider the mobility and personal characteristics of potential education seekers. This paper theoretically describes how...

    Provided By IARIA