Scientific Research Publishing

Displaying 1-40 of 225 results

  • White Papers // Feb 2015

    A MATLAB-Based Numerical and GUI Implementation of Cross-Gradients Joint Inversion of Gravity and Magnetic Data

    "The cross-gradients joint inversion technique has been applied to multiple geophysical data with a significant improvement on compatibility, but its numerical implementation for practical use is rarely discussed in the literature. The authors present a MATLAB-based three-dimensional cross-gradients joint inversion program with application to gravity and magnetic data. The input...

    Provided By Scientific Research Publishing

  • White Papers // Feb 2015

    Formalization of Federated Schema Architectural Style Variability

    "Data integration requires managing heterogeneous schema information. A federated database system integrates heterogeneous, autonomous database systems on the schema level, whereby both local applications and global applications accessing multiple component database systems are supported. Such a federated database system is a complex system of systems which requires a well-designed organization...

    Provided By Scientific Research Publishing

  • White Papers // Feb 2015

    Semantic Enrichment of XML Schema to Transform Association Relationships in ODL Schema

    "In this paper, the authors present an approach for transforming an XML schema they enriched in ODL (Object Definition Language) schemas. It is possible to realize the concepts of ODL in a model of XML schema; they propose to introduce an enrichment concretizing these concepts in the XML schema models....

    Provided By Scientific Research Publishing

  • White Papers // Feb 2015

    Content-Based Image Retrieval Using SOM and DWT

    "Content-Based Image Retrieval (CBIR) from a large database is becoming a necessity for many applications such as medical imaging, Geographic Information Systems (GIS), space search and many others. However, the process of retrieving relevant images is usually preceded by extracting some discriminating features that can best describe the database images....

    Provided By Scientific Research Publishing

  • White Papers // Feb 2015

    Timed-Automata Based Model-Checking of a Multi-Agent System: A Case Study

    "A multi-agent based transport system is modeled by timed automata model extended with clock variables. The correctness properties of safety and liveness of this model are verified by timed automata based UPPAAL. Agents have a degree of control on their own actions, have their own threads of control, and under...

    Provided By Scientific Research Publishing

  • White Papers // Feb 2015

    Towards Designing an Intelligent Educational Assessment Tool

    "Assessment is an important part of learning process. It can be defined as the process of gathering information for the purpose of making judgments about a current state of affairs presumably for the purpose of enhancing future outcomes. It determines whether or not the goals of education are being met....

    Provided By Scientific Research Publishing

  • White Papers // Jan 2015

    E-Learning Optimization Using Supervised Artificial Neural-Network

    "Improving learning outcome has always been an important motivating factor in educational inquiry. In a blended learning environment where e-learning and traditional face to face class tutoring are combined, there are opportunities to explore the role of technology in improving student's grades. A student's performance is impacted by many factors...

    Provided By Scientific Research Publishing

  • White Papers // Jan 2015

    The Construction of Human Resource Management Cloud Service Platform

    "Human resource management service faced the challenges of promoting efficiency, costs saving, quick responding and so on. In order to face these challenges, this paper puts forward a ""6 1"" structure of human resource management service combined with some characteristics of cloud computing, elaborates the service mode of the cloud...

    Provided By Scientific Research Publishing

  • White Papers // Jan 2015

    Research on Supply Chain Simulation System Based on Internet of Things

    "As one of the top ten core industries in China, Internet of things has gradually changed the people life, by influencing enterprise production, storage and transportation, express, supermarket shopping, etc. By using Internet of things technology in the supply chain, enterprise can optimize the structure and process of supply chain...

    Provided By Scientific Research Publishing

  • White Papers // Dec 2014

    Ontologies for Software Project Management: A Review

    "Software project management is a knowledge intensive process that can benefit substantially from ontology development and ontology engineering. Ontology development could facilitate or improve substantially the software development process through the improvement of knowledge management, the increase of software and artefacts reusability, and the establishment of internal consistency within project...

    Provided By Scientific Research Publishing

  • White Papers // Dec 2014

    Research on Location-Inventory Model in Grain Emergency Network

    "Once the disaster occurred, a huge amount of grain supply is needed from disaster area. Because of the short shelf life, grain is very strict with reserve environment and needed to rotate on a regular basis in the process of reserves. Considering the limitations of existing related research, this paper...

    Provided By Scientific Research Publishing

  • White Papers // Nov 2014

    Smart Phone Application Evaluation with Usability Testing Approach

    "In this paper, the authors present a narrative role methodology based on different people's opinions, which is now implemented in their research environment for the purpose of testing novel techniques, the usability testing of most common used smart phones such as Android and Apple Smartphone application. This paper analysis is...

    Provided By Scientific Research Publishing

  • White Papers // Nov 2014

    An Integrated Intrusion Detection System by Combining SVM with AdaBoost

    "In the Internet, computers and network equipments are threatened by malicious intrusion, which seriously affects the security of the network. Intrusion behavior has the characteristics of fast upgrade, strong concealment and randomness, so that traditional methods of Intrusion Detection System (IDS) are difficult to prevent the attacks effectively. In this...

    Provided By Scientific Research Publishing

  • White Papers // Nov 2014

    Categorization of Software Release Risks and Its Abatement Strategy

    "Growing competition in the software industry with the persistently changing needs and the usual problems associated with software release, which have made acceptance of new software in market, are extremely important for the success. Volatility in the software developmental processes is generally difficult to handle. The change request at any...

    Provided By Scientific Research Publishing

  • White Papers // Nov 2014

    An Empirical Study of the Optimum Team Size Requirement in a Collaborative Computer Programming/Learning Environment

    "Pair programming has been widely acclaimed the best way to go in computer programming. Recently, collaboration involving more subjects has been shown to produce better results in programming environments. However, the optimum group size needed for the collaboration has not been adequately addressed. This paper seeks to inculcate and acquaint...

    Provided By Scientific Research Publishing

  • White Papers // Nov 2014

    Detecting Design Patterns in Object-Oriented Program Source Code by Using Metrics and Machine Learning

    "Detecting well-known design patterns in object-oriented program source code can help maintainers understand the design of a program. Through the detection, the understandability, maintainability, and reusability of object-oriented programs can be improved. There are automated detection techniques; however, many existing techniques are based on static analysis and use strict conditions...

    Provided By Scientific Research Publishing

  • White Papers // Nov 2014

    Applications of a Streaming Video Server in a Mobile Phone Live Streaming System

    "In this paper, the authors describe the entire process of completing a multicast streaming media server and applying it to a cell phone live streaming system. By using the RTSP protocol, the streaming media server controls the connection of video capture client, data stream reception and processing as well as...

    Provided By Scientific Research Publishing

  • White Papers // Nov 2014

    An Integrated Multi-Echelon Model for a Sustainable Closed Loop Supply Chain Network Design

    "The integration of entire supply and value chain into a closed loop network is gaining more importance in recent times in order to ensure a business to be economically and environmentally sustainable with the changing trends in business and social environments, growing environmental consciousness in the society and government legislations...

    Provided By Scientific Research Publishing

  • White Papers // Oct 2014

    Usability Experiments to Evaluate UML/SysML-Based Model Driven Software Engineering Notations for Logic Control in Manufacturing Automation

    "Many industrial companies and researchers are looking for more efficient Model Driven Engineering approaches (MDE) in software engineering of Manufacturing automation Systems (MS) especially for logic control programming, but are uncertain about the applicability and effort needed to implement those approaches in comparison to classical Programmable Logic Controller (PLC) programming...

    Provided By Scientific Research Publishing

  • White Papers // Oct 2014

    Significant Factors for Reliability Estimation of Component Based Software Systems

    "Software reliability is defined as the probability of the failure-free operation of a software system for a specified period of time in a specified environment. Traditional approaches for software reliability analysis are black box approaches. These approaches use the software as a whole. At present, main emphasis of software is...

    Provided By Scientific Research Publishing

  • White Papers // Oct 2014

    Rapid Deployment of Internet-Connected Environmental Monitoring Devices

    "Advances in electronic sensing and monitoring systems and the growth of the communications infrastructure have enabled users to gain immediate access to information and interaction with physical devices. To facilitate the uploading, viewing, and sharing of data via the internet, while avoiding the complexities and expense of creating personal web...

    Provided By Scientific Research Publishing

  • White Papers // Oct 2014

    Improved High Definition Multimedia Interface Authentication Mechanism

    "Security information has become so significant in transmission due to the rapid advancement in digital data exchange. Thus, it is necessary to protect the confidentiality and licensing of video content from illegal access. Currently, High-bandwidth Digital Content Protection (HDCP) provides the confidentiality and licensing of digital content for High Digital...

    Provided By Scientific Research Publishing

  • White Papers // Oct 2014

    IoT Testbed Business Model

    "The Internet-of-Things (IoT) is today one of the hypes in the technological world but despite the enormous attention and research investment, the clear business value is still hard to perceive. IoT deployments are costly to be installed, managed and maintained, and need to provide a very clear value to justify...

    Provided By Scientific Research Publishing

  • White Papers // Sep 2014

    Link Budget Design with Performance Evaluation of Tunable Impulse-Based Ultra Wideband to Support the Integration of Wireless Sensing and Identifications Infrastructures

    "Recently, many studies propose the use of ultra-wideband technology for passive and active radio frequency identification systems as well as for wireless sensor networks due to its numerous advantages. By harvesting these advantages of IR-UWB technology at the physical-layer design, this paper proposes that a cross layer architecture platform can...

    Provided By Scientific Research Publishing

  • White Papers // Aug 2014

    Big Data Usage in the Marketing Information System

    Data generation, storage capacity, processing power and analytical capacity increase had created a technological phenomenon named big data that could create big impact in research and development. In the marketing field, the use of big data in research can represent a deep dive in consumer understanding. This paper discusses the...

    Provided By Scientific Research Publishing

  • White Papers // Aug 2014

    The Augmented Reality Application of Multimedia Technology in Aquatic Organisms Instruction

    "In this paper, the authors elaborate the features and superiority of applying multimedia technology to aquatic organisms in a science and life technology course. The augmented reality application of multimedia technology in aquatic organisms' instruction has its own features, teaching information capacity, interactive user interface. The paper concludes the superiority...

    Provided By Scientific Research Publishing

  • White Papers // Jul 2014

    Managing Computing Infrastructure for IoT Data

    "Digital data have become a torrent engulfing every area of business, science and engineering disciplines, gushing into every economy, every organization and every user of digital technology. In the age of big data, deriving values and insights from big data using rich analytics becomes important for achieving competitiveness, success and...

    Provided By Scientific Research Publishing

  • White Papers // Jul 2014

    A Multi-Agent School Simulation Based on Hierarchical Social Networks

    "The quality of K-12 education has been a very big concern for years. Previous methods studied only one or two factors, such as school choice, or teacher quality, on school performance. Therefore the results they provide can be limited. The authors propose a multi-agent approach to integrate multiple actors in...

    Provided By Scientific Research Publishing

  • White Papers // Jun 2014

    A Quaternion Scaled Unscented Kalman Estimator for Inertial Navigation States Determination Using INS/GPS/Magnetometer Fusion

    "This Inertial Navigation System (INS), Global Positioning System (GPS) and fluxgate magnetometer technologies have been widely used in a variety of positioning and navigation applications. In this paper, a low cost solid state INS/GPS/Magnetometer integrated navigation system has been developed that incorporates measurements from an Inertial Navigation System (INS), Global...

    Provided By Scientific Research Publishing

  • White Papers // Jun 2014

    Designs of All-Optical Higher-Order Signed-Digit Adders Using Polarization-Encoded Based Terahertz-Optical-Asymmetric-Demultiplexer (TOAD)

    Various designed circuits for multiple-valued all-optical arithmetic are demonstrated. The Terahertz-Optical-Asymmetric-Demultiplexer (TOAD) switch is used as the basic structure unit in the proposed circuits due to its compact size, thermal stability, and low power operation. The designs of trinary and quaternary signed-digit numbers based adders are presented using different polarized...

    Provided By Scientific Research Publishing

  • White Papers // Jun 2014

    Multidimensional Business to Business E-Commerce Maturity Application: Assessment on Its Practicality

    In most countries, Small Medium Enterprises (SMEs) are known as main players in generating domestic-led investment and stimulate economic expansion. They are vital for economic growth and innovation, poverty reduction, local employment and development, and social cohesion. However, in the current digitally-connected trading economy, SMEs have faced many new challenges...

    Provided By Scientific Research Publishing

  • White Papers // Jun 2014

    Wormhole Attack Behaviour in Monte-Carlo Localization for Mobile Sensor Networks

    "Localization is the basic requirement for network management in wireless sensor networks as it helps nodes find their absolute position coordinates and in gathering information relevant to their locations. A localization algorithm has to be dynamic, scalable and should not impose high computation or communication overhead. The localization systems are...

    Provided By Scientific Research Publishing

  • White Papers // May 2014

    Reliable Content Distribution in P2P Networks Based on Peer Groups

    "Peer-To-Peer (P2P) networks are highly dynamic systems which are very popular for content distribution in the Internet. A single peer remains in the system for an unpredictable amount of time, and the rate in which peers enter and leave the system, i.e. the churn, is often high. A user that...

    Provided By Scientific Research Publishing

  • White Papers // Jan 2014

    Design of Low Power Comparator Using DG Gate

    In recent studies, reversible logic has emerged as a great scene of research, having applications in low power CMOS circuits, optical computing, quantum computing and nanotechnology. The classical logic gates such as AND, OR, EXOR and EXNOR are not reversible. In the existing literature, reversible sequential circuits designs are offered...

    Provided By Scientific Research Publishing

  • White Papers // Dec 2013

    Sensors Grouping Model for Wireless Sensor Network

    "The grouping of sensors is a calculation method for partitioning the wireless sensor network into groups, each group consisting of a collection of sensors. A sensor can be an element of multiple groups. In the present paper, the authors will show a model to divide the wireless sensor network sensors...

    Provided By Scientific Research Publishing

  • White Papers // Dec 2013

    Clustering in Wireless Multimedia Sensor Networks

    "Wireless Multimedia Sensor Networks (WMSNs) are comprised of small embedded audio/video motes capable of extracting the surrounding environmental information, locally processing it and then wirelessly transmitting it to sink/base station. Multimedia data such as image, audio and video is larger in volume than scalar data such as temperature, pressure and...

    Provided By Scientific Research Publishing

  • White Papers // Oct 2013

    An Improved SOI CMOS Technology Based Circuit Technique for Effective Reduction of Standby Subthreshold Leakage

    Silicon-On-Insulator (SOI) CMOS technology is a very attractive option for implementing digital integrated circuits for low power applications. This paper presents migration of standby subthreshold leakage control technique from a bulk CMOS to SOI CMOS technology. An improved SOI CMOS technology based circuit technique for effective reduction of standby subthreshold...

    Provided By Scientific Research Publishing

  • White Papers // Oct 2013

    Cloud Computing Solution and Services for RFID Based Supply Chain Management

    "Deploying and implementing RFID systems for tracking and controlling products in supply chain management is not affordable for small and midsized companies due to its complexity, cost, and difficulties pertaining data management and maintenance. Cloud computing can be used to mitigate the risks associated with the implementation and deployment of...

    Provided By Scientific Research Publishing

  • White Papers // Sep 2013

    E-Commerce Business Models and Search Engine Dependency

    E-commerce business models attracted a great deal of attention in the last years. An increasing number of bargains are realized via online transactions. However, some business models suffer distinctly under changes of search engine algorithms while others experience continuous stable traffic. This paper sheds light on the drivers of the...

    Provided By Scientific Research Publishing

  • White Papers // Sep 2013

    System Architecture and Design Flow of Smart Mobile Sensing Systems

    "In this paper, the authors present the architecture and design flow of smart mobile sensing systems that performs wireless sensor data transmission, data analysis and display in real-time. Multiple wireless protocols are used for sensor data transmission including the Bluetooth, cellular data network and Wi-Fi for Internet access, and Near...

    Provided By Scientific Research Publishing

  • White Papers // Jun 2010

    Interference Management for DS-CDMA Systems Through Closed-Loop Power Control, Base Station Assignment, and Beamforming

    In this paper, the authors propose a Smart Step closed-loop Power Control (SSPC) algorithm and a Base Station Assignment method based on Minimizing the Transmitter Power (BSA-MTP) technique in a Direct Sequence-Code Division Multiple Access (DS-CDMA) receiver with frequency-selective Rayleigh fading. This receiver consists of three stages. In the first...

    Provided By Scientific Research Publishing

  • White Papers // Jul 2011

    A High-Level Architecture for Intrusion Detection on Heterogeneous Wireless Sensor Networks: Hierarchical, Scalable and Dynamic Reconfigurable

    Networks protection against different types of attacks is one of most important posed issue into the network and information security domains. This problem on Wireless Sensor Networks (WSNs), in attention to their special properties, has more importance. Now, there are some of proposed solutions to protect Wireless Sensor Networks (WSNs)...

    Provided By Scientific Research Publishing

  • White Papers // Aug 2011

    Multiple Targets Tracking Using Kinematics in Wireless Sensor Networks

    Target tracking is considered as one of the cardinal applications of a wireless sensor network. Tracking multiple targets is more challenging than tracking a single target in a wireless sensor network due to targets' movement in different directions, targets' speed variations and frequent connectivity failures of low powered sensor nodes....

    Provided By Scientific Research Publishing

  • White Papers // Aug 2011

    Performance Analysis of an Enhanced Load Balancing Scheme for Wireless Sensor Networks

    Research interest in sensor networks routing largely considers minimization of energy consumption as a major performance criterion to provide maximum sensors network lifetime. When considering energy conservation, routing protocols should also be designed to achieve fault tolerance in communications. Moreover, due to dynamic topology and random deployment, incorporating reliability into...

    Provided By Scientific Research Publishing

  • White Papers // Aug 2011

    Modeling of Data Reduction in Wireless Sensor Networks

    In this paper, the authors present a stochastic model for data in a Wireless Sensor Network (WSN) using random field theory. The model captures the space-time behavior of the underlying phenomenon being observed by the network. They present results regarding the size and spatial distribution of the regions of the...

    Provided By Scientific Research Publishing

  • White Papers // Aug 2011

    Characterization Process of MOSFET With Virtual Instrumentation for DP4T RF Switch - A Review

    With the increasing interest in radio frequency switch by using the CMOS circuit technology for the wireless communication systems is in demand. A traditional n-MOS Single-Pole Double-Throw (SPDT) switch has good performances but only for a single operating frequency. For multiple operating frequencies, to transmitting or receiving information through the...

    Provided By Scientific Research Publishing

  • White Papers // Feb 2010

    Evaluation of Multiusers-Interference on Radiolocation in CDMA Cellular Networks

    Radiolocation has been previously studied for CDMA networks, the effect of Multiple Access Interference has been ignored. In this paper, the authors investigate the problem of Radiolocation in the presence of Multiple Access Interference. An extensive simulation technique was developed, which measures the error in location estimation for different network...

    Provided By Scientific Research Publishing

  • White Papers // Feb 2010

    Tree Based Energy and Congestion Aware Routing Protocol for Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) have inherent and unique characteristics rather than traditional networks. They have many different constraints, such as computational power, storage capacity, energy supply and etc; of course the most important issue is their energy constraint. Energy aware routing protocol is very important in WSN, but routing protocol...

    Provided By Scientific Research Publishing

  • White Papers // Feb 2010

    Achieving Directionality and Transmit Diversity Via Integrating Beam Pattern Scanning (BPS) Antenna Arrays and OFDM

    In this paper, the authors introduce a novel merger of antenna arrays with scanning beam patterns, and Orthogonal Frequency Division Multiplexing (OFDM) systems. Controlled time varying phase shifts are applied to the antenna array elements mounted at the base station with beam patterns directed toward the desired user. This creates...

    Provided By Scientific Research Publishing

  • White Papers // Apr 2010

    Data Discrimination in Fault-Prone Sensor Networks

    While sensor networks have been used in various applications because of the automatic sensing capability and ad-hoc organization of sensor nodes, the fault-prone characteristic of sensor networks has challenged the event detection and the anomaly detection which, to some extent, have neglected the importance of discriminating events and errors. Considering...

    Provided By Scientific Research Publishing

  • White Papers // Jun 2011

    A New Kind of Dynamic Key Protocol for Wireless Sensor Network

    For the source limitations and vulnerabilities of the sensor nodes of Wireless Sensor Networks, the authors propose the new kind of dynamic key protocol for wireless sensor network, using the unidirection of hash function and the thinking of Hill to study the dynamic key matrix. Through theoretical analysis of some...

    Provided By Scientific Research Publishing

  • White Papers // Jun 2011

    MDS and Trilateration Based Localization in Wireless Sensor Network

    Localization of sensor nodes is crucial in Wireless Sensor Network because of applications like surveillance, tracking, navigation etc. Various optimization techniques for localization have been proposed in literature by different researchers. In this paper, the authors propose a two phase hybrid approach for localization using Multidimensional Scaling and trilateration, namely,...

    Provided By Scientific Research Publishing

  • White Papers // Jun 2011

    Cross Layer Design for Cooperative Transmission in Wireless Sensor Networks

    Several protocols and schemes have been proposed to reduce energy consumption in Wireless Sensor Networks (WSNs). In this paper, the authors employ farcoopt, a cross layer design approach with the concept of cooperation among the nodes with best farthest neighbor scheme to increase the Quality of Service (QoS), reduce energy...

    Provided By Scientific Research Publishing

  • White Papers // Nov 2010

    Efficient Pr-Skyline Query Processing and Optimization in Wireless Sensor Networks

    As one of the commonly used queries in modern databases, skyline query has received extensive attention from database research community. The uncertainty of the data in wireless sensor networks makes the corresponding skyline uncertain and not unique. This paper investigates the Pr-Skyline problem, i.e., how to compute the skyline with...

    Provided By Scientific Research Publishing

  • White Papers // Nov 2010

    Joint Closed-Loop Power Control and Adaptive Beamforming for Wireless Networks With Antenna Arrays in a 2D Urban Environment

    The interference reduction capability of antenna arrays and the power control algorithms have been considered separately as means to decrease the interference in wireless communication networks. In this paper, the authors propose Smart Step closed-loop Power Control (SSPC) algorithm in wireless networks in a 2D urban environment with Constrained Least...

    Provided By Scientific Research Publishing

  • White Papers // Oct 2010

    Fault-Tolerant WSN Time Synchronization

    This paper proposes a new fault-tolerant time synchronization algorithm for wireless sensor networks that requires a short time for synchronization, achieves a guaranteed time synchronization level for all non-faulty nodes, accommodates nodes that enter suspended mode and then wake up, is computationally efficient, operates in a completely decentralized manner and...

    Provided By Scientific Research Publishing

  • White Papers // Sep 2010

    An Application-Oriented Network Model for Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are energy-constrained networks. The Residual Energy Real-time Monitoring (RERM) is very important for WSNs. Moreover, network model is an important foundation of RERM research at Personal Area Network (PAN) level. Because RERM is inherently application-oriented, the net-work model adopted should also be application-oriented. However, many factors...

    Provided By Scientific Research Publishing

  • White Papers // Oct 2010

    Priority-Based Hybrid MAC for Energy Efficiency in Wireless Sensor Networks

    This paper introduces I-MAC, a new medium access control protocol for wireless sensor networks. I-MAC targets at improving both channel utilization and energy efficiency while taking into account traffic load for each sensor node according to its role in the network. I-MAC reaches its objectives through prioritized and adaptive access...

    Provided By Scientific Research Publishing

  • White Papers // Oct 2010

    Energy-Efficient Area Coverage in Heterogeneous Energy Wireless Sensor Networks

    Sensing coverage and energy consumption are two primary issues in wireless sensor networks. Sensing coverage is closely related to network energy consumption. The performance of a sensor network depends to a large extent on the sensing coverage, and its lifetime is determined by its energy consumption. In this paper, an...

    Provided By Scientific Research Publishing

  • White Papers // Oct 2010

    BEAR: A Balanced Energy-Aware Routing Protocol for Wireless Sensor Networks

    Energy aware routing protocols can be classified into energy saver and energy manager. Energy saver protocols decrease energy consumption totally. Most of them try to find the shortest path between source and destination to reduce energy consumption. But energy manager protocols balance energy consumption in network to avoid network partitioning....

    Provided By Scientific Research Publishing

  • White Papers // Oct 2010

    An Energy-Balanced Clustering Routing Algorithm for Wireless Sensor Network

    In this paper, the authors consider a network of energy constrained sensors deployed over a region. Each sensor node in such a network is systematically gathering and transmitting sensed data to a base station (via cluster-heads). This paper focuses on reducing the power consumption of wireless sensor networks. Firstly, they...

    Provided By Scientific Research Publishing

  • White Papers // Aug 2010

    Joint Centralized Power Control and Cell Sectoring for Interference Management in CDMA Cellular Systems in a 2D Urban Environment

    The interference reduction capability of cell sectoring and power control algorithms have been considered separately as means to decrease the interference in Code Division Multiple Access (CDMA) cellular systems. In this paper, the authors present Switched-Beam (SB) and Rotatable Equal Sectoring (RES) techniques for CDMA cellular systems in a 2D...

    Provided By Scientific Research Publishing

  • White Papers // Aug 2010

    Distance Measurement Model Based on RSSI in WSN

    The relationship between RSSI (Received Signal Strength Indication) values and distance is the foundation and the key of ranging and positioning technologies in wireless sensor networks. Log-Normal Shadowing Model (LNSM), as a more general signal propagation model, can better describe the relationship between the RSSI value and distance, but the...

    Provided By Scientific Research Publishing

  • White Papers // Aug 2010

    A Real-Time-Enabled, Blackboard-Based, Publish/Subscribe Architecture for Wireless Sensor Nodes

    Wireless sensor network nodes have only limited resources concerning memory and battery life-time. Memory can be efficiently used by sharing data, and the life-time of a battery can be extended, when the node has long power saving sleep-phases. The authors propose a publish/subscribe architecture that achieves these two aims. The...

    Provided By Scientific Research Publishing

  • White Papers // Jul 2010

    Performance Analysis of Downlink MIMO WCDMA Systems Using Antenna Selection in Transmitter and MRC Plus LDD in Receiver Over Correlated Nakagami-Fading Channels

    In this paper Bit Error Rate (BER) performance is analyzed for Multiple Input-Multiple Output (MIMO) communications systems using antenna selection in the transmitter, Maximal Ratio Combining (MRC) and Linear De-correlating Detector (LDD) in the receiver in Wide band Code Division Multiple Access (WCDMA) downlink channels with correlated Nakagami fading. The...

    Provided By Scientific Research Publishing

  • White Papers // Apr 2010

    A Sensing and Robot Navigation of Hybrid Sensor Network

    Traditional sensor network and robot navigation are based on the map of detecting fields available in advance. The optimal algorithms are explored to solve the energy saving, shortest path problems, etc. However, in practical environment, there are many fields, whose map is difficult to get, and need to detect. This...

    Provided By Scientific Research Publishing

  • White Papers // Dec 2010

    Predicting Ground Effects of Omnidirectional Antennas in Wireless Sensor Networks

    Omnidirectional antennas are often used for Radio Frequency (RF) communication in Wireless Sensor Networks (WSNs). Outside noise, ElectroMagnetic Interference (EMI), overloaded network traffic, large obstacles (vegetation and buildings), terrain and atmospheric composition, along with climate patterns can degrade signal quality in the form of data packet loss or reduced RF...

    Provided By Scientific Research Publishing

  • White Papers // Dec 2010

    Message Cab (MCab): Partition Restoration in MANETs Using Flexible Helping Hosts

    Helping hosts are intensively used in various schemes to restore partitioned Mobile Ad Hoc NETworks (MANETs). Most of the existing schemes offers only deterministic deployment and fixed routes for the helping hosts, and are thus not able to deal with fluctuating network traffic, which is a practical condition in many...

    Provided By Scientific Research Publishing

  • White Papers // Dec 2010

    Lifetime Optimization Via Network Sectoring in Cooperative Wireless Sensor Networks

    Employing cooperative communication in multi-hop wireless sensor networks provides the network with significant energy efficiency. However, the lifetime of such a network is directly dependant upon the lifetime of each of its individual sections (or clusters). Ignoring the fact that those sections close to sink have to forward more data...

    Provided By Scientific Research Publishing

  • White Papers // Dec 2010

    A Reliable and Efficient Time Synchronization Protocol for Heterogeneous Wireless Sensor Network

    L-SYNC is a synchronization protocol for Wireless Sensor Networks which is based on larger degree clustering providing efficiency in homogeneous topologies. In L-SYNC, the effectiveness of the routing algorithm for the synchronization precision of two remote nodes was considered. Clustering in L-SYNC is according to larger degree techniques. These techniques...

    Provided By Scientific Research Publishing

  • White Papers // Dec 2010

    A Novel Routing Algorithm for Vehicular Sensor Networks

    Recent advances in wireless communications are diffusing into many new applications. The tiny sensor node, which consists of sensing, data processing and communicating components, led to the idea of sensor networks. A sensor network composed of a large number of sensor nodes that are densely deployed either inside the phenomenon...

    Provided By Scientific Research Publishing

  • White Papers // Dec 2010

    Integer Programming Formulations for Maximum Lifetime Broadcasting Problems in Wireless Sensor Networks

    Approaches based on integer linear programming have been recently proposed for topology optimization in wireless sensor networks. They are, however, based on over-theoretical, unrealistic models. The authors' aim is to show that it is possible to accommodate realistic models for energy consumption and communication protocols into integer linear programming. They...

    Provided By Scientific Research Publishing

  • White Papers // Dec 2010

    Architecture Design of an Integrated Communication and Broadcasting Network

    Due to the power limitation of nodes in Wireless Sensor Networks (WSNs), how to maximize network lifetime has become a critical issue for deployment of WSNs. Although several schemes have been proposed for 2D WSNs, few for 3D WSNs are known. In this paper, the authors present a scheme to...

    Provided By Scientific Research Publishing

  • White Papers // Nov 2010

    Range-Based Localization in Wireless Networks Using Density-Based Outlier Detection

    Node localization is commonly employed in wireless networks. For example, it is used to improve routing and enhance security. Localization algorithms can be classified as range-free or range-based. Range-based algorithms use location metrics such as ToA, TDoA, RSS, and AoA to estimate the distance between two nodes. Proximity sensing between...

    Provided By Scientific Research Publishing

  • White Papers // Nov 2010

    TikTak: A Scalable Simulator of Wireless Sensor Networks Including Hardware/Software Interaction

    The authors present a simulation framework for wireless sensor networks developed to allow the design exploration and the complete microprocessor-instruction-level debug of network formation, data congestion, nodes interaction, all in one simulation environment. A specifically innovative feature is the co-emulation of selected nodes at clock-cycle-accurate hardware processing level, allowing code...

    Provided By Scientific Research Publishing

  • White Papers // Nov 2010

    3-D Grid-Based Localization Technique in Mobile Sensor Networks

    Considering the environmental protection, forest fire becomes a more and more serious problem and requires more concerns. This paper provides an efficient method for fire monitoring and detection in forests using wireless sensor network technology. The proposed technique estimates the location of a sensor node based on the current set...

    Provided By Scientific Research Publishing

  • White Papers // Nov 2010

    Quality of Service (QoS) Provisions in Wireless Sensor Networks and Related Challenges

    Wireless Sensor Networks (WSNs) are required to provide different levels of Quality of Services (QoS) based on the type of applications. Providing QoS support in wireless sensor networks is an emerging area of research. Due to resource constraints like processing power, memory, bandwidth and power sources in sensor networks, QoS...

    Provided By Scientific Research Publishing

  • White Papers // Feb 2011

    A New MAC Protocol for Moving Target in Distributed Wireless Sensor Networks

    A Wireless Sensor Network (WSN) is composed of many nodes with limited power supply; most nodes are stationary in the network which could probably involve a few mobile nodes. Various Medium Access Control (MAC) protocols specially aimed at a target locating application for WSNs have been proposed. However, most of...

    Provided By Scientific Research Publishing

  • White Papers // Feb 2011

    Compressing Information of Target Tracking in Wireless Sensor Networks

    Target tracking is a well studied topic in wireless sensor networks. It is a procedure that nodes in the network collaborate in detecting targets and transmitting their information to the base-station continuously, which leads to data implosion and redundancy. To reduce traffic load of the network, a data compressing based...

    Provided By Scientific Research Publishing

  • White Papers // May 2009

    SAGE: A Strong Privacy-Preserving Scheme Against Global Eavesdropping for eHealth Systems

    The eHealth system is envisioned as a promising approach to improving health care through information technology, where security and privacy are crucial for its success and large-scale deployment. In this paper, the authors propose a strong privacy preserving Scheme Against Global Eavesdropping, named SAGE, for eHealth systems. The proposed SAGE...

    Provided By Scientific Research Publishing