Kingston University

Displaying 1-22 of 22 results

  • White Papers // Nov 2011

    Performance Evaluation of Secure Video Transmission Over WIMAX

    WiMAX is a wireless digital communication system based on the IEEE 802.16 standard which provides broadband wireless Internet access at very high rates that is up to 70 Mbps or a data rate of about 3 Mbps within a radius of 30-mile (data rate increases as the distance decreases). With...

    Provided By Kingston University

  • White Papers // Jun 2011

    Non-Cooperative Games Between Legitimate Nodes and Malicious Coalitions in MANETs

    Security for Mobile Ad hoc NETworks (MANETs) is a critical and thoroughly examined scientific area that has attracted the interest of many researchers. Many countermeasures against compromised or selfish nodes consider Intrusion Detection Systems (IDS). In this paper, the authors use game theory to model non-cooperative security games between a...

    Provided By Kingston University

  • White Papers // Mar 2011

    Peripheral Europe's Debt And German Wages. The Role Of Wage Policy In The Euro Area

    The paper argues that the Greek debt crisis, as well as those of other Southern European countries and Ireland, has to be seen in macroeconomic context. The sum of the public sector balance, the (domestic) private sector balance and the current account deficit (or equivalently: the capital inflows) has to...

    Provided By Kingston University

  • White Papers // Feb 2011

    ROBUST: Reliable Overlay Based Utilisation of Services and Topology for Emergency MANETs

    Emergency services and networks are an emerging area of scientific research. During an emergency scenario such as forest fires, earthquakes, tsunamis and terrorist attacks rescuers need to establish communication to coordinate their actions by using smart and lightweight mobile devices. To this end, autonomous networks should be utilised to support...

    Provided By Kingston University

  • White Papers // Nov 2010

    Secure Routing for Supporting Ad-Hoc Extreme Emergency Infrastructures

    The importance of emergency services has lead to an indispensable need for lightweight technologies that will support emergency rescue missions. Due to their nature and the non-infrastructure characteristics Mobile Ad-hoc NETworks (MANETs) are characterised as autonomous networks that have the potential to be exploited when wireless communications should be established...

    Provided By Kingston University

  • White Papers // Oct 2010

    A Testbed Implementation for Securing OLSR in Mobile Ad Hoc Networks

    Contemporary personal computing devices are increasingly required to be portable and mobile enabling user's wireless access, to wired network infrastructures and services. This approach to mobile computing and communication is only appropriate in situations where a coherent infrastructure is available. There are many situations where these requirements are not fulfilled...

    Provided By Kingston University

  • White Papers // Oct 2010

    A Test-Bed Implementation for Securing OLSR in Mobile Ad-Hoc Networks

    Contemporary personal computing devices are increasingly required to be portable and mobile enabling user's wireless access, to wired network infrastructures and services. This approach to mobile computing and communication is only appropriate in situations where a coherent infrastructure is available. There are many situations where these requirements are not fulfilled...

    Provided By Kingston University

  • White Papers // Aug 2010

    Time, Process And Discourse In Business Network Research

    Different conceptions of time are reviewed in this paper and, in particular, distinctions between objectivist and subjectivist approaches are compared. Current explorations of time within the IMP are identified along an objectivist-subjectivist continuum as tending towards location towards a more objectivist orientation. Consequences of IMP researchers adopting more subjectivist, 'Post...

    Provided By Kingston University

  • White Papers // Jul 2010

    Winning In The Long Run? A Quantified Approach To The Drivers Of Sustainable Financial Value On Real Estate

    This working paper describes the first empirical study measuring the impact of sustainability characteristics on the financial performance of European office and retail properties. The authors present the project, the issue and the approach of their ongoing search for a 'Green Alpha'. In a joint effort, university experts at Danube...

    Provided By Kingston University

  • White Papers // Jun 2010

    Neoliberalism, Income Distribution And The Causes Of The Crisis

    The financial crisis that began in summer 2007 has since turned into the worst economic crisis since the Great Depression. Its immediate causes are to be found in the malfunctioning of the financial sector: securitization of mortgages allowed for a fast growth of credit and lowered credit standards as banks...

    Provided By Kingston University

  • White Papers // Jun 2010

    Flexible Macroblock Ordering for Context-Aware Ultrasound Video Transmission Over Mobile WiMAX

    The most recent network technologies are enabling a variety of new applications, thanks to the provision of in-creased bandwidth and better management of Quality of Service. Nevertheless, telemedical services involving multimedia data are still lacking behind, due to the concern of the end users, i.e. clinicians and also patients, about...

    Provided By Kingston University

  • White Papers // May 2010

    Secure Techniques to Support Cognitive Access in Spectrum Bands

    Cognitive Radio (CR) is a promising technology for efficient spectrum utilisation in the future wireless communication systems. The main idea behind the use of CR is to achieve greater utilisation of the spectrum by allowing license-exempt users to coexist with the incumbent licensed primary users provided that they do not...

    Provided By Kingston University

  • White Papers // May 2010

    Adaptive and Secure Routing Protocol for Emergency Mobile Ad Hoc Networks

    The nature of Mobile Ad hoc NETworks (MANETs) makes them suitable to be utilized in the context of an extreme emergency for all involved rescue teams. The authors use the term emergency MANETs (eMANETs) in order to describe next generation IP-based networks, which are deployed in emergency cases such as...

    Provided By Kingston University

  • White Papers // May 2010

    Adaptive and Secure Routing Protocol for Emergency Mobile and AD Hoc Networks

    The nature of Mobile Ad hoc NETworks (MANETs) makes them suitable to be utilized in the context of an extreme emergency for all involved rescue teams. Authors use the term emergency MANETs (eMANETs) in order to describe next generation IP-based networks, which are deployed in emergency cases such as forest...

    Provided By Kingston University

  • White Papers // Apr 2010

    Cross-Layer Content/Channel Aware Multi-User Scheduling for Downlink Wireless Video Streaming

    A new cross-layer content/channel-aware downlink scheduling algorithm for wireless video streaming is presented. A novel mathematical model has been developed for the performance analysis of the proposed scheduling algorithm. Using novel content-aware and standard performance metrics, the performance of the scheduling algorithm is evaluated and optimized. The results show that...

    Provided By Kingston University

  • White Papers // Apr 2010

    Cross-Layer Frame Synchronization for H.264 Video OverWIMAX

    In the WIMAX (802.16e) standard several small Medium Access Control (MAC) packets may be aggregated to form a MAC burst, forwarded to the PHYsical (PHY) layer The burst transmission is a mechanism to allow multiple MAC Protocol Data Units (PDUs) belonging to the same video channel to be transmitted/received in...

    Provided By Kingston University

  • White Papers // Jan 2010

    Utilization of Advanced Data Storage Technology to Conduct Construction Industry on Clear Environment

    The total amount of waste and carbon dioxide emissions from transportation vehicles are still out of control due to increasing construction projects, massive urban development projects and the lack of effective tools for minimizing adverse environmental impacts in construction. This research is about utilization of the integrated applications of automated...

    Provided By Kingston University

  • White Papers // Nov 2009

    Have UK Small Enterprises Been Victims of the 'Credit Crunch'?

    The purpose of the paper has been to consider whether, and to what extent, UK SMEs have been victims of the 'Credit crunch'. The 2008/9 UK recession has been reported as the worst since the 1930s, involving the near-collapse of the banking system. It might be expected, therefore, that a...

    Provided By Kingston University

  • White Papers // Oct 2009

    A Game Theoretic Approach for Securing AODV in Emergency Mobile Ad Hoc Networks

    In many extreme emergency cases such as forest fires or tube terrorist attacks, the rescuers have difficulty using traditional legacy networks due to destruction or collapse of the infrastructure in such events. The authors use the term emergency Mobile Ad hoc NETworks (eMANETs) in order to describe Next Generation Networks...

    Provided By Kingston University

  • White Papers // Oct 2009

    Spectrum Allocation for Cognitive Radio Use

    One of the most regulated and scarce natural resources of all time is radio spectrum. Access to it has been chronically bounded ever since RF transmissions were first regulated in the early 20th century. There are several efforts to reduce interference with the most important and effective the allocation of...

    Provided By Kingston University

  • White Papers // Apr 2009

    Optimum Metric for Frame Synchronization With Gaussian Noise and Unequally Distributed Data Symbols

    The problem of frame synchronization with equiprobable data symbols is widely analyzed in the literature and the optimum metric for AWGN channels has been derived both in the case of periodically and aperiodically embedded data symbols. On the contrary, the case of non-equiprobable data symbols has not been studied, although...

    Provided By Kingston University

  • White Papers // Apr 2009

    Power Control Using Game Theory in a Shared Open Spectrum

    The main problem of the today's IEEE 802.11 WLANs is the small number of available channels. In this paper, the authors focus on a novel way of maximization of the network throughput and the provision of fairness which are key challenges in IEEE WLANs, using Game Theory. They examine two...

    Provided By Kingston University

  • White Papers // Jun 2010

    Flexible Macroblock Ordering for Context-Aware Ultrasound Video Transmission Over Mobile WiMAX

    The most recent network technologies are enabling a variety of new applications, thanks to the provision of in-creased bandwidth and better management of Quality of Service. Nevertheless, telemedical services involving multimedia data are still lacking behind, due to the concern of the end users, i.e. clinicians and also patients, about...

    Provided By Kingston University

  • White Papers // Apr 2009

    Optimum Metric for Frame Synchronization With Gaussian Noise and Unequally Distributed Data Symbols

    The problem of frame synchronization with equiprobable data symbols is widely analyzed in the literature and the optimum metric for AWGN channels has been derived both in the case of periodically and aperiodically embedded data symbols. On the contrary, the case of non-equiprobable data symbols has not been studied, although...

    Provided By Kingston University

  • White Papers // Apr 2010

    Cross-Layer Content/Channel Aware Multi-User Scheduling for Downlink Wireless Video Streaming

    A new cross-layer content/channel-aware downlink scheduling algorithm for wireless video streaming is presented. A novel mathematical model has been developed for the performance analysis of the proposed scheduling algorithm. Using novel content-aware and standard performance metrics, the performance of the scheduling algorithm is evaluated and optimized. The results show that...

    Provided By Kingston University

  • White Papers // Apr 2010

    Cross-Layer Frame Synchronization for H.264 Video OverWIMAX

    In the WIMAX (802.16e) standard several small Medium Access Control (MAC) packets may be aggregated to form a MAC burst, forwarded to the PHYsical (PHY) layer The burst transmission is a mechanism to allow multiple MAC Protocol Data Units (PDUs) belonging to the same video channel to be transmitted/received in...

    Provided By Kingston University

  • White Papers // Jun 2011

    Non-Cooperative Games Between Legitimate Nodes and Malicious Coalitions in MANETs

    Security for Mobile Ad hoc NETworks (MANETs) is a critical and thoroughly examined scientific area that has attracted the interest of many researchers. Many countermeasures against compromised or selfish nodes consider Intrusion Detection Systems (IDS). In this paper, the authors use game theory to model non-cooperative security games between a...

    Provided By Kingston University

  • White Papers // May 2010

    Secure Techniques to Support Cognitive Access in Spectrum Bands

    Cognitive Radio (CR) is a promising technology for efficient spectrum utilisation in the future wireless communication systems. The main idea behind the use of CR is to achieve greater utilisation of the spectrum by allowing license-exempt users to coexist with the incumbent licensed primary users provided that they do not...

    Provided By Kingston University

  • White Papers // Feb 2011

    ROBUST: Reliable Overlay Based Utilisation of Services and Topology for Emergency MANETs

    Emergency services and networks are an emerging area of scientific research. During an emergency scenario such as forest fires, earthquakes, tsunamis and terrorist attacks rescuers need to establish communication to coordinate their actions by using smart and lightweight mobile devices. To this end, autonomous networks should be utilised to support...

    Provided By Kingston University

  • White Papers // Nov 2010

    Secure Routing for Supporting Ad-Hoc Extreme Emergency Infrastructures

    The importance of emergency services has lead to an indispensable need for lightweight technologies that will support emergency rescue missions. Due to their nature and the non-infrastructure characteristics Mobile Ad-hoc NETworks (MANETs) are characterised as autonomous networks that have the potential to be exploited when wireless communications should be established...

    Provided By Kingston University

  • White Papers // Oct 2009

    A Game Theoretic Approach for Securing AODV in Emergency Mobile Ad Hoc Networks

    In many extreme emergency cases such as forest fires or tube terrorist attacks, the rescuers have difficulty using traditional legacy networks due to destruction or collapse of the infrastructure in such events. The authors use the term emergency Mobile Ad hoc NETworks (eMANETs) in order to describe Next Generation Networks...

    Provided By Kingston University

  • White Papers // Oct 2009

    Spectrum Allocation for Cognitive Radio Use

    One of the most regulated and scarce natural resources of all time is radio spectrum. Access to it has been chronically bounded ever since RF transmissions were first regulated in the early 20th century. There are several efforts to reduce interference with the most important and effective the allocation of...

    Provided By Kingston University

  • White Papers // Nov 2011

    Performance Evaluation of Secure Video Transmission Over WIMAX

    WiMAX is a wireless digital communication system based on the IEEE 802.16 standard which provides broadband wireless Internet access at very high rates that is up to 70 Mbps or a data rate of about 3 Mbps within a radius of 30-mile (data rate increases as the distance decreases). With...

    Provided By Kingston University

  • White Papers // Apr 2009

    Power Control Using Game Theory in a Shared Open Spectrum

    The main problem of the today's IEEE 802.11 WLANs is the small number of available channels. In this paper, the authors focus on a novel way of maximization of the network throughput and the provision of fairness which are key challenges in IEEE WLANs, using Game Theory. They examine two...

    Provided By Kingston University

  • White Papers // Oct 2010

    A Testbed Implementation for Securing OLSR in Mobile Ad Hoc Networks

    Contemporary personal computing devices are increasingly required to be portable and mobile enabling user's wireless access, to wired network infrastructures and services. This approach to mobile computing and communication is only appropriate in situations where a coherent infrastructure is available. There are many situations where these requirements are not fulfilled...

    Provided By Kingston University

  • White Papers // May 2010

    Adaptive and Secure Routing Protocol for Emergency Mobile Ad Hoc Networks

    The nature of Mobile Ad hoc NETworks (MANETs) makes them suitable to be utilized in the context of an extreme emergency for all involved rescue teams. The authors use the term emergency MANETs (eMANETs) in order to describe next generation IP-based networks, which are deployed in emergency cases such as...

    Provided By Kingston University

  • White Papers // May 2010

    Adaptive and Secure Routing Protocol for Emergency Mobile and AD Hoc Networks

    The nature of Mobile Ad hoc NETworks (MANETs) makes them suitable to be utilized in the context of an extreme emergency for all involved rescue teams. Authors use the term emergency MANETs (eMANETs) in order to describe next generation IP-based networks, which are deployed in emergency cases such as forest...

    Provided By Kingston University

  • White Papers // Jan 2010

    Utilization of Advanced Data Storage Technology to Conduct Construction Industry on Clear Environment

    The total amount of waste and carbon dioxide emissions from transportation vehicles are still out of control due to increasing construction projects, massive urban development projects and the lack of effective tools for minimizing adverse environmental impacts in construction. This research is about utilization of the integrated applications of automated...

    Provided By Kingston University

  • White Papers // Oct 2010

    A Test-Bed Implementation for Securing OLSR in Mobile Ad-Hoc Networks

    Contemporary personal computing devices are increasingly required to be portable and mobile enabling user's wireless access, to wired network infrastructures and services. This approach to mobile computing and communication is only appropriate in situations where a coherent infrastructure is available. There are many situations where these requirements are not fulfilled...

    Provided By Kingston University

  • White Papers // Aug 2010

    Time, Process And Discourse In Business Network Research

    Different conceptions of time are reviewed in this paper and, in particular, distinctions between objectivist and subjectivist approaches are compared. Current explorations of time within the IMP are identified along an objectivist-subjectivist continuum as tending towards location towards a more objectivist orientation. Consequences of IMP researchers adopting more subjectivist, 'Post...

    Provided By Kingston University

  • White Papers // Jun 2010

    Neoliberalism, Income Distribution And The Causes Of The Crisis

    The financial crisis that began in summer 2007 has since turned into the worst economic crisis since the Great Depression. Its immediate causes are to be found in the malfunctioning of the financial sector: securitization of mortgages allowed for a fast growth of credit and lowered credit standards as banks...

    Provided By Kingston University

  • White Papers // Mar 2011

    Peripheral Europe's Debt And German Wages. The Role Of Wage Policy In The Euro Area

    The paper argues that the Greek debt crisis, as well as those of other Southern European countries and Ireland, has to be seen in macroeconomic context. The sum of the public sector balance, the (domestic) private sector balance and the current account deficit (or equivalently: the capital inflows) has to...

    Provided By Kingston University

  • White Papers // Nov 2009

    Have UK Small Enterprises Been Victims of the 'Credit Crunch'?

    The purpose of the paper has been to consider whether, and to what extent, UK SMEs have been victims of the 'Credit crunch'. The 2008/9 UK recession has been reported as the worst since the 1930s, involving the near-collapse of the banking system. It might be expected, therefore, that a...

    Provided By Kingston University

  • White Papers // Jul 2010

    Winning In The Long Run? A Quantified Approach To The Drivers Of Sustainable Financial Value On Real Estate

    This working paper describes the first empirical study measuring the impact of sustainability characteristics on the financial performance of European office and retail properties. The authors present the project, the issue and the approach of their ongoing search for a 'Green Alpha'. In a joint effort, university experts at Danube...

    Provided By Kingston University