International Association of Engineers

Displaying 1-40 of 748 results

  • White Papers // Mar 2015

    Key Factors Affecting User Experience of Mobile Recommendation Systems

    With the growing need for user-friendly design of mobile software, user experience has attracted more attention from researchers and practitioners. In particular, it is vital to improve the user acceptance of mobile recommendation systems that are new technologies that provide convenience for mobile device users. Based on recent studies, this...

    Provided By International Association of Engineers

  • White Papers // Mar 2015

    Online Signature Verification for Multi-modal Authentication using Smart Phone

    In this age of technology, authentication has become a burning issue. Demand for new ways to authenticate people are increasing every day. The technological boom in mobile industry has also opened new playing fields. This creates opportunities to implement authentication models that utilize mobile technology. To be more robust and...

    Provided By International Association of Engineers

  • White Papers // Mar 2015

    A Cloud -based Wireless Mesh Network with Adaptive Data Storage Functions

    In recent years, there has been considerable interest in developing and using wireless mesh networks. Compared to wireless local area networks, wireless mesh networks are more flexible because mesh routers are interconnected by wireless links. In addition, they can be much easier to install and maintain, especially in environments where...

    Provided By International Association of Engineers

  • White Papers // Mar 2015

    On -Premises Cloud Storage - Security Aspects for Small and Medium-sized Enterprises

    In this paper, the authors demonstrate and outlines the practical implementation of a secure cloud storage solution for Small and Medium-sized Enterprises (SMEs) by example of an Austrian company. It first introduces some basic principles of cloud storage and eventually focuses on a cloud storage solution considered to be optimal...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Experimental Validation of Lafortune-Lecours Propagation Model at 1900 MHz

    With an ever increasing demand for cellular voice and data services, many of the cellular providers are finding deployment of the in-building infrastructure inevitable. The in-building deployments allow for further re-use of the allocated spectrum and hence, they provide one of the most effective ways for increasing the overall system...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    ITU-T Future Networks: A Step Towards Green Computing

    In the field of telecommunications, Information and Communication Technologies (ICTs) the United Nations specialized agency is termed as International Telecommunication Union (ITU) which is a standard. Telecommunication Standardization Sector (ITU-T) is a permanent organ of ITU. ITU-T is identified to be responsible for studying technical, operation including tariff rates, grade...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Quality Measurement for Mobile Crop Production Management Applications

    Most ERP vendors proudly claim their solutions are available on mobile platforms, explaining that managers can access their ERP solution from their Smartphone's. The recent wave of Mobile-Enterprise Resource Planning (M-ERP) systems adoption is a significant commitment of resource and may affect almost all business processes. Mobile business boosting the...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    An Alternative Approach for Investigating the Impact of Mobile Phone Technology on Speech

    Creating a database of mobile phone speech recordings is the first step to studying the impact of mobile phone networks on various speech applications. The conventional way of creating such a database involves transmitting speech between two mobile phone devices across an actual network. However, this can only encompasses a...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Subjective Assessment of Mobile Videos Quality for Long Term Evolution (LTE) Cellular Networks

    In this paper, the authors introduce a Mobile Video Quality Prediction (MVQP) project for Long Term Evolution (LTE). The MVQP aims to predict the quality of streaming video service over User Datagram Protocol (UDP) in LTE cellular networks. In this paper, 100 subjects evaluated video quality using smart phones based...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Object Manipulation Through Explicit Force Control Using Cooperative Mobile Multi-Robot Systems

    Transportation of objects by groups of mobile robots can be advantageous when an object is too large or heavy to be effectively manipulated by a single robot on its own. This paper proposes combining the cluster space control methodology with explicit force control to effectively and safely move such an...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Evaluating Protection of Computer Network in Education Sector

    The use of Information Technology (IT) in the higher education institutes was increased daily. Most of the literature mentioned that the ISO/IEC 27002:2005 is the most popular standard to follow in order to reach the best protection for computer Networks. A questionnaire was designed to determine the extent of satisfaction...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Wireless Sensor Deployment Method on 3D Environments to Maximize Quality of Coverage and Quality of Network Connectivity

    Sensor deployment is one of the most important issues which affect the overall performance of a Wireless Sensor Network (WSN). It is a challenging task to optimally deploy a limited number of sensors on Three Dimensional (3D) environments to maximize Quality of Coverage (QoC) and Quality of Network connectivity (QoN)....

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Neural Network Random Error Prediction on Wireless Local Area Network and Application of One-Dimensional Multi Resolution Wavelet De-Noising Technique

    Self-similarity is a phenomenon known as a random error in a discrete system and considered as one of the major factors that constitute a delay on a network; it affects the overall stability or performance and reduces the capacity utilization of the network. In view of this, an ON/OFF traffic...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Enhanced Bandwidth Sharing Scheme for Small and Medium Enterprises

    Small and Medium Enterprises (SMEs) setup wireless networks in order to make the process of communicating and sharing resources easier. SMEs implement wireless networks, because it's easy, fast and cheaper to implement. However, with the rapid growth within the SMEs sector. SMEs tend to hire more employees when they grow...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Effect of Threshold Voltage on Cylindrical Surrounding Double-Gate MOSFET for Wireless Sensor for Wireless RF Switches

    Wireless Sensor Network (WSN) technologies have potential applications in communication, entertainment, travel, retail, industry, medicine, environment monitoring, scientific observation, field surveillance, structure monitoring and many other areas. The Cylindrical Surrounding Double-Gate (CSDG) Silicon On Insulator (SOI) MOSFET is a leading device for nanotechnology. This paper presents an effect of threshold...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    A New Gateway Location Protocol for Mesh Networks

    Wireless Mesh Network (WMN) is a promising technology that can provide broadband Internet access. Traffic often routed in Wireless Mesh Backbone (WMB). This also extended to the mesh clients and the Internet and forward to then to mesh gateways. Strategically providing efficient and supervising of WMN is a tedious task...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    A Comparative Study of IEEE 802.11 Standards for Non-Safety Applications on Vehicular Ad Hoc Networks: A Congestion Control Perspective

    Vehicular Ad-hoc NETworks (VANETs) is an important component within the Intelligent Transportation Systems (ITS) that have been part of global strategy and advanced applications. The aim is to provide innovative services relating to various modes of transportation and traffic management. These systems enable users to reach their destinations better, safer...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    FDTD Simulation of a Mobile Phone Operating Near a One Metal Cell

    In recent years mobile phones or smart phones have gained popularity because of its versatility: internet capabilities, navigation and cameras. Engineering research on the subject of wireless phones and Radio Frequency (RF) energy has been conducted worldwide for many years. This paper presents results of placing a one metal cell...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Security Algorithm for Communication with Dynamic Routing

    The data transmission using cryptographic algorithm within multiple organization system with Randomizing delivery paths over wired and wireless networks has become the major issues for security of data communication over worldwide networks. This paper is to propose a dynamic routing with strong security. The strongest algorithm considered is Blow fish...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    A Review of Dynamic Spectrum Networks Using Cognitive Radio

    Future wireless networks are expected to be spectrum agile and use cognitive radio technologies. The spectrum regulatory committees have been taking measurable steps with regards to laying down the rules and implementing them, which will open the doors to dynamic spectrum network technologies based on cognitive radio. The usage of...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Theoretical Aspects of Ultra Wide Band

    Ultra Wide Band (UWB) technology can provide alternative communication solutions within the unlicensed band. Despite many years of development and deployment, UWB and its applications have been underutilized within the communications industry. Some reasons for this lack of acceptance are industry preference for more established technologies and a lack of...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Outdoor-to-Indoor Propagation Characteristics of 850 MHz and 1900 MHz Bands in Macro -Cellular Environments

    Building penetration loss at 850 MHz and 1900 MHz bands in suburban environment is measured. The measurements are conducted in real GSM networks. Four buildings are studied aiming to provide first-order statistics of the signal coverage inside buildings. Results show that the mean building penetration loss for the ground floor...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Wavelet Based Indoor Prediction of Global System for Mobile Communication (GSM) Signal Strength Attenuation

    In this paper, the authors monitored GSM signal strength (power) in an indoor environment and measured samples of the GSM signal strength on a Mobile Equipment (ME). They also, used one-dimensional multilevel wavelet to predict the fading phenomenon of the GSM signal measured and neural network clustering to determine the...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    The Comparative Analysis Between Sensory and Cognitive in Online Customer Reviews of Baby Formula

    Based on a big data service platform for industry informatization, the authors made a comparative analysis between sensory and cognitive in online customer reviews of baby formula. Three aspects of the customer reviews are analyzed. In the first part, the descriptive analysis was conducted to evaluate the customer reviews propensity...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Text Mining in Business Practice: Automatic Analysis of Customer Reviews for Business Support

    Automatic or semi-automatic (human-assisted) analysis of text sources can be a crucial key element in the business process. Modern companies face a growing competitive environment in which they do not compete only with their market competitors, but in a certain sense even with their customers. It is the customers who...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Prediction of Work Integrated Learning Placement Using Data Mining Algorithms

    Data mining in education is used to study data and discover new patterns that can be used for decision making. The classification algorithms are applied on educational data set for predicting work integrated learning placement based on student performance. J48, Bayes Net, Naive Bayes, Simple Cart, and REPTREE algorithms are...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Cerebration of Privacy Preserving Data Mining Algorithms

    Recent advances in data intensive information processing systems is becoming increasingly important to make decisions in business organizations. Precious & sensitive knowledgeable patterns may reside in the process of business analysis. Recently privacy preserving data mining have acquired a great extent by data mining and Information security community researchers in...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Data Analysis and Prediction of Power Generated by Photovoltaic Systems

    The increasing demand for renewable energy from sources such as wind and solar has attracted the researchers to study the behavior and attributes of these energy resources in more depth. One of the important aspects of renewable energy resources is their uncertainty/unpredictability. To have a balance between the power demand...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    A New Approach for Cluster Disjuncts Using Naive Bayes

    Data mining is the process of discovering hidden knowledge from the existing databases. In real-time applications, most often data sources are of imbalanced nature. The traditional algorithms used for knowledge discovery are bottle necked due to wide range of data sources availability. Class imbalance is a one of the problem...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Problem Solving Hands-On Labware for Teaching Big Data Cybersecurity Analysis

    The rapid growth of big data analysis needs has resulted in a shortage of professionals in this area. Despite such great need, big data analytics and data science is not well represented in current academic programs. Although a few schools have offered new courses in this area but they all...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Distributed Versus Centralized Protection Schema for the Enterprise

    Entities in the enterprise are deployed with a standard configuration. Over time, patches, updates, new software versions, and mistakes or malicious activity all lead to deviations across the enterprise from this standard baseline. Malicious or unknown software on a system can cause harm or unexpected behavior. To mitigate these problems...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Cryptography Based Authentication Methods

    In this paper, the authors review a comparison study on the most common used authentication methods. Some of these methods are actually based on cryptography. In this paper, they show the main cryptographic services. As well as, this paper presents a specific discussion about authentication service. Since the authentication service...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    A Centralized Multimodal Unified Authentication Platform for Web-based Application

    Identifying a user or in technical terms, authentication, is a key process that must be performed before a service can be rendered to a person through electronic means. Common practice for user authentication is to challenge user to present authentication credential, user who can present the valid credential is considered...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    A Bayesian Network Model for Risk Management in Cyber Situation

    The transformation in e-commerce with the advent of other internet based activities has increased the impact of cyber-attacks on organizations and nations at large. However, tracking these attacks and determining risks posed ensure the overall security in cyber situation and invariably enhances communication and economic growth. Consequently, this paper presents...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Xen Web-based Terminal for Learning Virtualization and Cloud Computing Management

    In this paper, the authors propose a web-based terminal for teaching the cloud. This method allows students and trainees to learn managing the cloud in a useful and secure manner. This paper promotes an appreciate educational environment by enabling students to practice the knowledge practically, teaching them the ethics of...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    A Parallel Authenticated Encryption Sharing Scheme Based on Cellular Automata

    Multi-secret sharing scheme based on cellular automata have proven to be a secure encrypting algorithm, although it cannot guarantee data integrity and authenticity of shares of the participants, allowing a chosen cipher text attack. In this work, to improve the security of multiple Secret Sharing Scheme (SSS) against adaptive chosen...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Computing Interfaces for Everyone

    Companies, businesses and agencies rely on computing technology, taking advantage of its trends and benefits. Some categories of users - people with disabilities - have faced considerable challenges accessing the cloud to the point that they have become excluded. Many of the existing systems and companies still rely on assistive...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Efficient Certificateless One-Pass Key Agreement Protocols

    Key agreement is an essential component in any cryptosystem. In this paper, a new certificate-less two-party key agreement protocol is proposed. The protocol involves only one pass of exchanged messages, thus saving both time and bandwidth. The protocol provides implicit authentication of the identities of the two communicating parties. This...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Crop Production Recognize Frameworks using Mobile Enterprise Application

    In this paper, the authors propose an enterprise application framework using mobile that uses CBD (Component-Based Development) as development methodology and web services for information interchange in the RFID-based distributed computing environment for crop production in agricultural area. They tried to analyze the requirements of mobile applications architecture and mobile...

    Provided By International Association of Engineers

  • White Papers // Oct 2014

    Software Architectural Design for Image Retrieval System Involving Data Streams and User Interactivity

    In the process of software development, the role played by the software architect is substantial. It is the software architect who splits the entire application into different components, understands the functions performed by each component and should possess sound knowledge on the interactions among these components. The software architect communicates...

    Provided By International Association of Engineers

  • White Papers // Jul 2009

    Simplified Filtering Estimator for Spacecraft Attitude Determination From Phase Information of GPS Signals

    This paper presents an implementation of a simplified filtering estimator for satellite attitude determination using GPS (Global Positioning System) signals. The non-linear system of estimator was modelled using Euler angles parameterisation which applicable for real-time operation onboard-satellite. An approach was to keep a pitch state independent of roll and yaw....

    Provided By International Association of Engineers

  • White Papers // Mar 2010

    Exploring the Behavior of Mobile Ad Hoc Network Routing Protocols with Reference to Speed and Terrain Range

    A mobile Ad Hoc network is a collection of autonomous mobile nodes that communicate with each other over wireless links. Such networks are expected to play increasingly important role in future civilian and military settings, being useful for providing communication support where no fixed infrastructure exists or the deployment of...

    Provided By International Association of Engineers

  • White Papers // Jul 2010

    FIP Over Ethernet/IP for Real Time Distributed Systems Implementation

    This paper presents the realization of a platform for testing and validating distributed real time systems (DRTS), by following a methodology of development. The main contribution remains the realization of an industrial communication bus (FIP: Factory Instrumentation Protocol) implemented on an Ethernet platform. The work focuses on improving the response...

    Provided By International Association of Engineers

  • White Papers // Jul 2009

    MULEP-A Multi Level e-Procurement System With Distributed Agents

    Supply chain management meets customer demands by making efficient use of various resources such as inventory, distribution logistics and labor. E-procurement tools are good for making the best of supply chain. This paper discusses the integration of e-procurement tools and supply chain management and designs a multi level hierarchy of...

    Provided By International Association of Engineers

  • White Papers // Oct 2010

    A Study on the Security Mechanism for Web Services

    Web Service has been widely used in the field of distributed application system. But the security issue of the Web Service has often been considered as a crucial barrier to its application in many fields that conducts sensitive information, such as E-commerce. In the paper, the authors introduce the Security...

    Provided By International Association of Engineers

  • White Papers // Oct 2010

    Video Conferencing With CAI for Better Impact on Training and Education: An Indian Scenario

    Videoconferencing is changing the way Education is being imparted. It facilitates the effective teaching, a face-to-face meeting environment, clearing the way for efficient communication. It is an effective form of communication with distinct benefits. Today, more than ever, it is proving to be an extremely powerful tool, helps to gain...

    Provided By International Association of Engineers

  • White Papers // Oct 2010

    A Survey Of Success Factors For CRM

    Customer Relationship Management has become the main interest of researchers and practitioners especially in the domains of Marketing and Information Systems (IS). This paper is an overview on success factors that could facilitate successful implementation of CRM. In the past decades, the challenge for businesses was optimizing production process to...

    Provided By International Association of Engineers

  • White Papers // Jul 2009

    Hardware Co-Simulation for Video Processing Using Xilinx System Generator

    The use of rapid prototyping tools such as MATLABS-imulink and Xilinx System Generator becomes increasingly important because of time-to-market constraints. This paper presents a methodology for implementing real-time DSP applications on a reconfigurable logic platform using Xilinx System Generator (XSG) for Matlab. The methodology aims to improve the design verification...

    Provided By International Association of Engineers

  • White Papers // Oct 2009

    A Comparative Analysis of Network Benchmarking Tools

    Nowadays, there is a wide variety of network benchmarking tools, giving researchers and network administrators many choices to work with. However, this variety tends to difficult the selection process of the appropriate tool. Furthermore, sometimes users are forced to try several tools in order to find the one that calculates...

    Provided By International Association of Engineers

  • White Papers // Oct 2009

    Dynamic Behavior of Bandwidth Control Management in Mobile Ad-Hoc Network

    Quality of Service (QoS) support in Mobile Ad-hoc NETworks (MANETs) is a challenging task. The major challenge in ad hoc networks lies in adapting multicast communication to environments, where mobility is unlimited and failures are frequent. Such problems increase the delays and decrease the throughput. To meet these challenges, authors...

    Provided By International Association of Engineers

  • White Papers // Jul 2011

    Power Optimization in Ad Hoc Sensor Networks Using Clustering Approach

    Considering operational lifetime and load balancing as major constraints in the transmission of signals in the sensors of underwater ad hoc networks, the authors put forward in this paper a novel idea of using clustering approach to optimize the power consumption of the batteries in the sensors of the underwater...

    Provided By International Association of Engineers

  • White Papers // Mar 2010

    An Intelligent Fuzzy Neural Call Admission Control Mechanism for Guaranteed QoS in Heterogeneous Wireless Networks

    The Call Admission Control (CAC) is a Radio Resource Management (RRM) technique that plays instrumental role in ensuring the desired Quality of Service (QoS) to the users working on different applications with diversified QoS requirements in Next Generation Wireless Networks (NGWN). This paper proposes an Analytical system model and the...

    Provided By International Association of Engineers

  • White Papers // Mar 2010

    Data Load Impact on RFID Anti-Collision Protocols

    RFID anti-collision is one of the most important issues responsible for slow growth of the technology. Hence, there is an alarming need to study and analyze the existing anti-collision protocols in the light of their performance. The objective of this paper is focused around presenting the impact of data load...

    Provided By International Association of Engineers

  • White Papers // Mar 2010

    Group-Based ICI Canceller Combined With Complex Sphere Decoding for Fast-Fading OFDM System

    The InterCarrier Interference (ICI) resulted from fast fading channel destroys the orthogonality of the Orthogonal Frequency-Division Multiplexing (OFDM) signal and deteriorates receiver performance. In this paper, the authors propose two-stage interference canceller, which combines Zero-Forcing (ZF) equalizer with complex sphere decoder in a group-based version, to tackle the severe ICI...

    Provided By International Association of Engineers

  • White Papers // Oct 2013

    Minimizing Computing Core Costs in Cloud Infrastructures that Host Location-Based Advertising Services

    Cloud computing provides services to a large number of remote users with diverse requirements, an increasingly popular paradigm for accessing computing resources over the internet. A popular cloud-service model is Infrastructure-as-a-Service (IaaS), exemplified by Amazon's Elastic Computing Cloud (EC2). In this model, users are given access to virtual machines on...

    Provided By International Association of Engineers

  • White Papers // Oct 2013

    A Geographic Interactive Supply Chain Management System for Construction Projects

    The diversity of the construction industry, its range of specialized services, and the requirements of its numerous participants make it one of the most complex industries. This paper presents a framework to implement a Geographic Information System (GIS) in construction Supply Chain Management (SCM) incorporating web mapping services to enhance...

    Provided By International Association of Engineers

  • White Papers // Oct 2011

    An Intelligent Mechanism for GIS Contract Automation

    Performance indicators of social ability of an intelligent agent cannot be made explicit. However agreements can be reached as a measure. Reactive and proactive behavior of intelligent agents is quantifiable. Geographic Information System (GIS) contracts are specialized in nature. GIS diffusion within organizations from developing countries is much low, that...

    Provided By International Association of Engineers

  • White Papers // Oct 2012

    Towards the Spatial Database Specification for GIS Using Z-Notations

    Formal methods are mathematical techniques use in design, development and verification of software and hardware system. Geographic Information Systems (GIS) use to collect, store, analyze and present spatial information. GIS databases are usually very complex to design. Formal methods can play an important role in their design. In the paper,...

    Provided By International Association of Engineers

  • White Papers // Oct 2013

    Mining Online GIS for Crime Rate and Models Based on Frequent Pattern Analysis

    The researchers proposed to develop a mechanism in mining an online Graphical Information System (GIS) for crime rate and models using frequent pattern analysis. It is a web-based system that includes GIS for robbery, homicide and physical injury incidents within Iloilo City. This system can help police identify where and...

    Provided By International Association of Engineers

  • White Papers // Oct 2012

    Flood Analysis and Prediction Support based on UML and Mobile Petri Net Specification and Verification

    Flood is one of catastrophic disaster that directly and indirectly affects the living style of people in the critical region. It is proved that there is no mechanism to avoid flood but only a prediction, which can secure the inhabitants of inundation areas. To predict flood, different countries adopt different...

    Provided By International Association of Engineers

  • White Papers // Mar 2008

    A Decision Model Based Security Risk Management Approach

    With increasing availability of computing system the enterprises are becoming increasing dependent on IT infrastructure and thus becoming vulnerable to threats. To assess the security of enterprise network, one must first understand how vulnerabilities can be combined for an attack. Such an understanding becomes possible with recent advances in modeling...

    Provided By International Association of Engineers

  • White Papers // Mar 2012

    Open Map Generation for Heterogeneous Environments Based on Cloud Computing

    In Geographic Information System (GIS) areas, it accomplished by Open Application Programming Interface (OpenAPI) based map DataBase (DB) construction approach. In this paper, multiple map DB providers try to reduce unknown map information in their own maps through their own capabilities. But, general map updating process is complicated and inconvenient....

    Provided By International Association of Engineers

  • White Papers // Jul 2010

    Performance of RFID with AWGN and Rayleigh Fading Channels for SDR Application

    Radio Frequency IDentification (RFID) is currently the hottest technology in wireless communication, in which data transmission with extreme low power or even without power in tag. Software-Defined Radio (SDR) plays an important role for a wireless communications system where all the signal processing is implemented in software. In this paper,...

    Provided By International Association of Engineers

  • White Papers // Mar 2013

    Development of a Passive RFID Locator for Laboratory Equipment Monitoring and Inventory System

    In this paper, the authors explain about prototyping software model to develop a laboratory equipment monitoring and inventory system. Using a low frequency Radio Frequency ID (RFID), the device could detect and record all equipment borrowed and pulled-out in the laboratory. The paper was pilot-tested in two laboratories. A questionnaire...

    Provided By International Association of Engineers

  • White Papers // Jul 2013

    RFID Application on Manufacturing Process Control in Semiconductor Industry

    The RFID information system that integrated into semiconductor industry including inventory management, location control and handcar localization. This paper focused on cassette management in semiconductor industry. The management enters the data warehouse management from a semiconductor company to the semiconductor company. Based on RFID technology, label information where located on...

    Provided By International Association of Engineers

  • White Papers // Oct 2012

    Applying the Augmented Reality and RFID Technologies in the Maintenance of Mining Machines

    In this paper, the authors present the results of MINTOS RFCS project and announce conception of new augmented reality system that will be developed in EMIMSAR RFCS project. Current KOMAG's solutions in the field of improving occupational safety are presented in the paper. Training programs that are developed are an...

    Provided By International Association of Engineers

  • White Papers // Mar 2010

    Geofencing Security Engineering

    In this paper, the authors discuss the various Geofencing constructs and concepts. Constructs are concepts, models, or schematic ideas: in their case they are the theoretical constructs of the Geofence used as a security strategy model. Their concept considers Location Based Services (LBS) and RFID as central to the security...

    Provided By International Association of Engineers

  • White Papers // Jul 2011

    Impact of Radio Frequency Identification (RFID) on Life Cycle Engineering

    In this paper, the impact of Radio Frequency IDentification (RFID) technologies on life cycle engineering of Time and Temperature Sensitive Chemicals (TTSC) is presented based on a case study. The case study includes three levels of applications, integrated hierarchically as supply chain operations, manufacturing facility level inventory management, and station...

    Provided By International Association of Engineers

  • White Papers // Mar 2013

    Service Oriented Sensor Networks for Mobile Computing

    Mobile applications execute in an environment characterized by scarce and dynamically varying resources. The authors believe that applications have to adapt dynamically and transparently to the amount of resources available at runtime. To achieve this goal, they use the conventional extension of the client server model to a client-proxy-server model....

    Provided By International Association of Engineers

  • White Papers // Jul 2010

    Multi-Classifier for WLAN Fingerprint-Based Positioning System

    WLAN fingerprint-based positioning system is a viable solution for estimating the location of the mobile station. Many researchers have applied various machine learning techniques to the WLAN fingerprint-based positioning system to make a more accurate system. However, due to the noisy characteristics of the RF signal and lack of the...

    Provided By International Association of Engineers

  • White Papers // Oct 2011

    5G- The Future of Mobile Network

    Since the 4G concepts have already moved to the standardization phase, the authors must begin to work on the building blocks of the following generation (which they refer to as 5G) wireless networks. These networks will facilitate the provision of ubiquitous and affordable broadband (very high speed) wireless connectivity. This...

    Provided By International Association of Engineers

  • White Papers // Mar 2013

    An Effective User Positioning Scheme Based on AR Interface for Ubiquitous Computing

    The emergence of Smartphone with built-in GPS has resulted in the launch of a series of location-based AR applications with graphic location contents. This allows an easy way of searching and consuming location-based information. Here, location information is the fundamental factor to select any proper services available in a certain...

    Provided By International Association of Engineers

  • White Papers // Oct 2009

    Error Compensation for CSS-based Localization System

    In this paper, data error in sensor system using electromagnetic wave such as GPS and mobile communication is handled. To be specific, a localization that gives acceptable performance in indoor application is considered. The system uses CSS and SDS-TWR to improve system performance. However in multi-path environment, the transmitted signal...

    Provided By International Association of Engineers

  • White Papers // Oct 2011

    Prolonging the Network Life Time in WSN Through Computational Intelligence

    In this paper, key constituents of Computational Intelligence (CI) are discussed and how different classes come under the paradigm of CI. The very need and importance of CI in the problem solving of different social fabrics of life is comprehensively elaborated in this paper and is concluded that CI in...

    Provided By International Association of Engineers

  • White Papers // Oct 2008

    A Cooperative Blackhole Node Detection Mechanism for ADHOC Networks

    The rapid proliferation of wireless networks and mobile computing applications has changed the landscape of network security. A mobile node in ad hoc networks may move arbitrarily and acts as a router and a host simultaneously. Such a characteristic makes nodes in MANET vulnerable to potential attacks. The black hole...

    Provided By International Association of Engineers

  • White Papers // Oct 2009

    Performance of QoS Parameter in Wireless Ad hoc Network (IEEE 802.11b)

    A wireless ad-hoc network consists of wireless nodes communicating without the need for a centralized administration, in which all nodes potentially contribute to the routing process. A user can move anytime in an ad hoc scenario and, as a result, such a network needs to have routing protocols which can...

    Provided By International Association of Engineers

  • White Papers // Mar 2010

    Enhanced Load Balancing Mechanism with Service Level Agreement Using Refuge Console in Private Cloud Environment

    Cloud computing affords an immense collection of computational resources as a service. It has been a possible solution for providing elastic, on insist computing infrastructure for a large number of applications. The applications are created in the private cloud and it can be executed with respect to the refuge, cost...

    Provided By International Association of Engineers

  • White Papers // Oct 2011

    FTADMR: A Fault Tolerant Adaptive-Demand Multicast Routing Protocol in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are multi-hop wireless networks in which all nodes cooperatively maintain the connectivity of the network. In this paper, a new reliable multicast routing Protocol called \"Fault Tolerant Adaptive Demand-driven Multicast Routing\" (FTADMR), is proposed for WSNs. The proposed protocol increases transmission range to send lost packet...

    Provided By International Association of Engineers

  • White Papers // Feb 2010

    Risk Notification Message Dissemination Protocol for Energy Efficient Broadcast in Vehicular Ad hoc Networks

    In this paper, the authors present the design and development of an energy-efficient Risk Notification Message Dissemination Protocol (RNMDP) for Vehicular Ad hoc NETworks (VANETs). RNMDP propagates Risk Notification Messages (RNMs) from their location of origin (called the risk zone) to vehicles approaching the risk zone. A node receiving the...

    Provided By International Association of Engineers

  • White Papers // Oct 2012

    Deployment of Cloud Computing into VANET to Create Ad Hoc Cloud Network Architecture

    Vehicular Ad hoc NETwork (VANET) has been drawing interest among the researchers for the past couple of years. Though ad hoc network or mobile ad hoc network is very common in military environment, the real world practice of ad hoc network is still very low. On the other hand, cloud...

    Provided By International Association of Engineers