International Journal of Information and Electronics Engineering

Displaying 1-40 of 132 results

  • White Papers // Jan 2015

    Cloud Computing Services and Applications to Improve Productivity of University Researchers

    One of the fundamental issues facing research universities is to raise productivity of their research community. A thorough study of the literature reveals that there are many articles on productivity, however, there are only a small number of them are relate to productivity issues affecting researchers in universities. In this...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Jan 2015

    A Secure Routing Method on Wireless Mesh Sensor Networks (WMSNs)

    Wireless Sensor Networks (WSNs) are based on the random deployment of a large number of tiny sensor nodes and actuators into or very close to the phenomenon to be observed. These networks face with several essential challenges; for example, power consumption and secure routing are critical problems in the wireless...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Jan 2015

    Heavy AP Backhaul Aggregation: Concepts and Impact on Wireless Networks Performance

    In telecommunication networks, especially wireless, it is common for computers (machines) in residential scenarios and hotspots to see multiple Access Points (APs). These APs often provide wireless broadband but are connected to the internet via independent, relatively slow links. With current wireless norms, one station is capable of connecting to...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Jan 2015

    A Novel Approach to Combine Misuse Detection and Anomaly Detection Using POMDP in Mobile Ad-Hoc Networks

    Security becomes out of the main concerns in mobile ad hoc networks. Intrusion detection systems are reactive systems that act as a second wall to protect the network. Misuse detection is a technique which is used commonly by intrusion detection systems to match the attack signature pattern in mobile ad...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Jan 2015

    Secure Lightweight Routing Protocol with Confidentiality Redundancy in Wireless Ad Hoc Networks (SLRCR)

    Mobile Ad hoc NETworks (MANETs) are independent self-organizing systems of mobile nodes or computers connected by wireless links and without using of any infrastructure like base stations or access points. Routing is a critical function in multi-hop mobile ad hoc networks. The most important requirement for MANET routing protocols is...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Jan 2015

    Development of Remote Control Dongle Connecting to Smartphone

    Recently various consumer electronic devices can be controlled by remote controls. Usually home appliances such as TV, radio, Blu-ray players, home theater, air conditioner, and room lighting come with remote controls that are used to select items and change status. As a result, users need to get familiar with the...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Jan 2015

    A Pre-Interleaver and Error Control Based Selective Mapping Method for PMEPR Reduction in MC-CDMA

    The multi-carrier transmission signal in MC-CDMA has a high Peak-to-Mean Envelope Power Ratio (PMEPR) which results in nonlinear distortion and system performance degradation. To reduce PMEPR, a pre-interleaver and error control coding based selective mapping method is proposed in this paper. This method generates 2n sequences of the original data...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Jan 2015

    Assessment of Electromagnetic Radiation with Respect to Base Station Types

    In this paper, radiation of Base Stations (BSs) in different installation types was measured in order to determine how the electromagnetic pollution level is affected by the installation types of them. Measurements were carried out on 8 BSs in Konya, Turkey. Additionally, a survey including 10 questions was applied to...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Nov 2014

    Performance Enhancement of AODV Routing Protocol in Wireless Mesh Networks

    Performance of routing protocols mainly depends on efficient channel path establishment, route optimization and control overhead. Route optimization plays a pivotal role in \"Self-healing\" and \"Self-configuring\" Wireless Mesh Networks (WMN). State-of-the art routing protocols rely on IEEE 802.11 MAC and TCP congestion control mechanisms to optimize the performance of routing...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Nov 2014

    On the Secure Outage Performance for Dual-Hop Network Coding Systems with Cooperative Jamming

    In this paper, a design of cooperative Network Coding (NC) and Jammer Relay (JR) is proposed for this two-way network in order to improve the security of the date exchange. Considering the system over Rayleigh fading channels in the presence of one eavesdropper and two relays, the authors study secrecy...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Sep 2014

    Decision Fusion Under a Dynamic Wireless Sensor Network Over Noncoherent Multi-Access Channels

    In order to solve the decision fusion issue under a dynamic Wireless Sensor Network (WSN) based on non-coherent multi-access channels, a decision fusion rule based on the quadrature components of the information received by fusion center is proposed. It is assumed that the distribution of fading channels submits a Rayleigh...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Sep 2014

    Blind Equalization Using Correntropy Algorithm for Wireless Sensor Networks

    Wireless links in indoor sensor networks have distortions due to multipath fading from reflections and impulsive noise from indoor electric devices. In these harsh environments, blind correntropy equalization algorithm yields superior MSE performance compared with the constant modulus algorithm. However the correntropy algorithm has a heavy computational complexity, which is...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Jul 2014

    Large Wireless Ad Hoc Network Clustering with End-to-End QoS Constraints Using Multiobjective Particle Swarm Optimization

    To scale for large ad hoc networks containing hundreds or even thousands of subnets, the networks must be hierarchically organized by partitioning them into clusters or domains. Many researchers have proposed partitioning of large networks into clusters, but this requires specifying cluster size bound. Graph Partitioning (GP) algorithms search for...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Jul 2014

    Decomposition of Classes on the Stability of Software Architecture

    Object-Oriented Programming (OOP) to support software maintenance and reuse by introducing concepts like abstraction, encapsulation, aggregation, inheritance and polymorphism. However, years of experience have revealed that this support is not enough. It has been explored if stability of software is related to the decomposing the class object are related to...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Mar 2014

    Experimental Investigation of Reed-Solomon Error Correction Technique for Wireless Sensor Network

    In this paper, the authors propose a Reed-Solomon (RS) error correction code with an error correction capability of 32 bytes for IEEE 802.15.4 Wireless Sensor Network (WSN). This code is chosen based on their experimental investigation and the analysis of error pattern, which revealed that although there are as much...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Mar 2014

    Complexity Analysis of Iterative Decoders in Mobile Communication Systems

    Turbo Convolutional Codes (TCC) and Low Density Parity Check (LDPC) codes, based on iterative decoders, are widely used to reduce bit error rate in mobile communication systems. The key implementation issue for these codes is the overall higher decoding complexity. Modified turbo codes are low complexity turbo-like codes with error...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Jan 2014

    Novel Planar Antenna for Long Term Evolution (LTE)

    The demand for multi band antenna is increasing rapidly. This is due to accelerated growth in mobile communications globally. Systems like LTE are multiband systems utilizing variety of frequency bands thereby increasing capacity and allow for addition of much functionality. In such multiband systems, a multiband antenna is definitely one...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Jan 2014

    Mobile Applications as Cloud Computing: Implementation and Challenge

    Currently, mobile application and computing is gaining a high momentum and playing a significant role in enhancing the internet computing infrastructure. In addition, the mobile devices and their applications have high technique in the service ever had, and developed rapidly. Mobile cloud computing is expected to generate significantly more innovative...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Jan 2014

    SIDP: A Secure Inter-Domain Distributed PMIPv6

    Proxy Mobile IPv6 (PMIPv6) offers centralized network-based mobility support for Mobile Nodes (MN). This centralized nature of mobility leads to the performance issues such as single-point failure, non-optimal routing, low scalability, authentication latency, and signaling overhead. Additionally, PMIPv6 does not support inter-domain handover due to which the on-going sessions cannot...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Jan 2014

    An Efficient Pipelined Multiplicative Inverse Architecture for the AES Cryptosystem

    In this paper, the authors introduce architecture for performing a recursive pipeline algorithm for use in optimizing the performance of the multiplicative inverse operations in Galois Field GF (2k). The latter is extensively used in performing the S-box byte-substitution in the AES cryptosystem. Using composite fields the operations are recursively...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // May 2013

    Prediction of Software Project Effort Using Linear Regression Model

    Software development effort estimation is a branch of forecasting that has received increased interest in academia, application domains and media. Efficient development of software requires accurate estimates. Unfortunately, software development effort estimates are notorious for being too optimistic. Inaccurate software estimates causes trouble in business processes related to software development...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Mar 2013

    RFID Reader Receiver Using Blind Signal Estimation for Multiuser Detection

    Radio Frequency IDentification (RFID) is a wireless technology that uses radio backscatter signals to purpose of identifies objects. Especially, in the microwave frequency as 2.45 GHz is growing rapidly. Since the physical environment surrounding the propagation path of radio identification is generally difficult to control, the channel characteristics in backscattering...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Jan 2013

    Bandpass Continuous-Time Delta-Sigma Modulator for Wireless Receiver IC

    Bandpass ADC is well known to be adopted in the narrow-band receiver design in order to reduce the system complexity, increase integration and improve performance by digitizing the bandpass signal directly without prior conversion to baseband. A fully differential feed forward fourth-order continuous-time bandpass delta-sigma modulator is presented. The proposed...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Jan 2013

    Green Radio Technology for Energy Saving in Mobile Towers

    The number of users and the use of telecommunication systems are increasing rapidly and this result in greater demands on energy usage. Based on the extensive Life-cycle Assessment (LCA) conducted by various network operators, it is learned that energy consumption in the usage phase of its radio access networks is...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Jan 2013

    Securing Website by Secure Sockets Layer in Wireless Network using Windows Server 2008

    Internet security is a branch of computer security specifically related to the Internet. Its objective is to establish rules and measures to use against attacks over the Internet. The Internet represents an insecure channel for exchanging information leading to a high risk of intrusion or fraud, such as hackers. Different...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Jan 2013

    An Efficient Network Monitoring and Management System

    Large organizations always require fast and efficient network monitoring system which reports to the network administrator as soon as a network problem arises. This paper presents an effective and automatic network monitoring system that continuously monitor all the network switches and inform the administrator by email or sms when any...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Dec 2012

    Fairness Evaluation of a DSCP Based Scheduling Algorithm for Real-Time Traffic in Differentiated Service Networks

    It is a very vital factor to allocate the resources for improving the QoS (Quality of service) for any network carrying various types of traffic. Real-time applications, such as video conferences, are in the most important to get the benefit of QoS adaptation. Several scheduling disciplines are employed at the...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Dec 2012

    Back-to-Back Networking for Traffic Characteristics on Digital Video Transmission System (DVTS)

    Nowadays, real-time video communication is an increasingly popular application for real-time demonstrations and/or interactive teleconferences offering original quality and assuring smooth movement of the video with clarity of sound over an Intra-Domain and Inter-Domain network. Traffic characteristics analysis are needed to improve the quality service for real-time video communication systems....

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Nov 2012

    Establish Exchange Network Platform and Cargo Tracking System

    S.H. Global Logistics Co., Ltd invoiced on supply chain activities such as import and export customs clearance, FCL transport, land transport, worldwide customs clearance, express delivery, express customs clearance and distribution center. It's difficult for S.H. Co. to achieve customer requests by using current two operate systems. Additionally, there are...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Nov 2012

    Secure PHR Access Control Scheme in Cloud Computing

    With the development of medical technology and information technology, the "Personal Health Records (PHR)" is gradually developed as a up-to-date medical information exchange system. A proper patient-centered PHR system is able to offer correct and complete personal health and medical summary through the Internet under the demands of privacy and...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Nov 2012

    Priority and Network-aware Data Control Scheme to Guarantee the Media Quality in LTE Networks

    For efficient streaming over wireless networks, the LTE (Long Term Evolution) system supports the ARQ (Automatic Repeat reQuest) and HARQ (Hybrid Automatic Repeat reQuest) schemes. However, there is no specification about how to use the ARQ and HARQ parameters in order to guarantee the media quality. To cope with this...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Nov 2012

    Data Communication System for Sensorized Guidewire Application

    Resistive and capacitive sensors are commonly used in biomedical applications for measuring the various physiological signals. A low power and high resolution sensor interface circuit is critical to achieve the required sensing range and system specifications. One of the commonly employed interface circuit for biomedical application is relaxation oscillator based...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Nov 2012

    11-Bit 6.5MS/s SAR ADC for Wireless Applications

    A 1.3V, 11-bit, 6.5 MS/s Successive Approximation ADC is presented. The ADC operates with a differential peak to peak input of 1V. The ADC uses the common mode resetting triple level switching scheme, non-binary generalized redundant algorithm, a rail-to-rail latched comparator and a input bootstrapped sampling switch. The simulation results...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Nov 2012

    Link Budget Improvement of Cooperative Diversity with WCDMA Method Implementation

    Cooperative transmission has been of growing interest recently where users take advantage of each other's resources for better overall performance. User cooperation provides uplink transmit diversity even when mobile units cannot accommodate multiple antennas due to size constraints. Recently, a versatile user cooperation method called coded cooperation diversity was introduced...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Oct 2012

    Design Requirements for Best Effort Backbone IP Network

    Process control systems for Hydrocarbon Process Automation Applications (HPAA) are implemented in oil and gas fields, plants, refineries, and tank farms in the form of a Local Area Network (LAN) to support control functions. These systems are composed of sensors, actuators, and logic solvers networked together to form a control...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Oct 2012

    Highly Miniaturized 1-4 On-Chip Power Divider/Combiner Circuit on Silicon Substrate for Application to Long Distance Wireless Power Transmission

    In this paper, for application to a long distance wireless power transmission, a highly miniaturized 1-4 power divider/combiner employing periodic structure was fabricated on semi conducting silicon substrate. The 1-4 divider/combiner showed good RF performances from 1 to 25 GHz, and its size was 1.08 x 0.63 mm2, which is...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Oct 2012

    SLM Technique Combined with a Random-Like Coding for Reducing PAPR in OFDM Systems with No Explicit Side Information

    OFDM is an attractive technique for high data rate and reliable communication over fading channels and high Peak-to-Average Power Ratio (PAPR) is a notable drawback of Orthogonal Frequency-Division Multiplexing (OFDM) systems. The main implementation drawback of this system is the possibility of high Peak to Average Power Ratio (PAPR). The...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Oct 2012

    Direct Conversion Mixer IC for Application to Long Distance Wireless Power Transmission

    In this paper, Using the silicon CMOS technology, direct conversion mixer was fabricated on silicon substrate for a realization of the long distance wireless power transmission system. The size of the mixer is 0.8 mm x 0.5 mm. The input frequency of mixer is 24 GHz, and converted BB frequency...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Oct 2012

    Femtocell Suburban Deployment in LTE Networks

    In this paper, the authors present a hybrid deployment model in order to investigate the path loss behavior of a LTE-femtocell in a residential suburban scenario. The proposed model places the femtocells in a fix grid to calculate path loss for each femtocell. The path loss is used to deduce...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Oct 2012

    Tranceiver Mixer MMICs Employing Cascode Circuit Structure for Personal Area Network (PAN) Applications

    MMIC (Monolithic Microwave Integrated Circuit) chip set was developed for application to wireless PAN. Concretely, cascade type transceiver mixers employing GaAs p-HEMT were fabricated on GaAs substrate. The mixer MMICs showed good RF performances. Concretely, the conversion gain of the receiver mixer was 9.6 dB at a LO input of...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Sep 2012

    The Best Performance Practices in Project Management of SAP ERP Accomplishment

    Most notably, SAP ECC 6.0 has been widely implemented to create value-oriented business processes that enable a high level of integration, improve communication within internal and external business networks, and enhance the decision-making process. SAP ECC 6.0 serves as a catalyst for information integration within and beyond the organizational scope...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Sep 2011

    Inserting Safety Into Software - Safety Critical Systems - Management Perspective

    Organizations are more interested in delivering the software product within a limited time frame with more profitability. Hierarchical positions in the organization, from top to bottom define constraints for non-disclosure of information in view of the safety of the entire organization, resulting in poor flow of information, causing incomplete understanding...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // May 2012

    Improving ertPS Grant Allocation for VoIP Traffic in Silence Duration

    This paper proposes a new uplink scheduling algorithm that can increase the uplink VoIP user capacity for ertPS scheduling in 802.16e networks. This algorithm solves the problems of uplink resources wastes and large overhead which causes during silence period. The authors compare their method with four related schemes including conventional...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // May 2012

    Worm Containment in Gnutella Network With Heterogeneity

    Attentions to security on P2P networks have recently been increased, especially with respect to worm epidemics. Most of countermeasures that are proposed to prevent worm propagation are ineffective in P2P overlay networks. In this paper, the authors use heterogeneity among peers to prevent worm propagation in Gnutella network. Their solution...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // May 2012

    Multiplierless FIR Filter Implementation on FPGA

    Area complexity in the algorithm of Finite Impulse Response (FIR) filter is mainly caused by multipliers. Among the multiplier-less techniques of FIR filter, Distributed Arithmetic is most preferred area efficient technique. In this technique, pre-computed values of inner product are stored in LUT, which are further added and shifted with...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Jul 2012

    A Novel Secure Keying Technique for the Wireless Sensor Networks

    Strong cryptographic schemes are used for securing the Wireless Sensor Networks (WSNs). Even if a strong cipher is used for encryption/ decryption of messages in any form of WSN communication, if the key is compromised and it no longer remains secret, the security of the underlying network is compromised. Therefore,...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Jul 2012

    Interoperability Between IPv4 and IPv6 Clients and Servers

    Most applications today support IPv4 and thus there is a need to run these applications on IPv6 access network. IPv4 can't meet the rising needs of the present internet. Moreover, IPv6 can solve the problems that IPv4 faced, and present more new features. The Internet must make the transition from...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Jul 2011

    Global Mobility: The Key Enabler for Next Generation Networks (NGN)

    Global Mobility is one of the invigorating issue for Next Generation Networks (NGNs). To facilitate user roaming over NGNs, there must be an effective and efficient Global Mobility Management mechanism, so that the mobile connection with its current serving network is handoff to its target network to maintain service continuity...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Jul 2012

    Intelligent Senses in Robot Based on Neural Networks

    This paper describes a model and an implementation of spiking neurons for embedded microcontrollers with few bytes of memory and very low power consumption. The proposed model consists of an elementary neuron network that used Hebbian Learning to train a robot to respond to the environment implementing Artificial Intelligence (AI)...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Jul 2012

    An Efficient Route Discovery in Manets With Improved Route Lifetime

    Mobile Ad hoc Networks consist of mobile nodes with limited battery power. The critical issue for routing in mobile ad hoc network is how to select a stable path with longer lifetime since mobility and power drain of a node causes frequent path failure. This path failure causes frequent route...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Jul 2012

    Reference Point Based Evolutionary Approach for Workflow Grid Scheduling

    Grid computing facilitates the users to consume the services over the network. In order to optimize the workflow execution, multi-objective scheduling algorithm is required. In this paper, the authors considered two conflicting objectives of execution time (makespan) and total cost. They propose a scheduling algorithm, using Reference Point Based multi-objective...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Jul 2012

    Self-Protected Mobile Agent Approach for Distributed Intrusion Detection System Against DDoS Attacks

    With the growing Information Systems and Network technologies, security threats over the systems have also become common. Providing a security mechanism to detect such threats has become an inevitable part of Information Systems. Distributed Denial of Service (DDoS) attack is one of the most common attacks which are done in...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Jul 2012

    MotoSafe: Active Safe System for Digital Forensics of Motorcycle Rider With Android

    Motorcycle accident rates have increased significantly year by year throughout the world. In this paper, the authors would like to introduce a motorcycle active safety system that can detect high risk riding states and decrease accident rates. As Smartphone nowadays becomes a popular communication tools in society, the people use...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Jul 2012

    Design of Master Data Acquisition Module for Data Acquisition and Telemetry Operations

    The paper describes design of master data acquisition module which is used for analog data acquisition from various sensors in satellite subsystems and also performs generation of different tele-commands for telemetry operation. Data Acquisition plays an important role in monitoring the health parameters of the satellite. The embedded software was...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Jul 2012

    Design and Optimization of Band Pass Filter for Software Defined Radio Telescope

    Stars, galaxies, quasars, and other astronomical objects are all cosmic radio sources. Radio telescope is used to study these cosmic signals. Software Defined Radio Telescope is a low cost telescope and could be used for educational purposes. It consists of a radio antenna and a sensitive radiometer or radio receiver....

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Jan 2015

    Cloud Computing Services and Applications to Improve Productivity of University Researchers

    One of the fundamental issues facing research universities is to raise productivity of their research community. A thorough study of the literature reveals that there are many articles on productivity, however, there are only a small number of them are relate to productivity issues affecting researchers in universities. In this...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Sep 2014

    Decision Fusion Under a Dynamic Wireless Sensor Network Over Noncoherent Multi-Access Channels

    In order to solve the decision fusion issue under a dynamic Wireless Sensor Network (WSN) based on non-coherent multi-access channels, a decision fusion rule based on the quadrature components of the information received by fusion center is proposed. It is assumed that the distribution of fading channels submits a Rayleigh...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Sep 2014

    Blind Equalization Using Correntropy Algorithm for Wireless Sensor Networks

    Wireless links in indoor sensor networks have distortions due to multipath fading from reflections and impulsive noise from indoor electric devices. In these harsh environments, blind correntropy equalization algorithm yields superior MSE performance compared with the constant modulus algorithm. However the correntropy algorithm has a heavy computational complexity, which is...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Nov 2014

    Performance Enhancement of AODV Routing Protocol in Wireless Mesh Networks

    Performance of routing protocols mainly depends on efficient channel path establishment, route optimization and control overhead. Route optimization plays a pivotal role in \"Self-healing\" and \"Self-configuring\" Wireless Mesh Networks (WMN). State-of-the art routing protocols rely on IEEE 802.11 MAC and TCP congestion control mechanisms to optimize the performance of routing...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Jul 2014

    Large Wireless Ad Hoc Network Clustering with End-to-End QoS Constraints Using Multiobjective Particle Swarm Optimization

    To scale for large ad hoc networks containing hundreds or even thousands of subnets, the networks must be hierarchically organized by partitioning them into clusters or domains. Many researchers have proposed partitioning of large networks into clusters, but this requires specifying cluster size bound. Graph Partitioning (GP) algorithms search for...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Mar 2014

    Experimental Investigation of Reed-Solomon Error Correction Technique for Wireless Sensor Network

    In this paper, the authors propose a Reed-Solomon (RS) error correction code with an error correction capability of 32 bytes for IEEE 802.15.4 Wireless Sensor Network (WSN). This code is chosen based on their experimental investigation and the analysis of error pattern, which revealed that although there are as much...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Mar 2014

    Complexity Analysis of Iterative Decoders in Mobile Communication Systems

    Turbo Convolutional Codes (TCC) and Low Density Parity Check (LDPC) codes, based on iterative decoders, are widely used to reduce bit error rate in mobile communication systems. The key implementation issue for these codes is the overall higher decoding complexity. Modified turbo codes are low complexity turbo-like codes with error...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Jan 2014

    Novel Planar Antenna for Long Term Evolution (LTE)

    The demand for multi band antenna is increasing rapidly. This is due to accelerated growth in mobile communications globally. Systems like LTE are multiband systems utilizing variety of frequency bands thereby increasing capacity and allow for addition of much functionality. In such multiband systems, a multiband antenna is definitely one...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Nov 2014

    On the Secure Outage Performance for Dual-Hop Network Coding Systems with Cooperative Jamming

    In this paper, a design of cooperative Network Coding (NC) and Jammer Relay (JR) is proposed for this two-way network in order to improve the security of the date exchange. Considering the system over Rayleigh fading channels in the presence of one eavesdropper and two relays, the authors study secrecy...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Jul 2014

    Decomposition of Classes on the Stability of Software Architecture

    Object-Oriented Programming (OOP) to support software maintenance and reuse by introducing concepts like abstraction, encapsulation, aggregation, inheritance and polymorphism. However, years of experience have revealed that this support is not enough. It has been explored if stability of software is related to the decomposing the class object are related to...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // May 2013

    Prediction of Software Project Effort Using Linear Regression Model

    Software development effort estimation is a branch of forecasting that has received increased interest in academia, application domains and media. Efficient development of software requires accurate estimates. Unfortunately, software development effort estimates are notorious for being too optimistic. Inaccurate software estimates causes trouble in business processes related to software development...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Jul 2012

    Risk Factors Assessment for Software Development Project Based on Fuzzy Decision Making

    In this paper, the authors investigate and identify the assessment factors in software development project risk through literature reviews. Based on the identified assessment factors, a hierarchical structure of five dimensions and twenty-two factors is constructed, and two systematic approaches, Fuzzy Multiple Criteria Decision Making (FMCDM) and Consistent Fuzzy Preference...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Sep 2012

    Interaction Model for Emotive Video Production

    Video images are capable of expressing various kinds of information; however special knowledge and techniques are required for authoring quality video content. In order to represent impressions, proper camerawork is required for delivering understandable content. However, amateur users often have difficulties in shooting images which appropriately reflect their expressive intentions....

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Sep 2012

    Efficient and Semantic OLAP Aggregation Queries in a Peer to Peer Network

    This paper presents TrackerCache system - a Peer To Peer (P2P) system for efficient serving OLAP queries and aggregation of data cubes in distributed data sharing system. TrackerCache system provides a central component called tracker, which acts as a directory, keeping track of all submitted queries and a list of...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Sep 2012

    Research Issues in Wireless Sensor Network Applications: A Survey

    Wireless Sensor Networks (WSN) are used in variety of fields which includes military, healthcare, environmental, biological, home and other commercial applications. With the huge advancement in the field of embedded computer and sensor technology, Wireless Sensor Networks (WSN), which is composed of several thousands of sensor nodes which are capable...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Sep 2012

    Reliability Modeling of Context Aware Wireless Sensor Network

    This paper is to propose a reliability model for a fault tolerant wireless sensor network using context awareness feature in order to evaluate network reliability by modeling in PI Calculus. The earlier Propositional Directed Acyclic Graph (PDAG) approach leads to an identification of a suitable structure function in polynomial time...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Sep 2012

    Maputo Bay Wireless Network Cost Analysis

    The objective of this paper is to analyze the cost of building wireless networks in the context of Network Engineering (NE). Cost analysis is important in planning and design phases in network lifecycles, especially for developing countries. The Techno-Economic Analysis presented in this paper is based on the project for...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Sep 2012

    An Empirical and Architectural Study of Using an SSD-Aware Hybrid Storage System to Improve the Performance of the Data Intensive Applications

    Processors speed have increased in a steady pace year over year, storage system performance is still the major bottleneck for most computer systems including high performance computers. Many attentions have been given to optimize the storage system speed using various approaches such as caching, intelligent perfecting and scheduling techniques, nevertheless,...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Sep 2012

    Energy Optimization Through Position Responsive Routing Protocol (PRRP) in Wireless Sensor Network

    Wireless Sensor Networks (WSNs) are consist of very tiny nodes structure, with very small batteries without having facility to recharge it. It works under any hard circumstances, hence this type of network is gaining high importance day by day. Maximum focus of researchers is to enhance or optimized its energy...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Sep 2012

    Downlink SNR to CQI Mapping for Different Multiple Antenna Techniques in LTE

    Long Term Evolution (LTE) is a step towards the 4th Generation (4G) of radio technologies designed to increase the capacity and speed of mobile wireless access. In Release 8, LTE was standardized by 3GPP as the successor of the Universal Mobile Telecommunication System (UMTS).Before full commercial deployment of LTE, downlink...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Sep 2012

    Implementation of Multiplayer Bluetooth Memory Game for Mobile Phones

    With time and technology, mobiles have been revolutionized from a communicating device to something which can be used for computing, entertainment as well as communication. Entertainment is perhaps the field which attracts most of the customers to a particular model. Hence these days, the various mobile developers are releasing phones...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Sep 2012

    Implementation Issues for Developing Credit Card Software for Mobile Phones

    Money Transaction has become common, frequent and a necessity in the current living and carrying cash always with a person is not a practical solution. The current trend of carrying the credit cards have become a crucial part of life and carrying of multiple cards is common nowadays. There is...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Sep 2012

    On the Feasibility of Key Compromise Impersonation Attacks Against the Elliptic Curve Version of the MTI/C0 Key Agreement Protocol

    In this paper, the authors point out that the protocol proposed by the aforementioned authors is in fact the elliptic curve version of the MTI/C0 family of key agreement protocols which suffer from a well-known vulnerability against a particular type of key-compromise impersonation attack. Since the Diffie-Hellman (DH) key exchange...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Sep 2012

    Applying Data Analytics to Development of the Web- Based Information Security Career Systems

    This paper proposes a case to build a Web-based Information/Cyber Security (ICS) career system for smart education using Web data analytical technology. The proposed system will automatically monitor and extract the new ICS job openings as well as the specific knowledge, skills, certificates or degrees required for the job openings...

    Provided By International Journal of Information and Electronics Engineering

  • White Papers // Sep 2012

    A Success Model for Business Process Management Implementation

    Business Process Management (BPM) is currently being seen as the best way to facilitate process improvements. Since this concept is mainly a multidisciplinary subject, success in implementing requires considering various factors. In this paper, first seven success factors were explored through qualitative meta-synthesis based on previous studies; then a success...

    Provided By International Journal of Information and Electronics Engineering