Scientific Research Publishing

Displaying 1-40 of 206 results

  • White Papers // Feb 2015

    A MATLAB-Based Numerical and GUI Implementation of Cross-Gradients Joint Inversion of Gravity and Magnetic Data

    "The cross-gradients joint inversion technique has been applied to multiple geophysical data with a significant improvement on compatibility, but its numerical implementation for practical use is rarely discussed in the literature. The authors present a MATLAB-based three-dimensional cross-gradients joint inversion program with application to gravity and magnetic data. The input...

    Provided By Scientific Research Publishing

  • White Papers // Feb 2015

    Formalization of Federated Schema Architectural Style Variability

    "Data integration requires managing heterogeneous schema information. A federated database system integrates heterogeneous, autonomous database systems on the schema level, whereby both local applications and global applications accessing multiple component database systems are supported. Such a federated database system is a complex system of systems which requires a well-designed organization...

    Provided By Scientific Research Publishing

  • White Papers // Feb 2015

    Semantic Enrichment of XML Schema to Transform Association Relationships in ODL Schema

    "In this paper, the authors present an approach for transforming an XML schema they enriched in ODL (Object Definition Language) schemas. It is possible to realize the concepts of ODL in a model of XML schema; they propose to introduce an enrichment concretizing these concepts in the XML schema models....

    Provided By Scientific Research Publishing

  • White Papers // Feb 2015

    Content-Based Image Retrieval Using SOM and DWT

    "Content-Based Image Retrieval (CBIR) from a large database is becoming a necessity for many applications such as medical imaging, Geographic Information Systems (GIS), space search and many others. However, the process of retrieving relevant images is usually preceded by extracting some discriminating features that can best describe the database images....

    Provided By Scientific Research Publishing

  • White Papers // Feb 2015

    Timed-Automata Based Model-Checking of a Multi-Agent System: A Case Study

    "A multi-agent based transport system is modeled by timed automata model extended with clock variables. The correctness properties of safety and liveness of this model are verified by timed automata based UPPAAL. Agents have a degree of control on their own actions, have their own threads of control, and under...

    Provided By Scientific Research Publishing

  • White Papers // Feb 2015

    Towards Designing an Intelligent Educational Assessment Tool

    "Assessment is an important part of learning process. It can be defined as the process of gathering information for the purpose of making judgments about a current state of affairs presumably for the purpose of enhancing future outcomes. It determines whether or not the goals of education are being met....

    Provided By Scientific Research Publishing

  • White Papers // Jan 2015

    E-Learning Optimization Using Supervised Artificial Neural-Network

    "Improving learning outcome has always been an important motivating factor in educational inquiry. In a blended learning environment where e-learning and traditional face to face class tutoring are combined, there are opportunities to explore the role of technology in improving student's grades. A student's performance is impacted by many factors...

    Provided By Scientific Research Publishing

  • White Papers // Jan 2015

    The Construction of Human Resource Management Cloud Service Platform

    "Human resource management service faced the challenges of promoting efficiency, costs saving, quick responding and so on. In order to face these challenges, this paper puts forward a ""6 1"" structure of human resource management service combined with some characteristics of cloud computing, elaborates the service mode of the cloud...

    Provided By Scientific Research Publishing

  • White Papers // Jan 2015

    Research on Supply Chain Simulation System Based on Internet of Things

    "As one of the top ten core industries in China, Internet of things has gradually changed the people life, by influencing enterprise production, storage and transportation, express, supermarket shopping, etc. By using Internet of things technology in the supply chain, enterprise can optimize the structure and process of supply chain...

    Provided By Scientific Research Publishing

  • White Papers // Dec 2014

    Ontologies for Software Project Management: A Review

    "Software project management is a knowledge intensive process that can benefit substantially from ontology development and ontology engineering. Ontology development could facilitate or improve substantially the software development process through the improvement of knowledge management, the increase of software and artefacts reusability, and the establishment of internal consistency within project...

    Provided By Scientific Research Publishing

  • White Papers // Dec 2014

    Research on Location-Inventory Model in Grain Emergency Network

    "Once the disaster occurred, a huge amount of grain supply is needed from disaster area. Because of the short shelf life, grain is very strict with reserve environment and needed to rotate on a regular basis in the process of reserves. Considering the limitations of existing related research, this paper...

    Provided By Scientific Research Publishing

  • White Papers // Nov 2014

    Smart Phone Application Evaluation with Usability Testing Approach

    "In this paper, the authors present a narrative role methodology based on different people's opinions, which is now implemented in their research environment for the purpose of testing novel techniques, the usability testing of most common used smart phones such as Android and Apple Smartphone application. This paper analysis is...

    Provided By Scientific Research Publishing

  • White Papers // Nov 2014

    An Integrated Intrusion Detection System by Combining SVM with AdaBoost

    "In the Internet, computers and network equipments are threatened by malicious intrusion, which seriously affects the security of the network. Intrusion behavior has the characteristics of fast upgrade, strong concealment and randomness, so that traditional methods of Intrusion Detection System (IDS) are difficult to prevent the attacks effectively. In this...

    Provided By Scientific Research Publishing

  • White Papers // Nov 2014

    Categorization of Software Release Risks and Its Abatement Strategy

    "Growing competition in the software industry with the persistently changing needs and the usual problems associated with software release, which have made acceptance of new software in market, are extremely important for the success. Volatility in the software developmental processes is generally difficult to handle. The change request at any...

    Provided By Scientific Research Publishing

  • White Papers // Nov 2014

    An Integrated Multi-Echelon Model for a Sustainable Closed Loop Supply Chain Network Design

    "The integration of entire supply and value chain into a closed loop network is gaining more importance in recent times in order to ensure a business to be economically and environmentally sustainable with the changing trends in business and social environments, growing environmental consciousness in the society and government legislations...

    Provided By Scientific Research Publishing

  • White Papers // Nov 2014

    An Empirical Study of the Optimum Team Size Requirement in a Collaborative Computer Programming/Learning Environment

    "Pair programming has been widely acclaimed the best way to go in computer programming. Recently, collaboration involving more subjects has been shown to produce better results in programming environments. However, the optimum group size needed for the collaboration has not been adequately addressed. This paper seeks to inculcate and acquaint...

    Provided By Scientific Research Publishing

  • White Papers // Nov 2014

    Detecting Design Patterns in Object-Oriented Program Source Code by Using Metrics and Machine Learning

    "Detecting well-known design patterns in object-oriented program source code can help maintainers understand the design of a program. Through the detection, the understandability, maintainability, and reusability of object-oriented programs can be improved. There are automated detection techniques; however, many existing techniques are based on static analysis and use strict conditions...

    Provided By Scientific Research Publishing

  • White Papers // Nov 2014

    Applications of a Streaming Video Server in a Mobile Phone Live Streaming System

    "In this paper, the authors describe the entire process of completing a multicast streaming media server and applying it to a cell phone live streaming system. By using the RTSP protocol, the streaming media server controls the connection of video capture client, data stream reception and processing as well as...

    Provided By Scientific Research Publishing

  • White Papers // Oct 2014

    Usability Experiments to Evaluate UML/SysML-Based Model Driven Software Engineering Notations for Logic Control in Manufacturing Automation

    "Many industrial companies and researchers are looking for more efficient Model Driven Engineering approaches (MDE) in software engineering of Manufacturing automation Systems (MS) especially for logic control programming, but are uncertain about the applicability and effort needed to implement those approaches in comparison to classical Programmable Logic Controller (PLC) programming...

    Provided By Scientific Research Publishing

  • White Papers // Oct 2014

    Significant Factors for Reliability Estimation of Component Based Software Systems

    "Software reliability is defined as the probability of the failure-free operation of a software system for a specified period of time in a specified environment. Traditional approaches for software reliability analysis are black box approaches. These approaches use the software as a whole. At present, main emphasis of software is...

    Provided By Scientific Research Publishing

  • White Papers // Oct 2014

    Improved High Definition Multimedia Interface Authentication Mechanism

    "Security information has become so significant in transmission due to the rapid advancement in digital data exchange. Thus, it is necessary to protect the confidentiality and licensing of video content from illegal access. Currently, High-bandwidth Digital Content Protection (HDCP) provides the confidentiality and licensing of digital content for High Digital...

    Provided By Scientific Research Publishing

  • White Papers // Oct 2014

    Rapid Deployment of Internet-Connected Environmental Monitoring Devices

    "Advances in electronic sensing and monitoring systems and the growth of the communications infrastructure have enabled users to gain immediate access to information and interaction with physical devices. To facilitate the uploading, viewing, and sharing of data via the internet, while avoiding the complexities and expense of creating personal web...

    Provided By Scientific Research Publishing

  • White Papers // Oct 2014

    IoT Testbed Business Model

    "The Internet-of-Things (IoT) is today one of the hypes in the technological world but despite the enormous attention and research investment, the clear business value is still hard to perceive. IoT deployments are costly to be installed, managed and maintained, and need to provide a very clear value to justify...

    Provided By Scientific Research Publishing

  • White Papers // Sep 2014

    Link Budget Design with Performance Evaluation of Tunable Impulse-Based Ultra Wideband to Support the Integration of Wireless Sensing and Identifications Infrastructures

    "Recently, many studies propose the use of ultra-wideband technology for passive and active radio frequency identification systems as well as for wireless sensor networks due to its numerous advantages. By harvesting these advantages of IR-UWB technology at the physical-layer design, this paper proposes that a cross layer architecture platform can...

    Provided By Scientific Research Publishing

  • White Papers // Aug 2014

    The Augmented Reality Application of Multimedia Technology in Aquatic Organisms Instruction

    "In this paper, the authors elaborate the features and superiority of applying multimedia technology to aquatic organisms in a science and life technology course. The augmented reality application of multimedia technology in aquatic organisms' instruction has its own features, teaching information capacity, interactive user interface. The paper concludes the superiority...

    Provided By Scientific Research Publishing

  • White Papers // Jul 2014

    Managing Computing Infrastructure for IoT Data

    "Digital data have become a torrent engulfing every area of business, science and engineering disciplines, gushing into every economy, every organization and every user of digital technology. In the age of big data, deriving values and insights from big data using rich analytics becomes important for achieving competitiveness, success and...

    Provided By Scientific Research Publishing

  • White Papers // Jul 2014

    A Multi-Agent School Simulation Based on Hierarchical Social Networks

    "The quality of K-12 education has been a very big concern for years. Previous methods studied only one or two factors, such as school choice, or teacher quality, on school performance. Therefore the results they provide can be limited. The authors propose a multi-agent approach to integrate multiple actors in...

    Provided By Scientific Research Publishing

  • White Papers // Jun 2014

    A Quaternion Scaled Unscented Kalman Estimator for Inertial Navigation States Determination Using INS/GPS/Magnetometer Fusion

    "This Inertial Navigation System (INS), Global Positioning System (GPS) and fluxgate magnetometer technologies have been widely used in a variety of positioning and navigation applications. In this paper, a low cost solid state INS/GPS/Magnetometer integrated navigation system has been developed that incorporates measurements from an Inertial Navigation System (INS), Global...

    Provided By Scientific Research Publishing

  • White Papers // Jun 2014

    Wormhole Attack Behaviour in Monte-Carlo Localization for Mobile Sensor Networks

    "Localization is the basic requirement for network management in wireless sensor networks as it helps nodes find their absolute position coordinates and in gathering information relevant to their locations. A localization algorithm has to be dynamic, scalable and should not impose high computation or communication overhead. The localization systems are...

    Provided By Scientific Research Publishing

  • White Papers // May 2014

    Reliable Content Distribution in P2P Networks Based on Peer Groups

    "Peer-To-Peer (P2P) networks are highly dynamic systems which are very popular for content distribution in the Internet. A single peer remains in the system for an unpredictable amount of time, and the rate in which peers enter and leave the system, i.e. the churn, is often high. A user that...

    Provided By Scientific Research Publishing

  • White Papers // Dec 2013

    Sensors Grouping Model for Wireless Sensor Network

    "The grouping of sensors is a calculation method for partitioning the wireless sensor network into groups, each group consisting of a collection of sensors. A sensor can be an element of multiple groups. In the present paper, the authors will show a model to divide the wireless sensor network sensors...

    Provided By Scientific Research Publishing

  • White Papers // Dec 2013

    Clustering in Wireless Multimedia Sensor Networks

    "Wireless Multimedia Sensor Networks (WMSNs) are comprised of small embedded audio/video motes capable of extracting the surrounding environmental information, locally processing it and then wirelessly transmitting it to sink/base station. Multimedia data such as image, audio and video is larger in volume than scalar data such as temperature, pressure and...

    Provided By Scientific Research Publishing

  • White Papers // Oct 2013

    Cloud Computing Solution and Services for RFID Based Supply Chain Management

    "Deploying and implementing RFID systems for tracking and controlling products in supply chain management is not affordable for small and midsized companies due to its complexity, cost, and difficulties pertaining data management and maintenance. Cloud computing can be used to mitigate the risks associated with the implementation and deployment of...

    Provided By Scientific Research Publishing

  • White Papers // Sep 2013

    Sensing Attributes of an Agile Information System

    Information Systems (IS) agility is a current topic of interest in the IS industry. The study follows up on the work on the definition of the construct of IS agility which is defined as the ability of IS to sense a change in real time; diagnose it in real time;...

    Provided By Scientific Research Publishing

  • White Papers // Sep 2013

    System Architecture and Design Flow of Smart Mobile Sensing Systems

    "In this paper, the authors present the architecture and design flow of smart mobile sensing systems that performs wireless sensor data transmission, data analysis and display in real-time. Multiple wireless protocols are used for sensor data transmission including the Bluetooth, cellular data network and Wi-Fi for Internet access, and Near...

    Provided By Scientific Research Publishing

  • White Papers // Jun 2013

    A Wireless Body Sensor Platform to Detect Progressive Deterioration in Musculoskeletal Systems

    "Recent developments in technology have helped to reduce the physical size and weight of devices and opened up new opportunities for their application in delivering unobtrusive healthcare services. In particular, kinetic and kinematic systems, that use sensors attached to the body, are currently being used to measure and understand many...

    Provided By Scientific Research Publishing

  • White Papers // Apr 2013

    Integrating RFID Technology with Intelligent Classifiers for Meaningful Prediction Knowledge

    "Radio Frequency IDentification (RFID) is a wireless technology that has been designed to automatically identify tagged objects using a reader. Several applications of this technology have been introduced in past literature such as pet identification and luggage tracking which have increased the efficiency and effectiveness of each environment into which...

    Provided By Scientific Research Publishing

  • White Papers // Apr 2013

    Personal Perspectives: Individual Privacy in the IOT

    "The Internet Of Things (IOT) is the extension of the Internet to the next level, i.e., bringing the Internet to the real physical world of things. In this paper, 22 people working with different aspects of IOT development were inter-viewed in Finland and in China, in order to investigate their...

    Provided By Scientific Research Publishing

  • White Papers // Nov 2012

    The Design and Improvement of a Software Project Management System Based on CMMI

    "In this paper, the authors researched and analyzed the characteristics, deficiencies and reasons of a management system of a software enterprise project to design a software project management system based on CMMI 1.2, thus helping the enterprise to improve development and management efficiency of software project and reduce the risks...

    Provided By Scientific Research Publishing

  • White Papers // Oct 2012

    Automatic Risk Identification in Software Projects: An Approach Based on Inductive Learning

    "Effective risk management is very important to increase the probability of success in software projects. Indeed, like other types of projects, software projects are also susceptible to various problems that can lead to the cancelation of their development or to the development of systems that do not meet the client's...

    Provided By Scientific Research Publishing

  • White Papers // Jul 2014

    Managing Computing Infrastructure for IoT Data

    "Digital data have become a torrent engulfing every area of business, science and engineering disciplines, gushing into every economy, every organization and every user of digital technology. In the age of big data, deriving values and insights from big data using rich analytics becomes important for achieving competitiveness, success and...

    Provided By Scientific Research Publishing

  • White Papers // Oct 2013

    Cloud Computing Solution and Services for RFID Based Supply Chain Management

    "Deploying and implementing RFID systems for tracking and controlling products in supply chain management is not affordable for small and midsized companies due to its complexity, cost, and difficulties pertaining data management and maintenance. Cloud computing can be used to mitigate the risks associated with the implementation and deployment of...

    Provided By Scientific Research Publishing

  • White Papers // Jun 2013

    A Wireless Body Sensor Platform to Detect Progressive Deterioration in Musculoskeletal Systems

    "Recent developments in technology have helped to reduce the physical size and weight of devices and opened up new opportunities for their application in delivering unobtrusive healthcare services. In particular, kinetic and kinematic systems, that use sensors attached to the body, are currently being used to measure and understand many...

    Provided By Scientific Research Publishing

  • White Papers // Apr 2013

    Integrating RFID Technology with Intelligent Classifiers for Meaningful Prediction Knowledge

    "Radio Frequency IDentification (RFID) is a wireless technology that has been designed to automatically identify tagged objects using a reader. Several applications of this technology have been introduced in past literature such as pet identification and luggage tracking which have increased the efficiency and effectiveness of each environment into which...

    Provided By Scientific Research Publishing

  • White Papers // Apr 2013

    Personal Perspectives: Individual Privacy in the IOT

    "The Internet Of Things (IOT) is the extension of the Internet to the next level, i.e., bringing the Internet to the real physical world of things. In this paper, 22 people working with different aspects of IOT development were inter-viewed in Finland and in China, in order to investigate their...

    Provided By Scientific Research Publishing

  • White Papers // Aug 2010

    A Real-Time-Enabled, Blackboard-Based, Publish/Subscribe Architecture for Wireless Sensor Nodes

    Wireless sensor network nodes have only limited resources concerning memory and battery life-time. Memory can be efficiently used by sharing data, and the life-time of a battery can be extended, when the node has long power saving sleep-phases. The authors propose a publish/subscribe architecture that achieves these two aims. The...

    Provided By Scientific Research Publishing

  • White Papers // Jul 2010

    Performance Analysis of Downlink MIMO WCDMA Systems Using Antenna Selection in Transmitter and MRC Plus LDD in Receiver Over Correlated Nakagami-Fading Channels

    In this paper Bit Error Rate (BER) performance is analyzed for Multiple Input-Multiple Output (MIMO) communications systems using antenna selection in the transmitter, Maximal Ratio Combining (MRC) and Linear De-correlating Detector (LDD) in the receiver in Wide band Code Division Multiple Access (WCDMA) downlink channels with correlated Nakagami fading. The...

    Provided By Scientific Research Publishing

  • White Papers // Jun 2010

    Interference Management for DS-CDMA Systems Through Closed-Loop Power Control, Base Station Assignment, and Beamforming

    In this paper, the authors propose a Smart Step closed-loop Power Control (SSPC) algorithm and a Base Station Assignment method based on Minimizing the Transmitter Power (BSA-MTP) technique in a Direct Sequence-Code Division Multiple Access (DS-CDMA) receiver with frequency-selective Rayleigh fading. This receiver consists of three stages. In the first...

    Provided By Scientific Research Publishing

  • White Papers // May 2009

    SAGE: A Strong Privacy-Preserving Scheme Against Global Eavesdropping for eHealth Systems

    The eHealth system is envisioned as a promising approach to improving health care through information technology, where security and privacy are crucial for its success and large-scale deployment. In this paper, the authors propose a strong privacy preserving Scheme Against Global Eavesdropping, named SAGE, for eHealth systems. The proposed SAGE...

    Provided By Scientific Research Publishing

  • White Papers // Feb 2011

    A Novel Cross-Layer Scheduling Algorithm for OFDMA-Based WiMAX Networks

    IEEE 802.16e based WiMAX networks promise a desirable available quality of service for mobile users and scheduling algorithms provide the best effective use of network resources in it. In this paper, the authors propose a novel cross-layer scheduling algorithm for OFDMA-based WiMAX networks. Their scheme employs a priority function at...

    Provided By Scientific Research Publishing

  • White Papers // Sep 2011

    Novel Semi-blind Channel Estimation Schemes for Rayleigh Flat Fading MIMO Channels

    In this paper, the authors propose two novel semi-blind channel estimation techniques based on QR decomposition for Rayleigh flat fading Multiple Input Multiple Output (MIMO) channel using various pilot symbols. In the first technique, the flat-fading MIMO channel matrix H can be decomposed as an upper triangular matrix R and...

    Provided By Scientific Research Publishing

  • White Papers // Feb 2012

    Energy Efficient Non-Cooperative Methods for Resource Allocation in Cognitive Radio Networks

    In a cognitive radio network wherein primary and secondary users coexist, an efficient power allocation method represents one of the most important key aspects. This paper provides a novel approach based on a game theory framework to solve this problem in a distributed and fair way. Formulated as an optimization...

    Provided By Scientific Research Publishing

  • White Papers // Feb 2012

    Utilizing Colored Pheromones and Helping Ants for Wireless Mesh Networks Routing

    Improving routing algorithm performance not only leads to appreciate the quality of data transmission, but also increases the speed of data transfer. In this paper, the authors propose a hybrid method which is a combination of traffic classification by the help of colored pheromones and helping ants method in the...

    Provided By Scientific Research Publishing

  • White Papers // Feb 2012

    An Improved Name Disambiguation Method Based on Atom Cluster

    An improved name disambiguation method based on atom cluster. Aiming at the method of character-related properties of similarity based on information extraction depends on the character information, a new name disambiguation method is proposed, and improved k-means algorism for name disambiguation is proposed in this paper. The cluster analysis cluster...

    Provided By Scientific Research Publishing

  • White Papers // Feb 2012

    NAMD Package Benchmarking on the Base of Armenian Grid Infrastructure

    The parallel scaling (parallel performance up to 48 cores) of NAMD package has been investigated by estimation of the sensitivity of interconnection on speedup and benchmark results - testing the parallel performance of Myrinet, Infini-band and Gigabit Ethernet networks. The system of ApoA1 of 92 K atoms, as well as...

    Provided By Scientific Research Publishing

  • White Papers // Feb 2012

    An improved Artificial Immune System based Network Intrusion Detection by Using Rough Set

    With the increasing worldwide network attacks, Intrusion Detection (ID) has become a popular research topic in last decade. Several artificial intelligence techniques such as neural networks and fuzzy logic have been applied in ID. The results are varied. The intrusion detection accuracy is the main focus for Intrusion Detection Systems...

    Provided By Scientific Research Publishing

  • White Papers // Nov 2010

    Optimal Spacing Design for Pilots in OFDM Systems Over Multipath Fading Channels

    In wireless Orthogonal Frequency Division Multiplexing (OFDM) systems, the time-varying channel is often estimated by algorithms based on pilot symbols. Such an estimator, however, requires statistical prior knowledge that is not easily obtained. Therefore, the pilot tones have to be close enough to fulfill the sampling theorem. In this case...

    Provided By Scientific Research Publishing

  • White Papers // Nov 2010

    A Novel Digital Rights Management Scheme in P2P Networks

    P2P networking is a distributed application architecture that partitions tasks or workloads between peers. How to integrate P2P networks and DRM to offer a novel content distribution mode for digital media re-sources is a significant research project. In this paper, a novel DRM architecture in P2P Networks is pro-posed, three...

    Provided By Scientific Research Publishing

  • White Papers // Nov 2010

    All-Optical Cryptographic Device for Secure Communication

    An all-optical cryptographic device for secure communication, based on the properties of soliton beams, is presented. It can encode a given bit stream of optical pulses, changing their phase and their amplitude as a function of an encryption serial key that merge with the data stream, generating a ciphered stream....

    Provided By Scientific Research Publishing

  • White Papers // Nov 2010

    Using Hybrid Adaptive Techniques to Reduce Multipath Effects in S-PCN Mobile Terminals

    Multipath signal processing is a promising technique for increasing the capacity of downlink frequency of Satellite Personal Communication Networks (S-PCN). The paper presents an approach to processing and reducing multipath signals received from S-PCN typified of mobile terminal users in clustered or mountainous environment. Use of hybrid linear adaptive antenna...

    Provided By Scientific Research Publishing

  • White Papers // Aug 2010

    Compromise in CDMA Network Planning

    CDMA network planning, for example in 3G UMTS networks, is an important task whether for upgrading existing networks or planning new networks. It is a time consuming, computationally hard, task and generally requires the consideration of both downlink and uplink requirements. Simulation experiments presented here suggest that if time is...

    Provided By Scientific Research Publishing

  • White Papers // Aug 2010

    A Novel Black Box Based Behavioral Model of Power Amplifier for WCDMA Applications

    In this paper, Black Box approach is presented for behavioral modeling of a non linear power amplifier with memory effects. Large signal parameters of a Motorola LDMOS power amplifier driven by a WCDMA signal were extracted while taking into considerations the power amplifier's bandwidth. The proposed model was validated based...

    Provided By Scientific Research Publishing

  • White Papers // Aug 2010

    Comparison of 4 Multi-User Passive Network Topologies for 3 Different Quantum Key Distribution

    The purpose of this paper is to compare the performance of four passive optical network topologies in implementing multi-user quantum key distribution, using 3 protocols proposed by quantum cryptography (B92, EPR, and SSP). The considered networks are the passive-star network, the optical-ring network based on the Signac interferometer, the wavelength-routed...

    Provided By Scientific Research Publishing

  • White Papers // Aug 2010

    An Introduction to RFID Technology

    RFID technology emerged some time back and was not used that much because of lack of standardization and high costs. Latest technologies have brought costs down and standards are being developed. Today RFID is mostly used as a medium for numerous tasks including managing supply chains, tracking livestock, preventing counterfeiting,...

    Provided By Scientific Research Publishing

  • White Papers // Aug 2010

    A Security Transfer Model Based on Active Defense Strategy

    This paper proposes a security transfer model founded on the active defense strategy. In the unit of security domains of dynamic overlaying routers, this model defines the intelligent agent/management of network element together with the self-similar, hierarchical and distributed management structure. Furthermore, the authors use deceptive packets so that the...

    Provided By Scientific Research Publishing

  • White Papers // Aug 2010

    Optimization of UMTS Network Planning Using Genetic Algorithms

    The continuously growing of cellular networks complexity, which followed the introduction of UMTS technology, has reduced the usefulness of traditional design tools, making them quite unworthy. The purpose of this paper is to illustrate a design tool for UMTS optimized net planning based on genetic algorithms. In particular, some utilities...

    Provided By Scientific Research Publishing

  • White Papers // May 2010

    Performance Evaluation of Java Web Services: A Developer's Perspective

    As the population of the Internet grows rapidly the development of web technologies becomes extremely important. For the evolvement of Web 2.0, web services are essential. Web services are programs that allow computers of different platforms on the web to interactively communicate without the need of extra data for human...

    Provided By Scientific Research Publishing

  • White Papers // Mar 2012

    Improved Radio Network Dimensioning for Real-Time Polling Service on IEEE 802.16 Wireless Networks With QoS Consideration

    Recently, applications of real-time Polling Service (rtPS) in IEEE 802.16 wireless networks have gained considerable popularity. These applications generate large amounts of real time traffic in the network and thus maintaining the Quality of Service (QoS) such as packet delay requirement in rtPS dominant networks is critical. Existing dimensioning methodology...

    Provided By Scientific Research Publishing

  • White Papers // May 2011

    Design and Simulation of a Secure and Robust Underwater Acoustic Communication System in the Persian Gulf

    In recent years, UnderWater Acoustic (UWA) communications have received much attention as their applications have begun to shift from military toward commercial. Digital communications through UWA channels differ substantially from those in other media, such as radio channels, due to severe signal degradations caused by multipath propagation and high temporal...

    Provided By Scientific Research Publishing

  • White Papers // May 2011

    On Time-of-Arrival Statistic of Gaussian Channel Model

    A model of an angle-spread source, termed the "Gaussian Channel Model" is considered. The cumulative distribution function of the Time-of-Arrival of the multipath components is derived for an arbitrary angle spread. The simple approximate expressions for the Time-of-Arrival cumulative distribution function and probability density function are proposed. Numerical results obtained...

    Provided By Scientific Research Publishing

  • White Papers // May 2011

    On Synchronization of Pinning-Controlled Networks With Reducible and Asymmetric Coupling Matrix

    Complex dynamical networks are found to be common systems in the real world, such as genetic regulatory networks, biological neural networks, telephone graphs, etc. Therefore, lots of researchers from many fields of science and engineering are attracted to focus on analyzing their complex behaviors. Particularly, the synchronization of a complex...

    Provided By Scientific Research Publishing

  • White Papers // Feb 2011

    Fast Sparse Multipath Channel Estimation with Smooth L0 Algorithm for Broadband Wireless Communication Systems

    Broadband wireless channels are often time dispersive and become strongly frequency selective in delay spread domain. Commonly, these channels are composed of a few dominant coefficients and a large part of coefficients are approximately zero or under noise floor. To exploit sparsity of Multi-Path Channels (MPCs), there are various methods...

    Provided By Scientific Research Publishing

  • White Papers // Feb 2011

    Efficient Power Loading in MIMO-OFDM Based Cognitive Radio Networks

    Due to their spectrum shaping capability and high adaptability, the multi-carrier systems are considered as prime candidates for use in the Cognitive Radio (CR) networks. In these structures, the deactivation of the Primary Users' (PUs) bands makes the Secondary Users (SUs) use a limited number of sub-carriers, so the total...

    Provided By Scientific Research Publishing

  • White Papers // Feb 2011

    Statistical Recognition Method of Binary BCH Code

    In this paper, a statistical recognition method of the binary BCH code is proposed. The method is applied to both primitive and non-primitive binary BCH code. The block length is first recognized based on the cyclic feature under the condition of the frame length known. And then candidate polynomials are...

    Provided By Scientific Research Publishing

  • White Papers // Feb 2011

    Multi-Branch Fractional Multi-Bit Differential Detection of Continuous Phase Modulation With Decision Feedback

    Differential detection of continuous phase modulation suffers from significant intersymbol interference. To reduce bit error rate, Multi-branch Fractional Multi-bit Differential Detection (MFMDD) with decision feed-back is proposed. By introducing decision feedback in multi-bit differential detected signals, severe inter-symbol interference can be removed. Simulation results show that the proposed structure can...

    Provided By Scientific Research Publishing

  • White Papers // Feb 2011

    Pilot Placement for Time-Varying MIMO OFDM Channels With Virtual Subcarriers

    The rapid time-variation of a fading multipath environment can impair the performance of Multiple-Input Multiple-Output Orthogonal Frequency Division Multiplexing (MIMO OFDM). This paper proposes a pilot placement method for MIMO OFDM systems under time-varying channels with the guard band. The time-varying channel is described by complex exponential Basis Expansion Model...

    Provided By Scientific Research Publishing

  • White Papers // Feb 2011

    Embedding Authentication & Authorization in Discovery Protocols for Standard Based Publish/Subscribe Middleware: A Performance Evaluation

    Standard based Pub/Sub middleware, such as OMG Data Distribution Service (DDS), could assume a key role in supporting computer communications requiring continuous state information updating, deterministic deadline to data delivering and real time information adjourning. This kind of capability could be well exploited by Peer-To-Peer (P2P) systems, Internet-wide as long...

    Provided By Scientific Research Publishing

  • White Papers // Nov 2010

    SimNP: A Flexible Platform for the Simulation of Network Processing Systems

    Network processing plays an important role in the development of Internet as more and more complicated applications are deployed throughout the network. With the advent of new platforms such as Network Processors (NPs) that incorporate novel architectures to speedup packet processing, there is an increasing need for an efficient method...

    Provided By Scientific Research Publishing

  • White Papers // Nov 2010

    Locating Mobile Users Using Base Stations of Cellular Networks

    The location of mobile users served by cellular networks is considered. The chosen approach assumes that location is estimated through angular triangulation with three Base Stations (BSs). New estimates are proposed, which are described by closed-form expressions, and are alternatives to the maximum likelihood estimate. It is shown that the...

    Provided By Scientific Research Publishing

  • White Papers // Nov 2011

    Fast Handoff for 802.11 Wireless Network

    Whenever the mobile station moves from the range of one access point and comes to the range of another access point a handoff process is occurred. This process takes a long time when using the IEEE 802.11 standard handoff and this delay affect the real time and multimedia applications. This...

    Provided By Scientific Research Publishing