IARIA

Displaying 81-120 of 1223 results

  • White Papers // May 2013

    Towards Semantic-Supported SmartLife System Architectures for Big Data Services in the Cloud

    SmartLife applications are emerging as intelligent user-centered systems that will shape future trends in technology and communication. The development of such applications integrates web services, cloud computing, and big data management, among other frameworks and methods. The authors' paper reports on new perspectives of services and cloud computing architectures for...

    Provided By IARIA

  • White Papers // May 2013

    Factors Influencing Pervasiveness of Organisational Business Intelligence

    Organisations can derive great value from the effective use of Business Intelligence (BI). The pervasive use of BI can help improve decision making by providing business users with relevant information, which will ultimately lead to better organizational performance and efficiency. However, organisations still struggle to derive the full benefits BI...

    Provided By IARIA

  • White Papers // May 2013

    Using Process Simulation to Assess the Effect of Data Format Standardization in Collaborative Processes

    Data quality plays an important role in the context of collaborative engineering and virtual enterprise. Drawing on business process management perspective, this paper attempts to gain deeper understanding of data format standardization in B2B processes by using process simulation methodology on data drawn from a large industrial project situated in...

    Provided By IARIA

  • White Papers // May 2013

    Evolutionary Process Engineering: User Guide and Case Study for Adequate Process Support

    Evolutionary process engineering describes the development of business processes over time with the objective of increasing quality and performance, in order to meet - among other things - accreditation requirements. Maturity models like the business process maturity model support quality management and are perceived as convenient measurement for this evolution....

    Provided By IARIA

  • White Papers // Apr 2013

    Evaluation Study of Self-Stabilizing Cluster-Head Election Criteria in WSNs

    In the context of Wireless Sensor Networks (WSNs), where sensors have limited energy power, it is necessary to carefully manage this scarce resource by saving communications. Clustering is considered as an effective scheme in increasing the scalability and lifetime of Wireless Sensor Networks. The authors propose an energy-aware distributed self-stabilizing...

    Provided By IARIA

  • White Papers // Apr 2013

    A Vehicle Ad-Hoc Network for Traffic Information System

    The authors propose a vehicle ad-hoc network for traffic information service. It allows collecting and analyzing traffic status of large areas without any infrastructure, e.g., probe cars, road side unit, and server. The proposed scheme uses multi-channel and broadcasting technique. Vehicle terminal simply needs the existing navigation systems in vehicles...

    Provided By IARIA

  • White Papers // Apr 2013

    Novel Rate-Jitter Control Algorithms: Modeling and Analysis

    Time Division Multiplexing over Internet Protocol (TDMoIP) is a transport technology that extends the voice, video and data traffic transparently over IP. When TDM traffic is packetized and injected into a Packet Switched Network (PSN) for transportation, packets arrive at the destination with different inter-arrival times, due to variable delay...

    Provided By IARIA

  • White Papers // Apr 2013

    Mean Waiting Time of an End-User in the Multiple Web Access Environment

    Mean response time for single user and mean waiting time for multiple users are important measures of Quality of Service (QoS) in accessing a web server. This paper presents analytical models to find the mean response time and the mean waiting time for web service using Hyper Text Transfer Protocol...

    Provided By IARIA

  • White Papers // Apr 2013

    Management Driven Multicast Protocol with End-to-End QoS

    Multicast technologies supporting various media services are increasingly seen in the current Internet and are expected to be used also in future Internet deployments. While traditional IP level multicast and overlay multicast are well known solutions, multi-domain multicast with Quality of Services (QoS) guarantees is still a research topic. This...

    Provided By IARIA

  • White Papers // Mar 2013

    Survey on Survivable Virtual Network Embedding Problem and Solutions

    Survivability in networks has always been an important issue and lately becomes for network virtualization. Network virtualization provides to run multiple virtual networks on a shared physical network. Since a failure in the physical network can affect several virtual resources, therefore, the survivability has to be considered in the embedding...

    Provided By IARIA

  • White Papers // Mar 2013

    Resource-Efficient Management Scheme of Sensor Data

    In this paper, the authors propose a resource-efficient management scheme of sensor data for building energy saving. To manage buildings, they collect data from the variety of sensors in buildings able to recognize illumination, motion, temperature, humidity and so on. They analyze this data and derive energy saving measures from...

    Provided By IARIA

  • White Papers // Mar 2013

    Performance of Cloud-Based P2P Game Architecture

    The traditional multiplayer video game architecture requires costly investment in physical game servers and network infrastructure. The peer-to-peer network model alleviates some of these concerns, but makes cheat prevention, software updates, and system monitoring far more difficult for the game publisher. Recent advancements in Infrastructure as a Service (IaaS) cloud...

    Provided By IARIA

  • White Papers // Mar 2013

    Development of Ontology Based Framework for Information Security Standards

    E-Business Management and associated risk mitigation of organizational resources have become a major challenge for the organizations in light of increasingly global and integrated digital economies. The authors' focused on information security in e-Business management. They consider, in particular, the domain of banking. The banking sector, being highly regulated, poses...

    Provided By IARIA

  • White Papers // Mar 2013

    A Large-Scale Power-Saving Cloud System Composed of Multiple Data Centers

    A large-scale power-saving cloud system-composed of multiple Data Centers (DCs) and a Wide-Area Network (WAN) connecting them is proposed. In this system, to reduce power consumption of the DCs and the WAN, Virtual Machines (VMs) are migrated and data routing paths are optimized under the condition that Quality of Service...

    Provided By IARIA

  • White Papers // Mar 2013

    E-Learning Portal Architecture - From Web Services towards Cloud Services

    In this paper, the authors focus on architecture principles for providing integrated e-learning services both as web services and as cloud services, technology that presently emerges as 'on-demand' services. The information system facilities are made available by integrating into a global web portal the dedicated services and synchronizing databases based...

    Provided By IARIA

  • White Papers // Mar 2013

    QoS-Aware Component for Cloud Computing

    Providing dedicated cloud services that ensure user's QoS requirements is a big challenge in cloud computing. Currently, cloud services are provisioned according to resources availability without ensuring the expected performances. The cloud provider should happen to evolve its ecosystem in order to meet QoS-awareness requirements of each cloud component. In...

    Provided By IARIA

  • White Papers // Mar 2013

    Efficient Multicast Authentication in Energy Automation Environments

    Information security is gaining increasingly more importance for real-time industrial automation networks. Multicast communication is used widely especially on field and process level to cope with performance requirements and to ease the handling of communication peers as the destinations need not to be known by the sender. A security design...

    Provided By IARIA

  • White Papers // Mar 2013

    Bankruptcy and Financial Standing Models Application for SMEs

    This paper describes a system from software application research, development, implementation and testing. The final software tool is a web-based application used as a finance module by SMEs within the FutureSME portal, which supports small and medium companies for better competition on the market. The finance module offers three bankruptcy...

    Provided By IARIA

  • White Papers // Feb 2013

    RedNoCs: A Runtime Configurable Solution for Cluster-Based and Multi-Objective System Management in Networks-on-Chip

    Runtime-based monitoring and adaptation are indispensable system management tasks for efficient operation of complex heterogeneous Multi-Processor-System-on-Chip (MPSoC) under dynamic workloads. Thereby, runtime-adaptive mechanisms like application mapping, adaptive routing or thermal management will have their own parameter, requirements and information flows. The main contribution of this paper is the evaluation of...

    Provided By IARIA

  • White Papers // Feb 2013

    Exploring Your Business Leaders Through Virtual Characters: Persona Design and Small Experiments

    The authors propose a novel method to identify desirable leader images in each situation. Leader's characteristics have been researched. However, many researchers could not find unique his/her characteristics. Therefore, desirable characteristics are different in each situation which he/her meets. In order to capture the desirable characters in each situation, they...

    Provided By IARIA

  • White Papers // Feb 2013

    Merging Capabilities of the Social Web and the Semantic Web to Support Knowledge Management in Small and Medium-Sized Enterprises

    The research focuses on finding an interlinking solution for integration of the Social Web and the Semantic Web for knowledge management needs of small and medium-sized enterprises in respect to preserving their knowledge assets. The solution proposed includes a conceptual level framework for describing metadata of knowledge assets and a...

    Provided By IARIA

  • White Papers // Feb 2013

    Security of Information System in View of Business Continuity Management

    In any type of company, the information system is one of the core systems in order to accomplish their business objectives. Exposure of its malfunction or defect sometimes causes critical damages to the company in view of business continuity and the company should form a plan consist of several measures...

    Provided By IARIA

  • White Papers // Feb 2013

    Risk as a Subjective Construct: Implications for Project Management Practice

    The management of risk is a key element of all mainstream project management methodologies. It has implications for the effectiveness of the project management process itself, and for the management and communication of knowledge that is an inherent part of that process. There are two main schools of thought regarding...

    Provided By IARIA

  • White Papers // Feb 2013

    An Expert-Driven Bayesian Network Model for Simulating and Predicting Software Quality

    This paper is to build an expert-driven Bayesian network model for simulating and predicting software quality. In contrast with earlier models, this model represents software quality as a hierarchy of features and their sub-features where the features are interrelated with other. It contains a range of project and process factors...

    Provided By IARIA

  • White Papers // Feb 2013

    Extraction of Semantic Relationships From Academic Papers Using Syntactic Patterns

    Integrating concept and citation networks on a specific research subject can help researchers focus their own work or use methods described in prior works. In this paper, the authors propose a method to extract semantic relations from concepts and citation in the descriptions of related work. Specifically, they examined topic-paper...

    Provided By IARIA

  • White Papers // Feb 2013

    Innovative Approach for Agile BPM

    Current challenges for companies require a high flexibility of business processes. The systematic combination of Cloud Computing and business process management presents advantages, which are particularly useful for the modeling and automation of business processes. A targeted enhancement of business process management with the help of these advantages generates significant...

    Provided By IARIA

  • White Papers // Feb 2013

    Knowledge Management and Business Processes Learning on the Job: a Conceptual Approach and Its Prototypical Implementation

    Business Process Management (BPM) has established itself as an important cross-functional task in many companies. Its primary goal is to optimize the business process design and hence the actual execution of business processes. Since optimizing processes on paper is not sufficient to really boost a company's performance, it is an...

    Provided By IARIA

  • White Papers // Feb 2013

    A Diagram Method to Analyze Illogical Thinking: Modeling Typical Logical Mistakes Concerning Information Security and Industrial Safety

    The authors propose a graphical method to express and analyze logical failure of human operators. Human factor is the weakest link on information security and industrial safety, and mare human mistakes have been making many severe accidents. Human thinking process is unstable and not always correct. There exist certain tendencies...

    Provided By IARIA

  • White Papers // Feb 2013

    Overcoming the Risks of the Perimeter-Based Security with Strong Federated Identification Mechanisms

    Now-a-days, corporate networks appear completely unprepared to deal with threats from new technologies of communication, risk behavior of users, interoperability with third-party systems and outsourcing. The perimeter-based traditional security approach (model of the \"Castle and the moat\") hinders the development of enterprise systems and creates the delusion of protection in...

    Provided By IARIA

  • White Papers // Feb 2013

    Publishing Multidimensional Statistical Linked Data

    The access information law approved by the Brazilian government regulates the provision of open government data in the Web. However, they are heterogeneous, unstructured and derived from independent sources, making it difficult to interconnect. This paper presents a process of identifying sources, ontology generation, mapping and publishing statistical linked data...

    Provided By IARIA

  • White Papers // Feb 2013

    Towards Recovering Provenance with Experiment Explorer

    In this paper, the authors present Experiment Explorer (EE), a framework for recovering provenance that uses provenance compatible research processes and a lightweight, user-friendly metadata search tool. EE also captures recovered provenance along with file relationships and incorporates new files to support provenance recovery over time. Their results at a...

    Provided By IARIA

  • White Papers // Feb 2013

    A Model for Recommending Specialization Courses: Based on the Professional Profile of Candidates

    The paper studies the candidates' professional profile on choosing a specialization course. A methodology based on the processes Knowledge Discovery in Databases (KDD) and CRoss-Industry Standard Process for Data Mining (CRISP-DM) is applied, and proposed a course recommendation model, using a technique of data mining based on decision trees for...

    Provided By IARIA

  • White Papers // Feb 2013

    Analysing Resource Performance and Its Application

    Performance analysis of resources is important part of process optimizing. It is useful to analyze performance (execution time) for particular tasks, time deviation, error rate and its improvement during time. It is also possible to use the analyzing task execution time by resource for different purposes. For example, it is...

    Provided By IARIA

  • White Papers // Feb 2013

    Process Mining in Manufacturing Company: With Focus on Process Simulation and Prediction

    Simulation can be used for analysis, prediction, and optimization of business processes. Nevertheless, process models often differ from reality. Data mining techniques can be used for improving these models based on observations of process and resource behavior from detailed event logs. More accurate process models can be used not only...

    Provided By IARIA

  • White Papers // Feb 2013

    Grouped Queries Indexing for Relational Database

    Finding a good index or indexes set for a table is very important for every relational database processing not only from the performance point but also cost aspect. Indexes can be crucial for a relational database to process queries with reasonable efficiency, but the selection of the best indexes is...

    Provided By IARIA

  • White Papers // Feb 2013

    An Ontology-Aided Process Constraint Modeling Framework for Workflow Systems

    Specification of non-functional and domain-specific constraints in workflow processes and incorporating them within workflow applications have posed persistent problems for workflow designers. In order to address these problems, the authors propose a constraint handling framework consisting of a Process Constraint Ontology and a Process Constraint Language. The extensible ontology allows...

    Provided By IARIA

  • White Papers // Feb 2013

    Starting a Spatially Enabled Society: a Web System for Collecting Volunteered Geographic Information in the Area of Public Security

    A spatially enabled society provides to citizens, businesses and government access to spatial data regardless of computing platform. The paper describes a collaborative Web system to gather geographic information about the area of public security and disseminate it at all levels of a society using Web 2.0 tools. The data...

    Provided By IARIA

  • White Papers // Feb 2013

    Choosing a BPMN 2.0 Compatible Upper Ontology

    Now-a-days, linkage of BPMN 2.0 business process models with ontologies to achieve consistency and semantic compatibility is still a challenge. This paper addresses a question of finding BPMN 2.0 meta-model compatible upper ontology for the analysis of the completeness of BPMN 2.0 model. Upper ontologies are meta-structures for domain ontologies...

    Provided By IARIA

  • White Papers // Feb 2013

    Shape Feature Extraction for On-line Signature Evaluation

    In the past few years, banks and companies have increased security by switching from simple static passwords to more dynamic security measures that offer greater protection for users of mobile and web commerce. The most personal method for authentication is analysis of handwritten signatures. Signature evaluation determines whether an individual's...

    Provided By IARIA

  • White Papers // Feb 2013

    A Framework for Designing Knowledge Management Systems: Aggregating the Existing Approaches

    To effectively manage organizational knowledge to promote innovative practice and gain sustainable competitive advantage, there is a need for a system called Knowledge Management System (KMS). This system helps to enhance the organizational process of knowledge creation, storage, retrieval, transfer and application. With the explosive growth of interest in knowledge...

    Provided By IARIA

  • White Papers // Oct 2011

    Usage of Robot Framework in Automation of Functional Test Regression

    Manual testing is a time consuming process. In addition, regression testing, because of its repetitive nature, is error-prone, so automation is highly desirable. Robot Framework is simple, yet powerful and easily extensible tool which utilizes the keyword driven testing approach. Easy to use tabular syntax enables creating test cases in...

    Provided By IARIA

  • White Papers // Oct 2011

    A Test Purpose and Test Case Generation Approach for SOAP Web

    SOA Web services are now supported by most of major software development companies and industry. To be reliable, these ones require to be developed with respect to a complete software development life cycle and, in particular, they need to be tested. Test purpose-based methods are black box testing techniques which...

    Provided By IARIA

  • White Papers // Oct 2011

    Ev-ADA: A Simulation-Driven Evaluation Architecture for Advanced Driving-Assistance Systems

    This paper reports the architecture of a simulator which is able to evaluate sensors, path planners and controllers of the Advanced Driving-Assistance Systems (ADAS). The outstanding feature of this simulator is that it is able to evaluate algorithms by giving scores. The implementation of the algorithms requires several tools such...

    Provided By IARIA

  • White Papers // Oct 2011

    On the Preliminary Adaptive Random Testing of Aspect-Oriented Programs

    Adaptive Random Testing (ART) is a new family of random-based test data generation and selection strategies that enhances the effectiveness of tests over the classical Random Testing (RT). ART has been widely investigated and studied in numerous research papers over the recent years. These studies have included proposing various techniques...

    Provided By IARIA

  • White Papers // Oct 2011

    Devising Mutant Operators for Dynamic Systems Models by Applying the HAZOP Study

    Embedded systems are increasingly present in many electronic devices. Therefore, it is necessary to use rigorous testing techniques aimed at ensuring that these systems behave as expected. The authors' contribution is the definition of mutant operators for the context of embedded systems models. They focus on dynamic systems models, specifically...

    Provided By IARIA

  • White Papers // Oct 2011

    A Static Robustness Grid Using MISRA C2 Language Rules

    Program robustness is the ability of software to behave correctly under stress. Measuring program robustness allows programmers to find the program's vulnerable points, repair them, and avoid similar mistakes in the future. In this paper, a Robustness Grid will be introduced as a program robustness measuring technique. A Robustness Grid...

    Provided By IARIA

  • White Papers // Oct 2011

    A Specifications-Based Mutation Engine for Testing Programs in C#

    This paper presents a simple and efficient engine which produces mutations of source code written in C#. The novelty of this engine is that it produces mutations that do not contradict with the specifications of the program. The latter are described by a set of pre- and post-conditions and invariants....

    Provided By IARIA

  • White Papers // Oct 2011

    Component-Based Software System Dependency Metrics Based on Component Information Flow Measurements

    The motivation of this paper is that the measurement based on the flow of information connecting software components can be used to evaluate component-based software system dependency. The ability to measure system dependency implies the capability to locate weakness in the system design and to determine the level of software...

    Provided By IARIA

  • White Papers // Oct 2011

    Module Interactions for Model-Driven Engineering of Complex Behaviour of Autonomous Robots

    In this paper, the authors describe a model-driven engineering approach that enables the complete description, validation, verification and deployment of behaviour to autonomous robots, directly, and automatically from the models. This realizes the promises and benefits of model-driven engineering, such as platform-independent development and behaviour traceability. However, such a top-down...

    Provided By IARIA

  • White Papers // Oct 2011

    Case Study for a Quality-Oriented Service Design Process

    Due to the usage of distributed information, such as sensor information, geographical information systems are designed according to service-oriented principles. Thus, the development of new solutions within this context requires a design of necessary services. These services have to follow certain quality attributes that have evolved as important for services,...

    Provided By IARIA

  • White Papers // Oct 2011

    Meta-Model for Global Software Development to Support Portability and Interoperability in Global Software Development

    Global Software Development (GSD) considers the coordinated activity of software development that is not localized and central but geographically distributed. To support coordination among sites, usually it is aimed to adopt the same development and execution platform. Unfortunately, adopting a single platform might not be always possible due to technical...

    Provided By IARIA

  • White Papers // Oct 2011

    A New Approach to Software Development Process With Formal Modeling of Behavior Based on Visualization

    This paper investigates the advantages and limitations of various modeling methods. Despite of their advantages, due to some limitations of each modeling method, using only one of them as the sole approach will not ensure high quality software. This paper proposes a new feasible approach to improve the software development...

    Provided By IARIA

  • White Papers // Oct 2011

    Non-Functional Requirements for Business Processes in the Context of Service-Oriented Architectures

    The authors present novel concepts to formalize and apply Non-Functional Requirements (NFRs) for business processes in the context of Service-Oriented Architectures (SOAs). Today, popular languages for modeling business processes do not support the specification of NFRs in a systematic manner. However, there is a strong demand to explicitly address such...

    Provided By IARIA

  • White Papers // Oct 2011

    PSW: A Framework-Based Tool Integration Solution for Global Collaborative Software Development

    The market of solutions for collaborative and distributed software development offers currently a wide range of tools that support specific tasks involved in these kind of projects. Several solutions aim to support the whole development process in a single tool or via groups of tools by providing distributed teams the...

    Provided By IARIA

  • White Papers // Oct 2011

    Feature-Oriented Programming and Context-Oriented Programming: Comparing Paradigm Characteristics by Example Implementations

    Software variability can be supported by providing adaptations on top of a program's core behavior. For defining and composing adaptations in a program, different paradigms have been proposed. Two of them are feature-oriented programming and context-oriented programming. This paper compares an exemplar implementation of each paradigm. For the comparison, a...

    Provided By IARIA

  • White Papers // Oct 2011

    Soft Constraints in Feature Models

    Feature Models represent admissible configurations of products in Software Product Lines. Constraints are used to represent domain specific knowledge, such as requiring or excluding a feature in the presence of another. Configurations failing to conform to these constraints are deemed invalid. However, in many cases useful domain information cannot be...

    Provided By IARIA

  • White Papers // Oct 2011

    Feature Modeling of Software as a Service Domain to Support Application Architecture Design

    Cloud computing is an emerging computing paradigm that has gained broad interest in the industry. SaaS architectures vary widely according to the application category and number of tenants. To define a proper SaaS architecture it is important to have a proper understanding of the domain. Based on the authors' extensive...

    Provided By IARIA

  • White Papers // Oct 2011

    Adding Support for Hardware Devices to Component Models for Embedded Systems

    Component-based development promises many improvements in developing software for embedded systems, e.g., greater reuse of once written software, less error-prone development process, greater analyzability of systems and shorter time needed for overall development. One of the aspects commonly left out of component models is communication of software components with hardware...

    Provided By IARIA

  • White Papers // Oct 2011

    A Service Component Framework for Multi-User Scenario Management in Ubiquitous Environments

    Software dedicated to ubiquitous environments has to deal with the multiplicity of devices and users. It also has to adapt to frequent changes in its environment. Users can easily access and trigger services provided by different devices but also need to implement complex scenarios, i.e., structured compositions of multiple service....

    Provided By IARIA

  • White Papers // Oct 2011

    A Systematic Mapping Study on Patient Data Privacy and Security for Software System Development

    The exchange of Electronic Health Records (EHR) has increased threats to patient data privacy and security. The software systems developed for healthcare sector are required to explicitly address patient data privacy and security. A number of solutions have been proposed to incorporate these requirements into the software systems. However, there...

    Provided By IARIA

  • White Papers // Jun 2010

    Dynamic End-to-End QoS Provisioning and Service Composition Over Heterogeneous Networks

    This paper presents an approach that aims to provide Quality of Services (QoS) over heterogeneous Internet domains. The goal is to install and to manage QoS inside each domain and to ensure it on the end to end data path. QoS is a key requirement representing a significant infrastructure upgrade...

    Provided By IARIA

  • White Papers // Jun 2010

    Time Dependent L?vy Flights Models for Internet Traffic

    Measurements of local and wide-area network traffic in the 90's established the relation between burstiness and self-similarity of network traffic. Several papers explained that the widely used Poisson based models could not be applied for the past decade's network traffic. Recent papers have questioned the direct applicability of these results...

    Provided By IARIA

  • White Papers // Jun 2010

    End-to-End Prediction Model of Video Quality and Decodable Frame Rate for MPEG Broadcasting Services

    This paper proposes, describes and evaluates a novel theoretical framework for end-to-end video quality assessment of MPEG-based video services in hand-held and mobile wireless broadcast systems. The proposed framework consists two discrete models: a model for predicting the video quality of an encoded signal at a preen-coding state by specifying...

    Provided By IARIA

  • White Papers // Jun 2010

    Adaptive Congestion Detection and Control at the Application Level for VoIP

    For decades, researchers have worked extensively in the area of congestion control for packet-switched networks. Many proposed solutions take advantage of the congestion-control mechanism in Transmission Control Protocol (TCP), and these approaches work well for networks that have heavy TCP traffic. However, these approaches are not universally effective - they...

    Provided By IARIA

  • White Papers // Jun 2010

    Long-Range CAN: to Enhance the Performance of Content-Addressable Networks

    Distributed hash table algorithms construct structured P2P networks to control the communication cost of resource lookups. Resource or content lookups in DHT protocols are performed based on a key that is a hash print of the searched content. Nodes and keys are mapped on an IDentifier (ID) space, and the...

    Provided By IARIA

  • White Papers // Jun 2010

    Service Triggering in MVNO & Multi-Country Environments

    Traditional mobile operators invested huge amounts of money in the 1990s to build the current 2G wireless networks, like GSM networks in Europe. Those networks have proven to be stable. In most cases, their capacity has not yet been exhausted. Furthermore, the marketing departments of mobile operators now consider the...

    Provided By IARIA

  • White Papers // Jun 2010

    How to Achieve and Measure the Benefits of Fault Tolerant Production Infrastructures

    Disaster Recovery Infrastructures, which have become a common aspect of all major IT infrastructures, could transform to Fault Tolerant Infrastructures in order to increase productivity, effectiveness and availability. This paper suggests a methodology for the transformation of High Availability Systems on which Disaster Recovery Infrastructures are based, to Fault Tolerant...

    Provided By IARIA

  • White Papers // Apr 2012

    Wi-Fi Proximity and Context-Aware Browsing

    This paper describes a new model for accessing to local data for mobile subscribers. The authors' model uses Wi-Fi proximity ideas. In their concept, any exiting or even especially created Wi-Fi hot spot could be used as presence sensor that can open (discover) access for some user-generated content. In their...

    Provided By IARIA

  • White Papers // Apr 2012

    Targeting Situational Awareness Beyond the Event Horizon by Means of Sensor

    The main input of this paper is to examine a solution for acquiring data from beyond Event Horizon in an area of interest while operating in low-level operations in a given battle-space. As the pace of modern warfare increases, so does the necessity for maintaining accurately and timely updated Situational...

    Provided By IARIA

  • White Papers // Apr 2012

    Investigations of Resource Allocation Schemes Between Multi-Hop Backhaul Network and Access Network

    In this paper, the trade-off on resource allocation between multi-hop backhaul and access is investigated. Multi-hop, treated as a special case of mesh, is very useful in non-contention based network. The authors assume in-band relay backhaul and access share the same resource. Based on calculation and simulation, the relationship among...

    Provided By IARIA

  • White Papers // Apr 2012

    Assessment of LTE Uplink Power Control With Different Frequency Reuses Schemes

    Single Carrier Frequency Division Multiple Access (SC-FDMA) is the access scheme chosen by 3GPP for uplink UTRAN Long Term Evolution project (LTE). As SC-FDMA provides intra-cell orthogonality, one of the main reasons for performance degradation is the Inter-Cell Interference (ICI). This degradation is accentuated by the frequency reuse of 1...

    Provided By IARIA

  • White Papers // Apr 2012

    MediaSense - An Internet of Things Platform for Scalable and Decentralized Context Sharing and Control

    Research in Internet-of-Things infrastructures has so far mainly been focused on connecting sensors and actuators to the Internet, while associating these devices to applications via web services. This has contributed to making the technology accessible in areas such as smart-grid, transport, health, etc. These early successes have hidden the lack...

    Provided By IARIA

  • White Papers // Apr 2012

    Mobile Robot Localization by RFID Method

    This paper explores the merits of the indoor positioning system using Radio-Frequency IDentification (RFID) technology for mobile robots. The indoor positioning function by the Received Signal Strength Indicator (RSSI) and the Link Quality Indicator (LQI) method is developed first to determine the location of the robot. The RSSI and the...

    Provided By IARIA

  • White Papers // Apr 2012

    Joint Design of RFID Reader and Tag Anti-Collision Algorithms: A Cross-Layer Approach

    This paper investigates the potential interactions between reader and tag anti-collision algorithms of passive RFID (Radio Frequency IDentification) systems. Conventionally, reader and tag anti-collision algorithms are designed by assuming that they are independent from each other. In practice, however, readers and tags usually operate in the same frequency band. Therefore,...

    Provided By IARIA

  • White Papers // Apr 2012

    Wireless Network Localization - Optimization Processing

    This paper deals with localization in wireless cellular networks. The authors performed measurement of the received signal strength in and around Brno city and stored the collected data. The localization approach uses multi-slope channel models to estimates the propagation distance from the signal strength. Results are processed by two localization...

    Provided By IARIA

  • White Papers // Apr 2012

    Stereo Video Disparity Estimation Using Multi-Wavelets

    Disparity estimation in stereo video processing is a crucial step in the generation of a 3D view of a scene. In this paper, a multi-wavelet based stereo correspondence matching technique for video is proposed. A multi-wavelet transform is first applied to a pair of stereo frames. Correspondence matching is initially...

    Provided By IARIA

  • White Papers // Apr 2012

    A LUT Baseband Digital Pre-Distorter for Linearization

    This paper proposes a Look-Up-Table Digital Pre-Distorter (LUT DPD) for PA linearization with baseband predistorting procedure. Memory effect can be compensated with Memory Polynomial (MP) modelisation for the wideband applications. Measurements are realized on a PA ZFL-2500 driven by a modulated 16QAM signal with 3.84MHz bandwidth at the carrier frequency...

    Provided By IARIA

  • White Papers // Apr 2012

    Estimating Perceived Video Quality From Objective Parameters in Video Over IP Services

    In Video over IP services, perceived video quality heavily depends on parameters such as video coding and network Quality of Service. This paper proposes a model for the estimation of perceived video quality in video streaming and broadcasting services that combines the aforementioned parameters with other that depend mainly on...

    Provided By IARIA

  • White Papers // Apr 2012

    A Radio-Resource Switching Scheme in Aggregated Radio Access Network

    In an Aggregated Radio Access Network (A-RAN), wherein multiple Radio Access Technologies (RAT) coexist, different radio resource utilization in each RAT may result in decreasing Quality of Service (QoS). In this paper, the authors propose a radio resource switching scheme in A-RAN coexist to provide multi-modal mobile users with the...

    Provided By IARIA

  • White Papers // Apr 2012

    Robust Digital Video Watermarking in the Spatial and Wavelet Domain

    This paper presents two blind video watermarking techniques in the spatial and wavelet domain proposed by the authors and compares the two approaches. The original watermark and the original, unwatermarked videos are not required for the watermark extraction process. The two methods are combinations of spread-spectrum and quantization based techniques....

    Provided By IARIA