Liverpool John Moores University

Displaying 1-40 of 123 results

  • White Papers // Jun 2013

    Secure Cloud Computing for Critical Infrastructure: A Survey

    Cloud computing has been considered as one of the promising solutions to the authors' increasing demand for accessing and using resources provisioned over the Internet. It offers powerful processing and storage resources as on-demand services with reduce cost, and increase efficiency and performance. All of these features and more encourage...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2013

    Mobile Devices: In-Network Anti-Malware Analysis

    Mobile devices are becoming integrated with appliances in the people homes, with ever present sensors, actuators and network capabilities new threats are surfacing that interfere with user's possessions, well-being and privacy in the growing Internet of Things. The most familiar type of device in this evolution of technology is the...

    Provided By Liverpool John Moores University

  • White Papers // Aug 2012

    High Performance OFDM Systems for Digital Video Broadcasting-Terrestrial (DVB-T)

    Digital wireless communication has become one of the most exciting research topics in the electrical and electronic engineering field due to the explosive demands for high-speed wireless services, such as cellular video conferencing. Digital Video Broadcasting-Terrestrial-Second generation (DVB-T2) has been demonstrated to provide services with very high spectral efficiency and...

    Provided By Liverpool John Moores University

  • White Papers // Jul 2012

    Extending AOP Principles for the Description of Network Security Patterns

    Aspect oriented programming is increasingly being used for the practical coding of cross-cutting concerns woven throughout an application. However, most existing AOP point-cut definition languages don't distinguish in their application between different systems across a network. For network security there is a need to apply different aspects depending on the...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2012

    A Survey of Trust Management in Mobile Ad-Hoc Networks

    Distributed ad-hoc networks with no centralised node of command such as MANETs offer an interesting challenge in establishing trust between nodes for the purposes of network security. As a subjective measure of belief for behaviour; trust values can be calculated and propagated between each node to promote confidence between cooperating...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2012

    Energy Efficient Clustering Approach for Cooperative Spectrum Sensing in Cognitive Radio Networks

    Spectrum sensing is the key element in cognitive radio networks for detecting the primary users. Due to the destructive conditions of sensing channel such as multipath fading and shadowing, local sensing is not fitting the requirements for reliable detection. Therefore, cooperative spectrum sensing is introduced to detect the primary user...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2012

    Ad-Hoc Cloud Networks: A Probabilistic Model for Vulnerability Detection in Critical Infrastructure Using Bayesian Networks

    The use of sensor nodes in the authors' society is becoming more ubiquitous and also looks to expand more in the nearest future. This is because most recent technological devices are now having inbuilt wireless sensor nodes which lead to different questions of how these devices' capabilities could support heterogeneous...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2012

    Enhancing Security of Data and Their Related Processing in Cloud Computing

    Cloud computing is attracting huge attention from both the academic and commercial fields thanks to its provision of vast amounts of shared computing resources for Internet users. However, moving private or sensitive data and their related processing into clouds while offering data owners no physical and only limited digital control...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Towards a Framework for Operational Support in Critical Infrastructures

    Critical infrastructures include sectors such as energy resources, finance, food and water distribution, health, manufacturing, government services and in some cases people. The consequences of an attack on one of these would result in loss of life, economic damage or a devastating effect on the operation of government services and...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Robust Digital Image Watermarking Using Region Adaptive Embedding Technique

    Improving the robustness of watermark in withstanding attacks has been one of the main research objectives in digital image watermarking. In this paper, the authors propose a novel region-adaptive watermarking technique that can provide improvements in both robustness and visual quality of the watermarks when compared to the original, non-region-adaptive,...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Fundamental Analysis of Hybrid Free Space Optical and Radio Frequency Communication Systems

    Free-Space Optical (FSO) communication systems have been identified as a complementary solution to resolve the existing "Last mile" problems. Nevertheless, the inherent susceptibility of this technology option to various adverse atmospheric conditions has initiated research interests in hybrid FSO and Radio Frequency (RF) systems. In this paper, the authors investigate...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Efficient Bandwidth Measurements of Thin Film Filters for Next-Generation Optical Access

    The authors have measured differential group delay of thin film filters devices with 200 GHz and 100 GHz full width half maximum bandwidth employing method based on Jones Matrix Eigen-analysis and have evaluated efficient bandwidth of thin film filters devices utilizing 2.5 Gbit/s and 10.3125 Gbit/s optical signals to draw...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Coordination of Energy Efficient Sensing and Transmission in Cognitive Radio Networks

    To improve spectrum efficiency, Cognitive Radio (CR) is designed to allow unlicensed (secondary) users to utilize the licensed spectrum when it is not used by the licensed (primary) users. Because of the dynamic nature of cognitive radio network, the resource allocation targeting at best system performance becomes more and more...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Cognitive Attributes in a Mobile Ad-Hoc Network

    This paper presents an initial investigation into the feasibility of improving end-to-end delay or better meeting mission objectives in a Mobile Ad-hoc NETwork (MANET) environment by applying existing methodologies that have been proposed in Cognitive Networks (CNs). MANETs are networks without a predefined infrastructure with very limited resources as opposed...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Designing a Protocol to Support Multicast Mobility in IPv6 Network

    In this paper, the authors describe a new extended protocol framework for IPv6 WiFi networks, which handle multicast services whilst changing the WiFi zone within a wireless network. They modify the Mobile IPv6 function to support their framework and use ICMPv6 to maintain the multicast connection route. In addition, they...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Current Threats to Security in Campus Networks

    Campus networks are vulnerable to a number of security threats, including physical threats, system vulnerabilities, malicious programs, and identification issues. Wireless technology is developing at an extremely fast rate. The majority of campuses use wireless access points due to the numerous advantages that wireless networks can offer. Hacking is a...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Adaptive Learning and Reconfiguration in Wireless Sensor Actuator Networks for Control Applications

    WSANs are becoming a solution for implementation of control applications. Sensors and actuators can be deployed forming a large or dense network to monitor and control physical parameters or systems. Reliable data transmission and real time constraints are the most significant challenges in WSAN implementation for control applications in addition...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Designing Smart Middleware for Wireless Sensor Networks

    Middleware for Wireless Sensor Networks (WSN) act as the interface point between Wireless Sensor Nodes and higher application layers. A middleware can introduce, support and enhance access to the underlying networks in intelligent ways. Abstraction from the lower sensor layers, Information Processing and Service Provisioning for higher applications are the...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Design Considerations for a Self-Managed Wireless Sensor Cloud for Emergency Response Scenario

    Wireless Sensor Networks (WSNs) have become widely used in various applications areas including environmental monitoring, surveillance and military applications. As the complexity of WSNs increase and the application areas in which they are used become more critical, the requirement of such networks to be self managing becomes necessary. Various aspects...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Secure Service Composition for P2P Home Networked Appliances

    Advances in multimedia applications, services and intelligent networked appliances have been making ubiquitous home environments a reality. The authors have been using computer-based devices in the people daily lives ranging from home appliances such as TVs, PCs, and Audio/Video devices to office appliances such as PDAs, and printers. Network Appliances...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Security Practices in Cloud Computing and the Implications to SMEs

    This paper examines the implications of small businesses that are turning to cloud technology in order to mitigate their Capital Expenditure (Capex) in terms of IT costs, it will also report on the security mechanisms used by Cloud providers. The paper briefly looks at security issues in terms of compliance,...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Measuring Trust of Components in Web Services

    Trust is a vast and subjective field that has been researched in areas such as spam, peer-to-peer networks and web services. However, very little research has been done into web service collaboration and how trust related metrics are propagated down to the component layers. Trust has the same core requirements;...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Development of a Multiple-Input Multiple-Output Ultra-Wideband System Emulator

    An experimental testbed is described for the characterization of indoor channels with sufficient spatial resolution and sufficient bandwidth to study the practical capacities of MIMOUWB systems. UWB measurements have been made in both frequency and time domains for mutual validation. The opportunity has been taken in this paper to extract...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    On the Capacity Region of Promising Multiple Access Techniques

    One of the important issues involved in the development of future wireless communication systems is the multiple access technique employed to share the available spectrum among users efficiently. In this paper, the authors present intensive investigation on the capacity region of conventional and some promising multiple access techniques for mobile...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Power Distribution Investigation of a Diffused Cellular Indoor Visible Light Communication System

    This paper presents a Three Dimensions (3D) model of optical power distribution in a diffused cellular indoor Visible Light Communication (VLC) system. To achieve an ideal system which has a maximum coverage area with a minimum power consumption, both hexagon geometric structure and holographic Light Shaping Diffuser (LSD) are employed....

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Small Antennas for Cognitive Radio Using Negative Impedance Converters

    There is a need for small antennas in mobile and handheld cognitive radios. These antennas are also required to be either wideband or have a wide tuning range. The authors used a non-Foster matching network to achieve wideband matching and also demonstrate tuning. They also simulated the noise and Inter-Modulation...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Connectivity Dynamics Under Microscopic Parameters in Signalized Heterogeneous Traffic Flow for VANET

    The issue of connectivity in Vehicular Ad-hoc NETwork (VANET) is influenced by the diverse characteristics of traffic flow on the road. The authors have applied fluid dynamic model and captured the connectivity dynamics considering microscopic aspects in heterogeneous traffic flow in a signalized urban road environment. The applied model incorporates...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    A Systematic Study of the Behaviour of the PMEPR in Relation to OFDM Design Parameters

    The design of systems with enhanced Quality of Service (QoS) and improved power efficiency has evolved into an intensive research area in wired and wireless communications engineering. Orthogonal Frequency Division Multiplexing (OFDM) has been proven to have the potential to achieve high data rates, adapt to severe channel conditions and...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Reputation-Based Non-Cooperative Auction Game Competitive for Spectrum Sharing in Cognitive Radio Networks

    Cognitive radio is a novel technique to improve utilization efficiently of the radio spectrum. In this paper, the authors consider the problem sharing among a primary user and a group of secondary users. This problem is formulated on sealed-bid auction, in which each secondary user with high reputation can share...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Iterative Coloring Technique for the Generation of Correlated Rayleigh Fading Envelopes for Multi-Antenna and Multicarrier Systems

    In this paper, a simple technique is proposed for the generation of equal power correlated Rayleigh fading envelopes for multi-antenna and multicarrier systems with any desired correlation factors. It employs iterative coloring of uncorrelated reference envelopes using real correlation matrix of envelopes rather than complex covariance matrix of the Gaussian...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    CIA Security Management for Wireless Sensor Network Nodes

    Wireless Sensor Networks (WSN) have become a complete solution in making use of low power implementation and embedded systems. Nevertheless, the many constraints arising from low communication range, limited computing power, lack of availability of networking protocol, programming in the absence of certainty and security lapses in the areas of...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Identity-Based Attacks Against Reputation-Based Systems in MANETs

    In multihop networks such as mobile ad hoc networks selfish or misbehaving nodes can disrupt the whole network and severely degrade network performance. Reputation, credit and trust based schemes have been developed to enforce cooperation and discourage node misbehaviour. These models are vulnerable to two types of attack. First, a...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    A Symmetric Key Generation and Pre-Distribution Scheme for WSN Using MRD Codes

    This paper addresses the problem of secure path key establishment in WSN using a key pre-distribution scheme. In this paper, first the authors have proposed a symmetric key generation scheme using Maximum Rank Distance(MRD) codes and then they have proposed a path establishment algorithm. Their scheme not only substantially improves...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    A Framework for Providing a Secure System of Systems Composition

    The area of System of Systems research is focused on using multiple complex and disparate systems to provide goal orientated solution that provides functionality greater than its component parts. The paper highlights some of the authors' research into the area of System of Systems (SoS) and their security and composition...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Link Quality Based Ant Routing Algorithm for MANETs (LQARA)

    The used routing algorithms for Mobile Ad hoc NETworks (MANETs) are inherited from the conventional ones which makes them subject of numerous criticisms since they do not take into consideration all the characteristics of ad hoc networks such as mobility and medium constraints. In this paper, the authors propose a...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    A Unified Architecture for Video Delivery Over the Internet

    Since 1994 when ABC's "World News Now," was first broadcast across the Internet, multimedia dissemination has evolved along distinct and unique paths, resulting in two distribution methods that are commonly used across today's Internet, namely Over-The-Top TeleVision (OTT-TV) and Internet Protocol TeleVision (IPTV). With an increasing amount of video content...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Reducing Cost and Contention of P2P Live Streaming Through Locality and Piece Selection

    The use of locality within Peer-To-Peer (P2P) networks is ensuring the construction of overlay networks that are both economically viable for network operators and scalable. However, the underlying protocols on which traditional P2P overlays are based rapidly have to evolve in order to better support more time sensitive, real-time video...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Memory Threads: Organizing Digital Memories to Organize Social P2P Networks

    Human remember their memories based on some reference which helps in recalling those memories. These references are usually common for many people, objects, places and so on. The authors organize human digital memories in the form of memory threads, according to the references of the memories in order to present...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    A Geographic QoS Peer-to-Peer Streaming Framework, for High-Quality Transmission of Multimedia Content over Wireless Mesh Networks in Disaster Recovery Scenarios

    The use of mobile devices capable of wireless communications such as mobile phones, PDAs, and laptops in disaster recovery has been an important research topic for several years. However, while the majority of previous research has focused on voice and data communications a small number of researchers have proposed the...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    System Monitoring for Digital Forensic Investigation

    System monitoring provides a useful pre-emptive solution to the problem of gathering information about how a system behaves at run-time for post-hoc analysis by system administrators and forensic experts. However, existing techniques are insufficient to support post-hoc event reconstruction in large-scale systems. The authors propose a distributed trace-based system monitor...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Towards a Framework for Operational Support in Critical Infrastructures

    Critical infrastructures include sectors such as energy resources, finance, food and water distribution, health, manufacturing, government services and in some cases people. The consequences of an attack on one of these would result in loss of life, economic damage or a devastating effect on the operation of government services and...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Robust Digital Image Watermarking Using Region Adaptive Embedding Technique

    Improving the robustness of watermark in withstanding attacks has been one of the main research objectives in digital image watermarking. In this paper, the authors propose a novel region-adaptive watermarking technique that can provide improvements in both robustness and visual quality of the watermarks when compared to the original, non-region-adaptive,...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Fundamental Analysis of Hybrid Free Space Optical and Radio Frequency Communication Systems

    Free-Space Optical (FSO) communication systems have been identified as a complementary solution to resolve the existing "Last mile" problems. Nevertheless, the inherent susceptibility of this technology option to various adverse atmospheric conditions has initiated research interests in hybrid FSO and Radio Frequency (RF) systems. In this paper, the authors investigate...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Efficient Bandwidth Measurements of Thin Film Filters for Next-Generation Optical Access

    The authors have measured differential group delay of thin film filters devices with 200 GHz and 100 GHz full width half maximum bandwidth employing method based on Jones Matrix Eigen-analysis and have evaluated efficient bandwidth of thin film filters devices utilizing 2.5 Gbit/s and 10.3125 Gbit/s optical signals to draw...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Coordination of Energy Efficient Sensing and Transmission in Cognitive Radio Networks

    To improve spectrum efficiency, Cognitive Radio (CR) is designed to allow unlicensed (secondary) users to utilize the licensed spectrum when it is not used by the licensed (primary) users. Because of the dynamic nature of cognitive radio network, the resource allocation targeting at best system performance becomes more and more...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Cognitive Attributes in a Mobile Ad-Hoc Network

    This paper presents an initial investigation into the feasibility of improving end-to-end delay or better meeting mission objectives in a Mobile Ad-hoc NETwork (MANET) environment by applying existing methodologies that have been proposed in Cognitive Networks (CNs). MANETs are networks without a predefined infrastructure with very limited resources as opposed...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Designing a Protocol to Support Multicast Mobility in IPv6 Network

    In this paper, the authors describe a new extended protocol framework for IPv6 WiFi networks, which handle multicast services whilst changing the WiFi zone within a wireless network. They modify the Mobile IPv6 function to support their framework and use ICMPv6 to maintain the multicast connection route. In addition, they...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Current Threats to Security in Campus Networks

    Campus networks are vulnerable to a number of security threats, including physical threats, system vulnerabilities, malicious programs, and identification issues. Wireless technology is developing at an extremely fast rate. The majority of campuses use wireless access points due to the numerous advantages that wireless networks can offer. Hacking is a...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Adaptive Learning and Reconfiguration in Wireless Sensor Actuator Networks for Control Applications

    WSANs are becoming a solution for implementation of control applications. Sensors and actuators can be deployed forming a large or dense network to monitor and control physical parameters or systems. Reliable data transmission and real time constraints are the most significant challenges in WSAN implementation for control applications in addition...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Designing Smart Middleware for Wireless Sensor Networks

    Middleware for Wireless Sensor Networks (WSN) act as the interface point between Wireless Sensor Nodes and higher application layers. A middleware can introduce, support and enhance access to the underlying networks in intelligent ways. Abstraction from the lower sensor layers, Information Processing and Service Provisioning for higher applications are the...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Design Considerations for a Self-Managed Wireless Sensor Cloud for Emergency Response Scenario

    Wireless Sensor Networks (WSNs) have become widely used in various applications areas including environmental monitoring, surveillance and military applications. As the complexity of WSNs increase and the application areas in which they are used become more critical, the requirement of such networks to be self managing becomes necessary. Various aspects...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Secure Service Composition for P2P Home Networked Appliances

    Advances in multimedia applications, services and intelligent networked appliances have been making ubiquitous home environments a reality. The authors have been using computer-based devices in the people daily lives ranging from home appliances such as TVs, PCs, and Audio/Video devices to office appliances such as PDAs, and printers. Network Appliances...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Security Practices in Cloud Computing and the Implications to SMEs

    This paper examines the implications of small businesses that are turning to cloud technology in order to mitigate their Capital Expenditure (Capex) in terms of IT costs, it will also report on the security mechanisms used by Cloud providers. The paper briefly looks at security issues in terms of compliance,...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Measuring Trust of Components in Web Services

    Trust is a vast and subjective field that has been researched in areas such as spam, peer-to-peer networks and web services. However, very little research has been done into web service collaboration and how trust related metrics are propagated down to the component layers. Trust has the same core requirements;...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Development of a Multiple-Input Multiple-Output Ultra-Wideband System Emulator

    An experimental testbed is described for the characterization of indoor channels with sufficient spatial resolution and sufficient bandwidth to study the practical capacities of MIMOUWB systems. UWB measurements have been made in both frequency and time domains for mutual validation. The opportunity has been taken in this paper to extract...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    On the Capacity Region of Promising Multiple Access Techniques

    One of the important issues involved in the development of future wireless communication systems is the multiple access technique employed to share the available spectrum among users efficiently. In this paper, the authors present intensive investigation on the capacity region of conventional and some promising multiple access techniques for mobile...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Power Distribution Investigation of a Diffused Cellular Indoor Visible Light Communication System

    This paper presents a Three Dimensions (3D) model of optical power distribution in a diffused cellular indoor Visible Light Communication (VLC) system. To achieve an ideal system which has a maximum coverage area with a minimum power consumption, both hexagon geometric structure and holographic Light Shaping Diffuser (LSD) are employed....

    Provided By Liverpool John Moores University

  • White Papers // Jun 2011

    Small Antennas for Cognitive Radio Using Negative Impedance Converters

    There is a need for small antennas in mobile and handheld cognitive radios. These antennas are also required to be either wideband or have a wide tuning range. The authors used a non-Foster matching network to achieve wideband matching and also demonstrate tuning. They also simulated the noise and Inter-Modulation...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2010

    Security Index Measurement Using Weight System

    The media often reports shocking stories regarding attacks to the networks of well-known companies and organisations with headlines announcing either millions of pounds worth of financial loss or exposing public security issues. The most common attacking methods take advantage of the weakness of operating systems, the bugs found in certain...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2010

    Asserting User Identity in Pervasive Computing Environments Using a Non-Intrusive Technique

    Pervasive computing environments are exciting new vision of the new computing era due to the recent wide advances in wireless communication and digital electronics. These environments are small smart worlds that have many advantages such as the continuous and distributed interaction with people using a variety of wireless devices (such...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2010

    Pre-Emptive File Signature Creation for Digital Forensics

    An emerging trend in the way users access their data is threatening to undermine the processes and techniques currently employed by digital forensics investigations. The storage of data in distant, distributed large-scale storage platforms prevents the detection of illicit files on a suspect's hard drive, as this is no longer...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2010

    Pypette: A Framework for the Automated Evaluation of Live Digital Forensic Techniques

    With the increasing scale of digital forensic investigations, there is a need for approaches that are capable of reducing the quantities of data forensic examiners are required to search. Meanwhile, as anti-forensic and encryption techniques evolve, there is an increasing need to capture relevant information from a machine before powering...

    Provided By Liverpool John Moores University

  • White Papers // Aug 2012

    High Performance OFDM Systems for Digital Video Broadcasting-Terrestrial (DVB-T)

    Digital wireless communication has become one of the most exciting research topics in the electrical and electronic engineering field due to the explosive demands for high-speed wireless services, such as cellular video conferencing. Digital Video Broadcasting-Terrestrial-Second generation (DVB-T2) has been demonstrated to provide services with very high spectral efficiency and...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2012

    A Survey of Trust Management in Mobile Ad-Hoc Networks

    Distributed ad-hoc networks with no centralised node of command such as MANETs offer an interesting challenge in establishing trust between nodes for the purposes of network security. As a subjective measure of belief for behaviour; trust values can be calculated and propagated between each node to promote confidence between cooperating...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2012

    Energy Efficient Clustering Approach for Cooperative Spectrum Sensing in Cognitive Radio Networks

    Spectrum sensing is the key element in cognitive radio networks for detecting the primary users. Due to the destructive conditions of sensing channel such as multipath fading and shadowing, local sensing is not fitting the requirements for reliable detection. Therefore, cooperative spectrum sensing is introduced to detect the primary user...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2010

    Device-Free Passive Localisation Using RSSI-Based Wireless Network Nodes

    In recent years, the use of wireless sensor networks has increased. This is due in part to the increasing miniaturization, decreasing costs and the identification of real-world scenarios where sensors can be deployed. Devicefree Passive (DfP) localisation is the identification of a person without the need for any physical devices...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2010

    Sensor Networks Management: A Survey

    Wireless Sensor Networks (WSNs) have gradually established interests of developing new wireless monitoring and environmental control applications in the twenty-first century. The ad hoc nature and deploy-and-leave vision make it even more attractive in applications i.e. environmental monitoring, medical, safety, transportation and military. Most of these WSN applications share similar...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2010

    A Survey of Communication and Sensing for Energy Management of Appliances

    Concerns about climate change and dwindling legacy energy sources has lead to pressing energy management focus. Smart Grid has been a key concept in beginning to address these concerns. This paper focuses on the edge of the smart grid and the control and management of energy consumption in appliances. The...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2010

    An Overview of Holes in Wireless Sensor Network

    Sensor technology is implemented in a wide range of applications. The ability of wireless sensor network to work without being monitored by individual has made it favorite for deployment in hostile hazardous environment such as deep wild forests, battlefields and volcanic mountains. In such conditions, various factors can affect the...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2010

    Contribution Time-Based Selfish Nodes Detection Scheme

    ln a Mobile Ad hoc NETwork (MANET), each node has to rely on others to relay its packets. Since most mobile nodes are typically constrained by power and computing resources, some nodes may choose not to cooperative by refusing to do so while still using the network to forward their...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2010

    Node Feed-Back Based TCP Scheme for Mobile Ad-Hoc Network

    TCP is a reliable connection oriented transport layer protocol widely used for the Internet. But its performance decreases when deployed over mobile ad-hoc networks. TCP assumes all packets losses are due to congestion therefore invoking congestion control mechanism thus reducing network throughput. Many schemes have been reported to improve TCP...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2010

    Vehicular Network Communications: Research Challenges and Future Directions

    The technology within vehicles has evolved over the years offering drivers various facilities. This paper will present how Vehicle To Vehicle (V2V) communication can be enhanced using an ad hoc network design. This paper also relates the communication technology that is and has been available for many previous years. It...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2010

    A Novel Blind Spectrum Sensing Approach for Cognitive Radios

    Cognitive radio is believed to facilitate an efficient utilization of radio spectrum. Blind spectrum sensing is a key requirement enabling a cognitive radio technology by creating an awareness of other users' activities. This paper presents a novel blind spectrum sensing technique with a computationally efficient signal processing scheme which can...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2010

    Experimental Investigation of the Performance of OOK-NRZ and RZ Modulation Techniques Under Controlled Turbulence Channel in FSO Systems

    A number of modulation schemes have been proposed and thoroughly studied for the successful operation of the Optical Wireless Communication (OWC). Each modulation scheme has its advantages and disadvantages for the particular channel conditions. In this paper, the comparative studies of On-Off Keying (OOK) Return-to-Zero (RZ) and Non-Return-to-Zero (NRZ) modulation...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2010

    A Survey of Blind Search Techniques in Structured P2P Networks

    The ability to perform complex queries is one of the most important features in many of the P2P networks actually deployed today. While structured P2P networks can provide very efficient look-up operations via a Distributed Hash Table (DHT) interface, they traditionally do not provide any methods for complex queries. This...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2010

    Supporting Elastic Cloud Computation With Intention Description Language

    The continuing shift towards cloud computing is a major influence in today's industry. The proliferation and availability of cloud computing facilities, including on-demand platforms, on-premises platforms and Platform as a Service (PaaS), is a key part of that shift. Theoretically, therefore, it ought to be straightforward to create a new...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2010

    Simulation Based Analysis on Applicability of Active Measurement Over Wireless Access

    Packet Level Monitoring has been performed using both active and passive measurement techniques. If used appropriately, these techniques allow network parameters (i.e. delay, loss, and bandwidth etc) to be accurately evaluated, and hence used in fault and performance measurement, network provisioning, and traffic engineering and performance prediction. The authors investigated...

    Provided By Liverpool John Moores University

  • White Papers // Jun 2010

    Simulation Tools for Use in Mobile Ad-Hoc Networks

    This paper discusses and evaluates three of the most popular simulator tools available (NS-2, GloMoSim and OPNET) that enable researchers to conduct work in the field of Mobile Ad-Hoc Networks. The paper discusses, how each of the three simulators operates, the accessibility, ease of installation, reported bugs, available documentation, the...

    Provided By Liverpool John Moores University

  • White Papers // May 2009

    Network Operator Independent Resilient Overlay for Mission Critical Applications

    This paper proposes a Resilient Overlay for Mission Critical Applications (ROMCA); a novel operator-independent overlay architecture providing a resilient and reliable service across wide-area networks. Resilience is achieved by combining centralized topology construction control and distributed dynamic mapping of paths onto the overlay topology according to network conditions. ROMCA can...

    Provided By Liverpool John Moores University

  • White Papers // May 2009

    A Generic Architecture Implementing a Formal Context Model for Context-Aware Systems

    Since context aware systems differ in the way they interact with users, the way they interpret the context of its entities and the actions they need to take, each individual system is developed in its own way with no common architecture. A number of architectures have been proposed which are...

    Provided By Liverpool John Moores University