National University of Sciences and Technology

Displaying 1-15 of 15 results

  • White Papers // Dec 2012

    An Analysis of QoS specific Coherence Issues in Distributed Networks

    Distributed Systems remained one of the most recent development fields in computing research. The parallel applications development faced enormous hindrance in QoS delivery due to resource hungry queuing models and complex memory patterns. Being a collection of multiple autonomous systems, a distributed system's efficiency lies in best coordination of its...

    Provided By National University of Sciences and Technology

  • White Papers // May 2012

    A Spectrum Exploitation Scheme With Channel Assignment for Genetic Algorithm Based Adaptive-Array Smart Antennas in Cognitive Radio Networks

    Cognitive radios are increasingly being used for better utilization of licensed spectrum. Most of the work has been done on exploitation of time and frequency domain while code and space dimension have not been intensively explored for improving spectrum utilization. In this paper, the authors investigate exploitation of time and...

    Provided By National University of Sciences and Technology

  • White Papers // May 2012

    Pilot Assisted SNR Estimation in a Non-Coherent M-FSK Receiver With a Carrier Frequency Offset

    Pilot-assisted estimation of Signal-to-Noise Ratio (SNR) is considered for an orthogonal non-coherent M-ary FSK receiver having a Carrier Frequency Offset (CFO) at the front end. The received signal is also corrupted by symbol-rate Rayleigh fading and additive white Gaussian noise. A two-step estimation procedure is designed by observing received data...

    Provided By National University of Sciences and Technology

  • White Papers // Apr 2012

    A Novel Approach for Tracking of a Mobile Node Based on Particle Filter and Trilateration

    In this paper, the authors evaluate the performance of a novel algorithm for tracking of a mobile node, interms of execution time and Root Mean Square Error (RMSE). Particle Filter algorithm is used to track the mobile node, however a new technique in particle filter algorithm is also proposed to...

    Provided By National University of Sciences and Technology

  • White Papers // Mar 2012

    A Utility Based Resource Allocation Scheme With Delay Scheduler for LTE Service-Class Support

    LTE standard defines strict requirements for service classes in order to provide end users with exceptional QoS characteristics including fast connectivity and high data rates. However there is no standard scheduling algorithm defined for LTE and the task of protecting end user satisfaction while maintaining service class restrictions is left...

    Provided By National University of Sciences and Technology

  • White Papers // Mar 2012

    Cryptanalysis of a Non-Interactive Deniable Authentication Protocol Based on Factoring

    A deniable authentication protocol allows a sender to transfer an authenticated message to a receiver in such a way that the receiver cannot prove to a third party about the source of the message. In recent years, many deniable authentication protocols have been proposed. In 2005, Lu et al. proposed...

    Provided By National University of Sciences and Technology

  • White Papers // Jan 2012

    Application of Java-Based Pointcuts in Aspect Oriented Programming (AOP) for Data Race Detection

    Wide applicability of concurrent programming practices in developing various software applications leads to different concurrency errors amongst which data race is the most important. Java provides greatest support for concurrent programming by introducing various concurrency packages. Aspect Oriented Programming (AOP) is modern programming paradigm facilitating the run-time interception of events...

    Provided By National University of Sciences and Technology

  • White Papers // Dec 2011

    Out-of-Band Wormhole Attack Detection in Manets

    Mobile Ad hoc NETworks (MANETs) are prone to a variety of attacks due to their unique characteristics such as dynamic topology, open wireless medium, absence of infrastructure, multi-hop nature and resource constraints. Any node in mobile ad hoc networks operates not only as end terminal but both as an intermediate...

    Provided By National University of Sciences and Technology

  • White Papers // Dec 2011

    Performance Analysis of MIH Based Multihoming Approach of Vertical Handover in Heterogeneous Wireless Networks

    Mobility management in heterogeneous wireless networks is always considered as a challenging task in terms of interoperability, service availability and session continuity. This research proposes a new IEEE 802.21 based multihoming architecture for vertical handover between heterogeneous wireless networks. The framework is used to optimize handover at Link Layer (L2)...

    Provided By National University of Sciences and Technology

  • White Papers // Dec 2010

    A New Approach to Face Recognition Using Dual Dimension Reduction

    In this paper a new approach to face recognition is presented that achieves double dimension reduction, making the system computationally efficient with better recognition results and out perform common DCT technique of face recognition. In pattern recognition techniques, discriminative information of image increases with increase in resolution to a certain...

    Provided By National University of Sciences and Technology

  • White Papers // Dec 2010

    A Hybrid Artificial Immune System (AIS) Model for Power Aware Secure Mobile Ad Hoc Networks (MANETs) Routing Protocols

    Securing ad hoc routing protocols for MANETs is a significant challenge due to number of reasons: mobility results in continuously changing network topology - the premise of stable self or non-self is void, the proposed security solution must be lightweight so that it can be deployed on resource constrained mobile...

    Provided By National University of Sciences and Technology

  • White Papers // Oct 2010

    Hole Healing Energy Aware Algorithm for Wireless Sensor Networks

    Wireless sensor networks are composed of very small nodes having limited resources. One of those resources is energy available in the form of battery. Efficient use of this energy is a challenging factor in designing a routing protocol. Void areas are created due to early loss of energy of a...

    Provided By National University of Sciences and Technology

  • White Papers // Oct 2009

    Embedding a Covert Channel in Active Network Connections

    Covert timing channels exploit varying packet rates between synchronized sending and receiving hosts to transmit hidden information. The overhead in synchronizing covert timing channels and their inherent dependence on network conditions are their main drawbacks. In this paper, the authors propose a covert channel using multiple active connections that does...

    Provided By National University of Sciences and Technology

  • White Papers // Jul 2009

    ESBASCA: A Novel Software Clustering Approach

    Maintenance is one of the key phases of software development life cycle, for long-term effective use of any software. It can become very lengthy and costly for large software systems, especially when subsystem boundaries are not clearly defined. System evolution, lack of up-to-date documentation and high turnover rate of software...

    Provided By National University of Sciences and Technology

  • White Papers // Jun 2009

    Addressing Security Concerns of Data Exchange in AODV Protocol

    The Ad Hoc On demand Distance Vector (AODV) routing protocol is designed for Mobile Ad hoc NETworks (MANETs). AODV offers quick adaptation to dynamic link conditions; it is characterized by low memory overhead and low network utilization. The security issues related to the protocol remain challenging for the wireless network...

    Provided By National University of Sciences and Technology

  • White Papers // Dec 2012

    An Analysis of QoS specific Coherence Issues in Distributed Networks

    Distributed Systems remained one of the most recent development fields in computing research. The parallel applications development faced enormous hindrance in QoS delivery due to resource hungry queuing models and complex memory patterns. Being a collection of multiple autonomous systems, a distributed system's efficiency lies in best coordination of its...

    Provided By National University of Sciences and Technology

  • White Papers // Apr 2012

    A Novel Approach for Tracking of a Mobile Node Based on Particle Filter and Trilateration

    In this paper, the authors evaluate the performance of a novel algorithm for tracking of a mobile node, interms of execution time and Root Mean Square Error (RMSE). Particle Filter algorithm is used to track the mobile node, however a new technique in particle filter algorithm is also proposed to...

    Provided By National University of Sciences and Technology

  • White Papers // Oct 2009

    Embedding a Covert Channel in Active Network Connections

    Covert timing channels exploit varying packet rates between synchronized sending and receiving hosts to transmit hidden information. The overhead in synchronizing covert timing channels and their inherent dependence on network conditions are their main drawbacks. In this paper, the authors propose a covert channel using multiple active connections that does...

    Provided By National University of Sciences and Technology

  • White Papers // Jun 2009

    Addressing Security Concerns of Data Exchange in AODV Protocol

    The Ad Hoc On demand Distance Vector (AODV) routing protocol is designed for Mobile Ad hoc NETworks (MANETs). AODV offers quick adaptation to dynamic link conditions; it is characterized by low memory overhead and low network utilization. The security issues related to the protocol remain challenging for the wireless network...

    Provided By National University of Sciences and Technology

  • White Papers // Dec 2010

    A New Approach to Face Recognition Using Dual Dimension Reduction

    In this paper a new approach to face recognition is presented that achieves double dimension reduction, making the system computationally efficient with better recognition results and out perform common DCT technique of face recognition. In pattern recognition techniques, discriminative information of image increases with increase in resolution to a certain...

    Provided By National University of Sciences and Technology

  • White Papers // Oct 2010

    Hole Healing Energy Aware Algorithm for Wireless Sensor Networks

    Wireless sensor networks are composed of very small nodes having limited resources. One of those resources is energy available in the form of battery. Efficient use of this energy is a challenging factor in designing a routing protocol. Void areas are created due to early loss of energy of a...

    Provided By National University of Sciences and Technology

  • White Papers // Jul 2009

    ESBASCA: A Novel Software Clustering Approach

    Maintenance is one of the key phases of software development life cycle, for long-term effective use of any software. It can become very lengthy and costly for large software systems, especially when subsystem boundaries are not clearly defined. System evolution, lack of up-to-date documentation and high turnover rate of software...

    Provided By National University of Sciences and Technology

  • White Papers // Dec 2011

    Out-of-Band Wormhole Attack Detection in Manets

    Mobile Ad hoc NETworks (MANETs) are prone to a variety of attacks due to their unique characteristics such as dynamic topology, open wireless medium, absence of infrastructure, multi-hop nature and resource constraints. Any node in mobile ad hoc networks operates not only as end terminal but both as an intermediate...

    Provided By National University of Sciences and Technology

  • White Papers // Jan 2012

    Application of Java-Based Pointcuts in Aspect Oriented Programming (AOP) for Data Race Detection

    Wide applicability of concurrent programming practices in developing various software applications leads to different concurrency errors amongst which data race is the most important. Java provides greatest support for concurrent programming by introducing various concurrency packages. Aspect Oriented Programming (AOP) is modern programming paradigm facilitating the run-time interception of events...

    Provided By National University of Sciences and Technology

  • White Papers // Mar 2012

    Cryptanalysis of a Non-Interactive Deniable Authentication Protocol Based on Factoring

    A deniable authentication protocol allows a sender to transfer an authenticated message to a receiver in such a way that the receiver cannot prove to a third party about the source of the message. In recent years, many deniable authentication protocols have been proposed. In 2005, Lu et al. proposed...

    Provided By National University of Sciences and Technology

  • White Papers // Dec 2011

    Performance Analysis of MIH Based Multihoming Approach of Vertical Handover in Heterogeneous Wireless Networks

    Mobility management in heterogeneous wireless networks is always considered as a challenging task in terms of interoperability, service availability and session continuity. This research proposes a new IEEE 802.21 based multihoming architecture for vertical handover between heterogeneous wireless networks. The framework is used to optimize handover at Link Layer (L2)...

    Provided By National University of Sciences and Technology

  • White Papers // Dec 2010

    A Hybrid Artificial Immune System (AIS) Model for Power Aware Secure Mobile Ad Hoc Networks (MANETs) Routing Protocols

    Securing ad hoc routing protocols for MANETs is a significant challenge due to number of reasons: mobility results in continuously changing network topology - the premise of stable self or non-self is void, the proposed security solution must be lightweight so that it can be deployed on resource constrained mobile...

    Provided By National University of Sciences and Technology

  • White Papers // May 2012

    A Spectrum Exploitation Scheme With Channel Assignment for Genetic Algorithm Based Adaptive-Array Smart Antennas in Cognitive Radio Networks

    Cognitive radios are increasingly being used for better utilization of licensed spectrum. Most of the work has been done on exploitation of time and frequency domain while code and space dimension have not been intensively explored for improving spectrum utilization. In this paper, the authors investigate exploitation of time and...

    Provided By National University of Sciences and Technology

  • White Papers // May 2012

    Pilot Assisted SNR Estimation in a Non-Coherent M-FSK Receiver With a Carrier Frequency Offset

    Pilot-assisted estimation of Signal-to-Noise Ratio (SNR) is considered for an orthogonal non-coherent M-ary FSK receiver having a Carrier Frequency Offset (CFO) at the front end. The received signal is also corrupted by symbol-rate Rayleigh fading and additive white Gaussian noise. A two-step estimation procedure is designed by observing received data...

    Provided By National University of Sciences and Technology

  • White Papers // Mar 2012

    A Utility Based Resource Allocation Scheme With Delay Scheduler for LTE Service-Class Support

    LTE standard defines strict requirements for service classes in order to provide end users with exceptional QoS characteristics including fast connectivity and high data rates. However there is no standard scheduling algorithm defined for LTE and the task of protecting end user satisfaction while maintaining service class restrictions is left...

    Provided By National University of Sciences and Technology