IARIA

Displaying 121-160 of 1223 results

  • White Papers // Jan 2013

    Optimization of Wireless Sensor Network Using Network Coding Algorithm

    A Wireless Sensor Network is a kind of ad hoc network that can be used to monitor a variety of environmental characteristics aiming, for instance, military purposes, environmental purposes, etc. A typical application of these networks is to collect and send historical information from all network sensor nodes to the...

    Provided By IARIA

  • White Papers // Jan 2013

    Towards Online Engagement Via the Social Web

    The blossom of Web 2.0 has created new opportunities for the enterprises. Web users are disseminating more information than ever before about their interests, their experiences with products and services, their thoughts and whatever interacts with them in a daily basis. The challenge for the enterprise is to exploit and...

    Provided By IARIA

  • White Papers // Jan 2013

    A Validation Model of Data Input for Web Services

    Web services inherited many well-known security problems of web applications and brought new ones. Major data breaches today are consequences of bad input validation at the application level. This paper presents a way to implement an input validation model for web services which can be used to prevent cross-site scripting...

    Provided By IARIA

  • White Papers // Jan 2013

    WebODRA - A Web Framework for the Object-Oriented DBMS ODRA

    The modern web requires new ways for creating applications. The authors present their approach combining a web framework with a modern object-oriented database. It makes it easier to develop web applications by raising the level of abstraction. In contrast to many existing solutions, where the business logic is developed in...

    Provided By IARIA

  • White Papers // Jan 2013

    A Comparison of MapReduce and Parallel Database Management Systems

    Businesses have come to rely on their data warehouse as a key component in their information technology infrastructure. The costs of the architecture to support these environments are significant. Therefore, choosing the wrong architecture can be a very costly decision. However, considerable confusion exists in relation to MapReduce and parallel...

    Provided By IARIA

  • White Papers // Jan 2013

    Merging Multidimensional Data Models: A Practical Approach for Schema and Data Instances

    Meta-model merging is the process of incorporating data models into an integrated, consistent model against which accurate queries may be processed. Within the data warehousing domain, the integration of data marts is often time-consuming. In this paper, the authors introduce an approach for the integration of relational star schemas, which...

    Provided By IARIA

  • White Papers // Jan 2013

    Provenance Policies for Subjective Filtering of the Aggregated Linked Data

    As part of LOD2.eu project and OpenData.cz initiative, the authors are developing an ODCleanStore framework enabling management of governmental linked data and providing web applications with a possibility to consume cleaned and integrated governmental linked data; the provided data is accompanied with data provenance and a quality score based on...

    Provided By IARIA

  • White Papers // Jan 2013

    Aspects of Append-Based Database Storage Management on Flash Memories

    New storage technologies, such as Flash and Non-Volatile Memories, with fundamentally different properties are appearing. Leveraging their performance and endurance requires a redesign of existing architecture and algorithms in modern high performance databases. Multi-Version Concurrency Control (MVCC) approaches in database systems, maintain multiple time-stamped versions of a tuple. Once a...

    Provided By IARIA

  • White Papers // Jan 2013

    Adoptation of Weil Pairing IBE for Secure File Sharing

    Competitive enterprise has lots of secret files in digital form, which is vulnerable to illegal online activity. The authors' target network accepts authorized users on registered machines. In general it is known that the traditional public-key scheme is suitable to strong authentication and encryption, but it is inferior to the...

    Provided By IARIA

  • White Papers // Jan 2013

    An Approach for Reduction of the Security Overhead in Smart Grid Communication Infrastructure Employing Dedicated Encryption

    Generally, a Smart Grid is an autonomous system consisting of an information collection network, a data management center, a power grid control center and power generation and transmission infrastructures. This paper considers an approach for partial reduction of the overhead implied by request for data security within the Smart Grid...

    Provided By IARIA

  • White Papers // Jan 2013

    A Real Time Synchronous V-C System with the Extracted Data from Buffering Function

    This paper introduces the state-of-art of the Real-time LVC (Live-Virtual-Constructive) interoperation systems that are being used for the purpose of warfare training and presents the first Real-time V-C (Virtual-Constructive) interoperation system building project. In this paper, the authors have developed a new UAV (Unmanned Aerial Vehicle) image simulation system, which...

    Provided By IARIA

  • White Papers // Jan 2013

    Dr Warehouse - An Intelligent Software System for Epidemiological Monitoring, Prediction, and Research

    The authors present Dr Warehouse, an extensible intelligent web-based system for epidemiological analyses. It features a data warehouse containing medical data about registered disease cases and relevant demographical data. There is also a segment of the system that is devoted to presentation and analysis of epidemiological data collected in the...

    Provided By IARIA

  • White Papers // Jan 2013

    Data and Provenance Management for Climate Effect Studies Adaption of Climate Data With Distribution Based Scaling for Hydrological Simulations

    Climate effect studies are currently of high interest to predict the impact of a changing climate. The results of such studies are used by decision makers as a basis for planning how to mitigate and adapt to the effects of expected climate changes. However, these studies require heavy computations on...

    Provided By IARIA

  • White Papers // Jan 2013

    Business Intelligence in an Educational Landscape

    In this paper, the authors report a work in progress about the effectiveness of Business Intelligence in the academic environment. Business management, competitiveness, excess of information and dispersion of data in the organizational environment have proven to be important barriers that need to be overcome by managers today, both in...

    Provided By IARIA

  • White Papers // Jan 2013

    Feasibility of the Implementation of a UML to XML Evolution Architecture Using Eclipse as Technological Ecosystem

    Unified Modeling Language (UML) and eXtensible Markup Language (XML) are two of the most commonly used languages in software engineering processes. One of the most critical of these processes is that of model evolution and maintenance. More specifically, when an XML schema is modified, the changes should be propagated to...

    Provided By IARIA

  • White Papers // Jan 2013

    Parameterized Attribute and Service Levels Semantic Matchmaking Framework for Service Composition

    The paper presents a parameterized and highly customizable semantic matchmaking framework. The matchmaking approach on which this framework is based distinguishes three types of matching: functional attribute-level matching, functional service-level matching, and non-functional matching. This paper focuses only on functional matching. A series of algorithms is advised for both attribute-level...

    Provided By IARIA

  • White Papers // Jan 2013

    Modeling and Simulation Versions of Business Process Using Petri Nets

    This paper proposes a solution for modeling and simulating flexible Business Processes (BP) using version concepts. It advocates a Model Driven Architecture approach to handle versions of BP. The paper presents, first, a meta model (VBP2M: Versioned Business Process Meta Model) for modeling versions of BP considering six perspectives of...

    Provided By IARIA

  • White Papers // Jan 2013

    Enhancing Distributed Data Mining Performance by Multi-Agent Systems

    Data Mining (DM) is focused on identifying patterns and trends from massive data integrated within a data warehouse. However, a single data mining technique has not been proven appropriate for every domain and data set. Data mining is a computationally intensive process involving very large datasets, affecting the overall performance...

    Provided By IARIA

  • White Papers // Jan 2013

    Sales Prediction With Parametrized Time Series Analysis

    When forecasting sales figures, not only the sales history but also the future price of a product will influence the sales quantity. At first sight, multivariate time series seem to be the appropriate model for this task. Nontheless, in real life history is not always repeatable, i.e. in the case...

    Provided By IARIA

  • White Papers // Jan 2013

    Mapping XML to Key-Value Database

    XML is a popular data format used in many software applications. Native XML databases can be used for persistence of XML documents or the document can be stored in a relational database. In this paper, the authors propose an alternative storage for XML documents based on key-value databases. They propose...

    Provided By IARIA

  • White Papers // Jan 2013

    Considerations About Implementation Variants for Position Lists

    Within \"Traditional\" database systems (row store), the values of a tuple are usually stored in a physically connected manner. In a column store by contrast, all values of each single column are stored one after another. This orthogonal storage organization has the advantage that only data from columns which are...

    Provided By IARIA

  • White Papers // Jan 2013

    Modeling a Data Storage System (DSS) for Seamless Real-Time Information Support From Information Manufacturing System (IMS)

    Now-a-days, a large number of enterprises operate in a business time schedule of 24?7. These enterprises need to deliver information as fast as possible for information support. Therefore, the information manufacturing system of the enterprises should have the ability for seamless real-time information support. Data storage system in the information...

    Provided By IARIA

  • White Papers // Jan 2013

    Typing XPath Subexpressions With Respect to an XML Schema

    This paper discusses typing XPath sub-expressions with respect to an XML schema, which is a new static analysis problem of XPath expressions. More formally, the typing problem is to decide whether there exists an XML document conforming to a given XML schema such that the nodes of the document matching...

    Provided By IARIA

  • White Papers // Jan 2013

    Finding Nearest Neighbors for Multi-Dimensional Data

    As one of the important research topics in the data mining field, the nearest neighbor search problem has been studied and various approaches have been proposed in different research scenarios. For example proposes a scheme for nearest neighbor search by hashing data points from a data set, so that for...

    Provided By IARIA

  • White Papers // Jan 2013

    Optimization of SuperSQL Execution by Query Decomposition

    SuperSQL is an extension of SQL that allows formatting and publishing of database contents into various kinds of application data directly as a result of a query. Possible application data output formats include, but are not limited to, HTML, PDF, XML, XLS, and Ajax-driven pages. Originally, the SuperSQL query is...

    Provided By IARIA

  • White Papers // Jan 2013

    On Using Object-Relational Technology for Querying LOD Repositories

    Query engines for managing RDF repositories based on relational technology represent an alternative to query engines based on triple-stores. The paper presents adaptation of object-relational technology for managing RDF data. The architecture of query engine for RDF databases is proposed: mapping of RDF graph model to object-relational representation is described,...

    Provided By IARIA

  • White Papers // Jan 2013

    Using Social Network Information to Identify User Contexts for Query Personalization

    In recent years, social networks have gained a huge popularity among internet users, serving diverse purposes and communities. Meanwhile, in data-oriented applications, the increasing amount of available data has made it hard for users to find the information they need in the way they consider relevant. To help matters, a...

    Provided By IARIA

  • White Papers // Jan 2013

    Clustering XML Data Streams by Structure based on Sliding Windows and Exponential Histograms

    To group online XML data streams by structure, this paper introduces an algorithm named the CXDSS-SWEH. It is a dynamic clustering algorithm based on sliding windows and exponential histograms. Firstly, the algorithm formalizes an XML document into a structure synopsis named Temporal Cluster Feature for XML Structure (TCFXS). Secondly, it...

    Provided By IARIA

  • White Papers // Jan 2013

    Capturing the History and Change Structure of Evolving Data

    Evo-graph is a model for data evolution that encompasses multiple versions of data and treats changes as first-class citizens. A change in evo-graph can be compound, comprising disparate changes, and is associated with the data items it affects. In previous papers, the authors have shown that recording data evolution with...

    Provided By IARIA

  • White Papers // Jan 2013

    Geometric Mean based Boosting Algorithm to Resolve Data Imbalance Problem

    Data imbalance problem has received a lot of attention in machine learning community because it is one of the causes that degrade the performance of classifiers or predictors. In this paper, the authors propose Geometric Mean based boosting algorithm (GM-Boost) to resolve the data imbalance problem. GM-Boost enables learning with...

    Provided By IARIA

  • White Papers // Jan 2013

    FIMIOQR: Frequent Itemsets Mining for Interactive OLAP Query Recommendation

    The authors propose in this paper an interactive query recommendation system, namely FIMIOQR. It is designed to help OLAP (On-Line Analytical Processing) users in their decision query writing task based on both a set of selected measures and decision queries log file. Their FIMIOQR system is designed to discover associations...

    Provided By IARIA

  • White Papers // Jan 2013

    Data Management According to the Good Scientific Practice

    Data Management in scientific and research processes needs to comply with rules defined in the Good Scientific Practice polices, e.g., issued by scientific institutes and research organizations. Typically these regulations include definitions to protect the data privacy and security throughout the entire lifecycle of the scientific data. Beginning from the...

    Provided By IARIA

  • White Papers // Jan 2013

    Primitive Operation Aggregation Algorithms for Improving Taxonomies for Large-Scale Hierarchical Classifiers

    Naive implementations of hierarchical classifiers that classify documents into large-scale taxonomy structures may face the contradiction between relevancy and efficiency performances. To address this problem, the authors focused on taxonomy modification algorithms for gradually improving the relevance performances of large-scale hierarchical classifiers. They developed four taxonomy modification algorithms that aggregate...

    Provided By IARIA

  • White Papers // Jan 2013

    A New Representation of WordNet Using Graph Databases

    WordNet is one of the most important resources in computation linguistics. The semantically related database of English terms is widely used in text analysis and retrieval domains, which constitute typical features, employed by social networks and other modern Web 2.0 applications. Under the hood, WordNet can be seen as a...

    Provided By IARIA

  • White Papers // Jan 2013

    An Implementation Model for Managing Data and Service Semantics in Systems Integration

    The ubiquity of data, services and computing devices demands a higher level of understanding of their real nature if one wants to create value-added services based on them. The human brain can understand the concepts behind these artifacts and find appropriate conceptual links easily, however, by applying semantic technologies (ontologies,...

    Provided By IARIA

  • White Papers // Jan 2013

    About Summarization in Large Fuzzy Databases

    Moved by the need increased for modeling of the fuzzy data, the success of the systems of exact generation of summary of data, the authors propose in this paper a new approach of generation of summary from fuzzy data called \"Fuzzy-SaintEtiQ\". This approach is an extension of the SaintEtiQ model...

    Provided By IARIA

  • White Papers // Jan 2013

    Shrinking Data Balls in Metric Indexes

    Some of the existing techniques for approximate similarity retrieval in metric spaces are focused on shrinking the query region by user-defined parameter. The authors modify this approach slightly and present a new approximation technique that shrinks data regions instead. The proposed technique can be applied to any metric indexing structure...

    Provided By IARIA

  • White Papers // Jan 2013

    Explanations of Recommendations Considering Human Factors in Recommender Systems

    Traditional evaluation metrics based on statistical formulas employed to assess the performance of a recommender system are now considered to be inadequate when utilized solely. New metrics considering the quality of user-system interaction alongside with traditional ones have been proposed in evaluation process in order to arrive at more adequate...

    Provided By IARIA

  • White Papers // Jan 2013

    Parallel Genetic Algorithm Model to Extract Association Rules

    Over the past generation, the process of discovering interesting association rules in data mining and knowledge discovery has become a cornerstone of contemporary decision support environments. While most of the existing algorithms do indeed focus on discovering high interestingness and accuracy relationships between items in the databases, they tend to...

    Provided By IARIA

  • White Papers // Jan 2013

    Parallel Processing of Multiple Graph Queries Using MapReduce

    Recently the volume of the graph data set is often too large to be processed with a single machine in a timely manner. A multi-user environment deteriorates this situation with many graph queries given by multiple users. In this paper, the authors address the problem of processing multiple graph queries...

    Provided By IARIA

  • White Papers // Apr 2012

    Estimation of Perceived Quality in Convergent Services

    Triple-Play (3P) and Quadruple-Play (4P) services are being widely offered by telecommunication services providers. Such services must be able to offer equal or higher quality levels than those obtained with traditional systems, especially for the most demanding services such as broadcast IPTV. This paper presents a matrix-based model, defined in...

    Provided By IARIA

  • White Papers // Apr 2012

    Unified Methodology for Broadband Behavior Measurements in the Acreo National Testbed

    The continuous evolution of Internet and Internet applications increases the demands on access networks. Understanding user behavior and Internet usage patterns is fundamental in developing future access networks that meet technical as well as end user needs, and from a societal point of view it is equally important to correctly...

    Provided By IARIA

  • White Papers // Apr 2012

    A Hybrid VOX System Using Emulated Hardware Behaviors

    This paper analyzes two well-known but complementary speech detection algorithms, and combines them to create a robust, low complexity method of speech detection. Software emulation of behaviors important in venerable hardware-based voice-operated switches is key to hybrid system performance. The authors test the hybrid system in the context of amateur...

    Provided By IARIA

  • White Papers // Apr 2012

    Adaptive Resource Allocation Mechanism for Broadband Mobile Network

    Mobile networks have been continuously developed from 3.5G to 3.9G/4G with high speed wireless technologies (i.e., broadband mobile network). So, mobile networks need to provide more sufficient QoS mechanism to provide enhanced user's satisfaction. In this paper, the authors propose a new adaptive resource allocation mechanism based on utility function...

    Provided By IARIA

  • White Papers // Apr 2012

    Real Time Telecom Revenue Assurance

    Telecommunication industry has seen phenomenal growth and intense competition in recent times. Basic connectivity has been commoditized and service providers need to provide personalized and differentiated services to stay competitive and form lasting customer relationship. One of the ways they can do this is by analyzing the data that are...

    Provided By IARIA

  • White Papers // Apr 2012

    Performance Modeling of Database Servers in a Telecommunication Service Management System

    Resource optimization mechanisms, as admission control and traffic management, require accurate performance models that capture the dynamics of the system during high loads. The main objective of this paper is to develop an accurate performance model for database servers in a telecommunication service management system. The authors investigate the use...

    Provided By IARIA

  • White Papers // Jul 2011

    An Analysis of Secure Interoperation of EPC and Mobile Equipments

    4G architecture is the latest 3GPP development when it comes to mobile networks design and optimization. Designed initially for data, but having a flexible architecture, 4G is capable of integrating IMS, this way bringing in voice and services. 3GPP wanted to facilitate the migration from 3G and non-3GPP solutions to...

    Provided By IARIA

  • White Papers // Jul 2011

    Constant-rate Adaptive Space-Time Code Selection Technique for Wireless Communications

    constant-rate space-time code selection technique for transmit antenna diversity systems is proposed. The proposed technique selects both the space-time code and the number of transmitter antennas through a comparison of equivalent SISO channels with a set of predetermined threshold levels, using only four bits for feedback. The constant-rate transmission is...

    Provided By IARIA

  • White Papers // Jul 2011

    Handover Optimization in WiMAX Vehicular Communications

    The WiMAX communications for vehicular is a topic of significant interest for research and industry communities, on both V2V (Vehicle-To-Vehicle) and V2I (Vehicle-To-Infrastructure) situations. This paper presents results of an experimental study, simulation based, directed to determine multi-dimensional regions where different lower layers parameters have influence on the overall handover...

    Provided By IARIA

  • White Papers // Jul 2011

    Mobile Phone Security Awareness and Practices of Students in Budapest

    The present paper presents the results of a survey about users' security practices regarding mobile phone usage that took place in 4 Universities of Budapest in February 2010. The authors targeted an extended pool of respondents reaching 959 answers. The general users' feeling is that mobile phone communication is secure...

    Provided By IARIA

  • White Papers // Apr 2012

    A New Pattern Template to Support the Design of Security Architectures: A Case Study

    New work paradigms are emerging in the information technology sector, which are causing changes in the technological infrastructures of organizations' information systems. Organizations should adapt to all these changes in order to guarantee the confidentiality, integrity and availability of their information assets. Organizations should therefore seek support from security architectures....

    Provided By IARIA

  • White Papers // Apr 2012

    iPrivacy: A Distributed Approach to Privacy on the Cloud

    The increasing adoption of Cloud storage poses a number of privacy issues. Users wish to preserve full control over their sensitive data and cannot accept that it is accessible by the remote storage provider. Previous research was made on techniques to protect data stored on untrusted servers; however, the authors...

    Provided By IARIA

  • White Papers // Apr 2012

    A Trust-Based Approach for Secure Packet Transfer in Wireless Sensor Networks

    Trust is an important factor in transferring data from the source to destination in wireless sensor networks. If any sensor node fails to transfer the data, the Dynamic Source Protocol calculates the alternate path. Currently, the Dynamic Source Protocol does not have any built-in functionality to calculate an alternate path...

    Provided By IARIA

  • White Papers // Apr 2012

    Eruption of Policy in the Charging Arena

    In the early days of mobile Internet, bandwidth was not an issue, so price plans were quite simple, very often expressed in the form of a flat rate or "All you can eat" pricing. As long as capacity was greatly available, this was a convenient and simple way to define...

    Provided By IARIA

  • White Papers // Apr 2012

    The Secure Access Node Project: A Hardware-Based Large-Scale Security Solution for Access Networks

    Providing network security is one of the most important tasks in today's Internet. Unfortunately, many users are not able to protect themselves and their networks. Therefore, a novel security concept is presented to protect users by providing security measures at the Internet Service Provider level. Already now, Internet Service Providers...

    Provided By IARIA

  • White Papers // Jul 2011

    Efficient Rate Adaptive Resource Allocation Scheme in Uplink OFDMA Wireless Systems

    The problem of resource allocation for the uplink of wireless SISO-OFDMA systems is investigated. To relieve heavy computational burden, a suboptimal, but efficient scheme is devised which maximizes the sum of the users' data rates subject to constraints on the per user transmitted power and minimum data rate requirements among...

    Provided By IARIA

  • White Papers // Jul 2011

    Resource Allocation Algorithm for MISO-OFDMA Systems With QoS Provisioning

    The problem of user selection and resource allocation for the downlink of wireless systems operating over a frequency-selective channel is investigated. It is assumed that the Base Station (BS) uses many antennas, whereas a single antenna is available to each user (Multiple Input Single Output - MISO case). To relieve...

    Provided By IARIA

  • White Papers // Jul 2011

    An Effective Transmit Weight Design for DPC With Maximum Beam in Multi-User MIMO Downlink

    A novel transmit scheme is proposed for the cancellation of Inter-User Interference (IUI) and the improvement of achievable sum-rate of system in Multi-User Multiple-Input Multiple Output (MU-MIMO) downlinks. Particle Swarm Optimization (PSO) algorithm is employed to solve the constrained nonlinear optimization problem for obtaining the optimal transmit weights. Compared with...

    Provided By IARIA

  • White Papers // Jul 2011

    MLD-Based MFSK Demodulation on MIMO Frequency Selective Fading Channel

    In this paper, the authors have proposed the novel demodulation scheme of MFSK (M-ary Frequency Shift Keying) signals on MIMO frequency selective channel. For demodulating MIMO MFSK signals, they previously used the FDE (Frequency Domain Equalization) using CP (Cyclic Prefix). In order to further improve the BER characteristics, the novel...

    Provided By IARIA

  • White Papers // Jul 2011

    The Impact of Antenna Directivity and Channel Bandwidth on the Power Spectral Density of Wideband and UWB MISO Channels

    The combination of MIMO with WideBand (WB) and Ultra-WideBand (UWB) systems imply many new effects, which make the conventional channel models developed for narrowband transmissions to be inadequate for communications with large bandwidth. In this paper, the authors use the Fourier analysis of the Cross-Correlation Functions (CCF)s between the SpaceTime-Frequency...

    Provided By IARIA

  • White Papers // Jul 2011

    A Smart Predictive Link Layer Trigger Algorithm to Optimize Homogenous/Heterogeneous Networks WiFi Handover Decisions

    In traditional wireless networks, link layer metrics used to trigger handover are mainly signal quality based, such as Received Signal Strength (RSS). While signal quality is one major reason for poor performance in traditional wireless networks, WiFi networks are special in that there is another major reason for poor performance,...

    Provided By IARIA

  • White Papers // Jul 2011

    Vertical Fast Handoff in Integrated WLAN and UMTS Networks

    Mobility management and on top of that, vertical handoffs remains as one of the most challenging obstacles in 4G evolution. In this paper, the authors present Vertical Fast Handoff protocol as a solution to the mobility issues in integrated WLAN-UMTS networks which utilizes Early Binding Update technique to achieve reasonable...

    Provided By IARIA

  • White Papers // Jul 2011

    A Hop-Oriented Position Estimation Algorithm for Wireless Sensor Networks

    A wireless sensor network consists of a group of sensor nodes that broadcast the sensed data to the base station hop by hop via radio frequency. It is useful only if the sensed data are associated with the locations of the sensor nodes. Therefore, location estimation of sensor nodes has...

    Provided By IARIA

  • White Papers // Jul 2011

    Exploiting Movement Synchronization to Increase End-to-End File Sharing Efficiency for Delay Sensitive Streams in Vehicular P2P Devices

    A significant aspect of wireless systems is the intermittent-connectivity experienced by nodes, where sudden network partitioning problems rarely allow a connected path between a source node and its destination. Replication of any requested object and redundancy face the requests' failures whereas they create severe duplications and aggravate the capacity of...

    Provided By IARIA

  • White Papers // Jul 2011

    Investigation of the Correlation Effect on the Performance of V-BLAST and OSTBC MIMO Systems

    In this paper, the authors study the effect of the spatial correlation between multiple antennas on the performance of the MIMO systems in flat fading channels. As performances metrics, the Bit Error Rate (BER) and Symbol Error Rate (SER) are investigated for Orthogonal Space Time Block Coding (OSTBC) and Vertical...

    Provided By IARIA

  • White Papers // Jul 2011

    Simple Detection Schemes for the Alamouti Code Assisted V-BLAST (ACAV) System

    The Alamouti Code Assisted V-BLAST (ACAV) is a promising hybrid MIMO transmission scheme that is adopted by IEEE 802.11n-2009 (WiFi) recently. It combines Spatial Multiplexing (SM) and Alamouti Space-Time Block Codes (STBC) so that if the Alamouti symbols were detected first, which are generally more reliable due to STBC, subsequent...

    Provided By IARIA

  • White Papers // Jul 2011

    Radiation Pattern Behaviour of Reconfigurable Asymmetry Slotted Ultra Wideband Antenna

    This paper presents the results of radiation pattern measurement of small reconfigurable slotted Ultra WideBand (UWB) antennas. The measurements were conducted by using RF measurement and instrumentation facilities, software tools available at WCC of Universiti Teknologi Malaysia. The original antenna's geometry proposed is slotted antenna with L and U slots....

    Provided By IARIA

  • White Papers // Jul 2011

    Radio Resource Unit Allocation and Rate Adaptation in Filter Banks Multicarrier System

    In this paper, the effect of the effective channel gain and the SNR using the improved Joint Resource Unit (RU) Allocation and Bit loading (JRAB) on a Filter Banks MultiCarrier (FBMC) system are analyzed. Computer simulations have been performed assuming a hypothetical WiMAX scenario in which an FBMC system substitutes...

    Provided By IARIA

  • White Papers // Jul 2011

    An Experimental Study of ICI Cancellation in OFDM Utilizing GNU Radio System

    Inter-Carrier-Interference (ICI) is an effect that noticeably degrades the quality of the Orthogonal Frequency Division Multiplexing (OFDM) signal. In this work, several proposed ICI cancellation schemes have been tested using open source Software Defined Radio (SDR) named GNU Radio. The GNU Radio system used in the experiment had one Universal...

    Provided By IARIA

  • White Papers // Jul 2011

    Dynamic Group PCI Assignment Scheme

    The Physical Cell Identity (PCI) is used to identify femtocell in LTE femtocell as the physical layer identity. Due to the fact that the PCIs are normally allocated without planning; and the limitation of the number of PCI, the cross-tier PCI confusion problem has arisen. The current solution in 3GPP...

    Provided By IARIA

  • White Papers // Mar 2011

    Replica Placement Algorithm Based on Peer Availability for P2P Storage Systems

    Peer-To-Peer (P2P) technology is an emerging approach to overcoming the limitations of the traditional client server architecture. However, building a highly available P2P system is quite challenging, in particular a P2P storage system. The reason is due to the fundamental nature of P2P systems: peers can join and leave at...

    Provided By IARIA

  • White Papers // Mar 2011

    Functionality of a Database Kernel for Image Retrieval

    This paper presents a software tool that implements a dedicated multimedia database management server for managing alphanumerical and multimedia data collections from medical domain, along with the file structure used. The server is designed to manage medium sized personal digital collections. The recognized commands and the functionality of the server...

    Provided By IARIA

  • White Papers // Mar 2011

    Study of a Secure Backup Network Mechanism for Disaster Recovery and Practical Network Applications

    A practical mechanism for a file-backup system concept is proposed. In this paper, it is demonstrated that a highly secure file backup mechanism can be achieved by combining technologies that implement the following: spatial random scrambling of file data, subsequent random fragmentation of the file, the duplication and encryption of...

    Provided By IARIA

  • White Papers // Mar 2011

    A Multipath Approach for Improving Performance of Remote Desktop Transmission

    Remote desktop systems enable business users to access critical data located in the office from outside it with a mobile thin client or any other portable ubiquitous devices without having to worry about data leakage. However, high latency and low bandwidth in wireless-network environments may degrade the performance of remote...

    Provided By IARIA

  • White Papers // Mar 2011

    A Proactive Energy-Efficient Technique for Change Management in Computing Clouds

    The intensive use of portable and thin client devices along with the continuously increasing cost of IT management have pushed large IT companies to look for solutions that allow the use of such devices to access the massive computing power of supercomputers available at the company. The cloud computing concept...

    Provided By IARIA

  • White Papers // Jun 2010

    A Novel Fault Diagnosis Technique in Wireless Sensor Networks

    In sensor networks, performance and reliability depend on the fault tolerance scheme used in the system. With increased network size traditional fault tolerant techniques have proven inadequate. Further, identifying and isolating the fault is one of the key steps towards reliable network design. Towards this, the authors propose two new...

    Provided By IARIA

  • White Papers // Jun 2010

    Integrated System for Malicious Node Discovery and Self-Destruction in Wireless Sensor Networks

    With the tremendous advances of the wireless devices technology, securing wireless sensor networks became more and more a vital but also a challenging task. In this paper, the authors propose an integrated strategy that is meant to discover malicious nodes within a sensor network and to expel them from the...

    Provided By IARIA

  • White Papers // Jun 2010

    A Novel Approach to Indoor Location Systems Using Propagation Models in WSNs

    This paper describes a location system for persons and objects in an indoor environment, where wireless nodes can include sensors and provide unique identifiers. The system nodes, using ZigBee technology, can function as RFID tags, having each one a unique EPC identification number. Sensors can be associated with the wireless...

    Provided By IARIA

  • White Papers // Jun 2010

    New Sensing Model for Wireless Sensor Networks

    The paper presents a new model of sensing coverage, supposed to achieve a better efficiency of energy utilization for remote sensing, by using an adaptable radii and angles algorithm. Coverage areas of circular sector shapes, adapted to the residual energy available, are used. The model was first introduced by the...

    Provided By IARIA

  • White Papers // Jun 2010

    FastM: Design and Evaluation of a Fast Mobility Mechanism for Wireless Mesh Networks

    In terms of mobility approaches for Wireless Mesh Networks, usually these approaches introduce high latency in the handover process and do not support real-time services and applications. Moreover, mobility is decoupled from routing, which leads to inefficiency to both mobility and routing approaches with respect to mobility. In this paper,...

    Provided By IARIA