International Journal of Information and Electronics Engineering

Displaying 1-40 of 111 results

  • White Papers // Jan 2014

    Mobile Applications as Cloud Computing: Implementation and Challenge

    Currently, mobile application and computing is gaining a high momentum and playing a significant role in enhancing the internet computing infrastructure. In addition, the mobile devices and their applications have high technique in the service ever had, and developed rapidly. Mobile cloud computing is expected to generate significantly more innovative...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Jan 2014

    SIDP: A Secure Inter-Domain Distributed PMIPv6

    Proxy Mobile IPv6 (PMIPv6) offers centralized network-based mobility support for Mobile Nodes (MN). This centralized nature of mobility leads to the performance issues such as single-point failure, non-optimal routing, low scalability, authentication latency, and signaling overhead. Additionally, PMIPv6 does not support inter-domain handover due to which the on-going sessions cannot...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Jan 2014

    An Efficient Pipelined Multiplicative Inverse Architecture for the AES Cryptosystem

    In this paper, the authors introduce architecture for performing a recursive pipeline algorithm for use in optimizing the performance of the multiplicative inverse operations in Galois Field GF (2k). The latter is extensively used in performing the S-box byte-substitution in the AES cryptosystem. Using composite fields the operations are recursively...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Mar 2013

    RFID Reader Receiver Using Blind Signal Estimation for Multiuser Detection

    Radio Frequency IDentification (RFID) is a wireless technology that uses radio backscatter signals to purpose of identifies objects. Especially, in the microwave frequency as 2.45 GHz is growing rapidly. Since the physical environment surrounding the propagation path of radio identification is generally difficult to control, the channel characteristics in backscattering...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Jan 2013

    Bandpass Continuous-Time Delta-Sigma Modulator for Wireless Receiver IC

    Bandpass ADC is well known to be adopted in the narrow-band receiver design in order to reduce the system complexity, increase integration and improve performance by digitizing the bandpass signal directly without prior conversion to baseband. A fully differential feed forward fourth-order continuous-time bandpass delta-sigma modulator is presented. The proposed...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Jan 2013

    Green Radio Technology for Energy Saving in Mobile Towers

    The number of users and the use of telecommunication systems are increasing rapidly and this result in greater demands on energy usage. Based on the extensive Life-cycle Assessment (LCA) conducted by various network operators, it is learned that energy consumption in the usage phase of its radio access networks is...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Jan 2013

    Securing Website by Secure Sockets Layer in Wireless Network using Windows Server 2008

    Internet security is a branch of computer security specifically related to the Internet. Its objective is to establish rules and measures to use against attacks over the Internet. The Internet represents an insecure channel for exchanging information leading to a high risk of intrusion or fraud, such as hackers. Different...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Jan 2013

    An Efficient Network Monitoring and Management System

    Large organizations always require fast and efficient network monitoring system which reports to the network administrator as soon as a network problem arises. This paper presents an effective and automatic network monitoring system that continuously monitor all the network switches and inform the administrator by email or sms when any...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Dec 2012

    Fairness Evaluation of a DSCP Based Scheduling Algorithm for Real-Time Traffic in Differentiated Service Networks

    It is a very vital factor to allocate the resources for improving the QoS (Quality of service) for any network carrying various types of traffic. Real-time applications, such as video conferences, are in the most important to get the benefit of QoS adaptation. Several scheduling disciplines are employed at the...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Dec 2012

    Back-to-Back Networking for Traffic Characteristics on Digital Video Transmission System (DVTS)

    Nowadays, real-time video communication is an increasingly popular application for real-time demonstrations and/or interactive teleconferences offering original quality and assuring smooth movement of the video with clarity of sound over an Intra-Domain and Inter-Domain network. Traffic characteristics analysis are needed to improve the quality service for real-time video communication systems....

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Nov 2012

    Establish Exchange Network Platform and Cargo Tracking System

    S.H. Global Logistics Co., Ltd invoiced on supply chain activities such as import and export customs clearance, FCL transport, land transport, worldwide customs clearance, express delivery, express customs clearance and distribution center. It's difficult for S.H. Co. to achieve customer requests by using current two operate systems. Additionally, there are...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Nov 2012

    Secure PHR Access Control Scheme in Cloud Computing

    With the development of medical technology and information technology, the "Personal Health Records (PHR)" is gradually developed as a up-to-date medical information exchange system. A proper patient-centered PHR system is able to offer correct and complete personal health and medical summary through the Internet under the demands of privacy and...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Nov 2012

    11-Bit 6.5MS/s SAR ADC for Wireless Applications

    A 1.3V, 11-bit, 6.5 MS/s Successive Approximation ADC is presented. The ADC operates with a differential peak to peak input of 1V. The ADC uses the common mode resetting triple level switching scheme, non-binary generalized redundant algorithm, a rail-to-rail latched comparator and a input bootstrapped sampling switch. The simulation results...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Nov 2012

    Link Budget Improvement of Cooperative Diversity with WCDMA Method Implementation

    Cooperative transmission has been of growing interest recently where users take advantage of each other's resources for better overall performance. User cooperation provides uplink transmit diversity even when mobile units cannot accommodate multiple antennas due to size constraints. Recently, a versatile user cooperation method called coded cooperation diversity was introduced...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Nov 2012

    Priority and Network-aware Data Control Scheme to Guarantee the Media Quality in LTE Networks

    For efficient streaming over wireless networks, the LTE (Long Term Evolution) system supports the ARQ (Automatic Repeat reQuest) and HARQ (Hybrid Automatic Repeat reQuest) schemes. However, there is no specification about how to use the ARQ and HARQ parameters in order to guarantee the media quality. To cope with this...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Nov 2012

    Data Communication System for Sensorized Guidewire Application

    Resistive and capacitive sensors are commonly used in biomedical applications for measuring the various physiological signals. A low power and high resolution sensor interface circuit is critical to achieve the required sensing range and system specifications. One of the commonly employed interface circuit for biomedical application is relaxation oscillator based...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Oct 2012

    Femtocell Suburban Deployment in LTE Networks

    In this paper, the authors present a hybrid deployment model in order to investigate the path loss behavior of a LTE-femtocell in a residential suburban scenario. The proposed model places the femtocells in a fix grid to calculate path loss for each femtocell. The path loss is used to deduce...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Oct 2012

    Design Requirements for Best Effort Backbone IP Network

    Process control systems for Hydrocarbon Process Automation Applications (HPAA) are implemented in oil and gas fields, plants, refineries, and tank farms in the form of a Local Area Network (LAN) to support control functions. These systems are composed of sensors, actuators, and logic solvers networked together to form a control...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Oct 2012

    Highly Miniaturized 1-4 On-Chip Power Divider/Combiner Circuit on Silicon Substrate for Application to Long Distance Wireless Power Transmission

    In this paper, for application to a long distance wireless power transmission, a highly miniaturized 1-4 power divider/combiner employing periodic structure was fabricated on semi conducting silicon substrate. The 1-4 divider/combiner showed good RF performances from 1 to 25 GHz, and its size was 1.08 x 0.63 mm2, which is...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Oct 2012

    SLM Technique Combined with a Random-Like Coding for Reducing PAPR in OFDM Systems with No Explicit Side Information

    OFDM is an attractive technique for high data rate and reliable communication over fading channels and high Peak-to-Average Power Ratio (PAPR) is a notable drawback of Orthogonal Frequency-Division Multiplexing (OFDM) systems. The main implementation drawback of this system is the possibility of high Peak to Average Power Ratio (PAPR). The...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Oct 2012

    Direct Conversion Mixer IC for Application to Long Distance Wireless Power Transmission

    In this paper, Using the silicon CMOS technology, direct conversion mixer was fabricated on silicon substrate for a realization of the long distance wireless power transmission system. The size of the mixer is 0.8 mm x 0.5 mm. The input frequency of mixer is 24 GHz, and converted BB frequency...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Oct 2012

    Tranceiver Mixer MMICs Employing Cascode Circuit Structure for Personal Area Network (PAN) Applications

    MMIC (Monolithic Microwave Integrated Circuit) chip set was developed for application to wireless PAN. Concretely, cascade type transceiver mixers employing GaAs p-HEMT were fabricated on GaAs substrate. The mixer MMICs showed good RF performances. Concretely, the conversion gain of the receiver mixer was 9.6 dB at a LO input of...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Oct 2012

    DMLRid - An XML-Based Proof-of-Concept Mobile DRM Framework for Sharing Learning Contents among Mobile Networks

    This paper proposes a framework that helps in closing the gap that exists between the mobile learning environment and students' everyday use of mobile devices. This new framework for Digital Rights Management in systems for mobile learning enhances the ability to define, manage, and share the licensed learning multimedia content...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Sep 2012

    A Multiband PIFA with a Slot on the Ground Plane for Wireless Applications

    In this paper, the authors present a new configuration of Planar Inverted-F Antenna (PIFA) for mobile communication devices. Simulated results demonstrate that the new configuration covers DCS/PCS/UMTS/WiBro/Bluetooth/S-DMB/WiMax/WLAN frequency bands. Simulated return loss of the proposed antenna is acceptable over all the mentioned frequency bands. Overall size of the proposed design...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Sep 2012

    Implementation Issues for Developing Credit Card Software for Mobile Phones

    Money Transaction has become common, frequent and a necessity in the current living and carrying cash always with a person is not a practical solution. The current trend of carrying the credit cards have become a crucial part of life and carrying of multiple cards is common nowadays. There is...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Sep 2012

    On the Feasibility of Key Compromise Impersonation Attacks Against the Elliptic Curve Version of the MTI/C0 Key Agreement Protocol

    In this paper, the authors point out that the protocol proposed by the aforementioned authors is in fact the elliptic curve version of the MTI/C0 family of key agreement protocols which suffer from a well-known vulnerability against a particular type of key-compromise impersonation attack. Since the Diffie-Hellman (DH) key exchange...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Sep 2012

    Applying Data Analytics to Development of the Web- Based Information Security Career Systems

    This paper proposes a case to build a Web-based Information/Cyber Security (ICS) career system for smart education using Web data analytical technology. The proposed system will automatically monitor and extract the new ICS job openings as well as the specific knowledge, skills, certificates or degrees required for the job openings...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Sep 2012

    Interaction Model for Emotive Video Production

    Video images are capable of expressing various kinds of information; however special knowledge and techniques are required for authoring quality video content. In order to represent impressions, proper camerawork is required for delivering understandable content. However, amateur users often have difficulties in shooting images which appropriately reflect their expressive intentions....

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Sep 2012

    Efficient and Semantic OLAP Aggregation Queries in a Peer to Peer Network

    This paper presents TrackerCache system - a Peer To Peer (P2P) system for efficient serving OLAP queries and aggregation of data cubes in distributed data sharing system. TrackerCache system provides a central component called tracker, which acts as a directory, keeping track of all submitted queries and a list of...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Sep 2012

    Research Issues in Wireless Sensor Network Applications: A Survey

    Wireless Sensor Networks (WSN) are used in variety of fields which includes military, healthcare, environmental, biological, home and other commercial applications. With the huge advancement in the field of embedded computer and sensor technology, Wireless Sensor Networks (WSN), which is composed of several thousands of sensor nodes which are capable...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Sep 2012

    Reliability Modeling of Context Aware Wireless Sensor Network

    This paper is to propose a reliability model for a fault tolerant wireless sensor network using context awareness feature in order to evaluate network reliability by modeling in PI Calculus. The earlier Propositional Directed Acyclic Graph (PDAG) approach leads to an identification of a suitable structure function in polynomial time...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Sep 2012

    Maputo Bay Wireless Network Cost Analysis

    The objective of this paper is to analyze the cost of building wireless networks in the context of Network Engineering (NE). Cost analysis is important in planning and design phases in network lifecycles, especially for developing countries. The Techno-Economic Analysis presented in this paper is based on the project for...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Sep 2012

    An Empirical and Architectural Study of Using an SSD-Aware Hybrid Storage System to Improve the Performance of the Data Intensive Applications

    Processors speed have increased in a steady pace year over year, storage system performance is still the major bottleneck for most computer systems including high performance computers. Many attentions have been given to optimize the storage system speed using various approaches such as caching, intelligent perfecting and scheduling techniques, nevertheless,...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Sep 2012

    Energy Optimization Through Position Responsive Routing Protocol (PRRP) in Wireless Sensor Network

    Wireless Sensor Networks (WSNs) are consist of very tiny nodes structure, with very small batteries without having facility to recharge it. It works under any hard circumstances, hence this type of network is gaining high importance day by day. Maximum focus of researchers is to enhance or optimized its energy...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Sep 2012

    Downlink SNR to CQI Mapping for Different Multiple Antenna Techniques in LTE

    Long Term Evolution (LTE) is a step towards the 4th Generation (4G) of radio technologies designed to increase the capacity and speed of mobile wireless access. In Release 8, LTE was standardized by 3GPP as the successor of the Universal Mobile Telecommunication System (UMTS).Before full commercial deployment of LTE, downlink...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Sep 2012

    Implementation of Multiplayer Bluetooth Memory Game for Mobile Phones

    With time and technology, mobiles have been revolutionized from a communicating device to something which can be used for computing, entertainment as well as communication. Entertainment is perhaps the field which attracts most of the customers to a particular model. Hence these days, the various mobile developers are releasing phones...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Sep 2012

    Design Considerations for Optimizing Real-Time Control and Communication for the Kiira Electric Vehicle

    The Vehicle Design Project based at the School of Engineering, Makerere University embarked on development of a two-seater Electric Vehicle (EV) code named KIIRA as a proof of concept. This paper presents the design considerations in developing the vehicle's control and communication systems. It highlights the hardware and software, architectural...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Sep 2012

    A Success Model for Business Process Management Implementation

    Business Process Management (BPM) is currently being seen as the best way to facilitate process improvements. Since this concept is mainly a multidisciplinary subject, success in implementing requires considering various factors. In this paper, first seven success factors were explored through qualitative meta-synthesis based on previous studies; then a success...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Jul 2012

    A Novel Secure Keying Technique for the Wireless Sensor Networks

    Strong cryptographic schemes are used for securing the Wireless Sensor Networks (WSNs). Even if a strong cipher is used for encryption/ decryption of messages in any form of WSN communication, if the key is compromised and it no longer remains secret, the security of the underlying network is compromised. Therefore,...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Jul 2012

    Interoperability Between IPv4 and IPv6 Clients and Servers

    Most applications today support IPv4 and thus there is a need to run these applications on IPv6 access network. IPv4 can't meet the rising needs of the present internet. Moreover, IPv6 can solve the problems that IPv4 faced, and present more new features. The Internet must make the transition from...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // May 2012

    Design a New Fuzzy Congestion Controller in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) become active suddenly, when an event occurs in order to respond to the event. Depending on the network and the application, there exist different levels of congestion that need to be controlled. This paper presents the design of a new Fuzzy Congestion Controller (FCC) in WSNs....

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // May 2012

    Identifying the Parameters Affecting Network Coding in Wireless Networks

    The wireless communication revolution has brought fundamental changes to the data networking, however wireless networks continue to suffer from numerous problems such as limited bandwidth, low throughput. It is possible to efficiently exploit the available bandwidth by the use of network coding, but at a certain cost of encoding/decoding overhead,...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // May 2012

    Cyber Terrorism: Issues in Its Interpretation and Enforcement

    Cyber terrorism is a term which represents an act of terrorising using cyberspace as a medium. This phrase is controversial as there is no exact meaning of it. Generally, it is known as "The premeditated use of disruptive activities, or the threat thereof, against computers and/or networks, with the intention...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // May 2012

    Is Database Protected Under Copyright? A Legal Analysis

    Databases are an essential element of the continuous advances in human knowledge and productivity. Databases, particularly computer databases touch every one's life either directly or indirectly. Many people use computer databases at work and obtain benefits from it. All those benefits are the product of labour, skill and creativity as...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // May 2012

    Design of Framework for Semantic Annotation of Geospatial Data

    Framework is a key providing for effective development, exchange, and use of geospatial as well as non-geospatial data to meet information needs generated by public domain policy. The development of multiple spatial ontologies, and their representation should be done in such a way that the computer can understand and process....

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // May 2012

    Bandwidth Management Framework for Multicasting in Wireless Mesh Networks

    Wireless Mesh Networks (WMNs) provide a reliable and a scalable solution for multicasting. This paper proposes a framework called Multicast Framework for Bandwidth management in WMN (MFBW) which combines the advantages of Shortest Path Tree (SPT) and Minimum Cost Tree (MCT) algorithm for efficient multicasting with optimal use of the...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // May 2012

    A Novel Backoff Algorithm With QoS Support in Heterogeneous Wireless Networks

    The main objective of the future networks is to provide users with always best connectivity through available different access networks. Wireless convergence has emerged as a multidimensional concept that combines networks, applications, user interfaces and management, which aimed at supporting voice, data and multimedia over IP-based networks. In this paper,...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // May 2012

    Enhanced Object Oriented WBEM Enabled Solution for Non-Homogeneous Network

    In the present scenario due to rapid growth of Internet, increasing size and complexity of today's distributed network, providing a secure, reliable, efficient computing environment is one of the most challenging tasks faced by network administrator. Lack of single management model in enterprise management, lack of uniform, consistent framework for...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // May 2012

    Improving ertPS Grant Allocation for VoIP Traffic in Silence Duration

    This paper proposes a new uplink scheduling algorithm that can increase the uplink VoIP user capacity for ertPS scheduling in 802.16e networks. This algorithm solves the problems of uplink resources wastes and large overhead which causes during silence period. The authors compare their method with four related schemes including conventional...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // May 2012

    Worm Containment in Gnutella Network With Heterogeneity

    Attentions to security on P2P networks have recently been increased, especially with respect to worm epidemics. Most of countermeasures that are proposed to prevent worm propagation are ineffective in P2P overlay networks. In this paper, the authors use heterogeneity among peers to prevent worm propagation in Gnutella network. Their solution...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // May 2012

    Multiplierless FIR Filter Implementation on FPGA

    Area complexity in the algorithm of Finite Impulse Response (FIR) filter is mainly caused by multipliers. Among the multiplier-less techniques of FIR filter, Distributed Arithmetic is most preferred area efficient technique. In this technique, pre-computed values of inner product are stored in LUT, which are further added and shifted with...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Jul 2012

    A Novel Secure Keying Technique for the Wireless Sensor Networks

    Strong cryptographic schemes are used for securing the Wireless Sensor Networks (WSNs). Even if a strong cipher is used for encryption/ decryption of messages in any form of WSN communication, if the key is compromised and it no longer remains secret, the security of the underlying network is compromised. Therefore,...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Jul 2012

    Interoperability Between IPv4 and IPv6 Clients and Servers

    Most applications today support IPv4 and thus there is a need to run these applications on IPv6 access network. IPv4 can't meet the rising needs of the present internet. Moreover, IPv6 can solve the problems that IPv4 faced, and present more new features. The Internet must make the transition from...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Jul 2011

    Global Mobility: The Key Enabler for Next Generation Networks (NGN)

    Global Mobility is one of the invigorating issue for Next Generation Networks (NGNs). To facilitate user roaming over NGNs, there must be an effective and efficient Global Mobility Management mechanism, so that the mobile connection with its current serving network is handoff to its target network to maintain service continuity...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Jul 2012

    Intelligent Senses in Robot Based on Neural Networks

    This paper describes a model and an implementation of spiking neurons for embedded microcontrollers with few bytes of memory and very low power consumption. The proposed model consists of an elementary neuron network that used Hebbian Learning to train a robot to respond to the environment implementing Artificial Intelligence (AI)...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Jul 2012

    An Efficient Route Discovery in Manets With Improved Route Lifetime

    Mobile Ad hoc Networks consist of mobile nodes with limited battery power. The critical issue for routing in mobile ad hoc network is how to select a stable path with longer lifetime since mobility and power drain of a node causes frequent path failure. This path failure causes frequent route...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Jul 2012

    Reference Point Based Evolutionary Approach for Workflow Grid Scheduling

    Grid computing facilitates the users to consume the services over the network. In order to optimize the workflow execution, multi-objective scheduling algorithm is required. In this paper, the authors considered two conflicting objectives of execution time (makespan) and total cost. They propose a scheduling algorithm, using Reference Point Based multi-objective...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Jul 2012

    Self-Protected Mobile Agent Approach for Distributed Intrusion Detection System Against DDoS Attacks

    With the growing Information Systems and Network technologies, security threats over the systems have also become common. Providing a security mechanism to detect such threats has become an inevitable part of Information Systems. Distributed Denial of Service (DDoS) attack is one of the most common attacks which are done in...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Jul 2012

    MotoSafe: Active Safe System for Digital Forensics of Motorcycle Rider With Android

    Motorcycle accident rates have increased significantly year by year throughout the world. In this paper, the authors would like to introduce a motorcycle active safety system that can detect high risk riding states and decrease accident rates. As Smartphone nowadays becomes a popular communication tools in society, the people use...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Jul 2012

    Design of Master Data Acquisition Module for Data Acquisition and Telemetry Operations

    The paper describes design of master data acquisition module which is used for analog data acquisition from various sensors in satellite subsystems and also performs generation of different tele-commands for telemetry operation. Data Acquisition plays an important role in monitoring the health parameters of the satellite. The embedded software was...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Sep 2012

    Implementation Issues for Developing Credit Card Software for Mobile Phones

    Money Transaction has become common, frequent and a necessity in the current living and carrying cash always with a person is not a practical solution. The current trend of carrying the credit cards have become a crucial part of life and carrying of multiple cards is common nowadays. There is...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Sep 2012

    On the Feasibility of Key Compromise Impersonation Attacks Against the Elliptic Curve Version of the MTI/C0 Key Agreement Protocol

    In this paper, the authors point out that the protocol proposed by the aforementioned authors is in fact the elliptic curve version of the MTI/C0 family of key agreement protocols which suffer from a well-known vulnerability against a particular type of key-compromise impersonation attack. Since the Diffie-Hellman (DH) key exchange...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Sep 2012

    Applying Data Analytics to Development of the Web- Based Information Security Career Systems

    This paper proposes a case to build a Web-based Information/Cyber Security (ICS) career system for smart education using Web data analytical technology. The proposed system will automatically monitor and extract the new ICS job openings as well as the specific knowledge, skills, certificates or degrees required for the job openings...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // May 2012

    EMID: Maximizing Lifetime of Wireless Sensor Network by Using Energy Efficient Middleware Service

    This paper introduces the processing of raw data from sensor nodes located at different places within the vicinity of header node. The middleware service of header node evaluates the assignment and requirement of each node that comes under its vicinity. Based on header node instructions each sensor node is in...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // May 2012

    A Novel Scheduling Mechanism Based on Artificial Immune System for Communication Between Cluster Head and Cluster Members in WSNs

    Till now, different mechanisms have been proposed for communication between cluster members and cluster head in hierarchical protocols. Most of them determine a same time for each cluster member to communicate with cluster head without regarding the nodes conditions. In this paper, the authors propose a novel scheduling mechanism based...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // May 2012

    Evaluation of Rough Set Theory Based Network Traffic Data Classifier Using Different Discretization Method

    In information security, intrusion detection is a challenging task for which designing of an efficient classifier is most important. In the paper, network traffic data is classified using rough set theory where discretization of data is a necessary preprocessing step. Different discretization methods are available and selection of one has...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // May 2012

    ASSM: Agent Based Source Specific Multicast Routing Protocol for Wireless Mesh Networks

    Wireless Mesh Networks (WMNs) are new emerging networks which are anticipated to resolve many limitations of ad-hoc networks, sensor networks and wireless local area networks and improve their performance. But still there are many unresolved research challenge in this area. In this paper, the authors have proposed source-specific multicast protocol...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // May 2012

    A Multi-Factor Scheduling Algorithm for WIMAX Systems

    This paper proposes a new scheduling algorithm for IEEE 802.16-2005 Broadband Wireless Metropolitan Area Networks in TDD mode. Unlike most scheduling algorithm which use one QoS parameter like Maximum SusTained Rate (MST), delay or priority to take the scheduling decision, the proposed algorithm uses all these parameters plus Jitter, Minimum...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // May 2012

    Dominating Set & Clustering Based Network Coverage for Huge Wireless Sensor Networks

    Routing is one of the most important issues in wireless sensor networks. In order to transfer packets in the network effectively, a sound path between nodes should exist to reduce data transmission costs. A proper coverage algorithm is very critical to establish a suitable routing algorithm. Small set of nodes...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // May 2012

    A Hybrid System for Detecting Misbehaving Nodes in Ad Hoc Networks

    In this paper, the authors express a new intrusion detection system based on counters and a cache memory to detect malicious nodes and selfish nodes in ad hoc network. Network survivability, networks performance and network security are important issues in mentioned networks. The presented paper enhances the mentioned factors because...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // May 2012

    The Performance Analysis of Fast DCT Algorithms on Parallel Cluster Architecture

    Clustered processor, having 16 clusters with 4 PE's in each cluster and each PE having two ALU, which can perform simultaneously, is taken. The PE's operate in a SIMD manner. The cluster and PE can transfer data from one another. 4 FDCT algorithms: - namely, Vetterli, Arai's, Loeffler's, and Chen's...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // May 2012

    Software Tokens Based Two Factor Authentication Scheme

    This paper describes a method of implementation of Two Factor Authentication using Mobile handsets. This two factor authentication is based on Time Synchronous Authentication using the RFC1321 MD5 Message Digest Algorithm of Epoch Time, Personal Identity Number (PIN) and Init-Secret. The password generated would be One Time Password (OTP) which...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // May 2012

    Secure Migration of Tables Across Different Database Management Systems Over a Cross-Platform Environment

    Cross-platform environment resembles a heterogeneous database systems, where different sites (nodes that are equipped with a computational and storage resource) may use different ways of storing and representing the data, file formats, access protocols, query languages, etc. The sites in this cross-platform environment communicate through an insecure channel. This paper...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Jul 2012

    Design and Optimization of Band Pass Filter for Software Defined Radio Telescope

    Stars, galaxies, quasars, and other astronomical objects are all cosmic radio sources. Radio telescope is used to study these cosmic signals. Software Defined Radio Telescope is a low cost telescope and could be used for educational purposes. It consists of a radio antenna and a sensitive radiometer or radio receiver....

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Sep 2012

    Interaction Model for Emotive Video Production

    Video images are capable of expressing various kinds of information; however special knowledge and techniques are required for authoring quality video content. In order to represent impressions, proper camerawork is required for delivering understandable content. However, amateur users often have difficulties in shooting images which appropriately reflect their expressive intentions....

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Sep 2012

    Efficient and Semantic OLAP Aggregation Queries in a Peer to Peer Network

    This paper presents TrackerCache system - a Peer To Peer (P2P) system for efficient serving OLAP queries and aggregation of data cubes in distributed data sharing system. TrackerCache system provides a central component called tracker, which acts as a directory, keeping track of all submitted queries and a list of...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Sep 2012

    Research Issues in Wireless Sensor Network Applications: A Survey

    Wireless Sensor Networks (WSN) are used in variety of fields which includes military, healthcare, environmental, biological, home and other commercial applications. With the huge advancement in the field of embedded computer and sensor technology, Wireless Sensor Networks (WSN), which is composed of several thousands of sensor nodes which are capable...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Sep 2012

    Reliability Modeling of Context Aware Wireless Sensor Network

    This paper is to propose a reliability model for a fault tolerant wireless sensor network using context awareness feature in order to evaluate network reliability by modeling in PI Calculus. The earlier Propositional Directed Acyclic Graph (PDAG) approach leads to an identification of a suitable structure function in polynomial time...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Sep 2012

    Maputo Bay Wireless Network Cost Analysis

    The objective of this paper is to analyze the cost of building wireless networks in the context of Network Engineering (NE). Cost analysis is important in planning and design phases in network lifecycles, especially for developing countries. The Techno-Economic Analysis presented in this paper is based on the project for...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Sep 2012

    An Empirical and Architectural Study of Using an SSD-Aware Hybrid Storage System to Improve the Performance of the Data Intensive Applications

    Processors speed have increased in a steady pace year over year, storage system performance is still the major bottleneck for most computer systems including high performance computers. Many attentions have been given to optimize the storage system speed using various approaches such as caching, intelligent perfecting and scheduling techniques, nevertheless,...

    Provided By International Journal of Information and Electronics Engineering