Science and Engineering Research Support soCiety

Displaying 1-34 of 34 results

  • White Papers // Jul 2012

    Integer Frequency Offset Synchronization Scheme With Low Implementation Complexity for OFDM Systems

    In this paper, a low-complexity Integer Frequency Offset (IFO) estimation scheme is proposed for an Orthogonal Frequency Division Multiplexing (OFDM) based Digital Radio Mondiale Plus (DRM+) system. In order to reduce the complexity of the IFO estimation, this paper addresses a grouping of Time Reference Cell (TRC) pilot subcarriers in...

    Provided By Science and Engineering Research Support soCiety

  • White Papers // Jul 2012

    Communication Interconnection Network Architecture and Logical Devices Application

    Recently launched a communication standard, communication architecture for network protocol design technique, defined by International Electro-technical Commission(IEC), the need is to implement communication interconnection network architecture with logical devices, it's a challenging task. The choice of logical device is to attain the critical time requirement of data transmission for Protective...

    Provided By Science and Engineering Research Support soCiety

  • White Papers // Jul 2012

    Performance Analysis of Sampling Frequency Offset Synchronization Scheme for DRM Systems

    This paper considers the problem of Sampling Frequency Offset (SFO) estimation for Orthogonal Frequency Division Multiplexing (OFDM) based Digital Radio Mondiale (DRM) systems. In this paper, the Mean Square Error (MSE) expression for conventional SFO estimators is derived and their low-complexity variants are reported. The theoretical MSE analysis for different...

    Provided By Science and Engineering Research Support soCiety

  • White Papers // Jul 2012

    Framework for Seamless Interpretation of Semantics in Heterogeneous Ubiquitous Sensor Networks

    This paper proposes a new framework for semantically interpreting and processing information of various types of sensors in heterogeneous sensor network environments. The ideal ubiquitous computing environment allows any devices interpret and use information from any sensors on mixed sensor networks. However, existing systems consider only the restricted environment where...

    Provided By Science and Engineering Research Support soCiety

  • White Papers // Jul 2012

    A Full-Duplex MIMO Relay With an MMSE Filter and a Modified Alamouti Encoder Against Spatial Loop Interference in Wireless Multihop Networks

    This paper proposes an efficient full-duplex Multiple Input Multiple Output (MIMO) relay in wireless multi-hop networks. The proposed relay consists of a Minimum Mean Square Error (MMSE) filter, a decode-and-forward protocol processor, and a modified Alamouti encoder. In consideration of the tradeoff between performance and complexity, the MMSE filtering is...

    Provided By Science and Engineering Research Support soCiety

  • White Papers // Jul 2012

    Adaptive Packet-Level FEC Algorithm for Improving the Video Quality Over IEEE 802.11 Networks

    Wireless video transmission suffers from degrading the quality of video service due to dynamic change of the wireless network environment. Packet-level Forward Error Correction (FEC) enables video to be transmitted robustly as adding the redundant packets. This paper proposes two cross-layer strategies to improve the quality of video using the...

    Provided By Science and Engineering Research Support soCiety

  • White Papers // Jul 2012

    Remote Monitoring and Controlling System Based on ZigBee Networks

    Home network based applications are very diverse and the remote monitoring and control areas have been studied. Recently, ZigBee has become one of the most promising technologies for home networks. ZigBee is a specification for a suite of networking, security and application software layers using small, low-power, low data rate...

    Provided By Science and Engineering Research Support soCiety

  • White Papers // Mar 2012

    Supply Chain Management for Generic and Military Applications Using RFID

    This paper explains two main aspects of RFID supply chain management - the generic supply chain management and the specific military application for the purpose of asset viability. The generic supply chain management is studied by examining how to improve supply chain management through accurately determining inventory levels in real...

    Provided By Science and Engineering Research Support soCiety

  • White Papers // Mar 2012

    Multiparty Handoff Mechanism in Mobile IPV4 Networks

    Internet is evolving as a main infrastructure for wireless and mobile communication. Mobile IPv4 (MIPv4) is a protocol designed by Internet Engineering Task Force (IETF) to support seamless roaming of mobile devices. MIPv4 allows mobile devices (or nodes) to have continuity of communication without any interruption while in mobility. MIPv4...

    Provided By Science and Engineering Research Support soCiety

  • White Papers // Mar 2012

    Comparative Study of Techniques in Reducing Inconsistent Data

    Increasing number of data is occurs because of high demand from organizations to run their daily business operations. Most of organizations have an information system in order to provide quality information to the organizations. In order to provide the quality information, the information system must be able to filter any...

    Provided By Science and Engineering Research Support soCiety

  • White Papers // Mar 2012

    Clustering the Mixed Numerical and Categorical Dataset Using Similarity Weight and Filter Method

    Clustering is a challenging task in data mining technique. The aim of clustering is to group the similar data into number of clusters. Various clustering algorithms have been developed to group data into clusters. However, these clustering algorithms work effectively either on pure numeric data or on pure categorical data,...

    Provided By Science and Engineering Research Support soCiety

  • White Papers // Jan 2012

    Yet Another Set of Requirement Metrics for Software Projects

    Software project management has emerged as a new discipline with wide-ranging ideas and across-the-board insights for effectively managing key areas of software projects. The remarkable work of the software project managers, professionals and researchers across the globe have resulted in substantial improvements in this field. Likewise, software project failure rate...

    Provided By Science and Engineering Research Support soCiety

  • White Papers // Jan 2012

    Automatic Extraction and Integration of Changes in Shared Software Specifications

    Collaborative development has been identified as one of the most important keys to the success of a software project. An effective collaboration has a great impact on the requirements specification phase since the latter involves several people specifying the requirements of various stakeholders. Such collaboration requires automatically detecting the parallel...

    Provided By Science and Engineering Research Support soCiety

  • White Papers // Jan 2012

    Improving Contrast in Random Grids Based Visual Secret Sharing

    In the existing random grids based (n, n) Visual Secret Sharing (VSS) schemes, decryption is done with the help of human visual system by stacking the cipher grids. In this paper, the authors propose Boolean XOR operation as decryption operation for the existing random grids based (n, n) VSS schemes....

    Provided By Science and Engineering Research Support soCiety

  • White Papers // Jan 2012

    Using SAT Solving to Improve Differential Fault Analysis of Trivium

    Combining different cryptanalytic methods to attack a cryptosystem became one of the hot topics in cryptanalysis. In particular, algebraic methods in side channel and Differential Fault Analysis (DFA) attracted a lot of attention recently. In Hojsik and Rudolf used DFA to recover the inner state of the stream cipher Trivium...

    Provided By Science and Engineering Research Support soCiety

  • White Papers // Nov 2011

    GPU Implementation of the Keccak Hash Function Family

    Hash functions are one of the most important cryptographic primitives. Some of the currently employed hash functions like SHA-1 or MD5 are considered broken today. Therefore, in 2007 the US National Institute of Standards and Technology announced a competition for a new family of hash functions. Keccak is one of...

    Provided By Science and Engineering Research Support soCiety

  • White Papers // Oct 2011

    An Agile Methodology for Implementing Knowledge Management Systems : A Case Study in Component-Based Software Engineering

    Component-Based Software Engineering (CBSE) is a knowledge-intensive discipline where all activities require the use and the transfer of knowledge between collaborators. A better usage, transfer and application of this knowledge are required factors to face the challenges of CBSE. In this perspective, Knowledge Management (KM) aims at setting up knowledge-focused...

    Provided By Science and Engineering Research Support soCiety

  • White Papers // Oct 2011

    A Mediocre Approach to Syndicate the Attributes for a Class or Relation

    The design of an information system for a business process can be implemented either in the object-oriented paradigm or in relational database management system as per the client's choice. In object oriented paradigm, the design starts with abstraction of objects, classes, attributes, functional dependencies, interrelationships and use cases but in...

    Provided By Science and Engineering Research Support soCiety

  • White Papers // Oct 2011

    2SC: An Efficient Code-Based Stream Cipher

    In this paper, the authors present a new code-based stream cipher called 2SC, based on the sponge construction. The security of the keystream generation of 2SC is reducible to the conjectured intractability of the Syndrome Decoding (SD) problem, which is believed to be hard in the average case. Their stream...

    Provided By Science and Engineering Research Support soCiety

  • White Papers // Oct 2011

    Recent Progress in Code-Based Cryptography

    The last three years have witnessed tremendous progress in the understanding of code-based cryptography. One of its most promising applications is the design of cryptographic schemes with exceptionally strong security guarantees and other desirable properties. In contrast to number-theoretic problems typically used in cryptography, the underlying problems have so far...

    Provided By Science and Engineering Research Support soCiety

  • White Papers // Oct 2011

    Engineering Dependability to Embedded Systems Software Via Tactics

    Embedded systems are used in many critical applications of the people daily life. The increased complexity of embedded systems and the tightened safety regulations posed on them and the scope of the environment in which they operate are driving the need of more dependable embedded systems. Therefore, achieving a high...

    Provided By Science and Engineering Research Support soCiety

  • White Papers // Sep 2011

    Current Distribution Dynamics in Microstrip Patch Antenna Arrays

    This paper presents a novel way for achieving endfire radiation pattern using microstrip patch antenna array. The extensively used microstrip patch antennas, i.e., rectangular and circular microstrip patch antennas, either single patch or in an array configuration do not have an endfire radiation pattern. The antenna array presented in this...

    Provided By Science and Engineering Research Support soCiety

  • White Papers // Sep 2011

    An Advanced Efficient Secured Blind Authentication and Verification Crypto Protocol

    The main objective of this application is to provide biometric verification protocol for the financial server with template protection and validity of trustable server. Most biometric systems assume that the template in the system is secure due to human supervision or physical protection. Authentication over insecure public networks or with...

    Provided By Science and Engineering Research Support soCiety

  • White Papers // Jul 2011

    Different Approaches to White Box Testing Technique for Finding Errors

    The author can defines software testing as a process or a series of processes, design to make sure that computer code does what it was actually design to do and it doesn't do anything unintended. Two of the most important software testing techniques are white box testing and black box...

    Provided By Science and Engineering Research Support soCiety

  • White Papers // Jul 2011

    A New Lossless Image Compression Technique Based on Bose, Chandhuri and Hocquengham (BCH) Codes

    A new binary (bit-level) lossless image compression method based on a well-known error correcting BCH codes has been introduced in this paper. The BCH encoder converts the message of k bits to a codeword of length n by adding 3 parity bits. In contrast the decoder eliminates these parity bits...

    Provided By Science and Engineering Research Support soCiety

  • White Papers // Jul 2011

    Information Hiding Using Edge Boundaries of Objects

    Information hiding has importance in information security. Generally, information hiding is used to protect, authenticate data or for secret communication such as military secret information. It can be achieved in communication protocols, digital multimedia content such as image, text and audio. Currently available information hiding techniques do not pay much...

    Provided By Science and Engineering Research Support soCiety

  • White Papers // Jul 2011

    Personal Verification Using Fingerprint Texture Feature

    Fingerprint is a reliable biometric which is used for personal verification. Current fingerprint verification techniques can be broadly classified as Minutiae-based, ridge feature-based, correlation-based and gradient-based. In this paper, the authors propose use of the statistical texture analysis of a fingerprint using Spatial Grey Level Dependence Method (SGLDM) for discrimination...

    Provided By Science and Engineering Research Support soCiety

  • White Papers // Apr 2011

    The Perception of Computer Security Focused on the Familiarity of Rootkits in Korea and Kazakhstan

    This paper is designed with an eye toward possible solutions for potential threats from Rootkits and more traditional malware. The survey data were collected from 371 students of five korea and three Kazakhstan universities to compare their knowledge and experience with various forms of malware. They provide an empirical assessment...

    Provided By Science and Engineering Research Support soCiety

  • White Papers // Apr 2011

    Cybernetic Society Concept for a Decision-Making MAS Model

    In this paper, the authors present a decision making MAS based on competitive agents equipped with advanced and mutant interaction methods. They describe the dynamic environment of the MAS, and the interaction between the system and the agent's characteristics changes. The described methods relate to the interaction and desire functions...

    Provided By Science and Engineering Research Support soCiety

  • White Papers // Apr 2011

    Towards Checking Protocol Conformance of Active Components

    As UML 2.x is now widely used by practitioners to document software architectures of concurrent real-time systems the authors propose an approach to make use of the UML protocol and behavior artifacts of components in order to achieve a verification activity at design time. They first discuss the issue of...

    Provided By Science and Engineering Research Support soCiety

  • White Papers // Apr 2011

    Analysis and Modeling of Change Management Process Model

    As software changes is essential activity of software life cycle and hence to manage it is a vital and ambiguous task. In this paper, the authors want to suggest a model of software change management which can focuses that change management was relevant not only in the maintenance phase, but...

    Provided By Science and Engineering Research Support soCiety

  • White Papers // Jan 2011

    Managing Scope Creep With Design Patterns in Formal Specifications

    Scope creep can affect the timeliness of the software engineering process. Scope creep often occurs when features are changed or added. Software specification languages provide a formal method for extrapolating and expanding requirements. Several design patterns provide object-oriented constructs whose goal are to mitigate changes in code. Applying these design...

    Provided By Science and Engineering Research Support soCiety

  • White Papers // Jul 2010

    Evaluating the Applicability of a Function Point Logic File Identification Technique Through Controlled Experiments

    Since, the introduction of Object-Oriented (OO) development techniques into industrial practices for software development, many Function Point (FP) technique adaptations have been proposed to improve estimations on the size of a software application. Most research works only deal with OO modifications to the previous version of the FP Counting Practices...

    Provided By Science and Engineering Research Support soCiety

  • White Papers // Oct 2009

    A Stable Design for the State Design Pattern

    The design of the state pattern is analyzed and the notion of stability of a design is proposed. Mathematical models and ideas from numerical analysis are used to derive a stable design for the state pattern. The stability of the design is illustrated by considering two canonical examples from the...

    Provided By Science and Engineering Research Support soCiety

  • White Papers // Oct 2011

    A Mediocre Approach to Syndicate the Attributes for a Class or Relation

    The design of an information system for a business process can be implemented either in the object-oriented paradigm or in relational database management system as per the client's choice. In object oriented paradigm, the design starts with abstraction of objects, classes, attributes, functional dependencies, interrelationships and use cases but in...

    Provided By Science and Engineering Research Support soCiety

  • White Papers // Oct 2011

    An Agile Methodology for Implementing Knowledge Management Systems : A Case Study in Component-Based Software Engineering

    Component-Based Software Engineering (CBSE) is a knowledge-intensive discipline where all activities require the use and the transfer of knowledge between collaborators. A better usage, transfer and application of this knowledge are required factors to face the challenges of CBSE. In this perspective, Knowledge Management (KM) aims at setting up knowledge-focused...

    Provided By Science and Engineering Research Support soCiety

  • White Papers // Jul 2011

    Different Approaches to White Box Testing Technique for Finding Errors

    The author can defines software testing as a process or a series of processes, design to make sure that computer code does what it was actually design to do and it doesn't do anything unintended. Two of the most important software testing techniques are white box testing and black box...

    Provided By Science and Engineering Research Support soCiety

  • White Papers // Jul 2011

    A New Lossless Image Compression Technique Based on Bose, Chandhuri and Hocquengham (BCH) Codes

    A new binary (bit-level) lossless image compression method based on a well-known error correcting BCH codes has been introduced in this paper. The BCH encoder converts the message of k bits to a codeword of length n by adding 3 parity bits. In contrast the decoder eliminates these parity bits...

    Provided By Science and Engineering Research Support soCiety

  • White Papers // Apr 2011

    The Perception of Computer Security Focused on the Familiarity of Rootkits in Korea and Kazakhstan

    This paper is designed with an eye toward possible solutions for potential threats from Rootkits and more traditional malware. The survey data were collected from 371 students of five korea and three Kazakhstan universities to compare their knowledge and experience with various forms of malware. They provide an empirical assessment...

    Provided By Science and Engineering Research Support soCiety

  • White Papers // Apr 2011

    Cybernetic Society Concept for a Decision-Making MAS Model

    In this paper, the authors present a decision making MAS based on competitive agents equipped with advanced and mutant interaction methods. They describe the dynamic environment of the MAS, and the interaction between the system and the agent's characteristics changes. The described methods relate to the interaction and desire functions...

    Provided By Science and Engineering Research Support soCiety

  • White Papers // Apr 2011

    Towards Checking Protocol Conformance of Active Components

    As UML 2.x is now widely used by practitioners to document software architectures of concurrent real-time systems the authors propose an approach to make use of the UML protocol and behavior artifacts of components in order to achieve a verification activity at design time. They first discuss the issue of...

    Provided By Science and Engineering Research Support soCiety

  • White Papers // Apr 2011

    Analysis and Modeling of Change Management Process Model

    As software changes is essential activity of software life cycle and hence to manage it is a vital and ambiguous task. In this paper, the authors want to suggest a model of software change management which can focuses that change management was relevant not only in the maintenance phase, but...

    Provided By Science and Engineering Research Support soCiety

  • White Papers // Jan 2012

    Yet Another Set of Requirement Metrics for Software Projects

    Software project management has emerged as a new discipline with wide-ranging ideas and across-the-board insights for effectively managing key areas of software projects. The remarkable work of the software project managers, professionals and researchers across the globe have resulted in substantial improvements in this field. Likewise, software project failure rate...

    Provided By Science and Engineering Research Support soCiety

  • White Papers // Jan 2012

    Automatic Extraction and Integration of Changes in Shared Software Specifications

    Collaborative development has been identified as one of the most important keys to the success of a software project. An effective collaboration has a great impact on the requirements specification phase since the latter involves several people specifying the requirements of various stakeholders. Such collaboration requires automatically detecting the parallel...

    Provided By Science and Engineering Research Support soCiety

  • White Papers // Mar 2012

    Supply Chain Management for Generic and Military Applications Using RFID

    This paper explains two main aspects of RFID supply chain management - the generic supply chain management and the specific military application for the purpose of asset viability. The generic supply chain management is studied by examining how to improve supply chain management through accurately determining inventory levels in real...

    Provided By Science and Engineering Research Support soCiety

  • White Papers // Mar 2012

    Multiparty Handoff Mechanism in Mobile IPV4 Networks

    Internet is evolving as a main infrastructure for wireless and mobile communication. Mobile IPv4 (MIPv4) is a protocol designed by Internet Engineering Task Force (IETF) to support seamless roaming of mobile devices. MIPv4 allows mobile devices (or nodes) to have continuity of communication without any interruption while in mobility. MIPv4...

    Provided By Science and Engineering Research Support soCiety

  • White Papers // Jul 2010

    Evaluating the Applicability of a Function Point Logic File Identification Technique Through Controlled Experiments

    Since, the introduction of Object-Oriented (OO) development techniques into industrial practices for software development, many Function Point (FP) technique adaptations have been proposed to improve estimations on the size of a software application. Most research works only deal with OO modifications to the previous version of the FP Counting Practices...

    Provided By Science and Engineering Research Support soCiety

  • White Papers // Jan 2012

    Improving Contrast in Random Grids Based Visual Secret Sharing

    In the existing random grids based (n, n) Visual Secret Sharing (VSS) schemes, decryption is done with the help of human visual system by stacking the cipher grids. In this paper, the authors propose Boolean XOR operation as decryption operation for the existing random grids based (n, n) VSS schemes....

    Provided By Science and Engineering Research Support soCiety

  • White Papers // Jan 2012

    Using SAT Solving to Improve Differential Fault Analysis of Trivium

    Combining different cryptanalytic methods to attack a cryptosystem became one of the hot topics in cryptanalysis. In particular, algebraic methods in side channel and Differential Fault Analysis (DFA) attracted a lot of attention recently. In Hojsik and Rudolf used DFA to recover the inner state of the stream cipher Trivium...

    Provided By Science and Engineering Research Support soCiety

  • White Papers // Oct 2011

    2SC: An Efficient Code-Based Stream Cipher

    In this paper, the authors present a new code-based stream cipher called 2SC, based on the sponge construction. The security of the keystream generation of 2SC is reducible to the conjectured intractability of the Syndrome Decoding (SD) problem, which is believed to be hard in the average case. Their stream...

    Provided By Science and Engineering Research Support soCiety

  • White Papers // Nov 2011

    GPU Implementation of the Keccak Hash Function Family

    Hash functions are one of the most important cryptographic primitives. Some of the currently employed hash functions like SHA-1 or MD5 are considered broken today. Therefore, in 2007 the US National Institute of Standards and Technology announced a competition for a new family of hash functions. Keccak is one of...

    Provided By Science and Engineering Research Support soCiety

  • White Papers // Oct 2011

    Recent Progress in Code-Based Cryptography

    The last three years have witnessed tremendous progress in the understanding of code-based cryptography. One of its most promising applications is the design of cryptographic schemes with exceptionally strong security guarantees and other desirable properties. In contrast to number-theoretic problems typically used in cryptography, the underlying problems have so far...

    Provided By Science and Engineering Research Support soCiety

  • White Papers // Jul 2011

    Information Hiding Using Edge Boundaries of Objects

    Information hiding has importance in information security. Generally, information hiding is used to protect, authenticate data or for secret communication such as military secret information. It can be achieved in communication protocols, digital multimedia content such as image, text and audio. Currently available information hiding techniques do not pay much...

    Provided By Science and Engineering Research Support soCiety

  • White Papers // Jul 2011

    Personal Verification Using Fingerprint Texture Feature

    Fingerprint is a reliable biometric which is used for personal verification. Current fingerprint verification techniques can be broadly classified as Minutiae-based, ridge feature-based, correlation-based and gradient-based. In this paper, the authors propose use of the statistical texture analysis of a fingerprint using Spatial Grey Level Dependence Method (SGLDM) for discrimination...

    Provided By Science and Engineering Research Support soCiety

  • White Papers // Oct 2009

    A Stable Design for the State Design Pattern

    The design of the state pattern is analyzed and the notion of stability of a design is proposed. Mathematical models and ideas from numerical analysis are used to derive a stable design for the state pattern. The stability of the design is illustrated by considering two canonical examples from the...

    Provided By Science and Engineering Research Support soCiety

  • White Papers // Jan 2011

    Managing Scope Creep With Design Patterns in Formal Specifications

    Scope creep can affect the timeliness of the software engineering process. Scope creep often occurs when features are changed or added. Software specification languages provide a formal method for extrapolating and expanding requirements. Several design patterns provide object-oriented constructs whose goal are to mitigate changes in code. Applying these design...

    Provided By Science and Engineering Research Support soCiety

  • White Papers // Oct 2011

    Engineering Dependability to Embedded Systems Software Via Tactics

    Embedded systems are used in many critical applications of the people daily life. The increased complexity of embedded systems and the tightened safety regulations posed on them and the scope of the environment in which they operate are driving the need of more dependable embedded systems. Therefore, achieving a high...

    Provided By Science and Engineering Research Support soCiety

  • White Papers // Sep 2011

    Current Distribution Dynamics in Microstrip Patch Antenna Arrays

    This paper presents a novel way for achieving endfire radiation pattern using microstrip patch antenna array. The extensively used microstrip patch antennas, i.e., rectangular and circular microstrip patch antennas, either single patch or in an array configuration do not have an endfire radiation pattern. The antenna array presented in this...

    Provided By Science and Engineering Research Support soCiety

  • White Papers // Sep 2011

    An Advanced Efficient Secured Blind Authentication and Verification Crypto Protocol

    The main objective of this application is to provide biometric verification protocol for the financial server with template protection and validity of trustable server. Most biometric systems assume that the template in the system is secure due to human supervision or physical protection. Authentication over insecure public networks or with...

    Provided By Science and Engineering Research Support soCiety

  • White Papers // Mar 2012

    Comparative Study of Techniques in Reducing Inconsistent Data

    Increasing number of data is occurs because of high demand from organizations to run their daily business operations. Most of organizations have an information system in order to provide quality information to the organizations. In order to provide the quality information, the information system must be able to filter any...

    Provided By Science and Engineering Research Support soCiety

  • White Papers // Mar 2012

    Clustering the Mixed Numerical and Categorical Dataset Using Similarity Weight and Filter Method

    Clustering is a challenging task in data mining technique. The aim of clustering is to group the similar data into number of clusters. Various clustering algorithms have been developed to group data into clusters. However, these clustering algorithms work effectively either on pure numeric data or on pure categorical data,...

    Provided By Science and Engineering Research Support soCiety

  • White Papers // Jul 2012

    Integer Frequency Offset Synchronization Scheme With Low Implementation Complexity for OFDM Systems

    In this paper, a low-complexity Integer Frequency Offset (IFO) estimation scheme is proposed for an Orthogonal Frequency Division Multiplexing (OFDM) based Digital Radio Mondiale Plus (DRM+) system. In order to reduce the complexity of the IFO estimation, this paper addresses a grouping of Time Reference Cell (TRC) pilot subcarriers in...

    Provided By Science and Engineering Research Support soCiety

  • White Papers // Jul 2012

    Communication Interconnection Network Architecture and Logical Devices Application

    Recently launched a communication standard, communication architecture for network protocol design technique, defined by International Electro-technical Commission(IEC), the need is to implement communication interconnection network architecture with logical devices, it's a challenging task. The choice of logical device is to attain the critical time requirement of data transmission for Protective...

    Provided By Science and Engineering Research Support soCiety

  • White Papers // Jul 2012

    Performance Analysis of Sampling Frequency Offset Synchronization Scheme for DRM Systems

    This paper considers the problem of Sampling Frequency Offset (SFO) estimation for Orthogonal Frequency Division Multiplexing (OFDM) based Digital Radio Mondiale (DRM) systems. In this paper, the Mean Square Error (MSE) expression for conventional SFO estimators is derived and their low-complexity variants are reported. The theoretical MSE analysis for different...

    Provided By Science and Engineering Research Support soCiety

  • White Papers // Jul 2012

    Framework for Seamless Interpretation of Semantics in Heterogeneous Ubiquitous Sensor Networks

    This paper proposes a new framework for semantically interpreting and processing information of various types of sensors in heterogeneous sensor network environments. The ideal ubiquitous computing environment allows any devices interpret and use information from any sensors on mixed sensor networks. However, existing systems consider only the restricted environment where...

    Provided By Science and Engineering Research Support soCiety

  • White Papers // Jul 2012

    A Full-Duplex MIMO Relay With an MMSE Filter and a Modified Alamouti Encoder Against Spatial Loop Interference in Wireless Multihop Networks

    This paper proposes an efficient full-duplex Multiple Input Multiple Output (MIMO) relay in wireless multi-hop networks. The proposed relay consists of a Minimum Mean Square Error (MMSE) filter, a decode-and-forward protocol processor, and a modified Alamouti encoder. In consideration of the tradeoff between performance and complexity, the MMSE filtering is...

    Provided By Science and Engineering Research Support soCiety

  • White Papers // Jul 2012

    Adaptive Packet-Level FEC Algorithm for Improving the Video Quality Over IEEE 802.11 Networks

    Wireless video transmission suffers from degrading the quality of video service due to dynamic change of the wireless network environment. Packet-level Forward Error Correction (FEC) enables video to be transmitted robustly as adding the redundant packets. This paper proposes two cross-layer strategies to improve the quality of video using the...

    Provided By Science and Engineering Research Support soCiety

  • White Papers // Jul 2012

    Remote Monitoring and Controlling System Based on ZigBee Networks

    Home network based applications are very diverse and the remote monitoring and control areas have been studied. Recently, ZigBee has become one of the most promising technologies for home networks. ZigBee is a specification for a suite of networking, security and application software layers using small, low-power, low data rate...

    Provided By Science and Engineering Research Support soCiety