National University of Science and Technology

Displaying 1-10 of 10 results

  • White Papers // Mar 2013

    Chaos Based Optical Communication

    Chaos based communication has been a very attractive research field from last couple of decades due to its potential of providing secure communication. In this paper, the authors reviewed principles and theory governing the field of chaos. They studied governing principles and different methods for chaotic signal generation and schemes...

    Provided By National University of Science and Technology

  • White Papers // Jan 2013

    Improving the Performance of the IEEE 802.11 Distributed Coordination Function

    IEEE 802.11 is the most popular Wireless LAN (WLAN) system in the world today. The primary Medium Access Control (MAC) technique of 802.11 is Distributed Coordination Function (DCF). DCF is a Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) scheme with binary slotted exponential back-off. In DCF of IEEE 802.11,...

    Provided By National University of Science and Technology

  • White Papers // Dec 2012

    User Psychology and Behavioral Effect on Palmprint and Fingerprint Based Multimodal Biometric System

    The ever increasing demand of security has resulted in wide use of Biometric systems. Despite overcoming the traditional verification problems, the unimodal systems suffer from various challenges like intra class variation, noise in the sensor data etc, affecting the system performance. These problems are effectively handled by multimodal systems. User...

    Provided By National University of Science and Technology

  • White Papers // Nov 2011

    Risk Analysis of Inter Base-Station Dynamic Resource Sharing in IEEE- 802.22 MAC Layer Protocol

    Security is always a key concern for the networks. This paper concentrates on security threats of Inter Base-station Dynamic Resource Sharing, one of the key features of IEEE-802.22. This paper has identified weak spot related to channel release requests during resource sharing process and has proposed an augmented crossbreed approach...

    Provided By National University of Science and Technology

  • White Papers // Sep 2010

    An Optimistic Parallel Simulation Protocol for Cloud Computing Environments

    Cloud computing offers the ability to provide parallel and distributed simulation services remotely to users through the Internet. Services hosted within the "Cloud" can potentially incur processing delays due to load sharing among other active services, and can cause optimistic simulation protocols to perform poorly. This paper discusses problems such...

    Provided By National University of Science and Technology

  • White Papers // Jun 2010

    Document Topic Generation in Text Mining by Using Cluster Analysis With EROCK

    Clustering is useful technique in the field of textual data mining. Cluster analysis divides objects into meaningful groups based on similarity between objects. Copious material is available from the World Wide Web (WWW) in response to any user-provided query. It becomes tedious for the user to manually extract real required...

    Provided By National University of Science and Technology

  • White Papers // Mar 2010

    A Novel QoS Optimization Architecture for 4G Networks

    4G Communication Networks provide heterogeneous wireless technologies to mobile subscribers through IP based networks and users can avail high speed access while roaming across multiple wireless channels; possible by an organized way to manage the Quality of Service (QoS) functionalities in these networks. This paper proposes the idea of developing...

    Provided By National University of Science and Technology

  • White Papers // Jun 2009

    A Novel Two-Staged Decision Support Based Threat Evaluation and Weapon Assignment Algorithm

    Surveillance Control and Reporting (SCR) system for air threats play an important role in the defense of a country. SCR system corresponds to air and ground situation management/processing along with information fusion, communication, coordination, simulation and other critical defense oriented tasks. Threat Evaluation and Weapon Assignment (TEWA) sits at the...

    Provided By National University of Science and Technology

  • White Papers // Jun 2009

    Reduction of Overheads With Dynamic Caching in Fixed AODV Based MANETs

    By definition, "An ad hoc network is a collection of wireless mobile hosts forming a temporary network without aid of any centralized administration or standard support services regularly available on the wide-area network to which the host may normally be connected". MANET has afforded a new dimension in wireless networking;...

    Provided By National University of Science and Technology

  • White Papers // Dec 2007

    Depth-in-Defense Approach Against DDoS

    Distributed Denial-of-Service attacks (DDoS) impose a great threat to the availability of resources. Not only is the attack difficult to carryout but also the methods and techniques used to prevent these attacks are so complex that it makes the job to protect the resources even harder. An analysis is carried...

    Provided By National University of Science and Technology

  • White Papers // Jun 2010

    Document Topic Generation in Text Mining by Using Cluster Analysis With EROCK

    Clustering is useful technique in the field of textual data mining. Cluster analysis divides objects into meaningful groups based on similarity between objects. Copious material is available from the World Wide Web (WWW) in response to any user-provided query. It becomes tedious for the user to manually extract real required...

    Provided By National University of Science and Technology

  • White Papers // Jun 2009

    A Novel Two-Staged Decision Support Based Threat Evaluation and Weapon Assignment Algorithm

    Surveillance Control and Reporting (SCR) system for air threats play an important role in the defense of a country. SCR system corresponds to air and ground situation management/processing along with information fusion, communication, coordination, simulation and other critical defense oriented tasks. Threat Evaluation and Weapon Assignment (TEWA) sits at the...

    Provided By National University of Science and Technology

  • White Papers // Jun 2009

    Reduction of Overheads With Dynamic Caching in Fixed AODV Based MANETs

    By definition, "An ad hoc network is a collection of wireless mobile hosts forming a temporary network without aid of any centralized administration or standard support services regularly available on the wide-area network to which the host may normally be connected". MANET has afforded a new dimension in wireless networking;...

    Provided By National University of Science and Technology

  • White Papers // Nov 2011

    Risk Analysis of Inter Base-Station Dynamic Resource Sharing in IEEE- 802.22 MAC Layer Protocol

    Security is always a key concern for the networks. This paper concentrates on security threats of Inter Base-station Dynamic Resource Sharing, one of the key features of IEEE-802.22. This paper has identified weak spot related to channel release requests during resource sharing process and has proposed an augmented crossbreed approach...

    Provided By National University of Science and Technology

  • White Papers // Jan 2013

    Improving the Performance of the IEEE 802.11 Distributed Coordination Function

    IEEE 802.11 is the most popular Wireless LAN (WLAN) system in the world today. The primary Medium Access Control (MAC) technique of 802.11 is Distributed Coordination Function (DCF). DCF is a Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) scheme with binary slotted exponential back-off. In DCF of IEEE 802.11,...

    Provided By National University of Science and Technology

  • White Papers // Mar 2013

    Chaos Based Optical Communication

    Chaos based communication has been a very attractive research field from last couple of decades due to its potential of providing secure communication. In this paper, the authors reviewed principles and theory governing the field of chaos. They studied governing principles and different methods for chaotic signal generation and schemes...

    Provided By National University of Science and Technology

  • White Papers // Mar 2010

    A Novel QoS Optimization Architecture for 4G Networks

    4G Communication Networks provide heterogeneous wireless technologies to mobile subscribers through IP based networks and users can avail high speed access while roaming across multiple wireless channels; possible by an organized way to manage the Quality of Service (QoS) functionalities in these networks. This paper proposes the idea of developing...

    Provided By National University of Science and Technology

  • White Papers // Sep 2010

    An Optimistic Parallel Simulation Protocol for Cloud Computing Environments

    Cloud computing offers the ability to provide parallel and distributed simulation services remotely to users through the Internet. Services hosted within the "Cloud" can potentially incur processing delays due to load sharing among other active services, and can cause optimistic simulation protocols to perform poorly. This paper discusses problems such...

    Provided By National University of Science and Technology

  • White Papers // Dec 2012

    User Psychology and Behavioral Effect on Palmprint and Fingerprint Based Multimodal Biometric System

    The ever increasing demand of security has resulted in wide use of Biometric systems. Despite overcoming the traditional verification problems, the unimodal systems suffer from various challenges like intra class variation, noise in the sensor data etc, affecting the system performance. These problems are effectively handled by multimodal systems. User...

    Provided By National University of Science and Technology

  • White Papers // Dec 2007

    Depth-in-Defense Approach Against DDoS

    Distributed Denial-of-Service attacks (DDoS) impose a great threat to the availability of resources. Not only is the attack difficult to carryout but also the methods and techniques used to prevent these attacks are so complex that it makes the job to protect the resources even harder. An analysis is carried...

    Provided By National University of Science and Technology