Scientific Research

Displaying 1-40 of 710 results

  • White Papers // Feb 2015

    High-Level Portable Programming Language for Optimized Memory Use of Network Processors

    Network Processors (NPs) are widely used for programmable and high-performance networks; however, the programs for NPs are less portable, the number of NP program developers is small, and the development cost is high. To solve these problems, this paper proposes an open, high-level, and portable programming language called \"Phonepl\", which...

    Provided By Scientific Research

  • White Papers // Feb 2015

    Dynamic Capacity Allocation in OTN Networks

    A dynamic Optical Transport Network (OTN) has the advantage of being able to adjust the connection capacity on demand in order to respond to variations on traffic patterns or to network failures. This feature has the potential to reduce operational costs and at the same time to optimize networks resources....

    Provided By Scientific Research

  • White Papers // Feb 2015

    Hard Decision-Based PWM for MIMO-OFDM Radar

    For the purpose of target localization, Multiple Input Multiple Output-Orthogonal Frequency Division Multiplexing (MIMO-OFDM) radar has been proposed. OFDM technique has been adopted in order to a simultaneous transmission and reception of a set of multiple narrowband orthogonal signals at orthogonal frequencies. Although multi-carrier systems such as OFDM support high...

    Provided By Scientific Research

  • White Papers // Feb 2015

    Improving Queuing System Throughput Using Distributed Mean Value Analysis to Control Network Congestion

    In this paper, the authors have used the Distributed Mean Value Analysis (DMVA) technique with the help of Random Observe Property (ROP) and palm probabilities to improve the network queuing system throughput. In such networks, where finding the complete communication path from source to destination, especially when these nodes are...

    Provided By Scientific Research

  • White Papers // Feb 2015

    Performance Study of Locality and Its Impact on Peer-to-Peer Systems

    Peer-To-Peer (P2P) is a distributed computing model which aims to share resources whose concept is not completely new. This paper presents the measurement study of locality-aware peer-to-peer solutions on Internet Autonomous System (AS) topology by reducing AS hop count and increase nearby source nodes in P2P applications. The authors evaluate...

    Provided By Scientific Research

  • White Papers // Feb 2015

    Control Access Point of Devices for Delay Reduction in WBAN Systems with CSMA/CA

    Due to the gathering of sickrooms and consultation rooms in almost all hospitals, the performance of wireless devices system is deteriorated by the increase of collision probability and waiting time. In order to improve the performance of wireless devices system, relay is added to control the access point and then...

    Provided By Scientific Research

  • White Papers // Jan 2015

    Visualization and Management Platform with Augmented Reality for Wireless Sensor Networks

    Recently a ubiquitous sensor network which collects the people environmental information gets increasingly popular, a visualization application is necessary for users to manage complicated wireless networks, however, these applications are developed individually for wireless communication standard or a type of wireless device. Therefore, users are forced to adopt and use...

    Provided By Scientific Research

  • White Papers // Dec 2014

    Multipath Grid-Based Enabled Geographic Routing for Wireless Sensor Networks

    In this paper, the authors propose an efficient disjoint multipath geographic routing algorithm for dense Wireless Sensor Networks (WSNs), called Multipath Grid-based Enabled Geographic Routing (MGEGR). The proposed algorithm relies on the construction of a 2-D logical grid in the geographical region of deployment. The objective of the proposed scheme...

    Provided By Scientific Research

  • White Papers // Nov 2014

    Handover Time Delay Reduction and Its Effects in Cloud Computing

    Mobile devices connected by cellular service require a constant connection to a base station. As these devices move from place to place, they need to disconnect from one base station and connect to another. The process of transferring between base stations found in neighboring geographic areas is referred to as...

    Provided By Scientific Research

  • White Papers // Nov 2014

    Development of Global Geographical Coverage Area for Terrestrial Networks Internetworked with Leo Satellite Network

    Network planning, analysis and design are an iterative process aimed at ensuring that a new network service meets the needs of subscribers and operators. During the initial start-up phase, coverage is the big issue and coverage in telecommunications systems is related to the service area where a bare minimum access...

    Provided By Scientific Research

  • White Papers // Nov 2014

    Rerouting Schemes for Wireless ATM Networks

    In this paper, the wireless ATM rerouting procedures are analyzed and categorized, based on a standard network topology, derived from the wireless ATM reference model. A new operational concept for a mobile ATM network called Mobile Network Architecture based on Virtual Paths (MNAVP), in which the network nodes are connected...

    Provided By Scientific Research

  • White Papers // Nov 2014

    Ternary Zero Correlation Zone Sequence Sets for Asynchronous DS-CDMA

    In this paper, the authors propose a new class of ternary Zero Correlation Zone (ZCZ) sequence sets based on binary ZCZ sequence sets construction. It is shown that the proposed ternary ZCZ sequence sets can reach the upper bound on the ZCZ sequences. The performance of the proposed sequences set...

    Provided By Scientific Research

  • White Papers // Oct 2014

    Mapping AADL to Petri Net Tool-Sets Using PNML Framework

    Architecture Analysis and Design Language (AADL) has been utilized to specify and verify nonfunctional properties of Real-Time Embedded Systems (RTES) used in critical application systems. Examples of such critical application systems include medical devices, nuclear power plants, aerospace, financial, etc. Using AADL, an engineer is enabling to analyze the quality...

    Provided By Scientific Research

  • White Papers // Oct 2014

    Evaluation of XIS-Mobile, a Domain Specific Language for Mobile Application Development

    The great evolution of the mobile market during the last years caused some fragmentation of the mobile platforms namely through the existence of different programming languages and software development tools for each platform. This fact can be an obstacle and increases the development complexity and costs when the authors want...

    Provided By Scientific Research

  • White Papers // Oct 2014

    A New Approach for Database Fragmentation and Allocation to Improve the Distributed Database Management System Performance

    The efficiency and performance of Distributed DataBase Management Systems (DDBMS) is mainly measured by its proper design and by network communication cost between sites. Fragmentation and distribution of data are the major design issues of the DDBMS. In this paper, the authors propose new approach that integrates both fragmentation and...

    Provided By Scientific Research

  • White Papers // Oct 2014

    Lightweight Virtualization Cluster How to Overcome Cloud Vendor Lock-In

    To overcome vendor lock-in obstacles in public cloud computing, the capability to define transferable cloud-based services is crucial but has not yet been solved satisfactorily. This is especially true for small and medium sized enterprises being typically not able to operate a vast staff of cloud service and IT experts....

    Provided By Scientific Research

  • White Papers // Oct 2014

    An Investigation of Wideband Rectennas for Wireless Energy Harvesting

    In this paper, the authors focus on a wireless energy harvesting system using a rectifying antenna (rectenna). The proposed device consists of a wideband cross-dipole antenna, a microwave low-pass filter and a doubling rectifying circuit using Shottcky diodes as rectifying elements. Previously, a few of wideband rectennas have been investigated...

    Provided By Scientific Research

  • White Papers // Sep 2014

    The Challenge of Implementing Information Security Standards in Small and Medium e-Business Enterprises

    The dynamic nature of online systems requires companies to be proactive with thwarting information security threats, and to follow a systematic way for managing and evaluating the security of their online services. The existence of security standards is an important factor that helps organizations to evaluate and manage security by...

    Provided By Scientific Research

  • White Papers // Sep 2014

    Overlapping Community Detection in Dynamic Networks

    Due to the increasingly large size and changing nature of social networks, algorithms for dynamic networks have become an important part of modern day community detection. In this paper, the authors use a well-known static community detection algorithm and modify it to discover communities in dynamic networks. They have developed...

    Provided By Scientific Research

  • White Papers // Sep 2014

    Combining Geographic Information Systems for Transportation and Mixed Integer Linear Programming in Facility Location-Allocation Problems

    Location-allocation problems are generally complex problems by involving many variables and data. In this paper, the authors aimed to assess the solution quality for location-allocation problems from facilities generated by the software TransCAD, a Geographic Information System for Transportation (GIS-T). Such facilities were obtained after using two routines together: facility...

    Provided By Scientific Research

  • White Papers // Aug 2014

    Process Evaluation Based on Meeting Quality of Requirement Analysis Phase in Software Development Projects

    The authors propose a metric for meeting quality in software development. Meeting is important in order to share knowledge and experience among developers and stakeholders. Most frequent and important meetings are in software requirement analysis phase. System engineers and stakeholders discuss software requirements. However, meeting quality is various. Sometimes, stakeholders...

    Provided By Scientific Research

  • White Papers // Aug 2014

    Job Scheduling for Cloud Computing Using Neural Networks

    Cloud computing aims to maximize the benefit of distributed resources and aggregate them to achieve higher throughput to solve large scale computation problems. In this technology, the customers rent the resources and only pay per use. Job scheduling is one of the biggest issues in cloud computing. Scheduling of users'...

    Provided By Scientific Research

  • White Papers // Aug 2014

    Trust Evaluation Based on Node's Characteristics and Neighbouring Nodes' Recommendations for WSN

    In Wireless Sensor Networks (WSNs), the traditional cryptographic mechanisms for security require higher consumption of resources such as large memory, high processing speed and communication bandwidth. Also, they cannot detect faulty, malicious and selfish nodes which lead to the breakdown of network during packet routing. Hence, cryptographic security mechanisms are...

    Provided By Scientific Research

  • White Papers // Aug 2014

    An Improved Framework for Requirement Change Management in Global Software Development

    In this paper, an improved framework for Requirement Change Management in Global Software Development (RCM-GSD) has been presented. The objective is to manage the change in requirement specifically in global software development in an appropriate manner. The proposed framework RCM-GSD follows the required processes of RCM and reduces the concerns...

    Provided By Scientific Research

  • White Papers // Aug 2014

    The Load Balancing Network Service in Cloud Data Centre Environments Risk and Vulnerability Analysis

    Data centre is the consolidation point for provisioning multiple services that drive an enterprise business processes. A discrete event based process model of a reengineered data centre communication network comprising of four data centre LAN nodes with an inclusion of a virtualization server for creating virtual instances of resources and...

    Provided By Scientific Research

  • White Papers // Aug 2014

    Cloud Service Provisioning Based on Peer-to-Peer Network for Flexible Service Sharing and Discovery

    In this paper, the authors present an approach to establish efficient and scalable service provisioning in the cloud environment using P2P-based infrastructure for storing, sharing and discovering services. Unlike most other P2P-based approaches, it allows flexible search queries, since all of them are executed against internal database presenting at each...

    Provided By Scientific Research

  • White Papers // Aug 2014

    Review of the State of Art of Tunable Impulse Ultra-Wideband Technology as Integrator for Wireless Sensing and Identifications Short-Range Networks

    Impulse based ultra wideband technology has been the motivation of many recent researches with the potential of many applications to be researched. The uniqueness of the physical characteristics of the generated signal combined with the high flexibility of for different data rates at the physical layer design level have been...

    Provided By Scientific Research

  • White Papers // Aug 2014

    A Fast Heuristic Algorithm for Minimizing Congestion in the MPLS Networks

    In the Multiple Protocol Label-Switched (MPLS) networks, the commodities are transmitted by the Label-Switched Paths (LSPs). For the sake of reducing the total cost and strengthening the central management, the MPLS networks restrict the number of paths that a commodity can use, for maintaining the Quality of Service (QoS) of...

    Provided By Scientific Research

  • White Papers // Aug 2014

    Extracting SOA Candidate Software Services from an Organization's Object Oriented Models

    Class diagrams and use case models are system models that are used to analyze, design and model object oriented systems. In this era of agile computing, service-oriented architecture has become increasingly popular for achieving efficient and agile business solutions that can maintain changes demanded by the business world. This paper...

    Provided By Scientific Research

  • White Papers // Aug 2014

    Object-Component Development of Application and Systems Theory and Practice

    The Object-Componet Development (OCD) is a variety of the compositional programmings, where a role of elements of assembling is warmed by objects, interfaces and components. For developing application systems, the theory of design of subject domain based on Frege object theory is developed, together with the presentation of their functions...

    Provided By Scientific Research

  • White Papers // Aug 2014

    Evaluating Throughput and Delay in 3G and 4G Mobile Architectures

    All mobile carriers these days have provided 3G and 4G services to their customers. The evolution of cellular networks from 3G to 4G has improved several performance metrics of the data communications. The focus of this paper is to evaluate two of the most important performance metrics: throughput and delay....

    Provided By Scientific Research

  • White Papers // Aug 2014

    Cloud-Based Spatial Information Service Architecture within LBS

    Location Based Services (LBS) have become a popular technology to retrieve information about the surroundings of a mobile user which results in ubiquitous demand of spatial information service with diverse needs of different types of users. This paper is to reveal the potential of cloud-based spatial information service architecture that...

    Provided By Scientific Research

  • White Papers // Aug 2014

    Implications of SSO Solutions on Cloud Applications

    The trend in businesses is moving towards a single browser tool on portable devices to access cloud applications which would increase portability but at the same time would introduce security vulnerabilities. This resulted in the need for several layers of password authentications for cloud applications access. Single Sign-On (SSO) is...

    Provided By Scientific Research

  • White Papers // Aug 2014

    Stochastic Modeling and Power Control of Time-Varying Wireless Communication Networks

    Wireless networks are characterized by nodes mobility, which makes the propagation environment time-varying and subject to fading. As a consequence, the statistical characteristics of the received signal vary continuously giving rise to a Doppler Power Spectral Density (DPSD) that varies from one observation instant to the next. This paper is...

    Provided By Scientific Research

  • White Papers // Aug 2014

    Implementation and Evaluation of Transport Layer Protocol Executing Error Correction (ECP)

    Technologies for retransmission control and error correction are available for communications over the Internet to improve reliability of data. For communications that require the data reliability be ensured, TCP, which performs retransmission control, is often employed. However, for environments and services where response confirmation and retransmission are difficult, error correction...

    Provided By Scientific Research

  • White Papers // Aug 2014

    Adaptive Distributed Inter Frame Space for IEEE 802.11 MAC Protocol

    In this paper, an Adaptive Distributed Inter Frame Space (ADIFS) has been proposed for IEEE 802.11 Medium Access Control (MAC) protocol. The aim of this approach is to improve Quality of Services (QoS) for IEEE 802.11 MAC protocol in single-hop wireless network. The proposed approach is based on traffic type,...

    Provided By Scientific Research

  • White Papers // Jul 2014

    Office Information Systems: A Retrospective and a Call to Arms

    Office information systems are a field of computer science concerned with studying offices and developing technologies to support office workers. The field initiated in 1982 suffered a gradual demise by 2004. However, many of the themes and issues that motivated the discipline continue to exist today. Office workers continue to...

    Provided By Scientific Research

  • White Papers // Jul 2014

    Mobility Conscious Medium Access Control Scheme for Wireless Sensor Networks: A Conceptual Approach

    Mobility in Wireless Sensor Network (WSN) presents distinctive challenges in Medium Access Control (MAC) scheme. Numerous MAC protocols for sensor networks assume that sensor nodes are static and focus primarily on energy efficiency. This paper seeks to develop an improved mobility conscious medium access control scheme for wireless sensor networks...

    Provided By Scientific Research

  • White Papers // Jul 2014

    Laboratory Test Bench for Research Network and Cloud Computing

    At present moment, there is a great interest in development of information systems operating in cloud infrastructures. Generally, many of tasks remain unresolved such as tasks of optimization of large databases in a hybrid cloud infrastructure, Quality of Service (QoS) at different levels of cloud services, dynamic control of distribution...

    Provided By Scientific Research

  • White Papers // Jul 2014

    Performance Evaluation of Diversity Techniques in IDMA Scheme for Next Generation (4G) in Underwater Wireless Communication

    In this paper, the authors provide a review on the diversity techniques of IDMA (Interleave Division Multiple Access) technology in underwater wireless IDMA employs inter-leavers as the only means in order to distinguish the users. This paper provides a comprehensive study of diversity techniques in IDMA scheme to mitigate the...

    Provided By Scientific Research

  • White Papers // Jan 2012

    A Novel Statistical AOA Model Pertinent to Indoor Geolocation

    A novel statistical Angle-Of-Arrival (AOA) model for indoor geolocation applications is presented. The modeling approach focuses on the arrivals of the multipath components with respect to the Line-Of-Sight (LOS) path which is an important component especially when indoor geolocation applications are considered. The model is particularly important for indoor applications...

    Provided By Scientific Research

  • White Papers // Mar 2013

    An Ad-Hoc Low Cost Wireless Sensor Network for Smart Gas Metering

    The monitoring of power consumption has become of a great interest in recent years as well as the innovative technologies available to realize Wireless Sensor Networks (WSNs) have experienced a great growth. While smart metering technologies for electric energy are already established, as sensors power supply comes directly from power...

    Provided By Scientific Research

  • White Papers // Jul 2012

    Feedback Reliability Ratio of an Intrusion Detection System

    The behavior and nature of attacks and threats to computer network systems have been evolving rapidly with the advances in computer security technology. At the same time however, computer criminals and other malicious elements find ways and methods to thwart such protective measures and find techniques of penetrating such secure...

    Provided By Scientific Research

  • White Papers // Sep 2012

    Secure Messaging Implementation in OpenSC

    Smartcards are used for a rapidly increasing number of applications including electronic identity, driving licenses, physical access, health care, digital signature, and electronic payments. The use of a specific smartcard in a \"Closed\" environment generally provides a high level of security. In a closed environment no other smartcards are employed...

    Provided By Scientific Research

  • White Papers // Nov 2009

    Using the Power Control and Cooperative Communication for Energy Saving in Mobile Ad Hoc Networks

    In this paper, the authors investigate the energy saving problem in mobile ad hoc network and give out an improved variable-range transmission power control algorithm based on Minimum Spanning Tree (MST) algorithm. Using previous work by Gomez and Campbell, they show that in consider of node's mobility, the previous variable-range...

    Provided By Scientific Research

  • White Papers // Dec 2009

    On Possible A-Priori "Imprinting" of General Relativity Itself on the Performed Lense-Thirring Tests with LAGEOS Satellites

    The term "GravitoMagnetism" (GM) denotes those gravitational phenomena concerning orbiting test particles, precessing gyroscopes, moving clocks and atoms and propagating electromagnetic waves which in the framework of the Einstein's General Theory of Relativity (GTR), arise from non-static distributions of matter and energy. The impact of possible a-priori "Imprinting" effects of...

    Provided By Scientific Research

  • White Papers // Nov 2009

    Joint Power Control and Spectrum Allocation for Cognitive Radio with QoS Constraint

    Spectrum sharing with Quality of Service (QoS) requirement and power constraint on cognitive users is studied. The objective is to maximize the system throughput. This problem is modeled as a mixed integer nonlinear programming problem and then transformed to a continuous nonlinear programming problem through eliminating integer variables. The authors...

    Provided By Scientific Research

  • White Papers // Dec 2009

    ADPF Algorithm for Target Tracking in WSN

    Particle Filtering (PF) has been widely used in solving nonlinear/non Gaussian filtering problems. Inferring to the target tracking in a Wireless Sensor Network (WSN), Distributed PF (DPF) was used due to the limitation of nodes' computing capacity. In this paper, a novel filtering method - Asynchronous DPF (ADPF) for target...

    Provided By Scientific Research

  • White Papers // Dec 2009

    Designing Intrusion Detection System for Web Documents Using Neural Network

    Cryptographic systems are the most widely used techniques for information security. These systems however have their own pitfalls as they rely on prevention as their sole means of defense. That is why most of the organizations are attracted to the Intrusion Detection Systems. The Intrusion Detection Systems can be broadly...

    Provided By Scientific Research

  • White Papers // Nov 2009

    Proposed Model for SIP Security Enhancement

    In this paper, the authors aims to examine the various methods of protecting and securing a SIP architecture and also propose a new model to enhance SIP security in certain selected, specific and confidential environments as this proposed method cannot be generalized. Several security measures and techniques have already been...

    Provided By Scientific Research

  • White Papers // Dec 2009

    Live Video Services Using Fast Broadcasting Scheme

    The fast broadcasting scheme is one of the simplest schemes that provide video services. In this scheme, the video is divided into equal-sized segments depending upon the bandwidth allocated by the video server. If the video length is not known, then this scheme cannot be applied as the number of...

    Provided By Scientific Research

  • White Papers // Apr 2010

    Method of Carrier Acquisition and Track for HAPS

    Now the HAPS (High Altitude Platform Station) system has been concentrated on research because of important values in military and application. This paper emphasizes on the characteristics and schemes of carrier acquisition and track in high dynamic and high information-rate situation. Carrier acquisition model is analyzed theoretically and the design...

    Provided By Scientific Research

  • White Papers // Mar 2010

    PBB Efficiency Evaluation via Colored Petri Net Models

    Basic components of Provider Backbone Bridge (PBB) network models were constructed: PBB interior switch, PBB edge switch - with the dynamic filling up of address tables. The modeling of PBB networks was implemented. The results of simulation reveal definite imperfections of PBB technology caused by the broadcasting and sensitivity to...

    Provided By Scientific Research

  • White Papers // Apr 2010

    Multiobjective Duality in Variational Problems with Higher Order Derivatives

    Calculus of variation is a powerful technique for the solution of various problems appearing in dynamics of rigid bodies, optimization of orbits, theory of variations and many other fields. A multi-objective variational problem involving higher order derivatives is considered and optimality conditions for this problem are derived. A Mond-Weir type...

    Provided By Scientific Research

  • White Papers // May 2010

    Downlink MBER Transmit Beamforming Design Based on Uplink MBER Receive Beamforming for TDD-SDMA Induced MIMO Systems

    The downlink Minimum Bit Error Rate (MBER) transmit beamforming is directly designed based on the uplink MBER receive beamforming solution for Time Division Duplex (TDD) Space-Division Multiple-Access (SDMA) induced Multiple-Input Multiple-Output (MIMO) systems, where the Base Station (BS) is equipped with multiple antennas to support multiple single-antenna Mobile Terminals (MTs)....

    Provided By Scientific Research

  • White Papers // Nov 2011

    Investigation of Upstream Near-Far Problem in VDSL Systems via Complete Adaptive Iterative Water Filling Algorithm

    Crosstalk is the main degrading factor in Digital Subscriber Line (DSL) systems which are the result of electromagnetic coupling between two adjacent twisted pairs in a cable. Very-high bit-rate Digital Subscriber Line (VDSL) systems which use higher frequencies for data transmission than the other DSL systems, this effect is more...

    Provided By Scientific Research

  • White Papers // Sep 2011

    Conditional Diagnosability of the Locally Twisted Cubes under the PMC Model

    In a multiprocessor systems, it is important to local and to replace the faulty processors to maintain systempsilas high reliability. The fault diagnosis, which is the process of identifying fault processors in a multiprocessor system through testing. The conditional diagnosis requires that for each processor u in a system, all...

    Provided By Scientific Research

  • White Papers // Jan 2013

    QoS Bandwidth Estimation Scheme for Delay Sensitive Applications in MANETs

    For last few years, Mobile Ad-hoc NETworks (MANETs) have attracted a great interest in case of wireless and multimedia technologies. Infrastructure less nature of MANETs makes Quality of Service (QoS) provisioning very challenging and important research aspect. To find a QoS constrained route from source to destination, the authors should...

    Provided By Scientific Research

  • White Papers // Nov 2012

    Fast Converging Generalized Turbo Decoding Scheme with Enhanced Throughput for Mobile Radio

    The use of turbo codes enhances the data transmission efficiency and optimizes the performance of a communication system over wireless fading channels. In this paper, the authors present a brief overview of the various components of the turbo coding scheme, analyze the complexities of the most popular turbo decoding algorithms...

    Provided By Scientific Research

  • White Papers // Apr 2012

    Evaluation of Different Electronic Product Code Discovery Service Models

    Electronic Product Code Discovery Service (EPCDS) is an important concept in supply chain processes and in Internet of Things (IOT). It allows supply chain participants to search for their partners, communicate with them and share product information using standardized interfaces securely. Many researchers have been proposing different EPCDS models, considering...

    Provided By Scientific Research

  • White Papers // Apr 2012

    Automatic Service Discovery of IP Cameras Over Wide Area Networks with NAT Traversal

    A novel framework for remote service discovery and access of IP cameras with Network Address Translation (NAT) traversal is presented in this paper. The proposed protocol, termed STDP (Service Trader Discovery Protocol), is a hybrid combination of Zeroconf and SIP (Session Initial Protocol). The Zeroconf is adopted for the discovery...

    Provided By Scientific Research

  • White Papers // Jul 2012

    Semantic Model for Socially Aware Objects

    The Internet of Things (IoT) assumes that things interact and exchange information thus defining the future of pervasive computing environments. The integration between people and interconnected objects realizes a new physical and social space and opens new frontiers in context awareness and objects adaptation. In this paper, the authors investigate...

    Provided By Scientific Research

  • White Papers // Jul 2012

    A Space Unrestricted Multi-Robot Combat Internet of Things System

    Multi-robot cooperation problem has received increasing attention in the research community and has been extensively studied from different aspects. Space constrain problem is a major issue for building a multi-robot system. This constrain is a major hindrance for the efficient cooperation among robots in multi-robot applications. In this paper, the...

    Provided By Scientific Research

  • White Papers // Jul 2012

    The Influence of Memetic Primers in Online Comments in Video Game Blogs

    Through investigating a particular blog, several factors were found which have significant influence on reader actions. This paper uses the term "Memetic primers" for those styles that most often cause readers to take notice of a particular comment, remember information included in it and take action. The memetic primers were...

    Provided By Scientific Research

  • White Papers // Jul 2012

    P2P Model Based on Isolated Broadcast Domains

    Resource location is the most important issue for Peer-To-Peer (P2P) system and flooding is the fundamental mechanism for unstructured P2P systems. Redundant messages will exponential growth with flooding scope increasing which severely influences the scalability of the system. In this paper, a new P2P model based on isolated broadcast domains...

    Provided By Scientific Research

  • White Papers // Oct 2012

    Inkjet-Printed UHF RFID Tags on Renewable Materials

    Radio Frequency IDentification (RFID) provides great potential for different Internet of Things (IOT) applications. In the future, material choices in these IOT devices will have a huge effect on the environment and thus use of renewable materials is a growing trend. In this paper, passive Ultra High Frequency (UHF) RFID...

    Provided By Scientific Research

  • White Papers // Oct 2012

    Application of Full Text Search Engine Based on Lucene

    With the rapid development of Internet and with the explosive growth of web information, Internet users how to remove the impurities and retained the essence quickly and easily to gain the information they need in the vast ocean of information to become a hot research topic in this field. This...

    Provided By Scientific Research

  • White Papers // Oct 2012

    UMIS: A Service for User Model Interoperability

    In this paper, the authors describe UMIS, a service architecture that enables user adaptive applications to exchange User Model data on the Web. UMIS provides a set of facilities that allow applications to interoperate with minimum changes in their internal logics and knowledge representation. The goal is to support the...

    Provided By Scientific Research

  • White Papers // Oct 2009

    A Scalable Architecture Supporting QoS Guarantees Using Traffic Engineering and Policy Based Routing in the Internet

    The study of Quality of Service (QoS) has become of great importance since the Internet is used to support a wide variety of new services and applications with its legacy structure. Current Internet architecture is based on the Best Effort (BE) model, which attempts to deliver all traffic as soon...

    Provided By Scientific Research

  • White Papers // Oct 2009

    Performance Analysis of a Novel Dual-Frequency Multiple Access Relay Transmission Scheme

    In this paper, the authors present the performance analysis of a novel channel assignment scheme where two non-cooperative independent users simultaneously communicate with their destination through a single relay by using only two frequency channels. The analytic derivation of the probability of symbol error for two main relay techniques will...

    Provided By Scientific Research

  • White Papers // Oct 2009

    Research on the Active DDoS Filtering Algorithm Based on IP Flow

    Distributed Denial-of-Service (DDoS) attacks against public web servers are increasingly common. Countering DDoS attacks are becoming ever more challenging with the vast resources and techniques increasingly available to attackers. It is impossible for the victim servers to work on the individual level of on-going traffic flows. In this paper, the...

    Provided By Scientific Research

  • White Papers // Feb 2013

    A Novel Optical Control Plane for Switching an Electro-Optical Hybrid Node in Translucent WDM Optical Networks

    In a translucent network scenario, development of an Optical Control Plane (OCP) that is aware of the location and number of available regenerators and All-Optical Wavelength Converters (AOWCs) is of paramount importance. However, current Generalized MultiProtocol Label Switching (GMPLS) protocol suite does not consider the distribution of regenerator and AOWC...

    Provided By Scientific Research

  • White Papers // Feb 2013

    Fairness Assurance through TXOP Tuning in IEEE 802.11p Vehicle-to-Infrastructure Networks for Drive-Thru Internet Applications

    In this paper, the authors addresses an unfairness problem that exists among vehicles of distinct velocities in IEEE 802.11p based Vehicle-To-Infrastructure (V2I) networks used for drive-thru Internet applications. The standard IEEE 802.11p does not take into account, the residence time of vehicles within the coverage of each Road Side Unit...

    Provided By Scientific Research

  • White Papers // Feb 2012

    Buffer Occupancy of Double-Buffer Traffic Shaper in Real-Time Multimedia Applications across Slow-Speed Links

    In this paper, a double-buffer traffic shaper was investigated to adjust video frame rate inflow into the TCP sender-buffer of a multimedia application source across a slow-speed link. In order to guarantee QoS across a slow-speed link (i.e. < 1 MBPS), the double-buffer traffic shaper was developed. In this paper,...

    Provided By Scientific Research

  • White Papers // Feb 2013

    Multi-Source Spatial Data Distribution Model and System Implementation

    The multi-source spatial data distribution is based on WebGIS, and it is an important part of multi-source geographic information management system. A new multi-source spatial data distribution model is proposed on the basis of multi-source data storage model and by combining existing map distribution technology. The author developed a multi-source...

    Provided By Scientific Research

  • White Papers // Feb 2012

    Three-Dimensional Dynamic Based Borrowing Scheme for Wireless Cellular Networks

    Mobility metrics of wireless networks such as link availability, number of neighboring nodes, link duration, link state, and link stability make it difficult to provide a node with quality of services guarantee. In previous research on Quality of Service (QoS) for cellular networks especially for handling handoff connections, the design...

    Provided By Scientific Research

  • White Papers // Feb 2013

    Faster Method for Secure Transmission of Information with Sender Identification

    In this paper, the authors describes an algorithm for secure transmission of information via open communication channels based on the discrete logarithm problem. The proposed algorithm also provides sender identification (digital signature). It is twice as fast as the RSA algorithm and requires fifty per cent fewer exponentiations than the...

    Provided By Scientific Research

  • White Papers // Feb 2013

    A New Approach for Wireless Cellular Network Design

    Wise arrangement of antennas is critical in wireless cellular systems for both reduction of Co-Channel Interference (CCI) and increase the Quality of Service (QoS). In this paper, a novel architecture for antenna arrangement in CDMA wireless cellular systems is presented. In this architecture that the authors called Microzone, every cell...

    Provided By Scientific Research

  • White Papers // Feb 2013

    Efficient Spam Filtering System Based on Smart Cooperative Subjective and Objective Methods

    Most of the spam filtering techniques are based on objective methods such as the content filtering and DNS/reverse DNS checks. Recently, some cooperative subjective spam filtering techniques are proposed. Objective methods suffer from the false positive and false negative classification. Objective methods based on the content filtering are time consuming...

    Provided By Scientific Research

  • White Papers // Feb 2012

    An Efficient Priority Based Routing Technique That Maximizes the Lifetime and Coverage of Wireless Sensor Networks

    Recent development in sensor technologies makes Wireless Sensor Networks (WSN) very popular in the last few years. A limitation of most popular sensors is that sensor nodes have a limited battery capacity that leads to lower the lifetime of WSN. For that, it raises the need to develop energy efficient...

    Provided By Scientific Research