Scientific Research Publishing

Displaying 1-40 of 203 results

  • White Papers // Feb 2015

    Semantic Enrichment of XML Schema to Transform Association Relationships in ODL Schema

    "In this paper, the authors present an approach for transforming an XML schema they enriched in ODL (Object Definition Language) schemas. It is possible to realize the concepts of ODL in a model of XML schema; they propose to introduce an enrichment concretizing these concepts in the XML schema models....

    Provided By Scientific Research Publishing

  • White Papers // Feb 2015

    Formalization of Federated Schema Architectural Style Variability

    "Data integration requires managing heterogeneous schema information. A federated database system integrates heterogeneous, autonomous database systems on the schema level, whereby both local applications and global applications accessing multiple component database systems are supported. Such a federated database system is a complex system of systems which requires a well-designed organization...

    Provided By Scientific Research Publishing

  • White Papers // Feb 2015

    A MATLAB-Based Numerical and GUI Implementation of Cross-Gradients Joint Inversion of Gravity and Magnetic Data

    "The cross-gradients joint inversion technique has been applied to multiple geophysical data with a significant improvement on compatibility, but its numerical implementation for practical use is rarely discussed in the literature. The authors present a MATLAB-based three-dimensional cross-gradients joint inversion program with application to gravity and magnetic data. The input...

    Provided By Scientific Research Publishing

  • White Papers // Feb 2015

    Content-Based Image Retrieval Using SOM and DWT

    "Content-Based Image Retrieval (CBIR) from a large database is becoming a necessity for many applications such as medical imaging, Geographic Information Systems (GIS), space search and many others. However, the process of retrieving relevant images is usually preceded by extracting some discriminating features that can best describe the database images....

    Provided By Scientific Research Publishing

  • White Papers // Feb 2015

    Timed-Automata Based Model-Checking of a Multi-Agent System: A Case Study

    "A multi-agent based transport system is modeled by timed automata model extended with clock variables. The correctness properties of safety and liveness of this model are verified by timed automata based UPPAAL. Agents have a degree of control on their own actions, have their own threads of control, and under...

    Provided By Scientific Research Publishing

  • White Papers // Feb 2015

    Towards Designing an Intelligent Educational Assessment Tool

    "Assessment is an important part of learning process. It can be defined as the process of gathering information for the purpose of making judgments about a current state of affairs presumably for the purpose of enhancing future outcomes. It determines whether or not the goals of education are being met....

    Provided By Scientific Research Publishing

  • White Papers // Jan 2015

    E-Learning Optimization Using Supervised Artificial Neural-Network

    "Improving learning outcome has always been an important motivating factor in educational inquiry. In a blended learning environment where e-learning and traditional face to face class tutoring are combined, there are opportunities to explore the role of technology in improving student's grades. A student's performance is impacted by many factors...

    Provided By Scientific Research Publishing

  • White Papers // Jan 2015

    The Construction of Human Resource Management Cloud Service Platform

    "Human resource management service faced the challenges of promoting efficiency, costs saving, quick responding and so on. In order to face these challenges, this paper puts forward a ""6 1"" structure of human resource management service combined with some characteristics of cloud computing, elaborates the service mode of the cloud...

    Provided By Scientific Research Publishing

  • White Papers // Jan 2015

    Research on Supply Chain Simulation System Based on Internet of Things

    "As one of the top ten core industries in China, Internet of things has gradually changed the people life, by influencing enterprise production, storage and transportation, express, supermarket shopping, etc. By using Internet of things technology in the supply chain, enterprise can optimize the structure and process of supply chain...

    Provided By Scientific Research Publishing

  • White Papers // Dec 2014

    Ontologies for Software Project Management: A Review

    "Software project management is a knowledge intensive process that can benefit substantially from ontology development and ontology engineering. Ontology development could facilitate or improve substantially the software development process through the improvement of knowledge management, the increase of software and artefacts reusability, and the establishment of internal consistency within project...

    Provided By Scientific Research Publishing

  • White Papers // Dec 2014

    Research on Location-Inventory Model in Grain Emergency Network

    "Once the disaster occurred, a huge amount of grain supply is needed from disaster area. Because of the short shelf life, grain is very strict with reserve environment and needed to rotate on a regular basis in the process of reserves. Considering the limitations of existing related research, this paper...

    Provided By Scientific Research Publishing

  • White Papers // Nov 2014

    Smart Phone Application Evaluation with Usability Testing Approach

    "In this paper, the authors present a narrative role methodology based on different people's opinions, which is now implemented in their research environment for the purpose of testing novel techniques, the usability testing of most common used smart phones such as Android and Apple Smartphone application. This paper analysis is...

    Provided By Scientific Research Publishing

  • White Papers // Nov 2014

    An Integrated Intrusion Detection System by Combining SVM with AdaBoost

    "In the Internet, computers and network equipments are threatened by malicious intrusion, which seriously affects the security of the network. Intrusion behavior has the characteristics of fast upgrade, strong concealment and randomness, so that traditional methods of Intrusion Detection System (IDS) are difficult to prevent the attacks effectively. In this...

    Provided By Scientific Research Publishing

  • White Papers // Nov 2014

    Categorization of Software Release Risks and Its Abatement Strategy

    "Growing competition in the software industry with the persistently changing needs and the usual problems associated with software release, which have made acceptance of new software in market, are extremely important for the success. Volatility in the software developmental processes is generally difficult to handle. The change request at any...

    Provided By Scientific Research Publishing

  • White Papers // Nov 2014

    An Integrated Multi-Echelon Model for a Sustainable Closed Loop Supply Chain Network Design

    "The integration of entire supply and value chain into a closed loop network is gaining more importance in recent times in order to ensure a business to be economically and environmentally sustainable with the changing trends in business and social environments, growing environmental consciousness in the society and government legislations...

    Provided By Scientific Research Publishing

  • White Papers // Nov 2014

    Applications of a Streaming Video Server in a Mobile Phone Live Streaming System

    "In this paper, the authors describe the entire process of completing a multicast streaming media server and applying it to a cell phone live streaming system. By using the RTSP protocol, the streaming media server controls the connection of video capture client, data stream reception and processing as well as...

    Provided By Scientific Research Publishing

  • White Papers // Nov 2014

    Detecting Design Patterns in Object-Oriented Program Source Code by Using Metrics and Machine Learning

    "Detecting well-known design patterns in object-oriented program source code can help maintainers understand the design of a program. Through the detection, the understandability, maintainability, and reusability of object-oriented programs can be improved. There are automated detection techniques; however, many existing techniques are based on static analysis and use strict conditions...

    Provided By Scientific Research Publishing

  • White Papers // Nov 2014

    An Empirical Study of the Optimum Team Size Requirement in a Collaborative Computer Programming/Learning Environment

    "Pair programming has been widely acclaimed the best way to go in computer programming. Recently, collaboration involving more subjects has been shown to produce better results in programming environments. However, the optimum group size needed for the collaboration has not been adequately addressed. This paper seeks to inculcate and acquaint...

    Provided By Scientific Research Publishing

  • White Papers // Oct 2014

    Usability Experiments to Evaluate UML/SysML-Based Model Driven Software Engineering Notations for Logic Control in Manufacturing Automation

    "Many industrial companies and researchers are looking for more efficient Model Driven Engineering approaches (MDE) in software engineering of Manufacturing automation Systems (MS) especially for logic control programming, but are uncertain about the applicability and effort needed to implement those approaches in comparison to classical Programmable Logic Controller (PLC) programming...

    Provided By Scientific Research Publishing

  • White Papers // Oct 2014

    Significant Factors for Reliability Estimation of Component Based Software Systems

    "Software reliability is defined as the probability of the failure-free operation of a software system for a specified period of time in a specified environment. Traditional approaches for software reliability analysis are black box approaches. These approaches use the software as a whole. At present, main emphasis of software is...

    Provided By Scientific Research Publishing

  • White Papers // Oct 2014

    Improved High Definition Multimedia Interface Authentication Mechanism

    "Security information has become so significant in transmission due to the rapid advancement in digital data exchange. Thus, it is necessary to protect the confidentiality and licensing of video content from illegal access. Currently, High-bandwidth Digital Content Protection (HDCP) provides the confidentiality and licensing of digital content for High Digital...

    Provided By Scientific Research Publishing

  • White Papers // Oct 2014

    Rapid Deployment of Internet-Connected Environmental Monitoring Devices

    "Advances in electronic sensing and monitoring systems and the growth of the communications infrastructure have enabled users to gain immediate access to information and interaction with physical devices. To facilitate the uploading, viewing, and sharing of data via the internet, while avoiding the complexities and expense of creating personal web...

    Provided By Scientific Research Publishing

  • White Papers // Oct 2014

    IoT Testbed Business Model

    "The Internet-of-Things (IoT) is today one of the hypes in the technological world but despite the enormous attention and research investment, the clear business value is still hard to perceive. IoT deployments are costly to be installed, managed and maintained, and need to provide a very clear value to justify...

    Provided By Scientific Research Publishing

  • White Papers // Sep 2014

    Link Budget Design with Performance Evaluation of Tunable Impulse-Based Ultra Wideband to Support the Integration of Wireless Sensing and Identifications Infrastructures

    "Recently, many studies propose the use of ultra-wideband technology for passive and active radio frequency identification systems as well as for wireless sensor networks due to its numerous advantages. By harvesting these advantages of IR-UWB technology at the physical-layer design, this paper proposes that a cross layer architecture platform can...

    Provided By Scientific Research Publishing

  • White Papers // Aug 2014

    The Augmented Reality Application of Multimedia Technology in Aquatic Organisms Instruction

    "In this paper, the authors elaborate the features and superiority of applying multimedia technology to aquatic organisms in a science and life technology course. The augmented reality application of multimedia technology in aquatic organisms' instruction has its own features, teaching information capacity, interactive user interface. The paper concludes the superiority...

    Provided By Scientific Research Publishing

  • White Papers // Jul 2014

    Managing Computing Infrastructure for IoT Data

    "Digital data have become a torrent engulfing every area of business, science and engineering disciplines, gushing into every economy, every organization and every user of digital technology. In the age of big data, deriving values and insights from big data using rich analytics becomes important for achieving competitiveness, success and...

    Provided By Scientific Research Publishing

  • White Papers // Jul 2014

    A Multi-Agent School Simulation Based on Hierarchical Social Networks

    "The quality of K-12 education has been a very big concern for years. Previous methods studied only one or two factors, such as school choice, or teacher quality, on school performance. Therefore the results they provide can be limited. The authors propose a multi-agent approach to integrate multiple actors in...

    Provided By Scientific Research Publishing

  • White Papers // Jun 2014

    A Quaternion Scaled Unscented Kalman Estimator for Inertial Navigation States Determination Using INS/GPS/Magnetometer Fusion

    "This Inertial Navigation System (INS), Global Positioning System (GPS) and fluxgate magnetometer technologies have been widely used in a variety of positioning and navigation applications. In this paper, a low cost solid state INS/GPS/Magnetometer integrated navigation system has been developed that incorporates measurements from an Inertial Navigation System (INS), Global...

    Provided By Scientific Research Publishing

  • White Papers // Jun 2014

    Wormhole Attack Behaviour in Monte-Carlo Localization for Mobile Sensor Networks

    "Localization is the basic requirement for network management in wireless sensor networks as it helps nodes find their absolute position coordinates and in gathering information relevant to their locations. A localization algorithm has to be dynamic, scalable and should not impose high computation or communication overhead. The localization systems are...

    Provided By Scientific Research Publishing

  • White Papers // May 2014

    Reliable Content Distribution in P2P Networks Based on Peer Groups

    "Peer-To-Peer (P2P) networks are highly dynamic systems which are very popular for content distribution in the Internet. A single peer remains in the system for an unpredictable amount of time, and the rate in which peers enter and leave the system, i.e. the churn, is often high. A user that...

    Provided By Scientific Research Publishing

  • White Papers // Dec 2013

    Sensors Grouping Model for Wireless Sensor Network

    "The grouping of sensors is a calculation method for partitioning the wireless sensor network into groups, each group consisting of a collection of sensors. A sensor can be an element of multiple groups. In the present paper, the authors will show a model to divide the wireless sensor network sensors...

    Provided By Scientific Research Publishing

  • White Papers // Dec 2013

    Clustering in Wireless Multimedia Sensor Networks

    "Wireless Multimedia Sensor Networks (WMSNs) are comprised of small embedded audio/video motes capable of extracting the surrounding environmental information, locally processing it and then wirelessly transmitting it to sink/base station. Multimedia data such as image, audio and video is larger in volume than scalar data such as temperature, pressure and...

    Provided By Scientific Research Publishing

  • White Papers // Oct 2013

    Cloud Computing Solution and Services for RFID Based Supply Chain Management

    "Deploying and implementing RFID systems for tracking and controlling products in supply chain management is not affordable for small and midsized companies due to its complexity, cost, and difficulties pertaining data management and maintenance. Cloud computing can be used to mitigate the risks associated with the implementation and deployment of...

    Provided By Scientific Research Publishing

  • White Papers // Sep 2013

    Sensing Attributes of an Agile Information System

    Information Systems (IS) agility is a current topic of interest in the IS industry. The study follows up on the work on the definition of the construct of IS agility which is defined as the ability of IS to sense a change in real time; diagnose it in real time;...

    Provided By Scientific Research Publishing

  • White Papers // Sep 2013

    System Architecture and Design Flow of Smart Mobile Sensing Systems

    "In this paper, the authors present the architecture and design flow of smart mobile sensing systems that performs wireless sensor data transmission, data analysis and display in real-time. Multiple wireless protocols are used for sensor data transmission including the Bluetooth, cellular data network and Wi-Fi for Internet access, and Near...

    Provided By Scientific Research Publishing

  • White Papers // Jun 2013

    A Wireless Body Sensor Platform to Detect Progressive Deterioration in Musculoskeletal Systems

    "Recent developments in technology have helped to reduce the physical size and weight of devices and opened up new opportunities for their application in delivering unobtrusive healthcare services. In particular, kinetic and kinematic systems, that use sensors attached to the body, are currently being used to measure and understand many...

    Provided By Scientific Research Publishing

  • White Papers // Apr 2013

    Personal Perspectives: Individual Privacy in the IOT

    "The Internet Of Things (IOT) is the extension of the Internet to the next level, i.e., bringing the Internet to the real physical world of things. In this paper, 22 people working with different aspects of IOT development were inter-viewed in Finland and in China, in order to investigate their...

    Provided By Scientific Research Publishing

  • White Papers // Apr 2013

    Integrating RFID Technology with Intelligent Classifiers for Meaningful Prediction Knowledge

    "Radio Frequency IDentification (RFID) is a wireless technology that has been designed to automatically identify tagged objects using a reader. Several applications of this technology have been introduced in past literature such as pet identification and luggage tracking which have increased the efficiency and effectiveness of each environment into which...

    Provided By Scientific Research Publishing

  • White Papers // Nov 2012

    The Design and Improvement of a Software Project Management System Based on CMMI

    "In this paper, the authors researched and analyzed the characteristics, deficiencies and reasons of a management system of a software enterprise project to design a software project management system based on CMMI 1.2, thus helping the enterprise to improve development and management efficiency of software project and reduce the risks...

    Provided By Scientific Research Publishing

  • White Papers // Oct 2012

    Automatic Risk Identification in Software Projects: An Approach Based on Inductive Learning

    "Effective risk management is very important to increase the probability of success in software projects. Indeed, like other types of projects, software projects are also susceptible to various problems that can lead to the cancelation of their development or to the development of systems that do not meet the client's...

    Provided By Scientific Research Publishing

  • White Papers // Nov 2009

    A Comparative Study of Medium Access Control Protocols for Wireless Sensor Networks

    One of the major constraints in Wireless Sensor Networks (WSNs) is power consumption. In recent years, a lot of efforts have been put into the design of Medium Access Control (MAC) protocols for WSN, in order to reduce energy consumption and enhance the network's lifetime. This paper surveyed some MAC...

    Provided By Scientific Research Publishing

  • White Papers // Aug 2010

    A Survey on Context-Aware Sensing for Body Sensor Networks

    Context awareness in Body Sensor Networks (BSNs) has the significance of associating physiological user activity and the environment to the sensed signals of the user. The context information derived from a BSN can be used in pervasive healthcare monitoring for relating importance to events and specifically for accurate episode detection....

    Provided By Scientific Research Publishing

  • White Papers // Jul 2011

    An Exploratory Study of Experimental Tools for Wireless Sensor Networks

    The objective of this contribution is to present expositive review content on currently available experimental tools/services/concepts used for most emerging field Wireless Sensor Network that has capability to change many of the Information Communication aspects in the upcoming era. Currently due to high cost of large number of sensor nodes...

    Provided By Scientific Research Publishing

  • White Papers // Apr 2009

    Subarea Tree Routing (STR) in Multi-Hop Wireless Ad Hoc Networks

    Subarea Tree Routing (STR), a new routing protocol for multi-hop wireless ad hoc networks, is proposed. The novelty of the STR protocol is to divide the whole network into many subareas constructed as a result of establishing subarea trees. Its main idea is to identify root nodes by manual configuration...

    Provided By Scientific Research Publishing

  • White Papers // Apr 2009

    Research on ZigBee Wireless Sensors Network Based on ModBus Protocol

    Wireless ZigBee is a very low-cost, very low power consumption, two-way, wireless communications technology, which can be used widely in consumer electronics, home and building automation, industrial controls, PC peripherals, medical sensor applications, toys and games. Now ZigBee technology also can be used in Agriculture monitoring and control. ZigBee wireless...

    Provided By Scientific Research Publishing

  • White Papers // May 2009

    An Energy-Aware Clustering Approach for Wireless Sensor Networks

    Energy conservation is an essential and critical requirement for a wireless sensor network with battery operated nodes intended for long term operations. Prior work has described different approaches to routing protocol designs that achieve energy efficiency in a wireless sensor network. Several of these works involve variations of mote-to-mote routing...

    Provided By Scientific Research Publishing

  • White Papers // Jul 2010

    A QoS-Based Multichannel MAC Protocol for Two-Tiered Wireless Multimedia Sensor Networks

    Rapid penetration of small customized wireless devices and enormous growth of wireless communication technologies have already set the stage for large-scale deployment of wireless sensor networks. Offering precise Quality of Service (QoS) for multimedia transmission over sensor networks has not received significant attention. However offering some better QoS for wireless...

    Provided By Scientific Research Publishing

  • White Papers // Jul 2010

    A New Adaptive EDCA Approach to QoS of Wireless Communications

    Under the background of intelligent transportation application, QoS for various services is different in wireless communication. Based on the MAC layer protocol, this paper analyzes the QoS in IEEE 802.11 MAC protocol framework, and proposes a new design of a Differentiation Enhanced Adaptive EDCA (enhanced distribution channel access) approach. The...

    Provided By Scientific Research Publishing

  • White Papers // Jul 2010

    A Perspective on Traffic Measurement Tools in Wireless Networks

    To understand the characteristics of the wireless networks, the network usage data from wireless measurement tools are essential. The data collection is a process of collecting the network time-varying information in standardized format and from standard interfaces. The characteristics include signal propagation, received signal quality, network traffic, active applications and...

    Provided By Scientific Research Publishing

  • White Papers // Aug 2010

    Topology Control and Routing in Large Scale Wireless Sensor Networks

    In this paper, a two-tiered Wireless Sensor Network (WSN) where nodes are divided into clusters and nodes forward data to base stations through cluster heads is considered. To maximize the network lifetime, two energy efficient approaches are investigated. The authors first propose an approach that optimally locates the base stations...

    Provided By Scientific Research Publishing

  • White Papers // Aug 2010

    Research on WSN Double-Radius Localization Algorithm Based on Partition Judgment Mechanism

    Localization technology is an important support technology for WSN (Wireless Sensor Networks). The centroid algorithm is a typical range-free localization algorithm, which possesses the advantages such as simple localization principle and easy realization. However, susceptible to be influenced by the density of anchor node and uniformity of deployment, its localization...

    Provided By Scientific Research Publishing

  • White Papers // Sep 2011

    ANCAEE: A Novel Clustering Algorithm for Energy Efficiency in Wireless Sensor Networks

    One of the major constraints of wireless sensor networks is limited energy available to sensor nodes because of the small size of the batteries they use as source of power. Clustering is one of the routing techniques that have been using to minimize sensor nodes' energy consumption during operation. In...

    Provided By Scientific Research Publishing

  • White Papers // Sep 2011

    Wireless Power Generation Strategy Using EAP Actuated Energy Harvester for Marine Information Acquisition

    The energy of a radio wave is reduced through the dispersion, the refraction and the absorption because the medium transferring the vibration of a radio wave is the seawater. In the end the reduced energy of a radio wave causes the reduced transmitting length for communication, the long postponed communication...

    Provided By Scientific Research Publishing

  • White Papers // Sep 2011

    Wireless Sensor Network for Monitoring Maturity Stage of Fruit

    In this paper, the authors present a wireless sensor network for monitoring the maturity stage of fruit. A dual-polarization coupled patch sensor, which is robust to environmental changes, was designed to operate at 2.45 GHz. It was attached to a Durian fruit for a period of days to measure the...

    Provided By Scientific Research Publishing

  • White Papers // Sep 2011

    An Energy-Based Stochastic Model for Wireless Sensor Networks

    The authors propose an energy-based stochastic model of Wireless Sensor Networks (WSNs) where each sensor node is randomly and alternatively in an active and a sleep mode. They first investigate the sensor model and derive the formula of the steady-state probability when there are a number of data packets in...

    Provided By Scientific Research Publishing

  • White Papers // Feb 2011

    Network-Wide Time Synchronization in Multi-Channel Wireless Sensor Networks

    Recent advances in wireless sensor technology have enabled simultaneous exploitation of multiple channels in wireless sensor systems. In this paper, a novel time synchronization algorithm is proposed for multichannel Wireless Sensor Networks (WSNs) called Multi-Channel Time Synchronization (MCTS) protocol. Time synchronization is critical for many WSN applications and enables efficient...

    Provided By Scientific Research Publishing

  • White Papers // Feb 2011

    A New MAC Protocol for Moving Target in Distributed Wireless Sensor Networks

    A Wireless Sensor Network (WSN) is composed of many nodes with limited power supply; most nodes are stationary in the network which could probably involve a few mobile nodes. Various Medium Access Control (MAC) protocols specially aimed at a target locating application for WSNs have been proposed. However, most of...

    Provided By Scientific Research Publishing

  • White Papers // Feb 2011

    Compressing Information of Target Tracking in Wireless Sensor Networks

    Target tracking is a well studied topic in wireless sensor networks. It is a procedure that nodes in the network collaborate in detecting targets and transmitting their information to the base-station continuously, which leads to data implosion and redundancy. To reduce traffic load of the network, a data compressing based...

    Provided By Scientific Research Publishing

  • White Papers // Mar 2011

    A Fault-Tolerant Cooperative Spectrum Sensing Algorithm Over Cognitive Radio Network Based on Wireless Sensor Network

    A serious threat to cognitive radio networks that sense the spectrum in a cooperative manner is the transmission of false spectrum sensing data by malicious sensor nodes. SNR fluctuations due to wireless channel effects complicate handling such attackers even further. This enforces the system to acquire authentication. Actually, the decision...

    Provided By Scientific Research Publishing

  • White Papers // Mar 2011

    Performance Evaluation of Routing Protocols on the Reference Region Group Mobility Model for MANET

    Group mobility is prevalent in many Mobile Ad hoc NETwork (MANET) applications, such as disaster recovery, military operations, searching and rescue activities. Group partition, as an inherent phenomenon in group mobility, may occur when mobile nodes move in diverse mobility patterns and it causes the network to be partitioned into...

    Provided By Scientific Research Publishing

  • White Papers // Mar 2011

    Energy-Efficient and Reliable Transport Protocols for Wireless Sensor Networks: State-of-Art

    New wireless sensor network applications (e.g., military surveillance) require higher reliability than a simple best effort service could provide. Classical reliable transport protocols like Transmission Control Protocol (TCP) are not well suited for wireless sensor networks due to both the characteristics of the network nodes (low computing power, strong energy...

    Provided By Scientific Research Publishing

  • White Papers // Mar 2011

    A Comment on Link Dynamics and Protocol Design in a Multi-Hop Mobile Environment

    This paper is a supplementary document for "Link Dynamics and Protocol Design in a Multi-Hop Mobile Environment", which presents an analytic model to obtain link lifetime in mobile wireless networks. The model outcome is used as groundwork for several mobility-related evaluations. Here, it is discussed how an improper assumption in...

    Provided By Scientific Research Publishing

  • White Papers // Apr 2011

    A Practical Solution for Location Estimation in Manually Deployed Wireless Sensor Networks

    This paper addresses the existing research and adds another aspect of functionality by incorporating pertinent sensor nodes to provide a dynamic location discovery and estimation. The software used provides an easy graphical user interface to visualize a particular location in accordance with geographical latitude and longitude. A simple real time...

    Provided By Scientific Research Publishing

  • White Papers // Apr 2011

    Classification of Object Tracking Techniques in Wireless Sensor Networks

    Object tracking is one of the killer applications for Wireless Sensor Networks (WSN) in which the network of wireless sensors is assigned the task of tracking a particular object. The network employs the object tracking techniques to continuously report the position of the object in terms of Cartesian coordinates to...

    Provided By Scientific Research Publishing

  • White Papers // Apr 2011

    A Direct Trust Dependent Link State Routing Protocol Using Route Trusts for WSNs (DTLSRP)

    The traditional cryptographic security techniques are not sufficient for secure routing of message from source to destination in Wireless Sensor Networks (WSNs), because it requires sophisticated software, hardware, large memory, high processing speed and communication bandwidth. It is not economic and feasible because, depending on the application, WSN nodes are...

    Provided By Scientific Research Publishing

  • White Papers // Apr 2011

    Ambient Intelligence: Awareness Context Application in Industrial Storage

    WSNs are designed to efficiently collect data and monitor environments, among other applications. This paper describes the concept and realization of an Active Security System for security management of warehousing of chemical substances using WSNs. The authors present an approach to modeling and simulating cooperation between intelligent products that are...

    Provided By Scientific Research Publishing

  • White Papers // May 2011

    In-Motes EYE: A Real Time Application for Automobiles in Wireless Sensor Networks

    Wireless sensor networks have been identified as one of the key technologies for the 21st century. In order to overcome their limitations such as fault tolerance and conservation of energy, the authors propose a middleware solution, In-Motes. In-Motes stands as a fault tolerant platform for deploying and monitoring applications in...

    Provided By Scientific Research Publishing

  • White Papers // May 2011

    Implementation Study of a Centralized Routing Protocol for Data Acquisition in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) attract considerable amount of research efforts from both industry and academia. With limited power and computational capability available on a sensor node, robustness and efficiency are major concerns when designing a routing protocol for WSNs with low complexity. There are various existing design approaches, such as...

    Provided By Scientific Research Publishing

  • White Papers // Jun 2011

    A New Kind of Dynamic Key Protocol for Wireless Sensor Network

    For the source limitations and vulnerabilities of the sensor nodes of Wireless Sensor Networks, the authors propose the new kind of dynamic key protocol for wireless sensor network, using the unidirection of hash function and the thinking of Hill to study the dynamic key matrix. Through theoretical analysis of some...

    Provided By Scientific Research Publishing

  • White Papers // Jun 2011

    MDS and Trilateration Based Localization in Wireless Sensor Network

    Localization of sensor nodes is crucial in Wireless Sensor Network because of applications like surveillance, tracking, navigation etc. Various optimization techniques for localization have been proposed in literature by different researchers. In this paper, the authors propose a two phase hybrid approach for localization using Multidimensional Scaling and trilateration, namely,...

    Provided By Scientific Research Publishing

  • White Papers // Jun 2011

    Cross Layer Design for Cooperative Transmission in Wireless Sensor Networks

    Several protocols and schemes have been proposed to reduce energy consumption in Wireless Sensor Networks (WSNs). In this paper, the authors employ farcoopt, a cross layer design approach with the concept of cooperation among the nodes with best farthest neighbor scheme to increase the Quality of Service (QoS), reduce energy...

    Provided By Scientific Research Publishing

  • White Papers // Jul 2011

    A High-Level Architecture for Intrusion Detection on Heterogeneous Wireless Sensor Networks: Hierarchical, Scalable and Dynamic Reconfigurable

    Networks protection against different types of attacks is one of most important posed issue into the network and information security domains. This problem on Wireless Sensor Networks (WSNs), in attention to their special properties, has more importance. Now, there are some of proposed solutions to protect Wireless Sensor Networks (WSNs)...

    Provided By Scientific Research Publishing

  • White Papers // Aug 2011

    Multiple Targets Tracking Using Kinematics in Wireless Sensor Networks

    Target tracking is considered as one of the cardinal applications of a wireless sensor network. Tracking multiple targets is more challenging than tracking a single target in a wireless sensor network due to targets' movement in different directions, targets' speed variations and frequent connectivity failures of low powered sensor nodes....

    Provided By Scientific Research Publishing

  • White Papers // Aug 2011

    Performance Analysis of an Enhanced Load Balancing Scheme for Wireless Sensor Networks

    Research interest in sensor networks routing largely considers minimization of energy consumption as a major performance criterion to provide maximum sensors network lifetime. When considering energy conservation, routing protocols should also be designed to achieve fault tolerance in communications. Moreover, due to dynamic topology and random deployment, incorporating reliability into...

    Provided By Scientific Research Publishing

  • White Papers // Aug 2011

    Modeling of Data Reduction in Wireless Sensor Networks

    In this paper, the authors present a stochastic model for data in a Wireless Sensor Network (WSN) using random field theory. The model captures the space-time behavior of the underlying phenomenon being observed by the network. They present results regarding the size and spatial distribution of the regions of the...

    Provided By Scientific Research Publishing

  • White Papers // Aug 2011

    Characterization Process of MOSFET With Virtual Instrumentation for DP4T RF Switch - A Review

    With the increasing interest in radio frequency switch by using the CMOS circuit technology for the wireless communication systems is in demand. A traditional n-MOS Single-Pole Double-Throw (SPDT) switch has good performances but only for a single operating frequency. For multiple operating frequencies, to transmitting or receiving information through the...

    Provided By Scientific Research Publishing

  • White Papers // Jun 2009

    Fractional Sampling Improves Performance of UMTS Code Acquisition

    An improved technique with a fractional sampling based on two samples per chip, according to the Nyquist criterion, has been employed by the authors to enhance the performance in the code synchronization of UMTS (or W-CDMA) systems. In this paper, the authors investigate on the theoretical rationale of such a...

    Provided By Scientific Research Publishing

  • White Papers // Jun 2009

    On Approaches to Congestion Control Over Wireless Networks

    Congestion control in wireless networks has been extensively investigated over the years and several schemes and techniques have been developed, all with the aim of improving performance in wireless network. With the rapid expansion and implementation of wireless technology it is essential that the congestion control problem be solved. This...

    Provided By Scientific Research Publishing

  • White Papers // Jun 2009

    An Improved Analytical Model for IEEE 802.11 Distributed Coordination Function Under Finite Load

    In this paper, an improved analytical model for IEEE 802.11 Distributed Coordination Function (DCF) under finite load is proposed by closely following the specifications given in IEEE 802.11 standard. The model is investigated in terms of channel throughput under perfect and slow Rayleigh fading channels. It is shown that the...

    Provided By Scientific Research Publishing

  • White Papers // Jul 2009

    The Application of Optical CDMA-Based Fiber Radio Networks in Wireless Sensor Networks

    One fiber radio scheme using shifted prime codes for interference elimination is proposed for Optical Code-Division Multiple-Access (OCDMA) network. By taking advantage of the cyclic property of the shifted prime codes in the same code groups, the proposed compact decoder is low cost and suitable to be used in the...

    Provided By Scientific Research Publishing