Scientific Research

Displaying 1-40 of 759 results

  • White Papers // Jun 2009

    Mobility Trigger Management: Implementation and Evaluation

    Modern mobile devices have several network interfaces and can run various network applications. In order to remain always best connected; events need to be communicated through the entire protocol stack in an efficient manner. Current implementations can handle only a handful of low level events that may trigger actions for...

    Provided By Scientific Research

  • White Papers // Jan 2012

    A Novel Statistical AOA Model Pertinent to Indoor Geolocation

    A novel statistical Angle-Of-Arrival (AOA) model for indoor geolocation applications is presented. The modeling approach focuses on the arrivals of the multipath components with respect to the Line-Of-Sight (LOS) path which is an important component especially when indoor geolocation applications are considered. The model is particularly important for indoor applications...

    Provided By Scientific Research

  • White Papers // Mar 2013

    An Ad-Hoc Low Cost Wireless Sensor Network for Smart Gas Metering

    The monitoring of power consumption has become of a great interest in recent years as well as the innovative technologies available to realize Wireless Sensor Networks (WSNs) have experienced a great growth. While smart metering technologies for electric energy are already established, as sensors power supply comes directly from power...

    Provided By Scientific Research

  • White Papers // Jul 2012

    Feedback Reliability Ratio of an Intrusion Detection System

    The behavior and nature of attacks and threats to computer network systems have been evolving rapidly with the advances in computer security technology. At the same time however, computer criminals and other malicious elements find ways and methods to thwart such protective measures and find techniques of penetrating such secure...

    Provided By Scientific Research

  • White Papers // Sep 2012

    Secure Messaging Implementation in OpenSC

    Smartcards are used for a rapidly increasing number of applications including electronic identity, driving licenses, physical access, health care, digital signature, and electronic payments. The use of a specific smartcard in a \"Closed\" environment generally provides a high level of security. In a closed environment no other smartcards are employed...

    Provided By Scientific Research

  • White Papers // Aug 2009

    Approximate Analysis of Power Offset Over Spatially Correlated MIMO Channels

    Power offset is zero-order term in the capacity versus signal-to-noise ratio curve. In this paper, approximate analysis of power offset is presented to describe MIMO system with uniform linear antenna arrays of fixed length. It is assumed that the number of receive antenna is larger than that of transmit antenna....

    Provided By Scientific Research

  • White Papers // Aug 2009

    A Cross-Layer Scheme for Handover in 802.16e Network with F-HMIPv6 Mobility

    IEEE802.16e is the major global cellular wireless standard that enables low-cost mobile Internet application. However, existing handover process system still has latency affects time-sensitive applications. In this paper, the handover procedures of 802.16e and Fast Handover for Hierarchical MIPv6 (F-HMIPv6) are reconstructed to achieve a better transmission performance. The concept...

    Provided By Scientific Research

  • White Papers // Aug 2009

    A Study of Multi-Node and Dual-Hop Collaborative Communication Performance Based on Harmonic Mean Method

    MIMO technique has been regarded as the essential technique for beyond 3G mobile cellular networks. The Benefits of MIMO system have been extensively studied by researchers in both academic and industry. It successfully meets the rapidly growing demand for high rate, voice and especially for multimedia services. Closed form expressions...

    Provided By Scientific Research

  • White Papers // Aug 2009

    A Novel Scheme with Adaptive Sampling for Better Spectrum Utilization in Cognitive Radios

    In Cognitive Radio (CR) networks, cognitive users need continuously monitor spectrum to decrease or avoid interference to primary users, yet attain a reasonable throughput. In this paper, the authors exploit a scheme to dynamically change the detection time duration to gain maximum throughput. Meanwhile the average detection time is kept...

    Provided By Scientific Research

  • White Papers // Aug 2009

    The Identification of Frequency Hopping Signal Using Compressive Sensing

    Compressive Sensing (CS) creates a new framework of signal reconstruction or approximation from a smaller set of incoherent projection compared with the traditional Nyquist-rate sampling theory. Recently, it has been shown that CS can solve some signal processing problems given incoherent measurements without ever reconstructing the signals. Moreover, the number...

    Provided By Scientific Research

  • White Papers // Aug 2009

    Uncertain IMM Estimator for Multi-Sensor Target Tracking

    Interacting Multiple Model (IMM) estimator can provide better performance of target tracking than mono model Kalman filter. In multi-sensor system ordinarily, availability of measurement from different sensors is stochastic and it is difficult to construct uniform global observation vector and observation matrix appropriately in existing method. An IMM estimator for...

    Provided By Scientific Research

  • White Papers // Jul 2009

    A Privacy Enabled Fast Dynamic Authentication and Authorization for B3G/4G Mobility

    Mobile technologies make their headway by offering more flexibility to end-users and improve the productivities. Within the application of ubiquitous access and pervasive communication, security (or privacy) and QoS (Quality of Service) are two critical factors during global mobility, so how to get a smooth and fast handover based on...

    Provided By Scientific Research

  • White Papers // Sep 2009

    Joint Detection for Image Transmission Based on Schur Algorithm Over Wireless Sensor Network

    To achieve much efficient multimedia transmission over an error-prone wireless network, there are still some problem must to be solved, especially in energy limited wireless sensor network. In this paper, the authors propose a joint detection based on Schur algorithm for image wireless transmission over Wireless Sensor Network. To eliminate...

    Provided By Scientific Research

  • White Papers // Nov 2009

    Using the Power Control and Cooperative Communication for Energy Saving in Mobile Ad Hoc Networks

    In this paper, the authors investigate the energy saving problem in mobile ad hoc network and give out an improved variable-range transmission power control algorithm based on Minimum Spanning Tree (MST) algorithm. Using previous work by Gomez and Campbell, they show that in consider of node's mobility, the previous variable-range...

    Provided By Scientific Research

  • White Papers // Dec 2009

    On Possible A-Priori "Imprinting" of General Relativity Itself on the Performed Lense-Thirring Tests with LAGEOS Satellites

    The term "GravitoMagnetism" (GM) denotes those gravitational phenomena concerning orbiting test particles, precessing gyroscopes, moving clocks and atoms and propagating electromagnetic waves which in the framework of the Einstein's General Theory of Relativity (GTR), arise from non-static distributions of matter and energy. The impact of possible a-priori "Imprinting" effects of...

    Provided By Scientific Research

  • White Papers // Nov 2009

    Joint Power Control and Spectrum Allocation for Cognitive Radio with QoS Constraint

    Spectrum sharing with Quality of Service (QoS) requirement and power constraint on cognitive users is studied. The objective is to maximize the system throughput. This problem is modeled as a mixed integer nonlinear programming problem and then transformed to a continuous nonlinear programming problem through eliminating integer variables. The authors...

    Provided By Scientific Research

  • White Papers // Dec 2009

    ADPF Algorithm for Target Tracking in WSN

    Particle Filtering (PF) has been widely used in solving nonlinear/non Gaussian filtering problems. Inferring to the target tracking in a Wireless Sensor Network (WSN), Distributed PF (DPF) was used due to the limitation of nodes' computing capacity. In this paper, a novel filtering method - Asynchronous DPF (ADPF) for target...

    Provided By Scientific Research

  • White Papers // Dec 2009

    Designing Intrusion Detection System for Web Documents Using Neural Network

    Cryptographic systems are the most widely used techniques for information security. These systems however have their own pitfalls as they rely on prevention as their sole means of defense. That is why most of the organizations are attracted to the Intrusion Detection Systems. The Intrusion Detection Systems can be broadly...

    Provided By Scientific Research

  • White Papers // Nov 2009

    Proposed Model for SIP Security Enhancement

    In this paper, the authors aims to examine the various methods of protecting and securing a SIP architecture and also propose a new model to enhance SIP security in certain selected, specific and confidential environments as this proposed method cannot be generalized. Several security measures and techniques have already been...

    Provided By Scientific Research

  • White Papers // Dec 2009

    Live Video Services Using Fast Broadcasting Scheme

    The fast broadcasting scheme is one of the simplest schemes that provide video services. In this scheme, the video is divided into equal-sized segments depending upon the bandwidth allocated by the video server. If the video length is not known, then this scheme cannot be applied as the number of...

    Provided By Scientific Research

  • White Papers // Apr 2010

    Method of Carrier Acquisition and Track for HAPS

    Now the HAPS (High Altitude Platform Station) system has been concentrated on research because of important values in military and application. This paper emphasizes on the characteristics and schemes of carrier acquisition and track in high dynamic and high information-rate situation. Carrier acquisition model is analyzed theoretically and the design...

    Provided By Scientific Research

  • White Papers // Mar 2010

    PBB Efficiency Evaluation via Colored Petri Net Models

    Basic components of Provider Backbone Bridge (PBB) network models were constructed: PBB interior switch, PBB edge switch - with the dynamic filling up of address tables. The modeling of PBB networks was implemented. The results of simulation reveal definite imperfections of PBB technology caused by the broadcasting and sensitivity to...

    Provided By Scientific Research

  • White Papers // Apr 2010

    Multiobjective Duality in Variational Problems with Higher Order Derivatives

    Calculus of variation is a powerful technique for the solution of various problems appearing in dynamics of rigid bodies, optimization of orbits, theory of variations and many other fields. A multi-objective variational problem involving higher order derivatives is considered and optimality conditions for this problem are derived. A Mond-Weir type...

    Provided By Scientific Research

  • White Papers // May 2010

    Downlink MBER Transmit Beamforming Design Based on Uplink MBER Receive Beamforming for TDD-SDMA Induced MIMO Systems

    The downlink Minimum Bit Error Rate (MBER) transmit beamforming is directly designed based on the uplink MBER receive beamforming solution for Time Division Duplex (TDD) Space-Division Multiple-Access (SDMA) induced Multiple-Input Multiple-Output (MIMO) systems, where the Base Station (BS) is equipped with multiple antennas to support multiple single-antenna Mobile Terminals (MTs)....

    Provided By Scientific Research

  • White Papers // Nov 2011

    Investigation of Upstream Near-Far Problem in VDSL Systems via Complete Adaptive Iterative Water Filling Algorithm

    Crosstalk is the main degrading factor in Digital Subscriber Line (DSL) systems which are the result of electromagnetic coupling between two adjacent twisted pairs in a cable. Very-high bit-rate Digital Subscriber Line (VDSL) systems which use higher frequencies for data transmission than the other DSL systems, this effect is more...

    Provided By Scientific Research

  • White Papers // Sep 2011

    Conditional Diagnosability of the Locally Twisted Cubes under the PMC Model

    In a multiprocessor systems, it is important to local and to replace the faulty processors to maintain systempsilas high reliability. The fault diagnosis, which is the process of identifying fault processors in a multiprocessor system through testing. The conditional diagnosis requires that for each processor u in a system, all...

    Provided By Scientific Research

  • White Papers // Jan 2013

    QoS Bandwidth Estimation Scheme for Delay Sensitive Applications in MANETs

    For last few years, Mobile Ad-hoc NETworks (MANETs) have attracted a great interest in case of wireless and multimedia technologies. Infrastructure less nature of MANETs makes Quality of Service (QoS) provisioning very challenging and important research aspect. To find a QoS constrained route from source to destination, the authors should...

    Provided By Scientific Research

  • White Papers // Nov 2012

    Fast Converging Generalized Turbo Decoding Scheme with Enhanced Throughput for Mobile Radio

    The use of turbo codes enhances the data transmission efficiency and optimizes the performance of a communication system over wireless fading channels. In this paper, the authors present a brief overview of the various components of the turbo coding scheme, analyze the complexities of the most popular turbo decoding algorithms...

    Provided By Scientific Research

  • White Papers // Apr 2012

    Evaluation of Different Electronic Product Code Discovery Service Models

    Electronic Product Code Discovery Service (EPCDS) is an important concept in supply chain processes and in Internet of Things (IOT). It allows supply chain participants to search for their partners, communicate with them and share product information using standardized interfaces securely. Many researchers have been proposing different EPCDS models, considering...

    Provided By Scientific Research

  • White Papers // Apr 2012

    Automatic Service Discovery of IP Cameras Over Wide Area Networks with NAT Traversal

    A novel framework for remote service discovery and access of IP cameras with Network Address Translation (NAT) traversal is presented in this paper. The proposed protocol, termed STDP (Service Trader Discovery Protocol), is a hybrid combination of Zeroconf and SIP (Session Initial Protocol). The Zeroconf is adopted for the discovery...

    Provided By Scientific Research

  • White Papers // Jul 2012

    Semantic Model for Socially Aware Objects

    The Internet of Things (IoT) assumes that things interact and exchange information thus defining the future of pervasive computing environments. The integration between people and interconnected objects realizes a new physical and social space and opens new frontiers in context awareness and objects adaptation. In this paper, the authors investigate...

    Provided By Scientific Research

  • White Papers // Jul 2012

    A Space Unrestricted Multi-Robot Combat Internet of Things System

    Multi-robot cooperation problem has received increasing attention in the research community and has been extensively studied from different aspects. Space constrain problem is a major issue for building a multi-robot system. This constrain is a major hindrance for the efficient cooperation among robots in multi-robot applications. In this paper, the...

    Provided By Scientific Research

  • White Papers // Jul 2012

    The Influence of Memetic Primers in Online Comments in Video Game Blogs

    Through investigating a particular blog, several factors were found which have significant influence on reader actions. This paper uses the term "Memetic primers" for those styles that most often cause readers to take notice of a particular comment, remember information included in it and take action. The memetic primers were...

    Provided By Scientific Research

  • White Papers // Jul 2012

    P2P Model Based on Isolated Broadcast Domains

    Resource location is the most important issue for Peer-To-Peer (P2P) system and flooding is the fundamental mechanism for unstructured P2P systems. Redundant messages will exponential growth with flooding scope increasing which severely influences the scalability of the system. In this paper, a new P2P model based on isolated broadcast domains...

    Provided By Scientific Research

  • White Papers // Oct 2012

    Inkjet-Printed UHF RFID Tags on Renewable Materials

    Radio Frequency IDentification (RFID) provides great potential for different Internet of Things (IOT) applications. In the future, material choices in these IOT devices will have a huge effect on the environment and thus use of renewable materials is a growing trend. In this paper, passive Ultra High Frequency (UHF) RFID...

    Provided By Scientific Research

  • White Papers // Oct 2012

    Application of Full Text Search Engine Based on Lucene

    With the rapid development of Internet and with the explosive growth of web information, Internet users how to remove the impurities and retained the essence quickly and easily to gain the information they need in the vast ocean of information to become a hot research topic in this field. This...

    Provided By Scientific Research

  • White Papers // Oct 2012

    UMIS: A Service for User Model Interoperability

    In this paper, the authors describe UMIS, a service architecture that enables user adaptive applications to exchange User Model data on the Web. UMIS provides a set of facilities that allow applications to interoperate with minimum changes in their internal logics and knowledge representation. The goal is to support the...

    Provided By Scientific Research

  • White Papers // Aug 2009

    The Study and Application of the IoT in Pet Systems

    The interaction between human and physical devices and devices in the real world is gaining more attention and requires a natural and intuitive methodology to employ. According to this idea and living well, life has been a growing demand. Thus, how to raise pets in an easy way has been...

    Provided By Scientific Research

  • White Papers // Aug 2009

    The Comparisonal Analysis of the Concept of Rectangular and Hexagonal Pilot in OFDM

    Channel estimation in coherent OFDM by inserting pilot-symbols into two-dimensional time-frequency lattice is a promising candidate for improving channel transmission capacity in future wireless communication systems. This paper proposes a new Cartesian mathematical concept of the Hexagonal Pilot Pattern, Hexagonal Pilot with Virtual and Rectangular Pilot Pattern. The main focus...

    Provided By Scientific Research

  • White Papers // Aug 2009

    Principle of Link Evaluation

    Link Evaluation (LE) is proposed in system evaluation to reduce complexity. It is important to practical systems also for link adaptation. Current algorithms for link evaluation are developed by simulation method, lacking of theoretical description. Although they provide some good accuracy for some scenarios, all of them are not universal....

    Provided By Scientific Research