International Journal of Information and Electronics Engineering

Displaying 1-40 of 111 results

  • White Papers // Jan 2014

    Mobile Applications as Cloud Computing: Implementation and Challenge

    Currently, mobile application and computing is gaining a high momentum and playing a significant role in enhancing the internet computing infrastructure. In addition, the mobile devices and their applications have high technique in the service ever had, and developed rapidly. Mobile cloud computing is expected to generate significantly more innovative...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Jan 2014

    SIDP: A Secure Inter-Domain Distributed PMIPv6

    Proxy Mobile IPv6 (PMIPv6) offers centralized network-based mobility support for Mobile Nodes (MN). This centralized nature of mobility leads to the performance issues such as single-point failure, non-optimal routing, low scalability, authentication latency, and signaling overhead. Additionally, PMIPv6 does not support inter-domain handover due to which the on-going sessions cannot...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Jan 2014

    An Efficient Pipelined Multiplicative Inverse Architecture for the AES Cryptosystem

    In this paper, the authors introduce architecture for performing a recursive pipeline algorithm for use in optimizing the performance of the multiplicative inverse operations in Galois Field GF (2k). The latter is extensively used in performing the S-box byte-substitution in the AES cryptosystem. Using composite fields the operations are recursively...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Mar 2013

    RFID Reader Receiver Using Blind Signal Estimation for Multiuser Detection

    Radio Frequency IDentification (RFID) is a wireless technology that uses radio backscatter signals to purpose of identifies objects. Especially, in the microwave frequency as 2.45 GHz is growing rapidly. Since the physical environment surrounding the propagation path of radio identification is generally difficult to control, the channel characteristics in backscattering...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Jan 2013

    Bandpass Continuous-Time Delta-Sigma Modulator for Wireless Receiver IC

    Bandpass ADC is well known to be adopted in the narrow-band receiver design in order to reduce the system complexity, increase integration and improve performance by digitizing the bandpass signal directly without prior conversion to baseband. A fully differential feed forward fourth-order continuous-time bandpass delta-sigma modulator is presented. The proposed...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Jan 2013

    Green Radio Technology for Energy Saving in Mobile Towers

    The number of users and the use of telecommunication systems are increasing rapidly and this result in greater demands on energy usage. Based on the extensive Life-cycle Assessment (LCA) conducted by various network operators, it is learned that energy consumption in the usage phase of its radio access networks is...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Jan 2013

    Securing Website by Secure Sockets Layer in Wireless Network using Windows Server 2008

    Internet security is a branch of computer security specifically related to the Internet. Its objective is to establish rules and measures to use against attacks over the Internet. The Internet represents an insecure channel for exchanging information leading to a high risk of intrusion or fraud, such as hackers. Different...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Jan 2013

    An Efficient Network Monitoring and Management System

    Large organizations always require fast and efficient network monitoring system which reports to the network administrator as soon as a network problem arises. This paper presents an effective and automatic network monitoring system that continuously monitor all the network switches and inform the administrator by email or sms when any...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Dec 2012

    Fairness Evaluation of a DSCP Based Scheduling Algorithm for Real-Time Traffic in Differentiated Service Networks

    It is a very vital factor to allocate the resources for improving the QoS (Quality of service) for any network carrying various types of traffic. Real-time applications, such as video conferences, are in the most important to get the benefit of QoS adaptation. Several scheduling disciplines are employed at the...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Dec 2012

    Back-to-Back Networking for Traffic Characteristics on Digital Video Transmission System (DVTS)

    Nowadays, real-time video communication is an increasingly popular application for real-time demonstrations and/or interactive teleconferences offering original quality and assuring smooth movement of the video with clarity of sound over an Intra-Domain and Inter-Domain network. Traffic characteristics analysis are needed to improve the quality service for real-time video communication systems....

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Nov 2012

    Establish Exchange Network Platform and Cargo Tracking System

    S.H. Global Logistics Co., Ltd invoiced on supply chain activities such as import and export customs clearance, FCL transport, land transport, worldwide customs clearance, express delivery, express customs clearance and distribution center. It's difficult for S.H. Co. to achieve customer requests by using current two operate systems. Additionally, there are...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Nov 2012

    Secure PHR Access Control Scheme in Cloud Computing

    With the development of medical technology and information technology, the "Personal Health Records (PHR)" is gradually developed as a up-to-date medical information exchange system. A proper patient-centered PHR system is able to offer correct and complete personal health and medical summary through the Internet under the demands of privacy and...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Nov 2012

    Priority and Network-aware Data Control Scheme to Guarantee the Media Quality in LTE Networks

    For efficient streaming over wireless networks, the LTE (Long Term Evolution) system supports the ARQ (Automatic Repeat reQuest) and HARQ (Hybrid Automatic Repeat reQuest) schemes. However, there is no specification about how to use the ARQ and HARQ parameters in order to guarantee the media quality. To cope with this...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Nov 2012

    Data Communication System for Sensorized Guidewire Application

    Resistive and capacitive sensors are commonly used in biomedical applications for measuring the various physiological signals. A low power and high resolution sensor interface circuit is critical to achieve the required sensing range and system specifications. One of the commonly employed interface circuit for biomedical application is relaxation oscillator based...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Nov 2012

    11-Bit 6.5MS/s SAR ADC for Wireless Applications

    A 1.3V, 11-bit, 6.5 MS/s Successive Approximation ADC is presented. The ADC operates with a differential peak to peak input of 1V. The ADC uses the common mode resetting triple level switching scheme, non-binary generalized redundant algorithm, a rail-to-rail latched comparator and a input bootstrapped sampling switch. The simulation results...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Nov 2012

    Link Budget Improvement of Cooperative Diversity with WCDMA Method Implementation

    Cooperative transmission has been of growing interest recently where users take advantage of each other's resources for better overall performance. User cooperation provides uplink transmit diversity even when mobile units cannot accommodate multiple antennas due to size constraints. Recently, a versatile user cooperation method called coded cooperation diversity was introduced...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Oct 2012

    Design Requirements for Best Effort Backbone IP Network

    Process control systems for Hydrocarbon Process Automation Applications (HPAA) are implemented in oil and gas fields, plants, refineries, and tank farms in the form of a Local Area Network (LAN) to support control functions. These systems are composed of sensors, actuators, and logic solvers networked together to form a control...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Oct 2012

    Highly Miniaturized 1-4 On-Chip Power Divider/Combiner Circuit on Silicon Substrate for Application to Long Distance Wireless Power Transmission

    In this paper, for application to a long distance wireless power transmission, a highly miniaturized 1-4 power divider/combiner employing periodic structure was fabricated on semi conducting silicon substrate. The 1-4 divider/combiner showed good RF performances from 1 to 25 GHz, and its size was 1.08 x 0.63 mm2, which is...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Oct 2012

    SLM Technique Combined with a Random-Like Coding for Reducing PAPR in OFDM Systems with No Explicit Side Information

    OFDM is an attractive technique for high data rate and reliable communication over fading channels and high Peak-to-Average Power Ratio (PAPR) is a notable drawback of Orthogonal Frequency-Division Multiplexing (OFDM) systems. The main implementation drawback of this system is the possibility of high Peak to Average Power Ratio (PAPR). The...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Oct 2012

    Direct Conversion Mixer IC for Application to Long Distance Wireless Power Transmission

    In this paper, Using the silicon CMOS technology, direct conversion mixer was fabricated on silicon substrate for a realization of the long distance wireless power transmission system. The size of the mixer is 0.8 mm x 0.5 mm. The input frequency of mixer is 24 GHz, and converted BB frequency...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Oct 2012

    Femtocell Suburban Deployment in LTE Networks

    In this paper, the authors present a hybrid deployment model in order to investigate the path loss behavior of a LTE-femtocell in a residential suburban scenario. The proposed model places the femtocells in a fix grid to calculate path loss for each femtocell. The path loss is used to deduce...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Oct 2012

    Tranceiver Mixer MMICs Employing Cascode Circuit Structure for Personal Area Network (PAN) Applications

    MMIC (Monolithic Microwave Integrated Circuit) chip set was developed for application to wireless PAN. Concretely, cascade type transceiver mixers employing GaAs p-HEMT were fabricated on GaAs substrate. The mixer MMICs showed good RF performances. Concretely, the conversion gain of the receiver mixer was 9.6 dB at a LO input of...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Oct 2012

    DMLRid - An XML-Based Proof-of-Concept Mobile DRM Framework for Sharing Learning Contents among Mobile Networks

    This paper proposes a framework that helps in closing the gap that exists between the mobile learning environment and students' everyday use of mobile devices. This new framework for Digital Rights Management in systems for mobile learning enhances the ability to define, manage, and share the licensed learning multimedia content...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Sep 2012

    A Multiband PIFA with a Slot on the Ground Plane for Wireless Applications

    In this paper, the authors present a new configuration of Planar Inverted-F Antenna (PIFA) for mobile communication devices. Simulated results demonstrate that the new configuration covers DCS/PCS/UMTS/WiBro/Bluetooth/S-DMB/WiMax/WLAN frequency bands. Simulated return loss of the proposed antenna is acceptable over all the mentioned frequency bands. Overall size of the proposed design...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Sep 2012

    Design Considerations for Optimizing Real-Time Control and Communication for the Kiira Electric Vehicle

    The Vehicle Design Project based at the School of Engineering, Makerere University embarked on development of a two-seater Electric Vehicle (EV) code named KIIRA as a proof of concept. This paper presents the design considerations in developing the vehicle's control and communication systems. It highlights the hardware and software, architectural...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Sep 2012

    Interaction Model for Emotive Video Production

    Video images are capable of expressing various kinds of information; however special knowledge and techniques are required for authoring quality video content. In order to represent impressions, proper camerawork is required for delivering understandable content. However, amateur users often have difficulties in shooting images which appropriately reflect their expressive intentions....

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Sep 2012

    Efficient and Semantic OLAP Aggregation Queries in a Peer to Peer Network

    This paper presents TrackerCache system - a Peer To Peer (P2P) system for efficient serving OLAP queries and aggregation of data cubes in distributed data sharing system. TrackerCache system provides a central component called tracker, which acts as a directory, keeping track of all submitted queries and a list of...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Sep 2012

    Research Issues in Wireless Sensor Network Applications: A Survey

    Wireless Sensor Networks (WSN) are used in variety of fields which includes military, healthcare, environmental, biological, home and other commercial applications. With the huge advancement in the field of embedded computer and sensor technology, Wireless Sensor Networks (WSN), which is composed of several thousands of sensor nodes which are capable...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Sep 2012

    Reliability Modeling of Context Aware Wireless Sensor Network

    This paper is to propose a reliability model for a fault tolerant wireless sensor network using context awareness feature in order to evaluate network reliability by modeling in PI Calculus. The earlier Propositional Directed Acyclic Graph (PDAG) approach leads to an identification of a suitable structure function in polynomial time...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Sep 2012

    Maputo Bay Wireless Network Cost Analysis

    The objective of this paper is to analyze the cost of building wireless networks in the context of Network Engineering (NE). Cost analysis is important in planning and design phases in network lifecycles, especially for developing countries. The Techno-Economic Analysis presented in this paper is based on the project for...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Sep 2012

    An Empirical and Architectural Study of Using an SSD-Aware Hybrid Storage System to Improve the Performance of the Data Intensive Applications

    Processors speed have increased in a steady pace year over year, storage system performance is still the major bottleneck for most computer systems including high performance computers. Many attentions have been given to optimize the storage system speed using various approaches such as caching, intelligent perfecting and scheduling techniques, nevertheless,...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Sep 2012

    Energy Optimization Through Position Responsive Routing Protocol (PRRP) in Wireless Sensor Network

    Wireless Sensor Networks (WSNs) are consist of very tiny nodes structure, with very small batteries without having facility to recharge it. It works under any hard circumstances, hence this type of network is gaining high importance day by day. Maximum focus of researchers is to enhance or optimized its energy...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Sep 2012

    Downlink SNR to CQI Mapping for Different Multiple Antenna Techniques in LTE

    Long Term Evolution (LTE) is a step towards the 4th Generation (4G) of radio technologies designed to increase the capacity and speed of mobile wireless access. In Release 8, LTE was standardized by 3GPP as the successor of the Universal Mobile Telecommunication System (UMTS).Before full commercial deployment of LTE, downlink...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Sep 2012

    Implementation of Multiplayer Bluetooth Memory Game for Mobile Phones

    With time and technology, mobiles have been revolutionized from a communicating device to something which can be used for computing, entertainment as well as communication. Entertainment is perhaps the field which attracts most of the customers to a particular model. Hence these days, the various mobile developers are releasing phones...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Sep 2012

    Implementation Issues for Developing Credit Card Software for Mobile Phones

    Money Transaction has become common, frequent and a necessity in the current living and carrying cash always with a person is not a practical solution. The current trend of carrying the credit cards have become a crucial part of life and carrying of multiple cards is common nowadays. There is...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Sep 2012

    On the Feasibility of Key Compromise Impersonation Attacks Against the Elliptic Curve Version of the MTI/C0 Key Agreement Protocol

    In this paper, the authors point out that the protocol proposed by the aforementioned authors is in fact the elliptic curve version of the MTI/C0 family of key agreement protocols which suffer from a well-known vulnerability against a particular type of key-compromise impersonation attack. Since the Diffie-Hellman (DH) key exchange...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Sep 2012

    Applying Data Analytics to Development of the Web- Based Information Security Career Systems

    This paper proposes a case to build a Web-based Information/Cyber Security (ICS) career system for smart education using Web data analytical technology. The proposed system will automatically monitor and extract the new ICS job openings as well as the specific knowledge, skills, certificates or degrees required for the job openings...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Sep 2012

    A Success Model for Business Process Management Implementation

    Business Process Management (BPM) is currently being seen as the best way to facilitate process improvements. Since this concept is mainly a multidisciplinary subject, success in implementing requires considering various factors. In this paper, first seven success factors were explored through qualitative meta-synthesis based on previous studies; then a success...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Jul 2012

    A Novel Secure Keying Technique for the Wireless Sensor Networks

    Strong cryptographic schemes are used for securing the Wireless Sensor Networks (WSNs). Even if a strong cipher is used for encryption/ decryption of messages in any form of WSN communication, if the key is compromised and it no longer remains secret, the security of the underlying network is compromised. Therefore,...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Jul 2012

    Interoperability Between IPv4 and IPv6 Clients and Servers

    Most applications today support IPv4 and thus there is a need to run these applications on IPv6 access network. IPv4 can't meet the rising needs of the present internet. Moreover, IPv6 can solve the problems that IPv4 faced, and present more new features. The Internet must make the transition from...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Nov 2012

    Priority and Network-aware Data Control Scheme to Guarantee the Media Quality in LTE Networks

    For efficient streaming over wireless networks, the LTE (Long Term Evolution) system supports the ARQ (Automatic Repeat reQuest) and HARQ (Hybrid Automatic Repeat reQuest) schemes. However, there is no specification about how to use the ARQ and HARQ parameters in order to guarantee the media quality. To cope with this...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Dec 2012

    Fairness Evaluation of a DSCP Based Scheduling Algorithm for Real-Time Traffic in Differentiated Service Networks

    It is a very vital factor to allocate the resources for improving the QoS (Quality of service) for any network carrying various types of traffic. Real-time applications, such as video conferences, are in the most important to get the benefit of QoS adaptation. Several scheduling disciplines are employed at the...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Dec 2012

    Back-to-Back Networking for Traffic Characteristics on Digital Video Transmission System (DVTS)

    Nowadays, real-time video communication is an increasingly popular application for real-time demonstrations and/or interactive teleconferences offering original quality and assuring smooth movement of the video with clarity of sound over an Intra-Domain and Inter-Domain network. Traffic characteristics analysis are needed to improve the quality service for real-time video communication systems....

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Sep 2012

    A Multiband PIFA with a Slot on the Ground Plane for Wireless Applications

    In this paper, the authors present a new configuration of Planar Inverted-F Antenna (PIFA) for mobile communication devices. Simulated results demonstrate that the new configuration covers DCS/PCS/UMTS/WiBro/Bluetooth/S-DMB/WiMax/WLAN frequency bands. Simulated return loss of the proposed antenna is acceptable over all the mentioned frequency bands. Overall size of the proposed design...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Oct 2012

    Design Requirements for Best Effort Backbone IP Network

    Process control systems for Hydrocarbon Process Automation Applications (HPAA) are implemented in oil and gas fields, plants, refineries, and tank farms in the form of a Local Area Network (LAN) to support control functions. These systems are composed of sensors, actuators, and logic solvers networked together to form a control...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Oct 2012

    Highly Miniaturized 1-4 On-Chip Power Divider/Combiner Circuit on Silicon Substrate for Application to Long Distance Wireless Power Transmission

    In this paper, for application to a long distance wireless power transmission, a highly miniaturized 1-4 power divider/combiner employing periodic structure was fabricated on semi conducting silicon substrate. The 1-4 divider/combiner showed good RF performances from 1 to 25 GHz, and its size was 1.08 x 0.63 mm2, which is...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Oct 2012

    SLM Technique Combined with a Random-Like Coding for Reducing PAPR in OFDM Systems with No Explicit Side Information

    OFDM is an attractive technique for high data rate and reliable communication over fading channels and high Peak-to-Average Power Ratio (PAPR) is a notable drawback of Orthogonal Frequency-Division Multiplexing (OFDM) systems. The main implementation drawback of this system is the possibility of high Peak to Average Power Ratio (PAPR). The...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Oct 2012

    Direct Conversion Mixer IC for Application to Long Distance Wireless Power Transmission

    In this paper, Using the silicon CMOS technology, direct conversion mixer was fabricated on silicon substrate for a realization of the long distance wireless power transmission system. The size of the mixer is 0.8 mm x 0.5 mm. The input frequency of mixer is 24 GHz, and converted BB frequency...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Nov 2012

    Establish Exchange Network Platform and Cargo Tracking System

    S.H. Global Logistics Co., Ltd invoiced on supply chain activities such as import and export customs clearance, FCL transport, land transport, worldwide customs clearance, express delivery, express customs clearance and distribution center. It's difficult for S.H. Co. to achieve customer requests by using current two operate systems. Additionally, there are...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Nov 2011

    MRMM: A Mathematical Risk Management Model for Iterative IT Projects Based on the Smart Database

    The increasing advancement in information technology industry is compatible with the changing nature of the world. While software is important for all facets of the modern world, software development itself is not a perfect process. Iterative software development methods have recently emerged as a new and better way of developing...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Nov 2011

    Review of Various Routing Protocols for MANETs

    In recent years, a vast research has been seen going on in the field of Mobile Ad Hoc NETworks (MANETs). Due to limited resources in MANETs, to design an efficient and reliable routing strategy is still a challenge. An intelligent routing strategy is required to efficiently use the limited resources....

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Jan 2012

    An Efficient Scheme for MIMO Broadcast Channels Based on Iterative User Selection

    Dirty Paper Coding (DPC) is shown to achieve the capacity of Multiple-Input Multiple-Output (MIMO) Gaussian Broadcast Channels (BCs). In circuit data scenarios, users demand to get service at fixed desire rate. Finding the optimal covariance matrices and order of users for maximizing user capacity requires high complexity computation. To deal...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Jan 2012

    A Tampered Image Detecting Method Based on Wavelet Analysis

    Contrast enhancement operation is often used to highlight some information, weaken or remove some unwanted information in tampered images. In this paper, a tampered image detecting method is proposed based on wavelet analysis for specific fingerprints left by contrast enhancement operation in image. Firstly, the RGB color space of image...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Jan 2012

    Enhanced Authentication and Key Agreement Procedure of Next Generation 3GPP Mobile Networks

    In the next generation mobile networks, because of fundamental changes with respect to previous cellular 3.xG networks and integration different access network which caused frequent handover and provision all IP packet-based services, load transaction overhead such as authentication traffic overhead as an important initial security process to identity of users,...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Jan 2012

    Joint Detection and User Selection Algorithms in Cognitive Wireless Communication System

    Cognitive wireless networks usually utilize large numbers of cognitive nodes to collect cognitive information of the authorized frequency bands and do automatic configuration to finish spectrum sharing processes. How to realize joint detection and choose appropriate cognitive nodes to achieve opportunity type spectrum access should be considered in a cognitive...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Jan 2012

    Data Scheduling for Vehicular Ad-Hoc Networks Augmented With Road Side Units

    Timely data dissemination to vehicles is a core function in Vehicular Ad-hoc NETworks (VANETs), and the use of Road Side Unit (RSU) has been proposed by researchers to augment vehicle to vehicle communication. RSU can serve as data buffer point from which vehicles can request to access data items stored...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Mar 2012

    Instantaneous Cycle-Slip Detection and Repair of GPS Data Based on Doppler Measurement

    In GPS receivers, carrier phase measurement can be used to improve the receiver's position accuracy. In order to maintain the accuracy, cycle-slip must be detected and repaired instantaneously and accurately. This paper first analyzes the implementation cycle-slip detection and repair method of GPS data based on Doppler measurement. Then introduce...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Mar 2012

    Industrial Processes Applied to Embedded Systems Curriculum

    This paper presents a modality to shorten the gap existing between the industrial requirements regarding the qualifications of future engineers and the actual academic provided education. The authors present the case of Embedded System laboratory developed at Computer and Software Engineering Department, Faculty of Automation and Computers, "Politehnica" University of...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Mar 2012

    An Improvement on TCP Congestion Control Protocol for Next Generation Networks

    Recent years have shown an increased interest towards multimedia rich applications. Multimedia content ranges from text or simple images to audio data or video data. A Next-Generation Network (NGN) is a packet-based network that handles multiple types of traffic (such as voice, data, and multimedia). Multimedia applications include large amount...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Mar 2012

    Tackling Spoofing Attacks Using Broadband Access Concentrators

    Spoofing based attacks have severe consequences and are wide-spread, but much of the present day Internet is ill-prepared to defend against them. To defend against spoofing effectively, devices at the edge of the Internet have a major role to play. This paper describes how one such set of devices, broadband...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Mar 2012

    Key Update Strategies for Wireless Sensor Networks

    Wireless sensor networks offer the advantages of simple and low-resource communication. Challenged by this simplicity and low-resources, security is of particular importance in many cases such as transmission of sensitive data or strict requirements of tamper-resistance. Updating the security keys is one of the essential points in security, which restrict...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Mar 2012

    Model of Complex Searching Over Structured P2P Overlay Under Dynamic Environment

    This paper aims to present a model to achieve complex searching (e.g., Wild card searching, blind searching, full text searching, metadata searching, etc.) over Structured P2P Overlay under dynamic environment. Lack of complex searching over Structured Overlay network and poor resilience due to peer dynamics makes it unsuitable for implementing...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Mar 2012

    A Genetic Algorithm-Based Approach for Energy- Efficient Clustering of Wireless Sensor Networks

    In this paper, the authors propose a Genetic Algorithm (GA) to optimize sensor nodes' energy consumption. Attention is paid to the clustering technique as an efficient way for reducing energy consumption of a sensor node as well as the cost of transmission. They use a multi-objective algorithm that generates an...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Mar 2012

    Coordinate Based Directed Routing Protocol

    In this paper, the authors propose a new Coordinate mapping scheme for the Cellular Wireless Network. They introduce the idea of Directed Routing and design a Routing Protocol for the proposed system. The protocol selects the optimal path considering both Path length and Congestion. The performance of the model is...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Mar 2012

    A CPW Fed E-Shaped Reconfigurable Antenna With Frequency Diversity

    A new CPW fed E-shaped reconfigurable Antenna with frequency diversity is designed and analyzed in this paper. The basic antenna consists of CPW fed E-shaped Patch antenna which operates at 5.8GHz which falls in IEEE 802.11 WLAN/RFID applications. The reconfigurability in frequency is obtained by connecting the switches in basic...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Mar 2012

    GBFTS: Group Based Fault Tolerant Scheme in Wireless Sensor Networks

    In wireless sensor network probability of fault occurrences are very high mainly for physical deployment and wireless communication policy. Faulty sensors node and transmission fault decreases the network quality. It is most important to tolerate the faults which occur in network to improve the network quality. In wireless sensor network,...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Mar 2012

    Maximizing Network Lifetime Through Varying Transmission Radii With Energy Efficient Cluster Routing Algorithm in Wireless Sensor Networks

    One of the major issues in wireless sensor network is developing an energy-efficient routing protocol. LEACH is very effective in enhancing lifetime of the nodes from routing aspect. This paper proposes the scheduling of energy efficient cluster nodes close to the base station called EECL algorithm. Both LEACH and EECL...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Mar 2012

    Improved ICI Self Cancellation Scheme for Phase Rotation Error Reduction in OFDM System

    Orthogonal Frequency Division Multiplexing (OFDM) is sensitive to Carrier Frequency Offset (CFO).This CFO mainly occurs because of the frequency mismatch in the transmitter and the receiver. As a result, the orthogonality between the subcarriers are destroyed causing not only the Inter Carrier Interference (ICI) in a sub carrier but also...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Mar 2012

    ETSHRA: Energy Efficient Threshold Sensitive Hierarchical Routing Algorithm for Cognitive Wireless Sensor Networks

    Today's wireless networks are regulated by government organizations where a fixed spectrum is assigned to license holders for a specific geographic region. The spectrum usage is dominated in some areas and a major amount of it is underutilized. The spectrum utilization ranges from 15% to 85% depending on the area...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Mar 2012

    A QoS Framework for Next Generation Networks Based on Metro Ethernet

    Nowadays, the interest in using Metro Ethernet as the main access technology in Next Generation Networks (NGN) is ever increasing. One of the main demands of these networks is to provide Quality of Service (QoS) for multimedia and other time stringent applications. At present, several well-known technologies are used by...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Mar 2012

    A Survey on Dynamic Honeypots

    There are a lot of critical issues in the network security concern. One of these issues is deployment of dynamic honeypot. To overcome this matter, plug and play honeypot methods are being promoted by some researchers. Therefore, the main aim of this paper is to study on the usability and...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Mar 2012

    Modeling Cloud Software-as-a-Service: A Perspective

    Cloud computing, an emerging computing paradigm, is still in its stage of infancy. It can be considered as an amalgam of a variety of legacy and evolving technologies and concepts such as distributed computing, grid computing, virtualization, service-oriented architecture, software-as-a-service etc to mention a few. It aims at optimally utilizing...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Mar 2012

    Opportunistic Routing: Opportunities and Challenges

    During the past few years Opportunistic Routing (OR) gained a lot of attention as a way to improve the performance of wireless multi-hop Ad-hoc networks and wireless sensor networks. OR takes advantage of the broadcast nature of wireless communications to improve transmission reliability and throughput by forwarding data through a...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Mar 2012

    Application of Superposition Coding for Subcarrier and Bit Allocation in Downlink OFDM Systems

    Orthogonal Frequency Division Multiplexing (OFDM) is well known for multicarrier modulation technique in which a high data rate stream is divided into different parallel lower data stream. In this paper, the authors study the Margin Adaptive - Superposition Coding (MA-SC) algorithm and Rate Adaptive - Superposition Coding (RA-SC) algorithm, where...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Mar 2012

    A New Palm Print Based Fuzzy Vault System for Securing Cryptographic Key

    Biometric unique authentication approach on encrypted message provides a totally secured information delivery without any need to hide any password or secret key. The authors present the usage of biometrics technique in asymmetric cryptographic domain where they protect secret key involved in cryptographic with the help of fuzzy vault created...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Mar 2012

    Adaptive Fair Resource Allocation and Packet Dependent Scheduling Using Cross-Layer Design in Multiuser OFDM Systems

    In this paper, the authors consider a multiuser Orthogonal Frequency Division Multiplexing (OFDM) system and propose a fair resource allocation algorithm using cross-layer design with packet dependent scheduling. Their proposed algorithm achieves fairness among users (in proportion of weights of users) while maximizing the weighted sum capacity of users. Since,...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // May 2012

    Data Transmission at 12kb/s Over 32kb/s ADPCM

    This paper presents new modified QAM modem that operates at data rate of 12kb/s to be transmitted over 32kb/s Adaptive Differential Pulse Code Modulation (ADPCM). The purpose of this modified QAM modem is to reduce the nonlinear distortion introduced by ADPCM. The performance of ADPCM is studied considering the standard...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // May 2012

    An Effective Method of Security Against Wormhole Attack

    A major problem facing researchers today in the field of ad hoc networks is safety and preservation of the integrity of such networks. Among the many attacks recorded in the paper, wormhole attack remains a severe attack and not completely solved, particularly in ad hoc network configuration where OLSR is...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // May 2012

    EMID: Maximizing Lifetime of Wireless Sensor Network by Using Energy Efficient Middleware Service

    This paper introduces the processing of raw data from sensor nodes located at different places within the vicinity of header node. The middleware service of header node evaluates the assignment and requirement of each node that comes under its vicinity. Based on header node instructions each sensor node is in...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // May 2012

    A Novel Scheduling Mechanism Based on Artificial Immune System for Communication Between Cluster Head and Cluster Members in WSNs

    Till now, different mechanisms have been proposed for communication between cluster members and cluster head in hierarchical protocols. Most of them determine a same time for each cluster member to communicate with cluster head without regarding the nodes conditions. In this paper, the authors propose a novel scheduling mechanism based...

    Provided By International Journal of Information and Electronics Engineering