IARIA

Displaying 321-360 of 1223 results

  • White Papers // Nov 2011

    Capturing Mobile Devices Interactions Minimizing the External Influence

    Mobile computing has become an integral part of everyday life for the new 'Information and Knowledge Society'. The new generation of mobile devices and their full connection capabilities enable users to access a wide choice of services and knowledge from everywhere. Owing to this tendency, access to these services has...

    Provided By IARIA

  • White Papers // Nov 2011

    UbiPOL: A Platform for Context-Aware Mobile Device Applications in Policy Making

    UbiPOL is a context-aware platform for policy making. At its core, the UbiPOL platform has an essential framework of web services and APIs. It is intended to aid and support the development of location-based and context-aware applications in the field of policy making. Software developers can make use of UbiPOL...

    Provided By IARIA

  • White Papers // Nov 2011

    A Fast Bandwidth Request and Grant Method for IEEE 802.16 OFDMA/TDD Systems

    In the design of a contention-based bandwidth request scheme, decrease in data transmission delay is the most important factor. This paper proposes a new CDMA-based bandwidth request method in which the bandwidth request code contains the channel quality information and amount of bandwidth required by a mobile station. A mobile...

    Provided By IARIA

  • White Papers // Nov 2011

    External Interference-Aware Distributed Channel Assignment in Wireless Mesh Networks

    Interference is one of the major causes for performance degradation in wireless networks. Channel assignment algorithms have been proven successful to decrease the network-wide interference by using non-overlapping channels for otherwise interfering links. However, external co-located networks and devices are usually not considered in the channel assignment procedure, since they...

    Provided By IARIA

  • White Papers // Nov 2011

    Communication System With SISO Channel Decoding Using Bit Stuffing

    This paper introduces a communication system with typically wireless transmission, with SISO convolutional decoding using predefined reliability values at input of the SISO decoder. "Dummy" bits are stuffed into the information which is to be transmitted over a noisy channel and SISO decoded. Stuffed bits have to be known at...

    Provided By IARIA

  • White Papers // Nov 2011

    An Approach to Enhance the Timeliness of Wireless Communications

    Wireless technologies are the present and the future of network communications. However, the support of real-time data transmission in wireless communications - providing support for execution of well-timed networked operations - is still an open issue, not fully addressed by current wireless network standards and technologies. Thus, this paper proposes...

    Provided By IARIA

  • White Papers // Nov 2011

    Opportunistic Spectrum Sharing Scheme for Secondary WiFi-Like Devices in TV White Spaces

    Secondary spectrum access is a promising approach to improve spectrum utilization by enabling new wireless systems to opportunistically use and efficiently share the licensed bands. This paper targets a WiFi-like reuse of available spectrum in the TV bands and proposes a novel cooperative centralized spectrum sharing scheme that enables protection...

    Provided By IARIA

  • White Papers // Nov 2011

    Interference Control Technology for Heterogeneous Networks

    To eliminate dead spots like home or office and let multiple users efficiently use limited frequency resources by providing a better mobile communication environment that enables high-capacity data transmission service, the demand for a small base station is increasing. Accordingly, the research for automatically minimizing the interference and increasing the...

    Provided By IARIA

  • White Papers // Nov 2011

    Mobile Learning (mLearning) Based on Cloud Computing: mLearning as a Service (mLaaS)

    Despite its hype, cloud computing, with its dynamic scalability and virtualized resources usage, is being widely deployed for several applications in many organizations. It is envisioned that, in the near future, cloud computing will have a significant impact in the educational and learning environment, enabling its own users (i.e., learners,...

    Provided By IARIA

  • White Papers // Nov 2011

    Assistive Mobile Software for Public Transportation

    The need of mobility on public transport for persons with visual impairment is mandatory. While traveling on a public transport, the simple ability to know the current location is almost impossible for such persons. To overcome this hurdle, the authors developed an assistive application that can alert its user to...

    Provided By IARIA

  • White Papers // Nov 2011

    Mobility in a Personalized and Flexible Video-Based Transmedia Environment

    This paper addresses the effective design of Transmedia environments to generate personalized additional video information from iTV, PC and mobile devices with a special focus on mobile devices. It presents the opportunities and challenges of the inclusion of mobile devices on this ubiquitous environment, turning it into a true "Ecosystem...

    Provided By IARIA

  • White Papers // Nov 2011

    Pervasive Computing in Embedded Systems: Designing Cooperative Applications for Real Environments

    The dramatic growth of the amount of information that is made available through computer systems and the increasing need to access relevant information anywhere at any time are more and more overwhelming the cognitive capacity of human users. Instead of providing the right information at the right time, current computer...

    Provided By IARIA

  • White Papers // Nov 2011

    Challenges in the Planning, Deployment, Maintenance and Operation of Large-Scale Networked Heterogeneous Cooperating Objects

    Efficient deployment and management have been identified to be key challenges for the acceptance of solutions based on Cooperating Objects (COs). The operations for CO deployment and management can be classified into five phases in each of which several challenges and issues are emphasized. This paper presents the PLANET project...

    Provided By IARIA

  • White Papers // Jul 2011

    Improvement of Channel Decoding Using Block Cypher

    This paper introduces two methods for the improvement of performance of channel coding using cryptography, based on concatenation of codes. Cryptography as an outer code is combined with channel coding as an inner code. The first method improves decoding of cryptographic functions. The second one uses the first method for...

    Provided By IARIA

  • White Papers // Jul 2011

    Distortion Free Steganographic System Based on Genetic Algorithm

    Steganography is the art of secret communication. Its purpose is to hide the very presence of communication as opposed to cryptography whose goal is to make communication unintelligible to those who do not possess the right keys. This paper shows that most of the steganographic systems proposed during the past...

    Provided By IARIA

  • White Papers // Jul 2011

    Optimal Activation of Intrusion Detection Agents for Wireless Sensor Networks

    Recent technological advancements and low price of deployment and maintenance of Wireless Sensor Networks (WSNs) allow their use in numerous applications in industry, research, and commerce, in order to gather environmental data in an unattended manner. Since, WSNs usually function in open environments, they may become a target of attacks...

    Provided By IARIA

  • White Papers // Jul 2011

    GeCSen - A Generic and Cross-Platform Sensor Framework for LocON

    In this paper, the authors present a generic and crossplatform sensor framework for the LocON location and sensor middleware. This framework is developed using C++/Qt. Sensor information is rapidly gaining importance in automating processes and ubiquitous computing, and so it is for projects like FP7 LocON where the main goal...

    Provided By IARIA

  • White Papers // Jul 2011

    Securing Off-Card Contract-Policy Matching in Security-By-Contract for Multi-Application Smart Cards

    The Security-by-Contract (SC) framework has recently been proposed to support applications' evolution in multi-application smart cards. The key idea is based on the notion of contract, a specification of the security behavior of an application that must be compliant with the security policy of a smart card. In this paper,...

    Provided By IARIA

  • White Papers // Jul 2011

    MagiSign: User Identification/Authentication Based on 3D Around Device Magnetic Signatures

    In this paper, the authors present "MagiSign", a new user identification/authentication technique based on 3D magnetic signatures created in the space around a (mobile) device. The main idea is to influence magnetic (compass) sensor embedded in some mobile devices (e.g., iPhone 3GS, G1/2 Android) using a properly shaped magnet. The...

    Provided By IARIA

  • White Papers // Jul 2011

    Classification of Mobile P2P Malware Based on Propagation Behaviour

    With a multifold increase in the number of mobile users over past few years, mobile malware has emerged as a serious threat for resource constrained handheld devices. From experience of the Internet malware attacks like CodeRed and Slammer, it may not be difficult to predict the extent of devastation mobile...

    Provided By IARIA

  • White Papers // Jul 2011

    Link Stability in MANETs Routing Protocols

    Mobile Ad hoc NETworks (MANETs) is a promising communication paradigm for the emerging collaborative environments, which do not need an underlying stable, centralized routing and management infrastructure. In this paper, the authors propose a particular approach for the design of a mobile routing protocol focused on the stability (measured as...

    Provided By IARIA

  • White Papers // Jul 2011

    A Device-Aware Spatial 3D Visualization Platform for Mobile Urban Exploration

    Mobile devices displaying 2D map representations are already commonly used for the exploration of urban surroundings on the move. Even though mobile detailed 3D visualizations promise to be an attractive way to cope with the increasing amount of georeferenced information, their widespread use is hampered by the fragmentation of today's...

    Provided By IARIA

  • White Papers // Jul 2011

    QoS Aware Mixed Traffic Packet Scheduling in OFDMA-Based LTE-Advanced Networks

    In this paper, a packet scheduling framework is proposed for LTE-Advanced downlink transmission. The proposed framework adds the new functionality of an adaptive TD scheduler with built-in congestion control to the existing conventional Quality of Service (QoS) aware packet scheduling algorithms. It optimizes multiuser diversity in both the time and...

    Provided By IARIA

  • White Papers // Jul 2011

    M2Learn Open Framework: Developing Mobile Collaborative and Social Applications

    This paper presents M2Learn framework as an open platform, which facilitates the development of mobile learning and ubiquitous applications. The main features of this framework are: transparent management of multiple location-based technologies including GPS and cell towers; identification of objects through RFID; support for motion sensors (e.g., G-Sensor); interoperability with...

    Provided By IARIA

  • White Papers // Jul 2011

    Next Generation Network Architecture for Integration of Wireless Access Networks

    Motivation for the development of Next Generation Networks (NGN) concept is not only the success of mobile technology and growing popularity of IP-based multimedia services but also required cost savings, limited address space and fueling competition and collaboration. This paper proposes a solution for seamless interworking between network domains for...

    Provided By IARIA

  • White Papers // Jul 2011

    A Mobile Internet Service Consistency Framework

    As more and more Internet services migrate to mobile terminal, it is very necessary to carry out the service consistency between traditional Internet and mobile internet when service convergence. Unfortunately, current frameworks can not satisfy the requirements of consistency of service, for the difficulties in realize the coherence and continuity...

    Provided By IARIA

  • White Papers // Jul 2011

    Design and Development of an Interoperation Framework in a Smart Space Using OSGi

    This paper presents an approach towards interoperating, i.e., working together with heterogeneous objects in a ubiquitous computing environment. A framework for interoperation in a ubiquitous environment as a ubiquitous service is proposed here. Smart spaces and environments like smart homes, smart healthcare system, and smart vehicular systems are the important...

    Provided By IARIA

  • White Papers // Jul 2011

    Bluetooth and File system to Manage a Ubiquitous Mesh Network

    Hixosfs is a filesystem that lets one manage a network of Bluetooth devices. The authors have analyzed this filesystem in contexts of great movement and file sharing systems which requires high performance time. They study the system both for the management and to extract statistics. Ubiquitous multimedia computing will change...

    Provided By IARIA

  • White Papers // Jul 2011

    Wireless Service Developing for Ubiquitous Computing Environments Using J2ME Technologies

    From some years ago, technologies are ubiquitous, omnipresent and integrated seamlessly in the common activities. There is a need for developing services and applications that use all the capabilities of mobile devices available, for connectivity and data processing. Java 2 Micro Edition (J2ME) technology develops these services for use in...

    Provided By IARIA

  • White Papers // Jul 2011

    Generating Modest High-Level Ontology Libraries for Smart-M3

    Web Ontology Language (OWL) allows structuring smart space content in high-level terms of classes, relations between them, and their properties. In Smart-M3, a Semantic Information Broker (SIB) maintains the smart space in low-level terms of triples, based on Resource Description Framework (RDF). This paper describes SmartSlog, the authors' solution for...

    Provided By IARIA

  • White Papers // Jul 2011

    Experimental Comparison of Frequency Hopping Techniques for 802.15.4-Based Sensor Networks

    Frequency hopping communication schemes represent an attractive alternative for interconnecting low power wireless sensor nodes operating in unlicensed bands. The use of multiple communication channels can in fact mitigate the negative effects of interference induced by collocated wireless networks and potentially results in improved reliability. With this respect, quite a...

    Provided By IARIA

  • White Papers // Jul 2011

    Impact of the Parameterization of IEEE 802.15.4 Medium Access Layer on the Consumption of ZigBee Sensor Motes

    This paper presents an analysis of the impact that the parameterization of the CSMA/CA algorithm (employed by IEEE 802.15.4 Medium Access Layer) has on the consumption of ZigBee motes. For this purpose, the paper introduces an analytical model that permits to compute the mean drain current of low duty cycle...

    Provided By IARIA

  • White Papers // Jul 2011

    Game Theory Based Dynamic RRM for Reconfigurable WiMAX/WLAN System

    This paper proposes, analyzes and evaluates a novel user-oriented Radio Resource Management (RRM) strategies for coexisting WiMAX/WLAN reconfigurable system. The proposed strategies are based on game theory concepts, where games are dynamically played depending on the system condition with the applications on the terminal modeled as players. User's terminals have...

    Provided By IARIA

  • White Papers // Jul 2011

    Anomaly Detection Framework for Tracing Problems in Radio Networks

    This paper shows a novel concept of using diffusion maps for dimensionality reduction when tracing problems in 3G radio networks. The main goal of the paper is to identify abnormally behaving base station from a large set of data and find out reasons why the identified base stations behave differently....

    Provided By IARIA

  • White Papers // Jul 2011

    A New Path Failure Detection Method for Multi-Homed Transport Layer Protocol

    Through its support for multi-homing, the Stream Control Transmission Protocol (SCTP) is a suitable solution to implement and manage user's mobility by abstracting multiple physical paths into a single end-to-end association. In order to detect the primary path failure, SCTP uses a strategy defined in the RFC2960 and mainly based...

    Provided By IARIA

  • White Papers // Jul 2011

    A Mechanism for Semantic Web Services Discovery in Mobile Environments

    This paper describes SeMoSD (Semantic Mobile Service Discovery), a mechanism for discovery of services in mobile environments based on web services technology. The service discovery mechanism was designed taking into account the resource constraints of mobile devices. Through SeMoSD, mobile devices are able to profit from the use of semantic...

    Provided By IARIA

  • White Papers // Jul 2011

    Towards Efficient Energy Management: Defining HEMS, AMI and Smart Grid Objectives

    Energy consumption has increased considerably in the recent years. The way to reduce and make energy consumption more efficient has become of great interest for researchers. One of the research areas is the reduction of energy consumption in users' residences. Efficiently managing and distributing electricity in the grid will also...

    Provided By IARIA

  • White Papers // Jul 2011

    Scalability of Distributed Dynamic Load Balancing Mechanisms

    A load balancing mechanism for large-scale systems should be distributed and dynamic in order to accomplish scalability and high availability. Also, it should be autonomic in order to ease network management. The recent development in utility computing architectures, such as the so-called cloud computing platforms, has increased the demand for...

    Provided By IARIA

  • White Papers // Jul 2011

    Moving to the Cloud: New Vision Towards Collaborative Delivery for Open-IPTV

    This paper provides a short description and visions about the convergence network architecture for an Open-IPTV model based Cloud. Also, it counts the benefits which derived from adoption of this architecture to mobility and security issues. With the new Open-IPTV model, the migration towards convergence networks between different Content Providers...

    Provided By IARIA

  • White Papers // Jul 2011

    Half-Band FIR Filters for Signal Compression

    An efficient design of equiripple half-band FIR filters for signal compression is presented. Solution of the approximation problem in terms of generating function and zero phase transfer function for the equiripple half-band FIR filter is shown. The equiripple half-band FIR filters are optimal in the Chebyshev sense. The closed form...

    Provided By IARIA