IARIA

Displaying 41-80 of 1223 results

  • White Papers // Jul 2013

    Model-Based Design of Dependable Systems: Limitations and Evolution of Analysis and Verification Approaches

    Designing a dependable system successfully is a challenging issue that is an ongoing research subject in the literature. Different approaches have been adopted to analyze and verify the dependability of a system design. This process is far from obvious and often hampered due to the limitations of the classical dependability...

    Provided By IARIA

  • White Papers // Jul 2013

    Sun Behind Clouds - On Automatic Cloud Security Audits and a Cloud Audit Policy Language

    Studies show that when it comes to an integration of Cloud computing into enterprises, chief information officers and management still see some dark Clouds on the horizon. The biggest one is the lack of security, which results in distrust and skepticism against the technology, mainly originating from an intransparency of...

    Provided By IARIA

  • White Papers // Jul 2013

    Provenance Framework for the Cloud Infrastructure: Why and How?

    Provenance is an important aspect in the verification, audit trails, reproducibility, privacy and security, trust, and reliability in distributed computing, in-silico experiment and generally in e-science. On the other hand, Cloud computing is the business model of distributed computing and is considered the next generation of computing and storage platforms....

    Provided By IARIA

  • White Papers // Jul 2013

    Towards Enhanced Usability of IT Security Mechanisms

    Now-a-days, advanced security mechanisms exist to protect data, systems, and networks. Most of these mechanisms are effective, and security experts can handle them to achieve a sufficient level of security for any given system. However, most of these systems have not been designed with focus on good usability for the...

    Provided By IARIA

  • White Papers // Jul 2013

    Maturing the Distribution of Supportive Tasks in Web Service Framework: Security and Reliability

    Security and reliability are the crucial features of distributed computing, of which one of the key enabling technologies is Web Service. In a service execution, the main task is carried out by endpoint logic, which is supported by additive functionalities and/or capabilities, called Web Service handlers. The handlers can be...

    Provided By IARIA

  • White Papers // Jul 2013

    Maximizing Utilization in Private IaaS Clouds with Heterogenous Load Through Time Series Forecasting

    In this paper, the authors present ongoing work on creating a computing system that can run two types of workloads on a private cloud computing cluster, namely web servers and batch computing jobs, in a way that would maximize utilization of the computing infrastructure. To this end, a queue engine...

    Provided By IARIA

  • White Papers // Jul 2013

    Detecting Pedestrian Flows on a Mobile Ad Hoc Network and Issues with Trends and Feasible Applications

    Due to the rapid development of mobile and ad hoc communication technology, research on extracting social contexts including the movement and density of pedestrians has also emerged in recent years. This paper explores methods to extract pedestrian flows in a distributive manner from Bluetooth detection logs. Bluetooth devices are widely...

    Provided By IARIA

  • White Papers // Jul 2013

    Application of the Simulation Attack on Entanglement Swapping Based QKD and QSS Protocols

    The authors discuss the security of quantum key distribution protocols based on entanglement swapping against collective attacks. Therefore, they apply a generic version of a collective attack strategy on the most general entanglement swapping scenario used for key distribution. Further, they focus on basis transformations, which are the most common...

    Provided By IARIA

  • White Papers // Jun 2013

    Modding and Cloud Gaming: Business Considerations and Technical Aspects

    Cloud computing is changing the IT landscape and enabling new businesses models like Games-as-a-Service (GaaS). The current GaaS approach is characterized by a simple 'Shift' of traditional games just provisioned in different ways and neglecting the gamer as an active and participating entity in the overall game development process. This...

    Provided By IARIA

  • White Papers // Jun 2013

    Signature Generation Based on Executable Parts in Suspicious Packets

    Generally, attackers obtain the control authority of a remote host through the exploit/worm codes with some executable parts. The majority of the codes are still made of the codes which can be executed directly by CPU of the remote host without some decryptions. The authors focused on the fact that...

    Provided By IARIA

  • White Papers // Jun 2013

    TeStID: A High Performance Temporal Intrusion Detection System

    Network intrusion detection systems are faced with the challenge of keeping pace with the increasingly high volume network environments. Also, the increase in the number of attacks and their complexities increase the processing and the other resources required to run intrusion detection systems. In this paper, a novel intrusion detection...

    Provided By IARIA

  • White Papers // Jun 2013

    Wireless Database Searching Scheme Using GSM Modems

    With the development of mobile communication technologies and the popularity of relating devices, GSM network based intelligent systems are being used more and more widely. Most of existing intelligent systems have been built on mobile platforms, but these systems don't provide any facility that can save the people energy. Again,...

    Provided By IARIA

  • White Papers // Jun 2013

    A Triple Interfaces Secure Token -TIST- for Identity and Access Control in the Internet Of Things

    The Internet Of Things (IoT) is an architecture in which billions of devices with computing capacities and communication interfaces are connected to the internet and perform collaborative tasks. In this context security is a major issue. In this paper, the authors focus on access control services to logical (OPENID) and...

    Provided By IARIA

  • White Papers // Jun 2013

    Event-Driven Communication on Application Level in a Smart Home

    In recent years, research on the Internet of things focused on wired or wireless information transport. Progress has been made in energy-efficiency, reduction of bandwidth usage and bringing standard Internet protocols to small resource constrained devices. Yet, an application level protocol that not only aims at enabling such devices for...

    Provided By IARIA

  • White Papers // Jun 2013

    Enforcing Data Availability in Structured Peer-to-Peer Storage Systems With Zero Replica Migration

    In this paper the authors present a structured peer-to-peer storage substrate that exploits notifications issued by the underlying network maintenance layer to enforce data availability, while avoiding both application-level replica tracking and unneeded replica migrations. This system enforces a multiple keys replication approach. Each peer advertises its stored contents to...

    Provided By IARIA

  • White Papers // Jun 2013

    SLOPPI - A Framework for Secure Logging with Privacy Protection and Integrity

    Secure log file management on, for example, Linux servers typically uses cryptographic Message Authentication Codes (MACs) to ensure the log file's integrity: If an attacker modifies or deletes a log entry, the MAC no longer matches the log file content. However, some privacy and data protection laws, for example in...

    Provided By IARIA

  • White Papers // Jun 2013

    Agile Model-Driven Modernization to the Service Cloud

    Migration of legacy systems to more advanced technologies and platforms is a current issue for many software organizations. Model-Driven Modernization combined with Software as a Service delivery model is a very promising approach, which possesses a lot of advantages, including reduced costs, automation of migration activities and reuse of system...

    Provided By IARIA

  • White Papers // May 2013

    Trusted Computing on Heterogeneous Embedded Systems-on-Chip with Virtualization and Memory Protection

    The paper examines the architecture of a secure and trustworthy cloud platform, which ensures strong logical and physical security on the client devices using a two-layer security mechanism: a) a hardware security module located on the SoC of the client device that protects incoming and outgoing communications (e.g., to/from an...

    Provided By IARIA

  • White Papers // May 2013

    Using Process Simulation to Assess the Effect of Data Format Standardization in Collaborative Processes

    Data quality plays an important role in the context of collaborative engineering and virtual enterprise. Drawing on business process management perspective, this paper attempts to gain deeper understanding of data format standardization in B2B processes by using process simulation methodology on data drawn from a large industrial project situated in...

    Provided By IARIA

  • White Papers // May 2013

    Evolutionary Process Engineering: User Guide and Case Study for Adequate Process Support

    Evolutionary process engineering describes the development of business processes over time with the objective of increasing quality and performance, in order to meet - among other things - accreditation requirements. Maturity models like the business process maturity model support quality management and are perceived as convenient measurement for this evolution....

    Provided By IARIA

  • White Papers // May 2013

    Eliciting Risk, Quality and Cost Aspects in Multi-Cloud Environments

    With the increasing number of providers offering cloud-based services, new opportunities arise to build applications capable of avoiding vendor lock-in issues. Such applications are developed in multi-cloud environments that allow replacing services with those offered by alternative providers. While this may improve quality and provide independence from a single cloud...

    Provided By IARIA

  • White Papers // May 2013

    Seamlessly Enabling the Use of Cloud Resources in Workflows

    The hosting of large on-premise computational resources is common practice. Cloud Computing offers a promising, alternative infrastructure for using scalable on-demand off-premise resources. However, outsourcing whole applications is not a cost optimal solution in some scenarios, because the already existing on-premise resources are not considered. A flexible integration of additional...

    Provided By IARIA

  • White Papers // May 2013

    Cloud Terminals for Ticketing Systems

    In this paper, the authors introduce the concept of a thin device implemented on a cloud platform for terminal devices on the front end of ticketing systems. Therefore, they propose the evolution of the traditional architecture of ticketing for a cloud based architecture in which the core processes of ticketing...

    Provided By IARIA

  • White Papers // May 2013

    Towards a Method for Decision Support in Multi-cloud Environments

    Providers of cloud services as well as the cloud services themselves differ in the business models, functionality, quality of service, cost, value, etc. which makes the choice of a provider and a service difficult. Beyond that the complexity and lack of transparency with respect to cost and quality render the...

    Provided By IARIA

  • White Papers // May 2013

    Defining Intercloud Federation Framework for Multi-Provider Cloud Services Integration

    This paper presents the on-going research to define the InterCloud Federation Framework (ICFF) which is a part of the general InterCloud Architecture Framework (ICAF) proposed by the authors. ICFF attempts to address the interoperability and integration issues in provisioning on-demand multi-provider multi-domain heterogeneous cloud infrastructure services. The paper describe the...

    Provided By IARIA

  • White Papers // May 2013

    Ontologies in Industrial Enterprise Content Management Systems: The EC2M Project

    Enterprise Content Management (ECM) systems represent a crucial aspect in the efficient and effective management of large-scale enterprises, in particular for those made up of several sites distributed all over the world. Considering the increasing number of documents that large enterprises need to store and manage, and the need of...

    Provided By IARIA

  • White Papers // May 2013

    A Look at Cloud Architecture Interoperability Through Standards

    Enabling cloud infrastructures to evolve into a transparent platform while preserving integrity raises interoperability issues. How components are connected needs to be addressed. Interoperability requires standard data models and communication encoding technologies compatible with the existing Internet infrastructure. To reduce vendor lock-in situations, cloud computing must implement universal strategies regarding...

    Provided By IARIA

  • White Papers // May 2013

    Community Clouds a Centralized Approach

    Community cloud is one of the rising ideas in the area of cloud computing. Many companies do not move into the cloud, as they need tailored solutions to ensure industry specific security and regulatory requirements. A community cloud can perfectly fulfill this requirement and costs can be spread among several...

    Provided By IARIA

  • White Papers // May 2013

    CloudState: End-to-End WAN Monitoring for Cloud-Based Applications

    Modern data centres are increasingly moving towards more sophisticated cloud-based infrastructures, where servers are consolidated, backups are simplified and where resources can be scaled up, across distributed cloud sites, if necessary. Placing applications and data stores across sites has a cost, in terms of the hosting at a given site,...

    Provided By IARIA

  • White Papers // May 2013

    Elastic-TOSCA: Supporting Elasticity of Cloud Application in TOSCA

    The Topology and Orchestration Specification for Cloud Applications (TOSCA) is an emerging framework aiming at enhancing the portability of cloud applications by standardizing their life cycle management in a vendor-neutral way. TOSCA captures the description of cloud application and infrastructure services, the relationships between parts of the services, and the...

    Provided By IARIA

  • White Papers // May 2013

    Using Patterns to Move the Application Data Layer to the Cloud

    Cloud services allow for hosting applications partially or completely in the Cloud by migrating their components and data. Especially with respect to data migration, a series of functional and non-functional challenges like data confidentiality arise when considering private and public Cloud data stores. In this paper, the authors identify some...

    Provided By IARIA

  • White Papers // May 2013

    A Cloud Platform to Support User-Provided Mobile Services

    The rapid evolution of mobile computing, together with the spread of social networks is increasingly moving the role of users from information and services consumers to actual producers. Currently, since most of the critical aspects related to user generated contents have been addressed, the main issues related to service generation...

    Provided By IARIA

  • White Papers // May 2013

    Factors Influencing Pervasiveness of Organisational Business Intelligence

    Organisations can derive great value from the effective use of Business Intelligence (BI). The pervasive use of BI can help improve decision making by providing business users with relevant information, which will ultimately lead to better organizational performance and efficiency. However, organisations still struggle to derive the full benefits BI...

    Provided By IARIA

  • White Papers // May 2013

    A DSL for Logistics Clouds

    Cloud is a new area of specialization in the computing world, and, as such, it has not been explicitly addressed by traditional programming languages and environments. Therefore, there is a need to create Domain Specific Languages (DSLs) for it. This paper presents such a DSL that targets logistics clouds, i.e....

    Provided By IARIA

  • White Papers // May 2013

    On the Analytical Characterization of a Real Life Virtual Network Function: The Italtel Virtual Session Border Control

    In this paper, the authors analyze a real-life application of virtualization: the Italtel Virtual Session Border Controller (VSBC). The measurements obtained in ad hoc loading experiments show that the VSBC performance is not linear with respect to variations in the call rate. Such a behavior is not in accordance with...

    Provided By IARIA

  • White Papers // May 2013

    Adaptive Multimedia Learning Delivered in Mobile Cloud Computing Environment

    The process of integrating multimedia files, such as different types of learning objects (video, images, audio, animation, etc.) to m-learning systems requires more computational resources than mobile devices can provide. Considering mobile device limitations, such as storage, computing power and bandwidth, the authors propose a mobile cloud computing in order...

    Provided By IARIA

  • White Papers // May 2013

    Scalable Store and Forward Messaging

    Since the emergence of the Internet, and particularly with the outburst of cloud computing, the production of reliable and scalable distributed applications is an important area of research. Various middleware technologies were designed for that purpose, among which the authors find Message-Oriented Middleware (MOM), which provides reliable asynchronous communication through...

    Provided By IARIA

  • White Papers // May 2013

    SLA Template Filtering: A Faceted Approach

    With the commoditization of cloud computing, more and more companies prefer to outsource IT resources into virtual infrastructures. Service Level Agreements (SLAs) can be helpful to make the right investment decision. A SLA template represents the pre-agreed SLA state. A service provider proposes the SLA content and submits the template...

    Provided By IARIA

  • White Papers // May 2013

    Fuzzy Controled QoS for Scalable Cloud Computing Services

    An important characteristic of cloud infrastructures is scalability on demand. A scalability service monitors performance load metrics and decides to scale up or down, by provision or revoke of cloud resources. This could guarantee Quality of Service (QoS) and enforce Service Level Objectives (SLOs). The approach of this paper shows...

    Provided By IARIA

  • White Papers // May 2013

    Towards Semantic-Supported SmartLife System Architectures for Big Data Services in the Cloud

    SmartLife applications are emerging as intelligent user-centered systems that will shape future trends in technology and communication. The development of such applications integrates web services, cloud computing, and big data management, among other frameworks and methods. The authors' paper reports on new perspectives of services and cloud computing architectures for...

    Provided By IARIA

  • White Papers // Nov 2011

    Fault Tolerant Execution of Transactional Composite Web Services: An Approach

    The authors propose an approach for efficient, fault tolerant, and correct distributed execution of Transactional Composite Web Services (TCWSS), based on Colored Petri-Net (CPN) formalism. They extend a previous COMPOSER in order it generates, besides a TCWS represented by a CPN, another CPN representing the compensation order for backward recovery....

    Provided By IARIA

  • White Papers // Nov 2011

    Dynamic Negotiation Layer for Secure Semantic Service Oriented Architectures

    The approach of users connected anytime, anywhere, has led to merging isolated islands of enriched services environments into the WEB, leaving the user free to choose among an huge number of services. In this context the introduction of ontologies and the creation of semantic Web services mainly focus on using...

    Provided By IARIA

  • White Papers // Nov 2011

    Performance Evaluation of Wireless IP Telephony (W-IPT) Over Wi-Fi Networks

    As one of the fastest growing voice service technologies, IP Telephony is currently the greatest benefactor of IP Convergence. Apart from the cost and management benefits of a converged network, the exciting array of productivity enabling applications such as unified messaging, collaboration, and presence services within an IP Telephony infrastructure...

    Provided By IARIA

  • White Papers // Nov 2011

    Capturing Mobile Devices Interactions Minimizing the External Influence

    Mobile computing has become an integral part of everyday life for the new 'Information and Knowledge Society'. The new generation of mobile devices and their full connection capabilities enable users to access a wide choice of services and knowledge from everywhere. Owing to this tendency, access to these services has...

    Provided By IARIA

  • White Papers // Nov 2011

    UbiPOL: A Platform for Context-Aware Mobile Device Applications in Policy Making

    UbiPOL is a context-aware platform for policy making. At its core, the UbiPOL platform has an essential framework of web services and APIs. It is intended to aid and support the development of location-based and context-aware applications in the field of policy making. Software developers can make use of UbiPOL...

    Provided By IARIA

  • White Papers // Nov 2011

    A Fast Bandwidth Request and Grant Method for IEEE 802.16 OFDMA/TDD Systems

    In the design of a contention-based bandwidth request scheme, decrease in data transmission delay is the most important factor. This paper proposes a new CDMA-based bandwidth request method in which the bandwidth request code contains the channel quality information and amount of bandwidth required by a mobile station. A mobile...

    Provided By IARIA

  • White Papers // Nov 2011

    External Interference-Aware Distributed Channel Assignment in Wireless Mesh Networks

    Interference is one of the major causes for performance degradation in wireless networks. Channel assignment algorithms have been proven successful to decrease the network-wide interference by using non-overlapping channels for otherwise interfering links. However, external co-located networks and devices are usually not considered in the channel assignment procedure, since they...

    Provided By IARIA

  • White Papers // Nov 2011

    Communication System With SISO Channel Decoding Using Bit Stuffing

    This paper introduces a communication system with typically wireless transmission, with SISO convolutional decoding using predefined reliability values at input of the SISO decoder. "Dummy" bits are stuffed into the information which is to be transmitted over a noisy channel and SISO decoded. Stuffed bits have to be known at...

    Provided By IARIA

  • White Papers // Nov 2011

    An Approach to Enhance the Timeliness of Wireless Communications

    Wireless technologies are the present and the future of network communications. However, the support of real-time data transmission in wireless communications - providing support for execution of well-timed networked operations - is still an open issue, not fully addressed by current wireless network standards and technologies. Thus, this paper proposes...

    Provided By IARIA

  • White Papers // Nov 2011

    Opportunistic Spectrum Sharing Scheme for Secondary WiFi-Like Devices in TV White Spaces

    Secondary spectrum access is a promising approach to improve spectrum utilization by enabling new wireless systems to opportunistically use and efficiently share the licensed bands. This paper targets a WiFi-like reuse of available spectrum in the TV bands and proposes a novel cooperative centralized spectrum sharing scheme that enables protection...

    Provided By IARIA

  • White Papers // Nov 2011

    Interference Control Technology for Heterogeneous Networks

    To eliminate dead spots like home or office and let multiple users efficiently use limited frequency resources by providing a better mobile communication environment that enables high-capacity data transmission service, the demand for a small base station is increasing. Accordingly, the research for automatically minimizing the interference and increasing the...

    Provided By IARIA

  • White Papers // Nov 2011

    Mobile Learning (mLearning) Based on Cloud Computing: mLearning as a Service (mLaaS)

    Despite its hype, cloud computing, with its dynamic scalability and virtualized resources usage, is being widely deployed for several applications in many organizations. It is envisioned that, in the near future, cloud computing will have a significant impact in the educational and learning environment, enabling its own users (i.e., learners,...

    Provided By IARIA

  • White Papers // Feb 2012

    Improving Fairness in Wireless Mesh Networks

    Wireless Mesh Networks (WMNs) are networks that aim to establish hybrid wireless communications in areas with little or no telecommunication infrastructure available. The main motivation of these networks in Brazil and other developing countries, particularly in remote areas, is providing Internet access in places without commercial infrastructure and where the...

    Provided By IARIA

  • White Papers // Feb 2012

    MANET With the Q-Routing Protocol

    With ad hoc networks having much more advantages over other types of networks in a mobile world, this made it an attractive field for many protocols. In this paper, the authors propose an implementation of the Q-Routing protocol working over a mobile ad hoc network to enhance the performance of...

    Provided By IARIA

  • White Papers // Feb 2012

    Estimation of Collision Multiplicities in IEEE 802.11-Based WLANs

    Estimating the Collision Multiplicity (CM), i.e. the number of users involved in a collision, is a key task in MultiPacket Reception (MPR) approaches and in Collision Resolution (CR) techniques. A new technique is proposed for IEEE 802.11 networks. The technique is based on recent advances in random matrix theory and...

    Provided By IARIA

  • White Papers // Feb 2012

    CTC Turbo Decoding Architecture for LTE Systems Implemented on FPGA

    This paper describes a turbo decoder for Long Term Evolution (LTE) standard, release 8, using a Max Log MAP algorithm. The Forward Error Correction (FEC) block dimensions, as indicated in the standard, are inside a range of 40 to 6144 bits. The coding rate is 1/3, the puncturing block not...

    Provided By IARIA

  • White Papers // Feb 2012

    Multi-Relay Cooperative NB-LDPC Coding With Non-Binary Repetition Codes

    In this paper, the authors propose a system based on non-binary Low-Density Parity-Check (LDPC) codes to communicate efficiently over the multiple-relay fading channels, with a simple joint decoding strategy at the receiver end. The particularity of their approach is to rely on non-binary LDPC codes at the source, coupled with...

    Provided By IARIA

  • White Papers // Feb 2012

    A Redundancy Information Protocol for P2P Networks in Ubiquitous Computing Environments: Design and Implementation

    The ubiquitous computing vision brings high computational and communication demands. In this paper, the authors propose a high availability protocol for information replication in ubiquitous computing environments. Running at the application layer, on top of a P2P overlay network based on JXTA, the protocol allows the transfer of multimedia contents...

    Provided By IARIA

  • White Papers // Feb 2012

    A Complementary Approach for Transparent NAT Connectivity

    NAT has been responsible for the survival of IPv4 and in essence should not be left out in IPv6. NAT are virtually transparent to client-server applications that generally do not require special configuration to work properly. However, P2P applications are responsible for generating about half of Internet traffic and require...

    Provided By IARIA

  • White Papers // Feb 2012

    Mitigating Spoofing Attacks in MPLS-VPNs Using Label-Hopping

    In certain models of inter-provider Multi-Protocol Label Switching (MPLS) based Virtual Private Networks (VPNs) spoofing attack against VPN sites is a key concern. For example, MPLS-based VPN inter-provider model "C" is not favoured, owing to security concerns in the dataplane, even though it can scale with respect to maintenance of...

    Provided By IARIA

  • White Papers // Feb 2012

    A Proposal of Dynamic RWA Using Ant Colony in Optical Burst Switched Networks

    One of the main problems in optical networks concerns routing and wavelength assignment for establishing optical circuits. Burst switching is a viable alternative to overcome the problem of idle circuit waste, but it also prevents data to pass to the electrical domain where conversion is necessary, thus making this switching...

    Provided By IARIA

  • White Papers // Jul 2011

    Trust Model-Based Secure Cooperative Sensing Techniques for Cognitive Radio Networks

    Cooperative spectrum sensing has been shown to enable Cognitive Radio (CR) networks to reliably detect licensed users and avoid causing interference to licensed communications. However, the performance of the scheme can be severely degraded due to presence of malicious users sending false sensing data. In this paper, the authors propose...

    Provided By IARIA

  • White Papers // Jul 2011

    Access Control in a Form of Active Queuing Management in Congested Network Environment

    Internet processes information in the form of distributed digital resources, which have to be available for authorized use and protected against unauthorized access. The implementation of these requirements is not a simple task because there are many ways to its realization in the modern multi-serviced and congested networks. In this...

    Provided By IARIA

  • White Papers // Jul 2011

    IPv6: Now You See Me, Now You Don't

    Current implementations of the Internet Protocol version 6 (IPv6) use StateLess Address Auto Configuration (SLAAC) to assign network addresses to hosts. This technique produces a static value determined from the Media Access Control (MAC) address as the host portion, or Interface IDentifier (IID), of the IPv6 address. Some implementations create...

    Provided By IARIA

  • White Papers // Jul 2011

    A Review Study on Image Digital Watermarking

    There has been an increase in broadcasting media since the begin of this century, because many techniques had been developed to solve this problem. Watermarking is the greatest bet from many researches around the world. Digital watermarks can be used by a lot of applications like: copyright protection, broadcast monitoring...

    Provided By IARIA

  • White Papers // Jul 2011

    Evaluation of Buffer Size for Middleware Using Multiple Interface in Wireless Communication

    Although a variety of wireless interfaces are available on mobile devices, they still provide only low throughput so far. When coverage areas of these different technologies overlap, mobile devices with multiple interfaces can use them simultaneously by mechanism of Bandwidth Aggregation. However, there are some performance problems for Bandwidth Aggregation...

    Provided By IARIA

  • White Papers // Jul 2011

    Mobile Ad-Hoc Networks: An Experimentation System and Evaluation of Routing Algorithms

    The paper concerns the problem of path finding in wireless ad-hoc networks. Several algorithms, including metaheuristic algorithms, evolutionary algorithm and the created hybrid algorithm, are considered. Algorithms have been implemented into a designed experimentation system. The system allows making simulation experiments along with multistage experiment design. In the paper, the...

    Provided By IARIA

  • White Papers // Jul 2011

    Home Automation With IQRF Wireless Communication Platform: A Case Study

    This paper describes a new wireless communication platform IQRF. In the paper is description of main features of the platform, available communication modules, gateways to other wired and wireless communication system, and development tools. The paper also describes a case study focused on IQRF Smart house concept. IQRF platform was...

    Provided By IARIA

  • White Papers // Jul 2011

    Secure Packet Transfer in Wireless Sensor Networks - A Trust-Based Approach

    Trust is very important in wireless sensor networks to transfer the data from source to destination. The Dynamic Source Protocol calculates the alternate path, if any node fails to transfer the data. The Dynamic Source Protocol does not have any built-in functionality to calculate an alternate path if the path...

    Provided By IARIA

  • White Papers // Jul 2011

    Adaptive Techniques for Elimination of Redundant Handovers in Femtocells

    Dense deployment of femtocells in mobile wireless networks can significantly increase the amount of handover initiations. This paper analyzes new approach to elimination of redundant handovers. The innovative way dynamically updates current value of techniques commonly used for elimination of redundant handovers. The goal is to investigate the efficiency of...

    Provided By IARIA

  • White Papers // Jul 2011

    Reconfigurable Tactical Impulse Radio UWB for Communication and Indoor Localization

    The paper is focused on the design of a new reconfigurable tactical UWB impulse radio enabling indoor communication and localization for military application. The proposed system contains both a physical and a MAC (Medium Access Control) layer. It proposes to answer military needs for information sharing and for indoor localization...

    Provided By IARIA

  • White Papers // Jul 2011

    CQI Reporting Imperfections and Their Consequences in LTE Networks

    In modern wireless networks, the signal quality in wireless channel is estimated based on the channel quality measurements. The measurement results are used to select appropriate modulation and coding scheme for each transmission. The target of the link adaptation is to reach the desired block error rate operation point. Operation...

    Provided By IARIA

  • White Papers // Jul 2011

    HyRA: A Software-Defined Radio Architecture for Wireless Embedded Systems

    Traditional Software-Defined Radio (SDR) architectures cannot go with the requirements of embedded systems, specially in terms of performance and power consumption. Low-power FPGAs now reaching the market might soon become a viable alternative to overcome such limitations. The HYbrid Radio Architecture (HYRA) introduced in this paper contributes to this scenario...

    Provided By IARIA

  • White Papers // Jul 2011

    Sensors Deployment Strategies for Rescue Applications in Wireless Sensor Networks

    Wireless Sensor networks (WS's) become a major tool for various security and surveillance applications to detect and monitor environmental changes, to control vehicle traffic, etc. For all these capabilities, the authors propose in this paper to use WS's in rescue applications. These applications are critical in terms of network response...

    Provided By IARIA

  • White Papers // Jul 2011

    UHF-RFID-Based Localization Using Spread-Spectrum Signals

    Determining the range between RFID tags and readers, particularly in the UHF region, is subject of current research topics. This paper presents a simulation-based approach, using spread-spectrum techniques to reckon the range between UHF RFID tags and a reader system. The UHFRFID reader reads out the surrounding tags within its...

    Provided By IARIA

  • White Papers // Jul 2011

    An Error Reduction Algorithm for Position Estimation Systems Using Transmitted Directivity Information

    The authors consider a position estimation system for tar-gets that exist in near wide area. The system has multiple sensors and estimates position using multiple receivers. Previously, receivers arranged in a straight line would generate a large position error in the direction of the line. In order to reduce this...

    Provided By IARIA

  • White Papers // Jul 2011

    A Dynamic Bandwidth Allocation Scheme for Interactive Multimedia Applications Over Cellular Networks

    Cellular networks played key role in enabling high level of bandwidth for users by employing traditional methods such as guaranteed QoS based on application category at radio access stratum level for various classes of QoS. Also, the newer multimode phones (e.g., phones that support LTE (Long Term Evolution standard), UMTS,...

    Provided By IARIA

  • White Papers // Jul 2011

    Distributed TDMA MAC Protocol With Source-Driven Combined Resource Allocation in Ad Hoc Networks

    MAC protocols for multimedia traffic transmission in mobile ad hoc networks have been studied steadily. It is still challenging to design an efficient protocol due to limited resource and multi-hop transmission property. CSMA-based MAC protocol is not suitable for multimedia traffic transmission due to hop-by-hop contention and collision. TDMA-based MAC...

    Provided By IARIA

  • White Papers // Nov 2011

    Assistive Mobile Software for Public Transportation

    The need of mobility on public transport for persons with visual impairment is mandatory. While traveling on a public transport, the simple ability to know the current location is almost impossible for such persons. To overcome this hurdle, the authors developed an assistive application that can alert its user to...

    Provided By IARIA

  • White Papers // Nov 2011

    Mobility in a Personalized and Flexible Video-Based Transmedia Environment

    This paper addresses the effective design of Transmedia environments to generate personalized additional video information from iTV, PC and mobile devices with a special focus on mobile devices. It presents the opportunities and challenges of the inclusion of mobile devices on this ubiquitous environment, turning it into a true "Ecosystem...

    Provided By IARIA