Scientific Research

Displaying 1-40 of 766 results

  • White Papers // Jun 2009

    Mobility Trigger Management: Implementation and Evaluation

    Modern mobile devices have several network interfaces and can run various network applications. In order to remain always best connected; events need to be communicated through the entire protocol stack in an efficient manner. Current implementations can handle only a handful of low level events that may trigger actions for...

    Provided By Scientific Research

  • White Papers // May 2009

    Energy Aware Clustered Based Multipath Routing in Mobile Ad Hoc Networks

    With the advance of wireless communication technologies, small-size and high-performance computing and communication devices are increasingly used in daily life. After the success of second generation mobile system, more interest was started in wireless communications. A Mobile Ad hoc NETwork (MANET) is a wireless network without any fixed infrastructure or...

    Provided By Scientific Research

  • White Papers // Aug 2012

    Time Comparing Between Java and C++ Software

    In this paper, the authors construct a comparison between two main software's used in programming applications that are Java and C++, the comparison operation includes the time needed to perform some algorithm i.e. speed of operation, flexibility to adjusting some code, and efficiency. The same code is used to compare...

    Provided By Scientific Research

  • White Papers // Sep 2012

    SEDSR: Soft Error Detection Using Software Redundancy

    In this paper, the authors present a new method for Soft Error Detection using Software Redundancy (SEDSR) that is able to detect transient faults. Soft errors damage the control flow and data of programs and designers usually use hardware-based solutions to handle them. Software-based techniques for soft error detection force...

    Provided By Scientific Research

  • White Papers // Sep 2012

    Impact of Coupling and Cohesion in Object-Oriented Technology

    The interaction between the classes or within the classes shows the complexity of the design. For one smaller problem, there may be more than one software design but who will be the best; depends on the complexity level of software design. Therefore, coupling and cohesion which shows the interlinking of...

    Provided By Scientific Research

  • White Papers // Sep 2012

    A Game Comparative Study: Object-Oriented Paradigm and Notification-Oriented Paradigm

    This paper presents a new programming paradigm named Notification-Oriented Paradigm (NOP) and analyses the performance aspects of NOP programs by means of an experiment. NOP provides a new manner to conceive, structure, and execute software, which would allow better performance, causal-knowledge organization, and decoupling than standard solutions based upon usual...

    Provided By Scientific Research

  • White Papers // Aug 2012

    Simulation-Based Evaluation for the Impact of Personnel Capability on Software Testing Performance

    In this paper, the authors present a decision making process in three steps of knowledge management for test organization using process simulation and financial analysis. First, project effort cost assessment of test knowledge management process subjects to different project duration and number of staffs is established. Two knowledge management simulation...

    Provided By Scientific Research

  • White Papers // Aug 2012

    Understanding Requirement Engineering for Context-Aware Service-Based Applications

    Requirements of software systems tend to change over time. The speed of this tendency depends on the application domain the software system under consideration belongs to. If the authors consider novel contexts such as pervasive systems and systems supporting dynamic B2B interaction, requirements change so fast that the research community...

    Provided By Scientific Research

  • White Papers // Jun 2012

    Using Test Employee Capability Maturity Model for Supporting Gaps Bridging in Software Testing

    In this paper, the authors address the challenge of assessing gaps among the differences of test people in eight groups by matching them based on four scenarios. The proposed model called Test Employee Capability Maturity Model (TEC-MM) helps find the gaps and measure the capability and maturity levels of each...

    Provided By Scientific Research

  • White Papers // Jun 2012

    A Model for Software Product Quality Prediction

    When the expression \"Software quality\" is used, the authors usually think in terms of an excellent software product that fulfills their expectations. These expectations are based on the intended use. Number of models has been proposed for evaluation of software quality based on various characteristics. In this paper, quality of...

    Provided By Scientific Research

  • White Papers // Jul 2012

    Empirical Analysis of Object-Oriented Design Metrics for Predicting Unit Testing Effort of Classes

    In this paper, the authors investigate empirically the relationship between object-oriented design metrics and testability of classes. They address testability from the point of view of unit testing effort. They collected data from three open source Java software systems for which JUnit test cases exist. To capture the testing effort...

    Provided By Scientific Research

  • White Papers // Jul 2012

    Object Oriented Query Response Time for UML Models

    The Unified Modeling Language (UML) is a universal visual modeling language used to represent static and dynamic behavior of system. Now-a-days, the size of database of any business organization is increasing and many of the companies are shifted the old structured database into the object oriented database. Due to increase...

    Provided By Scientific Research

  • White Papers // Jul 2013

    Diffusion Analysis of Message Expansion in STITCH-256

    Cryptographic hash functions are built up from individual components, namely pre-processing, step transformation, and final processing. Some of the hash functions, such as SHA-256 and STITCH-256, employ non-linear message expansion in their pre-processing stage. However, STITCH-256 was claimed to produce high diffusion in its message expansion. In a cryptographic algorithm,...

    Provided By Scientific Research

  • White Papers // Oct 2012

    Dynamic Identity Based Authentication Protocol for Two-Server Architecture

    Most of the password based authentication protocols make use of the single authentication server for user's authentication. User's verifier information stored on the single server is a main point of susceptibility and remains an attractive target for the attacker. On the other hand, multi-server architecture based authentication protocols make it...

    Provided By Scientific Research

  • White Papers // Oct 2012

    Identifier Migration for Identity Continuance in Single Sign-On

    Single Sign-On (SSO) is an identity management technique that provides the ability to use multiple web services with one set of credentials. However, when the authentication server is down or unavailable, users cannot access these web services, regardless of whether they are operating normally. Therefore, it is important to enable...

    Provided By Scientific Research

  • White Papers // Oct 2012

    MAMNID: A Load Balance Network Diagnosis Model Based on Mobile Agents

    In this paper, the authors propose MAMNID, a mobile agent-based model for networks incidents diagnosis. It is a load-balance and resistance to attack model, based on mobile agents to mitigate the weaknesses of centralized systems like that proposed by the researcher which consists in gathering data to diagnose from their...

    Provided By Scientific Research

  • White Papers // Oct 2012

    Category-Based Intrusion Detection Using PCA

    Existing Intrusion Detection Systems (IDS) examine all the network features to detect intrusion or misuse patterns. In feature-based intrusion detection, some selected features may found to be redundant, useless or less important than the rest. This paper proposes a category-based selection of effective parameters for intrusion detection using Principal Components...

    Provided By Scientific Research

  • White Papers // Oct 2011

    Tanimoto Based Similarity Measure for Intrusion Detection System

    Intrusion detection is an important area in the field of computers and security, and in the recent years it has generated considerable interest in the research community. In this paper the authors introduced Tanimoto based similarity measure for host-based intrusions using binary feature set for training and classification. The k-Nearest...

    Provided By Scientific Research

  • White Papers // Aug 2014

    Evaluating Throughput and Delay in 3G and 4G Mobile Architectures

    All mobile carriers these days have provided 3G and 4G services to their customers. The evolution of cellular networks from 3G to 4G has improved several performance metrics of the data communications. The focus of this paper is to evaluate two of the most important performance metrics: throughput and delay....

    Provided By Scientific Research

  • White Papers // Jul 2014

    Tree-Based Revocation for Certificateless Authentication in Vehicular Ad-Hoc Networks

    In this paper, the authors propose authentication based on identity as a way to increase the efficiency and security of communications in vehicular ad-hoc networks. When using identity-based cryptography to achieve certificate-less authentication, membership revocation is not a trivial problem. Thus, in order to improve the performance of revocation in...

    Provided By Scientific Research

  • White Papers // Jul 2014

    Adaptive Mobile Applications to Dynamic Context

    As mobile devices continue to become more resource-rich in terms of their processing power, memory, and display, they can support sophisticated applications ranging from browsing and messaging to navigation and gaming. Context-aware computing is a mobile computing paradigm in which applications can discover and take advantage of contextual information, such...

    Provided By Scientific Research

  • White Papers // Jun 2014

    Smart Location-Based Mobile Shopping Android Application

    In the paper, a smart location-based mobile shopping application for Android devices is proposed. The Geo-position of the user's mobile device is utilized to produce location information in shopping application. The flow of the application is that user searches a product, and then SAGO identifies the location and searches the...

    Provided By Scientific Research

  • White Papers // Jun 2014

    Iterative Soft Decoding of Multiple Description Image over Wireless Channel

    Motivated by recent results in multiple description images coding over wireless networks, the authors propose a scheme for transmission of multiple descriptions through hybrid packet loss and additive white Gaussian noise channel. Each description is coded into multiple bit-streams by applying SPIHT coding on wavelet trees along spatial orientations and...

    Provided By Scientific Research

  • White Papers // Jun 2014

    Differentially-Keyed IR-UWB Signals for MA with Differential-Detection Receiver

    Non-coherent communication receivers (differential-detectors) have simple design, however, they always incur Bit Error Rate (BER) performance loss up to 3dB compared to coherent receivers. In this paper, a differential-detector is proposed for Impulse Radio Ultra WideBand (IR-UWB) communication systems. The system employs bit-level Differential Phase Shift Keying (DPSK) combined with...

    Provided By Scientific Research

  • White Papers // Jun 2014

    Practical Security Approaches Against Border Gateway Protocol (BGP) Session Hijacking Attacks Between Autonomous Systems

    The Border Gateway Protocol (BGP) is the default inter domain routing protocol used on the internet for exchanging information between autonomous systems. Available literature suggests that BGP is vulnerable to session hijacking attacks. There are a number of proposals aimed at improving BGP security which have not been fully implemented....

    Provided By Scientific Research

  • White Papers // Jun 2014

    A Survey of SQL Injection Attack Detection and Prevention

    Structured Query Language Injection Attack (SQLIA) is the most exposed to attack on the Internet. From this attack, the attacker can take control of the database therefore be able to interpolate the data from the database server for the website. Hence, the big challenge became to secure such website against...

    Provided By Scientific Research

  • White Papers // May 2014

    Enhanced Bilinear Approach for Sensor Network Self-Localization Using Noisy TOF Measurements

    In this paper, the authors develop a new algorithm for sensor network self-localization, which is an enhanced version of the existing Crocco's method in. The algorithm explores the noisy Time Of Flight (TOF) measurements that quantify the distances between sensor nodes to be localized and sources also at unknown positions....

    Provided By Scientific Research

  • White Papers // May 2014

    Scalable Trust-Based Secure WSNs

    In this paper, the authors consider the scalable of wireless sensor networks with trust-based security. In their setting, the nodes have limited capability so that heavy computations are not suitable. So public key cryptographic algorithms are not allowed. They focus on the scalability of the network and proposed new testing...

    Provided By Scientific Research

  • White Papers // May 2014

    Design and Implementation of Secure Nodes in the Based-Internet-of-Things Intelligent Household

    As one of the most important uses of the Internet of Things (IOT), the intelligent household is becoming more and more popular. There are many fragile nodes in the intelligent household and they are bound to encounter some potential risks of hostile attacks, such as eavesdropping, denial of service, error...

    Provided By Scientific Research

  • White Papers // Apr 2014

    Software Dysfunction: Why Do Software Fail?

    Software is pervasive in modern society, but the authors are often unaware of its presence until problems arise. Software is one of the most important and yet one of the most economically challenging techniques of this era. As a purely intellectual product, it is among the most labor-intensive, complex, and...

    Provided By Scientific Research

  • White Papers // Apr 2014

    Link Availability Prediction for Cognitive Radio Ad Hoc Networks

    One critical issue for routing in Cognitive Radio Ad Hoc Networks (CRAHNs) is how to select a reliable path for forwarding traffic. This is because mobility may cause radio links to break frequently. The reliability of a path depends on the availability of those links that constitutes the path. In...

    Provided By Scientific Research

  • White Papers // Jun 2013

    Vertical Handover Management for VoIP Session over Broadband Wireless Networks

    Today, wireless LAN (IEEE 802.11g/n) has been the dominant wireless network that can provide high data rates in a limited coverage area. While emerging mobile WiMAX (IEEE 802.16e) can provide a wireless broadband access to mobile users in a wide coverage area. These two different technologies will co-exist while complementing...

    Provided By Scientific Research

  • White Papers // Jul 2013

    Design and Simulation of a PIFA Antenna for the Use in 4G Mobile Telecommunications Networks

    In this paper, the authors describe the design and simulation by HFSS simulator of a probe-fed and multi-band Planar Inverted-F Antenna (PIFA) for the 4G mobile networks. The antenna works in 8 bands. Five bands are auctioned by FCC for 4G (LTE and WiMax) such 710 MHz, 1900 MHz (PCS),...

    Provided By Scientific Research

  • White Papers // May 2013

    Advanced Border Intrusion Detection and Surveillance Using Wireless Sensor Network Technology

    Wireless Sensor Network (WSN) has been emerging in the last decade as a powerful tool for connecting physical and digital world. WSN has been used in many applications such habitat monitoring, building monitoring, smart grid and pipeline monitoring. In addition, few researchers have been experimenting with WSN in many mission-critical...

    Provided By Scientific Research

  • White Papers // Apr 2013

    A Survey of MANET Survivability Routing Techniques

    Mobile ad hoc networks have a wide range of application usage today, due to its great services, easy installation and configuration, and its other distinctive characteristics. In contrast, the attackers also have developed their own way to disrupt MANET normal operations. Many techniques, approaches and protocols have proposed to support...

    Provided By Scientific Research

  • White Papers // Mar 2013

    Hybrid Mapping Scheme for Recent Orthogonal FDMA Schemes

    Single-Carrier Frequency-Division Multiple Access (SC-FDMA) and Orthogonal Frequency Division Multiple Access (OFDMA) systems are new orthogonal multiple access systems. They have been adopted in the 3GPP Long Term Evolution (3GPP-LTE). In these systems, there are only two types of subcarrier mapping schemes which are the interleaved and the localized. So,...

    Provided By Scientific Research

  • White Papers // Mar 2013

    Artificial Intelligence Based Model for Channel Status Prediction: A New Spectrum Sensing Technique for Cognitive Radio

    The recent phenomena of tremendous growth in wireless communication application urge increasing need of radio spectrum, albeit it being a precious but natural resource. The recent technology under development to overview the situation is the concept of Cognitive Radio (CR). Recently the Artificial Intelligence (AI) tools are being considered for...

    Provided By Scientific Research

  • White Papers // May 2013

    Utility-Based Node Cooperation Mechanism in Wireless Sensor Networks

    In wireless sensor networks, due to the energy and resource constraints, nodes may be unwilling to forward packets for their neighbors. This can render severe deteriorations in the network performance and malfunctions of the system. To tackle such selfish behaviors and enhance the cooperation among sensors, based on reputation and...

    Provided By Scientific Research

  • White Papers // May 2013

    Performance of AF Relay Networks with Multiple Relays and Multiple Antennas at Destination Using MRC Combining

    Wireless relaying is a promising solution to overcome the channel impairments and provides high data rate coverage that appears for the next generation mobile communications. Cooperative diversity networks have recently been proposed as a way to form virtual antenna arrays where neighboring relay nodes assist the source to send the...

    Provided By Scientific Research

  • White Papers // Apr 2013

    Services and Applications Based on Mobile User's Location Detection and Prediction

    As a result of great advances in mobile communication systems and due to widely usage of mobile equipments everywhere, there is urgent and increasing demand on mobile applications and services. Many wireless applications are deployed and available to customers via their mobile phones. Variety of these applications and services are...

    Provided By Scientific Research