K.N.Toosi University of Technology

Displaying 1-8 of 8 results

  • White Papers // Nov 2012

    Cloud ERP: Implementation of Enterprise Resource Planning Using Cloud Computing Technology

    Enterprise Resource Planning (ERP) is used more than a decade; however, the continuing efforts to promote this technology have been carried out. With introducing Cloud Computing technology, a wide variety of service can be implemented on Internet, which has a profound effect on the application of information systems and Internet....

    Provided By K.N.Toosi University of Technology

  • White Papers // Nov 2011

    Security of Multiple-Key Agreement Protocols and Propose an Enhanced Protocol

    Multiple key agreement protocols produce several session keys instead of one session key. Most of the multiple key agreement protocols do not utilize the hash functions in the signature schemes used for identification. Not using hash function in these protocols causes that the protocols do not satisfy some requirement security...

    Provided By K.N.Toosi University of Technology

  • White Papers // Sep 2011

    Filter-and-Forward Relay Beamforming in Cognitive Two-Way Relay Networks

    In this paper, a novel approach to filter-and-forward relay beam-forming in an underlay based cognitive two-way relay network with frequency selective channels is proposed. In the authors' scheme, two secondary transceivers communicate which other through multiple relays simultaneously with the primary network transmission over same spectrum. Such a network suffers...

    Provided By K.N.Toosi University of Technology

  • White Papers // Mar 2011

    Distributed Resource Allocation for Downlink Multicell OFDMA Systems

    This paper addresses resource allocation for sum throughput maximization in a sectorized two-cell downlink OFDMA systems impaired by multicell interference. It is well known that the optimization problem for this scenario is NPhard and combinational, which is here converted to a novel sum throughput maximization problem based on the intercell...

    Provided By K.N.Toosi University of Technology

  • White Papers // Mar 2011

    A Comparison of Link Layer Attacks on Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) have many potential applications and unique challenges. They usually consist of hundreds or thousands small sensor nodes such as MICA2, which operate autonomously; conditions such as cost, invisible deployment and many application domains, lead to small size and limited resources sensors. WSNs are susceptible to many...

    Provided By K.N.Toosi University of Technology

  • White Papers // Jun 2009

    Energy Efficiency of Adaptive-Rate Medium Access Control Protocols for Sensor Networks

    Energy efficient protocol design is the aim of current researches in the area of sensor networks where limited power resources impose energy conservation considerations. In this paper the authors care for Medium Access Control (MAC) protocols and after an extensive literature review, two adaptive schemes are discussed. Of them, adaptive-rate...

    Provided By K.N.Toosi University of Technology

  • White Papers // Jun 2009

    Optimal Power Allocation to Diversity Branches of Cooperative MISO Sensor Networks

    In the context of sensor networks, where every few dB saving counts, the novel node cooperation schemes are reviewed where MIMO techniques play a leading role. These methods could be treated as joint approach for designing physical layer of their communication scenarios. Then the authors analyzed the BER performance of...

    Provided By K.N.Toosi University of Technology

  • White Papers // Jan 2009

    Challenges of User Involvement in Extreme Programming Projects

    EXtreme Programming (XP) is one of the most frequently used methodologies in Agile Software Development. According to various reports it had a significant effect on the software projects that use XP. In this paper, one of the main practices of XP, called "On-site customer" is considered, in detail. Also, various...

    Provided By K.N.Toosi University of Technology

  • White Papers // Sep 2011

    Filter-and-Forward Relay Beamforming in Cognitive Two-Way Relay Networks

    In this paper, a novel approach to filter-and-forward relay beam-forming in an underlay based cognitive two-way relay network with frequency selective channels is proposed. In the authors' scheme, two secondary transceivers communicate which other through multiple relays simultaneously with the primary network transmission over same spectrum. Such a network suffers...

    Provided By K.N.Toosi University of Technology

  • White Papers // Nov 2012

    Cloud ERP: Implementation of Enterprise Resource Planning Using Cloud Computing Technology

    Enterprise Resource Planning (ERP) is used more than a decade; however, the continuing efforts to promote this technology have been carried out. With introducing Cloud Computing technology, a wide variety of service can be implemented on Internet, which has a profound effect on the application of information systems and Internet....

    Provided By K.N.Toosi University of Technology

  • White Papers // Mar 2011

    A Comparison of Link Layer Attacks on Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) have many potential applications and unique challenges. They usually consist of hundreds or thousands small sensor nodes such as MICA2, which operate autonomously; conditions such as cost, invisible deployment and many application domains, lead to small size and limited resources sensors. WSNs are susceptible to many...

    Provided By K.N.Toosi University of Technology

  • White Papers // Jun 2009

    Energy Efficiency of Adaptive-Rate Medium Access Control Protocols for Sensor Networks

    Energy efficient protocol design is the aim of current researches in the area of sensor networks where limited power resources impose energy conservation considerations. In this paper the authors care for Medium Access Control (MAC) protocols and after an extensive literature review, two adaptive schemes are discussed. Of them, adaptive-rate...

    Provided By K.N.Toosi University of Technology

  • White Papers // Jun 2009

    Optimal Power Allocation to Diversity Branches of Cooperative MISO Sensor Networks

    In the context of sensor networks, where every few dB saving counts, the novel node cooperation schemes are reviewed where MIMO techniques play a leading role. These methods could be treated as joint approach for designing physical layer of their communication scenarios. Then the authors analyzed the BER performance of...

    Provided By K.N.Toosi University of Technology

  • White Papers // Jan 2009

    Challenges of User Involvement in Extreme Programming Projects

    EXtreme Programming (XP) is one of the most frequently used methodologies in Agile Software Development. According to various reports it had a significant effect on the software projects that use XP. In this paper, one of the main practices of XP, called "On-site customer" is considered, in detail. Also, various...

    Provided By K.N.Toosi University of Technology

  • White Papers // Mar 2011

    Distributed Resource Allocation for Downlink Multicell OFDMA Systems

    This paper addresses resource allocation for sum throughput maximization in a sectorized two-cell downlink OFDMA systems impaired by multicell interference. It is well known that the optimization problem for this scenario is NPhard and combinational, which is here converted to a novel sum throughput maximization problem based on the intercell...

    Provided By K.N.Toosi University of Technology

  • White Papers // Nov 2011

    Security of Multiple-Key Agreement Protocols and Propose an Enhanced Protocol

    Multiple key agreement protocols produce several session keys instead of one session key. Most of the multiple key agreement protocols do not utilize the hash functions in the signature schemes used for identification. Not using hash function in these protocols causes that the protocols do not satisfy some requirement security...

    Provided By K.N.Toosi University of Technology