Scientific Research

Displaying 1-40 of 710 results

  • White Papers // Feb 2015

    High-Level Portable Programming Language for Optimized Memory Use of Network Processors

    Network Processors (NPs) are widely used for programmable and high-performance networks; however, the programs for NPs are less portable, the number of NP program developers is small, and the development cost is high. To solve these problems, this paper proposes an open, high-level, and portable programming language called \"Phonepl\", which...

    Provided By Scientific Research

  • White Papers // Feb 2015

    Dynamic Capacity Allocation in OTN Networks

    A dynamic Optical Transport Network (OTN) has the advantage of being able to adjust the connection capacity on demand in order to respond to variations on traffic patterns or to network failures. This feature has the potential to reduce operational costs and at the same time to optimize networks resources....

    Provided By Scientific Research

  • White Papers // Feb 2015

    Hard Decision-Based PWM for MIMO-OFDM Radar

    For the purpose of target localization, Multiple Input Multiple Output-Orthogonal Frequency Division Multiplexing (MIMO-OFDM) radar has been proposed. OFDM technique has been adopted in order to a simultaneous transmission and reception of a set of multiple narrowband orthogonal signals at orthogonal frequencies. Although multi-carrier systems such as OFDM support high...

    Provided By Scientific Research

  • White Papers // Feb 2015

    Improving Queuing System Throughput Using Distributed Mean Value Analysis to Control Network Congestion

    In this paper, the authors have used the Distributed Mean Value Analysis (DMVA) technique with the help of Random Observe Property (ROP) and palm probabilities to improve the network queuing system throughput. In such networks, where finding the complete communication path from source to destination, especially when these nodes are...

    Provided By Scientific Research

  • White Papers // Feb 2015

    Performance Study of Locality and Its Impact on Peer-to-Peer Systems

    Peer-To-Peer (P2P) is a distributed computing model which aims to share resources whose concept is not completely new. This paper presents the measurement study of locality-aware peer-to-peer solutions on Internet Autonomous System (AS) topology by reducing AS hop count and increase nearby source nodes in P2P applications. The authors evaluate...

    Provided By Scientific Research

  • White Papers // Feb 2015

    Control Access Point of Devices for Delay Reduction in WBAN Systems with CSMA/CA

    Due to the gathering of sickrooms and consultation rooms in almost all hospitals, the performance of wireless devices system is deteriorated by the increase of collision probability and waiting time. In order to improve the performance of wireless devices system, relay is added to control the access point and then...

    Provided By Scientific Research

  • White Papers // Jan 2015

    Visualization and Management Platform with Augmented Reality for Wireless Sensor Networks

    Recently a ubiquitous sensor network which collects the people environmental information gets increasingly popular, a visualization application is necessary for users to manage complicated wireless networks, however, these applications are developed individually for wireless communication standard or a type of wireless device. Therefore, users are forced to adopt and use...

    Provided By Scientific Research

  • White Papers // Dec 2014

    Multipath Grid-Based Enabled Geographic Routing for Wireless Sensor Networks

    In this paper, the authors propose an efficient disjoint multipath geographic routing algorithm for dense Wireless Sensor Networks (WSNs), called Multipath Grid-based Enabled Geographic Routing (MGEGR). The proposed algorithm relies on the construction of a 2-D logical grid in the geographical region of deployment. The objective of the proposed scheme...

    Provided By Scientific Research

  • White Papers // Nov 2014

    Handover Time Delay Reduction and Its Effects in Cloud Computing

    Mobile devices connected by cellular service require a constant connection to a base station. As these devices move from place to place, they need to disconnect from one base station and connect to another. The process of transferring between base stations found in neighboring geographic areas is referred to as...

    Provided By Scientific Research

  • White Papers // Nov 2014

    Development of Global Geographical Coverage Area for Terrestrial Networks Internetworked with Leo Satellite Network

    Network planning, analysis and design are an iterative process aimed at ensuring that a new network service meets the needs of subscribers and operators. During the initial start-up phase, coverage is the big issue and coverage in telecommunications systems is related to the service area where a bare minimum access...

    Provided By Scientific Research

  • White Papers // Nov 2014

    Rerouting Schemes for Wireless ATM Networks

    In this paper, the wireless ATM rerouting procedures are analyzed and categorized, based on a standard network topology, derived from the wireless ATM reference model. A new operational concept for a mobile ATM network called Mobile Network Architecture based on Virtual Paths (MNAVP), in which the network nodes are connected...

    Provided By Scientific Research

  • White Papers // Nov 2014

    Ternary Zero Correlation Zone Sequence Sets for Asynchronous DS-CDMA

    In this paper, the authors propose a new class of ternary Zero Correlation Zone (ZCZ) sequence sets based on binary ZCZ sequence sets construction. It is shown that the proposed ternary ZCZ sequence sets can reach the upper bound on the ZCZ sequences. The performance of the proposed sequences set...

    Provided By Scientific Research

  • White Papers // Oct 2014

    Mapping AADL to Petri Net Tool-Sets Using PNML Framework

    Architecture Analysis and Design Language (AADL) has been utilized to specify and verify nonfunctional properties of Real-Time Embedded Systems (RTES) used in critical application systems. Examples of such critical application systems include medical devices, nuclear power plants, aerospace, financial, etc. Using AADL, an engineer is enabling to analyze the quality...

    Provided By Scientific Research

  • White Papers // Oct 2014

    Evaluation of XIS-Mobile, a Domain Specific Language for Mobile Application Development

    The great evolution of the mobile market during the last years caused some fragmentation of the mobile platforms namely through the existence of different programming languages and software development tools for each platform. This fact can be an obstacle and increases the development complexity and costs when the authors want...

    Provided By Scientific Research

  • White Papers // Oct 2014

    A New Approach for Database Fragmentation and Allocation to Improve the Distributed Database Management System Performance

    The efficiency and performance of Distributed DataBase Management Systems (DDBMS) is mainly measured by its proper design and by network communication cost between sites. Fragmentation and distribution of data are the major design issues of the DDBMS. In this paper, the authors propose new approach that integrates both fragmentation and...

    Provided By Scientific Research

  • White Papers // Oct 2014

    Lightweight Virtualization Cluster How to Overcome Cloud Vendor Lock-In

    To overcome vendor lock-in obstacles in public cloud computing, the capability to define transferable cloud-based services is crucial but has not yet been solved satisfactorily. This is especially true for small and medium sized enterprises being typically not able to operate a vast staff of cloud service and IT experts....

    Provided By Scientific Research

  • White Papers // Oct 2014

    An Investigation of Wideband Rectennas for Wireless Energy Harvesting

    In this paper, the authors focus on a wireless energy harvesting system using a rectifying antenna (rectenna). The proposed device consists of a wideband cross-dipole antenna, a microwave low-pass filter and a doubling rectifying circuit using Shottcky diodes as rectifying elements. Previously, a few of wideband rectennas have been investigated...

    Provided By Scientific Research

  • White Papers // Sep 2014

    The Challenge of Implementing Information Security Standards in Small and Medium e-Business Enterprises

    The dynamic nature of online systems requires companies to be proactive with thwarting information security threats, and to follow a systematic way for managing and evaluating the security of their online services. The existence of security standards is an important factor that helps organizations to evaluate and manage security by...

    Provided By Scientific Research

  • White Papers // Sep 2014

    Overlapping Community Detection in Dynamic Networks

    Due to the increasingly large size and changing nature of social networks, algorithms for dynamic networks have become an important part of modern day community detection. In this paper, the authors use a well-known static community detection algorithm and modify it to discover communities in dynamic networks. They have developed...

    Provided By Scientific Research

  • White Papers // Sep 2014

    Combining Geographic Information Systems for Transportation and Mixed Integer Linear Programming in Facility Location-Allocation Problems

    Location-allocation problems are generally complex problems by involving many variables and data. In this paper, the authors aimed to assess the solution quality for location-allocation problems from facilities generated by the software TransCAD, a Geographic Information System for Transportation (GIS-T). Such facilities were obtained after using two routines together: facility...

    Provided By Scientific Research

  • White Papers // Aug 2014

    Process Evaluation Based on Meeting Quality of Requirement Analysis Phase in Software Development Projects

    The authors propose a metric for meeting quality in software development. Meeting is important in order to share knowledge and experience among developers and stakeholders. Most frequent and important meetings are in software requirement analysis phase. System engineers and stakeholders discuss software requirements. However, meeting quality is various. Sometimes, stakeholders...

    Provided By Scientific Research

  • White Papers // Aug 2014

    Job Scheduling for Cloud Computing Using Neural Networks

    Cloud computing aims to maximize the benefit of distributed resources and aggregate them to achieve higher throughput to solve large scale computation problems. In this technology, the customers rent the resources and only pay per use. Job scheduling is one of the biggest issues in cloud computing. Scheduling of users'...

    Provided By Scientific Research

  • White Papers // Aug 2014

    Trust Evaluation Based on Node's Characteristics and Neighbouring Nodes' Recommendations for WSN

    In Wireless Sensor Networks (WSNs), the traditional cryptographic mechanisms for security require higher consumption of resources such as large memory, high processing speed and communication bandwidth. Also, they cannot detect faulty, malicious and selfish nodes which lead to the breakdown of network during packet routing. Hence, cryptographic security mechanisms are...

    Provided By Scientific Research

  • White Papers // Aug 2014

    An Improved Framework for Requirement Change Management in Global Software Development

    In this paper, an improved framework for Requirement Change Management in Global Software Development (RCM-GSD) has been presented. The objective is to manage the change in requirement specifically in global software development in an appropriate manner. The proposed framework RCM-GSD follows the required processes of RCM and reduces the concerns...

    Provided By Scientific Research

  • White Papers // Aug 2014

    The Load Balancing Network Service in Cloud Data Centre Environments Risk and Vulnerability Analysis

    Data centre is the consolidation point for provisioning multiple services that drive an enterprise business processes. A discrete event based process model of a reengineered data centre communication network comprising of four data centre LAN nodes with an inclusion of a virtualization server for creating virtual instances of resources and...

    Provided By Scientific Research

  • White Papers // Aug 2014

    Cloud Service Provisioning Based on Peer-to-Peer Network for Flexible Service Sharing and Discovery

    In this paper, the authors present an approach to establish efficient and scalable service provisioning in the cloud environment using P2P-based infrastructure for storing, sharing and discovering services. Unlike most other P2P-based approaches, it allows flexible search queries, since all of them are executed against internal database presenting at each...

    Provided By Scientific Research

  • White Papers // Aug 2014

    Review of the State of Art of Tunable Impulse Ultra-Wideband Technology as Integrator for Wireless Sensing and Identifications Short-Range Networks

    Impulse based ultra wideband technology has been the motivation of many recent researches with the potential of many applications to be researched. The uniqueness of the physical characteristics of the generated signal combined with the high flexibility of for different data rates at the physical layer design level have been...

    Provided By Scientific Research

  • White Papers // Aug 2014

    A Fast Heuristic Algorithm for Minimizing Congestion in the MPLS Networks

    In the Multiple Protocol Label-Switched (MPLS) networks, the commodities are transmitted by the Label-Switched Paths (LSPs). For the sake of reducing the total cost and strengthening the central management, the MPLS networks restrict the number of paths that a commodity can use, for maintaining the Quality of Service (QoS) of...

    Provided By Scientific Research

  • White Papers // Aug 2014

    Extracting SOA Candidate Software Services from an Organization's Object Oriented Models

    Class diagrams and use case models are system models that are used to analyze, design and model object oriented systems. In this era of agile computing, service-oriented architecture has become increasingly popular for achieving efficient and agile business solutions that can maintain changes demanded by the business world. This paper...

    Provided By Scientific Research

  • White Papers // Aug 2014

    Object-Component Development of Application and Systems Theory and Practice

    The Object-Componet Development (OCD) is a variety of the compositional programmings, where a role of elements of assembling is warmed by objects, interfaces and components. For developing application systems, the theory of design of subject domain based on Frege object theory is developed, together with the presentation of their functions...

    Provided By Scientific Research

  • White Papers // Aug 2014

    Evaluating Throughput and Delay in 3G and 4G Mobile Architectures

    All mobile carriers these days have provided 3G and 4G services to their customers. The evolution of cellular networks from 3G to 4G has improved several performance metrics of the data communications. The focus of this paper is to evaluate two of the most important performance metrics: throughput and delay....

    Provided By Scientific Research

  • White Papers // Aug 2014

    Cloud-Based Spatial Information Service Architecture within LBS

    Location Based Services (LBS) have become a popular technology to retrieve information about the surroundings of a mobile user which results in ubiquitous demand of spatial information service with diverse needs of different types of users. This paper is to reveal the potential of cloud-based spatial information service architecture that...

    Provided By Scientific Research

  • White Papers // Aug 2014

    Implications of SSO Solutions on Cloud Applications

    The trend in businesses is moving towards a single browser tool on portable devices to access cloud applications which would increase portability but at the same time would introduce security vulnerabilities. This resulted in the need for several layers of password authentications for cloud applications access. Single Sign-On (SSO) is...

    Provided By Scientific Research

  • White Papers // Aug 2014

    Stochastic Modeling and Power Control of Time-Varying Wireless Communication Networks

    Wireless networks are characterized by nodes mobility, which makes the propagation environment time-varying and subject to fading. As a consequence, the statistical characteristics of the received signal vary continuously giving rise to a Doppler Power Spectral Density (DPSD) that varies from one observation instant to the next. This paper is...

    Provided By Scientific Research

  • White Papers // Aug 2014

    Implementation and Evaluation of Transport Layer Protocol Executing Error Correction (ECP)

    Technologies for retransmission control and error correction are available for communications over the Internet to improve reliability of data. For communications that require the data reliability be ensured, TCP, which performs retransmission control, is often employed. However, for environments and services where response confirmation and retransmission are difficult, error correction...

    Provided By Scientific Research

  • White Papers // Aug 2014

    Adaptive Distributed Inter Frame Space for IEEE 802.11 MAC Protocol

    In this paper, an Adaptive Distributed Inter Frame Space (ADIFS) has been proposed for IEEE 802.11 Medium Access Control (MAC) protocol. The aim of this approach is to improve Quality of Services (QoS) for IEEE 802.11 MAC protocol in single-hop wireless network. The proposed approach is based on traffic type,...

    Provided By Scientific Research

  • White Papers // Jul 2014

    Office Information Systems: A Retrospective and a Call to Arms

    Office information systems are a field of computer science concerned with studying offices and developing technologies to support office workers. The field initiated in 1982 suffered a gradual demise by 2004. However, many of the themes and issues that motivated the discipline continue to exist today. Office workers continue to...

    Provided By Scientific Research

  • White Papers // Jul 2014

    Mobility Conscious Medium Access Control Scheme for Wireless Sensor Networks: A Conceptual Approach

    Mobility in Wireless Sensor Network (WSN) presents distinctive challenges in Medium Access Control (MAC) scheme. Numerous MAC protocols for sensor networks assume that sensor nodes are static and focus primarily on energy efficiency. This paper seeks to develop an improved mobility conscious medium access control scheme for wireless sensor networks...

    Provided By Scientific Research

  • White Papers // Jul 2014

    Laboratory Test Bench for Research Network and Cloud Computing

    At present moment, there is a great interest in development of information systems operating in cloud infrastructures. Generally, many of tasks remain unresolved such as tasks of optimization of large databases in a hybrid cloud infrastructure, Quality of Service (QoS) at different levels of cloud services, dynamic control of distribution...

    Provided By Scientific Research

  • White Papers // Jul 2014

    Performance Evaluation of Diversity Techniques in IDMA Scheme for Next Generation (4G) in Underwater Wireless Communication

    In this paper, the authors provide a review on the diversity techniques of IDMA (Interleave Division Multiple Access) technology in underwater wireless IDMA employs inter-leavers as the only means in order to distinguish the users. This paper provides a comprehensive study of diversity techniques in IDMA scheme to mitigate the...

    Provided By Scientific Research