Nottingham Trent University

Displaying 1-20 of 20 results

  • White Papers // Aug 2014

    Software Engineering Methods

    Requirements engineering is an attempt to define a discipline for the management of requirements across the system development life cycle. In particular, the discipline addresses the stages preceding the better understood, downstream activities of detailed design, implementation, testing, and maintenance, for which there exist reasonably formal engineering practices and procedures...

    Provided By Nottingham Trent University

  • White Papers // Aug 2014

    A Secured Communication Technique for Unmanned Vehicles Using VANET

    Unmanned Ground Vehicles (UGVs) are playing a vital role in Military Services. The main abstract of this paper is proposed for provide a Tactical information Management system for Unmanned Ground Vehicles using Vehicular Ad-hoc NETworks (VANETs). VANET is a perfect option for vehicle to vehicle communication to share the Information...

    Provided By Nottingham Trent University

  • White Papers // Aug 2014

    Wrapping C++ and Java Using a Meta Framework

    In this paper, the authors describe a parser developed for a Meta framework obtained by combining C++ and Java language segments. It enhances flexibility and effectiveness of Execution Preserving Language Transformation (EPLT) using Meta framework. Augmented versions of existing languages can be developed by combining good properties of two languages....

    Provided By Nottingham Trent University

  • White Papers // Aug 2014

    Many-Core Processor Based Pseudo-Stateful Traffic Multiplier

    Benchmark of high performance network devices relies on high throughput traffic generator. The traffic generators are software based or dedicated hardware based. The software based traffic generators are usually running on relatively cheap commercial computer in a flexible, low cost way but suffering from poor performance. The hardware based generators...

    Provided By Nottingham Trent University

  • White Papers // Aug 2014

    Performance Evaluation of Multi-Channel Operation For Safety And Non-Safety Application On Vehicular Ad Hoc Network IEEE 1609.4

    The IEEE 1609.4 standard for Vehicular ad hoc network has been proposed to enhance the IEEE 802.11p MAC to support multi-channel operation. Multi-channel operation separate safety and non-safety related applications on a different channel. The vehicles must periodically switch between control channel and service channel to concurrently exchange the safety...

    Provided By Nottingham Trent University

  • White Papers // Jul 2014

    Visual Features Based Motion Controller for Mobile Robot Navigation

    In this paper, the authors describe a new approach to vision-based control in robotics. The problem of controlling the pose of a mobile robot with respect to a target position by means of visual feedback is investigated mainly. The proposed method enables a mobile robot to identify its own position...

    Provided By Nottingham Trent University

  • White Papers // Jul 2014

    A Model Driven Analysis of the 802.11 CSMA/CA Protocol Through SD2PN

    Unified Modeling Language (UML) has been conferred as the de facto standard in modeling by majority in the software system development community. Among the various types of diagrams that exist under the umbrella of UML is sequence diagram. Sequence diagrams are capable of modeling interactional behaviors as well as dynamic...

    Provided By Nottingham Trent University

  • White Papers // Jul 2014

    An Effective Approach Towards Content-Based Human Facial Image Detection and Retrieval

    The difficulties of locating a desired facial image in a large and varied collection are now the current main problem in this field. In order to search in such large and varied images' collection, there is a growing need for efficient storage and retrieval techniques. In this paper, an effective...

    Provided By Nottingham Trent University

  • White Papers // Nov 2012

    Enhanced Public Key Security for the McEliece Cryptosystem

    This paper studies a variant of the McEliece cryptosystem able to ensure that the code used as the public key is no longer permutationequivalent to the secret code. This increases the security level of the public key, thus opening the way for reconsidering the adoption of classical families of codes,...

    Provided By Nottingham Trent University

  • White Papers // Jan 2012

    Availability of Wireless Fading Channel Under Outage State With Tolerance Time

    Analytical models are often developed to characterize probabilistic behavior of wireless channels using Finite State Markov (FSM) model approach. The paper presents Outage Tolerant FSM (OTFSM) channel model based on maximum acceptable 'Tolerance time'. These are the short outage times, a wireless channel can tolerate without compromising telecommunication system quality...

    Provided By Nottingham Trent University

  • White Papers // Dec 2011

    Electrical Model Simulation for a UHF RFID System in Near and Far Fields

    Radio Frequency IDentification (RFID) deployment is needed for efficient item identification. A simulation environment in HP-ADS (Advanced Design System of agilent technologies) of Ultra High Frequency (UHF) RFID systems is constructed in this paper. This paper simulates the system through an electrical model. The tag is represented by a simple...

    Provided By Nottingham Trent University

  • White Papers // Nov 2011

    A New Class of ANFIS Based Channel Equalizers for Mobile Communication Systems

    System modeling based on conventional mathematical tools like differential equations is not well suited for dealing with ill-defined and uncertain systems. By contrast, a fuzzy inference system, employing fuzzy if - then rules can model the qualitative aspects of human knowledge and reasoning processes without employing precise quantitative analyses. This...

    Provided By Nottingham Trent University

  • White Papers // Nov 2011

    Dynamic Nearest Neighbours Classifier for Integrated Data Using Object Oriented Concept Generalization

    The k-Nearest Neighbor (k-NN) algorithm has been a promising classification tool. In spite of its extensive application, k-NN suffers from few inherent problems. A considerable number of the proposed approaches have exhibited quite promising results and has motivated further research on improving the k-NN method. In this paper, the authors...

    Provided By Nottingham Trent University

  • White Papers // Sep 2011

    Using Genetic Algorithm for Unit Testing Of Object Oriented Software

    Genetic algorithms have been successfully applied in the area of software testing. The demand for automation of test case generation in object oriented software testing is increasing. Genetic algorithms are well applied in procedural software testing but a little has been done in testing of object oriented software. In this...

    Provided By Nottingham Trent University

  • White Papers // Aug 2011

    A Performance Analysis of Energy Efficient Routing in Mobile Ad Hoc Networks

    A mobile ad hoc network is characterized by constraints such as limited bandwidth, energy constraints, less memory and processing capabilities. Also MANET's are required to be deployed under scalable conditions for some applications. A routing protocol is a central to the design of such networks. In this paper, the authors...

    Provided By Nottingham Trent University

  • White Papers // Aug 2011

    Position Based Routing for Wireless Mobile Ad Hoc Networks

    In mobile ad hoc network there are several routing algorithms, which utilize topology information to make routing decisions at each node. Aim of this paper is to utilize position information to provide more reliable as well as efficient routing for certain applications. Thus extensions to existing position based routing algorithm...

    Provided By Nottingham Trent University

  • White Papers // Mar 2011

    Investigating Business Cycle Synchronization In West Africa

    This paper contributes to the discussion on the long term sustainability of the embryonic second monetary union in Africa, the West African Monetary Zone (WAMZ). The authors analyse the level of economic and monetary integration in West Africa by analysing the degree of growth cycle synchronisation between five candidate countries...

    Provided By Nottingham Trent University

  • White Papers // Dec 2010

    WTO Regulations And Bioenergy Sustainability Certification - Synergies And Possible Conflicts

    Biofuels are increasingly being produced and consumed as a partial substitute to fossil-fuel based transport fuels in the fight against climate change. One policy introduced recently by some countries to help ensure biofuels perform better than fossil fuels environmentally is sustainability criteria. These, typically, require lower greenhouse gas emissions than...

    Provided By Nottingham Trent University

  • White Papers // May 2010

    From Property Companies To Real Estate Investment Trusts: The Impact Of Economic And Property Factors In The UK Commercial Property Returns

    This paper investigates cross-sectionally the impact of economic and property factors on the returns of UK property companies and real estate investment trusts. By applying structural time-series modelling and the Kalman Filter to obtain unexpected changes or innovations in selected economic and property variables it was found for the sample...

    Provided By Nottingham Trent University

  • White Papers // Feb 2009

    Inflation Persistence And Asymmetries: Evidence For African Countries

    In this paper the authors aim at testing the inflation persistence hypothesis as well as modelling (using logistic smooth transition autoregressive, LSTAR, models) the long run behaviour of inflation rates in a pool of African countries. In order to do so, they rely on unit root tests applied to nonlinear...

    Provided By Nottingham Trent University

  • White Papers // Aug 2011

    Position Based Routing for Wireless Mobile Ad Hoc Networks

    In mobile ad hoc network there are several routing algorithms, which utilize topology information to make routing decisions at each node. Aim of this paper is to utilize position information to provide more reliable as well as efficient routing for certain applications. Thus extensions to existing position based routing algorithm...

    Provided By Nottingham Trent University

  • White Papers // Aug 2011

    A Performance Analysis of Energy Efficient Routing in Mobile Ad Hoc Networks

    A mobile ad hoc network is characterized by constraints such as limited bandwidth, energy constraints, less memory and processing capabilities. Also MANET's are required to be deployed under scalable conditions for some applications. A routing protocol is a central to the design of such networks. In this paper, the authors...

    Provided By Nottingham Trent University

  • White Papers // Jan 2012

    Availability of Wireless Fading Channel Under Outage State With Tolerance Time

    Analytical models are often developed to characterize probabilistic behavior of wireless channels using Finite State Markov (FSM) model approach. The paper presents Outage Tolerant FSM (OTFSM) channel model based on maximum acceptable 'Tolerance time'. These are the short outage times, a wireless channel can tolerate without compromising telecommunication system quality...

    Provided By Nottingham Trent University

  • White Papers // Dec 2010

    WTO Regulations And Bioenergy Sustainability Certification - Synergies And Possible Conflicts

    Biofuels are increasingly being produced and consumed as a partial substitute to fossil-fuel based transport fuels in the fight against climate change. One policy introduced recently by some countries to help ensure biofuels perform better than fossil fuels environmentally is sustainability criteria. These, typically, require lower greenhouse gas emissions than...

    Provided By Nottingham Trent University

  • White Papers // Mar 2011

    Investigating Business Cycle Synchronization In West Africa

    This paper contributes to the discussion on the long term sustainability of the embryonic second monetary union in Africa, the West African Monetary Zone (WAMZ). The authors analyse the level of economic and monetary integration in West Africa by analysing the degree of growth cycle synchronisation between five candidate countries...

    Provided By Nottingham Trent University

  • White Papers // Feb 2009

    Inflation Persistence And Asymmetries: Evidence For African Countries

    In this paper the authors aim at testing the inflation persistence hypothesis as well as modelling (using logistic smooth transition autoregressive, LSTAR, models) the long run behaviour of inflation rates in a pool of African countries. In order to do so, they rely on unit root tests applied to nonlinear...

    Provided By Nottingham Trent University

  • White Papers // May 2010

    From Property Companies To Real Estate Investment Trusts: The Impact Of Economic And Property Factors In The UK Commercial Property Returns

    This paper investigates cross-sectionally the impact of economic and property factors on the returns of UK property companies and real estate investment trusts. By applying structural time-series modelling and the Kalman Filter to obtain unexpected changes or innovations in selected economic and property variables it was found for the sample...

    Provided By Nottingham Trent University

  • White Papers // Nov 2012

    Enhanced Public Key Security for the McEliece Cryptosystem

    This paper studies a variant of the McEliece cryptosystem able to ensure that the code used as the public key is no longer permutationequivalent to the secret code. This increases the security level of the public key, thus opening the way for reconsidering the adoption of classical families of codes,...

    Provided By Nottingham Trent University

  • White Papers // Nov 2011

    A New Class of ANFIS Based Channel Equalizers for Mobile Communication Systems

    System modeling based on conventional mathematical tools like differential equations is not well suited for dealing with ill-defined and uncertain systems. By contrast, a fuzzy inference system, employing fuzzy if - then rules can model the qualitative aspects of human knowledge and reasoning processes without employing precise quantitative analyses. This...

    Provided By Nottingham Trent University

  • White Papers // Aug 2014

    Software Engineering Methods

    Requirements engineering is an attempt to define a discipline for the management of requirements across the system development life cycle. In particular, the discipline addresses the stages preceding the better understood, downstream activities of detailed design, implementation, testing, and maintenance, for which there exist reasonably formal engineering practices and procedures...

    Provided By Nottingham Trent University

  • White Papers // Aug 2014

    A Secured Communication Technique for Unmanned Vehicles Using VANET

    Unmanned Ground Vehicles (UGVs) are playing a vital role in Military Services. The main abstract of this paper is proposed for provide a Tactical information Management system for Unmanned Ground Vehicles using Vehicular Ad-hoc NETworks (VANETs). VANET is a perfect option for vehicle to vehicle communication to share the Information...

    Provided By Nottingham Trent University

  • White Papers // Aug 2014

    Wrapping C++ and Java Using a Meta Framework

    In this paper, the authors describe a parser developed for a Meta framework obtained by combining C++ and Java language segments. It enhances flexibility and effectiveness of Execution Preserving Language Transformation (EPLT) using Meta framework. Augmented versions of existing languages can be developed by combining good properties of two languages....

    Provided By Nottingham Trent University

  • White Papers // Nov 2011

    Dynamic Nearest Neighbours Classifier for Integrated Data Using Object Oriented Concept Generalization

    The k-Nearest Neighbor (k-NN) algorithm has been a promising classification tool. In spite of its extensive application, k-NN suffers from few inherent problems. A considerable number of the proposed approaches have exhibited quite promising results and has motivated further research on improving the k-NN method. In this paper, the authors...

    Provided By Nottingham Trent University

  • White Papers // Dec 2011

    Electrical Model Simulation for a UHF RFID System in Near and Far Fields

    Radio Frequency IDentification (RFID) deployment is needed for efficient item identification. A simulation environment in HP-ADS (Advanced Design System of agilent technologies) of Ultra High Frequency (UHF) RFID systems is constructed in this paper. This paper simulates the system through an electrical model. The tag is represented by a simple...

    Provided By Nottingham Trent University

  • White Papers // Jul 2014

    Visual Features Based Motion Controller for Mobile Robot Navigation

    In this paper, the authors describe a new approach to vision-based control in robotics. The problem of controlling the pose of a mobile robot with respect to a target position by means of visual feedback is investigated mainly. The proposed method enables a mobile robot to identify its own position...

    Provided By Nottingham Trent University

  • White Papers // Sep 2011

    Using Genetic Algorithm for Unit Testing Of Object Oriented Software

    Genetic algorithms have been successfully applied in the area of software testing. The demand for automation of test case generation in object oriented software testing is increasing. Genetic algorithms are well applied in procedural software testing but a little has been done in testing of object oriented software. In this...

    Provided By Nottingham Trent University

  • White Papers // Aug 2014

    Many-Core Processor Based Pseudo-Stateful Traffic Multiplier

    Benchmark of high performance network devices relies on high throughput traffic generator. The traffic generators are software based or dedicated hardware based. The software based traffic generators are usually running on relatively cheap commercial computer in a flexible, low cost way but suffering from poor performance. The hardware based generators...

    Provided By Nottingham Trent University

  • White Papers // Aug 2014

    Performance Evaluation of Multi-Channel Operation For Safety And Non-Safety Application On Vehicular Ad Hoc Network IEEE 1609.4

    The IEEE 1609.4 standard for Vehicular ad hoc network has been proposed to enhance the IEEE 802.11p MAC to support multi-channel operation. Multi-channel operation separate safety and non-safety related applications on a different channel. The vehicles must periodically switch between control channel and service channel to concurrently exchange the safety...

    Provided By Nottingham Trent University

  • White Papers // Jul 2014

    A Model Driven Analysis of the 802.11 CSMA/CA Protocol Through SD2PN

    Unified Modeling Language (UML) has been conferred as the de facto standard in modeling by majority in the software system development community. Among the various types of diagrams that exist under the umbrella of UML is sequence diagram. Sequence diagrams are capable of modeling interactional behaviors as well as dynamic...

    Provided By Nottingham Trent University

  • White Papers // Jul 2014

    An Effective Approach Towards Content-Based Human Facial Image Detection and Retrieval

    The difficulties of locating a desired facial image in a large and varied collection are now the current main problem in this field. In order to search in such large and varied images' collection, there is a growing need for efficient storage and retrieval techniques. In this paper, an effective...

    Provided By Nottingham Trent University