International Association of Engineers

Displaying 1-40 of 480 results

  • White Papers // Aug 2014

    A Low Computational Complexity Statistical Discrimination Algorithm for Collision Detection in Wireless Sensor Networks

    Recently a lot of research effort has been focused on Wireless Sensor Networks (WSNs) due to their various applications. Over the last few years, several techniques have been proposed for investigating the power consumption which represents one of the most challenges and main concerns in designing WSNs. Power consumption of...

    Provided By International Association of Engineers

  • White Papers // Aug 2014

    Automated Test Generation for Object-Oriented Programs with Multiple Targets

    Software testing is costly. In particular, testing object-oriented programs is complicated and burdensome because of the difficulty in generating method sequences for creating objects and changing their states appropriately to achieve high branch coverage. Automated test generation based on static and dynamic analysis is not only an effective approach to...

    Provided By International Association of Engineers

  • White Papers // Jul 2014

    A Secure TFTP Protocol with Security Proofs

    Advances in smart devices has witnessed major developments in many mobile applications such as Android applications. These smart devices normally interconnect to the internet using wireless technology and applications using the TFTP protocol among these wireless devices are becoming commonplace. In this paper, the authors present an enhanced lightweight security...

    Provided By International Association of Engineers

  • White Papers // Jul 2014

    Localization of Indoor Areas Using Wi-Fi Signals, Type-2 Fuzzy Inference Systems and Data Mining

    Recent advances in communication and Wi-Fi mobile technology has led the Wireless Local Area Network (WLAN) to become more ubiquitous. These networks provide a potential infrastructure that enables the indoor location estimate for users who wear wireless devices such as smart phones. This infrastructure goes beyond GPS (Global Position System)...

    Provided By International Association of Engineers

  • White Papers // Jul 2014

    LTE Network Planning Using the Hata-Okumura and the COST-231 Hata Pathloss Models

    Long Time Evolution (LTE) is a standard for wireless communication of high-speed data for mobile terminal; it is based on the GSM/EDGE and UMTS/HSPA network technologies, increasing the capacity and speed using a different radio interface together with core network improvement. This paper takes a look at two of the...

    Provided By International Association of Engineers

  • White Papers // Jul 2014

    Analysis and Simulation of LTE Downlink and Uplink Transceiver

    LTE (Long Term Evolution) is a next generation standard by 3rd Generation Partnership Project (3GPP) consortium. In this paper, the PHYsical layer (PHY) of LTE transceiver is analyzed in downlink and uplink transmissions. Simulations of the physical layer of LTE transceiver are obtained with the use of LTE system Toolbox...

    Provided By International Association of Engineers

  • White Papers // Jul 2014

    Analysis of QoS of VoIP Traffic through WiFi-UMTS Networks

    Simulation of VoIP (Voice over Internet Protocol) traffic through UMTS (Universal Mobile Telecommunication System) and Wi-Fi (IEEE 802.11x) alone and together are analyzed for Quality of Service (QoS) performance. The average jitter of VoIP transiting the Wi-Fi-UMTS network has been found to be lower than that of either solely through...

    Provided By International Association of Engineers

  • White Papers // Jul 2014

    Performance Evaluation of IEEE 802.11 A, G Laboratory WPA2 Point-to-Multipoint Links

    Contactless communications techniques have been developed using mainly electromagnetic waves in several frequency ranges, propagating in the air. Wi-Fi and FSO, whose importance and utilization have been recognized and growing, are representative examples of wireless communications technologies. The increasing importance of wireless communications, involving electronic devices, has been widely recognized....

    Provided By International Association of Engineers

  • White Papers // Jul 2014

    Proactive Autonomous Defense Shield (PADS) for Infrastructure as a Service (IaaS)

    Securing assets in the digital realm has become a challenge as there has been an exponential increment in the companies relying on the next generation technologies such as cloud computing. With the evolution of utility computing and Service Oriented Architecture (SOA) as well as convergence of virtualization and web services...

    Provided By International Association of Engineers

  • White Papers // Mar 2014

    Using Software-Defined Networking for Real-Time Internet Applications

    The authors consider an emerging class of challenging Internet applications called Real-time Online Interactive Applications (ROIA). Examples of ROIA are multiplayer online games, computation and interaction-intensive training, simulation based e-learning, etc. These applications make high QoS demands on the underlying network which involve the number of users and the actual...

    Provided By International Association of Engineers

  • White Papers // Mar 2014

    RFID-Based Location Tracking System Using a Peer-to-Peer Network Architecture

    In recent years, the Global Positioning System (GPS) has been commonly employed for outdoor positioning and location tracking. On the other hand, there has also been growing interest in developing indoor location tracking systems. Advancements in Radio Frequency IDentification (RFID) technology make it a promising technology for use in indoor...

    Provided By International Association of Engineers

  • White Papers // Mar 2014

    A SIP -Based VoIP Application in Enhanced Ethernet Passive Optical Network Architecture

    Since the inception of telephony, the Public Switch Telephone Network (PSTN) has had major impact in everyday life. The widespread adoption of VoIP has totally revolutionized the telephony industry. With many free services for the users, VoIP is favored over the traditional PSTN. A major concern for VoIP is voice...

    Provided By International Association of Engineers

  • White Papers // Mar 2014

    Information Distribution System with Distributed Reinforcement Learning for Providing Local Information

    In this paper, the authors propose an information distribution system with reinforcement learning so that the information can be distributed to users with a small number of distributions. In this system, the information distributor moves along the same route and distributes the information to users by using the wireless communication...

    Provided By International Association of Engineers

  • White Papers // Mar 2014

    Applications of Temperature Control Based on Android Platform

    In this paper, the authors have implemented the temperature control system based on Android platform for industrial use. Their studied temperature control system includes Android platform, data server, and external control unit. Based on established standards, RS485 and RS232 communicate the necessary information from PID controller and Android platform, respectively,...

    Provided By International Association of Engineers

  • White Papers // Mar 2014

    Compact Size of Textile Wearable Antenna

    The utilization of wearable antennas has rapidly developed in recent years for miniaturizing wireless communication devices. The main advantage of wearable antennas is that they are designed as clothing parts for transmitting or receiving wireless signals. The wearable antenna system plays an important role in many field applications, including tracking...

    Provided By International Association of Engineers

  • White Papers // Mar 2014

    The Assessment and Analysis of Using a Temperature Sensor to Regulate the Automatic Gain Control of the Amplifier in a FLASH-OFDM System

    In this paper, the authors emphasize the simulation and analysis of the compensatory effect of temperature on Automatic Gain Control (AGC). From the analytical results, a temperature regulation mechanism was proposed. The technology most appropriate for and adaptive to mobile terminal stations under various temperatures was considered to ensure excellent...

    Provided By International Association of Engineers

  • White Papers // Mar 2014

    Accurate Bluetooth Positioning Using Large Number of Devices Measurements

    In this paper it considers using the built-in Bluetooth in the cell phone as the positioning device; it is able from the measured RSSI (Received Signal Strength Indication) strength to locate the target or the cell phone position. From experimental measurements using Bluetooth positioning technique in various environments, the authors...

    Provided By International Association of Engineers

  • White Papers // Mar 2014

    The Less Communicated Story of Location Based Service in Retail Applications

    Location based applications have been on the front pages of technological innovations and business transformations in recent years. Retail among all has been the most mature industry where LBS have flourished. The ability to weave consumer location context into browsing, social sharing and buying activities is the common mandate of...

    Provided By International Association of Engineers

  • White Papers // Mar 2014

    Design of a Load-Based DRX Scheme for Non-Real-Time Traffic in LTE

    In this paper, a revised version of the authors' previously proposed power saving scheme for IEEE 802.16 is proposed to be applied in LTE. The proposed scheme namely LTE-LBPS-Aggr treats the traffic of all UEs as a single flow, estimates the input load by traffic measurement and the channel capacity...

    Provided By International Association of Engineers

  • White Papers // Mar 2014

    Low-PAPR Spectral Filter for Carrier Aggregated Transmission System

    Carrier Aggregation (CA) is one the techniques to increase the system bandwidth but with carrier aggregation it increases the Peak-to-Average Power Ratio (PAPR) level to worsen the system performance. In this paper, the authors consider to include a spectral filter with roll-off square-root raised cosine structure or to include the...

    Provided By International Association of Engineers

  • White Papers // Mar 2014

    Application of Fuzzy Logic to Multimedia Streaming Dissemination System for Vehicular Networks

    A seamless streaming dissemination system for vehicular networks is presented in this paper. An adaptive streaming system is established at each local server to prefetch and buffer stream data. The adaptive streaming system computes the parts of prefetched stream data for each user and stores them temporarily at the local...

    Provided By International Association of Engineers

  • White Papers // Mar 2014

    Message Transmission with User Grouping for Improving Transmission Efficiency and Reliability in Mobile Social Networks

    Recently, due to the rapid spread of wireless devices such as cell phones, mobile social networks have attracted considerable attention. In the mobile social networks, privacy issues have to be addressed and messages have to be transmitted effectively. In this paper, in order to resolve both the issues for the...

    Provided By International Association of Engineers

  • White Papers // Mar 2014

    Modeling the Mobile Application Development Lifecycle

    Software Development Life Cycle (SDLC) is crucial in desktop or web application development. Mobile applications are being developed for deployment in smart phones. Looking at the rising need of mobile applications and the associated development complexity, it is imperative to have a dedicated framework lifecycle for mobile application - Mobile...

    Provided By International Association of Engineers

  • White Papers // Mar 2014

    ConWIP-Based Packing Order Planning Software Prototype for Variant-Centered Manufacturing

    In this paper, the authors focus on the concept, design, and implementation of a production planning software prototype built upon the methods of the Constant Work In Process (ConWIP) manufacturing system. The paper discusses various aspects revolving around the field of application and system implementation itself. As an introduction, basics...

    Provided By International Association of Engineers

  • White Papers // Mar 2014

    Software Risk Factors: A Survey and Software Risk Mitigation Intelligent Decision Network Using Rule Based Technique

    Software industry has been rapidly growing from the last couple of decades. Due to this growth and advancement many issues are going to be occurred. There are number of factors that affect the whole software development process. This paper has focused on the most important risk factors that affect the...

    Provided By International Association of Engineers

  • White Papers // Mar 2014

    Software Risk Management Practice: Evidence From Thai Software Firms

    Software risk management has been around at least since it was introduced in mainstream of software management process, but little has been reported about its industrial practice. This paper reports the current software risk management practice in Thai software industry. A questionnaire survey was designed to capture the information of...

    Provided By International Association of Engineers

  • White Papers // Mar 2014

    A Review of Femtocell

    The popularity of wireless networks has attracted the attention of researchers to improve the network system and this motivated the operators to find a new technology called femtocells with the aim of meeting the increased coverage and data demand in the indoor environment. The application of femtocells in both indoors...

    Provided By International Association of Engineers

  • White Papers // Mar 2014

    A Study on Security Threats and Dynamic Access Control Technology for BYOD, Smart-Work Environment

    The term BYOD (Bring Your Own Device) collectively refers to the related technologies, concepts and policies, where employees do works by accessing corporate internal IT resources, such as database and applications, using their personal mobile devices like smart phones, laptop computers and tablet PCs. As operational convenience has improved with...

    Provided By International Association of Engineers

  • White Papers // Feb 2014

    Fusion Framework for Multimodal Biometric Person Authentication System

    In recent years, biometric based authentication systems have gained more attention due to frequent fraudulent attacks. Hence, this paper aims at developing a multi-modal, multi-sensor based Person Authentication System (PAS) using Joint Directors of Laboratories (JDL) fusion model. This paper investigates the need for multiple sensors, multiple recognition algorithms and...

    Provided By International Association of Engineers

  • White Papers // Feb 2014

    Designing Structured Peer-to-Peer Architectures for Mashups

    Mashup platforms are popular because they provide end-users with a powerful tool to query the web. The majority of these platforms are designed using centralized architectures or loosely coupled distributed architectures. The lack of structure in these platforms makes searching for mashups an expensive task. In this paper, the authors...

    Provided By International Association of Engineers

  • White Papers // Dec 2013

    An Approach to Software Selection Using Semantic Web

    For a selection of software applications well-fitting to business needs, accurate knowledge of the needs and available technical skills are required. In a survey, the authors conducted, most of the participants indicated that they consult industry solutions and employ Internet search engines to find suitable software products. However, since a...

    Provided By International Association of Engineers

  • White Papers // Oct 2013

    Towards Suitable Research Paradigm for Assessing the Impact of Free and Open Source Software (FOSS)

    Free and Open Source Software (FOSS) allows users to use, change, and redistribute the source code. Recent changes in the software technologies landscape involve the introduction of FOSS which presents certain benefits and freedom in the use of software that demonstrate high potential towards achieving competitive advantage by institutions of...

    Provided By International Association of Engineers

  • White Papers // Oct 2013

    Test Driven Mobile Applications Development

    A mobile application testing is the most important factor in its software development. Mobile applications testing is a process by which application software developed for hand held mobile devices is tested for its functionality, usability and consistency. Mobile applications either come pre-installed or can be installed from mobile software distribution...

    Provided By International Association of Engineers

  • White Papers // Oct 2013

    A Recent Survey of Circuit Design Tools for Teaching

    Digital design is an essential topic in the computer science curriculum. A major problem in teaching digital design in computer architecture and organization courses is how to help students connect their theoretical knowledge with the practical experience. Many useful computer programs are available that can help overcome this issue and...

    Provided By International Association of Engineers

  • White Papers // Oct 2013

    Design and Development of Personalized Contents-Feed Apps Intended for Web-of-Things

    In this paper, the authors focus on design and development of a prototype app under windows platform. The function of this app is that it dynamically consolidates news feeds for the intended users. The app can be configured to personalized mode as per users need. They have reviewed current research,...

    Provided By International Association of Engineers

  • White Papers // Oct 2013

    An Ad Hoc Broadcast Scheme Using the Radio Data System (RDS) in the FM Band

    Most contemporary Smartphone contain ICs that integrate multiple radios on a single chip. Common configurations are ICs with 802.11b/g/n Wi-Fi and Bluetooth radios, a GPS receiver, and a FM transceiver. The Radio Data System (RDS) broadcasts short datagram's in the FM band (87.5 to 108.0 MHz). RDS is primarily used...

    Provided By International Association of Engineers

  • White Papers // Oct 2013

    Design of Adaptive Filtering Algorithm for Relative Navigation

    Recently, relative navigation has been considered as one of the most important issues in navigation field. It is purposed to enable more accurate formation flying of aircrafts and satellites and more accurate monitoring of two-body ground vehicles carrying extremely hazardous materials. For the improvement of accuracy and consistency of navigation...

    Provided By International Association of Engineers

  • White Papers // Oct 2013

    Efficient Decentralized Dynamic Bandwidth Allocation in EPON

    Bandwidth allocation is a critical issue in the design of an Ethernet Passive Optical Network (EPON) system since multiple Optical Network Units (ONUs) share a common upstream channel. Traditionally, bandwidth allocation schemes relied on centralized Dynamic Bandwidth Allocation (DBA) and considered that the Optical Line Terminal (OLT) is the only...

    Provided By International Association of Engineers

  • White Papers // Oct 2013

    Linux Based Control Framework for Mecnaum Based Omnidirectional Automated Guided Vehicles

    In this paper, the authors give an overview on a control and navigation system for omnidirectional Automated Guided Vehicles (AGVs) implemented by the authors. On the hardware side this framework only uses an industrial grade embedded PC. All closed-loop controllers as well as a sophisticated navigation system including path-planning and...

    Provided By International Association of Engineers

  • White Papers // Oct 2013

    Remote Access Control System Using Iris Signature

    Modern day technology has come with many problems of authentication. For instance, in e-business transactions where potential buyers and sellers do not meet physically, it might be difficult to verify the identity of the people involved. Also of concern is the high rate of hacking on networks and the internet....

    Provided By International Association of Engineers

  • White Papers // Jul 2009

    Simplified Filtering Estimator for Spacecraft Attitude Determination From Phase Information of GPS Signals

    This paper presents an implementation of a simplified filtering estimator for satellite attitude determination using GPS (Global Positioning System) signals. The non-linear system of estimator was modelled using Euler angles parameterisation which applicable for real-time operation onboard-satellite. An approach was to keep a pitch state independent of roll and yaw....

    Provided By International Association of Engineers

  • White Papers // Mar 2009

    Issuance of Proxy Certificate Residing in Web Portal by Browser Based Digital Certificate Through HyperText Transfer Protocol

    Proxy certificate has been used in many web portal services, especially if the remote services require the services to act on user behalf to connect to other servers that require certificate based authentication. This paper describes the method of enabling direct creation of proxy certificate via web browser to web...

    Provided By International Association of Engineers

  • White Papers // Jul 2009

    MULEP-A Multi Level e-Procurement System With Distributed Agents

    Supply chain management meets customer demands by making efficient use of various resources such as inventory, distribution logistics and labor. E-procurement tools are good for making the best of supply chain. This paper discusses the integration of e-procurement tools and supply chain management and designs a multi level hierarchy of...

    Provided By International Association of Engineers

  • White Papers // Dec 2008

    Multi-Application Authentication Based on Multi-Agent System

    jBPM is a JBoss solution for Business Process Management (BPM) that was created so as to allow software engineers to share the same concepts and frameworks as business analysts. The jBPM BPM solution works on the JBoss Application Server, which is a programmatic structure that can be used to design...

    Provided By International Association of Engineers

  • White Papers // Mar 2010

    Exploring the Behavior of Mobile Ad Hoc Network Routing Protocols with Reference to Speed and Terrain Range

    A mobile Ad Hoc network is a collection of autonomous mobile nodes that communicate with each other over wireless links. Such networks are expected to play increasingly important role in future civilian and military settings, being useful for providing communication support where no fixed infrastructure exists or the deployment of...

    Provided By International Association of Engineers

  • White Papers // Jul 2010

    FIP Over Ethernet/IP for Real Time Distributed Systems Implementation

    This paper presents the realization of a platform for testing and validating distributed real time systems (DRTS), by following a methodology of development. The main contribution remains the realization of an industrial communication bus (FIP: Factory Instrumentation Protocol) implemented on an Ethernet platform. The work focuses on improving the response...

    Provided By International Association of Engineers

  • White Papers // Oct 2010

    A Survey Of Success Factors For CRM

    Customer Relationship Management has become the main interest of researchers and practitioners especially in the domains of Marketing and Information Systems (IS). This paper is an overview on success factors that could facilitate successful implementation of CRM. In the past decades, the challenge for businesses was optimizing production process to...

    Provided By International Association of Engineers

  • White Papers // Mar 2009

    Transmission Network Congestion In Deregulated Wholesale Electricity Market

    Electricity market plays an important role in improving the economics of electrical power system. Transmission network is vital entity in open access deregulated wholesale electricity market. Whenever transmission network congestion occurs in electricity market, it divides the market in different zones and the trading price of electricity will no longer...

    Provided By International Association of Engineers

  • White Papers // Oct 2009

    Dynamic Behavior of Bandwidth Control Management in Mobile Ad-Hoc Network

    Quality of Service (QoS) support in Mobile Ad-hoc NETworks (MANETs) is a challenging task. The major challenge in ad hoc networks lies in adapting multicast communication to environments, where mobility is unlimited and failures are frequent. Such problems increase the delays and decrease the throughput. To meet these challenges, authors...

    Provided By International Association of Engineers

  • White Papers // Oct 2009

    A Comparative Analysis of Network Benchmarking Tools

    Nowadays, there is a wide variety of network benchmarking tools, giving researchers and network administrators many choices to work with. However, this variety tends to difficult the selection process of the appropriate tool. Furthermore, sometimes users are forced to try several tools in order to find the one that calculates...

    Provided By International Association of Engineers

  • White Papers // Mar 2009

    Design of a Numerical Adaptive Relay Based on Memory Mapped Techniques

    This work describes the design of a DSP (Digital Signal Processor) based Adaptive Numerical Mho relay, to be used for distance protection schemes of long distance transmission lines. The relay settings will be automatically adjusted with the changes of power system parameters with the variation of frequency as well as...

    Provided By International Association of Engineers

  • White Papers // Mar 2009

    Information System Modelling to Control Transport Operations Process

    This work describes the development of Enterprise Architect Unified Modeling Language (ea UML), Microsoft SQL Server, Borland C ++ Builder information model for qualitative operation of open-cast mining and transport systems including description of process, technical and organizational factors influencing on the efficiency of mining and transport operations processes. For...

    Provided By International Association of Engineers

  • White Papers // Jul 2009

    Hardware Co-Simulation for Video Processing Using Xilinx System Generator

    The use of rapid prototyping tools such as MATLABS-imulink and Xilinx System Generator becomes increasingly important because of time-to-market constraints. This paper presents a methodology for implementing real-time DSP applications on a reconfigurable logic platform using Xilinx System Generator (XSG) for Matlab. The methodology aims to improve the design verification...

    Provided By International Association of Engineers

  • White Papers // Oct 2010

    A Study on the Security Mechanism for Web Services

    Web Service has been widely used in the field of distributed application system. But the security issue of the Web Service has often been considered as a crucial barrier to its application in many fields that conducts sensitive information, such as E-commerce. In the paper, the authors introduce the Security...

    Provided By International Association of Engineers

  • White Papers // Oct 2010

    Video Conferencing With CAI for Better Impact on Training and Education: An Indian Scenario

    Videoconferencing is changing the way Education is being imparted. It facilitates the effective teaching, a face-to-face meeting environment, clearing the way for efficient communication. It is an effective form of communication with distinct benefits. Today, more than ever, it is proving to be an extremely powerful tool, helps to gain...

    Provided By International Association of Engineers

  • White Papers // Mar 2009

    Artificial Intelligence Techniques in Software Engineering (AITSE)

    Software development process is a very complex process that, at present, is primarily a human activity. Programming, in software development, requires the use of different types of knowledge: about the problem domain and the programming domain. It also requires many different steps in combining these types of knowledge into one...

    Provided By International Association of Engineers

  • White Papers // Mar 2009

    Direct Adaptive Backstepping Control for a Class of MIMO Non-Affine Systems Using Recurrent Neural Networks

    In this paper, the backstepping technique is used to design adaptive controller for a class of MIMO nonlinear uncertain non-affine systems. The backstepping technique provides a systematic framework and recursive design methodology for nonlinear systems. The design procedure treats the state variables as virtual control inputs; then, the virtual controllers...

    Provided By International Association of Engineers

  • White Papers // Mar 2009

    Genetic Algorithm Based Node Placement Methodology for Wireless Sensor Networks

    A Genetic Algorithm based multi-objective methodology was implemented for a self-organizing wireless sensor network. Design parameters such as network density, connectivity and energy consumption are taken into account for developing the fitness function. The genetic algorithm optimizes the operational modes of the sensor nodes along with clustering schemes and transmission...

    Provided By International Association of Engineers

  • White Papers // Mar 2009

    On the Development of Low-Power MAC Protocol for WBANs

    Current advances in wireless communication, microelectronics, semiconductor technologies, and intelligent sensors have contributed to the development of unobtrusive WBANs. These networks provide long term health monitoring of patients without any constraint in their normal activities. Traditional MAC protocols do not accommodate the assorted WBAN traffic requirements in a power efficient...

    Provided By International Association of Engineers

  • White Papers // Mar 2009

    Energy Efficient Data Processing in Sensor Networks

    The sensor nodes in a Wireless Sensor Network (WSN) are tiny devices operating on batteries and employing low-power radio transceivers to enable communication. Minimizing energy consumption has been a major objective at all levels in sensor networks. In this paper, the authors present a data processing scheme that maintains the...

    Provided By International Association of Engineers

  • White Papers // Mar 2009

    A New Smith Predictor and Fuzzy RBF Neural Network Control for Wireless Networked Control Systems

    To aim at time-variant or random network delay in the Wireless Networked Control Systems (WNCS), as well as controlled plant might be uncertain, a novel approach is proposed that new Smith predictor combined with Fuzzy Radial Basis Function Neural Network (FRBFNN). Because new Smith dynamic predictor hides predictor model of...

    Provided By International Association of Engineers

  • White Papers // Mar 2009

    New Smith Predictor and Generalized Predictive Control for Wireless Networked Control Systems

    This paper aims at time-variant or uncertain network delay in the Wireless Networked Control Systems (WNCS), as well as Smith predictor models might be imprecise, a novel approach is proposed that new Smith predictor combined with Generalized Predictive Control (GPC) for the WNCS. Because new Smith dynamic predictor hides predictor...

    Provided By International Association of Engineers

  • White Papers // Mar 2010

    An Intelligent Fuzzy Neural Call Admission Control Mechanism for Guaranteed QoS in Heterogeneous Wireless Networks

    The Call Admission Control (CAC) is a Radio Resource Management (RRM) technique that plays instrumental role in ensuring the desired Quality of Service (QoS) to the users working on different applications with diversified QoS requirements in Next Generation Wireless Networks (NGWN). This paper proposes an Analytical system model and the...

    Provided By International Association of Engineers

  • White Papers // Jul 2011

    Techniques of Detection of the Hidden Node in Wireless Ad Hoc Network

    In the wireless ad hoc networks, every node is assured by an individual battery which the consumption for the communication and the calculation of data must be optimized to avoid the problem of energy consumption. In the wireless ad hoc network, MAC protocol synchronizes the access of nodes to the...

    Provided By International Association of Engineers

  • White Papers // Jul 2011

    Broker Architecture for Quality of Service

    Internet is growing exponentially; end-to-end Quality of Service (QoS) guarantees demand has gained significant importance and priority in the current time. Internet is characterized by applications like voice, video to normal data. These applications are seamlessly integrated into the Internet, it require right kind of Quality of service support in...

    Provided By International Association of Engineers

  • White Papers // Jul 2011

    Securing Cloud System Via Internal Control Management

    Data protection in cloud computing is constantly been an issue of discussion. There will always be something left undone, incomplete, insecure and un-established. But a chance of improvement will be there every time. The data access should be monitored whenever there is a move from the client side. Also the...

    Provided By International Association of Engineers

  • White Papers // Jul 2011

    A Proposed Framework to Prevent Financial Fraud Through ATM Card Cloning

    This paper gives the intersection between the cash cards standards followed in the banks and the financial frauds done by the cash card cloning. It undertakes two primary tasks; namely understanding of the traditional standard cash card provided by the banks and a proposed methodology to make them more secure...

    Provided By International Association of Engineers

  • White Papers // Jul 2011

    Self-Adaptability in Secure Embedded Systems: An Energy-Performance Trade-Off

    Securing embedded systems is a challenging and important research topic due to limited computational and memory resources. Moreover, battery powered embedded systems introduce power constraints that make the problem of deploying security more difficult. This problem may be addressed by improving the trade-off between minimizing energy consumption and maintaining a...

    Provided By International Association of Engineers

  • White Papers // Jul 2011

    A Novel Encryption System Using Layered Cellular Automata

    As the technology is rapidly advancing day by day sharing of information over the internet is experiencing an explosive growth, which in turn is also posing new threats and vulnerabilities in the existing systems. The quest for more stronger and reliable methodologies to tackle the security issues is unending. In...

    Provided By International Association of Engineers

  • White Papers // Jul 2011

    An Interactive Firewall Simulator for Information Assurance Education

    In this paper, the authors present an interactive firewall simulator to help students learn the intricacies of configuring a firewall to prevent attacks. The design principles of the simulator are to be competitive and fun to use while teaching the student the details of firewall configuration. The firewall simulator demonstrates...

    Provided By International Association of Engineers

  • White Papers // Jul 2011

    Standards and Frameworks for Information System Security Auditing and Assurance

    Most organizations in all sectors of industry, commerce and government are fundamentally dependent on their Information Systems (IS) and would quickly cease to function should the technology (preferably Information Technology - IT) that underpins their activities ever come to halt. The IT developments may have enormous implications for the operation,...

    Provided By International Association of Engineers

  • White Papers // Jul 2011

    Models for Recommender Systems in Web Usage Mining Based on User Ratings

    In web applications, recommender systems apply statistical and knowledge discovery techniques to predict and make recommendations to the users. Automatic predictions on the interests of the users are made by the collection of ratings and other information from many other users. Collaborative filtering recommender systems make such predictions. Most of...

    Provided By International Association of Engineers

  • White Papers // Jul 2011

    Dynamic Bandwidth Shaping Algorithm for Internet Traffic Sharing Environments

    For emerging Internet services and contents in the traffic-sharing environment of limited bandwidth capacity, an efficient method is required to manage the Internet-sharing problem and to improve Quality of Service (QoS) for high-demand bandwidth users. The results of the authors' study show that dynamically delaying un-attended Internet usage activities, such...

    Provided By International Association of Engineers

  • White Papers // Jul 2011

    Simulation and Design of Broad-Band Slot Antenna for Wireless Applications

    As wireless communication applications require more and more bandwidth, the demand for wideband antennas increases as well. The design of an efficient wideband small size antenna for recent wireless applications is a major challenge. The microstrip patch antenna have found extensive applications in wireless communication systems owing to their advantages...

    Provided By International Association of Engineers

  • White Papers // Jul 2011

    Performance Analysis of Energy Consumption of AFECA in Wireless Sensor Networks

    Energy consumption is one of the most important problems to be solved in wireless sensor networks, since sensor nodes are operated with battery power. Therefore, it is necessary to put the wireless interface of sensor nodes into low power sleep state as much as possible when communication with neighbor sensor...

    Provided By International Association of Engineers

  • White Papers // Jul 2011

    Performance of Linear Maximum Likelihood Alamouti Decoder With Diversity Techniques

    Multiple Input Multiple Output (MIMO) communication systems with Orthogonal Frequency Division Multiplexing (OFDM) modulation have a great potential to play an important part in the design of the next generation broadband wireless communication system. In this paper, the Bit Error Rate (BER) performance using Linear Maximum Likelihood Alamouti Combiner (LMLAC)...

    Provided By International Association of Engineers

  • White Papers // Jul 2011

    Data Collection, Communications and Processing in the Sumatran GPS Array (SuGAr)

    The Sumatran GPS array spans approximately 1300 km along the West coast of Sumatra, Indonesia. Almost 40 monitoring stations periodically collect high accuracy continuous GPS readings, and convey these to a central server for post-processing in Singapore. Solutions from the array data are used to provide precise measurements of the...

    Provided By International Association of Engineers

  • White Papers // Jul 2011

    A Comparison of Multiple Algorithms for Fingerprinting Using IEEE802.11

    The effectiveness of Location Based Systems depends on the correct location of users and mobile devices. While the outdoor location can be easily calculated, using technologies such as GPS (Global Positioning System), it is more difficult to obtain when the location scenario is an indoor environment. Several technologies and location...

    Provided By International Association of Engineers

  • White Papers // Jul 2011

    Vertical Handover in Wireless Overlay Networks With Quality of Service Factors

    This paper's main focus is on vertical handover to preserve mobile nodes' connections in spite of its movement from one network to another heterogeneous network and also provide quality of service factors' utilization. This vertical handover involves procedures of registration, binding, route optimization, and bi-directional tunneling mode so that transition...

    Provided By International Association of Engineers

  • White Papers // Jul 2011

    Comparative Performance Evaluation of Wi-Fi IEEE 802.11 B,G WEP Point-to-Point Links

    Wireless communications using microwaves are increasingly important, e.g. Wi-Fi. Performance is a crucial issue, leading to more reliable and efficient communications. Security is equally important. Laboratory measurements are made about several performance aspects of Wi-Fi (IEEE 802.11b, g) WEP point-to-point links. A contribution is given to performance evaluation of this...

    Provided By International Association of Engineers