Islamic University of Technology

Displaying 1-12 of 12 results

  • White Papers // Sep 2012

    Publishing Knowledge and Transformation of Conventional Web into Semantic Web using Metadata

    In Semantic Web research, most of the work has focused around the OWL ontology, natural language processing, word sense disambiguation and semantic matching. Few efforts have been made to provide a publishing methodology for metadata-rich Web content for end users. This paper encompasses all possible aspects of publishing pure digital...

    Provided By Islamic University of Technology

  • White Papers // Sep 2012

    Cross-layer Designs: a Survey

    Computer communication has been going through major changes throughout the last decades. While wireless technologies have been widely adopted, various domains and implementations like Wireless Sensor Networks (WSN), Mobile Ad-hoc NETworks (MANETs), wireless mesh networks have emerged. Since TCP/IP was a protocol designed for wired networks, wireless transmission poses unique...

    Provided By Islamic University of Technology

  • White Papers // May 2012

    Coverage and Capacity Analysis of LTE Radio Network Planning considering Dhaka City

    Long Term Evolution (LTE) is the latest and most enhanced Broadband Wireless Access (BWA) technology. LTE is the latest standard in the mobile network technology tree that previously realized the GSM/EDGE and UMTS/HSxPA technologies. LTE is expected to ensure 3GPP's competitive edge over other cellular technologies. The standardization process of...

    Provided By Islamic University of Technology

  • White Papers // Nov 2011

    Phishing Attack Protection (PAP) Approaches for Fairness in Web Usage

    Phishing scams are considered as a threat issue to all web users. But still the web users are not consciously aware of this fact. Many research works have been done to increase the phishing awareness among the users but it is not up to the mark till to date. The...

    Provided By Islamic University of Technology

  • White Papers // Oct 2010

    Limiting HARQ Retransmissions in Downlink for Poor Radio Link in LTE

    HARQ is a stop and wait protocol supporting soft combination of retransmitted data which is used for facilitating fast error detection and correction. In Long Term Evolution (LTE), HARQ is implemented by MAC level module called HARQ entity. The justification of HARQ retransmissions lies in recovering data correctly, though they...

    Provided By Islamic University of Technology

  • White Papers // Aug 2010

    A Degraded Practical MIMOME Channel: Issues in Secret Data Communications

    In this paper, a Gaussian Multiple Input Multiple Output Multiple Eavesdropper (MIMOME) channel is considered where a transmitter communicates to a receiver in the presence of an eavesdropper. The authors present a technique for determining the secrecy capacity of the Multiple Input Multiple Output (MIMO) channel under Gaussian noise. They...

    Provided By Islamic University of Technology

  • White Papers // Feb 2010

    An Optimized Method for Scheduling Process of Scanning for Handover in Mobile Wimax

    IEEE 802.16e standard for 4G Cellular Technology-Mobile WiMAX is proposed to support mobility. As a result, handover has become one of the most important QoS factors. Because of lack of clarification in the conventional algorithm for handover process, there exists wastage of channel resource along with undesired delay. Again, it...

    Provided By Islamic University of Technology

  • White Papers // Jan 2010

    Towards Public Key Infrastructure Less Authentication in Session Initiation Protocol

    The Session Initiation Protocol (SIP) has become the most predominant protocol for Voice over Internet Protocol (VoIP) signaling. Security of SIP is an important consideration for VoIP communication as the traffic is transmitted over the insecure IP network. And the authentication process in SIP ranges from pre-shared secret based solutions...

    Provided By Islamic University of Technology

  • White Papers // Nov 2009

    A Common Exchange Approach Provisioning Connection of Existing SS7 With IP Based SIGTRAN Network Using CPLD Driven Device

    Now-a-days communication engineering is facing an age of explosive transformation that is both facilitating and influencing the unification of services. Compared to voice, packet data is becoming more significant proportion of traffic. It has become essential to find ways of consolidating voice, data traffic, platforms and services to reduce the...

    Provided By Islamic University of Technology

  • White Papers // Jan 2009

    Abnormal Node Detection in Wireless Sensor Network by Pair Based Approach Using IDS Secure Routing Methodology

    Mission critical wireless sensor networks require an efficient, lightweight and flexible intrusion detection methodology to identify abnormal node or malicious attackers. The proposed idea in this paper is to develop a new approach of abnormal node detection in wireless sensor network using IDS security routing methodology by dividing the network...

    Provided By Islamic University of Technology

  • White Papers // Dec 2008

    Context Repository Architecture for Smart Collaborative Environment

    Due to the advancement of technology, smart sensors and smart objects are becoming popular now-a-days. These smart sensors and objects have some computation power so that depending on the change of the environment they can take actions accordingly. Since the use of portable devices like PDA, cellular phone is increasing;...

    Provided By Islamic University of Technology

  • White Papers // Oct 2008

    Introducing Secured Node Registration and Supervised P2P File Sharing in Advanced Collaborating Environment

    A major challenge in a collaborative environment is to device an efficient file sharing and adaptation mechanism. Through this, the users at different nodes can achieve the highest degree of collaboration. Some authors have already proposed file sharing and adaptation framework. As per their proposed framework, users are allowed to...

    Provided By Islamic University of Technology

  • White Papers // Jan 2010

    Towards Public Key Infrastructure Less Authentication in Session Initiation Protocol

    The Session Initiation Protocol (SIP) has become the most predominant protocol for Voice over Internet Protocol (VoIP) signaling. Security of SIP is an important consideration for VoIP communication as the traffic is transmitted over the insecure IP network. And the authentication process in SIP ranges from pre-shared secret based solutions...

    Provided By Islamic University of Technology

  • White Papers // Dec 2008

    Context Repository Architecture for Smart Collaborative Environment

    Due to the advancement of technology, smart sensors and smart objects are becoming popular now-a-days. These smart sensors and objects have some computation power so that depending on the change of the environment they can take actions accordingly. Since the use of portable devices like PDA, cellular phone is increasing;...

    Provided By Islamic University of Technology

  • White Papers // Aug 2010

    A Degraded Practical MIMOME Channel: Issues in Secret Data Communications

    In this paper, a Gaussian Multiple Input Multiple Output Multiple Eavesdropper (MIMOME) channel is considered where a transmitter communicates to a receiver in the presence of an eavesdropper. The authors present a technique for determining the secrecy capacity of the Multiple Input Multiple Output (MIMO) channel under Gaussian noise. They...

    Provided By Islamic University of Technology

  • White Papers // Nov 2009

    A Common Exchange Approach Provisioning Connection of Existing SS7 With IP Based SIGTRAN Network Using CPLD Driven Device

    Now-a-days communication engineering is facing an age of explosive transformation that is both facilitating and influencing the unification of services. Compared to voice, packet data is becoming more significant proportion of traffic. It has become essential to find ways of consolidating voice, data traffic, platforms and services to reduce the...

    Provided By Islamic University of Technology

  • White Papers // Oct 2010

    Limiting HARQ Retransmissions in Downlink for Poor Radio Link in LTE

    HARQ is a stop and wait protocol supporting soft combination of retransmitted data which is used for facilitating fast error detection and correction. In Long Term Evolution (LTE), HARQ is implemented by MAC level module called HARQ entity. The justification of HARQ retransmissions lies in recovering data correctly, though they...

    Provided By Islamic University of Technology

  • White Papers // Feb 2010

    An Optimized Method for Scheduling Process of Scanning for Handover in Mobile Wimax

    IEEE 802.16e standard for 4G Cellular Technology-Mobile WiMAX is proposed to support mobility. As a result, handover has become one of the most important QoS factors. Because of lack of clarification in the conventional algorithm for handover process, there exists wastage of channel resource along with undesired delay. Again, it...

    Provided By Islamic University of Technology

  • White Papers // Sep 2012

    Publishing Knowledge and Transformation of Conventional Web into Semantic Web using Metadata

    In Semantic Web research, most of the work has focused around the OWL ontology, natural language processing, word sense disambiguation and semantic matching. Few efforts have been made to provide a publishing methodology for metadata-rich Web content for end users. This paper encompasses all possible aspects of publishing pure digital...

    Provided By Islamic University of Technology

  • White Papers // Sep 2012

    Cross-layer Designs: a Survey

    Computer communication has been going through major changes throughout the last decades. While wireless technologies have been widely adopted, various domains and implementations like Wireless Sensor Networks (WSN), Mobile Ad-hoc NETworks (MANETs), wireless mesh networks have emerged. Since TCP/IP was a protocol designed for wired networks, wireless transmission poses unique...

    Provided By Islamic University of Technology

  • White Papers // May 2012

    Coverage and Capacity Analysis of LTE Radio Network Planning considering Dhaka City

    Long Term Evolution (LTE) is the latest and most enhanced Broadband Wireless Access (BWA) technology. LTE is the latest standard in the mobile network technology tree that previously realized the GSM/EDGE and UMTS/HSxPA technologies. LTE is expected to ensure 3GPP's competitive edge over other cellular technologies. The standardization process of...

    Provided By Islamic University of Technology

  • White Papers // Nov 2011

    Phishing Attack Protection (PAP) Approaches for Fairness in Web Usage

    Phishing scams are considered as a threat issue to all web users. But still the web users are not consciously aware of this fact. Many research works have been done to increase the phishing awareness among the users but it is not up to the mark till to date. The...

    Provided By Islamic University of Technology

  • White Papers // Jan 2009

    Abnormal Node Detection in Wireless Sensor Network by Pair Based Approach Using IDS Secure Routing Methodology

    Mission critical wireless sensor networks require an efficient, lightweight and flexible intrusion detection methodology to identify abnormal node or malicious attackers. The proposed idea in this paper is to develop a new approach of abnormal node detection in wireless sensor network using IDS security routing methodology by dividing the network...

    Provided By Islamic University of Technology

  • White Papers // Oct 2008

    Introducing Secured Node Registration and Supervised P2P File Sharing in Advanced Collaborating Environment

    A major challenge in a collaborative environment is to device an efficient file sharing and adaptation mechanism. Through this, the users at different nodes can achieve the highest degree of collaboration. Some authors have already proposed file sharing and adaptation framework. As per their proposed framework, users are allowed to...

    Provided By Islamic University of Technology