IARIA

Displaying 441-480 of 1223 results

  • White Papers // Feb 2012

    Reliable Technology for Wireless Mesh Networks With Low System Requirements

    In this paper IQMESH, new networking technology for wireless mesh networks, its basic principles and related routing algorithms are presented. The presented technology was developed especially for applications in the field of buildings automation and telemetry. However, other applications such as smart grids or street lighting can also benefit from...

    Provided By IARIA

  • White Papers // Feb 2012

    Forwarding and Routing Stateless Multi-Hop Protocol for Wireless Sensor Networks

    Energy conservation can be achieved by the use of clustering routing protocols in Wireless Sensor Networks (WSN). The people have a great impact on the system lifetime. In these WSNs, the concepts of communication between Cluster Head (CH) nodes and Base Station (BS), data aggregation and round can be approached...

    Provided By IARIA

  • White Papers // Feb 2012

    Resource Management for Advanced, Heterogeneous Sensor-Actor-Networks

    Sensor-Actor-NETworks (SANET) consist of several heterogeneous subsystems, which provide specific capabilities for measuring or manipulating its environment. During the run-time, the communication infrastructure as well as communication tasks and the available communication resources are changing dynamically. Furthermore, advanced application scenarios in this domain have strict requirements regarding to the minimal...

    Provided By IARIA

  • White Papers // Feb 2012

    Improving Fairness in Wireless Mesh Networks

    Wireless Mesh Networks (WMNs) are networks that aim to establish hybrid wireless communications in areas with little or no telecommunication infrastructure available. The main motivation of these networks in Brazil and other developing countries, particularly in remote areas, is providing Internet access in places without commercial infrastructure and where the...

    Provided By IARIA

  • White Papers // Feb 2012

    MANET With the Q-Routing Protocol

    With ad hoc networks having much more advantages over other types of networks in a mobile world, this made it an attractive field for many protocols. In this paper, the authors propose an implementation of the Q-Routing protocol working over a mobile ad hoc network to enhance the performance of...

    Provided By IARIA

  • White Papers // Feb 2012

    Estimation of Collision Multiplicities in IEEE 802.11-Based WLANs

    Estimating the Collision Multiplicity (CM), i.e. the number of users involved in a collision, is a key task in MultiPacket Reception (MPR) approaches and in Collision Resolution (CR) techniques. A new technique is proposed for IEEE 802.11 networks. The technique is based on recent advances in random matrix theory and...

    Provided By IARIA

  • White Papers // Feb 2012

    CTC Turbo Decoding Architecture for LTE Systems Implemented on FPGA

    This paper describes a turbo decoder for Long Term Evolution (LTE) standard, release 8, using a Max Log MAP algorithm. The Forward Error Correction (FEC) block dimensions, as indicated in the standard, are inside a range of 40 to 6144 bits. The coding rate is 1/3, the puncturing block not...

    Provided By IARIA

  • White Papers // Feb 2012

    Multi-Relay Cooperative NB-LDPC Coding With Non-Binary Repetition Codes

    In this paper, the authors propose a system based on non-binary Low-Density Parity-Check (LDPC) codes to communicate efficiently over the multiple-relay fading channels, with a simple joint decoding strategy at the receiver end. The particularity of their approach is to rely on non-binary LDPC codes at the source, coupled with...

    Provided By IARIA

  • White Papers // Feb 2012

    A Redundancy Information Protocol for P2P Networks in Ubiquitous Computing Environments: Design and Implementation

    The ubiquitous computing vision brings high computational and communication demands. In this paper, the authors propose a high availability protocol for information replication in ubiquitous computing environments. Running at the application layer, on top of a P2P overlay network based on JXTA, the protocol allows the transfer of multimedia contents...

    Provided By IARIA

  • White Papers // Feb 2012

    Architecture of a Security and Surveillance System: The Benefits of an Open and Generic Approach

    During the recent years, it has been increasingly shown that open and generic system platforms exhibit considerable advantages over closed systems in different areas of security technology. With systems that are flexible and adaptable to emerging demands, it can avoid expensive dedicated solutions becoming useless when requirements change. In this...

    Provided By IARIA

  • White Papers // Feb 2012

    Towards Next Generation Malware Collection and Analysis

    The fast paced evolution of malware has demonstrated severe limitations of traditional collection and analysis concepts. However, a majority of the anti-malware industry still relies on such ineffective concepts and invests much effort into temporarily fixing most obvious shortcomings. Ultimately fixing outdated concepts is insufficient for combating highly sophisticated future...

    Provided By IARIA

  • White Papers // Feb 2012

    A Case for Inverted Indices in In-Memory Databases

    Recent database research has focused on in-memory databases, which can be used in mixed workload scenarios, enabling OLTP and OLAP queries on the same database engine. These compressed column-oriented database systems use a differential store concept to enable fast inserting and require a merge process to compact the data periodically...

    Provided By IARIA

  • White Papers // Feb 2012

    Operating on Hierarchical Enterprise Data in an In-Memory Column Store

    Enterprise data management is currently separated into On-Line Transactional Processing (OLTP) and On-Line Analytical Processing (OLAP). This separation brings disadvantages such as the need for costly data replication, maintaining redundant systems or the inability to run data reports on the latest transactional data. Academia and industry are working on a...

    Provided By IARIA

  • White Papers // Feb 2012

    About Top-K Flexible Queries in Large Databases

    The problem of obtaining efficient answers to top k queries has attracted a lot of research attention. Unfortunately, current top-k query processing techniques focus on Boolean queries, and cannot be applied to the large Data Bases (DB) seen the gigantic number of data. In this paper, the authors propose a...

    Provided By IARIA

  • White Papers // Feb 2012

    A New Approach for Top-K Flexible Queries in Large Database Using the Knowledge Discovered

    In this paper, the authors propose their contribution to support top-k flexible query in large DB. Generally, the current top-k query processing techniques focus on Boolean queries, and cannot be applied to the large DB seen the gigantic number of data. Their approach proposes to uses the generated knowledge result...

    Provided By IARIA

  • White Papers // Feb 2012

    OLAP Authentication and Authorization via Query Re-Writing

    On-Line Analytical Processing (OLAP) has become an increasingly important and prevalent component of Decision Support Systems. OLAP is associated with a data model known as a cube, a multi-dimensional representation of the core measures and relationships within the associated organization. While numerous cube generation and processing algorithms have been presented...

    Provided By IARIA

  • White Papers // Feb 2012

    The Multi-Tenant Data Placement Problem

    With the advent of the Software-as-a-Service (SaaS) deployment model, managing operational costs becomes more and more important for providers of hosted software. The cost for hosting and providing a service is directly proportional to the operational margin that can be achieved when running a SaaS business. Possible avenues for reducing...

    Provided By IARIA

  • White Papers // Feb 2012

    Dynamic Stream Allocation with the Discrepancy Between Data Access Time and CPU Usage Time

    Huge quantities of data arriving in chronological order are one of the most important information resources, and stream mining algorithms are developed especially for the analysis of the fast streams of data. A stream mining algorithm usually refers to the input data only once and never revisits them (read-once-write-once), while...

    Provided By IARIA

  • White Papers // Feb 2012

    Sparse Dictionaries for In-Memory Column Stores

    A common approach to achieve high read and write performance for column-oriented in-memory databases is to separate the data store into a read-optimized main partition and a write-optimized differential buffer. The differential buffer has to be merged into the main partition periodically to preserve read performance and increase memory efficiency....

    Provided By IARIA

  • White Papers // Feb 2012

    Improving the Quality of Knowledge Discovery Process by Information Gain Computing

    Knowledge discovery process is one of the key activities in improving the quality of a system. This paper presents a custom approach for improving the quality of a knowledge discovery process based on information gain computing. The baseline knowledge discovery process is based of M Trees and is used to...

    Provided By IARIA

  • White Papers // Feb 2012

    Towards Accurate Electricity Load Forecasting in Smart Grids

    Smart grids, or intelligent electricity grids that utilize modern IT/communication/control technologies, become a global trend nowadays. Forecasting of future grid load (electricity usage) is an important task to provide intelligence to the smart gird. Accurate forecasting will enable a utility provider to plan the resources and also to take control...

    Provided By IARIA

  • White Papers // Feb 2012

    On Parallel Evaluation of SPARQL Queries

    The Semantic Web databases are growing bigger and much effort is given to introduce new approaches to querying them effectively. Most of the current approaches are based on query optimization or their parallel or distributed run. However, they do not fully benefit from potential of the modern, multicore computers in...

    Provided By IARIA

  • White Papers // Feb 2012

    Clustering Large-Scale, Distributed Software Component Repositories

    In software component repositories, search engines have to deal with challenges related to storage space requirements for indexing semi-structured data models, which are adopted for representing syntactic and semantic features of software assets. In such a context, clustering techniques seem to be attractive for reducing the number of assets in...

    Provided By IARIA

  • White Papers // Feb 2012

    Basic Components for Building Column Store-Based Applications

    A constantly increasing CPU-memory gap as well as steady growth of main memory capacities has increased interest in column store systems due to potential performance gains within the realm of database solutions. In the past several monolithic systems have reached maturity in the commercial and academic space. However a framework...

    Provided By IARIA

  • White Papers // Feb 2012

    Leveraging Compression in In-Memory Databases

    Recently, there has been a trend towards column-oriented databases, which in most cases apply lightweight compression techniques to improve read access. At the same time, in-memory databases become reality due to availability of huge amounts of main memory. In-memory databases achieve their optimal performance by building up cache-aware algorithms based...

    Provided By IARIA

  • White Papers // Feb 2012

    A System Overview for NetCDF-FastBit Integration

    As highly advanced sensors began to penetrate into the awareness of the disparate scientific fields, many researchers found themselves grappling with the need to store and usably interact with vast amounts of data. This paper discusses the creation of a FastBit bitmap index from the contents of a netCDF file....

    Provided By IARIA

  • White Papers // Feb 2012

    Relevance of Quality Criteria According to the Type of Information Systems

    The analysis of data quality requires a number of indicators as a reference for the assessment of data quality. However, this is not an easy task for naive users with not enough experience. Data consumers of a Decision Support System (DSS) might prefer some data against other because of reputation...

    Provided By IARIA

  • White Papers // Feb 2012

    Algebraic Constructs for Querying Provenance

    Provenance that records the derivation history of data is useful for a wide variety of applications, including those where an audit trail needs to be provided, where the trust-level attributed to the sources contribute to determining the trust-level in results etc. There have been different efforts for representing provenance information,...

    Provided By IARIA

  • White Papers // Jan 2012

    User Interface for Trust Decision Making in Inter-Enterprise Collaborations

    Trust decisions on inter-enterprise collaborations involve a trustor's subjective evaluation of its willingness to participate in the specific collaboration, given the risks and incentives involved. In earlier work, the authors have built support on automating routine trust decisions based on a combination of risk, reputation and incentive information. Non-routine cases...

    Provided By IARIA

  • White Papers // Jan 2012

    Human Operator Perspective to Autonomic Network Management

    Autonomic Communications is a promising approach for the management of future networks, based on providing self-management and other self-x capabilities to the network elements. Network Governance approach aims to develop new methods for operators to efficiently manage this intelligent infrastructure, ensuring human-to-network communication. This paper presents an interview-based analysis of...

    Provided By IARIA

  • White Papers // Jan 2012

    Contents Enforme: Automatic Deformation of Content for Multi-Features Without Information Loss

    The authors introduce a deformation technique that enlarges the feature areas in an image while retaining the information in the non-feature areas. Their main purpose is to provide an effective thumbnail that is useful for practical use in small display devices (e.g., cellular phones, digital cameras, and game devices). Even...

    Provided By IARIA

  • White Papers // Jan 2012

    Authenticated Tangible Interaction Using RFID and Depth-Sensing Cameras

    Interactive large screen displays like tabletops or walls can enhance the interaction between humans and computers. A major topic is the collaboration between multiple simultaneous interacting people. However, most systems suffer from the problem that a distinction of different users is not possible. Hence, in this paper the authors present...

    Provided By IARIA

  • White Papers // Jan 2012

    Generic Brain-Computer Interface for Social and Human-Computer Interaction

    After suffering a more severe disease like spinal cord injury or stroke patients are often not able to interact or even communicate with their environment anymore, especially at the beginning of rehabilitation. Brain-Computer Interfaces (BCIs) can substitute this temporarily lost communication channels and might support rehabilitation by providing an alternative...

    Provided By IARIA

  • White Papers // Jan 2012

    Face Detection CUDA Accelerating

    Face detection is very useful and important for many different disciplines. Even for the people future work, where the face detection will be used, the authors wanted to determine, whether it is advantageous to use the technology CUDA for detection faces. First, they implemented the Viola and Jones algorithm in...

    Provided By IARIA

  • White Papers // Jan 2012

    User Attention in Mobile Devices

    The multichannel information (over) flow emerging in modern mobile multimedia devices creates a situation where the user's attention is a valuable asset for which different channels have to compete. This paper explores issues that help in effective use and maintenance of the user's attention level in such environment. The authors...

    Provided By IARIA

  • White Papers // Jan 2012

    Semiautomatic Evaluation of Websites Usability

    This paper presents a semiautomatic evaluation method of usability in websites. Expert review is done in this case using a template based on the ISO 9241-151 guidelines that provides numerical and graphical results. Such results permit to observe the aspects of usability that are missed on the evaluated website. This...

    Provided By IARIA

  • White Papers // Jan 2012

    Motion-Sound Interaction Using Sonification Based on Motiongrams

    The paper presents a method for sonification of human body motion based on motiongrams. Motiongrams show the spatiotemporal development of body motion by plotting average matrices of motion images over time. The resultant visual representation resembles spectrograms, and is treated as such by the new sonifyer module for Jamoma for...

    Provided By IARIA

  • White Papers // Jan 2012

    Design Guidelines for Hybrid 2D/3D User Interfaces on Tablet Devices - A User Experience Evaluation

    There is a growing proliferation of 3D based applications in tablet devices, but there is a lack of studies evaluating user experiences of these user interfaces. In particular, most of these applications use a mix of overlaid 2D controls and embedded 3D controls for user interactions and there is little...

    Provided By IARIA

  • White Papers // Jan 2012

    GPU Based Burning Process Simulation

    The authors present a method of simulating the process of burning phenomena on generic polyhedral objects. By mapping the object's surface to a 2D space, the fire front expansion can be calculated efficiently on GPU (Graphics Processing Unit). The state of decomposition is updated according to the fire front and...

    Provided By IARIA

  • White Papers // Jan 2012

    Context-Dependent Action Interpretation in Interactive Storytelling Games

    In this paper, a framework of context-dependent behavior interpretation in interactive storytelling system is proposed. A user can act as one of the role characters in a story to interact with other virtual characters in the system. The authors implemented two levels of action interpretation: activity and behavior. A Microsoft...

    Provided By IARIA

  • White Papers // Mar 2012

    MIMO-OFDM Based Broadband Power Line Communication Using Antenna and Fading Diversity

    The authors present multiple-input multiple-output orthogonal frequency division multiplexing (MIMO-OFDM) based Broadband Power Line Communication (BPLC) using antenna and fading diversity. They evaluate the proposed MIMO-OFDM system over multi-conductor power line channels, with or without cross-talk between the antenna paths. The proposed scheme employs Maximum Ratio Combining (MRC) that effectively...

    Provided By IARIA

  • White Papers // Mar 2012

    A Privacy Preserving and Secure Authentication Protocol for the Advanced Metering Infrastructure With Non-Repudiation Service

    In the smart grid, smart meters play an important role in keeping a real-time balance between energy production and energy consumption. The advanced metering infrastructure is responsible of collecting, storing, analyzing and providing metering data from smart meters to the authorized parties, and also carrying commands, requests, messages and software...

    Provided By IARIA

  • White Papers // Mar 2012

    Optimization of Energy and Emissions in High-Performance Grid Computing Data Centres

    At an early stage of information and communications technology and high-performance computing, performance and reliability were two important factors in research and development. It was highly essential that the hardware was able to function adequately, performing strategic operations. Energy consumption was not considered as a serious topic, since the technical...

    Provided By IARIA

  • White Papers // Nov 2011

    Increasing Usage Intention of Mobile Information Services Via Mobile Tagging

    Mobile information services are increasingly growing in popularity: end-users are getting used to "Being always on", and they are changing their everyday communication behavior. Organizations focus on new ways of creating value-adding services for their customers, and researchers explore aspects of success and implementation of mobile services. In this connection,...

    Provided By IARIA

  • White Papers // Nov 2011

    Babel Multi-Hop Routing for TinyOS Low-Power Devices

    Efficient routing in Wireless Mesh networks (WMN) with limited bandwidth is a challenging task, especially in networks where nodes have restricted resources. In such environments routing mechanisms should have a small footprint, low CPU usage and minimal routing overhead. If nodes are mobile, topology changes occur permanently, so the routing...

    Provided By IARIA

  • White Papers // Nov 2011

    OLFServ: An Opportunistic and Location-Aware Forwarding Protocol for Service Delivery in Disconnected MANETs

    Handheld devices equipped with Wi-Fi interfaces are widespread nowadays. These devices can form Disconnected Mobile Ad hoc NETworks (DMANETs) spontaneously. These networks may allow service providers, such as local authorities, to deliver new kinds of services in a wide area (e.g., a city) without resorting to the infrastructure-based networks of...

    Provided By IARIA

  • White Papers // Nov 2011

    Significance of Semantic Web in Facilitating HCI in Mobile and Ubiquitous Learning

    Mobile devices are being widely used in education for many purposes such as an instruction tool for learning. However, mobile devices suffer from the limitation of capabilities and resources. Potential solutions to this issue must consider the mobility and personal characteristics of potential education seekers. This paper theoretically describes how...

    Provided By IARIA

  • White Papers // Nov 2011

    Fault Tolerant Execution of Transactional Composite Web Services: An Approach

    The authors propose an approach for efficient, fault tolerant, and correct distributed execution of Transactional Composite Web Services (TCWSS), based on Colored Petri-Net (CPN) formalism. They extend a previous COMPOSER in order it generates, besides a TCWS represented by a CPN, another CPN representing the compensation order for backward recovery....

    Provided By IARIA

  • White Papers // Nov 2011

    Dynamic Negotiation Layer for Secure Semantic Service Oriented Architectures

    The approach of users connected anytime, anywhere, has led to merging isolated islands of enriched services environments into the WEB, leaving the user free to choose among an huge number of services. In this context the introduction of ontologies and the creation of semantic Web services mainly focus on using...

    Provided By IARIA

  • White Papers // Nov 2011

    Performance Evaluation of Wireless IP Telephony (W-IPT) Over Wi-Fi Networks

    As one of the fastest growing voice service technologies, IP Telephony is currently the greatest benefactor of IP Convergence. Apart from the cost and management benefits of a converged network, the exciting array of productivity enabling applications such as unified messaging, collaboration, and presence services within an IP Telephony infrastructure...

    Provided By IARIA

  • White Papers // Nov 2011

    Capturing Mobile Devices Interactions Minimizing the External Influence

    Mobile computing has become an integral part of everyday life for the new 'Information and Knowledge Society'. The new generation of mobile devices and their full connection capabilities enable users to access a wide choice of services and knowledge from everywhere. Owing to this tendency, access to these services has...

    Provided By IARIA

  • White Papers // Nov 2011

    UbiPOL: A Platform for Context-Aware Mobile Device Applications in Policy Making

    UbiPOL is a context-aware platform for policy making. At its core, the UbiPOL platform has an essential framework of web services and APIs. It is intended to aid and support the development of location-based and context-aware applications in the field of policy making. Software developers can make use of UbiPOL...

    Provided By IARIA

  • White Papers // Nov 2011

    A Fast Bandwidth Request and Grant Method for IEEE 802.16 OFDMA/TDD Systems

    In the design of a contention-based bandwidth request scheme, decrease in data transmission delay is the most important factor. This paper proposes a new CDMA-based bandwidth request method in which the bandwidth request code contains the channel quality information and amount of bandwidth required by a mobile station. A mobile...

    Provided By IARIA

  • White Papers // Nov 2011

    External Interference-Aware Distributed Channel Assignment in Wireless Mesh Networks

    Interference is one of the major causes for performance degradation in wireless networks. Channel assignment algorithms have been proven successful to decrease the network-wide interference by using non-overlapping channels for otherwise interfering links. However, external co-located networks and devices are usually not considered in the channel assignment procedure, since they...

    Provided By IARIA

  • White Papers // Nov 2011

    Communication System With SISO Channel Decoding Using Bit Stuffing

    This paper introduces a communication system with typically wireless transmission, with SISO convolutional decoding using predefined reliability values at input of the SISO decoder. "Dummy" bits are stuffed into the information which is to be transmitted over a noisy channel and SISO decoded. Stuffed bits have to be known at...

    Provided By IARIA

  • White Papers // Nov 2011

    An Approach to Enhance the Timeliness of Wireless Communications

    Wireless technologies are the present and the future of network communications. However, the support of real-time data transmission in wireless communications - providing support for execution of well-timed networked operations - is still an open issue, not fully addressed by current wireless network standards and technologies. Thus, this paper proposes...

    Provided By IARIA

  • White Papers // Nov 2011

    Opportunistic Spectrum Sharing Scheme for Secondary WiFi-Like Devices in TV White Spaces

    Secondary spectrum access is a promising approach to improve spectrum utilization by enabling new wireless systems to opportunistically use and efficiently share the licensed bands. This paper targets a WiFi-like reuse of available spectrum in the TV bands and proposes a novel cooperative centralized spectrum sharing scheme that enables protection...

    Provided By IARIA

  • White Papers // Nov 2011

    Interference Control Technology for Heterogeneous Networks

    To eliminate dead spots like home or office and let multiple users efficiently use limited frequency resources by providing a better mobile communication environment that enables high-capacity data transmission service, the demand for a small base station is increasing. Accordingly, the research for automatically minimizing the interference and increasing the...

    Provided By IARIA

  • White Papers // Nov 2011

    Mobile Learning (mLearning) Based on Cloud Computing: mLearning as a Service (mLaaS)

    Despite its hype, cloud computing, with its dynamic scalability and virtualized resources usage, is being widely deployed for several applications in many organizations. It is envisioned that, in the near future, cloud computing will have a significant impact in the educational and learning environment, enabling its own users (i.e., learners,...

    Provided By IARIA

  • White Papers // Nov 2011

    Assistive Mobile Software for Public Transportation

    The need of mobility on public transport for persons with visual impairment is mandatory. While traveling on a public transport, the simple ability to know the current location is almost impossible for such persons. To overcome this hurdle, the authors developed an assistive application that can alert its user to...

    Provided By IARIA

  • White Papers // Nov 2011

    Mobility in a Personalized and Flexible Video-Based Transmedia Environment

    This paper addresses the effective design of Transmedia environments to generate personalized additional video information from iTV, PC and mobile devices with a special focus on mobile devices. It presents the opportunities and challenges of the inclusion of mobile devices on this ubiquitous environment, turning it into a true "Ecosystem...

    Provided By IARIA

  • White Papers // Nov 2011

    Pervasive Computing in Embedded Systems: Designing Cooperative Applications for Real Environments

    The dramatic growth of the amount of information that is made available through computer systems and the increasing need to access relevant information anywhere at any time are more and more overwhelming the cognitive capacity of human users. Instead of providing the right information at the right time, current computer...

    Provided By IARIA

  • White Papers // Nov 2011

    Challenges in the Planning, Deployment, Maintenance and Operation of Large-Scale Networked Heterogeneous Cooperating Objects

    Efficient deployment and management have been identified to be key challenges for the acceptance of solutions based on Cooperating Objects (COs). The operations for CO deployment and management can be classified into five phases in each of which several challenges and issues are emphasized. This paper presents the PLANET project...

    Provided By IARIA

  • White Papers // Jul 2011

    Improvement of Channel Decoding Using Block Cypher

    This paper introduces two methods for the improvement of performance of channel coding using cryptography, based on concatenation of codes. Cryptography as an outer code is combined with channel coding as an inner code. The first method improves decoding of cryptographic functions. The second one uses the first method for...

    Provided By IARIA

  • White Papers // Jul 2011

    Distortion Free Steganographic System Based on Genetic Algorithm

    Steganography is the art of secret communication. Its purpose is to hide the very presence of communication as opposed to cryptography whose goal is to make communication unintelligible to those who do not possess the right keys. This paper shows that most of the steganographic systems proposed during the past...

    Provided By IARIA

  • White Papers // Jul 2011

    Optimal Activation of Intrusion Detection Agents for Wireless Sensor Networks

    Recent technological advancements and low price of deployment and maintenance of Wireless Sensor Networks (WSNs) allow their use in numerous applications in industry, research, and commerce, in order to gather environmental data in an unattended manner. Since, WSNs usually function in open environments, they may become a target of attacks...

    Provided By IARIA

  • White Papers // Jul 2011

    GeCSen - A Generic and Cross-Platform Sensor Framework for LocON

    In this paper, the authors present a generic and crossplatform sensor framework for the LocON location and sensor middleware. This framework is developed using C++/Qt. Sensor information is rapidly gaining importance in automating processes and ubiquitous computing, and so it is for projects like FP7 LocON where the main goal...

    Provided By IARIA

  • White Papers // Jul 2011

    Securing Off-Card Contract-Policy Matching in Security-By-Contract for Multi-Application Smart Cards

    The Security-by-Contract (SC) framework has recently been proposed to support applications' evolution in multi-application smart cards. The key idea is based on the notion of contract, a specification of the security behavior of an application that must be compliant with the security policy of a smart card. In this paper,...

    Provided By IARIA

  • White Papers // Jul 2011

    MagiSign: User Identification/Authentication Based on 3D Around Device Magnetic Signatures

    In this paper, the authors present "MagiSign", a new user identification/authentication technique based on 3D magnetic signatures created in the space around a (mobile) device. The main idea is to influence magnetic (compass) sensor embedded in some mobile devices (e.g., iPhone 3GS, G1/2 Android) using a properly shaped magnet. The...

    Provided By IARIA

  • White Papers // Jul 2011

    Classification of Mobile P2P Malware Based on Propagation Behaviour

    With a multifold increase in the number of mobile users over past few years, mobile malware has emerged as a serious threat for resource constrained handheld devices. From experience of the Internet malware attacks like CodeRed and Slammer, it may not be difficult to predict the extent of devastation mobile...

    Provided By IARIA

  • White Papers // Jul 2011

    Link Stability in MANETs Routing Protocols

    Mobile Ad hoc NETworks (MANETs) is a promising communication paradigm for the emerging collaborative environments, which do not need an underlying stable, centralized routing and management infrastructure. In this paper, the authors propose a particular approach for the design of a mobile routing protocol focused on the stability (measured as...

    Provided By IARIA

  • White Papers // Jul 2011

    A Device-Aware Spatial 3D Visualization Platform for Mobile Urban Exploration

    Mobile devices displaying 2D map representations are already commonly used for the exploration of urban surroundings on the move. Even though mobile detailed 3D visualizations promise to be an attractive way to cope with the increasing amount of georeferenced information, their widespread use is hampered by the fragmentation of today's...

    Provided By IARIA

  • White Papers // Jul 2011

    QoS Aware Mixed Traffic Packet Scheduling in OFDMA-Based LTE-Advanced Networks

    In this paper, a packet scheduling framework is proposed for LTE-Advanced downlink transmission. The proposed framework adds the new functionality of an adaptive TD scheduler with built-in congestion control to the existing conventional Quality of Service (QoS) aware packet scheduling algorithms. It optimizes multiuser diversity in both the time and...

    Provided By IARIA

  • White Papers // Jul 2011

    M2Learn Open Framework: Developing Mobile Collaborative and Social Applications

    This paper presents M2Learn framework as an open platform, which facilitates the development of mobile learning and ubiquitous applications. The main features of this framework are: transparent management of multiple location-based technologies including GPS and cell towers; identification of objects through RFID; support for motion sensors (e.g., G-Sensor); interoperability with...

    Provided By IARIA

  • White Papers // Jul 2011

    Next Generation Network Architecture for Integration of Wireless Access Networks

    Motivation for the development of Next Generation Networks (NGN) concept is not only the success of mobile technology and growing popularity of IP-based multimedia services but also required cost savings, limited address space and fueling competition and collaboration. This paper proposes a solution for seamless interworking between network domains for...

    Provided By IARIA

  • White Papers // Jul 2011

    A Mobile Internet Service Consistency Framework

    As more and more Internet services migrate to mobile terminal, it is very necessary to carry out the service consistency between traditional Internet and mobile internet when service convergence. Unfortunately, current frameworks can not satisfy the requirements of consistency of service, for the difficulties in realize the coherence and continuity...

    Provided By IARIA

  • White Papers // Jul 2011

    Design and Development of an Interoperation Framework in a Smart Space Using OSGi

    This paper presents an approach towards interoperating, i.e., working together with heterogeneous objects in a ubiquitous computing environment. A framework for interoperation in a ubiquitous environment as a ubiquitous service is proposed here. Smart spaces and environments like smart homes, smart healthcare system, and smart vehicular systems are the important...

    Provided By IARIA

  • White Papers // Jul 2011

    Bluetooth and File system to Manage a Ubiquitous Mesh Network

    Hixosfs is a filesystem that lets one manage a network of Bluetooth devices. The authors have analyzed this filesystem in contexts of great movement and file sharing systems which requires high performance time. They study the system both for the management and to extract statistics. Ubiquitous multimedia computing will change...

    Provided By IARIA

  • White Papers // Jul 2011

    Wireless Service Developing for Ubiquitous Computing Environments Using J2ME Technologies

    From some years ago, technologies are ubiquitous, omnipresent and integrated seamlessly in the common activities. There is a need for developing services and applications that use all the capabilities of mobile devices available, for connectivity and data processing. Java 2 Micro Edition (J2ME) technology develops these services for use in...

    Provided By IARIA

  • White Papers // Jul 2011

    Generating Modest High-Level Ontology Libraries for Smart-M3

    Web Ontology Language (OWL) allows structuring smart space content in high-level terms of classes, relations between them, and their properties. In Smart-M3, a Semantic Information Broker (SIB) maintains the smart space in low-level terms of triples, based on Resource Description Framework (RDF). This paper describes SmartSlog, the authors' solution for...

    Provided By IARIA