International Association of Engineers

Displaying 1-40 of 169 results

  • White Papers // Aug 2013

    Designing Optimized Architecture for Network Security Devices

    Cyber crimes are growing and it is expected that by 2017, the global cyber crime market would value at around $120 billion. It has been found that on an average, 18 users become victims of cyber crime. Viruses, malware, Trojans, worms, SQL injection and phishing are some of the malpractices...

    Provided By International Association of Engineers

  • White Papers // Jul 2012

    Repair Analysis for Embedded Memories Using Block-Based Redundancy Architecture

    Capacity and density of embedded memories have rapidly increased therefore they have higher probability of faults. As a result, yield of system-on-a-chip designs with embedded memories drops. Built-in self-repair is widely used to improve manufacturing yield by replacing faulty memory cells with redundant elements. Most approaches perform reconfiguration on the...

    Provided By International Association of Engineers

  • White Papers // Jul 2012

    Performance of OCDMA Systems With Different Detection Schemes Using Enhanced Double Weight (EDW) Code

    This paper investigates the performance of Enhanced Double Weight (EDW) code for Spectral-Amplitude-Coding optical Code Division Multiple Access (SAC-OCDMA) system using different detection techniques. EDW code is the enhanced version of modified double weight code. Enhanced double weight code possesses ideal cross-correlation properties and weight can be any odd number...

    Provided By International Association of Engineers

  • White Papers // Jul 2012

    Computer Simulation and Performance Evaluation of Single Mode Fiber Optics

    The goal of an optical fiber communication system is to transmit the maximum number of bits per second over the maximum possible distance with the fewest errors. Single mode optical fibers have already been one of the major transmission media for long distance telecommunication, with very low-losses and wide-bandwidth. The...

    Provided By International Association of Engineers

  • White Papers // Jul 2012

    Proposal for Low Cost GSM Based Electric Meter for Efficient and Automated Meter Reading for Developing Countries

    Intelligent choice between energy technologies plays a vital role in energy planning and efficient electricity management. Scare resources, lack of expertise and shortage of capital are the major hurdle for developing countries opting cutting edge technologies. Cheap and outdated billing system is prone to error and source of corruption. The...

    Provided By International Association of Engineers

  • White Papers // Jul 2012

    External Memory System Optimization for FPGABasedImplementation of Speech Signal Processing

    A field programmable gate array is an integrated circuit designed to be configured and implemented any logical function. Recently, the use of an FPGA becomes a suited way to implement real time signal processing systems because of the increasing number of logic elements and clock frequencies. However the real time...

    Provided By International Association of Engineers

  • White Papers // Jul 2012

    Modeling an OBS Network in OMNeT + + and the Impact of Data Channels in Such Network

    This paper is to implement the architecture of the optical burst switching network in a discrete event simulation in order to conduct future studies in the behavior and the loss resolution in such networks by determining the burst-loss probability depending on the increase of the number of implemented data channels....

    Provided By International Association of Engineers

  • White Papers // Jul 2012

    Investigation on the Microwave Performance of a High-Speed Opto-Electronic Hybrid Integrated Platform

    An opto-electronic hybrid integrated platform was developed to enable the fabrication of broadband, lowcost, and compact transceivers for telecommunications. On this platform, an opto-electronic device such as a high-speed laser or a photodetector chip is integrated with a RF driver or an amplifier IC. A Kovar heatsink with multistep structure...

    Provided By International Association of Engineers

  • White Papers // Jul 2012

    Improvement in the Spectral Efficiency Achieved in OCDMA Using 1-Dimensional OOCs

    An Optical Orthogonal Code (OOC) is defined as collection of binary sequences with good auto and cross-correlation properties. Unlike bipolar code having correlation side-lobes and cross-correlation function close-to-zero, for OOC's the best correlation side-lobes and cross-correlation function is unity, which means that no distance between the positions of ones in...

    Provided By International Association of Engineers

  • White Papers // Jul 2012

    Mobile Social Computing as Assistive Technology for Improving Elderly Care

    In this paper, the engineering framework for social computing systems for elderly care is being presented. The central theme is to make elderly care a family and community wide social event. The paradigm shift in the social media has driven many applications that are directed towards driving innovation in an...

    Provided By International Association of Engineers

  • White Papers // Jul 2012

    A Model to Provide a Reliable Infrastructure for Cloud Computing

    The cloud computing offers dynamically scalable resources provided as a service over the Internet. It promises the drop in capital expenditure. But practically speaking if this is to become reality there are still some challenges which is to be still addressed. Amongst, the main issues are related to security and...

    Provided By International Association of Engineers

  • White Papers // Jul 2012

    HAMP - A Highly Abstracted and Modular Programming Paradigm for Expressing Parallel Programs on Heterogeneous Platforms

    With the start of the parallel computing era, due to power and thermal considerations, there is a growing need to bridge the gap between parallel hardware and software. The unintuitive nature of parallel programming and the high learning curve often prove a bottleneck in the development of quality parallel software....

    Provided By International Association of Engineers

  • White Papers // Jul 2012

    Fast Adaptive Filtering Algorithm for Acoustic Noise Cancellation

    In this paper, the authors propose an algorithm based on the adaptive filtering which they can use for the noise cancellation. This algorithm is stable numerically and very powerful when the input signal is stationary with additive noise on the output signal. It has a high convergence speed comparable with...

    Provided By International Association of Engineers

  • White Papers // Jul 2012

    An Interactive Shadow Detection and Removal Tool Using Granular Reflex Fuzzy Min-Max Neural Network

    This paper proposes an interactive tool to detect and remove shadows from colour images. The proposed method uses a Granular Reflex Fuzzy Min-Max Neural Network (GrRFMN) as a shadow classifier. GrRFMN is capable to process granules of data i.e. group of pixels in the form of hyperboxes. Granular data classification...

    Provided By International Association of Engineers

  • White Papers // Jul 2012

    A Genetic Algorithm Approach for Multiuser Scheduling on the LTE Downlink

    The problem of multi-user radio resource scheduling on the downlink of a Long Term Evolution (LTE) cellular communication system is addressed in this paper. The optimization model used imposed that the radio resources for multiple users are jointly allocated at the air-interface. The study shows that optimal and near optimal...

    Provided By International Association of Engineers

  • White Papers // Jul 2012

    Performance Analysis of Energy Consumption of Mobile Station in Three-Tier Network

    Multi-tier network consists of multiple access networks, which are complimentary to each other, from the aspect of mobility support, service coverage area, transmission bandwidth, energy consumption, etc. In previous works on multi-tier network, most of them deal with two access networks. Also the performance of multi-tier location management was analyzed,...

    Provided By International Association of Engineers

  • White Papers // Jul 2012

    Enhanced Random Walk With Choice: An Empirical Study

    The Random Walk with d Choice (RWC(d)) is a recently proposed variation of the simple Random Walk that first selects a subset of d neighbor nodes and then decides to move to the node which minimizes the value of a certain parameter; this parameter captures the number of past visits...

    Provided By International Association of Engineers

  • White Papers // Jul 2012

    The Impact of Initial Network Topology on Performance of Routing Algorithms in MANETs

    The impact of the initial network topology on performance of routing algorithms is explored. Typically researchers use a randomly chosen network topology for performance evaluation of their protocols and algorithms. Here, the authors show that the initial network topology can have a significant impact on algorithm performance and can lead...

    Provided By International Association of Engineers

  • White Papers // Jul 2012

    Design of PID Controllers for TCP/AQM Wireless Networks

    Internet users rely on the good capabilities of TCP/IP networks for dealing with congestion. The network delay and the number of users change constantly, which might lead to transmission problems. Usually, they are handled following approaches such as drop tail or Random Early Detection (RED) algorithms. During the last few...

    Provided By International Association of Engineers

  • White Papers // Jul 2012

    Comparative Performance Evaluation of Wi-Fi IEEE 802.11 A,G WEP PTP Links

    Wireless communications using microwaves are increasingly important, such as Wi-Fi. Performance is a crucial issue, leading to more reliable and efficient communications. Security is equally important. Laboratory measurements are made about several performance aspects of Wi-Fi (IEEE 802.11a, g) WEP point-to-point links. A contribution is given to performance evaluation of...

    Provided By International Association of Engineers

  • White Papers // Jul 2012

    Automatic Frequency Planning and Optimization Algorithm for Cellular Networks

    Frequency planning in ever growing cellular networks is an extremely arduous task. Any effort to lay down manual frequency plans promulgates inefficiency in the cellular radio systems. The extensive deployment and penetration of cellular networks necessitate the need to carry out automatic frequency planning. This paper presents a novel and...

    Provided By International Association of Engineers

  • White Papers // Jul 2012

    Investigating Clustering Algorithms in Microsensor Networks

    The design of a microsensor network has to be carried out under several constraints, e.g., limited energy source and dynamic network topology. One practical design scheme in WSNs is clustering. Clustering is an energy efficient and scalable way to organize the WSN. Clustering can stabilize the network topology at the...

    Provided By International Association of Engineers

  • White Papers // Jul 2012

    Security Management System for 4G Heterogeneous Networks

    In recent years, there have been major developments in, and deployment of, diverse mobile technology. Security issues in mobile computing are now presenting significant challenges. The ability to move from one network to another, and from one provider to another creating thus vertical and horizontal handoffs, has increased the complexity...

    Provided By International Association of Engineers

  • White Papers // Jul 2012

    Performance Evaluation of Wi-Fi IEEE 802.11 A,G WPA2 PTP Links: A Case Study

    Wireless communications using microwaves are increasingly important, such as Wi-Fi. Performance is a most fundamental issue, leading to more reliable and efficient communications. Security is equally very important. Laboratory measurements are made about several performance aspects of Wi-Fi (IEEE 802.11a, g) WPA2 point-to-point links. A contribution is given to performance...

    Provided By International Association of Engineers

  • White Papers // Jul 2012

    Application of Routing Algorithm to Congestion Control in GSM Network

    Maximizing bandwidth utilization and provision of guaranteed performance in the context of GSM (Global Satellite for Mobile Communications) networks, are two incompatible goals. Heterogeneity of the multimedia sources call for effective Congestion Control schemes to satisfy their diverse quality of service requirement. This include admission control at the connection set-up,...

    Provided By International Association of Engineers

  • White Papers // Jul 2012

    A Study of Deploying Intrusion Detection Systems in Mobile Ad Hoc Networks

    This paper presents an approach to prevent attacks in MANETs by deploying intrusion detection nodes. Some nodes performing Intrusion Detection Systems, IDS nodes for short, are used to mitigate attacks. Two kinds of attacks, wormhole attacks and black hole attacks are addressed in the paper. The modules used to mitigate...

    Provided By International Association of Engineers

  • White Papers // Jul 2012

    A Lightweight Indoor Localization Model Based on Motley-Keenan and COST

    This paper presents a novel approach to WLAN propagation models for use in indoor localization. The major goal of this work is to eliminate the need for in situ data collection to generate the Fingerprinting map, instead, it is generated by using analytical propagation models such as: COST Multi-Wall, COST...

    Provided By International Association of Engineers

  • White Papers // Jul 2012

    Data Quality Assessment in Performance Measurement

    Data quality is a multi-dimensional concept and this research will explore its impact in performance measurement systems. Despite the large numbers of publications on the design of Performance Measurement Systems (PMSs) and the definition of critical success factors to develop Performance Measures (PMs), from the data user perspective there are...

    Provided By International Association of Engineers

  • White Papers // Jul 2012

    Critical Successful Factors (CSFs) for Successful Implementation of Lean Tools and ERP Systems

    Due to market competition and continuous pressure on businesses, there is always a need to adopt innovative tools and techniques, to reduce waste and concentrate on value adding activities. Consequently, the integration of lean tools and Enterprise Resource Planning (ERP) systems currently seem to be in high demand for both...

    Provided By International Association of Engineers

  • White Papers // Jul 2012

    SLA Business Management Based on Key Performance Indicators

    It is increasingly important that Service Level Agreements (SLAs) are taken into account when business processes are exposed as services in a Service Oriented Architecture. SLAs define expected service behavior and nonfunctional properties of the service. The fact that the service provider has to offer certain guarantees concerning SLA properties...

    Provided By International Association of Engineers

  • White Papers // Jul 2012

    E.Kesavulu Reddy Cryptosystem to Resistance Against Simple Power Analysis Attacks in Mobile Devices

    Elliptic curve cryptosystems are more efficient and secure than the conventional cryptosystems like RSA cryptosystems. The authors develop a secret Key in the EKR modified Montgomery Inversion Algorithm to avoid leaks the value of function f in Almost Montgomery Inversion Algorithm. The attacker can not guess the secret key (t)...

    Provided By International Association of Engineers

  • White Papers // Jul 2012

    Homomorphic Encryption Applied to the Cloud Computing Security

    Cloud computing security challenges and it's also an issue to many researchers; first priority was to focus on security which is the biggest concern of organizations that are considering a move to the cloud. The advantages of cloud computing include reduced costs, easy maintenance and re-provisioning of resources, and thereby...

    Provided By International Association of Engineers

  • White Papers // Jul 2012

    Establishment of ECC-Based Initial Secrecy Usable for IKE Implementation

    Internet Key Exchange (IKE) protocol is the most common usable mechanism to exchange keying materials and negotiate security associations between two distant entities. Similar to the several enhancements of the IKE protocols, the paper proposes a new flexible approach for complexity reduction and security improvement of the IKE implementation. In...

    Provided By International Association of Engineers

  • White Papers // Jul 2012

    Claims-Based Enterprise-Wide Access Control

    Access control is a primary consideration when standing up a high-assurance, internet-scale, and web-service based enterprise system for information sharing,. A generalized standards-based solution is presented. Central to this system is a process for access control that provides the fine-grained authorities for use by enterprise services. In all cases, the...

    Provided By International Association of Engineers

  • White Papers // Jul 2012

    An Improved Framework for Intrusion Alert Correlation

    Alert correlation analyzes the alerts from one or more collaborative Intrusion Detection Systems (IDSs) to produce a concise overview of security-related activity on the network. The process consists of multiple components, each responsible for a different aspect of the overall correlation goal. The sequence order of the correlation components affects...

    Provided By International Association of Engineers

  • White Papers // Jul 2012

    A Data Mining E-Learning Tool: Description and Case Study

    Data analysis and data mining techniques are recognized as important disciplines that deliver 'Sophisticated domain knowledge'. The Association of Computing Machinery (ACM) and the IEEE-Computer Society suggest in the 2013 draft Computer Science curricula, Data Mining as an elective course and an important course topic in previous Information Systems or...

    Provided By International Association of Engineers

  • White Papers // Jul 2012

    Fuzzy Local ICA for Speaker Recognition Using Voice and Lip Motion

    Independent Component Analysis (ICA) is a powerful statistical method which can be used for many applications such as source separation, feature extraction or data representation. This paper proposes a new classification scheme spreading over two stages: density estimation using local ICA based on fuzzy clustering and correction of the estimation...

    Provided By International Association of Engineers

  • White Papers // Jul 2012

    Triple Security Generator in Smart Authentication Using Data Mining Techniques

    This paper is to authenticate and work with playlists by using Triple Security Generator (TSG). It is used to evaluate with best suitable data mining functions, to explore and express features and grouping of music. Here, the authors have three methods to authenticate playlists. The recommender systems are popular social...

    Provided By International Association of Engineers

  • White Papers // Jul 2012

    A Conceptual Framework for Analyzing Pricing Strategies

    One of the most difficult, yet important, issues that a firm must decide is how much to charge for its product/ service. Furthermore, considering the pressure of the developing technologies that shifts the consumers away from traditional distribution channels towards the Internet-based distribution channels, determining the most appropriate pricing strategy...

    Provided By International Association of Engineers

  • White Papers // Jul 2012

    A Comparative Study of Different Metric Structures: Thinking on GPU Implementations

    Now-a-days, similarity search is becoming a field of increasing interest because these kinds of methods can be applied to different areas in science and engineering, for instance, pattern recognition, information retrieval, etc. This search is carried out over metric indexes decreasing the number of distance evaluations during the search process,...

    Provided By International Association of Engineers

  • White Papers // Mar 2012

    Comparative Study on Email Spam Classifier Using Data Mining Techniques

    In this e-world, most of the transactions and business is taking place through e-mails. Now-a-days, email becomes a powerful tool for communication as it saves a lot of time and cost. But, due to social networks and advertisers, most of the emails contain unwanted information called spam. Even though lot...

    Provided By International Association of Engineers

  • White Papers // Aug 2013

    Designing Optimized Architecture for Network Security Devices

    Cyber crimes are growing and it is expected that by 2017, the global cyber crime market would value at around $120 billion. It has been found that on an average, 18 users become victims of cyber crime. Viruses, malware, Trojans, worms, SQL injection and phishing are some of the malpractices...

    Provided By International Association of Engineers

  • White Papers // Jul 2009

    Simplified Filtering Estimator for Spacecraft Attitude Determination From Phase Information of GPS Signals

    This paper presents an implementation of a simplified filtering estimator for satellite attitude determination using GPS (Global Positioning System) signals. The non-linear system of estimator was modelled using Euler angles parameterisation which applicable for real-time operation onboard-satellite. An approach was to keep a pitch state independent of roll and yaw....

    Provided By International Association of Engineers

  • White Papers // Mar 2009

    Issuance of Proxy Certificate Residing in Web Portal by Browser Based Digital Certificate Through HyperText Transfer Protocol

    Proxy certificate has been used in many web portal services, especially if the remote services require the services to act on user behalf to connect to other servers that require certificate based authentication. This paper describes the method of enabling direct creation of proxy certificate via web browser to web...

    Provided By International Association of Engineers

  • White Papers // Oct 2008

    MyProLang - My Programming Language: A Template-Driven Automatic Natural Programming Language

    Are modern programming languages governed unlike natural languages? Are their complex syntactic rules governed? Yes, states the paper. And that it requires a lot of manual work, training and practice to become skilled enough to write programs correctly. The paper states computer programming being difficult, unfamiliar, complicated, non-automated and challenging...

    Provided By International Association of Engineers

  • White Papers // Jul 2009

    MULEP-A Multi Level e-Procurement System With Distributed Agents

    Supply chain management meets customer demands by making efficient use of various resources such as inventory, distribution logistics and labor. E-procurement tools are good for making the best of supply chain. This paper discusses the integration of e-procurement tools and supply chain management and designs a multi level hierarchy of...

    Provided By International Association of Engineers

  • White Papers // Dec 2008

    Multi-Application Authentication Based on Multi-Agent System

    jBPM is a JBoss solution for Business Process Management (BPM) that was created so as to allow software engineers to share the same concepts and frameworks as business analysts. The jBPM BPM solution works on the JBoss Application Server, which is a programmatic structure that can be used to design...

    Provided By International Association of Engineers

  • White Papers // Mar 2010

    Exploring the Behavior of Mobile Ad Hoc Network Routing Protocols with Reference to Speed and Terrain Range

    A mobile Ad Hoc network is a collection of autonomous mobile nodes that communicate with each other over wireless links. Such networks are expected to play increasingly important role in future civilian and military settings, being useful for providing communication support where no fixed infrastructure exists or the deployment of...

    Provided By International Association of Engineers

  • White Papers // Jul 2010

    FIP Over Ethernet/IP for Real Time Distributed Systems Implementation

    This paper presents the realization of a platform for testing and validating distributed real time systems (DRTS), by following a methodology of development. The main contribution remains the realization of an industrial communication bus (FIP: Factory Instrumentation Protocol) implemented on an Ethernet platform. The work focuses on improving the response...

    Provided By International Association of Engineers

  • White Papers // Oct 2010

    A Survey Of Success Factors For CRM

    Customer Relationship Management has become the main interest of researchers and practitioners especially in the domains of Marketing and Information Systems (IS). This paper is an overview on success factors that could facilitate successful implementation of CRM. In the past decades, the challenge for businesses was optimizing production process to...

    Provided By International Association of Engineers

  • White Papers // Mar 2009

    Transmission Network Congestion In Deregulated Wholesale Electricity Market

    Electricity market plays an important role in improving the economics of electrical power system. Transmission network is vital entity in open access deregulated wholesale electricity market. Whenever transmission network congestion occurs in electricity market, it divides the market in different zones and the trading price of electricity will no longer...

    Provided By International Association of Engineers

  • White Papers // Oct 2009

    Dynamic Behavior of Bandwidth Control Management in Mobile Ad-Hoc Network

    Quality of Service (QoS) support in Mobile Ad-hoc NETworks (MANETs) is a challenging task. The major challenge in ad hoc networks lies in adapting multicast communication to environments, where mobility is unlimited and failures are frequent. Such problems increase the delays and decrease the throughput. To meet these challenges, authors...

    Provided By International Association of Engineers

  • White Papers // Oct 2009

    A Comparative Analysis of Network Benchmarking Tools

    Nowadays, there is a wide variety of network benchmarking tools, giving researchers and network administrators many choices to work with. However, this variety tends to difficult the selection process of the appropriate tool. Furthermore, sometimes users are forced to try several tools in order to find the one that calculates...

    Provided By International Association of Engineers

  • White Papers // Mar 2009

    Design of a Numerical Adaptive Relay Based on Memory Mapped Techniques

    This work describes the design of a DSP (Digital Signal Processor) based Adaptive Numerical Mho relay, to be used for distance protection schemes of long distance transmission lines. The relay settings will be automatically adjusted with the changes of power system parameters with the variation of frequency as well as...

    Provided By International Association of Engineers

  • White Papers // Oct 2008

    Embedded Controller Based Smart Card Access

    The most common devices used to control access to private areas where sensitive work is being carried out or where data is held, are keys, badges and magnetic cards. These all have the same basic disadvantages: they can easily be duplicated and when stolen or passed on, they can allow...

    Provided By International Association of Engineers

  • White Papers // Mar 2009

    Information System Modelling to Control Transport Operations Process

    This work describes the development of Enterprise Architect Unified Modeling Language (ea UML), Microsoft SQL Server, Borland C ++ Builder information model for qualitative operation of open-cast mining and transport systems including description of process, technical and organizational factors influencing on the efficiency of mining and transport operations processes. For...

    Provided By International Association of Engineers

  • White Papers // Aug 2008

    A Forward Error Correcting System for Wireless E1 ATM Links

    Asynchronous Transfer Mode (ATM) is a technology designed for wired media where the BER is of the order 1 in 108 or better. When ATM is used over wireless links where the order of errors is 1 in 1000, the performance degrades. In order to maintain the performance it is...

    Provided By International Association of Engineers

  • White Papers // Nov 2008

    Automatic Identification of Potential Reusable Mobile Components

    The software can be developed from scratch or the authors can make use of already developed software components, which can enhance the productivity and quality. On Internet, a large collection of software code is being offered by open-access repositories but, how one can identify a relevant and good quality code...

    Provided By International Association of Engineers

  • White Papers // Jul 2009

    Hardware Co-Simulation for Video Processing Using Xilinx System Generator

    The use of rapid prototyping tools such as MATLABS-imulink and Xilinx System Generator becomes increasingly important because of time-to-market constraints. This paper presents a methodology for implementing real-time DSP applications on a reconfigurable logic platform using Xilinx System Generator (XSG) for Matlab. The methodology aims to improve the design verification...

    Provided By International Association of Engineers

  • White Papers // Oct 2008

    Speed Trap Image Transfer Through GSM Network

    In this paper, a simple cost-effective solution is proposed, by which devices used in this project can be controlled remotely while the user is anywhere across the globe. Short Message Service (SMS) and Multimedia Messaging Service (MMS) is a mechanism of delivery of short messages and also image over the...

    Provided By International Association of Engineers

  • White Papers // Oct 2010

    A Study on the Security Mechanism for Web Services

    Web Service has been widely used in the field of distributed application system. But the security issue of the Web Service has often been considered as a crucial barrier to its application in many fields that conducts sensitive information, such as E-commerce. In the paper, the authors introduce the Security...

    Provided By International Association of Engineers

  • White Papers // Oct 2010

    Video Conferencing With CAI for Better Impact on Training and Education: An Indian Scenario

    Videoconferencing is changing the way Education is being imparted. It facilitates the effective teaching, a face-to-face meeting environment, clearing the way for efficient communication. It is an effective form of communication with distinct benefits. Today, more than ever, it is proving to be an extremely powerful tool, helps to gain...

    Provided By International Association of Engineers

  • White Papers // Mar 2009

    Artificial Intelligence Techniques in Software Engineering (AITSE)

    Software development process is a very complex process that, at present, is primarily a human activity. Programming, in software development, requires the use of different types of knowledge: about the problem domain and the programming domain. It also requires many different steps in combining these types of knowledge into one...

    Provided By International Association of Engineers

  • White Papers // Mar 2009

    Direct Adaptive Backstepping Control for a Class of MIMO Non-Affine Systems Using Recurrent Neural Networks

    In this paper, the backstepping technique is used to design adaptive controller for a class of MIMO nonlinear uncertain non-affine systems. The backstepping technique provides a systematic framework and recursive design methodology for nonlinear systems. The design procedure treats the state variables as virtual control inputs; then, the virtual controllers...

    Provided By International Association of Engineers

  • White Papers // Mar 2009

    Genetic Algorithm Based Node Placement Methodology for Wireless Sensor Networks

    A Genetic Algorithm based multi-objective methodology was implemented for a self-organizing wireless sensor network. Design parameters such as network density, connectivity and energy consumption are taken into account for developing the fitness function. The genetic algorithm optimizes the operational modes of the sensor nodes along with clustering schemes and transmission...

    Provided By International Association of Engineers

  • White Papers // Mar 2009

    On the Development of Low-Power MAC Protocol for WBANs

    Current advances in wireless communication, microelectronics, semiconductor technologies, and intelligent sensors have contributed to the development of unobtrusive WBANs. These networks provide long term health monitoring of patients without any constraint in their normal activities. Traditional MAC protocols do not accommodate the assorted WBAN traffic requirements in a power efficient...

    Provided By International Association of Engineers

  • White Papers // Mar 2009

    Energy Efficient Data Processing in Sensor Networks

    The sensor nodes in a Wireless Sensor Network (WSN) are tiny devices operating on batteries and employing low-power radio transceivers to enable communication. Minimizing energy consumption has been a major objective at all levels in sensor networks. In this paper, the authors present a data processing scheme that maintains the...

    Provided By International Association of Engineers

  • White Papers // Mar 2009

    A New Smith Predictor and Fuzzy RBF Neural Network Control for Wireless Networked Control Systems

    To aim at time-variant or random network delay in the Wireless Networked Control Systems (WNCS), as well as controlled plant might be uncertain, a novel approach is proposed that new Smith predictor combined with Fuzzy Radial Basis Function Neural Network (FRBFNN). Because new Smith dynamic predictor hides predictor model of...

    Provided By International Association of Engineers

  • White Papers // Mar 2009

    New Smith Predictor and Generalized Predictive Control for Wireless Networked Control Systems

    This paper aims at time-variant or uncertain network delay in the Wireless Networked Control Systems (WNCS), as well as Smith predictor models might be imprecise, a novel approach is proposed that new Smith predictor combined with Generalized Predictive Control (GPC) for the WNCS. Because new Smith dynamic predictor hides predictor...

    Provided By International Association of Engineers

  • White Papers // Mar 2010

    An Intelligent Fuzzy Neural Call Admission Control Mechanism for Guaranteed QoS in Heterogeneous Wireless Networks

    The Call Admission Control (CAC) is a Radio Resource Management (RRM) technique that plays instrumental role in ensuring the desired Quality of Service (QoS) to the users working on different applications with diversified QoS requirements in Next Generation Wireless Networks (NGWN). This paper proposes an Analytical system model and the...

    Provided By International Association of Engineers

  • White Papers // Jul 2011

    Techniques of Detection of the Hidden Node in Wireless Ad Hoc Network

    In the wireless ad hoc networks, every node is assured by an individual battery which the consumption for the communication and the calculation of data must be optimized to avoid the problem of energy consumption. In the wireless ad hoc network, MAC protocol synchronizes the access of nodes to the...

    Provided By International Association of Engineers

  • White Papers // Jul 2011

    Broker Architecture for Quality of Service

    Internet is growing exponentially; end-to-end Quality of Service (QoS) guarantees demand has gained significant importance and priority in the current time. Internet is characterized by applications like voice, video to normal data. These applications are seamlessly integrated into the Internet, it require right kind of Quality of service support in...

    Provided By International Association of Engineers

  • White Papers // Jul 2011

    Securing Cloud System Via Internal Control Management

    Data protection in cloud computing is constantly been an issue of discussion. There will always be something left undone, incomplete, insecure and un-established. But a chance of improvement will be there every time. The data access should be monitored whenever there is a move from the client side. Also the...

    Provided By International Association of Engineers

  • White Papers // Jul 2011

    A Proposed Framework to Prevent Financial Fraud Through ATM Card Cloning

    This paper gives the intersection between the cash cards standards followed in the banks and the financial frauds done by the cash card cloning. It undertakes two primary tasks; namely understanding of the traditional standard cash card provided by the banks and a proposed methodology to make them more secure...

    Provided By International Association of Engineers

  • White Papers // Jul 2011

    Self-Adaptability in Secure Embedded Systems: An Energy-Performance Trade-Off

    Securing embedded systems is a challenging and important research topic due to limited computational and memory resources. Moreover, battery powered embedded systems introduce power constraints that make the problem of deploying security more difficult. This problem may be addressed by improving the trade-off between minimizing energy consumption and maintaining a...

    Provided By International Association of Engineers

  • White Papers // Jul 2011

    A Novel Encryption System Using Layered Cellular Automata

    As the technology is rapidly advancing day by day sharing of information over the internet is experiencing an explosive growth, which in turn is also posing new threats and vulnerabilities in the existing systems. The quest for more stronger and reliable methodologies to tackle the security issues is unending. In...

    Provided By International Association of Engineers

  • White Papers // Jul 2011

    An Interactive Firewall Simulator for Information Assurance Education

    In this paper, the authors present an interactive firewall simulator to help students learn the intricacies of configuring a firewall to prevent attacks. The design principles of the simulator are to be competitive and fun to use while teaching the student the details of firewall configuration. The firewall simulator demonstrates...

    Provided By International Association of Engineers

  • White Papers // Jul 2011

    Standards and Frameworks for Information System Security Auditing and Assurance

    Most organizations in all sectors of industry, commerce and government are fundamentally dependent on their Information Systems (IS) and would quickly cease to function should the technology (preferably Information Technology - IT) that underpins their activities ever come to halt. The IT developments may have enormous implications for the operation,...

    Provided By International Association of Engineers

  • White Papers // Jul 2011

    Models for Recommender Systems in Web Usage Mining Based on User Ratings

    In web applications, recommender systems apply statistical and knowledge discovery techniques to predict and make recommendations to the users. Automatic predictions on the interests of the users are made by the collection of ratings and other information from many other users. Collaborative filtering recommender systems make such predictions. Most of...

    Provided By International Association of Engineers

  • White Papers // Jul 2011

    Dynamic Bandwidth Shaping Algorithm for Internet Traffic Sharing Environments

    For emerging Internet services and contents in the traffic-sharing environment of limited bandwidth capacity, an efficient method is required to manage the Internet-sharing problem and to improve Quality of Service (QoS) for high-demand bandwidth users. The results of the authors' study show that dynamically delaying un-attended Internet usage activities, such...

    Provided By International Association of Engineers