IARIA

Displaying 481-520 of 1223 results

  • White Papers // Jan 2012

    User Attention in Mobile Devices

    The multichannel information (over) flow emerging in modern mobile multimedia devices creates a situation where the user's attention is a valuable asset for which different channels have to compete. This paper explores issues that help in effective use and maintenance of the user's attention level in such environment. The authors...

    Provided By IARIA

  • White Papers // Jan 2012

    Semiautomatic Evaluation of Websites Usability

    This paper presents a semiautomatic evaluation method of usability in websites. Expert review is done in this case using a template based on the ISO 9241-151 guidelines that provides numerical and graphical results. Such results permit to observe the aspects of usability that are missed on the evaluated website. This...

    Provided By IARIA

  • White Papers // Jan 2012

    Motion-Sound Interaction Using Sonification Based on Motiongrams

    The paper presents a method for sonification of human body motion based on motiongrams. Motiongrams show the spatiotemporal development of body motion by plotting average matrices of motion images over time. The resultant visual representation resembles spectrograms, and is treated as such by the new sonifyer module for Jamoma for...

    Provided By IARIA

  • White Papers // Jan 2012

    Design Guidelines for Hybrid 2D/3D User Interfaces on Tablet Devices - A User Experience Evaluation

    There is a growing proliferation of 3D based applications in tablet devices, but there is a lack of studies evaluating user experiences of these user interfaces. In particular, most of these applications use a mix of overlaid 2D controls and embedded 3D controls for user interactions and there is little...

    Provided By IARIA

  • White Papers // Jan 2012

    Analysis of Volumetric Tactile Symbols Produced With 3D Printing

    The morphological elements of design used for designing tactile maps and symbols for visually impaired users are points, linear, and areal elements. One of the main characteristics of these elements is their two-dimensional and graphic nature. However, since three-dimensional design came to be a fourth group of elements, volumetric elements,...

    Provided By IARIA

  • White Papers // Jan 2012

    Accessibility Study of Rich Web Interface Components

    The use of the latest technologies to develop rich interfaces for websites could decrease one accessibility, making problematic the access for people with disabilities. Faced with this problem, this paper executed a study to evaluate the accessibility of rich components on the Web. The paper used WAI-ARIA recommendations as reference...

    Provided By IARIA

  • White Papers // Jan 2012

    Virtualization Technology for Multi-Display Systems

    The method for creation of multi-user multi-monitor systems designed for educational purposes is suggested. The method utilizes virtual machine technology which makes possible to create completely isolated user working environment, remote access to equipment and remote workstation administration. Standard interfaces like DVI, VGA or USB are used as data transmission...

    Provided By IARIA

  • White Papers // Jan 2012

    The Utility of Controlled Vocabularies Within Bookmark Management Tasks

    This research investigates the utility of adopting a controlled vocabulary approach to bookmark management. An initial user survey conducted for this research has shown that just over half the population use bookmarks to save important websites and that 75% of these people use up to three sub-levels only. The bookmark...

    Provided By IARIA

  • White Papers // Jan 2012

    Designing Multi-Modal Map-Based Interfaces for Disaster Management

    The access to current and reliable maps and data is a critical factor in the management of disaster situations. Standard user interfaces are not well suited to provide this information to crisis managers. Especially in dynamic situations conventional cartographic displays and mouse based interaction techniques fail to address the need...

    Provided By IARIA

  • White Papers // Jan 2012

    Multilingual Ontology Alignment Based on Visual Representations of Ontology Concepts

    Image search represents one of the most frequent user actions on the Internet. Existing image search engines do not understand the images they return, nor do they support multilingualism. These issues can be addressed with the introduction of a semantic layer. The semantics is encoded in ontologies, which contain structured...

    Provided By IARIA

  • White Papers // Jan 2012

    TsoKaDo: An Image Search Engine Performing Recursive Query Recommendation Based on Visual Information

    This paper tackles the problem of the user's incapability to describe exactly the image that he seeks by introducing an innovative image search engine called TsoKaDo. Until now the traditional web image search was based only on the comparison between metadata of the webpage and the user's textual description. In...

    Provided By IARIA

  • White Papers // Jan 2012

    Towards 3D Data Environments Using Multi-Touch Screens

    The increase in availability of multi-touch devices has motivated one to consider interaction approaches outside the limitations associated with the use of a mouse. The problem that the authors try to solve is how to interact in a 3D world using a 2D surface multi-touch display. Before showing their proposed...

    Provided By IARIA

  • White Papers // Jan 2012

    User Interface for Trust Decision Making in Inter-Enterprise Collaborations

    Trust decisions on inter-enterprise collaborations involve a trustor's subjective evaluation of its willingness to participate in the specific collaboration, given the risks and incentives involved. In earlier work, the authors have built support on automating routine trust decisions based on a combination of risk, reputation and incentive information. Non-routine cases...

    Provided By IARIA

  • White Papers // Jan 2012

    Human Operator Perspective to Autonomic Network Management

    Autonomic Communications is a promising approach for the management of future networks, based on providing self-management and other self-x capabilities to the network elements. Network Governance approach aims to develop new methods for operators to efficiently manage this intelligent infrastructure, ensuring human-to-network communication. This paper presents an interview-based analysis of...

    Provided By IARIA

  • White Papers // Jan 2012

    Contents Enforme: Automatic Deformation of Content for Multi-Features Without Information Loss

    The authors introduce a deformation technique that enlarges the feature areas in an image while retaining the information in the non-feature areas. Their main purpose is to provide an effective thumbnail that is useful for practical use in small display devices (e.g., cellular phones, digital cameras, and game devices). Even...

    Provided By IARIA

  • White Papers // Jan 2012

    Authenticated Tangible Interaction Using RFID and Depth-Sensing Cameras

    Interactive large screen displays like tabletops or walls can enhance the interaction between humans and computers. A major topic is the collaboration between multiple simultaneous interacting people. However, most systems suffer from the problem that a distinction of different users is not possible. Hence, in this paper the authors present...

    Provided By IARIA

  • White Papers // Jan 2012

    Generic Brain-Computer Interface for Social and Human-Computer Interaction

    After suffering a more severe disease like spinal cord injury or stroke patients are often not able to interact or even communicate with their environment anymore, especially at the beginning of rehabilitation. Brain-Computer Interfaces (BCIs) can substitute this temporarily lost communication channels and might support rehabilitation by providing an alternative...

    Provided By IARIA

  • White Papers // Jan 2012

    GPU Based Burning Process Simulation

    The authors present a method of simulating the process of burning phenomena on generic polyhedral objects. By mapping the object's surface to a 2D space, the fire front expansion can be calculated efficiently on GPU (Graphics Processing Unit). The state of decomposition is updated according to the fire front and...

    Provided By IARIA

  • White Papers // Jan 2012

    Context-Dependent Action Interpretation in Interactive Storytelling Games

    In this paper, a framework of context-dependent behavior interpretation in interactive storytelling system is proposed. A user can act as one of the role characters in a story to interact with other virtual characters in the system. The authors implemented two levels of action interpretation: activity and behavior. A Microsoft...

    Provided By IARIA

  • White Papers // Jan 2012

    Developing User-Centered Video Game Concepts for Language Learning

    This paper will report on an ongoing project which aims to develop video games for language learning through a user-centered and evidence-based approach. Therefore, co-design sessions were held with adolescents between 14 and 16 years old, in order to gain insight into their preferences for educational games for language learning....

    Provided By IARIA

  • White Papers // Jan 2012

    Online Casinos: The Addiction Under Control Role of Web 2.0 and Re-Documentarisation

    In this paper, the authors will consider how to design and implement tools or Information System based and enriched by a semantic search engines to the forums in the world of online gambling (articles, tutorials, etc.) supporting both textual and semantic expressions. On the basis of this new approach, based...

    Provided By IARIA

  • White Papers // Jan 2012

    Evaluation of User Interface Satisfaction of Mobile Maps for Touch Screen Interfaces

    User interfaces of mobile maps on mobile and tablet devices with a touch screen interfaces is evaluated in this paper. A four-way factorial experiment compares the user interface satisfaction for two mobile touch devices (iPad/iPhone), two map types (Electronic Map/Mixed Map), two keyword searches (Landmark/District), and Chinese input methods (Hand-written/Phonetic...

    Provided By IARIA

  • White Papers // Jan 2012

    Tablet PCs - An Assistive Technology for Students With Reading Difficulties?

    This paper presents the results of a descriptive case study concerning adoption of iPad or other tablets as assistive technology. Two pilot studies concerning the adoption and use of the iPad for active reading in a teaching/learning situation have recently been conducted at elementary school level and at university level....

    Provided By IARIA

  • White Papers // Jan 2012

    Spatial Ability and Map-Based Software Applications

    Location-based applications are growing in importance as agencies are placing more and more computing into their field applications. The development of software for these applications needs to consider the wide range of user skills. The present work looks at the impact of spatial ability on a typical Census Bureau application...

    Provided By IARIA

  • White Papers // Jan 2012

    A Presentation Support System by Expanding Embodiment With a Mobile Touchscreen Device

    Most of the people make presentations by using tools such as pointers. However, the use of information devices such as laser pointers and mice can restrict the presenter's embodied motions and actions. In this paper, the authors propose a presentation support system that can expand embodiment by using a portable...

    Provided By IARIA

  • White Papers // Jan 2012

    Designing Mobile Apps for Visually Impaired and Blind Users

    Although mobile devices include accessibility features available for visually impaired users, the user interface of the majority of the mobile apps is designed for sighted people. It is clear that "Design for Usability" differs depending if the final user is a sighted user or a visually impaired user. This paper...

    Provided By IARIA

  • White Papers // Jan 2012

    Building Bridges Between Elderly and TV Application Developers

    The development of new digital TV systems and the design practices adopted in the development of new TV based applications often isolate elderly and disabled users. By considering them as users with special needs and not taking their problems into account during the design phase of an application, developers are...

    Provided By IARIA

  • White Papers // Jan 2012

    Semantic Search in a Process-Oriented Knowledge Base

    MinaBASE, a process-oriented knowledge management system, currently features a simple full-text search as well as a more sophisticated expert search. While the former is much easier to use, the latter has much higher precision and recall characteristics due to a more content-aware filter-mechanism. In this paper, the authors present a...

    Provided By IARIA

  • White Papers // Jan 2012

    Knowledge Discovery Using a Service Oriented Web Application

    The paper proposes a novel platform for knowledge discovery, which is based on modern web technologies, and is implemented as a web application. It is based on the principles of service-oriented knowledge discovery, and features interactive scientific workflows. In contrast to the few existing comparable platforms, their environment is suitable...

    Provided By IARIA

  • White Papers // Jan 2012

    Critical Dimension in Data Mining

    Data mining is an increasingly important means of knowledge acquisition for many applications in diverse fields such as biology, medicine, management, engineering, etc. When tackling a large-scale problem that involves a multitude of potentially relevant factors but lacking a precise formulation or mathematical characterization to allow formal approaches to solution,...

    Provided By IARIA

  • White Papers // Jan 2012

    Digital Investigations for Enterprise Information Architectures

    In this paper, the authors highlight the role of digital forensics in the enterprise information architecture. It presents a framework for embedding digital forensics analysis techniques at various stages of corporate Information and Communication Technologies (ICT) lifecycle. A set of best practices for the corporate ICT security policy is also...

    Provided By IARIA

  • White Papers // Jan 2012

    Cloud Computing and Data Jurisdiction: A New Challenge for Digital Forensics

    Although it has become clear that digital forensics - the practical analysis of digital data following the acquisition of a bit-stream image of a suspect's hard disk - suffered a setback with the wide adoption of mobile devices and the increasing use of flash memory and encryption systems, it is...

    Provided By IARIA

  • White Papers // Jan 2012

    Users' Trust and Secure Feeling Towards Cloud Services

    In this paper, the authors describe the study in which end users' trust and feeling of security in regard to cloud services are examined. Trust and security are one of the key issues within cloud where people use a shared pool of computing resources for the storage of their data...

    Provided By IARIA

  • White Papers // Jan 2012

    Identifying Potentially Useful Email Header Features for Email Spam Filtering

    Email spam continues to be a major problem in the Internet. With the spread of malware combined with the power of botnets, spammers are now able to launch large scale spam campaigns causing major traffic increase and leading to enormous economical loss. In this paper, the authors identify potentially useful...

    Provided By IARIA

  • White Papers // Jan 2012

    Evaluation of Distributed SOAP and Restful Mobile Web Services

    Even mobile Web Services are still provided using servers that usually reside in the core networks. Main reason for not providing large and complex Web Services from resource limited mobile devices is not only the volatility of wireless connections and mobility of mobile hosts, but also, the often limited processing...

    Provided By IARIA

  • White Papers // Nov 2011

    Building Virtual Private Clouds With Network-Aware Cloud

    Cloud computing presupposes on-demand network access to pool of computing resources. However, network access through the WAN is usually not compliant with any kind of service guarantees, including reliability, security and performance. In this paper, two types of network services able to fulfill cloud requirements are presented. In addition, an...

    Provided By IARIA

  • White Papers // Nov 2011

    Locating Zigbee Devices in a Cluster-Tree Wireless Sensor Network: an ESD-Based Integrated Solution

    Recent advances in the technology of wireless electronic devices have made possible to build ad-hoc Wireless Sensor Networks (WSNs) using inexpensive nodes consisting of low power processors, a modest amount of memory and simple wireless transceivers. Over the last years, many novel applications have been envisaged for distributed WSNs in...

    Provided By IARIA

  • White Papers // Nov 2011

    An Adaptative Broadcast Scheme for VANET Applications in a High Density Context

    The efficient broadcast of messages in Vehicular Ad-hoc NETwork (VANET) still faces many challenges in current research. In this paper, the authors are interested in multihop broadcast communication for neighborhood discovery applications which increase driver visibility. These applications need to send information with a high rate causing congestion in the...

    Provided By IARIA

  • White Papers // Nov 2011

    Learning Enhanced Environment Perception for Cooperative Power Control

    The vast proliferation of wireless networking devices, coupled with the trend for short-range communications in dense residential environments, imposes new challenges for the efficient addressing of problems resulting from co-existence of heterogeneous devices (e.g., interference) under capacity and energy constraints. This paper proposes and evaluates a cooperative distributed algorithm for...

    Provided By IARIA

  • White Papers // Nov 2011

    Study on Secure Mobile Communication Based on the Hardware Security Module

    This paper presents a survey of information protection methods for secure mobile communication. Most existing software-based information protection systems have a greater risk for the loss or theft and have difficulty in maintaining. In order to solve these problems, the authors considered methods of information protection method based on hardware...

    Provided By IARIA

  • White Papers // Jul 2011

    Human Behaviour Detection Using GSM Location Patterns and Bluetooth Proximity Data

    Human behaviours are multifarious in nature and it is a challenging task to predict and learn from daily life activities. The profusion of Bluetooth enabled devices used in daily life has created new ways to analyze and model the behaviour of individuals. Bluetooth integrated into mobile handsets can be used...

    Provided By IARIA

  • White Papers // Jul 2011

    Modeling and Analyzing Ubiquitous Systems Using MDE Approach

    The growth of industrial activities during the last decades and the diversity of industrial products require standards and common methodologies for building and integrating different parts. It is also required that working groups use the same terminologies and concepts needed for each domain. The Model Driven Engineering approach aims to...

    Provided By IARIA

  • White Papers // Jul 2011

    Information Dissemination in WSNs Applied to Physical Phenomena Tracking

    Several works suggest the use of wireless sensor networks to manage crisis situations. An example of such scenarios is forest fire fighting. In these situations, it is necessary to use efficient mechanisms for disseminating the environmental information captured by sensors. This paper analyzes the behavior of some representative broadcasting techniques...

    Provided By IARIA

  • White Papers // Jul 2011

    Case Study of the OMiSCID Middleware: Wizard of Oz Experiment in Smart Environments

    This paper presents a case study of the usage of OMiSCID 2.0, the new version of a lightweight middleware for ubiquitous computing and ambient intelligence. The objective of this middleware is to bring Service Oriented Architectures to all developers. After comparing to available solutions, the authors show how it integrates...

    Provided By IARIA

  • White Papers // Jul 2011

    SmartBuilding: A People-to-People-to-Geographical-Places Mobile System Based on Augmented Reality

    People-to-People-to-Geographical-Places systems connect places to communities. Generally, these systems require users to perform complex tasks using mobile phones. Thus, the creation of powerful interaction techniques and the design of effective and easy interfaces are key requirements. The system, the authors propose in this paper, named SmartBuilding, is a mobile Augmented...

    Provided By IARIA

  • White Papers // Jul 2011

    Network Architectures for Ubiquitous Home Services

    The on-going growth of connectivity has brought new opportunities for Home Network; Home network will soon be a place of a large amount of services, from the gadget to the home control. In order to provide and render these services, operator should propose a framework for supporting the deployment of...

    Provided By IARIA

  • White Papers // Jul 2011

    The QoE-Oriented Heterogeneous Network Selection Based on Fuzzy AHP Methodology

    The next generation of wireless communication will be characterized by heterogeneity. One of the challenges arisen is access selection among various radio access technologies. Meanwhile, the Quality of Experience (QoE) of user is becoming one of the most concerned topics. Analytic Hierarchy Process (AHP) has been popularly used in network...

    Provided By IARIA

  • White Papers // Jul 2011

    EAP-Kerberos: Leveraging the Kerberos Credential Caching Mechanism for Faster Re-Authentications in Wireless Access Networks

    Although the wireless technology nowadays provides satisfying bandwidth and higher speeds, it still lacks improvements with regard to handoff performance. Existing solutions for reducing handoff delays are specific to a particular network technology or require expensive upgrades of the whole infrastructure. In this paper, the authors investigate performance benefits of...

    Provided By IARIA

  • White Papers // Jul 2011

    BeAware: A Framework for Residential Services on Energy Awareness

    Lately a wide variety of products and services are emerging to address energy efficiency in households by providing timely information. This area is still relatively young in terms of adoption of advanced ICT still exploring what functionality and features should be part of such services. Here, the authors propose a...

    Provided By IARIA

  • White Papers // Jul 2011

    Acceptance Models for the Analysis of RFID

    Although there is a high dispersion of RFID in many areas of the economy, it can be said that up until now this technology has been barely implemented and accepted within law firms. Considering the severe problems when tracking documents and although these systems facilitate specific improvement in various sub...

    Provided By IARIA

  • White Papers // Jul 2011

    Performance Comparison of Video Traffic Over WLAN IEEE 802.11e and IEEE 802.11n

    This paper reviews the fast deployment of Wireless Local Area Networks (WLANs) and the ability of WLAN to support real time services. Stringent Quality of Service (QoS) and high throughput requirements has come into force. The authors compare the QoS support in the IEEE 802.11e to 802.11n standard. The 802.11n...

    Provided By IARIA

  • White Papers // Jul 2011

    Optimum Cluster Size for Cluster-Based Communication in Wireless Sensor Network

    Clustering of sensor nodes to reduce energy expense during data communication covers a large body of literature. Without clustering energy of sensor nodes near the sink drain fast, which in turn kills more rapidly nodes at further hop distances. Cluster-based routing protocol alleviates this problem. Yet, in cluster-based approaches too,...

    Provided By IARIA

  • White Papers // Jul 2011

    Cooperative Communication to Improve Reliability and Efficient Neighborhood Wakeup in Wireless Sensor Networks

    To maximize lifetime of Wireless Sensor Networks, medium access control protocols usually trade off reliability for energy efficiency. Channel errors, collisions, idle listening, and overhearing further aggravate the problem. The authors' paper investigates opportunities to improve reliability in Wireless Sensor Networks under such constraints. They consider a multi-hop data gathering...

    Provided By IARIA

  • White Papers // Jul 2011

    Topological Cluster-Based Geographic Routing in Multihop Ad Hoc Networks

    Existing geographic routing algorithms face serious challenges due to location errors, non-planarity issues and overhead of location service. To solve these issues, the authors propose Topological Cluster Based Geographic Routing that combines topology-based routing and geographic routing. It is a localized routing scheme where the geographic routing is performed on...

    Provided By IARIA

  • White Papers // Jul 2011

    Optimizing Parameters of Prioritized Data Reduction in Sensor Networks

    Wireless Sensor Networks are popular and proven useful in various service areas. Energy optimization, processing optimization and storage optimization are the main challenges. While there is a debate for complete or partial data extraction from sensors, having special data process functions and operation primitives proves useful for sensor operating systems....

    Provided By IARIA

  • White Papers // Jul 2011

    Semantic P2P Overlay for Dynamic Context Lookup

    Context-aware applications generally need to retrieve various kinds of dynamic context data from a large number of context sources. A middleware managing context sources must provide an efficient context lookup mechanism to ease application development. In this paper, the authors categorize the context sources as operating spaces and propose semantic...

    Provided By IARIA

  • White Papers // Aug 2011

    Lightweight Detection of Spamming Botnets

    A botnet consists of the home and office computers infected with bot malware and controlled by a botmaster. Botnets are one of the largest problems against the Internet society since they are used to mount serious attacks such as Distributed Denial of Service (DDoS) and users' credentials stealing, and to...

    Provided By IARIA

  • White Papers // Aug 2011

    Detecting & Defeating Split Personality Malware

    Security analysts extensively use virtual machines to analyze sample programs and study them to determine if contain any malware. In the process, if the malware destabilizes the guest OS, the users simply discard it and load in a fresh image. This approach increases their productivity. Since, naive users do not...

    Provided By IARIA

  • White Papers // Aug 2011

    Proposal of N-Gram Based Algorithm for Malware Classification

    Obfuscation techniques degrade the n-gram features of binary form of the malware. In this paper, methodology to classify malware instances by using n-gram features of its disassembled code is presented. The presented statistical method uses the n-gram features of the malware to classify its instance with respect to their families....

    Provided By IARIA

  • White Papers // Aug 2011

    Extended Fault Based Attack Against Discrete Logarithm Based Public Key Cryptosystems

    Since, Bellcore's researchers proposed fault based attacks, these attacks have become serious threats to the implementation of cryptosystems. Boneh et al. first proposed a fault based attack against the exponentiation algorithm for RSA, and some variants of attack were proposed later. However, the previous variants of similar attack are applicable...

    Provided By IARIA

  • White Papers // Aug 2011

    Implementations of Block Cipher SEED on Smartphone Operating Systems

    As more and more people are using smartphones these days, a great deal of important information, such as personal information and the important documents of corporations among other things, are being saved on smartphones. Unlike a PC, people can access another person's smartphone without great difficulty, and there is a...

    Provided By IARIA

  • White Papers // Aug 2011

    An Approach for Enhancing the Security of Remotely Accessible, Sensitive Services With On-Site Monitoring

    Commonly, the deployment environment of software based services cannot be predicted in advance, which leads to need to have specific solutions to monitor their security and reliability during run-time. These services are also commonly accessed remotely, leading to further complexity in their monitoring and analysis. In this paper proposes a...

    Provided By IARIA

  • White Papers // Aug 2011

    Toward Engineering of Security of Information Systems: The Security Acts

    Business professionals and researchers have made considerable efforts and significant technical breakthroughs in information security in the last decades. Nevertheless, companies and organizations continue to incur losses associated with security issues. In order to remedy to this situation, the authors propose a new approach to information security engineering for companies...

    Provided By IARIA

  • White Papers // Aug 2011

    Establishing Authentication Trust in Open Environment Using Social Approach

    A trust metric is described for a user to ensure the authenticity of another user who is not known to system entities in an open environment. On the basis of the metric, an identity federation framework is proposed for propagating an authentication assertion for an unknown user across system entities....

    Provided By IARIA

  • White Papers // Aug 2011

    Migration Towards a More Secure Authentication in the Session Initiation Protocol

    This paper specifies a two-step migration towards a stronger authentication in the Session Initiation Protocol. First, the authors add support for a Password Authenticated Key Exchange algorithm that can function as a drop-in replacement for the widely adopted Digest Access Authentication mechanism. This new authentication mechanism adds support for mutual...

    Provided By IARIA

  • White Papers // Aug 2011

    PASER: Position Aware Secure and Efficient Route Discovery Protocol for Wireless Mesh Networks

    In this paper, the authors address an acceptable tradeoff between security and performance of the route discovery process in wireless mesh networks. They propose a Position Aware Secure and Efficient reactive hierarchical Route discovery protocol (PASER). The proposed protocol is tailored for rescue and emergency operations and aims to combat...

    Provided By IARIA

  • White Papers // Aug 2011

    Reliablity and Survivability of Wireless Sensor Network Using Security Adaptation Reference Monitor (SARM)

    Security has become a key issue for any huge deployment of Wireless Sensor Network (WSN). Moreover, data reliability combined with energy loss minimization is really a challenging task, particularly to maintain survivability of the WSN under attacks such as sinkhole. Therefore, new security mechanisms must be in accordance with energy...

    Provided By IARIA

  • White Papers // Jul 2011

    A Beacon Cluster-Tree Construction Approach for ZigBee/IEEE802.15.4 Networks

    Wireless Sensor Networks (WSN) based on the IEEE 802.15.4 standard are in a constant expansion. Applications like production control, building control are more and more based on WSN because of their energy efficiency, self organization capacity and protocol flexibility. The IEEE 802.15.4 standard defines 3 network topologies: the mesh topology,...

    Provided By IARIA

  • White Papers // Jul 2011

    DS-CDMA Receiver in Software Defined Radio Technology

    Programmable radio is one of the latest trends in the construction of multi-standard receivers. The technology, called Software Defined Radio (SDR), is also an ideal test platform that allows to try out different algorithms of signal receiving. This particular feature led to choose this platform to implement a DS-CDMA receiver...

    Provided By IARIA

  • White Papers // Jul 2011

    Resource Allocation of Adaptive Subcarrier Block With Frequency Symbol Spreading for OFDMA

    In a wireless network, the signals transmitted from one sender to different users have independent channel fluctuation characteristics. The diversity that exists between users is called multiuser diversity and can be exploited by the sender to enhance the capacity of wireless network. In multiuser diversity OFDMA system, exploiting channel fluctuation...

    Provided By IARIA

  • White Papers // Jul 2011

    A Solution for Seamless Video Delivery in WLAN/3G Networks

    In this paper, the authors introduce a Session Proxy (SP) into a scenario in which Wireless Local Area Network (WLAN) and 3th Generation of networks cellular (3G networks) are integrated using peer-to-peer architecture, with Mobile IP (MIP) as the mobility manager. This solution tries to preserve the quality of the...

    Provided By IARIA

  • White Papers // Jul 2011

    REST-Based Meta Web Services in Mobile Application Frameworks

    This paper describes how a multimodal dialogue application framework can be used to implement specific mobile applications and dynamic HTTP-based REST services. REST services are already publicly available and provide useful location-based information for the user on the go. The authors use a distributed, ontology-based dialogue system architecture where every...

    Provided By IARIA

  • White Papers // Jul 2011

    Evaluation of the Wireless Network Used by a Tour Guide in a Cultural Environment

    Wireless tour guides are mobile applications running on a PDA that are very popular among cultural environments, such as museums and art exhibitions. The Human-Computer Interaction quality derived from the use of these guides heavily depends on the wireless network used to access the information of the artefacts in the...

    Provided By IARIA

  • White Papers // Jul 2011

    Improved Spatial and Temporal Mobility Metrics for Mobile Ad Hoc Networks

    This paper shows that two well-known spatial and temporal mobility metrics for Mobile Ad hoc NETworks (MANETs) have drawbacks, possibly leading to invalid results. Based on the concept of spatial dependence in the absence of movement among mobile nodes, the authors propose mobility metrics able to promptly capture spatial and...

    Provided By IARIA

  • White Papers // Jul 2011

    A Heap-Based P2P Topology and Dynamic Resource Location Policy for Process Migration in Mobile Clusters

    A mobile cluster experiences disruption in execution of long-running applications due to its highly dynamic nature. Process migration handles such dynamism to have seamless computing with minimal disruption. The challenge in process migration is that it should take considerably less time and techniques adopted for static networks are not suitable...

    Provided By IARIA

  • White Papers // Jul 2011

    MMSP: Designing a Novel Micro Mobility Sensor Protocol for Ubiquitous Communication

    Designing low power and less delay for mobile nodes is one of the most important issues for the Ubiquitous Sensor Networks (USN). The paper presents a novel Micro Mobility Sensor Protocol (MMSP), as an enhanced form of the AODV (Ad hoc On-demand Distance Vector) protocol, in order to improve the...

    Provided By IARIA

  • White Papers // Jul 2011

    Handover Scenario and Procedure in LTE-Based Femtocell Networks

    The deployment of Femtocell as the emerging wireless and mobile access technology becomes a solution for the bandwidth limitation and coverage issues in conventional mobile network system (macrocell). In this paper the handover procedure in femtocell network is investigated. The procedure is based on 3GPP LTE specification. Three handover scenarios:...

    Provided By IARIA

  • White Papers // Jul 2011

    Performance Analysis of Receive Collaboration in TDMA-Based Wireless Sensor Networks

    This paper presents a general framework to enable the implementation of receive collaboration in Wireless Sensor Networks (WSN). The framework also allows the evaluation of Collaborative Channel Equalization (CCE) performance as one aspect of receive collaboration. The authors' analysis shows that the use of receive collaboration to receive signals from...

    Provided By IARIA

  • White Papers // Jul 2011

    Anonymous Agents Coordination in Smart Spaces

    Rapid developments of communication, data processing and storage technologies, and continuing proliferation of consumer devices that surround user have created an opportunity for creation of a new generation of services based on smart spaces concept. The current approach for expanding mobile devices functionality is integration of new physical components. But...

    Provided By IARIA

  • White Papers // Aug 2011

    TenDoc: Network Coding-Based Software for Wireless Ad Hoc Networks

    This paper builds upon previous studies that highlight the benefits of Network Coding for all too all traffic patterns. This is the case within the framework of an Optimized Link State Routing protocol (OLSR) where topology control messages are flooded in the entire network in order to provide a precise...

    Provided By IARIA