Scientific Research

Displaying 1-40 of 723 results

  • White Papers // Feb 2015

    High-Level Portable Programming Language for Optimized Memory Use of Network Processors

    Network Processors (NPs) are widely used for programmable and high-performance networks; however, the programs for NPs are less portable, the number of NP program developers is small, and the development cost is high. To solve these problems, this paper proposes an open, high-level, and portable programming language called \"Phonepl\", which...

    Provided By Scientific Research

  • White Papers // Feb 2015

    Dynamic Capacity Allocation in OTN Networks

    A dynamic Optical Transport Network (OTN) has the advantage of being able to adjust the connection capacity on demand in order to respond to variations on traffic patterns or to network failures. This feature has the potential to reduce operational costs and at the same time to optimize networks resources....

    Provided By Scientific Research

  • White Papers // Feb 2015

    Hard Decision-Based PWM for MIMO-OFDM Radar

    For the purpose of target localization, Multiple Input Multiple Output-Orthogonal Frequency Division Multiplexing (MIMO-OFDM) radar has been proposed. OFDM technique has been adopted in order to a simultaneous transmission and reception of a set of multiple narrowband orthogonal signals at orthogonal frequencies. Although multi-carrier systems such as OFDM support high...

    Provided By Scientific Research

  • White Papers // Feb 2015

    Improving Queuing System Throughput Using Distributed Mean Value Analysis to Control Network Congestion

    In this paper, the authors have used the Distributed Mean Value Analysis (DMVA) technique with the help of Random Observe Property (ROP) and palm probabilities to improve the network queuing system throughput. In such networks, where finding the complete communication path from source to destination, especially when these nodes are...

    Provided By Scientific Research

  • White Papers // Feb 2015

    Performance Study of Locality and Its Impact on Peer-to-Peer Systems

    Peer-To-Peer (P2P) is a distributed computing model which aims to share resources whose concept is not completely new. This paper presents the measurement study of locality-aware peer-to-peer solutions on Internet Autonomous System (AS) topology by reducing AS hop count and increase nearby source nodes in P2P applications. The authors evaluate...

    Provided By Scientific Research

  • White Papers // Feb 2015

    Control Access Point of Devices for Delay Reduction in WBAN Systems with CSMA/CA

    Due to the gathering of sickrooms and consultation rooms in almost all hospitals, the performance of wireless devices system is deteriorated by the increase of collision probability and waiting time. In order to improve the performance of wireless devices system, relay is added to control the access point and then...

    Provided By Scientific Research

  • White Papers // Jan 2015

    Visualization and Management Platform with Augmented Reality for Wireless Sensor Networks

    Recently a ubiquitous sensor network which collects the people environmental information gets increasingly popular, a visualization application is necessary for users to manage complicated wireless networks, however, these applications are developed individually for wireless communication standard or a type of wireless device. Therefore, users are forced to adopt and use...

    Provided By Scientific Research

  • White Papers // Dec 2014

    Multipath Grid-Based Enabled Geographic Routing for Wireless Sensor Networks

    In this paper, the authors propose an efficient disjoint multipath geographic routing algorithm for dense Wireless Sensor Networks (WSNs), called Multipath Grid-based Enabled Geographic Routing (MGEGR). The proposed algorithm relies on the construction of a 2-D logical grid in the geographical region of deployment. The objective of the proposed scheme...

    Provided By Scientific Research

  • White Papers // Nov 2014

    Handover Time Delay Reduction and Its Effects in Cloud Computing

    Mobile devices connected by cellular service require a constant connection to a base station. As these devices move from place to place, they need to disconnect from one base station and connect to another. The process of transferring between base stations found in neighboring geographic areas is referred to as...

    Provided By Scientific Research

  • White Papers // Nov 2014

    Development of Global Geographical Coverage Area for Terrestrial Networks Internetworked with Leo Satellite Network

    Network planning, analysis and design are an iterative process aimed at ensuring that a new network service meets the needs of subscribers and operators. During the initial start-up phase, coverage is the big issue and coverage in telecommunications systems is related to the service area where a bare minimum access...

    Provided By Scientific Research

  • White Papers // Nov 2014

    Rerouting Schemes for Wireless ATM Networks

    In this paper, the wireless ATM rerouting procedures are analyzed and categorized, based on a standard network topology, derived from the wireless ATM reference model. A new operational concept for a mobile ATM network called Mobile Network Architecture based on Virtual Paths (MNAVP), in which the network nodes are connected...

    Provided By Scientific Research

  • White Papers // Nov 2014

    Ternary Zero Correlation Zone Sequence Sets for Asynchronous DS-CDMA

    In this paper, the authors propose a new class of ternary Zero Correlation Zone (ZCZ) sequence sets based on binary ZCZ sequence sets construction. It is shown that the proposed ternary ZCZ sequence sets can reach the upper bound on the ZCZ sequences. The performance of the proposed sequences set...

    Provided By Scientific Research

  • White Papers // Oct 2014

    Mapping AADL to Petri Net Tool-Sets Using PNML Framework

    Architecture Analysis and Design Language (AADL) has been utilized to specify and verify nonfunctional properties of Real-Time Embedded Systems (RTES) used in critical application systems. Examples of such critical application systems include medical devices, nuclear power plants, aerospace, financial, etc. Using AADL, an engineer is enabling to analyze the quality...

    Provided By Scientific Research

  • White Papers // Oct 2014

    Evaluation of XIS-Mobile, a Domain Specific Language for Mobile Application Development

    The great evolution of the mobile market during the last years caused some fragmentation of the mobile platforms namely through the existence of different programming languages and software development tools for each platform. This fact can be an obstacle and increases the development complexity and costs when the authors want...

    Provided By Scientific Research

  • White Papers // Oct 2014

    A New Approach for Database Fragmentation and Allocation to Improve the Distributed Database Management System Performance

    The efficiency and performance of Distributed DataBase Management Systems (DDBMS) is mainly measured by its proper design and by network communication cost between sites. Fragmentation and distribution of data are the major design issues of the DDBMS. In this paper, the authors propose new approach that integrates both fragmentation and...

    Provided By Scientific Research

  • White Papers // Oct 2014

    Lightweight Virtualization Cluster How to Overcome Cloud Vendor Lock-In

    To overcome vendor lock-in obstacles in public cloud computing, the capability to define transferable cloud-based services is crucial but has not yet been solved satisfactorily. This is especially true for small and medium sized enterprises being typically not able to operate a vast staff of cloud service and IT experts....

    Provided By Scientific Research

  • White Papers // Oct 2014

    An Investigation of Wideband Rectennas for Wireless Energy Harvesting

    In this paper, the authors focus on a wireless energy harvesting system using a rectifying antenna (rectenna). The proposed device consists of a wideband cross-dipole antenna, a microwave low-pass filter and a doubling rectifying circuit using Shottcky diodes as rectifying elements. Previously, a few of wideband rectennas have been investigated...

    Provided By Scientific Research

  • White Papers // Sep 2014

    The Challenge of Implementing Information Security Standards in Small and Medium e-Business Enterprises

    The dynamic nature of online systems requires companies to be proactive with thwarting information security threats, and to follow a systematic way for managing and evaluating the security of their online services. The existence of security standards is an important factor that helps organizations to evaluate and manage security by...

    Provided By Scientific Research

  • White Papers // Sep 2014

    Overlapping Community Detection in Dynamic Networks

    Due to the increasingly large size and changing nature of social networks, algorithms for dynamic networks have become an important part of modern day community detection. In this paper, the authors use a well-known static community detection algorithm and modify it to discover communities in dynamic networks. They have developed...

    Provided By Scientific Research

  • White Papers // Sep 2014

    Combining Geographic Information Systems for Transportation and Mixed Integer Linear Programming in Facility Location-Allocation Problems

    Location-allocation problems are generally complex problems by involving many variables and data. In this paper, the authors aimed to assess the solution quality for location-allocation problems from facilities generated by the software TransCAD, a Geographic Information System for Transportation (GIS-T). Such facilities were obtained after using two routines together: facility...

    Provided By Scientific Research

  • White Papers // Aug 2014

    Process Evaluation Based on Meeting Quality of Requirement Analysis Phase in Software Development Projects

    The authors propose a metric for meeting quality in software development. Meeting is important in order to share knowledge and experience among developers and stakeholders. Most frequent and important meetings are in software requirement analysis phase. System engineers and stakeholders discuss software requirements. However, meeting quality is various. Sometimes, stakeholders...

    Provided By Scientific Research

  • White Papers // Aug 2014

    Job Scheduling for Cloud Computing Using Neural Networks

    Cloud computing aims to maximize the benefit of distributed resources and aggregate them to achieve higher throughput to solve large scale computation problems. In this technology, the customers rent the resources and only pay per use. Job scheduling is one of the biggest issues in cloud computing. Scheduling of users'...

    Provided By Scientific Research

  • White Papers // Aug 2014

    Trust Evaluation Based on Node's Characteristics and Neighbouring Nodes' Recommendations for WSN

    In Wireless Sensor Networks (WSNs), the traditional cryptographic mechanisms for security require higher consumption of resources such as large memory, high processing speed and communication bandwidth. Also, they cannot detect faulty, malicious and selfish nodes which lead to the breakdown of network during packet routing. Hence, cryptographic security mechanisms are...

    Provided By Scientific Research

  • White Papers // Aug 2014

    An Improved Framework for Requirement Change Management in Global Software Development

    In this paper, an improved framework for Requirement Change Management in Global Software Development (RCM-GSD) has been presented. The objective is to manage the change in requirement specifically in global software development in an appropriate manner. The proposed framework RCM-GSD follows the required processes of RCM and reduces the concerns...

    Provided By Scientific Research

  • White Papers // Aug 2014

    The Load Balancing Network Service in Cloud Data Centre Environments Risk and Vulnerability Analysis

    Data centre is the consolidation point for provisioning multiple services that drive an enterprise business processes. A discrete event based process model of a reengineered data centre communication network comprising of four data centre LAN nodes with an inclusion of a virtualization server for creating virtual instances of resources and...

    Provided By Scientific Research

  • White Papers // Aug 2014

    Cloud Service Provisioning Based on Peer-to-Peer Network for Flexible Service Sharing and Discovery

    In this paper, the authors present an approach to establish efficient and scalable service provisioning in the cloud environment using P2P-based infrastructure for storing, sharing and discovering services. Unlike most other P2P-based approaches, it allows flexible search queries, since all of them are executed against internal database presenting at each...

    Provided By Scientific Research

  • White Papers // Aug 2014

    Review of the State of Art of Tunable Impulse Ultra-Wideband Technology as Integrator for Wireless Sensing and Identifications Short-Range Networks

    Impulse based ultra wideband technology has been the motivation of many recent researches with the potential of many applications to be researched. The uniqueness of the physical characteristics of the generated signal combined with the high flexibility of for different data rates at the physical layer design level have been...

    Provided By Scientific Research

  • White Papers // Aug 2014

    A Fast Heuristic Algorithm for Minimizing Congestion in the MPLS Networks

    In the Multiple Protocol Label-Switched (MPLS) networks, the commodities are transmitted by the Label-Switched Paths (LSPs). For the sake of reducing the total cost and strengthening the central management, the MPLS networks restrict the number of paths that a commodity can use, for maintaining the Quality of Service (QoS) of...

    Provided By Scientific Research

  • White Papers // Aug 2014

    Stochastic Modeling and Power Control of Time-Varying Wireless Communication Networks

    Wireless networks are characterized by nodes mobility, which makes the propagation environment time-varying and subject to fading. As a consequence, the statistical characteristics of the received signal vary continuously giving rise to a Doppler Power Spectral Density (DPSD) that varies from one observation instant to the next. This paper is...

    Provided By Scientific Research

  • White Papers // Aug 2014

    Implementation and Evaluation of Transport Layer Protocol Executing Error Correction (ECP)

    Technologies for retransmission control and error correction are available for communications over the Internet to improve reliability of data. For communications that require the data reliability be ensured, TCP, which performs retransmission control, is often employed. However, for environments and services where response confirmation and retransmission are difficult, error correction...

    Provided By Scientific Research

  • White Papers // Aug 2014

    Adaptive Distributed Inter Frame Space for IEEE 802.11 MAC Protocol

    In this paper, an Adaptive Distributed Inter Frame Space (ADIFS) has been proposed for IEEE 802.11 Medium Access Control (MAC) protocol. The aim of this approach is to improve Quality of Services (QoS) for IEEE 802.11 MAC protocol in single-hop wireless network. The proposed approach is based on traffic type,...

    Provided By Scientific Research

  • White Papers // Aug 2014

    Extracting SOA Candidate Software Services from an Organization's Object Oriented Models

    Class diagrams and use case models are system models that are used to analyze, design and model object oriented systems. In this era of agile computing, service-oriented architecture has become increasingly popular for achieving efficient and agile business solutions that can maintain changes demanded by the business world. This paper...

    Provided By Scientific Research

  • White Papers // Aug 2014

    Object-Component Development of Application and Systems Theory and Practice

    The Object-Componet Development (OCD) is a variety of the compositional programmings, where a role of elements of assembling is warmed by objects, interfaces and components. For developing application systems, the theory of design of subject domain based on Frege object theory is developed, together with the presentation of their functions...

    Provided By Scientific Research

  • White Papers // Aug 2014

    Evaluating Throughput and Delay in 3G and 4G Mobile Architectures

    All mobile carriers these days have provided 3G and 4G services to their customers. The evolution of cellular networks from 3G to 4G has improved several performance metrics of the data communications. The focus of this paper is to evaluate two of the most important performance metrics: throughput and delay....

    Provided By Scientific Research

  • White Papers // Aug 2014

    Cloud-Based Spatial Information Service Architecture within LBS

    Location Based Services (LBS) have become a popular technology to retrieve information about the surroundings of a mobile user which results in ubiquitous demand of spatial information service with diverse needs of different types of users. This paper is to reveal the potential of cloud-based spatial information service architecture that...

    Provided By Scientific Research

  • White Papers // Aug 2014

    Implications of SSO Solutions on Cloud Applications

    The trend in businesses is moving towards a single browser tool on portable devices to access cloud applications which would increase portability but at the same time would introduce security vulnerabilities. This resulted in the need for several layers of password authentications for cloud applications access. Single Sign-On (SSO) is...

    Provided By Scientific Research

  • White Papers // Jul 2014

    Office Information Systems: A Retrospective and a Call to Arms

    Office information systems are a field of computer science concerned with studying offices and developing technologies to support office workers. The field initiated in 1982 suffered a gradual demise by 2004. However, many of the themes and issues that motivated the discipline continue to exist today. Office workers continue to...

    Provided By Scientific Research

  • White Papers // Jul 2014

    Mobility Conscious Medium Access Control Scheme for Wireless Sensor Networks: A Conceptual Approach

    Mobility in Wireless Sensor Network (WSN) presents distinctive challenges in Medium Access Control (MAC) scheme. Numerous MAC protocols for sensor networks assume that sensor nodes are static and focus primarily on energy efficiency. This paper seeks to develop an improved mobility conscious medium access control scheme for wireless sensor networks...

    Provided By Scientific Research

  • White Papers // Jul 2014

    Laboratory Test Bench for Research Network and Cloud Computing

    At present moment, there is a great interest in development of information systems operating in cloud infrastructures. Generally, many of tasks remain unresolved such as tasks of optimization of large databases in a hybrid cloud infrastructure, Quality of Service (QoS) at different levels of cloud services, dynamic control of distribution...

    Provided By Scientific Research

  • White Papers // Jul 2014

    Performance Evaluation of Diversity Techniques in IDMA Scheme for Next Generation (4G) in Underwater Wireless Communication

    In this paper, the authors provide a review on the diversity techniques of IDMA (Interleave Division Multiple Access) technology in underwater wireless IDMA employs inter-leavers as the only means in order to distinguish the users. This paper provides a comprehensive study of diversity techniques in IDMA scheme to mitigate the...

    Provided By Scientific Research

  • White Papers // Jan 2012

    A Novel Statistical AOA Model Pertinent to Indoor Geolocation

    A novel statistical Angle-Of-Arrival (AOA) model for indoor geolocation applications is presented. The modeling approach focuses on the arrivals of the multipath components with respect to the Line-Of-Sight (LOS) path which is an important component especially when indoor geolocation applications are considered. The model is particularly important for indoor applications...

    Provided By Scientific Research

  • White Papers // Mar 2013

    An Ad-Hoc Low Cost Wireless Sensor Network for Smart Gas Metering

    The monitoring of power consumption has become of a great interest in recent years as well as the innovative technologies available to realize Wireless Sensor Networks (WSNs) have experienced a great growth. While smart metering technologies for electric energy are already established, as sensors power supply comes directly from power...

    Provided By Scientific Research

  • White Papers // Jul 2012

    Feedback Reliability Ratio of an Intrusion Detection System

    The behavior and nature of attacks and threats to computer network systems have been evolving rapidly with the advances in computer security technology. At the same time however, computer criminals and other malicious elements find ways and methods to thwart such protective measures and find techniques of penetrating such secure...

    Provided By Scientific Research

  • White Papers // Sep 2012

    Secure Messaging Implementation in OpenSC

    Smartcards are used for a rapidly increasing number of applications including electronic identity, driving licenses, physical access, health care, digital signature, and electronic payments. The use of a specific smartcard in a \"Closed\" environment generally provides a high level of security. In a closed environment no other smartcards are employed...

    Provided By Scientific Research

  • White Papers // Sep 2009

    Joint Detection for Image Transmission Based on Schur Algorithm Over Wireless Sensor Network

    To achieve much efficient multimedia transmission over an error-prone wireless network, there are still some problem must to be solved, especially in energy limited wireless sensor network. In this paper, the authors propose a joint detection based on Schur algorithm for image wireless transmission over Wireless Sensor Network. To eliminate...

    Provided By Scientific Research

  • White Papers // Nov 2009

    Using the Power Control and Cooperative Communication for Energy Saving in Mobile Ad Hoc Networks

    In this paper, the authors investigate the energy saving problem in mobile ad hoc network and give out an improved variable-range transmission power control algorithm based on Minimum Spanning Tree (MST) algorithm. Using previous work by Gomez and Campbell, they show that in consider of node's mobility, the previous variable-range...

    Provided By Scientific Research

  • White Papers // Dec 2009

    On Possible A-Priori "Imprinting" of General Relativity Itself on the Performed Lense-Thirring Tests with LAGEOS Satellites

    The term "GravitoMagnetism" (GM) denotes those gravitational phenomena concerning orbiting test particles, precessing gyroscopes, moving clocks and atoms and propagating electromagnetic waves which in the framework of the Einstein's General Theory of Relativity (GTR), arise from non-static distributions of matter and energy. The impact of possible a-priori "Imprinting" effects of...

    Provided By Scientific Research

  • White Papers // Nov 2009

    Joint Power Control and Spectrum Allocation for Cognitive Radio with QoS Constraint

    Spectrum sharing with Quality of Service (QoS) requirement and power constraint on cognitive users is studied. The objective is to maximize the system throughput. This problem is modeled as a mixed integer nonlinear programming problem and then transformed to a continuous nonlinear programming problem through eliminating integer variables. The authors...

    Provided By Scientific Research

  • White Papers // Dec 2009

    ADPF Algorithm for Target Tracking in WSN

    Particle Filtering (PF) has been widely used in solving nonlinear/non Gaussian filtering problems. Inferring to the target tracking in a Wireless Sensor Network (WSN), Distributed PF (DPF) was used due to the limitation of nodes' computing capacity. In this paper, a novel filtering method - Asynchronous DPF (ADPF) for target...

    Provided By Scientific Research

  • White Papers // Dec 2009

    Designing Intrusion Detection System for Web Documents Using Neural Network

    Cryptographic systems are the most widely used techniques for information security. These systems however have their own pitfalls as they rely on prevention as their sole means of defense. That is why most of the organizations are attracted to the Intrusion Detection Systems. The Intrusion Detection Systems can be broadly...

    Provided By Scientific Research

  • White Papers // Nov 2009

    Proposed Model for SIP Security Enhancement

    In this paper, the authors aims to examine the various methods of protecting and securing a SIP architecture and also propose a new model to enhance SIP security in certain selected, specific and confidential environments as this proposed method cannot be generalized. Several security measures and techniques have already been...

    Provided By Scientific Research

  • White Papers // Dec 2009

    Live Video Services Using Fast Broadcasting Scheme

    The fast broadcasting scheme is one of the simplest schemes that provide video services. In this scheme, the video is divided into equal-sized segments depending upon the bandwidth allocated by the video server. If the video length is not known, then this scheme cannot be applied as the number of...

    Provided By Scientific Research

  • White Papers // Apr 2010

    Method of Carrier Acquisition and Track for HAPS

    Now the HAPS (High Altitude Platform Station) system has been concentrated on research because of important values in military and application. This paper emphasizes on the characteristics and schemes of carrier acquisition and track in high dynamic and high information-rate situation. Carrier acquisition model is analyzed theoretically and the design...

    Provided By Scientific Research

  • White Papers // Mar 2010

    PBB Efficiency Evaluation via Colored Petri Net Models

    Basic components of Provider Backbone Bridge (PBB) network models were constructed: PBB interior switch, PBB edge switch - with the dynamic filling up of address tables. The modeling of PBB networks was implemented. The results of simulation reveal definite imperfections of PBB technology caused by the broadcasting and sensitivity to...

    Provided By Scientific Research

  • White Papers // Apr 2010

    Multiobjective Duality in Variational Problems with Higher Order Derivatives

    Calculus of variation is a powerful technique for the solution of various problems appearing in dynamics of rigid bodies, optimization of orbits, theory of variations and many other fields. A multi-objective variational problem involving higher order derivatives is considered and optimality conditions for this problem are derived. A Mond-Weir type...

    Provided By Scientific Research

  • White Papers // May 2010

    Downlink MBER Transmit Beamforming Design Based on Uplink MBER Receive Beamforming for TDD-SDMA Induced MIMO Systems

    The downlink Minimum Bit Error Rate (MBER) transmit beamforming is directly designed based on the uplink MBER receive beamforming solution for Time Division Duplex (TDD) Space-Division Multiple-Access (SDMA) induced Multiple-Input Multiple-Output (MIMO) systems, where the Base Station (BS) is equipped with multiple antennas to support multiple single-antenna Mobile Terminals (MTs)....

    Provided By Scientific Research

  • White Papers // Nov 2011

    Investigation of Upstream Near-Far Problem in VDSL Systems via Complete Adaptive Iterative Water Filling Algorithm

    Crosstalk is the main degrading factor in Digital Subscriber Line (DSL) systems which are the result of electromagnetic coupling between two adjacent twisted pairs in a cable. Very-high bit-rate Digital Subscriber Line (VDSL) systems which use higher frequencies for data transmission than the other DSL systems, this effect is more...

    Provided By Scientific Research

  • White Papers // Sep 2011

    Conditional Diagnosability of the Locally Twisted Cubes under the PMC Model

    In a multiprocessor systems, it is important to local and to replace the faulty processors to maintain systempsilas high reliability. The fault diagnosis, which is the process of identifying fault processors in a multiprocessor system through testing. The conditional diagnosis requires that for each processor u in a system, all...

    Provided By Scientific Research

  • White Papers // Jan 2013

    QoS Bandwidth Estimation Scheme for Delay Sensitive Applications in MANETs

    For last few years, Mobile Ad-hoc NETworks (MANETs) have attracted a great interest in case of wireless and multimedia technologies. Infrastructure less nature of MANETs makes Quality of Service (QoS) provisioning very challenging and important research aspect. To find a QoS constrained route from source to destination, the authors should...

    Provided By Scientific Research

  • White Papers // Nov 2012

    Fast Converging Generalized Turbo Decoding Scheme with Enhanced Throughput for Mobile Radio

    The use of turbo codes enhances the data transmission efficiency and optimizes the performance of a communication system over wireless fading channels. In this paper, the authors present a brief overview of the various components of the turbo coding scheme, analyze the complexities of the most popular turbo decoding algorithms...

    Provided By Scientific Research

  • White Papers // Apr 2012

    Evaluation of Different Electronic Product Code Discovery Service Models

    Electronic Product Code Discovery Service (EPCDS) is an important concept in supply chain processes and in Internet of Things (IOT). It allows supply chain participants to search for their partners, communicate with them and share product information using standardized interfaces securely. Many researchers have been proposing different EPCDS models, considering...

    Provided By Scientific Research

  • White Papers // Apr 2012

    Automatic Service Discovery of IP Cameras Over Wide Area Networks with NAT Traversal

    A novel framework for remote service discovery and access of IP cameras with Network Address Translation (NAT) traversal is presented in this paper. The proposed protocol, termed STDP (Service Trader Discovery Protocol), is a hybrid combination of Zeroconf and SIP (Session Initial Protocol). The Zeroconf is adopted for the discovery...

    Provided By Scientific Research

  • White Papers // Jul 2012

    Semantic Model for Socially Aware Objects

    The Internet of Things (IoT) assumes that things interact and exchange information thus defining the future of pervasive computing environments. The integration between people and interconnected objects realizes a new physical and social space and opens new frontiers in context awareness and objects adaptation. In this paper, the authors investigate...

    Provided By Scientific Research

  • White Papers // Jul 2012

    A Space Unrestricted Multi-Robot Combat Internet of Things System

    Multi-robot cooperation problem has received increasing attention in the research community and has been extensively studied from different aspects. Space constrain problem is a major issue for building a multi-robot system. This constrain is a major hindrance for the efficient cooperation among robots in multi-robot applications. In this paper, the...

    Provided By Scientific Research

  • White Papers // Jul 2012

    The Influence of Memetic Primers in Online Comments in Video Game Blogs

    Through investigating a particular blog, several factors were found which have significant influence on reader actions. This paper uses the term "Memetic primers" for those styles that most often cause readers to take notice of a particular comment, remember information included in it and take action. The memetic primers were...

    Provided By Scientific Research

  • White Papers // Jul 2012

    P2P Model Based on Isolated Broadcast Domains

    Resource location is the most important issue for Peer-To-Peer (P2P) system and flooding is the fundamental mechanism for unstructured P2P systems. Redundant messages will exponential growth with flooding scope increasing which severely influences the scalability of the system. In this paper, a new P2P model based on isolated broadcast domains...

    Provided By Scientific Research

  • White Papers // Oct 2012

    Inkjet-Printed UHF RFID Tags on Renewable Materials

    Radio Frequency IDentification (RFID) provides great potential for different Internet of Things (IOT) applications. In the future, material choices in these IOT devices will have a huge effect on the environment and thus use of renewable materials is a growing trend. In this paper, passive Ultra High Frequency (UHF) RFID...

    Provided By Scientific Research

  • White Papers // Oct 2012

    Application of Full Text Search Engine Based on Lucene

    With the rapid development of Internet and with the explosive growth of web information, Internet users how to remove the impurities and retained the essence quickly and easily to gain the information they need in the vast ocean of information to become a hot research topic in this field. This...

    Provided By Scientific Research

  • White Papers // Oct 2012

    UMIS: A Service for User Model Interoperability

    In this paper, the authors describe UMIS, a service architecture that enables user adaptive applications to exchange User Model data on the Web. UMIS provides a set of facilities that allow applications to interoperate with minimum changes in their internal logics and knowledge representation. The goal is to support the...

    Provided By Scientific Research

  • White Papers // Sep 2009

    Efficient Bandwidth and Power Allocation Algorithms for Multiuser MIMO-OFDM Systems

    In this paper, the authors studies the problem of finding an effective subcarrier and power allocation strategy for downlink communication to multiple users in a MIMO-OFDM system with zero-forcing beamforming. The problem of minimizing total power consumption with constraint on transmission rate for users is formulated. The problem of joint...

    Provided By Scientific Research

  • White Papers // Sep 2009

    Beam Pattern Scanning (BPS) versus Space-Time Block Coding (STBC) and Space-Time Trellis Coding (STTC)

    In this paper, Beam Pattern Scanning (BPS), a transmit diversity technique, is compared with two well known transmit diversity techniques, Space-Time Block Coding (STBC) and Space-Time Trellis Coding (STTC). In BPS (also called Beam Pattern oScillation), controlled time varying weight vectors are applied to the antenna array elements mounted at...

    Provided By Scientific Research

  • White Papers // Sep 2009

    Rain Attenuation Impact on Performance of Satellite Ground Stations for Low Earth Orbiting (LEO) Satellites in Europe

    Low Earth Orbits (LEO) satellites are used for public communication and for scientific purposes. These satellites provide opportunities for investigations for which alternative techniques are either difficult or impossible to apply. Ground stations have to be established in order to communicate with such satellites. Usually these satellites communicate with ground...

    Provided By Scientific Research

  • White Papers // Sep 2009

    Detection, Identification and Tracking of Flying Objects in Three Dimensions Using Multistatic Radars

    Now-a-days, most of radars are monostatic in which one antenna or a pair of antennas positioned at the same point is used for transmitting and receiving electromagnetic waves. Multistatic radar systems can be used in many applications such as homeland security, anti-air defense, anti-missile defense, ship's navigation and traffic control...

    Provided By Scientific Research

  • White Papers // Sep 2009

    Investigation into the Performance of a MIMO System Equipped with ULA or UCA Antennas: BER, Capacity and Channel Estimation

    In this paper, the authors reports on investigations into the performance of a Multiple Input Multiple Output (MIMO) wireless communication system employing a Uniform Linear Array (ULA) at the transmitter and either a Uniform Linear Array (ULA) or a Uniform Circular Array (UCA) antenna at the receiver. The transmitter is...

    Provided By Scientific Research

  • White Papers // Sep 2009

    Two-Dwell Synchronization Techniques and Mimo Systems for Performance Improvements of 3G Mobile Communications

    In this paper, the authors considers the case of smart antennas and Multiple-Inputs Multiple-Outputs (MIMO) systems, suited for the radio access of 3G mobile communications, involving two-dimensional spatio-temporal signal processing and two-dwell procedures. The main novelty of their work is twofold: first, a two-dwell acquisition technique is here performed to...

    Provided By Scientific Research

  • White Papers // Sep 2009

    A Scalable Architecture for Network Traffic Monitoring and Analysis Using Free Open Source Software

    The lack of current network dynamics studies that evaluate the effects of new application and protocol deployment or long-term studies that observe the effect of incremental changes on the Internet, and the change in the overall stability of the Internet under various conditions and threats has made network monitoring challenging....

    Provided By Scientific Research

  • White Papers // Sep 2009

    A Trust Model Based on the Multinomial Subjective Logic for P2P Network

    In order to deal with the problems in P2P systems such as unreliability of the Service, security risk and attacks caused by malicious peers, a novel trust model MSL-TM based on the multinomial subjective logic is proposed. The model uses multinomial ratings and Dirichlet distribution to compute the expectation of...

    Provided By Scientific Research

  • White Papers // Sep 2009

    A Novel Packet Switch Node Architecture for Contention Resolution in Synchronous Optical Packet Switched Networks

    Packet contention is a key issue in Optical Packet Switch (OPS) networks and finds a viable solution by including optical buffering techniques incorporating Fiber Delay Lines (FDLs) in the switch architecture. The present paper proposes a novel switch architecture for packet contention resolution in synchronous OPS network employing the packet...

    Provided By Scientific Research

  • White Papers // Sep 2009

    TCP-R with EPDN: Handling out of Order Packets in Error Prone Satellite Networks

    In this paper, the authors have shown that packet reordering is common, especially in satellite networks where there are link level retransmissions and multipath routing. Moreover, traditional satellite networks exhibit high corruption rates causing packet losses. Reordering and corruption of packets decrease the TCP performance of a network, mainly because...

    Provided By Scientific Research

  • White Papers // Sep 2009

    A Network Intrusion Detection Model Based on Immune Multi-Agent

    A new network intrusion detection model based on immune multi-agent theory is established and the concept of multi-agents is advanced to realize the logical structure and running mechanism of immune multi-agent as well as multi-level and distributed detection mechanism against network intrusion, using the adaptability, diversity and memory properties of...

    Provided By Scientific Research