Scientific Research Publishing

Displaying 1-40 of 316 results

  • White Papers // May 2015

    Predictive Prefetching for Parallel Hybrid Storage Systems

    In this paper, the authors present a predictive prefetching mechanism that is based on probability graph approach to perform prefetching between different levels in a parallel hybrid storage system. The fundamental concept of their approach is to invoke parallel hybrid storage system's parallelism and pre-fetch data among multiple storage levels...

    Provided By Scientific Research Publishing

  • White Papers // Apr 2015

    Research of Big Data Based on the Views of Technology and Application

    In the era of big data, large amounts of data affect the authors' work, life and study, even national economic development. It provides a new way of thinking and approaches to analyze and solve problems, which gradually becomes a hot research. Based on describing the concept and characteristics of big...

    Provided By Scientific Research Publishing

  • White Papers // Apr 2015

    Ensuring Security, Confidentiality and Fine-Grained Data Access Control of Cloud Data Storage Implementation Environment

    With the development of cloud computing, the mutual understandability among distributed data access control has become an important issue in the security field of cloud computing. To ensure security, confidentiality and fine-grained data access control of Cloud Data Storage (CDS) environment, the authors proposed Multi-Agent System (MAS) architecture. This architecture...

    Provided By Scientific Research Publishing

  • White Papers // Apr 2015

    The IRIS Development Platform and Proposed Object-Oriented Data Base

    Various code development platforms, such as the ATHENA framework of the ATLAS experiment encounter lengthy compilation/linking times. To augment this situation, the IRIS development platform was built as a software development framework acting as compiler, cross-project linker and data fetcher, which allow hot-swaps in order to compare various versions of...

    Provided By Scientific Research Publishing

  • White Papers // Apr 2015

    A Data-Placement Strategy Based on Genetic Algorithm in Cloud Computing

    With the development of computerized business application, the amount of data is increasing exponentially. Cloud computing provides high performance computing resources and mass storage resources for massive data processing. In distributed cloud computing systems, data intensive computing can lead to data scheduling between data centers. Reasonable data placement can reduce...

    Provided By Scientific Research Publishing

  • White Papers // Mar 2015

    Human Resource Management in the Era of Big Data

    In the era of big data, enterprise management is undergoing tremendous changes. Human resource department, as an important part of the company, has also been affected by big data. The paper is in the context of the era of big data, discussing the application of big data in major modules...

    Provided By Scientific Research Publishing

  • White Papers // Mar 2015

    M/G/1 Vacation Queueing Systems with Server Timeout

    In this paper, the authors consider a single-server vacation queueing system that operates in the following manner. When the server returns from a vacation, it observes the following rule. If there is at least one customer in the system, the server commences service and serves exhaustively before taking another vacation....

    Provided By Scientific Research Publishing

  • White Papers // Mar 2015

    Inferring Locations of Mobile Devices from Wi-Fi Data

    Mobile phones are becoming a primary platform for information access. A major aspect of ubiquitous computing is context-aware applications which collect information about the environment that the user is in and use this information to provide better service and improve user experience. Location awareness makes certain applications possible, e.g., recommending...

    Provided By Scientific Research Publishing

  • White Papers // Mar 2015

    Comparative Analysis of Operating System of Different Smart Phones

    Now-a-days, rapidly increasing technology is mobile phone technology in telecommunication sector. This mobile device technology has great effect on everyone's life. This technology has reduced the burden of people in their daily life. To manage the rising demand for such mobile devices, numerous operating systems came in the market as...

    Provided By Scientific Research Publishing

  • White Papers // Mar 2015

    Electricity Logistics Storage Integration System Research

    With the booming of e-commerce business and high requirement of customer, the operation mode of e-commerce distribution center is changing. Automation equipment cannot be utilized fully due to the nature fact of electricity business, which can be described as small batch and high frequency. In this paper, the authors put...

    Provided By Scientific Research Publishing

  • White Papers // Feb 2015

    A MATLAB-Based Numerical and GUI Implementation of Cross-Gradients Joint Inversion of Gravity and Magnetic Data

    "The cross-gradients joint inversion technique has been applied to multiple geophysical data with a significant improvement on compatibility, but its numerical implementation for practical use is rarely discussed in the literature. The authors present a MATLAB-based three-dimensional cross-gradients joint inversion program with application to gravity and magnetic data. The input...

    Provided By Scientific Research Publishing

  • White Papers // Feb 2015

    Formalization of Federated Schema Architectural Style Variability

    "Data integration requires managing heterogeneous schema information. A federated database system integrates heterogeneous, autonomous database systems on the schema level, whereby both local applications and global applications accessing multiple component database systems are supported. Such a federated database system is a complex system of systems which requires a well-designed organization...

    Provided By Scientific Research Publishing

  • White Papers // Feb 2015

    Semantic Enrichment of XML Schema to Transform Association Relationships in ODL Schema

    "In this paper, the authors present an approach for transforming an XML schema they enriched in ODL (Object Definition Language) schemas. It is possible to realize the concepts of ODL in a model of XML schema; they propose to introduce an enrichment concretizing these concepts in the XML schema models....

    Provided By Scientific Research Publishing

  • White Papers // Feb 2015

    Content-Based Image Retrieval Using SOM and DWT

    "Content-Based Image Retrieval (CBIR) from a large database is becoming a necessity for many applications such as medical imaging, Geographic Information Systems (GIS), space search and many others. However, the process of retrieving relevant images is usually preceded by extracting some discriminating features that can best describe the database images....

    Provided By Scientific Research Publishing

  • White Papers // Feb 2015

    Timed-Automata Based Model-Checking of a Multi-Agent System: A Case Study

    "A multi-agent based transport system is modeled by timed automata model extended with clock variables. The correctness properties of safety and liveness of this model are verified by timed automata based UPPAAL. Agents have a degree of control on their own actions, have their own threads of control, and under...

    Provided By Scientific Research Publishing

  • White Papers // Feb 2015

    Towards Designing an Intelligent Educational Assessment Tool

    "Assessment is an important part of learning process. It can be defined as the process of gathering information for the purpose of making judgments about a current state of affairs presumably for the purpose of enhancing future outcomes. It determines whether or not the goals of education are being met....

    Provided By Scientific Research Publishing

  • White Papers // Feb 2015

    PPP Accuracy Enhancement Using GPS/GLONASS Observations in Kinematic Mode

    Commonly, kinematic PPP techniques employ un-differenced ionosphere free linear combination of GPS observations. This, however, may not provide continuous solution in urban areas as a result of limited satellite visibility. In this paper, the traditional un-differenced as well as Between-Satellite Single-Difference (BSSD) ionosphere-free linear combinations of GPS and GLONASS measurements...

    Provided By Scientific Research Publishing

  • White Papers // Jan 2015

    E-Learning Optimization Using Supervised Artificial Neural-Network

    "Improving learning outcome has always been an important motivating factor in educational inquiry. In a blended learning environment where e-learning and traditional face to face class tutoring are combined, there are opportunities to explore the role of technology in improving student's grades. A student's performance is impacted by many factors...

    Provided By Scientific Research Publishing

  • White Papers // Jan 2015

    How Framing Effect Impact on Decision Making on Internet Shopping

    Framing effect is an understanding and assessment that individual implements different behaviors when facing to the multiple choice that expressing the same meaning. Previously, scholars went through numerous empirical studies regarding impact of the method as well as environment in making decision of online purchasing. Also, scholars have proved that...

    Provided By Scientific Research Publishing

  • White Papers // Jan 2015

    An Experiment in Use of Brain Computer Interfaces for Cognitive Researches

    Human error can be defined as some undesired behaviors caused by some improprieties such as lack of knowledge, lack of communication, lack of attention, excessive stress, mental fatigue and environmental factors. Monitoring cognitive state is a useful tool to reduce these errors. Therefore, many studies about cognitive load have been...

    Provided By Scientific Research Publishing

  • White Papers // Jan 2015

    The Construction of Human Resource Management Cloud Service Platform

    "Human resource management service faced the challenges of promoting efficiency, costs saving, quick responding and so on. In order to face these challenges, this paper puts forward a ""6 1"" structure of human resource management service combined with some characteristics of cloud computing, elaborates the service mode of the cloud...

    Provided By Scientific Research Publishing

  • White Papers // Jan 2015

    Research on Supply Chain Simulation System Based on Internet of Things

    "As one of the top ten core industries in China, Internet of things has gradually changed the people life, by influencing enterprise production, storage and transportation, express, supermarket shopping, etc. By using Internet of things technology in the supply chain, enterprise can optimize the structure and process of supply chain...

    Provided By Scientific Research Publishing

  • White Papers // Dec 2014

    The Mechanism of "Big Data" Impact on Consumer Behavior

    The growth of the network data is beyond the processing capacity of the existing IT infrastructure. At the same time, "Big data" is also a major influence on consumer's behavior. C2C (Consumer-To-Consumer) e-commerce consumption pattern is experiencing a vigorous development time of the electronic commerce in China. Because of its...

    Provided By Scientific Research Publishing

  • White Papers // Dec 2014

    Game Theory Analysis of E-Commerce's Price War

    Home appliance industry is one of the most competitive industries in China, but the price war also prolonged. The reasons for e-commerce price war of home appliance industry are various; this paper attempts to use the game theory and information economics analysis method to discuss the form of competition pattern,...

    Provided By Scientific Research Publishing

  • White Papers // Dec 2014

    Ontologies for Software Project Management: A Review

    "Software project management is a knowledge intensive process that can benefit substantially from ontology development and ontology engineering. Ontology development could facilitate or improve substantially the software development process through the improvement of knowledge management, the increase of software and artefacts reusability, and the establishment of internal consistency within project...

    Provided By Scientific Research Publishing

  • White Papers // Dec 2014

    Research on Location-Inventory Model in Grain Emergency Network

    "Once the disaster occurred, a huge amount of grain supply is needed from disaster area. Because of the short shelf life, grain is very strict with reserve environment and needed to rotate on a regular basis in the process of reserves. Considering the limitations of existing related research, this paper...

    Provided By Scientific Research Publishing

  • White Papers // Dec 2014

    Proxy Server Experiment and Network Security with Changing Nature of the Web

    The total reliance on internet connectivity and World Wide Web (WWW) based services is forcing many organizations to look for alternative solutions for providing adequate access and response time to the demand of their ever increasing users. A typical solution is to increase the bandwidth; this can be achieved with...

    Provided By Scientific Research Publishing

  • White Papers // Dec 2014

    A Study on Credit Appraisal System of C2C E-Commerce

    In the virtual network environment, the C2C (Consumer-To-Consumer) e-commerce has some problems in product quality, service, credit speculation. At present the credit appraisal system offered by domestic C2C ecommerce website ensures the network security to a certain extent while it has some problems in identity verification, evaluation rules and model,...

    Provided By Scientific Research Publishing

  • White Papers // Nov 2014

    Smart Phone Application Evaluation with Usability Testing Approach

    "In this paper, the authors present a narrative role methodology based on different people's opinions, which is now implemented in their research environment for the purpose of testing novel techniques, the usability testing of most common used smart phones such as Android and Apple Smartphone application. This paper analysis is...

    Provided By Scientific Research Publishing

  • White Papers // Nov 2014

    An Integrated Intrusion Detection System by Combining SVM with AdaBoost

    "In the Internet, computers and network equipments are threatened by malicious intrusion, which seriously affects the security of the network. Intrusion behavior has the characteristics of fast upgrade, strong concealment and randomness, so that traditional methods of Intrusion Detection System (IDS) are difficult to prevent the attacks effectively. In this...

    Provided By Scientific Research Publishing

  • White Papers // Nov 2014

    Categorization of Software Release Risks and Its Abatement Strategy

    "Growing competition in the software industry with the persistently changing needs and the usual problems associated with software release, which have made acceptance of new software in market, are extremely important for the success. Volatility in the software developmental processes is generally difficult to handle. The change request at any...

    Provided By Scientific Research Publishing

  • White Papers // Nov 2014

    Technical Possibilities of Cloud-Based Virtual Reality Implementing Software as a Service for Online Collaboration in Urban Planning

    In this paper, the authors discuss the technical possibilities of cloud-based Virtual Reality (cloud-based VR) computing tools for online collaboration in urban planning and design. A platform for cloud-based VR technology, i.e., a VR-cloud server, is used to open the VR dataset to public collaboration over the Internet. The digital...

    Provided By Scientific Research Publishing

  • White Papers // Nov 2014

    An Empirical Study of the Optimum Team Size Requirement in a Collaborative Computer Programming/Learning Environment

    "Pair programming has been widely acclaimed the best way to go in computer programming. Recently, collaboration involving more subjects has been shown to produce better results in programming environments. However, the optimum group size needed for the collaboration has not been adequately addressed. This paper seeks to inculcate and acquaint...

    Provided By Scientific Research Publishing

  • White Papers // Nov 2014

    Detecting Design Patterns in Object-Oriented Program Source Code by Using Metrics and Machine Learning

    "Detecting well-known design patterns in object-oriented program source code can help maintainers understand the design of a program. Through the detection, the understandability, maintainability, and reusability of object-oriented programs can be improved. There are automated detection techniques; however, many existing techniques are based on static analysis and use strict conditions...

    Provided By Scientific Research Publishing

  • White Papers // Nov 2014

    An Integrated Multi-Echelon Model for a Sustainable Closed Loop Supply Chain Network Design

    "The integration of entire supply and value chain into a closed loop network is gaining more importance in recent times in order to ensure a business to be economically and environmentally sustainable with the changing trends in business and social environments, growing environmental consciousness in the society and government legislations...

    Provided By Scientific Research Publishing

  • White Papers // Nov 2014

    Applications of a Streaming Video Server in a Mobile Phone Live Streaming System

    "In this paper, the authors describe the entire process of completing a multicast streaming media server and applying it to a cell phone live streaming system. By using the RTSP protocol, the streaming media server controls the connection of video capture client, data stream reception and processing as well as...

    Provided By Scientific Research Publishing

  • White Papers // Oct 2014

    A Survey of the Effect of Social Media Marketing on Online Shopping of Customers by Mediating Variables

    In this paper, the authors evaluate the effect of social media marketing on online shopping of customers based on mediating role of value capital, relational capital and brand capital by path analysis method. 169 students of Tehran University were included in this study. They filled out the questionnaires of social...

    Provided By Scientific Research Publishing

  • White Papers // Oct 2014

    Usability Experiments to Evaluate UML/SysML-Based Model Driven Software Engineering Notations for Logic Control in Manufacturing Automation

    "Many industrial companies and researchers are looking for more efficient Model Driven Engineering approaches (MDE) in software engineering of Manufacturing automation Systems (MS) especially for logic control programming, but are uncertain about the applicability and effort needed to implement those approaches in comparison to classical Programmable Logic Controller (PLC) programming...

    Provided By Scientific Research Publishing

  • White Papers // Oct 2014

    Significant Factors for Reliability Estimation of Component Based Software Systems

    "Software reliability is defined as the probability of the failure-free operation of a software system for a specified period of time in a specified environment. Traditional approaches for software reliability analysis are black box approaches. These approaches use the software as a whole. At present, main emphasis of software is...

    Provided By Scientific Research Publishing

  • White Papers // Oct 2014

    Improved High Definition Multimedia Interface Authentication Mechanism

    "Security information has become so significant in transmission due to the rapid advancement in digital data exchange. Thus, it is necessary to protect the confidentiality and licensing of video content from illegal access. Currently, High-bandwidth Digital Content Protection (HDCP) provides the confidentiality and licensing of digital content for High Digital...

    Provided By Scientific Research Publishing

  • White Papers // Nov 2009

    A Comparative Study of Medium Access Control Protocols for Wireless Sensor Networks

    One of the major constraints in Wireless Sensor Networks (WSNs) is power consumption. In recent years, a lot of efforts have been put into the design of Medium Access Control (MAC) protocols for WSN, in order to reduce energy consumption and enhance the network's lifetime. This paper surveyed some MAC...

    Provided By Scientific Research Publishing

  • White Papers // Aug 2010

    A Survey on Context-Aware Sensing for Body Sensor Networks

    Context awareness in Body Sensor Networks (BSNs) has the significance of associating physiological user activity and the environment to the sensed signals of the user. The context information derived from a BSN can be used in pervasive healthcare monitoring for relating importance to events and specifically for accurate episode detection....

    Provided By Scientific Research Publishing

  • White Papers // Feb 2011

    A Novel Cross-Layer Scheduling Algorithm for OFDMA-Based WiMAX Networks

    IEEE 802.16e based WiMAX networks promise a desirable available quality of service for mobile users and scheduling algorithms provide the best effective use of network resources in it. In this paper, the authors propose a novel cross-layer scheduling algorithm for OFDMA-based WiMAX networks. Their scheme employs a priority function at...

    Provided By Scientific Research Publishing

  • White Papers // Sep 2011

    Novel Semi-blind Channel Estimation Schemes for Rayleigh Flat Fading MIMO Channels

    In this paper, the authors propose two novel semi-blind channel estimation techniques based on QR decomposition for Rayleigh flat fading Multiple Input Multiple Output (MIMO) channel using various pilot symbols. In the first technique, the flat-fading MIMO channel matrix H can be decomposed as an upper triangular matrix R and...

    Provided By Scientific Research Publishing

  • White Papers // May 2010

    A Survey on Real-Time MAC Protocols in Wireless Sensor Networks

    As wireless sensor network becomes pervasive, new requirements have been continuously emerged. How-ever, the most of research efforts in wireless sensor network are focused on energy problem since the nodes are usually battery-powered. Among these requirements, real-time communication is one of the big research challenges in wireless sensor networks because...

    Provided By Scientific Research Publishing

  • White Papers // May 2010

    An Energy-Efficient Clique-Based Geocast Algorithm for Dense Sensor Networks

    This paper proposes an energy-efficient geocast algorithm for wireless sensor networks with guaranteed de-livery of packets from the sink to all nodes located in several geocast regions. The authors' approach is different from those existing in the literature. They first propose a hybrid clustering scheme: in the first phase they...

    Provided By Scientific Research Publishing

  • White Papers // May 2010

    An Assessment of WiMax Security

    For a broadband wireless standard such as WiMax, security is important and must be addressed. This is to ensure wide acceptance both from the perspective of the end users and the service providers. In order to compete with existing broadband cable or DSL services, the WiMax network must offer comparable...

    Provided By Scientific Research Publishing

  • White Papers // Jun 2010

    Practical Considerations for Wireless Sensor Network Algorithms

    Many researchers from different backgrounds have found interesting research challenges that arise from the physical constraints and envisaged applications in Wireless Sensor Networks (WSNs). The WSN community that has formed over the years is divided into two sub-communities: the systems sub-community and the theory sub-community. However, there seems to be...

    Provided By Scientific Research Publishing

  • White Papers // Jun 2010

    Reconstruction of Wireless UWB Pulses by Exponential Sampling Filter

    Measurement and reconstruction of wireless pulses is an important scheme in wireless Ultra Wide Band (UWB) technology. In contrary to the band-limited analog signals, which can be recovered from evenly spaced samples, the reconstruction of the UWB pulses is a more demanding task. In this paper, the authors describe an...

    Provided By Scientific Research Publishing

  • White Papers // Jun 2010

    Research on Application of ZigBee Technology in Flammable and Explosive Environment

    Wireless Sensor Network based on ZigBee technology is a wireless network which is composed of many nodes of ZigBee RF chips, sensors and MCUs, especially suitable for application of the remote monitoring system in flammable and explosive environments. This paper presents the characteristics and advantages of ZigBee technology, also discusses...

    Provided By Scientific Research Publishing

  • White Papers // Jun 2010

    Energy Conservation Challenges in Wireless Sensor Networks: A Comprehensive Study

    A Wireless Sensor Network (WSN) consists of a large number of randomly deployed sensor nodes. These sensor nodes organize themselves into a cooperative network and perform the three basic functions of sensing, computations and communications. Research in WSNs has become an extensive explorative area during the last few years, especially...

    Provided By Scientific Research Publishing

  • White Papers // Jul 2010

    Modelling and Analysis of TCP Performance in Wireless Multihop Networks

    Researchers have used extensive simulation and experimental studies to understand TCP performance in wireless multihop networks. In contrast, the objective of this paper is to theoretically analyze TCP performance in this environment. By examining the case of running one TCP session over a string topology, a system model for analyzing...

    Provided By Scientific Research Publishing

  • White Papers // Jul 2010

    Passive Loss Inference in Wireless Sensor Networks Using EM Algorithm

    Wireless Sensor Networks (WSNs) are mainly deployed for data acquisition, thus, the network performance can be passively measured by exploiting whether application data from various sensor nodes reach the sink. In this paper, therefore, the authors take into account the unique data aggregation communication paradigm of WSNs and model the...

    Provided By Scientific Research Publishing

  • White Papers // Jul 2010

    Contention-Based Beaconless Real-Time Routing Protocol for Wireless Sensor Networks

    This paper presents a novel real-time routing protocol, called CBRR, with less energy consumption for Wireless Sensor Networks (WSNs). End-to-End real-time requirements are fulfilled with speed or delay constraint at each hop through integrating the contention and neighbor table mechanisms. More precisely, CBRR maintains a neighbor table via the contention...

    Provided By Scientific Research Publishing

  • White Papers // Jul 2010

    Stable Sensor Network (SSN): A Dynamic Clustering Technique for Maximizing Stability in Wireless Sensor Networks

    Stability is one of the major concerns in advancement of Wireless Sensor Networks (WSN). A number of applications of WSN require guaranteed sensing, coverage and connectivity throughout its operational period. Death of the first node might cause instability in the network. Therefore, all of the sensor nodes in the network...

    Provided By Scientific Research Publishing

  • White Papers // Jul 2010

    Information-Driven Collaborative Processing for Diffusive Source Estimation in Wireless Sensor Networks

    This paper discusses an accurate distributed algorithm for diffusive source localization while maintaining the low energy consumption of sensor nodes in wireless sensor networks. In this algorithm, the sensor selection scheme based on the information utility measure is used. To update the estimation in each selected node, a neighborhood radius...

    Provided By Scientific Research Publishing

  • White Papers // Jul 2010

    Using Bayesian Game Model for Intrusion Detection in Wireless Ad Hoc Networks

    Wireless ad hoc network is becoming a new research fronter, in which security is an important issue. Usually some nodes act maliciously and they are able to do different kinds of Denial of Service (DoS). Because of the limited resource, Intrusion Detection System (IDS) runs all the time to detect...

    Provided By Scientific Research Publishing

  • White Papers // Jul 2010

    A QoS-Based Multichannel MAC Protocol for Two-Tiered Wireless Multimedia Sensor Networks

    Rapid penetration of small customized wireless devices and enormous growth of wireless communication technologies have already set the stage for large-scale deployment of wireless sensor networks. Offering precise Quality of Service (QoS) for multimedia transmission over sensor networks has not received significant attention. However offering some better QoS for wireless...

    Provided By Scientific Research Publishing

  • White Papers // Jul 2010

    A New Adaptive EDCA Approach to QoS of Wireless Communications

    Under the background of intelligent transportation application, QoS for various services is different in wireless communication. Based on the MAC layer protocol, this paper analyzes the QoS in IEEE 802.11 MAC protocol framework, and proposes a new design of a Differentiation Enhanced Adaptive EDCA (enhanced distribution channel access) approach. The...

    Provided By Scientific Research Publishing

  • White Papers // Jul 2010

    A Perspective on Traffic Measurement Tools in Wireless Networks

    To understand the characteristics of the wireless networks, the network usage data from wireless measurement tools are essential. The data collection is a process of collecting the network time-varying information in standardized format and from standard interfaces. The characteristics include signal propagation, received signal quality, network traffic, active applications and...

    Provided By Scientific Research Publishing

  • White Papers // Aug 2010

    Topology Control and Routing in Large Scale Wireless Sensor Networks

    In this paper, a two-tiered Wireless Sensor Network (WSN) where nodes are divided into clusters and nodes forward data to base stations through cluster heads is considered. To maximize the network lifetime, two energy efficient approaches are investigated. The authors first propose an approach that optimally locates the base stations...

    Provided By Scientific Research Publishing

  • White Papers // Aug 2010

    Research on WSN Double-Radius Localization Algorithm Based on Partition Judgment Mechanism

    Localization technology is an important support technology for WSN (Wireless Sensor Networks). The centroid algorithm is a typical range-free localization algorithm, which possesses the advantages such as simple localization principle and easy realization. However, susceptible to be influenced by the density of anchor node and uniformity of deployment, its localization...

    Provided By Scientific Research Publishing

  • White Papers // Sep 2010

    An Application-Oriented Network Model for Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are energy-constrained networks. The Residual Energy Real-time Monitoring (RERM) is very important for WSNs. Moreover, network model is an important foundation of RERM research at Personal Area Network (PAN) level. Because RERM is inherently application-oriented, the net-work model adopted should also be application-oriented. However, many factors...

    Provided By Scientific Research Publishing

  • White Papers // Oct 2010

    Priority-Based Hybrid MAC for Energy Efficiency in Wireless Sensor Networks

    This paper introduces I-MAC, a new medium access control protocol for wireless sensor networks. I-MAC targets at improving both channel utilization and energy efficiency while taking into account traffic load for each sensor node according to its role in the network. I-MAC reaches its objectives through prioritized and adaptive access...

    Provided By Scientific Research Publishing

  • White Papers // Oct 2010

    Energy-Efficient Area Coverage in Heterogeneous Energy Wireless Sensor Networks

    Sensing coverage and energy consumption are two primary issues in wireless sensor networks. Sensing coverage is closely related to network energy consumption. The performance of a sensor network depends to a large extent on the sensing coverage, and its lifetime is determined by its energy consumption. In this paper, an...

    Provided By Scientific Research Publishing

  • White Papers // Oct 2010

    BEAR: A Balanced Energy-Aware Routing Protocol for Wireless Sensor Networks

    Energy aware routing protocols can be classified into energy saver and energy manager. Energy saver protocols decrease energy consumption totally. Most of them try to find the shortest path between source and destination to reduce energy consumption. But energy manager protocols balance energy consumption in network to avoid network partitioning....

    Provided By Scientific Research Publishing

  • White Papers // Oct 2010

    An Energy-Balanced Clustering Routing Algorithm for Wireless Sensor Network

    In this paper, the authors consider a network of energy constrained sensors deployed over a region. Each sensor node in such a network is systematically gathering and transmitting sensed data to a base station (via cluster-heads). This paper focuses on reducing the power consumption of wireless sensor networks. Firstly, they...

    Provided By Scientific Research Publishing

  • White Papers // Aug 2010

    Joint Centralized Power Control and Cell Sectoring for Interference Management in CDMA Cellular Systems in a 2D Urban Environment

    The interference reduction capability of cell sectoring and power control algorithms have been considered separately as means to decrease the interference in Code Division Multiple Access (CDMA) cellular systems. In this paper, the authors present Switched-Beam (SB) and Rotatable Equal Sectoring (RES) techniques for CDMA cellular systems in a 2D...

    Provided By Scientific Research Publishing

  • White Papers // Aug 2010

    Distance Measurement Model Based on RSSI in WSN

    The relationship between RSSI (Received Signal Strength Indication) values and distance is the foundation and the key of ranging and positioning technologies in wireless sensor networks. Log-Normal Shadowing Model (LNSM), as a more general signal propagation model, can better describe the relationship between the RSSI value and distance, but the...

    Provided By Scientific Research Publishing

  • White Papers // Aug 2010

    A Real-Time-Enabled, Blackboard-Based, Publish/Subscribe Architecture for Wireless Sensor Nodes

    Wireless sensor network nodes have only limited resources concerning memory and battery life-time. Memory can be efficiently used by sharing data, and the life-time of a battery can be extended, when the node has long power saving sleep-phases. The authors propose a publish/subscribe architecture that achieves these two aims. The...

    Provided By Scientific Research Publishing

  • White Papers // Jul 2010

    Performance Analysis of Downlink MIMO WCDMA Systems Using Antenna Selection in Transmitter and MRC Plus LDD in Receiver Over Correlated Nakagami-Fading Channels

    In this paper Bit Error Rate (BER) performance is analyzed for Multiple Input-Multiple Output (MIMO) communications systems using antenna selection in the transmitter, Maximal Ratio Combining (MRC) and Linear De-correlating Detector (LDD) in the receiver in Wide band Code Division Multiple Access (WCDMA) downlink channels with correlated Nakagami fading. The...

    Provided By Scientific Research Publishing

  • White Papers // Jun 2010

    Interference Management for DS-CDMA Systems Through Closed-Loop Power Control, Base Station Assignment, and Beamforming

    In this paper, the authors propose a Smart Step closed-loop Power Control (SSPC) algorithm and a Base Station Assignment method based on Minimizing the Transmitter Power (BSA-MTP) technique in a Direct Sequence-Code Division Multiple Access (DS-CDMA) receiver with frequency-selective Rayleigh fading. This receiver consists of three stages. In the first...

    Provided By Scientific Research Publishing

  • White Papers // Dec 2010

    Lifetime Optimization Via Network Sectoring in Cooperative Wireless Sensor Networks

    Employing cooperative communication in multi-hop wireless sensor networks provides the network with significant energy efficiency. However, the lifetime of such a network is directly dependant upon the lifetime of each of its individual sections (or clusters). Ignoring the fact that those sections close to sink have to forward more data...

    Provided By Scientific Research Publishing

  • White Papers // Dec 2010

    A Reliable and Efficient Time Synchronization Protocol for Heterogeneous Wireless Sensor Network

    L-SYNC is a synchronization protocol for Wireless Sensor Networks which is based on larger degree clustering providing efficiency in homogeneous topologies. In L-SYNC, the effectiveness of the routing algorithm for the synchronization precision of two remote nodes was considered. Clustering in L-SYNC is according to larger degree techniques. These techniques...

    Provided By Scientific Research Publishing

  • White Papers // Dec 2010

    A Novel Routing Algorithm for Vehicular Sensor Networks

    Recent advances in wireless communications are diffusing into many new applications. The tiny sensor node, which consists of sensing, data processing and communicating components, led to the idea of sensor networks. A sensor network composed of a large number of sensor nodes that are densely deployed either inside the phenomenon...

    Provided By Scientific Research Publishing

  • White Papers // Dec 2010

    Integer Programming Formulations for Maximum Lifetime Broadcasting Problems in Wireless Sensor Networks

    Approaches based on integer linear programming have been recently proposed for topology optimization in wireless sensor networks. They are, however, based on over-theoretical, unrealistic models. The authors' aim is to show that it is possible to accommodate realistic models for energy consumption and communication protocols into integer linear programming. They...

    Provided By Scientific Research Publishing

  • White Papers // Dec 2010

    Architecture Design of an Integrated Communication and Broadcasting Network

    Due to the power limitation of nodes in Wireless Sensor Networks (WSNs), how to maximize network lifetime has become a critical issue for deployment of WSNs. Although several schemes have been proposed for 2D WSNs, few for 3D WSNs are known. In this paper, the authors present a scheme to...

    Provided By Scientific Research Publishing

  • White Papers // Nov 2010

    Range-Based Localization in Wireless Networks Using Density-Based Outlier Detection

    Node localization is commonly employed in wireless networks. For example, it is used to improve routing and enhance security. Localization algorithms can be classified as range-free or range-based. Range-based algorithms use location metrics such as ToA, TDoA, RSS, and AoA to estimate the distance between two nodes. Proximity sensing between...

    Provided By Scientific Research Publishing

  • White Papers // Nov 2010

    TikTak: A Scalable Simulator of Wireless Sensor Networks Including Hardware/Software Interaction

    The authors present a simulation framework for wireless sensor networks developed to allow the design exploration and the complete microprocessor-instruction-level debug of network formation, data congestion, nodes interaction, all in one simulation environment. A specifically innovative feature is the co-emulation of selected nodes at clock-cycle-accurate hardware processing level, allowing code...

    Provided By Scientific Research Publishing

  • White Papers // Nov 2010

    3-D Grid-Based Localization Technique in Mobile Sensor Networks

    Considering the environmental protection, forest fire becomes a more and more serious problem and requires more concerns. This paper provides an efficient method for fire monitoring and detection in forests using wireless sensor network technology. The proposed technique estimates the location of a sensor node based on the current set...

    Provided By Scientific Research Publishing