Middlesex University

Displaying 1-24 of 24 results

  • White Papers // Nov 2013

    Server Clustering Technology & Concept

    Server cluster is one of the clustering technologies; it is use for the improvement of the PC's performance; cluster use for the high performance of computing system. It is based on the model of the cluster architecture. This model is refers that how servers manage in the cluster. Server cluster...

    Provided By Middlesex University

  • White Papers // Oct 2013

    A Mechanics for Assuring Data Storage Security in Cloud Computing

    Cloud computing has been visualized as the next generation architecture of IT enterprise. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centers, where the management of the data and...

    Provided By Middlesex University

  • White Papers // Mar 2013

    A Novel Security Protocol for Resolving Addresses in the Location/ID Split Architecture

    The Locator/ID Separation Protocol (LISP) is a routing architecture that provides new semantics for IP addressing. In order to simplify routing operations and improve scalability in future Internet, the LISP uses two different numbering spaces to separate the device identifier from its location. In other words, the LISP separates the...

    Provided By Middlesex University

  • White Papers // Dec 2012

    Secure Routing Protocol Using Cross-Layer Design and Energy Harvesting in Wireless Sensor Networks

    Energy efficiency is the main concern of research community while designing routing protocols for Wireless Sensor Networks (WSNs). This concern can be addressed by using energy-harvesting scheme in routing protocols. In this paper, the authors propose a secure routing protocol that is based on cross layer design and energy-harvesting mechanism....

    Provided By Middlesex University

  • White Papers // Dec 2012

    Enhancing the Modelling of Vertical Handover in Integrated Cellular/WLAN Environments

    In this paper, the authors present a new analytical model to enhance the modeling of vertical handover for integrated cellular/WLAN systems. The WLAN system considered is within the coverage area of cellular network; hence users can have a downward vertical handover to the WLAN and/or an upward vertical handover to...

    Provided By Middlesex University

  • White Papers // Nov 2012

    An Efficient Cooperative Retransmission for Wireless Regenerative Relay Networks

    This paper considers retransmission mechanisms in wireless regenerative relay networks. The retransmission can be realized in a cooperative manner with the assistance of all available relays. This may result in high overall power consumption due to a considerable number of overlapped packets in the retransmission, especially when the number of...

    Provided By Middlesex University

  • White Papers // Jul 2012

    A Survey on Authentication and Key Agreement Protocols in Heterogeneous Networks

    Unlike current closed systems such as 2nd and 3rd generations where the core network is controlled by a sole network operator, multiple network operators will coexist and manage the core network in Next Generation Networks (NGNs). This open architecture and the collaboration between different network operators will support ubiquitous connectivity...

    Provided By Middlesex University

  • White Papers // Mar 2012

    A Survey of Potential Architectures for Communication in Heterogeneous Networks

    An increasingly wireless world will mean that devices with multiple network interfaces will soon become commonplace. Users will expect to be always connected from anywhere and at any time as connections will be switched to available networks using handover techniques. However, different networks have different Qualities of Service (QoS) so...

    Provided By Middlesex University

  • White Papers // Mar 2012

    Tiered Approach to Infer the Behaviour of Low Entropy Mobile People

    Being able to understand human behaviour and monitoring daily life activities is seen as a significant approach for alleviating functional decline among elderly people. The aim of this paper is to investigate a mechanism that can recognise high level activities and behaviour of low entropy people in order to help...

    Provided By Middlesex University

  • White Papers // Mar 2012

    A Method for Enterprise Architecture Alignment

    Business and ICT strategic alignment remains an ongoing challenge facing organizations as they react to changing requirements by adapting or introducing new technologies to existing infrastructure. Enterprise Architecture (EA) has increasingly become relevant to these demands and as a consequence numerous methods and frameworks have emerged. However these approaches remain...

    Provided By Middlesex University

  • White Papers // Jan 2012

    A Business-Focused IT Service Model for Cloud

    The hitherto limited interpretation of service as deployed in IT value creation and solutions implementation is perhaps a reason why so few IT projects are seen to have successful business outcomes. There are strong indications that the commonly used measures of quality and performance have never been adequate for complex...

    Provided By Middlesex University

  • White Papers // Aug 2011

    Exploring Multi-Homing Issues in Heterogeneous Environments

    Mobile devices with two network interfaces (Wi-Fi and 3G) are already commercially available. Point-to-point communications such as Infrared and Bluetooth are also readily used. In the near future, mobile phones will have several interfaces including satellite and new technologies such as ultra wideband. Hence, the authors must assume that such...

    Provided By Middlesex University

  • White Papers // Jul 2011

    A Survey of Network Coverage Prediction Mechanisms in 4G Heterogeneous Wireless Networks

    Seamless connectivity in 4G wireless networks requires the development of intelligent proactive mechanisms for efficiently predicting vertical handovers. Random device mobility patterns further increase the complexity of the handover process. Geographical topologies such as indoor and outdoor environments also exert additional constraints on network coverage and device mobility. The ability...

    Provided By Middlesex University

  • White Papers // Apr 2011

    Comparison of IEEE 802.11 and IEEE 802.15.4 for Future Green Multichannel Multi-Radio Wireless Sensor Networks

    Multi-channel MAC protocols have recently obtained considerable attention in wireless networking research because they promise to increase capacity of wireless networks significantly by exploiting multiple frequency bands. In this paper, the authors do a comparison between IEEE 802.11 and IEEE 802.15.4 and investigate the performance between both using simulations conducted...

    Provided By Middlesex University

  • White Papers // Aug 2010

    Security Models for Heterogeneous Networking

    Security for Next Generation Networks (NGNs) is an attractive topic for many research groups. The Y-Comm security group believes that a new security approach is needed to address the security challenges in 4G networks. This paper sheds light on the authors' approach of providing security for the Y-Comm architecture as...

    Provided By Middlesex University

  • White Papers // Jul 2010

    Relationship Between Students' Overall Satisfaction From 3D Virtual Learning Spaces and Their Individual Design Components

    3D virtual worlds, such as Second Life, are increasingly being used for delivering e-learning for different genres of students. As part of an ongoing research to evaluate different digital design aspects of using these emergent virtual learning environments, the aim of this paper is to investigate whether the overall satisfaction...

    Provided By Middlesex University

  • White Papers // Jun 2010

    Uncovering a KMSD Approach From Practice

    There is no credible methodology for Knowledge Management Systems Development (KMSD). The authors report on a KMSD approach that has emerged from an investigation based on action research and grounded theory into a number of business problems experienced by organizations. The KMSD approach is highly participatory, requiring full involvement of...

    Provided By Middlesex University

  • White Papers // May 2010

    An Analytical Approach for Performance Analysis of Handoffs in the Next Generation Integrated Cellular Networks and WLANs

    The main feature of the next generation wireless communication systems is the ability to establish ubiquitous and seamless access to various Radio Access Technologies (RATs) and standards. For this reason the integration of cellular and Wireless Local Area Networks (WLANs) and performance evaluation of the interaction between these technologies is...

    Provided By Middlesex University

  • White Papers // Feb 2010

    Semantic Malware Detection

    Polymorphic and metamorphic malware use code obfuscation techniques to construct new variants which preserve the semantics of the original but change the code syntax, evading current compiled code based detection methods. Dynamic slicing is a technique that, given a variable of interest within a program, isolates a relevant subset of...

    Provided By Middlesex University

  • White Papers // Sep 2009

    Customer Value Elasticity, Equi-Value Curves And Value Vectors: Implications For Customer Behaviour And Strategic Marketing

    The analysis presented in the paper uses algebraic and geometric methods to explore the implications of the two different specifications of the customer's value equation, the ratio approach and the subtractive approach, for customer behaviour and strategic marketing decisions. Three key concepts are defined and investigated for each specification of...

    Provided By Middlesex University

  • White Papers // Jun 2009

    Exploring Efficient Imperative Handover Mechanisms for Heterogeneous Wireless Networks

    The Next Generation Internet will provide ubiquitous computing by the seamless operation of heterogeneous wireless networks. It will also provide support for quality-of-service, QoS, fostering new classes of applications and will have a built-in multi-level security environment. A key requirement of this new infrastructure will be support for efficient vertical...

    Provided By Middlesex University

  • White Papers // Dec 2008

    A Client-Based Handoff Mechanism for Mobile IPv6 Wireless Networks

    Mobile IP enables mobile computers to roam transparently in any network. However, the current proposed protocol specification does not support a suitable handoff mechanism to allow a mobile computer to change its point of attachment from one network to another. This paper describes a handoff mechanism for a mobile host...

    Provided By Middlesex University

  • White Papers // Jun 2007

    Proactive Policy Management Using TBVH Mechanism in Heterogeneous Networks

    In order to achieve seamless interoperability in heterogeneous networking, it is vital to improve the context-awareness of the Mobile Node (MN) so that it is able to predict future network conditions with sufficient accuracy. In this paper, the authors introduce a predictive mathematical model for calculating the estimated Time Before...

    Provided By Middlesex University

  • White Papers // Jun 2006

    An Architectural Framework for Heterogeneous Networking

    The growth over the last decade in the use of wireless networking devices has been explosive. Soon many devices will have multiple network interfaces, each with very different characteristics. The authors believe that a framework that encapsulates the key challenges of heterogeneous networking is required. Like a map clearly helps...

    Provided By Middlesex University

  • White Papers // Nov 2012

    An Efficient Cooperative Retransmission for Wireless Regenerative Relay Networks

    This paper considers retransmission mechanisms in wireless regenerative relay networks. The retransmission can be realized in a cooperative manner with the assistance of all available relays. This may result in high overall power consumption due to a considerable number of overlapped packets in the retransmission, especially when the number of...

    Provided By Middlesex University

  • White Papers // Jun 2010

    Uncovering a KMSD Approach From Practice

    There is no credible methodology for Knowledge Management Systems Development (KMSD). The authors report on a KMSD approach that has emerged from an investigation based on action research and grounded theory into a number of business problems experienced by organizations. The KMSD approach is highly participatory, requiring full involvement of...

    Provided By Middlesex University

  • White Papers // Jun 2009

    Exploring Efficient Imperative Handover Mechanisms for Heterogeneous Wireless Networks

    The Next Generation Internet will provide ubiquitous computing by the seamless operation of heterogeneous wireless networks. It will also provide support for quality-of-service, QoS, fostering new classes of applications and will have a built-in multi-level security environment. A key requirement of this new infrastructure will be support for efficient vertical...

    Provided By Middlesex University

  • White Papers // Sep 2009

    Customer Value Elasticity, Equi-Value Curves And Value Vectors: Implications For Customer Behaviour And Strategic Marketing

    The analysis presented in the paper uses algebraic and geometric methods to explore the implications of the two different specifications of the customer's value equation, the ratio approach and the subtractive approach, for customer behaviour and strategic marketing decisions. Three key concepts are defined and investigated for each specification of...

    Provided By Middlesex University

  • White Papers // Jul 2010

    Relationship Between Students' Overall Satisfaction From 3D Virtual Learning Spaces and Their Individual Design Components

    3D virtual worlds, such as Second Life, are increasingly being used for delivering e-learning for different genres of students. As part of an ongoing research to evaluate different digital design aspects of using these emergent virtual learning environments, the aim of this paper is to investigate whether the overall satisfaction...

    Provided By Middlesex University

  • White Papers // May 2010

    An Analytical Approach for Performance Analysis of Handoffs in the Next Generation Integrated Cellular Networks and WLANs

    The main feature of the next generation wireless communication systems is the ability to establish ubiquitous and seamless access to various Radio Access Technologies (RATs) and standards. For this reason the integration of cellular and Wireless Local Area Networks (WLANs) and performance evaluation of the interaction between these technologies is...

    Provided By Middlesex University

  • White Papers // Apr 2011

    Comparison of IEEE 802.11 and IEEE 802.15.4 for Future Green Multichannel Multi-Radio Wireless Sensor Networks

    Multi-channel MAC protocols have recently obtained considerable attention in wireless networking research because they promise to increase capacity of wireless networks significantly by exploiting multiple frequency bands. In this paper, the authors do a comparison between IEEE 802.11 and IEEE 802.15.4 and investigate the performance between both using simulations conducted...

    Provided By Middlesex University

  • White Papers // Feb 2010

    Semantic Malware Detection

    Polymorphic and metamorphic malware use code obfuscation techniques to construct new variants which preserve the semantics of the original but change the code syntax, evading current compiled code based detection methods. Dynamic slicing is a technique that, given a variable of interest within a program, isolates a relevant subset of...

    Provided By Middlesex University

  • White Papers // Jul 2012

    A Survey on Authentication and Key Agreement Protocols in Heterogeneous Networks

    Unlike current closed systems such as 2nd and 3rd generations where the core network is controlled by a sole network operator, multiple network operators will coexist and manage the core network in Next Generation Networks (NGNs). This open architecture and the collaboration between different network operators will support ubiquitous connectivity...

    Provided By Middlesex University

  • White Papers // Mar 2012

    Tiered Approach to Infer the Behaviour of Low Entropy Mobile People

    Being able to understand human behaviour and monitoring daily life activities is seen as a significant approach for alleviating functional decline among elderly people. The aim of this paper is to investigate a mechanism that can recognise high level activities and behaviour of low entropy people in order to help...

    Provided By Middlesex University

  • White Papers // Jan 2012

    A Business-Focused IT Service Model for Cloud

    The hitherto limited interpretation of service as deployed in IT value creation and solutions implementation is perhaps a reason why so few IT projects are seen to have successful business outcomes. There are strong indications that the commonly used measures of quality and performance have never been adequate for complex...

    Provided By Middlesex University

  • White Papers // Mar 2013

    A Novel Security Protocol for Resolving Addresses in the Location/ID Split Architecture

    The Locator/ID Separation Protocol (LISP) is a routing architecture that provides new semantics for IP addressing. In order to simplify routing operations and improve scalability in future Internet, the LISP uses two different numbering spaces to separate the device identifier from its location. In other words, the LISP separates the...

    Provided By Middlesex University

  • White Papers // Nov 2013

    Server Clustering Technology & Concept

    Server cluster is one of the clustering technologies; it is use for the improvement of the PC's performance; cluster use for the high performance of computing system. It is based on the model of the cluster architecture. This model is refers that how servers manage in the cluster. Server cluster...

    Provided By Middlesex University

  • White Papers // Oct 2013

    A Mechanics for Assuring Data Storage Security in Cloud Computing

    Cloud computing has been visualized as the next generation architecture of IT enterprise. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centers, where the management of the data and...

    Provided By Middlesex University

  • White Papers // Dec 2012

    Secure Routing Protocol Using Cross-Layer Design and Energy Harvesting in Wireless Sensor Networks

    Energy efficiency is the main concern of research community while designing routing protocols for Wireless Sensor Networks (WSNs). This concern can be addressed by using energy-harvesting scheme in routing protocols. In this paper, the authors propose a secure routing protocol that is based on cross layer design and energy-harvesting mechanism....

    Provided By Middlesex University

  • White Papers // Mar 2012

    A Method for Enterprise Architecture Alignment

    Business and ICT strategic alignment remains an ongoing challenge facing organizations as they react to changing requirements by adapting or introducing new technologies to existing infrastructure. Enterprise Architecture (EA) has increasingly become relevant to these demands and as a consequence numerous methods and frameworks have emerged. However these approaches remain...

    Provided By Middlesex University

  • White Papers // Jun 2006

    An Architectural Framework for Heterogeneous Networking

    The growth over the last decade in the use of wireless networking devices has been explosive. Soon many devices will have multiple network interfaces, each with very different characteristics. The authors believe that a framework that encapsulates the key challenges of heterogeneous networking is required. Like a map clearly helps...

    Provided By Middlesex University

  • White Papers // Aug 2011

    Exploring Multi-Homing Issues in Heterogeneous Environments

    Mobile devices with two network interfaces (Wi-Fi and 3G) are already commercially available. Point-to-point communications such as Infrared and Bluetooth are also readily used. In the near future, mobile phones will have several interfaces including satellite and new technologies such as ultra wideband. Hence, the authors must assume that such...

    Provided By Middlesex University

  • White Papers // Jul 2011

    A Survey of Network Coverage Prediction Mechanisms in 4G Heterogeneous Wireless Networks

    Seamless connectivity in 4G wireless networks requires the development of intelligent proactive mechanisms for efficiently predicting vertical handovers. Random device mobility patterns further increase the complexity of the handover process. Geographical topologies such as indoor and outdoor environments also exert additional constraints on network coverage and device mobility. The ability...

    Provided By Middlesex University

  • White Papers // Dec 2008

    A Client-Based Handoff Mechanism for Mobile IPv6 Wireless Networks

    Mobile IP enables mobile computers to roam transparently in any network. However, the current proposed protocol specification does not support a suitable handoff mechanism to allow a mobile computer to change its point of attachment from one network to another. This paper describes a handoff mechanism for a mobile host...

    Provided By Middlesex University

  • White Papers // Jun 2007

    Proactive Policy Management Using TBVH Mechanism in Heterogeneous Networks

    In order to achieve seamless interoperability in heterogeneous networking, it is vital to improve the context-awareness of the Mobile Node (MN) so that it is able to predict future network conditions with sufficient accuracy. In this paper, the authors introduce a predictive mathematical model for calculating the estimated Time Before...

    Provided By Middlesex University

  • White Papers // Aug 2010

    Security Models for Heterogeneous Networking

    Security for Next Generation Networks (NGNs) is an attractive topic for many research groups. The Y-Comm security group believes that a new security approach is needed to address the security challenges in 4G networks. This paper sheds light on the authors' approach of providing security for the Y-Comm architecture as...

    Provided By Middlesex University

  • White Papers // Mar 2012

    A Survey of Potential Architectures for Communication in Heterogeneous Networks

    An increasingly wireless world will mean that devices with multiple network interfaces will soon become commonplace. Users will expect to be always connected from anywhere and at any time as connections will be switched to available networks using handover techniques. However, different networks have different Qualities of Service (QoS) so...

    Provided By Middlesex University

  • White Papers // Dec 2012

    Enhancing the Modelling of Vertical Handover in Integrated Cellular/WLAN Environments

    In this paper, the authors present a new analytical model to enhance the modeling of vertical handover for integrated cellular/WLAN systems. The WLAN system considered is within the coverage area of cellular network; hence users can have a downward vertical handover to the WLAN and/or an upward vertical handover to...

    Provided By Middlesex University