Liverpool John Moores University

Displaying 1-40 of 100 results

  • White Papers // Jun 2013

    Mobile Devices: In-Network Anti-Malware Analysis

    Mobile devices are becoming integrated with appliances in the people homes, with ever present sensors, actuators and network capabilities new threats are surfacing that interfere with user's possessions, well-being and privacy in the growing Internet of Things. The most familiar type of device in this evolution of technology is the...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2013

    Secure Cloud Computing for Critical Infrastructure: A Survey

    Cloud computing has been considered as one of the promising solutions to the authors' increasing demand for accessing and using resources provisioned over the Internet. It offers powerful processing and storage resources as on-demand services with reduce cost, and increase efficiency and performance. All of these features and more encourage...

    Provided By Liverpool John Moores University

  • White Papers // Aug 2012

    High Performance OFDM Systems for Digital Video Broadcasting-Terrestrial (DVB-T)

    Digital wireless communication has become one of the most exciting research topics in the electrical and electronic engineering field due to the explosive demands for high-speed wireless services, such as cellular video conferencing. Digital Video Broadcasting-Terrestrial-Second generation (DVB-T2) has been demonstrated to provide services with very high spectral efficiency and...

    Provided By Liverpool John Moores University

  • White Papers // Jul 2012

    Extending AOP Principles for the Description of Network Security Patterns

    Aspect oriented programming is increasingly being used for the practical coding of cross-cutting concerns woven throughout an application. However, most existing AOP point-cut definition languages don't distinguish in their application between different systems across a network. For network security there is a need to apply different aspects depending on the...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2012

    Energy Efficient Clustering Approach for Cooperative Spectrum Sensing in Cognitive Radio Networks

    Spectrum sensing is the key element in cognitive radio networks for detecting the primary users. Due to the destructive conditions of sensing channel such as multipath fading and shadowing, local sensing is not fitting the requirements for reliable detection. Therefore, cooperative spectrum sensing is introduced to detect the primary user...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2012

    Enhancing Security of Data and Their Related Processing in Cloud Computing

    Cloud computing is attracting huge attention from both the academic and commercial fields thanks to its provision of vast amounts of shared computing resources for Internet users. However, moving private or sensitive data and their related processing into clouds while offering data owners no physical and only limited digital control...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2012

    A Survey of Trust Management in Mobile Ad-Hoc Networks

    Distributed ad-hoc networks with no centralised node of command such as MANETs offer an interesting challenge in establishing trust between nodes for the purposes of network security. As a subjective measure of belief for behaviour; trust values can be calculated and propagated between each node to promote confidence between cooperating...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2012

    Ad-Hoc Cloud Networks: A Probabilistic Model for Vulnerability Detection in Critical Infrastructure Using Bayesian Networks

    The use of sensor nodes in the authors' society is becoming more ubiquitous and also looks to expand more in the nearest future. This is because most recent technological devices are now having inbuilt wireless sensor nodes which lead to different questions of how these devices' capabilities could support heterogeneous...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    A Simulation Based Study of Energy Efficient Packet Size Estimation for Ad-hoc Networks

    This paper addressed the energy efficient optimal packet size of ad-hoc networks. Adopting the optimal packet size not only reduces the packet error rate but also balance the packet header/trailer overhead. Hence, the number of packets drop is reduced and efficiency level is increased. Comparing to other similar efforts the...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Impact of High Density and High Speed on AODV and DSR Routing Protocols

    Mobile Ad hoc NETworks (MANET) allow versatile communication between hosts that are moving around. Routing of packets in such networks, which have no fixed infrastructure, is a continuing challenge. As the number of nodes in an area increases, the scope for increased interference between nodes increases. Also as nodes move...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Asymmetric Data-Centric State Driven Architecture for Energy Management of Appliances

    The drive to reduce carbon emissions and the move to less controllable energy sources has forced governments, energy producers, utilities and consumers to make the management of energy consumption a high priority. Appliances are a significant and uncontrolled contributor to consumption and the way in which they consume is not...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    System-of-Systems Monitoring: A Survey

    System-of-Systems (SoS) implementations are subject to additional security concerns, due in part to their largely ad-hoc and unpredictable nature. The structure, dynamicity, complexity and scale of a SoS results in the system boundaries being largely unknown. As each implementation is uniquely composed, the behaviour exhibited whilst individual components connect, interoperate...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Effect of Network Traffic Density on Energy Performance of Data Centre

    A pilot investigation into why data centers consume enormous energy has been observed using a data centre test-bed within the University of Salford Computer Network and Telecommunication Research Center Laboratory, a skeletal version of the computing core of a typical data center. Over a consecutive two months 'Peak and off-peak...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    A Unified Architecture for Video Delivery Over the Internet

    Since 1994 when ABC's "World News Now," was first broadcast across the Internet, multimedia dissemination has evolved along distinct and unique paths, resulting in two distribution methods that are commonly used across today's Internet, namely Over-The-Top TeleVision (OTT-TV) and Internet Protocol TeleVision (IPTV). With an increasing amount of video content...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Reducing Cost and Contention of P2P Live Streaming Through Locality and Piece Selection

    The use of locality within Peer-To-Peer (P2P) networks is ensuring the construction of overlay networks that are both economically viable for network operators and scalable. However, the underlying protocols on which traditional P2P overlays are based rapidly have to evolve in order to better support more time sensitive, real-time video...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Memory Threads: Organizing Digital Memories to Organize Social P2P Networks

    Human remember their memories based on some reference which helps in recalling those memories. These references are usually common for many people, objects, places and so on. The authors organize human digital memories in the form of memory threads, according to the references of the memories in order to present...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    A Geographic QoS Peer-to-Peer Streaming Framework, for High-Quality Transmission of Multimedia Content over Wireless Mesh Networks in Disaster Recovery Scenarios

    The use of mobile devices capable of wireless communications such as mobile phones, PDAs, and laptops in disaster recovery has been an important research topic for several years. However, while the majority of previous research has focused on voice and data communications a small number of researchers have proposed the...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    System Monitoring for Digital Forensic Investigation

    System monitoring provides a useful pre-emptive solution to the problem of gathering information about how a system behaves at run-time for post-hoc analysis by system administrators and forensic experts. However, existing techniques are insufficient to support post-hoc event reconstruction in large-scale systems. The authors propose a distributed trace-based system monitor...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Speeding and Efficiency Increasing of Color Biometric Finger Print Identification Using Particle Swarm Optimization Based On Selected Feature by Multiwavelet

    Biometric FingerPrint Identification (BFPI) by Feature Selection (FS) is a global optimization problem in machine learning, which reduces the number of features, removes irrelevant, noisy and redundant data, and results in acceptable recognition accuracy. It is the most important step that affects the performance of a pattern recognition system. This...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Towards a Framework for Operational Support in Critical Infrastructures

    Critical infrastructures include sectors such as energy resources, finance, food and water distribution, health, manufacturing, government services and in some cases people. The consequences of an attack on one of these would result in loss of life, economic damage or a devastating effect on the operation of government services and...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Robust Digital Image Watermarking Using Region Adaptive Embedding Technique

    Improving the robustness of watermark in withstanding attacks has been one of the main research objectives in digital image watermarking. In this paper, the authors propose a novel region-adaptive watermarking technique that can provide improvements in both robustness and visual quality of the watermarks when compared to the original, non-region-adaptive,...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Fundamental Analysis of Hybrid Free Space Optical and Radio Frequency Communication Systems

    Free-Space Optical (FSO) communication systems have been identified as a complementary solution to resolve the existing "Last mile" problems. Nevertheless, the inherent susceptibility of this technology option to various adverse atmospheric conditions has initiated research interests in hybrid FSO and Radio Frequency (RF) systems. In this paper, the authors investigate...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Efficient Bandwidth Measurements of Thin Film Filters for Next-Generation Optical Access

    The authors have measured differential group delay of thin film filters devices with 200 GHz and 100 GHz full width half maximum bandwidth employing method based on Jones Matrix Eigen-analysis and have evaluated efficient bandwidth of thin film filters devices utilizing 2.5 Gbit/s and 10.3125 Gbit/s optical signals to draw...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Connectivity Dynamics Under Microscopic Parameters in Signalized Heterogeneous Traffic Flow for VANET

    The issue of connectivity in Vehicular Ad-hoc NETwork (VANET) is influenced by the diverse characteristics of traffic flow on the road. The authors have applied fluid dynamic model and captured the connectivity dynamics considering microscopic aspects in heterogeneous traffic flow in a signalized urban road environment. The applied model incorporates...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    A Systematic Study of the Behaviour of the PMEPR in Relation to OFDM Design Parameters

    The design of systems with enhanced Quality of Service (QoS) and improved power efficiency has evolved into an intensive research area in wired and wireless communications engineering. Orthogonal Frequency Division Multiplexing (OFDM) has been proven to have the potential to achieve high data rates, adapt to severe channel conditions and...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Reputation-Based Non-Cooperative Auction Game Competitive for Spectrum Sharing in Cognitive Radio Networks

    Cognitive radio is a novel technique to improve utilization efficiently of the radio spectrum. In this paper, the authors consider the problem sharing among a primary user and a group of secondary users. This problem is formulated on sealed-bid auction, in which each secondary user with high reputation can share...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Iterative Coloring Technique for the Generation of Correlated Rayleigh Fading Envelopes for Multi-Antenna and Multicarrier Systems

    In this paper, a simple technique is proposed for the generation of equal power correlated Rayleigh fading envelopes for multi-antenna and multicarrier systems with any desired correlation factors. It employs iterative coloring of uncorrelated reference envelopes using real correlation matrix of envelopes rather than complex covariance matrix of the Gaussian...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    CIA Security Management for Wireless Sensor Network Nodes

    Wireless Sensor Networks (WSN) have become a complete solution in making use of low power implementation and embedded systems. Nevertheless, the many constraints arising from low communication range, limited computing power, lack of availability of networking protocol, programming in the absence of certainty and security lapses in the areas of...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Identity-Based Attacks Against Reputation-Based Systems in MANETs

    In multihop networks such as mobile ad hoc networks selfish or misbehaving nodes can disrupt the whole network and severely degrade network performance. Reputation, credit and trust based schemes have been developed to enforce cooperation and discourage node misbehaviour. These models are vulnerable to two types of attack. First, a...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    A Symmetric Key Generation and Pre-Distribution Scheme for WSN Using MRD Codes

    This paper addresses the problem of secure path key establishment in WSN using a key pre-distribution scheme. In this paper, first the authors have proposed a symmetric key generation scheme using Maximum Rank Distance(MRD) codes and then they have proposed a path establishment algorithm. Their scheme not only substantially improves...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    A Framework for Providing a Secure System of Systems Composition

    The area of System of Systems research is focused on using multiple complex and disparate systems to provide goal orientated solution that provides functionality greater than its component parts. The paper highlights some of the authors' research into the area of System of Systems (SoS) and their security and composition...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Link Quality Based Ant Routing Algorithm for MANETs (LQARA)

    The used routing algorithms for Mobile Ad hoc NETworks (MANETs) are inherited from the conventional ones which makes them subject of numerous criticisms since they do not take into consideration all the characteristics of ad hoc networks such as mobility and medium constraints. In this paper, the authors propose a...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Coordination of Energy Efficient Sensing and Transmission in Cognitive Radio Networks

    To improve spectrum efficiency, Cognitive Radio (CR) is designed to allow unlicensed (secondary) users to utilize the licensed spectrum when it is not used by the licensed (primary) users. Because of the dynamic nature of cognitive radio network, the resource allocation targeting at best system performance becomes more and more...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Cognitive Attributes in a Mobile Ad-Hoc Network

    This paper presents an initial investigation into the feasibility of improving end-to-end delay or better meeting mission objectives in a Mobile Ad-hoc NETwork (MANET) environment by applying existing methodologies that have been proposed in Cognitive Networks (CNs). MANETs are networks without a predefined infrastructure with very limited resources as opposed...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Designing a Protocol to Support Multicast Mobility in IPv6 Network

    In this paper, the authors describe a new extended protocol framework for IPv6 WiFi networks, which handle multicast services whilst changing the WiFi zone within a wireless network. They modify the Mobile IPv6 function to support their framework and use ICMPv6 to maintain the multicast connection route. In addition, they...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Current Threats to Security in Campus Networks

    Campus networks are vulnerable to a number of security threats, including physical threats, system vulnerabilities, malicious programs, and identification issues. Wireless technology is developing at an extremely fast rate. The majority of campuses use wireless access points due to the numerous advantages that wireless networks can offer. Hacking is a...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Adaptive Learning and Reconfiguration in Wireless Sensor Actuator Networks for Control Applications

    WSANs are becoming a solution for implementation of control applications. Sensors and actuators can be deployed forming a large or dense network to monitor and control physical parameters or systems. Reliable data transmission and real time constraints are the most significant challenges in WSAN implementation for control applications in addition...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Designing Smart Middleware for Wireless Sensor Networks

    Middleware for Wireless Sensor Networks (WSN) act as the interface point between Wireless Sensor Nodes and higher application layers. A middleware can introduce, support and enhance access to the underlying networks in intelligent ways. Abstraction from the lower sensor layers, Information Processing and Service Provisioning for higher applications are the...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Design Considerations for a Self-Managed Wireless Sensor Cloud for Emergency Response Scenario

    Wireless Sensor Networks (WSNs) have become widely used in various applications areas including environmental monitoring, surveillance and military applications. As the complexity of WSNs increase and the application areas in which they are used become more critical, the requirement of such networks to be self managing becomes necessary. Various aspects...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Secure Service Composition for P2P Home Networked Appliances

    Advances in multimedia applications, services and intelligent networked appliances have been making ubiquitous home environments a reality. The authors have been using computer-based devices in the people daily lives ranging from home appliances such as TVs, PCs, and Audio/Video devices to office appliances such as PDAs, and printers. Network Appliances...

    Provided By Liverpool John Moores University

  • White Papers // Nov 2010

    A Self-Managing Fault Management Mechanism for Wireless Sensor Networks

    A sensor network can be described as a collection of sensor nodes which co-ordinate with each other to perform some specific function. These sensor nodes are mainly in large numbers and are densely deployed either inside the phenomenon or very close to it. They can be used for various application...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2012

    Energy Efficient Clustering Approach for Cooperative Spectrum Sensing in Cognitive Radio Networks

    Spectrum sensing is the key element in cognitive radio networks for detecting the primary users. Due to the destructive conditions of sensing channel such as multipath fading and shadowing, local sensing is not fitting the requirements for reliable detection. Therefore, cooperative spectrum sensing is introduced to detect the primary user...

    Provided By Liverpool John Moores University

  • White Papers // Jul 2012

    Extending AOP Principles for the Description of Network Security Patterns

    Aspect oriented programming is increasingly being used for the practical coding of cross-cutting concerns woven throughout an application. However, most existing AOP point-cut definition languages don't distinguish in their application between different systems across a network. For network security there is a need to apply different aspects depending on the...

    Provided By Liverpool John Moores University

  • White Papers // Mar 2011

    Cloud Computing: Pros and Cons for Computer Forensic Investigations

    Cloud computing is a relatively new concept that offers the potential to deliver scalable elastic services to many. The notion of pay-per use is attractive and in the current global recession hit economy it offers an economic solution to an organizations' IT needs. Computer forensics is a relatively new discipline...

    Provided By Liverpool John Moores University

  • White Papers // Mar 2010

    Support for Adaptive Cloud-Based Applications via Intention Modelling

    Recent years have seen a surge of research into cloud computing to providing tools, techniques and support infrastructure for delivering affordable on-demand dependable network-centric applications and services. Whilst, much is already known regarding the development of such applications via the application of autonomic computing, SOA, design principle to name but...

    Provided By Liverpool John Moores University

  • White Papers // Aug 2012

    High Performance OFDM Systems for Digital Video Broadcasting-Terrestrial (DVB-T)

    Digital wireless communication has become one of the most exciting research topics in the electrical and electronic engineering field due to the explosive demands for high-speed wireless services, such as cellular video conferencing. Digital Video Broadcasting-Terrestrial-Second generation (DVB-T2) has been demonstrated to provide services with very high spectral efficiency and...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    A Simulation Based Study of Energy Efficient Packet Size Estimation for Ad-hoc Networks

    This paper addressed the energy efficient optimal packet size of ad-hoc networks. Adopting the optimal packet size not only reduces the packet error rate but also balance the packet header/trailer overhead. Hence, the number of packets drop is reduced and efficiency level is increased. Comparing to other similar efforts the...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Impact of High Density and High Speed on AODV and DSR Routing Protocols

    Mobile Ad hoc NETworks (MANET) allow versatile communication between hosts that are moving around. Routing of packets in such networks, which have no fixed infrastructure, is a continuing challenge. As the number of nodes in an area increases, the scope for increased interference between nodes increases. Also as nodes move...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Asymmetric Data-Centric State Driven Architecture for Energy Management of Appliances

    The drive to reduce carbon emissions and the move to less controllable energy sources has forced governments, energy producers, utilities and consumers to make the management of energy consumption a high priority. Appliances are a significant and uncontrolled contributor to consumption and the way in which they consume is not...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    System-of-Systems Monitoring: A Survey

    System-of-Systems (SoS) implementations are subject to additional security concerns, due in part to their largely ad-hoc and unpredictable nature. The structure, dynamicity, complexity and scale of a SoS results in the system boundaries being largely unknown. As each implementation is uniquely composed, the behaviour exhibited whilst individual components connect, interoperate...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Effect of Network Traffic Density on Energy Performance of Data Centre

    A pilot investigation into why data centers consume enormous energy has been observed using a data centre test-bed within the University of Salford Computer Network and Telecommunication Research Center Laboratory, a skeletal version of the computing core of a typical data center. Over a consecutive two months 'Peak and off-peak...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2010

    Gateway Selection in Mobile Ad-Hoc Networks

    Mobility has evolved from single node mobility (Mobile IP), to NEtwork MObility (NEMO BS), and finally to efficient Mobile Ad-hoc networks NEMOs (MANEMO). MANEMO is vaguely defined and there is no IETF MANEMO standard. There has been no standard solution to utilize multiple Internet gateways in MANEMO. To solve this...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2010

    AODV Routing Protocol in Heterogeneous Networks

    This paper considers the impact of unidirectional links on Ad-Hoc on Demand Distance Vector Routing Protocol (AODV) routing protocol. Heterogeneity of a node's transmission range within Mobile Ad-Hoc NETworks (MANETs) most often results from unidirectional link between a pair of nodes. The creation of such link prevents the proper operation...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2010

    Network Mobility and Fragmentation in Wireless Mesh Internetworks: Issues and Challenges

    There has been a dramatic increase in the number of mobile IP devices attached to the fringe Internet. As devices reduce in cost and their capabilities increase, the vision of ubiquitous computing looks to be realised. As a result the number of wireless devices found in the Internet fringe will...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2010

    Real-Time Data Mining Methodology and Emergency Knowledge Discovery in Wireless Sensor Networks

    Real-time data mining can extract event knowledge for fire detection more promptly than the traditional detection approach. The paper mainly describes the real-time data mining process for fulfilling rapid emergency response in wireless sensor network. The authors evaluate the performance of this process by simulation. Wireless sensor networks have attracted...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2010

    Energy Efficiency With Adaptive Modulation and Spectrum Sharing for Cellular Systems

    The increasing concern about the energy consumption of cellular network is driving operators to optimise energy utilisation without sacrificing user experience. In this paper, the authors consider the capability of spectrum sharing between two operators with the objective of achieving energy efficient operation. Furthermore, they will study the effect of...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2010

    A Framework of Multicast Mobility in Heterogeneous Networks

    It can be seen that nowadays mobile devices can support various technologies such as 3G cellular, WLAN, Bluetooth, etc. The main goal in the wireless telecommunications world is to provide communication anywhere, anytime. Due to the requirements of multimedia applications, the issues of multimedia and mobility in heterogeneous networks are...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2010

    Downlink Sum-Rate Performance for Cooperation and Coordination Between Three Interfering Sectors

    In this paper, the authors investigate the performance of various transmission schemes for the downlink cellular system. These schemes are either biased towards interference minimisation or the efficient utilisation of the available resources. A mathematical model for the various schemes is presented and the performance measure is based on the...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2010

    The Key Elements of Cognitive Radio: A Survey

    Cognitive radio is recent technologies to solve the problem of the spectrum scarcity. It is an intelligent wireless communication system that is aware of its environment, learns from it and adapts its transmission features according to statistical variations in the environment to maximize utilization of spectrum while ensuring quality of...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2010

    Evaluation of Routing Algorithms in Delay/ Disruption Tolerant Network

    The framework of Delay/Disruption Tolerant Network (DTN) is recently received an extensive attention and widely implemented, ranging from Wireless Sensor Network to interplanetary network. It has a promising future in military affairs, scientific research and exploration. With the characteristic of long delay, intermittent connectivity, limitation of node buffer size and...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2010

    A Power Reduction Technique for GMPLS-Based Photonic Networks

    Green photonic network designs centre on techniques to reduce and conserve energy within multilayer network environments. In this paper, a hibernation mode is proposed to reduce network power consumption; network configurations form selective group of nodes, segmenting the links and partitioning the wavelength within connections to enable "Sleep" modes. An...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2010

    Trust Routing in MANET for Securing DSR Routing Protocol

    In this paper, the authors describe a new authentication service and trust level attached in every packet to make the routing in Mobile Ad Hoc Network secure. Efficient operation of Ad Hoc networks is dependent on maintaining appropriate routing information in a distributed fashion. The routing protocol is vulnerable to...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2010

    Justifying a Policy Based Approach for DDoS Remediation: A Case Study

    Following the outbreak of conflict between Russia and Georgia and the infamous collapse of the Estonian network infrastructure in 2007, Distributed Denial of Service (DDoS) attacks have emerged as a new political weapon. In response to this, and anticipating the vulnerability of banking, energy and communications systems to Internet attacks,...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2010

    A Survey of VANET's Authentication

    Vehicular Ad hoc NETworks (VANET) have recently drawn the attention of the research community. Vehicular Ad-hoc NETworks (VANET's) represent a rapidly emerging, particularly challenging class of MANETs. Vehicular Communications (VC) aim to enhance safety and efficiency of transportation systems. Vehicular applications will provide warnings on environmental hazards, traffic and road...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2010

    System-of-Systems Security: A Survey

    The area of System-of-Systems research is focused on using multiple complex and disparate systems to create a goal orientated solution that provides functionality greater than that of its component parts. This paper describes the concepts of System-of-Systems through an exploration of recent definitions and characteristics, and presents some often cited...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2010

    Mongoose: A TCP Fair Second Life Client

    Metaverses such as Second Life (SL) are a relatively new type of Internet application. Their functionality is similar to online 3D games but differs in that users are able to construct the environment their avatars inhabit and are not constrained by predefined goals. From the network perspective metaverses are similar...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2010

    NHUGS: Towards Scalability Testing for MMOGs Within an Extensible, Open Architecture

    Massively Multiplayer Online Games (MMOGs) such as Activision Blizzard's World of Warcraft have become an increasingly popular sector of the games industry with the leading games boasting user subscriptions in excess of 10 million. The sheer volume of users places a burden upon the scalability of these software systems and...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2010

    VoDPStream - The Optimized Design and Implementation of a P2P-Based VoD System

    The rising number of Internet users brings about greater demand for VoD streaming. However, the quality of audio and video data streaming to displays are not satisfying enough; huge expenditures also dishearten network media providers. Better operation and Quality of Service (QoS) call for smarter resolutions. This paper proposes an...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2010

    A Spatial and Frequency Domain Analysis of the Effect of Removal Attacks on Digital Image Watermarks

    Digital image watermarking is one of the most widely used techniques for protection of ownership rights of digital images. Its commercial applications range from copyright protection to digital rights management. However, although there have been numerous new proposed digital image watermarking techniques, most are not sufficiently robust against watermark attacks....

    Provided By Liverpool John Moores University

  • White Papers // Jun 2010

    Self Organised Cellular Networks as the Future of Wireless Communication

    An introduction into self organizing cellular networks is presented. This paper has generated a lot of research interest over the past few years as operators have identified it as a necessary feature in future wireless communication systems. The authors review projects which have studied self organization and with knowledge of...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2010

    Evaluation of Voice Cell Jitter and Delay for ATM Network Using a Jitter Management Algorithm

    In this paper, the authors present the effect of their proposed Chunk-based Jitter Management (CJM) algorithm on Asynchronous Transfer Mode (ATM) Network. The simulation environment shows the effect of voice traffic on the performance of cell data transmission in ATM network. They show simulation results for a tested scenario, and...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    A Unified Architecture for Video Delivery Over the Internet

    Since 1994 when ABC's "World News Now," was first broadcast across the Internet, multimedia dissemination has evolved along distinct and unique paths, resulting in two distribution methods that are commonly used across today's Internet, namely Over-The-Top TeleVision (OTT-TV) and Internet Protocol TeleVision (IPTV). With an increasing amount of video content...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Reducing Cost and Contention of P2P Live Streaming Through Locality and Piece Selection

    The use of locality within Peer-To-Peer (P2P) networks is ensuring the construction of overlay networks that are both economically viable for network operators and scalable. However, the underlying protocols on which traditional P2P overlays are based rapidly have to evolve in order to better support more time sensitive, real-time video...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Memory Threads: Organizing Digital Memories to Organize Social P2P Networks

    Human remember their memories based on some reference which helps in recalling those memories. These references are usually common for many people, objects, places and so on. The authors organize human digital memories in the form of memory threads, according to the references of the memories in order to present...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    A Geographic QoS Peer-to-Peer Streaming Framework, for High-Quality Transmission of Multimedia Content over Wireless Mesh Networks in Disaster Recovery Scenarios

    The use of mobile devices capable of wireless communications such as mobile phones, PDAs, and laptops in disaster recovery has been an important research topic for several years. However, while the majority of previous research has focused on voice and data communications a small number of researchers have proposed the...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    System Monitoring for Digital Forensic Investigation

    System monitoring provides a useful pre-emptive solution to the problem of gathering information about how a system behaves at run-time for post-hoc analysis by system administrators and forensic experts. However, existing techniques are insufficient to support post-hoc event reconstruction in large-scale systems. The authors propose a distributed trace-based system monitor...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Speeding and Efficiency Increasing of Color Biometric Finger Print Identification Using Particle Swarm Optimization Based On Selected Feature by Multiwavelet

    Biometric FingerPrint Identification (BFPI) by Feature Selection (FS) is a global optimization problem in machine learning, which reduces the number of features, removes irrelevant, noisy and redundant data, and results in acceptable recognition accuracy. It is the most important step that affects the performance of a pattern recognition system. This...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Towards a Framework for Operational Support in Critical Infrastructures

    Critical infrastructures include sectors such as energy resources, finance, food and water distribution, health, manufacturing, government services and in some cases people. The consequences of an attack on one of these would result in loss of life, economic damage or a devastating effect on the operation of government services and...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Robust Digital Image Watermarking Using Region Adaptive Embedding Technique

    Improving the robustness of watermark in withstanding attacks has been one of the main research objectives in digital image watermarking. In this paper, the authors propose a novel region-adaptive watermarking technique that can provide improvements in both robustness and visual quality of the watermarks when compared to the original, non-region-adaptive,...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Fundamental Analysis of Hybrid Free Space Optical and Radio Frequency Communication Systems

    Free-Space Optical (FSO) communication systems have been identified as a complementary solution to resolve the existing "Last mile" problems. Nevertheless, the inherent susceptibility of this technology option to various adverse atmospheric conditions has initiated research interests in hybrid FSO and Radio Frequency (RF) systems. In this paper, the authors investigate...

    Provided By Liverpool John Moores University