International Association of Engineers

Displaying 1-40 of 169 results

  • White Papers // Aug 2013

    Designing Optimized Architecture for Network Security Devices

    Cyber crimes are growing and it is expected that by 2017, the global cyber crime market would value at around $120 billion. It has been found that on an average, 18 users become victims of cyber crime. Viruses, malware, Trojans, worms, SQL injection and phishing are some of the malpractices...

    Provided By International Association of Engineers

  • White Papers // Jul 2012

    Triple Security Generator in Smart Authentication Using Data Mining Techniques

    This paper is to authenticate and work with playlists by using Triple Security Generator (TSG). It is used to evaluate with best suitable data mining functions, to explore and express features and grouping of music. Here, the authors have three methods to authenticate playlists. The recommender systems are popular social...

    Provided By International Association of Engineers

  • White Papers // Jul 2012

    A Conceptual Framework for Analyzing Pricing Strategies

    One of the most difficult, yet important, issues that a firm must decide is how much to charge for its product/ service. Furthermore, considering the pressure of the developing technologies that shifts the consumers away from traditional distribution channels towards the Internet-based distribution channels, determining the most appropriate pricing strategy...

    Provided By International Association of Engineers

  • White Papers // Jul 2012

    A Comparative Study of Different Metric Structures: Thinking on GPU Implementations

    Now-a-days, similarity search is becoming a field of increasing interest because these kinds of methods can be applied to different areas in science and engineering, for instance, pattern recognition, information retrieval, etc. This search is carried out over metric indexes decreasing the number of distance evaluations during the search process,...

    Provided By International Association of Engineers

  • White Papers // Jul 2012

    Multi-Server Queuing Maximum Availability Location Problem With Stochastic Travel Times

    This paper extends the Queuing Maximum Availability Location Problem (Q-MALP) model to locate ambulances offering two kinds of services, i.e., Advance Life Support (ALS) and Basic Life Support (BLS). The development of the model includes the randomness of server availability and of travel times. This model is applied to a...

    Provided By International Association of Engineers

  • White Papers // Jul 2012

    A Combinatorial Application of Necklaces: Modeling Individual Link Failures in Parallel Network-on-Chip Interconnect Links

    The advent of the multicore era has made the execution of more complex software applications more efficient and faster. On-chip communication among the processing cores, in the form of packetized messages, is managed with the use of on-chip networks (NoCs). Routers handling on-chip communication are point-to-point topologically interconnected using parallel...

    Provided By International Association of Engineers

  • White Papers // Jul 2012

    Existence and Stability of Periodic Solution in Impulsive Hopfield Networks With Time-Varying Delays

    By constructing suitable Lyapunov functions, the authors study the existence, uniqueness and global exponential stability of periodic solution for impulsive Hopfield neural networks with time-varying delays. Their condition extends and generalizes a known condition for the global exponential periodicity of continuous Hopfield neural networks with time-varying delays. Further the numerical...

    Provided By International Association of Engineers

  • White Papers // Jul 2012

    Solving Limited-Memory BFGS Systems With Generalized Diagonal Updates

    Limited memory (L-BFGS) quasi-Newton methods are powerful tools within the field of optimization for solving problems when second derivative information is not available or computing the second derivative is too computationally expensive. In addition, L-BFGS matrices can be used to precondition iterative methods for solving large linear systems of equations....

    Provided By International Association of Engineers

  • White Papers // Jul 2012

    Traffic Engineering and Optimization Routing for VoIP Traffic in Wireless Mesh Networks

    This paper proposes a traffic engineering model to provide a better quality of service for VoIP in Wireless Mesh Networks (WMNs). The authors have developed an efficient algorithm in order to find the optimal path by combining the search for feasible routes with an optimization model to enhance the performance...

    Provided By International Association of Engineers

  • White Papers // Jul 2012

    On Selecting the Optimal Bayesian Network Model Construction Approach

    The construction of a Bayesian Network (BN) model entails two major tasks: realization of the model structure, and the calibration (parameterization) of the model. BN model constructors, ab initio, relied only on domain experts to define both the structure and parameters of a model. Currently, algorithms exist to construct BN...

    Provided By International Association of Engineers

  • White Papers // Jul 2012

    RSS and LEA Adaptation for Indoor Location Using Fingerprinting

    Fingerprinting is an indoor location technique, based on wireless networks, where data stored during the offline phase is compared with data collected by the mobile device during the online phase. In most of the real-life scenarios, the mobile node used throughout the offline phase is different from the mobile nodes...

    Provided By International Association of Engineers

  • White Papers // Jul 2012

    Prioritization of Applications for Software-as-a-Service Migration Using Total Life Cycle Costs and the Analytic Network Process

    The current state of the world economy has made Software-as-a-Service (SaaS) an appealing concept for organizations with a small budget for IT infrastructure investment. In a SaaS setup, companies subscribe software applications on a pay-per-use system from external service providers over the internet. However, these companies are looking for a...

    Provided By International Association of Engineers

  • White Papers // Jul 2012

    Optimal Prediction Intervals for Future Order Statistics From Extreme Value Distributions

    Prediction intervals for future order statistics are widely used for reliability problems and other related problems. The determination of these intervals has been extensively investigated. But the optimality property of these intervals has not been fully explored. In this paper, the authors discuss this problem for extreme value distributions. Introducing...

    Provided By International Association of Engineers

  • White Papers // Jul 2012

    Using Wavelet Transform and Boundary Elements for Flaw Detection

    There are several techniques of non-destructive damage detection in structures. However, these techniques are expensive and require an accurate examination of large extension of the structure under analysis. The numerical techniques can be helpful for non-destructive examination of structures. Such techniques may show a possible location of damage and thus...

    Provided By International Association of Engineers

  • White Papers // Jul 2012

    A Technique for Pulse RADAR Detection Using RRBF Neural Network

    Pulse compression technique combines the high energy characteristic of a longer pulse width with the high resolution characteristic of a narrower pulse width. The major aspects that are considered for a pulse compression technique are Signal to Side-lobe Ratio (SSR), noise and Doppler shift performances. The traditional algorithms like Auto-Correlation...

    Provided By International Association of Engineers

  • White Papers // Jul 2012

    Behavior Modeling of Coded Networks in Dynamic Networks

    Predicting, considering and designing all of the possible states of real world problems that are justified in artificial intelligence domain is relatively difficult or rather impossible for the experts. One reason is that the real world problems are highly complicated and they depend on a lot of variables. Furthermore, they...

    Provided By International Association of Engineers

  • White Papers // Jul 2012

    Multilevel Privacy Preserving in Distributed Environment Using Cryptographic Technique

    Data mining extracts pattern or knowledge from a large amount of data. In the applications that are based on information sharing, an additional challenge is faced; while dealing with data containing sensitive or private information. Common data mining techniques do not address this problem. Therefore, the knowledge extracted from such...

    Provided By International Association of Engineers

  • White Papers // Jul 2012

    Assured Content Delivery in the Enterprise

    In the era of wiki-leaks and the sensitivity of information assets in an enterprise system at all classification levels, there exists a need for assured content delivery. The promise of Digital Rights Management (DRM) has yet to be realized and knowledgeable analysts opine that it may never be achievable. It...

    Provided By International Association of Engineers

  • White Papers // Jul 2012

    Removal of Digital Envelopes in SET Protocol Using Diffie Hellmann Key Exchange Algorithm

    The E-marketing has grown exponentially over the last decade and has really helped the merchants to sell their products and services to large number of customers. The prime requirements for any E-commerce transactions are privacy, authentication, integrity maintenance and non-repudiation. The SET protocol has been developed by the major credit...

    Provided By International Association of Engineers

  • White Papers // Jul 2012

    Software Platform for Reporting, on the Internet, Data Stored From Sensors Used to Monitor Production Processes

    This paper presents a software platform developed for recording and storing data from sensors installed in locations that require constant monitoring of environmental parameters. The data is stored in a relational database built using Oracle XE. The secured web pages making the data available to Internet user are developed using...

    Provided By International Association of Engineers

  • White Papers // Jul 2012

    E.Kesavulu Reddy Cryptosystem to Resistance Against Simple Power Analysis Attacks in Mobile Devices

    Elliptic curve cryptosystems are more efficient and secure than the conventional cryptosystems like RSA cryptosystems. The authors develop a secret Key in the EKR modified Montgomery Inversion Algorithm to avoid leaks the value of function f in Almost Montgomery Inversion Algorithm. The attacker can not guess the secret key (t)...

    Provided By International Association of Engineers

  • White Papers // Jul 2012

    Homomorphic Encryption Applied to the Cloud Computing Security

    Cloud computing security challenges and it's also an issue to many researchers; first priority was to focus on security which is the biggest concern of organizations that are considering a move to the cloud. The advantages of cloud computing include reduced costs, easy maintenance and re-provisioning of resources, and thereby...

    Provided By International Association of Engineers

  • White Papers // Jul 2012

    Establishment of ECC-Based Initial Secrecy Usable for IKE Implementation

    Internet Key Exchange (IKE) protocol is the most common usable mechanism to exchange keying materials and negotiate security associations between two distant entities. Similar to the several enhancements of the IKE protocols, the paper proposes a new flexible approach for complexity reduction and security improvement of the IKE implementation. In...

    Provided By International Association of Engineers

  • White Papers // Jul 2012

    Claims-Based Enterprise-Wide Access Control

    Access control is a primary consideration when standing up a high-assurance, internet-scale, and web-service based enterprise system for information sharing,. A generalized standards-based solution is presented. Central to this system is a process for access control that provides the fine-grained authorities for use by enterprise services. In all cases, the...

    Provided By International Association of Engineers

  • White Papers // Jul 2012

    An Improved Framework for Intrusion Alert Correlation

    Alert correlation analyzes the alerts from one or more collaborative Intrusion Detection Systems (IDSs) to produce a concise overview of security-related activity on the network. The process consists of multiple components, each responsible for a different aspect of the overall correlation goal. The sequence order of the correlation components affects...

    Provided By International Association of Engineers

  • White Papers // Jul 2012

    A Data Mining E-Learning Tool: Description and Case Study

    Data analysis and data mining techniques are recognized as important disciplines that deliver 'Sophisticated domain knowledge'. The Association of Computing Machinery (ACM) and the IEEE-Computer Society suggest in the 2013 draft Computer Science curricula, Data Mining as an elective course and an important course topic in previous Information Systems or...

    Provided By International Association of Engineers

  • White Papers // Jul 2012

    Fuzzy Local ICA for Speaker Recognition Using Voice and Lip Motion

    Independent Component Analysis (ICA) is a powerful statistical method which can be used for many applications such as source separation, feature extraction or data representation. This paper proposes a new classification scheme spreading over two stages: density estimation using local ICA based on fuzzy clustering and correction of the estimation...

    Provided By International Association of Engineers

  • White Papers // Jul 2012

    A Defect Prediction Model for Open Source Software

    Defect prediction models are significantly beneficial for software systems, where testing experts need to focus their attention and resources on problematic areas in the software under development. In this paper, the authors find the relation between object oriented metrics and fault proneness using logistic regression method. The results are analyzed...

    Provided By International Association of Engineers

  • White Papers // Jul 2012

    Software Failures and Chaos Theory

    Software itself is very complex and studying its failure is much more complex. Complexity is a relative concept and defining complexity in software failure is chaotic in nature. Software failure of complex systems and understanding the complex system needs some sort of theoretical support for analyzing the nonlinearity in the...

    Provided By International Association of Engineers

  • White Papers // Jul 2012

    Repair Analysis for Embedded Memories Using Block-Based Redundancy Architecture

    Capacity and density of embedded memories have rapidly increased therefore they have higher probability of faults. As a result, yield of system-on-a-chip designs with embedded memories drops. Built-in self-repair is widely used to improve manufacturing yield by replacing faulty memory cells with redundant elements. Most approaches perform reconfiguration on the...

    Provided By International Association of Engineers

  • White Papers // Jul 2012

    Performance of OCDMA Systems With Different Detection Schemes Using Enhanced Double Weight (EDW) Code

    This paper investigates the performance of Enhanced Double Weight (EDW) code for Spectral-Amplitude-Coding optical Code Division Multiple Access (SAC-OCDMA) system using different detection techniques. EDW code is the enhanced version of modified double weight code. Enhanced double weight code possesses ideal cross-correlation properties and weight can be any odd number...

    Provided By International Association of Engineers

  • White Papers // Jul 2012

    Computer Simulation and Performance Evaluation of Single Mode Fiber Optics

    The goal of an optical fiber communication system is to transmit the maximum number of bits per second over the maximum possible distance with the fewest errors. Single mode optical fibers have already been one of the major transmission media for long distance telecommunication, with very low-losses and wide-bandwidth. The...

    Provided By International Association of Engineers

  • White Papers // Jul 2012

    Proposal for Low Cost GSM Based Electric Meter for Efficient and Automated Meter Reading for Developing Countries

    Intelligent choice between energy technologies plays a vital role in energy planning and efficient electricity management. Scare resources, lack of expertise and shortage of capital are the major hurdle for developing countries opting cutting edge technologies. Cheap and outdated billing system is prone to error and source of corruption. The...

    Provided By International Association of Engineers

  • White Papers // Jul 2012

    External Memory System Optimization for FPGABasedImplementation of Speech Signal Processing

    A field programmable gate array is an integrated circuit designed to be configured and implemented any logical function. Recently, the use of an FPGA becomes a suited way to implement real time signal processing systems because of the increasing number of logic elements and clock frequencies. However the real time...

    Provided By International Association of Engineers

  • White Papers // Jul 2012

    Modeling an OBS Network in OMNeT + + and the Impact of Data Channels in Such Network

    This paper is to implement the architecture of the optical burst switching network in a discrete event simulation in order to conduct future studies in the behavior and the loss resolution in such networks by determining the burst-loss probability depending on the increase of the number of implemented data channels....

    Provided By International Association of Engineers

  • White Papers // Jul 2012

    Investigation on the Microwave Performance of a High-Speed Opto-Electronic Hybrid Integrated Platform

    An opto-electronic hybrid integrated platform was developed to enable the fabrication of broadband, lowcost, and compact transceivers for telecommunications. On this platform, an opto-electronic device such as a high-speed laser or a photodetector chip is integrated with a RF driver or an amplifier IC. A Kovar heatsink with multistep structure...

    Provided By International Association of Engineers

  • White Papers // Jul 2012

    Improvement in the Spectral Efficiency Achieved in OCDMA Using 1-Dimensional OOCs

    An Optical Orthogonal Code (OOC) is defined as collection of binary sequences with good auto and cross-correlation properties. Unlike bipolar code having correlation side-lobes and cross-correlation function close-to-zero, for OOC's the best correlation side-lobes and cross-correlation function is unity, which means that no distance between the positions of ones in...

    Provided By International Association of Engineers

  • White Papers // Jul 2012

    Mobile Social Computing as Assistive Technology for Improving Elderly Care

    In this paper, the engineering framework for social computing systems for elderly care is being presented. The central theme is to make elderly care a family and community wide social event. The paradigm shift in the social media has driven many applications that are directed towards driving innovation in an...

    Provided By International Association of Engineers

  • White Papers // Jul 2012

    A Model to Provide a Reliable Infrastructure for Cloud Computing

    The cloud computing offers dynamically scalable resources provided as a service over the Internet. It promises the drop in capital expenditure. But practically speaking if this is to become reality there are still some challenges which is to be still addressed. Amongst, the main issues are related to security and...

    Provided By International Association of Engineers

  • White Papers // Jul 2012

    HAMP - A Highly Abstracted and Modular Programming Paradigm for Expressing Parallel Programs on Heterogeneous Platforms

    With the start of the parallel computing era, due to power and thermal considerations, there is a growing need to bridge the gap between parallel hardware and software. The unintuitive nature of parallel programming and the high learning curve often prove a bottleneck in the development of quality parallel software....

    Provided By International Association of Engineers

  • White Papers // Jul 2011

    Laboratory Performance of Wi-Fi IEEE 802.11 B,G WPA2 Point-to-Point Links: A Case Study

    Wireless communications using microwaves are increasingly important, e.g. Wi-Fi. Performance is a crucial issue, leading to more reliable and efficient communications. Security is equally very important. Laboratory measurements are made about several performance aspects of Wi-Fi (IEEE 802.11b, g) WPA2 point-to-point links. A contribution is given to performance evaluation of...

    Provided By International Association of Engineers

  • White Papers // Jul 2011

    An Energy Efficient Hybrid Node Scheduling Scheme in Cluster Based Wireless Sensor Networks

    Cluster based architecture is an effective architecture for data collection in wireless sensor network. However if network consists of some mobile nodes, it becomes difficult to design an energy efficient routing protocol because of frequent changes in topology. In this paper, the authors consider mobility of nodes while constructing clusters....

    Provided By International Association of Engineers

  • White Papers // Jul 2011

    Study of Wireless Sensor Networks as a Software Engineering Approach

    Software development for wireless sensor networks requires novel programming paradigms and technologies. This paper describes the concept of new service oriented software architecture for mobile sensor networks. With this architecture, a flexible, scalable programming of applications based on an adaptive middleware is possible. The middleware supports mechanisms for cooperative data...

    Provided By International Association of Engineers

  • White Papers // Jul 2011

    Propagation of IEEE802.15.4 in Vegetation

    Data communications and more specifically wireless data communications have an increasing role in precision agriculture. ZigBee is one of the most widely adopted Wireless Sensor Network (WSN) technology, and it operates on top of IEEE802.15.4 that provides the two lower layers of the OSI model. To optimize the placement of...

    Provided By International Association of Engineers

  • White Papers // Jul 2011

    Power Allocation With Random Removal Scheme in Cognitive Radio System

    Wireless communication services have been increasing rapidly and this progress has caused a shortage in frequency resources. Cognitive radio technology is expected to enable frequency resources to be used more efficiently. This paper will focus on the co-existence between a secondary user and a primary user in order to increase...

    Provided By International Association of Engineers

  • White Papers // Jul 2011

    A Novel Positioning Technique With Low Complexity in Wireless LAN: Hardware Implementation

    Now-a-days, several positioning systems are available for outdoor localization, such as the global positioning system (GPS), assisted GPS (A-GPS), and other techniques working on cellular networks, for example, Time of Arrival (TOA), Angle of Arrival (AOA) and Time Difference of Arrival (TDOA).However, with the increasing use of mobile computing devices...

    Provided By International Association of Engineers

  • White Papers // Jul 2011

    Cloud for Pollution Control and Global Warming

    The rapid development of the digital world based on sophisticated instruments such as computer, satellite, telecommunication instruments has revolutionized the human lifecycle. This paper is to conduct research on an area related to pollution control and cloud computing. Role of cloud computing in global warming, Green house Effects and pollution...

    Provided By International Association of Engineers

  • White Papers // Jul 2011

    Cloud Computing and Enterprise Resource Planning Systems

    World is changing very fast in terms of enterprise systems and industries need very specialized solutions. Industrial problems are very complex and need lot of money and efforts. Availability of expertise and skills causes another problem in the industry. Enterprise resources management solutions are one of the examples for this...

    Provided By International Association of Engineers

  • White Papers // Jul 2011

    Clickstream Data Warehousing for Web Crawlers Profiling

    Web sites routinely monitor visitor traffic as a useful measure of their overall success. However, simple summaries such as the total number of visits per month provide little insight about individual site patterns, especially in a changing environment like the Web. In this paper it is described an approach to...

    Provided By International Association of Engineers

  • White Papers // Jul 2011

    Gaining Competitive Advantage on the Basis of Data Warehousing and Data Architecture

    This paper discusses the relationship between data warehousing, data architecture, strategy and strategic thinking. How the business organizations can use these as business applications and competitive advantage tools. This paper will attempt to demonstrate data warehousing and data architecture strategically, for that the authors must first understand strategy and strategic...

    Provided By International Association of Engineers

  • White Papers // Jul 2011

    Design of an UWB Quasi Rhomboid Shaped Element Bowtie Antenna for MIMO Applications

    An ultra wideband quasi rhomboid shaped element bowtie antenna design for MIMO applications is presented. The regular dipole antenna and bow-tie shape are modified to a quasi rhomboid shape. This antenna is designed on FR-4 substrate and antenna analysis was conducted by using the Computer Simulation Technology (CST Studio) program....

    Provided By International Association of Engineers

  • White Papers // Mar 2012

    Comparative Study on Email Spam Classifier Using Data Mining Techniques

    In this e-world, most of the transactions and business is taking place through e-mails. Now-a-days, email becomes a powerful tool for communication as it saves a lot of time and cost. But, due to social networks and advertisers, most of the emails contain unwanted information called spam. Even though lot...

    Provided By International Association of Engineers

  • White Papers // Aug 2013

    Designing Optimized Architecture for Network Security Devices

    Cyber crimes are growing and it is expected that by 2017, the global cyber crime market would value at around $120 billion. It has been found that on an average, 18 users become victims of cyber crime. Viruses, malware, Trojans, worms, SQL injection and phishing are some of the malpractices...

    Provided By International Association of Engineers

  • White Papers // Jul 2009

    Simplified Filtering Estimator for Spacecraft Attitude Determination From Phase Information of GPS Signals

    This paper presents an implementation of a simplified filtering estimator for satellite attitude determination using GPS (Global Positioning System) signals. The non-linear system of estimator was modelled using Euler angles parameterisation which applicable for real-time operation onboard-satellite. An approach was to keep a pitch state independent of roll and yaw....

    Provided By International Association of Engineers

  • White Papers // Mar 2009

    Issuance of Proxy Certificate Residing in Web Portal by Browser Based Digital Certificate Through HyperText Transfer Protocol

    Proxy certificate has been used in many web portal services, especially if the remote services require the services to act on user behalf to connect to other servers that require certificate based authentication. This paper describes the method of enabling direct creation of proxy certificate via web browser to web...

    Provided By International Association of Engineers

  • White Papers // Oct 2008

    MyProLang - My Programming Language: A Template-Driven Automatic Natural Programming Language

    Are modern programming languages governed unlike natural languages? Are their complex syntactic rules governed? Yes, states the paper. And that it requires a lot of manual work, training and practice to become skilled enough to write programs correctly. The paper states computer programming being difficult, unfamiliar, complicated, non-automated and challenging...

    Provided By International Association of Engineers

  • White Papers // Jul 2009

    MULEP-A Multi Level e-Procurement System With Distributed Agents

    Supply chain management meets customer demands by making efficient use of various resources such as inventory, distribution logistics and labor. E-procurement tools are good for making the best of supply chain. This paper discusses the integration of e-procurement tools and supply chain management and designs a multi level hierarchy of...

    Provided By International Association of Engineers

  • White Papers // Dec 2008

    Multi-Application Authentication Based on Multi-Agent System

    jBPM is a JBoss solution for Business Process Management (BPM) that was created so as to allow software engineers to share the same concepts and frameworks as business analysts. The jBPM BPM solution works on the JBoss Application Server, which is a programmatic structure that can be used to design...

    Provided By International Association of Engineers

  • White Papers // Mar 2010

    Exploring the Behavior of Mobile Ad Hoc Network Routing Protocols with Reference to Speed and Terrain Range

    A mobile Ad Hoc network is a collection of autonomous mobile nodes that communicate with each other over wireless links. Such networks are expected to play increasingly important role in future civilian and military settings, being useful for providing communication support where no fixed infrastructure exists or the deployment of...

    Provided By International Association of Engineers

  • White Papers // Jul 2010

    FIP Over Ethernet/IP for Real Time Distributed Systems Implementation

    This paper presents the realization of a platform for testing and validating distributed real time systems (DRTS), by following a methodology of development. The main contribution remains the realization of an industrial communication bus (FIP: Factory Instrumentation Protocol) implemented on an Ethernet platform. The work focuses on improving the response...

    Provided By International Association of Engineers

  • White Papers // Jul 2011

    Techniques of Detection of the Hidden Node in Wireless Ad Hoc Network

    In the wireless ad hoc networks, every node is assured by an individual battery which the consumption for the communication and the calculation of data must be optimized to avoid the problem of energy consumption. In the wireless ad hoc network, MAC protocol synchronizes the access of nodes to the...

    Provided By International Association of Engineers

  • White Papers // Jul 2011

    Broker Architecture for Quality of Service

    Internet is growing exponentially; end-to-end Quality of Service (QoS) guarantees demand has gained significant importance and priority in the current time. Internet is characterized by applications like voice, video to normal data. These applications are seamlessly integrated into the Internet, it require right kind of Quality of service support in...

    Provided By International Association of Engineers

  • White Papers // Jul 2011

    Securing Cloud System Via Internal Control Management

    Data protection in cloud computing is constantly been an issue of discussion. There will always be something left undone, incomplete, insecure and un-established. But a chance of improvement will be there every time. The data access should be monitored whenever there is a move from the client side. Also the...

    Provided By International Association of Engineers

  • White Papers // Jul 2011

    A Proposed Framework to Prevent Financial Fraud Through ATM Card Cloning

    This paper gives the intersection between the cash cards standards followed in the banks and the financial frauds done by the cash card cloning. It undertakes two primary tasks; namely understanding of the traditional standard cash card provided by the banks and a proposed methodology to make them more secure...

    Provided By International Association of Engineers

  • White Papers // Jul 2011

    Self-Adaptability in Secure Embedded Systems: An Energy-Performance Trade-Off

    Securing embedded systems is a challenging and important research topic due to limited computational and memory resources. Moreover, battery powered embedded systems introduce power constraints that make the problem of deploying security more difficult. This problem may be addressed by improving the trade-off between minimizing energy consumption and maintaining a...

    Provided By International Association of Engineers

  • White Papers // Jul 2011

    A Novel Encryption System Using Layered Cellular Automata

    As the technology is rapidly advancing day by day sharing of information over the internet is experiencing an explosive growth, which in turn is also posing new threats and vulnerabilities in the existing systems. The quest for more stronger and reliable methodologies to tackle the security issues is unending. In...

    Provided By International Association of Engineers

  • White Papers // Jul 2011

    An Interactive Firewall Simulator for Information Assurance Education

    In this paper, the authors present an interactive firewall simulator to help students learn the intricacies of configuring a firewall to prevent attacks. The design principles of the simulator are to be competitive and fun to use while teaching the student the details of firewall configuration. The firewall simulator demonstrates...

    Provided By International Association of Engineers

  • White Papers // Jul 2011

    Standards and Frameworks for Information System Security Auditing and Assurance

    Most organizations in all sectors of industry, commerce and government are fundamentally dependent on their Information Systems (IS) and would quickly cease to function should the technology (preferably Information Technology - IT) that underpins their activities ever come to halt. The IT developments may have enormous implications for the operation,...

    Provided By International Association of Engineers

  • White Papers // Jul 2011

    Models for Recommender Systems in Web Usage Mining Based on User Ratings

    In web applications, recommender systems apply statistical and knowledge discovery techniques to predict and make recommendations to the users. Automatic predictions on the interests of the users are made by the collection of ratings and other information from many other users. Collaborative filtering recommender systems make such predictions. Most of...

    Provided By International Association of Engineers

  • White Papers // Jul 2011

    Dynamic Bandwidth Shaping Algorithm for Internet Traffic Sharing Environments

    For emerging Internet services and contents in the traffic-sharing environment of limited bandwidth capacity, an efficient method is required to manage the Internet-sharing problem and to improve Quality of Service (QoS) for high-demand bandwidth users. The results of the authors' study show that dynamically delaying un-attended Internet usage activities, such...

    Provided By International Association of Engineers

  • White Papers // Jul 2011

    Simulation and Design of Broad-Band Slot Antenna for Wireless Applications

    As wireless communication applications require more and more bandwidth, the demand for wideband antennas increases as well. The design of an efficient wideband small size antenna for recent wireless applications is a major challenge. The microstrip patch antenna have found extensive applications in wireless communication systems owing to their advantages...

    Provided By International Association of Engineers

  • White Papers // Jul 2011

    Performance Analysis of Energy Consumption of AFECA in Wireless Sensor Networks

    Energy consumption is one of the most important problems to be solved in wireless sensor networks, since sensor nodes are operated with battery power. Therefore, it is necessary to put the wireless interface of sensor nodes into low power sleep state as much as possible when communication with neighbor sensor...

    Provided By International Association of Engineers

  • White Papers // Jul 2011

    Performance of Linear Maximum Likelihood Alamouti Decoder With Diversity Techniques

    Multiple Input Multiple Output (MIMO) communication systems with Orthogonal Frequency Division Multiplexing (OFDM) modulation have a great potential to play an important part in the design of the next generation broadband wireless communication system. In this paper, the Bit Error Rate (BER) performance using Linear Maximum Likelihood Alamouti Combiner (LMLAC)...

    Provided By International Association of Engineers

  • White Papers // Jul 2011

    Data Collection, Communications and Processing in the Sumatran GPS Array (SuGAr)

    The Sumatran GPS array spans approximately 1300 km along the West coast of Sumatra, Indonesia. Almost 40 monitoring stations periodically collect high accuracy continuous GPS readings, and convey these to a central server for post-processing in Singapore. Solutions from the array data are used to provide precise measurements of the...

    Provided By International Association of Engineers

  • White Papers // Jul 2011

    A Comparison of Multiple Algorithms for Fingerprinting Using IEEE802.11

    The effectiveness of Location Based Systems depends on the correct location of users and mobile devices. While the outdoor location can be easily calculated, using technologies such as GPS (Global Positioning System), it is more difficult to obtain when the location scenario is an indoor environment. Several technologies and location...

    Provided By International Association of Engineers

  • White Papers // Jul 2011

    Vertical Handover in Wireless Overlay Networks With Quality of Service Factors

    This paper's main focus is on vertical handover to preserve mobile nodes' connections in spite of its movement from one network to another heterogeneous network and also provide quality of service factors' utilization. This vertical handover involves procedures of registration, binding, route optimization, and bi-directional tunneling mode so that transition...

    Provided By International Association of Engineers

  • White Papers // Jul 2011

    Comparative Performance Evaluation of Wi-Fi IEEE 802.11 B,G WEP Point-to-Point Links

    Wireless communications using microwaves are increasingly important, e.g. Wi-Fi. Performance is a crucial issue, leading to more reliable and efficient communications. Security is equally important. Laboratory measurements are made about several performance aspects of Wi-Fi (IEEE 802.11b, g) WEP point-to-point links. A contribution is given to performance evaluation of this...

    Provided By International Association of Engineers

  • White Papers // Jul 2011

    Faster Investigation of Shear Modulus of Soil Through Wireless Networking

    This paper reveals the faster investigation of shear modulus of near surface soil with wireless networking system as a determination of soil properties in geotechnical investigations. Characterizing of surface soil behavior subjected to a specific loading condition is a primary goal in geotechnical engineering. The soil properties such as the...

    Provided By International Association of Engineers

  • White Papers // Jul 2011

    A QoS Framework for Heterogeneous Networking

    In order for next generation networks to support effective handover procedures, there is a need for defining QoS signaling mechanisms that guarantee the provision of point-to-point as well as network level QoS. This paper proposes a QoS signaling mechanism to be implemented by the Y-Comm architecture as a potential 4G...

    Provided By International Association of Engineers

  • White Papers // Oct 2008

    Speed Trap Image Transfer Through GSM Network

    In this paper, a simple cost-effective solution is proposed, by which devices used in this project can be controlled remotely while the user is anywhere across the globe. Short Message Service (SMS) and Multimedia Messaging Service (MMS) is a mechanism of delivery of short messages and also image over the...

    Provided By International Association of Engineers