International Association of Engineers

Displaying 1-40 of 573 results

  • White Papers // Oct 2014

    Wavelet Based Indoor Prediction of Global System for Mobile Communication (GSM) Signal Strength Attenuation

    In this paper, the authors monitored GSM signal strength (power) in an indoor environment and measured samples of the GSM signal strength on a Mobile Equipment (ME). They also, used one-dimensional multilevel wavelet to predict the fading phenomenon of the GSM signal measured and neural network clustering to determine the...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Outdoor-to-Indoor Propagation Characteristics of 850 MHz and 1900 MHz Bands in Macro -Cellular Environments

    Building penetration loss at 850 MHz and 1900 MHz bands in suburban environment is measured. The measurements are conducted in real GSM networks. Four buildings are studied aiming to provide first-order statistics of the signal coverage inside buildings. Results show that the mean building penetration loss for the ground floor...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Theoretical Aspects of Ultra Wide Band

    Ultra Wide Band (UWB) technology can provide alternative communication solutions within the unlicensed band. Despite many years of development and deployment, UWB and its applications have been underutilized within the communications industry. Some reasons for this lack of acceptance are industry preference for more established technologies and a lack of...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    A Review of Dynamic Spectrum Networks Using Cognitive Radio

    Future wireless networks are expected to be spectrum agile and use cognitive radio technologies. The spectrum regulatory committees have been taking measurable steps with regards to laying down the rules and implementing them, which will open the doors to dynamic spectrum network technologies based on cognitive radio. The usage of...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Security Algorithm for Communication with Dynamic Routing

    The data transmission using cryptographic algorithm within multiple organization system with Randomizing delivery paths over wired and wireless networks has become the major issues for security of data communication over worldwide networks. This paper is to propose a dynamic routing with strong security. The strongest algorithm considered is Blow fish...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    FDTD Simulation of a Mobile Phone Operating Near a One Metal Cell

    In recent years mobile phones or smart phones have gained popularity because of its versatility: internet capabilities, navigation and cameras. Engineering research on the subject of wireless phones and Radio Frequency (RF) energy has been conducted worldwide for many years. This paper presents results of placing a one metal cell...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    A Comparative Study of IEEE 802.11 Standards for Non-Safety Applications on Vehicular Ad Hoc Networks: A Congestion Control Perspective

    Vehicular Ad-hoc NETworks (VANETs) is an important component within the Intelligent Transportation Systems (ITS) that have been part of global strategy and advanced applications. The aim is to provide innovative services relating to various modes of transportation and traffic management. These systems enable users to reach their destinations better, safer...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    A New Gateway Location Protocol for Mesh Networks

    Wireless Mesh Network (WMN) is a promising technology that can provide broadband Internet access. Traffic often routed in Wireless Mesh Backbone (WMB). This also extended to the mesh clients and the Internet and forward to then to mesh gateways. Strategically providing efficient and supervising of WMN is a tedious task...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Effect of Threshold Voltage on Cylindrical Surrounding Double-Gate MOSFET for Wireless Sensor for Wireless RF Switches

    Wireless Sensor Network (WSN) technologies have potential applications in communication, entertainment, travel, retail, industry, medicine, environment monitoring, scientific observation, field surveillance, structure monitoring and many other areas. The Cylindrical Surrounding Double-Gate (CSDG) Silicon On Insulator (SOI) MOSFET is a leading device for nanotechnology. This paper presents an effect of threshold...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Evaluating Protection of Computer Network in Education Sector

    The use of Information Technology (IT) in the higher education institutes was increased daily. Most of the literature mentioned that the ISO/IEC 27002:2005 is the most popular standard to follow in order to reach the best protection for computer Networks. A questionnaire was designed to determine the extent of satisfaction...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Object Manipulation Through Explicit Force Control Using Cooperative Mobile Multi-Robot Systems

    Transportation of objects by groups of mobile robots can be advantageous when an object is too large or heavy to be effectively manipulated by a single robot on its own. This paper proposes combining the cluster space control methodology with explicit force control to effectively and safely move such an...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    An Alternative Approach for Investigating the Impact of Mobile Phone Technology on Speech

    Creating a database of mobile phone speech recordings is the first step to studying the impact of mobile phone networks on various speech applications. The conventional way of creating such a database involves transmitting speech between two mobile phone devices across an actual network. However, this can only encompasses a...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Quality Measurement for Mobile Crop Production Management Applications

    Most ERP vendors proudly claim their solutions are available on mobile platforms, explaining that managers can access their ERP solution from their Smartphone's. The recent wave of Mobile-Enterprise Resource Planning (M-ERP) systems adoption is a significant commitment of resource and may affect almost all business processes. Mobile business boosting the...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Experimental Validation of Lafortune-Lecours Propagation Model at 1900 MHz

    With an ever increasing demand for cellular voice and data services, many of the cellular providers are finding deployment of the in-building infrastructure inevitable. The in-building deployments allow for further re-use of the allocated spectrum and hence, they provide one of the most effective ways for increasing the overall system...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    ITU-T Future Networks: A Step Towards Green Computing

    In the field of telecommunications, Information and Communication Technologies (ICTs) the United Nations specialized agency is termed as International Telecommunication Union (ITU) which is a standard. Telecommunication Standardization Sector (ITU-T) is a permanent organ of ITU. ITU-T is identified to be responsible for studying technical, operation including tariff rates, grade...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Cryptography Based Authentication Methods

    In this paper, the authors review a comparison study on the most common used authentication methods. Some of these methods are actually based on cryptography. In this paper, they show the main cryptographic services. As well as, this paper presents a specific discussion about authentication service. Since the authentication service...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Distributed Versus Centralized Protection Schema for the Enterprise

    Entities in the enterprise are deployed with a standard configuration. Over time, patches, updates, new software versions, and mistakes or malicious activity all lead to deviations across the enterprise from this standard baseline. Malicious or unknown software on a system can cause harm or unexpected behavior. To mitigate these problems...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Problem Solving Hands-On Labware for Teaching Big Data Cybersecurity Analysis

    The rapid growth of big data analysis needs has resulted in a shortage of professionals in this area. Despite such great need, big data analytics and data science is not well represented in current academic programs. Although a few schools have offered new courses in this area but they all...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Subjective Assessment of Mobile Videos Quality for Long Term Evolution (LTE) Cellular Networks

    In this paper, the authors introduce a Mobile Video Quality Prediction (MVQP) project for Long Term Evolution (LTE). The MVQP aims to predict the quality of streaming video service over User Datagram Protocol (UDP) in LTE cellular networks. In this paper, 100 subjects evaluated video quality using smart phones based...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Wireless Sensor Deployment Method on 3D Environments to Maximize Quality of Coverage and Quality of Network Connectivity

    Sensor deployment is one of the most important issues which affect the overall performance of a Wireless Sensor Network (WSN). It is a challenging task to optimally deploy a limited number of sensors on Three Dimensional (3D) environments to maximize Quality of Coverage (QoC) and Quality of Network connectivity (QoN)....

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Neural Network Random Error Prediction on Wireless Local Area Network and Application of One-Dimensional Multi Resolution Wavelet De-Noising Technique

    Self-similarity is a phenomenon known as a random error in a discrete system and considered as one of the major factors that constitute a delay on a network; it affects the overall stability or performance and reduces the capacity utilization of the network. In view of this, an ON/OFF traffic...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Enhanced Bandwidth Sharing Scheme for Small and Medium Enterprises

    Small and Medium Enterprises (SMEs) setup wireless networks in order to make the process of communicating and sharing resources easier. SMEs implement wireless networks, because it's easy, fast and cheaper to implement. However, with the rapid growth within the SMEs sector. SMEs tend to hire more employees when they grow...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    A Parallel Authenticated Encryption Sharing Scheme Based on Cellular Automata

    Multi-secret sharing scheme based on cellular automata have proven to be a secure encrypting algorithm, although it cannot guarantee data integrity and authenticity of shares of the participants, allowing a chosen cipher text attack. In this work, to improve the security of multiple Secret Sharing Scheme (SSS) against adaptive chosen...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Xen Web-based Terminal for Learning Virtualization and Cloud Computing Management

    In this paper, the authors propose a web-based terminal for teaching the cloud. This method allows students and trainees to learn managing the cloud in a useful and secure manner. This paper promotes an appreciate educational environment by enabling students to practice the knowledge practically, teaching them the ethics of...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    A Bayesian Network Model for Risk Management in Cyber Situation

    The transformation in e-commerce with the advent of other internet based activities has increased the impact of cyber-attacks on organizations and nations at large. However, tracking these attacks and determining risks posed ensure the overall security in cyber situation and invariably enhances communication and economic growth. Consequently, this paper presents...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    A Centralized Multimodal Unified Authentication Platform for Web-based Application

    Identifying a user or in technical terms, authentication, is a key process that must be performed before a service can be rendered to a person through electronic means. Common practice for user authentication is to challenge user to present authentication credential, user who can present the valid credential is considered...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Design of Customer-Oriented Cloud Products

    Cloud computing is defined as a scalable services consumption and delivery platform that allows enterprises and individual users to start from the small and increase resources only in case of service demand increase. The competitive environment of cloud service providers forces them to differentiate their products in terms of technical...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Computing Interfaces for Everyone

    Companies, businesses and agencies rely on computing technology, taking advantage of its trends and benefits. Some categories of users - people with disabilities - have faced considerable challenges accessing the cloud to the point that they have become excluded. Many of the existing systems and companies still rely on assistive...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Efficient Certificateless One-Pass Key Agreement Protocols

    Key agreement is an essential component in any cryptosystem. In this paper, a new certificate-less two-party key agreement protocol is proposed. The protocol involves only one pass of exchanged messages, thus saving both time and bandwidth. The protocol provides implicit authentication of the identities of the two communicating parties. This...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Software Architectural Design for Image Retrieval System Involving Data Streams and User Interactivity

    In the process of software development, the role played by the software architect is substantial. It is the software architect who splits the entire application into different components, understands the functions performed by each component and should possess sound knowledge on the interactions among these components. The software architect communicates...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Crop Production Recognize Frameworks using Mobile Enterprise Application

    In this paper, the authors propose an enterprise application framework using mobile that uses CBD (Component-Based Development) as development methodology and web services for information interchange in the RFID-based distributed computing environment for crop production in agricultural area. They tried to analyze the requirements of mobile applications architecture and mobile...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Verifying Software Change Requirements Through Conceptual Class Diagrams Comparison

    An existing software system sometimes needs to be redesigned to accommodate various change requirements. A system analyst gathers new user requirements to analyze software requirements and create a conceptual model of the new version of the system. While certain requirements of the existing software system should remain in the new...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Multichannel User Interfaces Towards Crossover Inclusive Computing

    In this paper, the authors summarize the present methods available for providing user interfaces for disability applications. Section 508 of the Rehabilitation Act of 1973 has contributed to providing accommodation to people with disability, and is generally considered a step in the right direction. As many modalities of interaction have...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Mining Frequent Patterns in Software Risk Mitigation Factors: Frequent Pattern-Tree Algorithm Tracing

    Frequent-Pattern Tree (FP-Tree) algorithm plays a vital role in mining associations, patterns and other data mining related jobs. Currently a software risk mitigation intelligent decision network engine using rule based technique has been designed against software risk factors. A novel idea of finding the associations between different software risk mitigation...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Fingerprint Matching Using Features Mapping

    Fingerprint systems have been featuring prominently among Biometric identification systems for individuals. The dominance of fingerprint is been promoted through continuous emergence of different forms of Automated Fingerprint Identification Systems (AFIS). In the course of performing its assigned roles, an AFIS conducts several activities including fingerprint enrolment, creation of its...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Adaptive Joint Call Admission Control for Heterogeneous Mobile Networks

    Common Radio Resource Management (CRRM) is required to support the provision of Quality of Service (QoS) and the efficient utilization of radio resources in coexisting different Radio Access Technologies (RATs). In this paper, an Adaptive-Terminal modality-based Joint Call Admission Control (ATJCAC) algorithm is proposed to enhance connection-level QoS and reduce...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    A Context-Based User Authentication Scheme for Ubiquitous Services

    With the development of Internet and network technology, Ubiquitous computing is widely enabled. Ubiquitous environment is confronted with many unique challenges. Authentication, Authorization and Accounting (AAA) is one of the most challenging security problems in ubiquitous environment due to its feature of providing anytime anywhere services. Existing authentication schemes aim...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Intrusion Detection Technique using Hypothesis Testing

    Intrusion Detection Systems (IDS) refer to a category of defense tools that is used to provide warnings indicating that a system is under attack or intrusion. The IDS monitors activities within a network and alerts security administrators of suspicious activities. This paper adopted an existing decision tree algorithm. The testing...

    Provided By International Association of Engineers

  • White Papers // Aug 2014

    Automated Test Generation for Object-Oriented Programs with Multiple Targets

    Software testing is costly. In particular, testing object-oriented programs is complicated and burdensome because of the difficulty in generating method sequences for creating objects and changing their states appropriately to achieve high branch coverage. Automated test generation based on static and dynamic analysis is not only an effective approach to...

    Provided By International Association of Engineers

  • White Papers // Aug 2014

    A Low Computational Complexity Statistical Discrimination Algorithm for Collision Detection in Wireless Sensor Networks

    Recently a lot of research effort has been focused on Wireless Sensor Networks (WSNs) due to their various applications. Over the last few years, several techniques have been proposed for investigating the power consumption which represents one of the most challenges and main concerns in designing WSNs. Power consumption of...

    Provided By International Association of Engineers

  • White Papers // Jul 2009

    Simplified Filtering Estimator for Spacecraft Attitude Determination From Phase Information of GPS Signals

    This paper presents an implementation of a simplified filtering estimator for satellite attitude determination using GPS (Global Positioning System) signals. The non-linear system of estimator was modelled using Euler angles parameterisation which applicable for real-time operation onboard-satellite. An approach was to keep a pitch state independent of roll and yaw....

    Provided By International Association of Engineers

  • White Papers // Mar 2009

    Issuance of Proxy Certificate Residing in Web Portal by Browser Based Digital Certificate Through HyperText Transfer Protocol

    Proxy certificate has been used in many web portal services, especially if the remote services require the services to act on user behalf to connect to other servers that require certificate based authentication. This paper describes the method of enabling direct creation of proxy certificate via web browser to web...

    Provided By International Association of Engineers

  • White Papers // Jul 2009

    MULEP-A Multi Level e-Procurement System With Distributed Agents

    Supply chain management meets customer demands by making efficient use of various resources such as inventory, distribution logistics and labor. E-procurement tools are good for making the best of supply chain. This paper discusses the integration of e-procurement tools and supply chain management and designs a multi level hierarchy of...

    Provided By International Association of Engineers

  • White Papers // Mar 2010

    Exploring the Behavior of Mobile Ad Hoc Network Routing Protocols with Reference to Speed and Terrain Range

    A mobile Ad Hoc network is a collection of autonomous mobile nodes that communicate with each other over wireless links. Such networks are expected to play increasingly important role in future civilian and military settings, being useful for providing communication support where no fixed infrastructure exists or the deployment of...

    Provided By International Association of Engineers

  • White Papers // Jul 2010

    FIP Over Ethernet/IP for Real Time Distributed Systems Implementation

    This paper presents the realization of a platform for testing and validating distributed real time systems (DRTS), by following a methodology of development. The main contribution remains the realization of an industrial communication bus (FIP: Factory Instrumentation Protocol) implemented on an Ethernet platform. The work focuses on improving the response...

    Provided By International Association of Engineers

  • White Papers // Oct 2010

    A Survey Of Success Factors For CRM

    Customer Relationship Management has become the main interest of researchers and practitioners especially in the domains of Marketing and Information Systems (IS). This paper is an overview on success factors that could facilitate successful implementation of CRM. In the past decades, the challenge for businesses was optimizing production process to...

    Provided By International Association of Engineers

  • White Papers // Mar 2009

    Transmission Network Congestion In Deregulated Wholesale Electricity Market

    Electricity market plays an important role in improving the economics of electrical power system. Transmission network is vital entity in open access deregulated wholesale electricity market. Whenever transmission network congestion occurs in electricity market, it divides the market in different zones and the trading price of electricity will no longer...

    Provided By International Association of Engineers

  • White Papers // Oct 2009

    Dynamic Behavior of Bandwidth Control Management in Mobile Ad-Hoc Network

    Quality of Service (QoS) support in Mobile Ad-hoc NETworks (MANETs) is a challenging task. The major challenge in ad hoc networks lies in adapting multicast communication to environments, where mobility is unlimited and failures are frequent. Such problems increase the delays and decrease the throughput. To meet these challenges, authors...

    Provided By International Association of Engineers

  • White Papers // Oct 2009

    A Comparative Analysis of Network Benchmarking Tools

    Nowadays, there is a wide variety of network benchmarking tools, giving researchers and network administrators many choices to work with. However, this variety tends to difficult the selection process of the appropriate tool. Furthermore, sometimes users are forced to try several tools in order to find the one that calculates...

    Provided By International Association of Engineers

  • White Papers // Mar 2009

    Design of a Numerical Adaptive Relay Based on Memory Mapped Techniques

    This work describes the design of a DSP (Digital Signal Processor) based Adaptive Numerical Mho relay, to be used for distance protection schemes of long distance transmission lines. The relay settings will be automatically adjusted with the changes of power system parameters with the variation of frequency as well as...

    Provided By International Association of Engineers

  • White Papers // Mar 2009

    Information System Modelling to Control Transport Operations Process

    This work describes the development of Enterprise Architect Unified Modeling Language (ea UML), Microsoft SQL Server, Borland C ++ Builder information model for qualitative operation of open-cast mining and transport systems including description of process, technical and organizational factors influencing on the efficiency of mining and transport operations processes. For...

    Provided By International Association of Engineers

  • White Papers // Jul 2009

    Hardware Co-Simulation for Video Processing Using Xilinx System Generator

    The use of rapid prototyping tools such as MATLABS-imulink and Xilinx System Generator becomes increasingly important because of time-to-market constraints. This paper presents a methodology for implementing real-time DSP applications on a reconfigurable logic platform using Xilinx System Generator (XSG) for Matlab. The methodology aims to improve the design verification...

    Provided By International Association of Engineers

  • White Papers // Oct 2010

    A Study on the Security Mechanism for Web Services

    Web Service has been widely used in the field of distributed application system. But the security issue of the Web Service has often been considered as a crucial barrier to its application in many fields that conducts sensitive information, such as E-commerce. In the paper, the authors introduce the Security...

    Provided By International Association of Engineers

  • White Papers // Oct 2010

    Video Conferencing With CAI for Better Impact on Training and Education: An Indian Scenario

    Videoconferencing is changing the way Education is being imparted. It facilitates the effective teaching, a face-to-face meeting environment, clearing the way for efficient communication. It is an effective form of communication with distinct benefits. Today, more than ever, it is proving to be an extremely powerful tool, helps to gain...

    Provided By International Association of Engineers

  • White Papers // Mar 2009

    Artificial Intelligence Techniques in Software Engineering (AITSE)

    Software development process is a very complex process that, at present, is primarily a human activity. Programming, in software development, requires the use of different types of knowledge: about the problem domain and the programming domain. It also requires many different steps in combining these types of knowledge into one...

    Provided By International Association of Engineers

  • White Papers // Mar 2009

    Direct Adaptive Backstepping Control for a Class of MIMO Non-Affine Systems Using Recurrent Neural Networks

    In this paper, the backstepping technique is used to design adaptive controller for a class of MIMO nonlinear uncertain non-affine systems. The backstepping technique provides a systematic framework and recursive design methodology for nonlinear systems. The design procedure treats the state variables as virtual control inputs; then, the virtual controllers...

    Provided By International Association of Engineers

  • White Papers // Mar 2009

    Genetic Algorithm Based Node Placement Methodology for Wireless Sensor Networks

    A Genetic Algorithm based multi-objective methodology was implemented for a self-organizing wireless sensor network. Design parameters such as network density, connectivity and energy consumption are taken into account for developing the fitness function. The genetic algorithm optimizes the operational modes of the sensor nodes along with clustering schemes and transmission...

    Provided By International Association of Engineers

  • White Papers // Mar 2009

    On the Development of Low-Power MAC Protocol for WBANs

    Current advances in wireless communication, microelectronics, semiconductor technologies, and intelligent sensors have contributed to the development of unobtrusive WBANs. These networks provide long term health monitoring of patients without any constraint in their normal activities. Traditional MAC protocols do not accommodate the assorted WBAN traffic requirements in a power efficient...

    Provided By International Association of Engineers

  • White Papers // Mar 2009

    Energy Efficient Data Processing in Sensor Networks

    The sensor nodes in a Wireless Sensor Network (WSN) are tiny devices operating on batteries and employing low-power radio transceivers to enable communication. Minimizing energy consumption has been a major objective at all levels in sensor networks. In this paper, the authors present a data processing scheme that maintains the...

    Provided By International Association of Engineers

  • White Papers // Mar 2009

    A New Smith Predictor and Fuzzy RBF Neural Network Control for Wireless Networked Control Systems

    To aim at time-variant or random network delay in the Wireless Networked Control Systems (WNCS), as well as controlled plant might be uncertain, a novel approach is proposed that new Smith predictor combined with Fuzzy Radial Basis Function Neural Network (FRBFNN). Because new Smith dynamic predictor hides predictor model of...

    Provided By International Association of Engineers

  • White Papers // Mar 2009

    New Smith Predictor and Generalized Predictive Control for Wireless Networked Control Systems

    This paper aims at time-variant or uncertain network delay in the Wireless Networked Control Systems (WNCS), as well as Smith predictor models might be imprecise, a novel approach is proposed that new Smith predictor combined with Generalized Predictive Control (GPC) for the WNCS. Because new Smith dynamic predictor hides predictor...

    Provided By International Association of Engineers

  • White Papers // Mar 2010

    An Intelligent Fuzzy Neural Call Admission Control Mechanism for Guaranteed QoS in Heterogeneous Wireless Networks

    The Call Admission Control (CAC) is a Radio Resource Management (RRM) technique that plays instrumental role in ensuring the desired Quality of Service (QoS) to the users working on different applications with diversified QoS requirements in Next Generation Wireless Networks (NGWN). This paper proposes an Analytical system model and the...

    Provided By International Association of Engineers

  • White Papers // Jul 2011

    Techniques of Detection of the Hidden Node in Wireless Ad Hoc Network

    In the wireless ad hoc networks, every node is assured by an individual battery which the consumption for the communication and the calculation of data must be optimized to avoid the problem of energy consumption. In the wireless ad hoc network, MAC protocol synchronizes the access of nodes to the...

    Provided By International Association of Engineers

  • White Papers // Jul 2011

    Broker Architecture for Quality of Service

    Internet is growing exponentially; end-to-end Quality of Service (QoS) guarantees demand has gained significant importance and priority in the current time. Internet is characterized by applications like voice, video to normal data. These applications are seamlessly integrated into the Internet, it require right kind of Quality of service support in...

    Provided By International Association of Engineers

  • White Papers // Jul 2011

    Securing Cloud System Via Internal Control Management

    Data protection in cloud computing is constantly been an issue of discussion. There will always be something left undone, incomplete, insecure and un-established. But a chance of improvement will be there every time. The data access should be monitored whenever there is a move from the client side. Also the...

    Provided By International Association of Engineers

  • White Papers // Jul 2011

    A Proposed Framework to Prevent Financial Fraud Through ATM Card Cloning

    This paper gives the intersection between the cash cards standards followed in the banks and the financial frauds done by the cash card cloning. It undertakes two primary tasks; namely understanding of the traditional standard cash card provided by the banks and a proposed methodology to make them more secure...

    Provided By International Association of Engineers

  • White Papers // Jul 2011

    Self-Adaptability in Secure Embedded Systems: An Energy-Performance Trade-Off

    Securing embedded systems is a challenging and important research topic due to limited computational and memory resources. Moreover, battery powered embedded systems introduce power constraints that make the problem of deploying security more difficult. This problem may be addressed by improving the trade-off between minimizing energy consumption and maintaining a...

    Provided By International Association of Engineers

  • White Papers // Jul 2011

    A Novel Encryption System Using Layered Cellular Automata

    As the technology is rapidly advancing day by day sharing of information over the internet is experiencing an explosive growth, which in turn is also posing new threats and vulnerabilities in the existing systems. The quest for more stronger and reliable methodologies to tackle the security issues is unending. In...

    Provided By International Association of Engineers

  • White Papers // Jul 2011

    An Interactive Firewall Simulator for Information Assurance Education

    In this paper, the authors present an interactive firewall simulator to help students learn the intricacies of configuring a firewall to prevent attacks. The design principles of the simulator are to be competitive and fun to use while teaching the student the details of firewall configuration. The firewall simulator demonstrates...

    Provided By International Association of Engineers

  • White Papers // Jul 2011

    Standards and Frameworks for Information System Security Auditing and Assurance

    Most organizations in all sectors of industry, commerce and government are fundamentally dependent on their Information Systems (IS) and would quickly cease to function should the technology (preferably Information Technology - IT) that underpins their activities ever come to halt. The IT developments may have enormous implications for the operation,...

    Provided By International Association of Engineers

  • White Papers // Jul 2011

    Models for Recommender Systems in Web Usage Mining Based on User Ratings

    In web applications, recommender systems apply statistical and knowledge discovery techniques to predict and make recommendations to the users. Automatic predictions on the interests of the users are made by the collection of ratings and other information from many other users. Collaborative filtering recommender systems make such predictions. Most of...

    Provided By International Association of Engineers

  • White Papers // Jul 2011

    Dynamic Bandwidth Shaping Algorithm for Internet Traffic Sharing Environments

    For emerging Internet services and contents in the traffic-sharing environment of limited bandwidth capacity, an efficient method is required to manage the Internet-sharing problem and to improve Quality of Service (QoS) for high-demand bandwidth users. The results of the authors' study show that dynamically delaying un-attended Internet usage activities, such...

    Provided By International Association of Engineers

  • White Papers // Jul 2011

    Simulation and Design of Broad-Band Slot Antenna for Wireless Applications

    As wireless communication applications require more and more bandwidth, the demand for wideband antennas increases as well. The design of an efficient wideband small size antenna for recent wireless applications is a major challenge. The microstrip patch antenna have found extensive applications in wireless communication systems owing to their advantages...

    Provided By International Association of Engineers

  • White Papers // Jul 2011

    Performance Analysis of Energy Consumption of AFECA in Wireless Sensor Networks

    Energy consumption is one of the most important problems to be solved in wireless sensor networks, since sensor nodes are operated with battery power. Therefore, it is necessary to put the wireless interface of sensor nodes into low power sleep state as much as possible when communication with neighbor sensor...

    Provided By International Association of Engineers

  • White Papers // Jul 2011

    Performance of Linear Maximum Likelihood Alamouti Decoder With Diversity Techniques

    Multiple Input Multiple Output (MIMO) communication systems with Orthogonal Frequency Division Multiplexing (OFDM) modulation have a great potential to play an important part in the design of the next generation broadband wireless communication system. In this paper, the Bit Error Rate (BER) performance using Linear Maximum Likelihood Alamouti Combiner (LMLAC)...

    Provided By International Association of Engineers

  • White Papers // Jul 2011

    Data Collection, Communications and Processing in the Sumatran GPS Array (SuGAr)

    The Sumatran GPS array spans approximately 1300 km along the West coast of Sumatra, Indonesia. Almost 40 monitoring stations periodically collect high accuracy continuous GPS readings, and convey these to a central server for post-processing in Singapore. Solutions from the array data are used to provide precise measurements of the...

    Provided By International Association of Engineers

  • White Papers // Jul 2011

    A Comparison of Multiple Algorithms for Fingerprinting Using IEEE802.11

    The effectiveness of Location Based Systems depends on the correct location of users and mobile devices. While the outdoor location can be easily calculated, using technologies such as GPS (Global Positioning System), it is more difficult to obtain when the location scenario is an indoor environment. Several technologies and location...

    Provided By International Association of Engineers

  • White Papers // Jul 2011

    Vertical Handover in Wireless Overlay Networks With Quality of Service Factors

    This paper's main focus is on vertical handover to preserve mobile nodes' connections in spite of its movement from one network to another heterogeneous network and also provide quality of service factors' utilization. This vertical handover involves procedures of registration, binding, route optimization, and bi-directional tunneling mode so that transition...

    Provided By International Association of Engineers

  • White Papers // Jul 2011

    Comparative Performance Evaluation of Wi-Fi IEEE 802.11 B,G WEP Point-to-Point Links

    Wireless communications using microwaves are increasingly important, e.g. Wi-Fi. Performance is a crucial issue, leading to more reliable and efficient communications. Security is equally important. Laboratory measurements are made about several performance aspects of Wi-Fi (IEEE 802.11b, g) WEP point-to-point links. A contribution is given to performance evaluation of this...

    Provided By International Association of Engineers

  • White Papers // Jul 2011

    Faster Investigation of Shear Modulus of Soil Through Wireless Networking

    This paper reveals the faster investigation of shear modulus of near surface soil with wireless networking system as a determination of soil properties in geotechnical investigations. Characterizing of surface soil behavior subjected to a specific loading condition is a primary goal in geotechnical engineering. The soil properties such as the...

    Provided By International Association of Engineers