NORTH ATLANTIC UNIVERSITY UNION

Displaying 81-120 of 121 results

  • White Papers // Sep 2010

    An Adaptive Modeling Approach in Collaborative Data and Process-Aware Management Systems

    Informational systems are used to reflect the business they are supposed to assist. This is the reason why each informational system needs a representation of the business objects that are involved in the processes and also the business rules that are applied to the business objects. Every object is simpler...

    Provided By NORTH ATLANTIC UNIVERSITY UNION

  • White Papers // Sep 2010

    Development of a Visualization Tool for XML Documents

    The authors present the development of a prototype system called Angur, which is designed and built for visualization of XML documents. There two main motivations of this paper: to allow the users to explore and manipulate XML documents and to display the search results graphically, in two or three dimensions,...

    Provided By NORTH ATLANTIC UNIVERSITY UNION

  • White Papers // Sep 2010

    Concurrent Differential Evolution Based on MapReduce

    Multi-core processors, which have more than one Central Processing Unit (CPU), have been introduced widely into personal computers. Therefore, in order to utilize the additional cores, or CPUs, to execute various costly application programs, concurrent implementations of them have been paid to attention. MapReduce is a concurrent programming model and...

    Provided By NORTH ATLANTIC UNIVERSITY UNION

  • White Papers // Sep 2010

    Clustering of EEG Data Using Maximum Entropy Method and LVQ

    The study of Extracting ElectroencephaloGram (EEG) data as a source of significant information has recently gained attention. However, since EEG data are complex, it is difficult to extract them as a source of intended, significant information. In order to effectively extract EEG data, this paper employs the Maximum Entropy Method...

    Provided By NORTH ATLANTIC UNIVERSITY UNION

  • White Papers // Sep 2010

    An Intelligent Web-Based GRA/Cointegration Analysis for Systematic Risk

    A new intelligent web-based Grey Relational Analysis (GRA)/cointegration analysis is proposed to examine the effects of cross-border bank M&As on the systematic risk that took place in the American, Asia, Europe, Africa and Middle East of banks in this paper. The potential diversification gains that arise from geographic or cross-border...

    Provided By NORTH ATLANTIC UNIVERSITY UNION

  • White Papers // Sep 2010

    Handoff Tactics for NEMO and Integrated Network

    The authors aim to revise the handoff method for NEMO and integrated 3G and NEMO network. These methods include horizontal handoff in NEMO and vertical handoff in integrated 3G and NEMO network. This paper took advantage of the NEMO's characteristics to propose a novel horizontal handoff method. Besides, they adopt...

    Provided By NORTH ATLANTIC UNIVERSITY UNION

  • White Papers // Sep 2010

    WiMAX Network Design for Cost Minimization and Access Data Rate Guarantee Using Multi-Hop Relay Stations

    Network cost and network quality of services are important concerns in the widespread deployment of WiMAX networks. This paper presents a novel network design and optimization model for mobile WiMAX access networks utilizing multi-hop relays. The proposed model aims to determine optimal locations of base stations and relay stations so...

    Provided By NORTH ATLANTIC UNIVERSITY UNION

  • White Papers // Sep 2010

    A Compact Internal Planar Antenna With a Capacitive Tuner for 3G and 4G Mobile Phone Application

    There have been many antenna designs studied and developed in 3G mobile phone applications. Multiband operation has become a basic requirement for internal antennas to be used in the mobile phone for wireless communication system. These papers are evaluated the multiband antenna operation for the application in 3G wireless communication...

    Provided By NORTH ATLANTIC UNIVERSITY UNION

  • White Papers // Aug 2010

    A Multi-Agent Geo-Simulation Model for Intelligent Sensor Web Spatial Coverage Management Using IVGE

    A Sensor Web (SW) consists of a large collection of small nodes providing collaborative and distributed sensing abilities in unpredictable environments. Nodes composing such a SW are characterized by resource restrictions, especially energy, processing power, and communication capacities. A sensor web can be thought of as a spatially and functionally...

    Provided By NORTH ATLANTIC UNIVERSITY UNION

  • White Papers // Jun 2010

    An Intelligent Distributed Algorithm for Efficient Web Image Retrieval

    Web image retrieval is a challenging task that requires efforts from image processing, web text retrieval, and link structure analysis. General web image retrieval engines such as Google and Yahoo retrieve images according to the meta-data or the context in which the images are found. Hence, the results search engines...

    Provided By NORTH ATLANTIC UNIVERSITY UNION

  • White Papers // Jun 2010

    A Testing Theory for Real-Time Systems

    The authors develop a testing theory for real-time systems. They keep the usual notion of success or failure (based on finite runs) but they also provide a mechanism of determining the success or failure of infinite runs, using a formalism similar to the acceptance in Buchi automata. They present two...

    Provided By NORTH ATLANTIC UNIVERSITY UNION

  • White Papers // Jun 2010

    Analysis of SAR Reduction of Mobile Phones in Heterogeneous Media

    The mutual effect of symmetrical electric dipoles located in the near region of each other is considered. The problem is solved with due account of the space heterogeneity. The results are applied to the compensation method for losses reduction in head of phone user. The cellular phone antennas PIFA and...

    Provided By NORTH ATLANTIC UNIVERSITY UNION

  • White Papers // Jun 2010

    Throughput and Power Consumption Comparisons of Zigbee-based and ISM-Based Implementations of WSAN

    Wireless sensor and actuator networks have expanding applications which requires better throughput, power efficiency and cost effectiveness. This paper intends to contribute to the growing pool of knowledge on WSAN especially in the design for novel applications such as image or video over WSANs, and solar energy and RF energy...

    Provided By NORTH ATLANTIC UNIVERSITY UNION

  • White Papers // Mar 2010

    A Printed Monopole Antenna for Cellular Handsets

    In this paper, the authors propose a modified monopole antenna for use as internal antenna in mobile handsets. In this antenna, called the MB antenna, the radiating element (monopole) is implemented in parallel to a ground plane, without degradation of its radiation characteristics. Simulations show that the MB antenna performs...

    Provided By NORTH ATLANTIC UNIVERSITY UNION

  • White Papers // Mar 2010

    Creating a Service Oriented Architectural Model for Emergency Vehicles

    Finnish police cars have about 40 different user interfaces (radio, navigation, command and control systems, radar, alarm lights, etc.) on the deck beyond the cars' standard user interfaces. In cold weather conditions, not all police vehicles are creating enough electricity for intensive operations. Also, wiring and ergonomics are problematic. The...

    Provided By NORTH ATLANTIC UNIVERSITY UNION

  • White Papers // Mar 2010

    3D Battlefield Modeling and Simulation of War Games

    In this paper, a real time 3D virtual simulation software for visualizing the military battlefields was developed. Developed software, named Sandbox, used elevation data stored in DEM format corresponding to the battlefield. Sandbox uses this data to create the platform on which the military units will be added. Different military...

    Provided By NORTH ATLANTIC UNIVERSITY UNION

  • White Papers // Mar 2010

    New Aspect on Wireless Communication Networks

    This paper provides a detailed picture on computer networks and especially on wireless networks, focusing on specific characteristics of wireless systems. By using MIMO technology (Multiple Input Multiple Output), network logon can be realized at distances much greater. The use of antennas allows reception and transmission of multiple data streams...

    Provided By NORTH ATLANTIC UNIVERSITY UNION

  • White Papers // Mar 2010

    Information Security Risks for Satellite Tracking

    Satellite tracking is one of the most rapidly growing service business areas in the world, and there are already many commercial applications available. Benefits of the service for the customer are advertised, but very seldom there is any mention of information security of the system. Modern satellite tracking systems contain...

    Provided By NORTH ATLANTIC UNIVERSITY UNION

  • White Papers // Nov 2009

    Viewpoint of Probabilistic Risk Assessment in Information Security Audit

    After the information security audit, the auditor commonly points out the importance of information assets, the vulnerability of the audited information system, and the need of countermeasures. On such an occasion, the audited often ask the auditor for the quantitative assessment of the risk so that they can take specific...

    Provided By NORTH ATLANTIC UNIVERSITY UNION

  • White Papers // Sep 2009

    Fingerprint Watermark Embedding by Discrete Cosine Transform for Copyright Ownership Authentication

    In respect to the issues on protecting intellectual property, particular for artistic works in electronic form, some sorts of techniques could be put on a copyright material image to ensure its ownership authentication. In this paper, signatories' biometric fingerprint watermark message in digital format will be embedded into a copyright...

    Provided By NORTH ATLANTIC UNIVERSITY UNION

  • White Papers // Aug 2009

    Novel Approach for Optimization of Cell Planning and Capacity

    Configuration, cost, base station output power are important resources in cellular mobile radio systems. The main idea of cell planning is the maximize capacity in another words number of subscribers and minimize cost at the same time. In a GSM system, where coverage areas are divided into cells in planning...

    Provided By NORTH ATLANTIC UNIVERSITY UNION

  • White Papers // Aug 2009

    Generic Interactive Natural Language Interface to Databases (GINLIDB)

    To override the complexity of SQL and to facilitate the manipulation of data in databases for common people (not SQL professionals), many researches have turned out to use natural language instead of SQL. The idea of using natural language instead of SQL has prompted the development of new type of...

    Provided By NORTH ATLANTIC UNIVERSITY UNION

  • White Papers // Jun 2009

    Simulation of Distributed Multi-Pump Raman Amplifiers in Different Transmission Media

    Three types of distributed Raman amplifiers; forward, backward and bidirectional pumping configurations are simulated and compared in this paper. Since the nonlinear effect of the fiber type is an important parameter in determining the simulation process, two types of fibers are used in the authors' simulation; Z-fiber and Dispersion Shifted...

    Provided By NORTH ATLANTIC UNIVERSITY UNION

  • White Papers // Jun 2009

    On Optimizing the Planning of Multi-hop Wireless Networks Using a Multi Objective Evolutionary Approach

    The optimization problem of planning Wireless Mesh Networks (WMNs) is a challenging problem that has been regarded as a cost-minimization problem, while other pertinent Quality of Service (QoS) criteria are modeled as constraints to be satisfied. The authors propose a novel approach that models, to some realistic extent, the problem...

    Provided By NORTH ATLANTIC UNIVERSITY UNION

  • White Papers // Jun 2009

    Secure and Energy Efficient Geocast Protocol for Sensor Networks With Misbehaving Nodes

    Geocast sends packets to all sensor nodes within a specified geographical region in order to gather data from sensor nodes in that region and is an important mechanism in sensor networks. In this paper, the authors first introduce an energy-efficient geocast protocol. The proposed protocol builds multicast tree connecting geocast...

    Provided By NORTH ATLANTIC UNIVERSITY UNION

  • White Papers // Mar 2009

    Passive UHF RFID Tags in Arctic Environment

    Radio Frequency IDentification (RFID) systems are becoming more and more common in several industries. This enhances the requirements of tag antennas. Especially in logistics and supply chain management, which are major applications for RFID, the operating environment is expanding all the time. The identifiable items often travel in very cold,...

    Provided By NORTH ATLANTIC UNIVERSITY UNION

  • White Papers // Mar 2009

    Hierarchical Denormalizing: A Possibility to Optimize the Data Warehouse Design

    Two of the most common processes in database design community include data normalization and de-normalization which play pivotal roles in the underlying performance. Today data warehouse queries comprise a group of aggregations and joining operations. As a result, normalization process does not seem to be an adequate option since several...

    Provided By NORTH ATLANTIC UNIVERSITY UNION

  • White Papers // Mar 2009

    An Empirical Analysis of Relationship Commitment and Trust in Virtual Programmer Community

    Virtual Communities (VCs) have become a forum for programmer seeking knowledge to resolve problems and communicate with each other. The Internet makes participant relatively easy to switch for one VC to another VC that provides similar content or services. However, many VCs have failed due to the reluctance of members...

    Provided By NORTH ATLANTIC UNIVERSITY UNION

  • White Papers // Mar 2009

    DEA-RTA: A Dynamic Encryption Algorithm for the Real-Time Applications

    The Internet and it is applications are hungry for high level of Quality of Service (QoS), and most of the Internet applications seek to minimize packets delay, especially, the Real-Time Applications (RTA). QoS is considered as a major issue in the Internet, where RTA services like IPTelephony and XoIP become...

    Provided By NORTH ATLANTIC UNIVERSITY UNION

  • White Papers // Mar 2009

    Analyzing Distribution of Traffic Capacity

    In this paper, an evaluation of the network routing algorithms is made. In a real network, it is expected to find a mix of traffic capacities corresponding to different qualities of the video signal. This mix seems to be composed of a majority of smaller traffic capacities (poorer video signal)...

    Provided By NORTH ATLANTIC UNIVERSITY UNION

  • White Papers // Mar 2009

    Consumers' Behaviour Towards Internet Technology and Internet Marketing Tools

    The accessibility of the Internet and lower costs of doing transactions has given rise in customers bargaining power and intense global competition. Although the Internet has great potential for consumer value reports indicate that consumers vary in their levels of Internet adoption. Among the factors causing consumers lack of adoption...

    Provided By NORTH ATLANTIC UNIVERSITY UNION

  • White Papers // Mar 2009

    Introducing Mobile Home Agents into the Distributed Authentication Protocol to Achieve Location Privacy in Mobile IPv6

    Mobile IPv6 will be the basis for the fourth generation 4G networks which will completely revolutionize the way telecommunication devices operate. This paradigm shift will occur due to the sole use of packed switching networks. Mobile IPv6 utilizes binding updates as a route optimization to reduced triangle routing between the...

    Provided By NORTH ATLANTIC UNIVERSITY UNION

  • White Papers // Jan 2009

    Chaotic Sequences Implementations on Residue Number Spread Spectrum System

    In this paper, the performance of chaotic code generators implemented in spread spectrum communication system is analyzed and compared to those using conventional pseudo random code generators as maximum length, gold code generators. Image is used as a data source and the histogram of the spreaded image is analyzed. Applicability...

    Provided By NORTH ATLANTIC UNIVERSITY UNION

  • White Papers // Jan 2009

    A New Approach for Reduction of Redundancy Using Optimal Time Domain Sampling and Interpolation

    In this paper, the authors consider a general method, based on time domain samples for spectral manipulation of the timelimited signals. In this direction, all of the needed formulas for practical periodic time-limited interpolation in two cases of low pass and band pass have been derived. The paper begins with...

    Provided By NORTH ATLANTIC UNIVERSITY UNION

  • White Papers // Jan 2009

    A Modular Encoder Design Scheme for Turbo-Encoded BPPM-OCDMA System

    A Turbo-encoded Optical Code Division Multiple Access (OCDMA) system has been simulated and an application specific design process has been proposed to implement a Turbo-encoded OCDMA modulated using Binary Pulse Position Modulation (BPPM) for transmission over optical fiber channels. The design process follows a modular approach and consists of four...

    Provided By NORTH ATLANTIC UNIVERSITY UNION

  • White Papers // Jan 2009

    Web Page Information Architecture Formalization Method and It's an Example

    In this paper, the authors proposed a formalization method of Web page information architecture by regular expression for checking its structure. This method classifies structure elements of a Web page in attributes on the basis of an idea of the Web information architecture, and it's expressed by two types of...

    Provided By NORTH ATLANTIC UNIVERSITY UNION

  • White Papers // Jan 2009

    Increasing Level of Correctness in Correlation with McCabe Complexity

    The scope of the authors' research is finding a correlation between the correctness indicator and the McCabe complexity indicator for software programs. For this, the correctness and McCabe complexity indicators will be calculated for a simple program, written in C programming language. The computations will be made for each program...

    Provided By NORTH ATLANTIC UNIVERSITY UNION

  • White Papers // Jan 2009

    Adaptation of Satellite Navigation for Pedestrians with Electronic Compass

    Despite constantly improving medical techniques it is still impossible to cure many severe vision defects which causes great demand for developing new techniques that could help visually impaired persons to get through chores of everyday life. GPS navigation is the most valuable technology but currently available consumer GPS receivers do...

    Provided By NORTH ATLANTIC UNIVERSITY UNION

  • White Papers // Jan 2009

    Validation Methods of Suspicious Network Flows for Unknown Attack Detection

    The false rate of the detection methods which are based on abnormal traffic behavior is a little high and the accuracy of the signature generation is relatively low. Moreover, it is not suitable to detect exploits and generate its signature. In this paper, the authors have presented ZASMIN (Zeroday-Attack Signature...

    Provided By NORTH ATLANTIC UNIVERSITY UNION

  • White Papers // Jan 2009

    A Modular Encoder Design Scheme for Turbo-ncoded BPPM-OCDMA System

    A Turbo-encoded Optical Code Division Multiple Access (OCDMA) system has been simulated and an application specific design process has been proposed to implement a Turbo-encoded OCDMA modulated using Binary Pulse Position Modulation (BPPM) for transmission over optical fiber channels. The design process follows a modular approach and consists of four...

    Provided By NORTH ATLANTIC UNIVERSITY UNION

  • White Papers // Feb 2012

    Incremental Algorithms for Optimal Flows in Networks

    In this paper, the authors will use incremental algorithms in order to save computational time when solving different network flow problems. They will focus on two important network flow problems: maximum flow problem and minimum cost flow problem. Incremental algorithms are appropriated to be used when they have a network...

    Provided By NORTH ATLANTIC UNIVERSITY UNION

  • White Papers // Feb 2012

    High Performance Hardware Operators for Data Level Parallelism Exploration

    Many microprocessor vendors have incorporated high performance operators in a Single Instruction Multiple Data (SIMD) fashion into their processors to meet the high performance demand of increasing multimedia workloads. This paper presents some recent works on hardware implementation of these operators for Data-Level Parallelism (DLP) exploration. Two general architectural techniques...

    Provided By NORTH ATLANTIC UNIVERSITY UNION

  • White Papers // Feb 2012

    Will Cloud Computing Change Standards in IT Service Management?

    One of the latest hypes in IT is the well-known Cloud Computing paradigm. This paradigm that showed up in recent years is a paradigm for the dynamic usage of computational power, memory and other computational resources. With respect to hypes, the author strongly believes that the Cloud Computing paradigm has...

    Provided By NORTH ATLANTIC UNIVERSITY UNION

  • White Papers // Feb 2012

    Designing Systems for Control and Verifying the Authenticity of Products Using RFID Technology

    In contrast to the typical utilization of Radio Frequency IDentification (RFID) technology today in warehouse management and supply chain applications, the focus of this paper is an overview of the structure of RFID systems used by RFID technology and it also presents a solution based on the application of RFID...

    Provided By NORTH ATLANTIC UNIVERSITY UNION

  • White Papers // Feb 2012

    Steganographic Software: Analysis and Implementation

    Steganography is the method of hiding data in such a way that no one, except the sender and the intended recipient, expects the existence of the hidden data. Thus, the goal here is always to conceal the very existence of the secret data embedded in an innocent data in such...

    Provided By NORTH ATLANTIC UNIVERSITY UNION

  • White Papers // Feb 2012

    Connections Among CRM, Cloud Computing and Trading Income of Selected Companies

    This paper is focused to time period 2007-2010. It was time before and during the economic crisis. In this paper the readers can found how the selected companies doing business in the Czech Republic are using information technology and business strategy Customer Relationship Management (CRM) and how it have impact...

    Provided By NORTH ATLANTIC UNIVERSITY UNION

  • White Papers // Feb 2012

    Interleaving Commands: A Threat to the Interoperability of Smartcard Based Security Applications

    Although smartcards are widely used, secure smartcard interoperability has remained a significant challenge. Usually each manufacturer provides a closed environment for their smartcard based applications including the microchip, associated firmware and application software. While the security of this "Package" can be tested and certified for example based on the Common...

    Provided By NORTH ATLANTIC UNIVERSITY UNION

  • White Papers // Sep 2012

    Results of the Implementation of IP Multimedia Subsystem in One Telecom Operator for the ITIL Incident Management and Problem Management Process

    This paper describes the implementation and using of the IP Multimedia Subsystem (IMS) in one Telecom operator in Bosnia and Herzegovina. In the first part of the paper, is described the design, implementation and testing of the IP Multimedia Subsystem in one Telecom operator. In the second part of the...

    Provided By NORTH ATLANTIC UNIVERSITY UNION

  • White Papers // Sep 2012

    Differences in Results of Measurement Between ITIL 2007 and ITIL 2011 Model for the IMS System

    Every company that wants to increase its level of work and business depends on IT. If the IT processes and services are lead successfully, the operation of the company will become more fortunate and successful, which can be noticed in the decrease of costs, and increase of revenues and achievement...

    Provided By NORTH ATLANTIC UNIVERSITY UNION

  • White Papers // Aug 2012

    Psyche Mining with PsycheTagger - A Computational Linguistics Approach to Text Mining

    The human elements of personality working behind the creation of a write-up play an important part in determining the final dominant mood of a text. This paper is a detailed description of a formal research in Text Mining using purpose-built Computational Intelligence tools, PsycheMap and PsycheTagger. PsycheMap is created to...

    Provided By NORTH ATLANTIC UNIVERSITY UNION

  • White Papers // Aug 2012

    Simulation Tools in Wireless Sensor Networks: Ant Colony Optimization of a Local Routing Algorithm

    Wireless Sensor Networks (WSN) consists of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants, and to cooperatively pass their data through the network. Network Management of such a sensor network is a very big challenge. Also the fast changing...

    Provided By NORTH ATLANTIC UNIVERSITY UNION

  • White Papers // Aug 2012

    Re-Cluster Node on Unequal Clustering Routing Protocol Wireless Sensor Networks for Improving Energy Efficient

    Clustering in Wireless Sensor Networks (WSNs) is an important technique for increasing the lifetime of a wireless sensor network. Organizing wireless sensor networks into clusters enables the efficient utilization of the limited energy resources of the deployed sensor nodes. However, the problem of unbalanced energy consumption exists, and it primarily...

    Provided By NORTH ATLANTIC UNIVERSITY UNION

  • White Papers // Aug 2012

    Secure and Reliable Communications for SCADA Systems

    Uninterrupted electric power distribution is vital for modern society. Secure data transfer between control center and power stations is critical for controlling and protecting power distribution. Supervisory Control And Data Acquisition (SCADA) systems are used for controlling the power stations. SCADA systems have traditionally used a limited propriety communication networks...

    Provided By NORTH ATLANTIC UNIVERSITY UNION

  • White Papers // Aug 2012

    Cloud Computing With SOA Approach as Part of the Disaster Recovery and Response in Finland

    The Rescue Services in Finland have a significant problem of communication with other authorities who also participate in the rescue process. The greatest challenge is a lack of shared programs, applications or any other e-services which they can use to communicate with each other. The cloud computing combined with Service-Oriented...

    Provided By NORTH ATLANTIC UNIVERSITY UNION

  • White Papers // Mar 2011

    Relationship Between Security and Usability -Authentication Case Study

    In this paper there is discussed relation between seemingly independent aspects of software quality - security and usability. This relation is demonstrated in case study of password authentication. For this purposes a method of password security is suggested and described in this paper. This method consists in mathematical model of...

    Provided By NORTH ATLANTIC UNIVERSITY UNION

  • White Papers // May 2011

    Tele-market Modeling of Fuzzy Consumer Behavior

    Just like any other aspect of human life on planet, the advancements in Internet technology over the past decades have greatly influenced the way people live, changing the socio-political structure of the nations as it can clearly be seen in the Middle East and northern African countries. In specific terms,...

    Provided By NORTH ATLANTIC UNIVERSITY UNION

  • White Papers // Nov 2011

    Predicting the Next Page that will be Visited by a Web Surfer Using Page Rank Algorithm

    Predicting the next page to be visited by a web user with increasing accuracy have many important applications like caching and prefetching web pages to improve the speed of navigation or creating systems of recommendation to help users to find faster in the site what they are looking for. The...

    Provided By NORTH ATLANTIC UNIVERSITY UNION

  • White Papers // Mar 2011

    The Technology Evolution in Web Design, Development and Deployment Supporting Web Scientific Applications

    In recent years Internet and it famous application - the web - have seen a wide diffusion and have been subjected to technological changes. The underlying platforms supporting web applications are now based on layered software and complex hardware solutions in order to support a growing load request. Sciences in...

    Provided By NORTH ATLANTIC UNIVERSITY UNION

  • White Papers // Jul 2011

    Web Services-based Charging Control in Multimedia Networks

    Parlay X is a set of Web Services interfaces for open access to network function. One of the alternatives for deployment of Parlay X functionality is an add-on to the Open Service Access (OSA) functionality. The OSA gateway is a special type of application server that translates the OSA interfaces...

    Provided By NORTH ATLANTIC UNIVERSITY UNION

  • White Papers // Jul 2011

    Reasoning on Service Interaction in Mobile Networks

    The paper presents a formal approach to detection of interaction between CAMEL-based services. CAMEL stands for Customized Application for Mobile network Enhanced Logic and it is a way for mobile operators to offer customized services that may be unique or differentiated from similar services offered by competitors. The more services...

    Provided By NORTH ATLANTIC UNIVERSITY UNION

  • White Papers // May 2011

    Exploiting Local IPv4-only Access Networks to Deliver IPv6 Service to End-users

    This paper introduces a new IPv6 deployment protocol called E4Deliver6, which stands for Exploiting Local IPv4- only Access Networks to Deliver IPv6 Service to End-users. The protocol intends to help the Internet Service Providers (ISPs) to rapidly start providing IPv6 service to the end-users. E4Deliver6 tunnels the IPv6 traffic into...

    Provided By NORTH ATLANTIC UNIVERSITY UNION

  • White Papers // Aug 2011

    Users Management in Interactive Networked Collaborative Environment

    In interactive Networked Collaborative Virtual Environment (NCVE), users work in a group to involve in activities such as game, discussion and learning. However, their existence is not visibly presence. Therefore, there is a crucial need to represent the invisible users so that users know with whom they are interacting with,...

    Provided By NORTH ATLANTIC UNIVERSITY UNION

  • White Papers // Aug 2011

    The Impact of Young Adults' Lifestyles in Preference and Belief towards Communication Media

    Nowadays, there are a lot of communication media available for sharing information. The use of online media is among the common activities within the society of digital era especially for young adults. The Internet allows information to be shared freely, easily and fast through social media. Several studies show that...

    Provided By NORTH ATLANTIC UNIVERSITY UNION

  • White Papers // Aug 2011

    An adaptive call admission control scheme with load balancing for QoS enhancement in RoF based converged UMTS/WLAN

    As Universal Mobile Telecommunications System (UMTS) and Wireless Local Area Network (WLAN) have complementary characteristics, convergence of UMTS and WLAN offer seamless wireless access service to users. In a converged UMTS/WLAN enhancing Quality of Service (QoS) for different services require call admission control and load balancing. This paper analyses the...

    Provided By NORTH ATLANTIC UNIVERSITY UNION

  • White Papers // Dec 2010

    A Structured Differential Evolutions for Various Network Topologies

    A structured implementation of Differential Evolution (DE), which can be executed in parallel by using various networks topologies, is presented in this paper. Even though Evolutionary Algorithms (EAs) including DE have a parallel and distributed nature intrinsically, Sequential DE (SqDE) is especially suited for the structured implementation of DE. Therefore,...

    Provided By NORTH ATLANTIC UNIVERSITY UNION

  • White Papers // Mar 2011

    Application of the Classical Reliability to Address Optimization Problems in Mesh Networks

    Failures in communication networks may arise from natural catastrophes, component wear out, or action of intentional enemies. A communication network can be modeled by an undirected graph (or digraph) G= (V,E), where V and E are the set of nodes and edges (links) of G, respectively. Moreover the failure probabilities...

    Provided By NORTH ATLANTIC UNIVERSITY UNION

  • White Papers // Mar 2011

    Simulation Model for Performance Evaluation of Advanced SIP Based Mobility Management Techniques

    Wireless technologies have evolved very rapidly in recent years. In the future, operators will need to enable users to use communication services independently of access technologies, so they will have to support seamless handovers in heterogeneous networks. In this paper, the authors focus on building the simulation model for testing...

    Provided By NORTH ATLANTIC UNIVERSITY UNION

  • White Papers // Jul 2011

    J-PAKE Based Mutual Authentication Model for EPC Networks

    The LTE architectural model developed by 3GPP proposed solutions to achieve high data rates, lighter network architectures and easier achievement of security requirements. Designed as a fully sustained IP network, the LTE provides unified access to a variety of services networks, via its EPC component. The core network of this...

    Provided By NORTH ATLANTIC UNIVERSITY UNION

  • White Papers // Jan 2009

    A Modular Encoder Design Scheme for Turbo-ncoded BPPM-OCDMA System

    A Turbo-encoded Optical Code Division Multiple Access (OCDMA) system has been simulated and an application specific design process has been proposed to implement a Turbo-encoded OCDMA modulated using Binary Pulse Position Modulation (BPPM) for transmission over optical fiber channels. The design process follows a modular approach and consists of four...

    Provided By NORTH ATLANTIC UNIVERSITY UNION

  • White Papers // Mar 2009

    Introducing Mobile Home Agents into the Distributed Authentication Protocol to Achieve Location Privacy in Mobile IPv6

    Mobile IPv6 will be the basis for the fourth generation 4G networks which will completely revolutionize the way telecommunication devices operate. This paradigm shift will occur due to the sole use of packed switching networks. Mobile IPv6 utilizes binding updates as a route optimization to reduced triangle routing between the...

    Provided By NORTH ATLANTIC UNIVERSITY UNION

  • White Papers // Jun 2009

    On Optimizing the Planning of Multi-hop Wireless Networks Using a Multi Objective Evolutionary Approach

    The optimization problem of planning Wireless Mesh Networks (WMNs) is a challenging problem that has been regarded as a cost-minimization problem, while other pertinent Quality of Service (QoS) criteria are modeled as constraints to be satisfied. The authors propose a novel approach that models, to some realistic extent, the problem...

    Provided By NORTH ATLANTIC UNIVERSITY UNION

  • White Papers // Jun 2009

    Secure and Energy Efficient Geocast Protocol for Sensor Networks With Misbehaving Nodes

    Geocast sends packets to all sensor nodes within a specified geographical region in order to gather data from sensor nodes in that region and is an important mechanism in sensor networks. In this paper, the authors first introduce an energy-efficient geocast protocol. The proposed protocol builds multicast tree connecting geocast...

    Provided By NORTH ATLANTIC UNIVERSITY UNION

  • White Papers // Mar 2010

    New Aspect on Wireless Communication Networks

    This paper provides a detailed picture on computer networks and especially on wireless networks, focusing on specific characteristics of wireless systems. By using MIMO technology (Multiple Input Multiple Output), network logon can be realized at distances much greater. The use of antennas allows reception and transmission of multiple data streams...

    Provided By NORTH ATLANTIC UNIVERSITY UNION

  • White Papers // Jan 2014

    How Standardized Utility Cloud Services and Service-Oriented Architecture Benefits in Public Protection and Disaster Relief?

    All emergency response service providers in developed countries are using Information and Communication Technology (ICT) tools and technologies. Recent studies shows majority of the Public Protection and Disaster Relief (PPDR) organizations are using ICT services in very heterogeneous and customized delivery methods. Many organizations have tailored processes, contracts and technologies....

    Provided By NORTH ATLANTIC UNIVERSITY UNION

  • White Papers // Jun 2008

    The Design and Implementation of Database Encryption

    Information inside the database is shared by multiple parties such as internal users, partners, contractors and others. Sensitive data stored in database could be a target to attackers. The attacker for data stored in database not only from external but also from within the organization. Adding the database encryption, valuable...

    Provided By NORTH ATLANTIC UNIVERSITY UNION

  • White Papers // Oct 2013

    An Economic Analysis of Security Investment in Information Systems with Security Threats: A Stochastic Approach

    The authors present an economic analysis of an information system with security threats. They categorize the types of threats and introduce a stochastic model to describe the occurrence of threats and their damage. The results of the stochastic analysis are used for analyzing the revenue and the average costs such...

    Provided By NORTH ATLANTIC UNIVERSITY UNION

  • White Papers // Mar 2011

    Relationship Between Security and Usability - Authentication Case Study

    In this paper there is discussed relation between seemingly independent aspects of software quality - security and usability. This relation is demonstrated in case study of password authentication. For this purposes a method of password security is suggested and described in this paper. This method consists in mathematical model of...

    Provided By NORTH ATLANTIC UNIVERSITY UNION

  • White Papers // Mar 2010

    Information Security Risks for Satellite Tracking

    Satellite tracking is one of the most rapidly growing service business areas in the world, and there are already many commercial applications available. Benefits of the service for the customer are advertised, but very seldom there is any mention of information security of the system. Modern satellite tracking systems contain...

    Provided By NORTH ATLANTIC UNIVERSITY UNION

  • White Papers // Oct 2013

    Two Factor User Authentication Via Biometry and Neural Networks

    A multi-factor authentication framework relays on the usage of two or more sources of data for identity retrieval. Moving from authors' previous experimentation on two factor biometric authentication frameworks, the present paper shows the impact of the usage of neural networks as a way to fuse the outcomes of the...

    Provided By NORTH ATLANTIC UNIVERSITY UNION

  • White Papers // Dec 2012

    Threat Prevention and Intrusion Detection in VoIP Infrastructures

    In this paper, the authors aim at gathering information about attacks from real internet infrastructure and their analysis. For this purpose, they prepared a set of honeypots monitoring various aspects of now-a-days VoIP infrastructure, from emulating an end point device through SIP proxy to SSH terminal emulation. All these application...

    Provided By NORTH ATLANTIC UNIVERSITY UNION