Scientific Research

Displaying 1-40 of 278 results

  • White Papers // Jan 2014

    Comparative Evaluation of Elliptic Curve Cryptography Based Homomorphic Encryption Schemes for a Novel Secure Multiparty Computation

    In this paper, the authors focus on elliptic curve cryptography based approach for Secure Multiparty Computation (SMC) problem. Widespread proliferation of data and the growth of communication technologies have enabled collaborative computations among parties in distributed scenario. Preserving privacy of data owned by parties is crucial in such scenarios. Classical...

    Provided By Scientific Research

  • White Papers // Jan 2014

    Investigating Approaches of Data Integrity Preservation for Secure Data Aggregation in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) typically use in-network processing to reduce the communication overhead. Due to the fusion of data items sourced at different nodes into a single one during in-network processing, the sanctity of the aggregated data needs to be ensured. Especially, the data integrity of the aggregated result is...

    Provided By Scientific Research

  • White Papers // Jun 2013

    OMT-G Modeling and Cloud Implementation of a Reference Database of Addressing in Morocco

    A reference database of addressing is an important resource for urban applications. The efficiency of an addressing sys-tem depends on both data quality and technical architecture. Data must respect a standard model that is flexible to meet different cases in the field. The technical architecture should be service oriented to...

    Provided By Scientific Research

  • White Papers // May 2013

    Framework of User Participation for the Interface Design in the SaaS Layer

    The development of software as a service represents a great advantage for the users of cloud computing, such as users of small, medium or large organizations. All these users possess different characteristics, which must be taken into account as reference for the interface development of a software product. This paper...

    Provided By Scientific Research

  • White Papers // Mar 2013

    An Ad-Hoc Low Cost Wireless Sensor Network for Smart Gas Metering

    The monitoring of power consumption has become of a great interest in recent years as well as the innovative technologies available to realize Wireless Sensor Networks (WSNs) have experienced a great growth. While smart metering technologies for electric energy are already established, as sensors power supply comes directly from power...

    Provided By Scientific Research

  • White Papers // Mar 2013

    Collaborative Design Theory and Related Key Technology Study Based on Cloud Computing

    Analyzes the main way of product distribution for collaborative design. According to the requirement of manufacturing collaborative design, apply cloud computing in manufacturing collaborative design and come up the concept of product collaborative cloud design. Study the product collaborative design theory based on cloud computing and the general key technology...

    Provided By Scientific Research

  • White Papers // Feb 2013

    A Novel Optical Control Plane for Switching an Electro-Optical Hybrid Node in Translucent WDM Optical Networks

    In a translucent network scenario, development of an Optical Control Plane (OCP) that is aware of the location and number of available regenerators and All-Optical Wavelength Converters (AOWCs) is of paramount importance. However, current Generalized MultiProtocol Label Switching (GMPLS) protocol suite does not consider the distribution of regenerator and AOWC...

    Provided By Scientific Research

  • White Papers // Feb 2013

    Numerical Methods for Solving Turbulent Flows by Using Parallel Technologies

    Parallel implementation of algorithm of numerical solution of Navier-Stokes equations for large eddy simulation (LES) of turbulence is presented in this research. The Dynamic Smagorinsky model is applied for sub-grid simulation of tur-bulence. The numerical algorithm was worked out using a scheme of splitting on physical parameters. At the first...

    Provided By Scientific Research

  • White Papers // Feb 2013

    Multi-Source Spatial Data Distribution Model and System Implementation

    The multi-source spatial data distribution is based on WebGIS, and it is an important part of multi-source geographic information management system. A new multi-source spatial data distribution model is proposed on the basis of multi-source data storage model and by combining existing map distribution technology. The author developed a multi-source...

    Provided By Scientific Research

  • White Papers // Feb 2013

    Faster Method for Secure Transmission of Information with Sender Identification

    In this paper, the authors describes an algorithm for secure transmission of information via open communication channels based on the discrete logarithm problem. The proposed algorithm also provides sender identification (digital signature). It is twice as fast as the RSA algorithm and requires fifty per cent fewer exponentiations than the...

    Provided By Scientific Research

  • White Papers // Feb 2013

    A New Approach for Wireless Cellular Network Design

    Wise arrangement of antennas is critical in wireless cellular systems for both reduction of Co-Channel Interference (CCI) and increase the Quality of Service (QoS). In this paper, a novel architecture for antenna arrangement in CDMA wireless cellular systems is presented. In this architecture that the authors called Microzone, every cell...

    Provided By Scientific Research

  • White Papers // Feb 2013

    Efficient Spam Filtering System Based on Smart Cooperative Subjective and Objective Methods

    Most of the spam filtering techniques are based on objective methods such as the content filtering and DNS/reverse DNS checks. Recently, some cooperative subjective spam filtering techniques are proposed. Objective methods suffer from the false positive and false negative classification. Objective methods based on the content filtering are time consuming...

    Provided By Scientific Research

  • White Papers // Feb 2013

    Traffic-Distributed Clustering Scheme for Cluster-Based WSNs with Various Non-Uniform Traffic Fluctuations

    In Wireless Sensor Networks (WSNs), it is essential to save energy consumption at Sensor Nodes (SNs). A clustering technique is one of the approaches to save energy consumption, where several neighboring SNs form a cluster and transmit the sensed data to their Cluster Head (CH), and then the CH sends...

    Provided By Scientific Research

  • White Papers // Feb 2013

    Collision Resolution MAC Protocols for Wireless Ad Hoc Networks

    In wireless ad hoc networks, nodes cooperatively form a network without any infrastructure such as a BS/AP (Base Station or Access Point). The widely-used contention-based MAC protocol, IEEE 802.11b, is inefficient in multi-hop networks due to the hidden and exposed terminal problems. The most popular schedule-based MAC protocol, TDMA (Time...

    Provided By Scientific Research

  • White Papers // Feb 2013

    Fairness Assurance through TXOP Tuning in IEEE 802.11p Vehicle-to-Infrastructure Networks for Drive-Thru Internet Applications

    In this paper, the authors addresses an unfairness problem that exists among vehicles of distinct velocities in IEEE 802.11p based Vehicle-To-Infrastructure (V2I) networks used for drive-thru Internet applications. The standard IEEE 802.11p does not take into account, the residence time of vehicles within the coverage of each Road Side Unit...

    Provided By Scientific Research

  • White Papers // Jan 2013

    QoS Bandwidth Estimation Scheme for Delay Sensitive Applications in MANETs

    For last few years, Mobile Ad-hoc NETworks (MANETs) have attracted a great interest in case of wireless and multimedia technologies. Infrastructure less nature of MANETs makes Quality of Service (QoS) provisioning very challenging and important research aspect. To find a QoS constrained route from source to destination, the authors should...

    Provided By Scientific Research

  • White Papers // Jan 2013

    Public-Key Cryptosystems with Secret Encryptor and Digital Signature

    In this paper, the authors describe and compares a variety of algorithms for secure transmission of information via open communication channels based on the discrete logarithm problem that do not require search for a generator (primitive element). Modifications that simplify the cryptosystem are proposed, and, as a result, accelerate its...

    Provided By Scientific Research

  • White Papers // Jan 2013

    Hybrid Real-Time and Preset Processing for Indoor Radio Geo-Location in Dense Multipath Environments

    The existence of various geo-location applications and their accuracy requirements enhance the necessities for suitable processing techniques to solve the indoor geo-location problems. Since, Impulse Radio Ultra-WideBand (IR-UWB) signals have very short duration pulses; they can provide very accurate ranging and geo-location capability in short range indoor radio propagation environments....

    Provided By Scientific Research

  • White Papers // Jan 2013

    Optimizing Operating Cost of an Intrusion Detection System

    Very often it so happens that the cost of operating an Intrusion Detection System (IDS) exceeds the cost of purchasing the IDS itself. In such cases, regular operation and maintenance of the system becomes expensive. Thus, it becomes essential to reduce the operating cost of the IDS without compromising on...

    Provided By Scientific Research

  • White Papers // Jan 2013

    A Novel Decoder Based on Parallel Genetic Algorithms for Linear Block Codes

    Genetic algorithms offer very good performances for solving large optimization problems, especially in the domain of error-correcting codes. However, they have a major drawback related to the time complexity and memory occupation when running on a uniprocessor computer. This paper proposes a parallel decoder for linear block codes, using Parallel...

    Provided By Scientific Research

  • White Papers // Dec 2012

    Simple GUI Wireless Controller of Quadcopter

    This paper presents the development of remotely operated Quadcopter system. The Quadcopter is controlled through a Graphical User Interface (GUI) where the communication between GUI and Quadcopter is constructed by using wireless communication system. The Quadcopter balancing condition is sensed by FY90 controller and IMU 5DOF sensor. For smooth landing,...

    Provided By Scientific Research

  • White Papers // Dec 2012

    A New Method for Sensing Cognitive Radio Network under Malicious Attacker

    Cognitive radio has been designed for solving the problem of spectrum scarcity by using the spectrum of primary users who don't use their spectrum on that time. For sensing the spectrum, collaborative spectrum sensing has been utilized because of robustness. In this paper, a new collaborative spectrum method is proposed...

    Provided By Scientific Research

  • White Papers // Dec 2012

    Performance Analysis of Hybrid MAC Protocol for Cognitive Radio Networks

    The rapid growth in demand for broadband wireless services coupled with the recent developmental work on wireless communications technology and the static allocation of the spectrum have led to the artificial scarcity of the radio spectrum. The traditional command and control model (Static allocation) of spectrum allocation policy allows for...

    Provided By Scientific Research

  • White Papers // Dec 2012

    Scalable Incremental Network Programming for Multihop Wireless Sensors

    The authors present a network programming mechanism that can flexibly and quickly re-task a large multi-hop network of wireless sensor nodes. Their mechanism allows each sensor node to be incrementally reprogrammed with heterogeneous images of native program code using Rsync block comparison algorithm, point-to-point routing with the BLIP IPv6 stack,...

    Provided By Scientific Research

  • White Papers // Dec 2012

    Research of Web Real-Time Communication Based on Web Socket

    Regarding the limitations of traditional web real-time communication solutions such as polling, long-polling, flash plug-in, propose that using new coming Web Socket technology in the web real-time communication field, introduce the features of web socket technology, analysis the difference between web socket protocol and HTTP protocol, offer an approach to...

    Provided By Scientific Research

  • White Papers // Dec 2012

    A Scalable and Robust DHT Protocol for Structured P2P Network

    Distributed Hash Tables (DHTs) were originated from the design of structured Peer-To-Peer (P2P) systems. A DHT provides a key-based lookup service similar to a hash table. In this paper, the authors present the detailed design of a new DHT protocol, Tambour. The novelty of the protocol is that it uses...

    Provided By Scientific Research

  • White Papers // Dec 2012

    Modeling Components and Services of LTE Mobile Communications System

    The latest wireless broadband network standard is LTE (Long Term Evolution) which is developed by 3GPP (3rd Generation Partnership Project). It will enable mobile devices such as smart phones, tablets and laptops to access Internet at a very high speed along with lots of multimedia services. There are many issues...

    Provided By Scientific Research

  • White Papers // Dec 2012

    Simulation & Performance Evaluation of QoS Routing Protocol for Adhoc Networks Using Directional Communication

    A wireless ad-hoc network is a self-organized wireless network without fixed or backbone infrastructure. All nodes have routing capability and use peer-to-peer packet transmission or forward packets to other node using multi hop communication. Now-a-days Mobile Ad-hoc NETworks are being used for different applications and traffics, so it require Quality...

    Provided By Scientific Research

  • White Papers // Dec 2012

    Cryptanalysis of the Double-Moduli Cryptosystem

    In this paper, the authors present a lattice attack done on a NTRU-like scheme introduced by Verkhovsky in. They show how, based on the relation between the public and private key, they can construct an attack which allows any passive adversary to decrypt the encrypted messages. They explain, step by...

    Provided By Scientific Research

  • White Papers // Dec 2012

    Towards Cloud to Device Push Messaging on Android: Technologies, Possibilities and Challenges

    In this paper, the authors look at different push messaging alternatives available for Android. Push messaging provides an important aspect of server to device communication and they specifically focus on the integration of cloud computing with mobile devices through the use of push-based technologies. By conducting a benchmarking test, they...

    Provided By Scientific Research

  • White Papers // Dec 2012

    Improvement of the Round Key Generation of AES

    In modern society, computer network has already been covered. In people's daily lives, the information technology industries have become ubiquitous. In the civil and military, commercial's security which is playing an important role is very prominent. The key generation algorithm of AES was introduced, the weaknesses of the key generation...

    Provided By Scientific Research

  • White Papers // Dec 2012

    Game Analysis of SME Financing

    The SMEs (Small and Medium-sized Enterprises) play important role in the economy. However, the financing problem is a big difficulty, which has plagued the SMEs' development. Information asymmetry is the main reason for the SMEs' gaining funds so hard. The information asymmetry between banks and enterprises is that banks do...

    Provided By Scientific Research

  • White Papers // Nov 2012

    Performance Evaluation of Adaptive Modulation Based MC-CDMA System

    In today's scenario mobile phones are not used only for messaging and talking, now the people use mobiles also to access Internet. For that the authors need higher data rates. Mobiles use wireless communication channel, which is very fast varying channel. To increase the data rate they have to utilize...

    Provided By Scientific Research

  • White Papers // Nov 2012

    Cognitive Radio Ad-Hoc Networks: Some New Results on Multi-Channel Hidden Terminal Problem

    Recently the Cognitive Radio (CR), in particular the CR Ad-Hoc Network (CRAHN) technology appears as a burgeoning area in wireless communication that enables utilization of limited network resources in more efficient and intelligent way; studies indicate that opportunistic utilization of the available radio frequency spectrum, without interfering the licensed Primary...

    Provided By Scientific Research

  • White Papers // Nov 2012

    Performance Evaluation of Traffic Engineering Signal Protocols in IPV6 MPLS Networks

    This paper studies the performance of Traffic Engineering (TE) signal protocols used for load balancing in Multi-Protocol Label Switching (MPLS) networks, namely; Constraint Based Routed Label Distribution Protocol LDP (CR-LDP) and Resource Reservation Protocol (RSVP). Furthermore, the performance of an MPLS network uses these TE signal protocols is compared to...

    Provided By Scientific Research

  • White Papers // Nov 2012

    Fast Converging Generalized Turbo Decoding Scheme with Enhanced Throughput for Mobile Radio

    The use of turbo codes enhances the data transmission efficiency and optimizes the performance of a communication system over wireless fading channels. In this paper, the authors present a brief overview of the various components of the turbo coding scheme, analyze the complexities of the most popular turbo decoding algorithms...

    Provided By Scientific Research

  • White Papers // Nov 2012

    Deterministic Algorithm Computing All Generators: Application in Cryptographic Systems Design

    Primitive elements play important roles in the Diffie-Hellman protocol for establishment of secret communication keys, in the design of the ElGamal cryptographic system and as generators of pseudo-random numbers. In general, a deterministic algorithm that searches for primitive elements is currently unknown. In information-hiding schemes, where a primitive element is...

    Provided By Scientific Research

  • White Papers // Nov 2012

    The Research on QoS Model Design in Mobile Ad Hoc Networks

    Wireless Ad Hoc Networks is a special kind of wireless communication network. With the great development of multimedia applications, how to provide QoS guarantee in the MAC layer is the hot topic in wireless ad hoc network (MANET). This paper designed a QoS model in MANET. The feasibility and reliability...

    Provided By Scientific Research

  • White Papers // Nov 2012

    Global Electronic Dominance with Spatial Grasp

    A high-level control technology will be revealed that can dynamically establish overwhelming dominance over distributed networked systems with embedded electronic devices and any communications between them. It is based on implanting of universal control modules (that may be concealed) into key system points which collectively interpret complex but compact mission...

    Provided By Scientific Research

  • White Papers // Nov 2012

    Employing Power Allocation to Enhance Zero Forcing Scheme Advantages over Multi-Antenna Multiple Relay Networks

    A Multi-Antenna Multiple Relay (MAMR) network is considered and a variation of two-hop zero-forcing amplify-forward relaying method is proposed. Deploying ZF method together with application of diagonal power allocation matrices at the relays, it is shown that the overall MAMR network is simplified to M independent Single Antenna Multiple Relay...

    Provided By Scientific Research

  • White Papers // Sep 2012

    Capacity Calculation and Sub-Optimal Power Allocation Scheme for OFDM-Based Systems

    For emerging cellular wireless systems, the mitigation of inter-cell interference is the key to achieve a high capacity and good user experience. This paper is devoted to the performance analysis of interference mitigation techniques for the downlink in an Orthogonal Frequency Division Multiple Access (OFDMA) network, with a focus on...

    Provided By Scientific Research

  • White Papers // Nov 2012

    Performance Evaluation of Traffic Engineering Signal Protocols in IPV6 MPLS Networks

    This paper studies the performance of Traffic Engineering (TE) signal protocols used for load balancing in Multi-Protocol Label Switching (MPLS) networks, namely; Constraint Based Routed Label Distribution Protocol LDP (CR-LDP) and Resource Reservation Protocol (RSVP). Furthermore, the performance of an MPLS network uses these TE signal protocols is compared to...

    Provided By Scientific Research

  • White Papers // Oct 2012

    A Novel Offline PLI-RWA and Hybrid Node Architecture for Zero Blocking and Time Delay Reduction in Translucent Optical WDM Networks

    In this paper, The authors contrive a model that underpins the offline Physical Layer Impairment-Routing and Wavelength Assignment (PLI-RWA) issue in translucent networks. The authors introduce an innovative PLI-Signal Quality Aware RWA (PLI-SQARWA) algorithm that guarantees zero blocking due to signal degradation and wavelength contention and aims at minimizing the...

    Provided By Scientific Research

  • White Papers // Oct 2012

    Design of Network Architecture Using Mobile Gateways for DLNA Devices in Wide Area Networks

    The prevalence of information appliances supporting DLNA (Digital Living Network Alliance) such as televisions, recorders, and mobile phones has made it possible to share digital contents (e.g. videos, music and pictures) among appliances connected to a local network. However, DLNA does not let the people share contents over different networks...

    Provided By Scientific Research

  • White Papers // Oct 2012

    Network Connectivity Probability of Linear Vehicular Ad Hoc Networks on Two-Way Street

    In this paper, the authors present an analytical model to determine the network connectivity probability of a linear vehicular Ad-hoc NETwork (VANET) formed by communication equipped vehicles on a two-way street scenario. They consider the highway to be consisting of two lanes with vehicles moving in both directions on these...

    Provided By Scientific Research

  • White Papers // Nov 2012

    Cognitive Radio Ad-Hoc Networks: Some New Results on Multi-Channel Hidden Terminal Problem

    Recently the Cognitive Radio (CR), in particular the CR Ad-Hoc Network (CRAHN) technology appears as a burgeoning area in wireless communication that enables utilization of limited network resources in more efficient and intelligent way; studies indicate that opportunistic utilization of the available radio frequency spectrum, without interfering the licensed Primary...

    Provided By Scientific Research

  • White Papers // Feb 2012

    Optimal Number of Relays in Cooperative Communication in Wireless Sensor Networks

    Wireless Sensor Networks (WSN) typically consist of resource constrained micro sensors that organize itself into multi-hop wireless network. Sensors collect data and send it directly, or through intermediate hops in cooperative communication system, to the collection point. These sensors are powered up by batteries, for which the replacement or recharging...

    Provided By Scientific Research

  • White Papers // Apr 2012

    Inter-Network Resource Sharing in IEEE 802.22 Networks

    IEEE 802.22 is the first worldwide standard for Cognitive Networks (CNs) that exploits unused spectrum of the television broadcast service. An IEEE 802.22 network is also called Wireless Regional Area Network (WRAN). An open issue in cognitive 802.22 networks is represented by the resource distribution among WRANs. In this paper...

    Provided By Scientific Research

  • White Papers // Apr 2012

    MAC-PHY Cross-Layer for High Channel Capacity of Multiple-Hop MIMO Relay System

    For the high end-to-end channel capacity, the amplify-and-forward scheme multiple-hop MIMO relays system is considered. The distance between each transceiver is optimized to prevent some relays from being the bottleneck and guarantee the high end-to-end channel capacity. However, in some cases, the location of relays can't be set at the...

    Provided By Scientific Research

  • White Papers // Jul 2011

    WiFi/WiMAX Seamless Convergence with Adaptive Vertical Handover for Continuity of Internet Access

    The next generation of the wireless networks will consist of several overlapping tiers. Provision of undisrupted communication to mobile users is a challenging task. Handover delay is one of the problematic issues that users are faced in the heterogeneous networks. However, in the case of both the WiMAX and the...

    Provided By Scientific Research

  • White Papers // Jul 2011

    Secured Electronic Voting Protocol Using Biometric Authentication

    In this paper, the authors proposes a new secure e-voting protocol. This new scheme does not require a special voting channel and communication can occur entirely over the existing Internet. This method integrates Internet convenience and cryptology. In the existing protocols either the tallier has to wait for the decryption...

    Provided By Scientific Research

  • White Papers // Jul 2011

    Internet of Things: Services and Applications Categorization

    In this paper, the authors attempt to categorize the services provided by the Internet of Things (IoT) in order to help application developers build upon a base service. First they introduce the four main categories of services and then follow by providing a number of examples of each of the...

    Provided By Scientific Research

  • White Papers // Apr 2011

    Integrating RFIDs and Smart Objects into a Unified Internet of Things Architecture

    The term Internet of Things refers to the networked interconnection of objects of diverse nature, such as electronic devices, sensors, but also physical objects and beings as well as virtual data and environments. Although the basic concept of the Internet of Things sounds simple, its application is difficult and, so...

    Provided By Scientific Research

  • White Papers // Apr 2011

    Developing E-society Cognitive Platform Based on the Social Agent E-learning Goal Oriented

    In this paper, the authors introduce the e-society cognitive approach based on the social agent. The social agent is e-learning oriented. The e-society cognitive platform may consider different fields like e-learning, e-health, e-commerce, e-medicine and e-government. In this paper, they will introduce the e-society platform. The e-society platform supports the...

    Provided By Scientific Research

  • White Papers // Oct 2011

    Advances in Intrusion Detection System for WLAN

    A wireless network is not as secure as compare the wired network because the data is transferred on air so any intruder can use hacking techniques to access that data. Indeed, it is difficult to protect the data and provide the user a secure information system for lifetime. An intrusions...

    Provided By Scientific Research

  • White Papers // Jan 2012

    Cyber-Physical-Social Based Security Architecture for Future Internet of Things

    As the Internet of Things (IoT) is emerging as an attractive paradigm, a typical IoT architecture that U2IoT (Unit IoT and Ubiquitous IoT) model has been presented for the future IoT. Based on the U2IoT model, this paper proposes a cyber-physical-social based security architecture (IPM) to deal with Information, Physical...

    Provided By Scientific Research

  • White Papers // Jan 2012

    An Architecture for "Web of Things" Using SOCKS Protocol Based IPv6/IPv4 Gatewaying for Heterogeneous Communication

    Web of Things evolved from "Internet of Things". Lot of research has been done in designing architecture for "Web of Things". Two main architectures are smart gateway based architecture and embedded web server based architecture. These architectures address some of the basic and essential issues relating to Service Oriented Architecture...

    Provided By Scientific Research

  • White Papers // Apr 2012

    Design and Implementation of a Low-Power Active RFID for Container Tracking at 2.4 GHz Frequency

    In this paper, a new active RFID system at 2.45 GHz based on the low-power system-on-chip CC2530 RF transceiver is designed and implemented. Only by using of an integrated multi-channel fast chip, both the MCU and RF operations are done which makes the RFID more reliable and reduces the complexity...

    Provided By Scientific Research

  • White Papers // Apr 2012

    Evaluation of Different Electronic Product Code Discovery Service Models

    Electronic Product Code Discovery Service (EPCDS) is an important concept in supply chain processes and in Internet of Things (IOT). It allows supply chain participants to search for their partners, communicate with them and share product information using standardized interfaces securely. Many researchers have been proposing different EPCDS models, considering...

    Provided By Scientific Research

  • White Papers // Apr 2012

    Automatic Service Discovery of IP Cameras Over Wide Area Networks with NAT Traversal

    A novel framework for remote service discovery and access of IP cameras with Network Address Translation (NAT) traversal is presented in this paper. The proposed protocol, termed STDP (Service Trader Discovery Protocol), is a hybrid combination of Zeroconf and SIP (Session Initial Protocol). The Zeroconf is adopted for the discovery...

    Provided By Scientific Research

  • White Papers // Jul 2012

    Semantic Model for Socially Aware Objects

    The Internet of Things (IoT) assumes that things interact and exchange information thus defining the future of pervasive computing environments. The integration between people and interconnected objects realizes a new physical and social space and opens new frontiers in context awareness and objects adaptation. In this paper, the authors investigate...

    Provided By Scientific Research

  • White Papers // Jul 2012

    A Space Unrestricted Multi-Robot Combat Internet of Things System

    Multi-robot cooperation problem has received increasing attention in the research community and has been extensively studied from different aspects. Space constrain problem is a major issue for building a multi-robot system. This constrain is a major hindrance for the efficient cooperation among robots in multi-robot applications. In this paper, the...

    Provided By Scientific Research

  • White Papers // Jul 2012

    The Influence of Memetic Primers in Online Comments in Video Game Blogs

    Through investigating a particular blog, several factors were found which have significant influence on reader actions. This paper uses the term "Memetic primers" for those styles that most often cause readers to take notice of a particular comment, remember information included in it and take action. The memetic primers were...

    Provided By Scientific Research

  • White Papers // Jul 2012

    P2P Model Based on Isolated Broadcast Domains

    Resource location is the most important issue for Peer-To-Peer (P2P) system and flooding is the fundamental mechanism for unstructured P2P systems. Redundant messages will exponential growth with flooding scope increasing which severely influences the scalability of the system. In this paper, a new P2P model based on isolated broadcast domains...

    Provided By Scientific Research

  • White Papers // Oct 2012

    Inkjet-Printed UHF RFID Tags on Renewable Materials

    Radio Frequency IDentification (RFID) provides great potential for different Internet of Things (IOT) applications. In the future, material choices in these IOT devices will have a huge effect on the environment and thus use of renewable materials is a growing trend. In this paper, passive Ultra High Frequency (UHF) RFID...

    Provided By Scientific Research

  • White Papers // Oct 2012

    Application of Full Text Search Engine Based on Lucene

    With the rapid development of Internet and with the explosive growth of web information, Internet users how to remove the impurities and retained the essence quickly and easily to gain the information they need in the vast ocean of information to become a hot research topic in this field. This...

    Provided By Scientific Research

  • White Papers // Oct 2012

    UMIS: A Service for User Model Interoperability

    In this paper, the authors describe UMIS, a service architecture that enables user adaptive applications to exchange User Model data on the Web. UMIS provides a set of facilities that allow applications to interoperate with minimum changes in their internal logics and knowledge representation. The goal is to support the...

    Provided By Scientific Research

  • White Papers // Aug 2009

    The Study and Application of the IoT in Pet Systems

    The interaction between human and physical devices and devices in the real world is gaining more attention and requires a natural and intuitive methodology to employ. According to this idea and living well, life has been a growing demand. Thus, how to raise pets in an easy way has been...

    Provided By Scientific Research

  • White Papers // Aug 2009

    The Comparisonal Analysis of the Concept of Rectangular and Hexagonal Pilot in OFDM

    Channel estimation in coherent OFDM by inserting pilot-symbols into two-dimensional time-frequency lattice is a promising candidate for improving channel transmission capacity in future wireless communication systems. This paper proposes a new Cartesian mathematical concept of the Hexagonal Pilot Pattern, Hexagonal Pilot with Virtual and Rectangular Pilot Pattern. The main focus...

    Provided By Scientific Research

  • White Papers // Aug 2009

    Principle of Link Evaluation

    Link Evaluation (LE) is proposed in system evaluation to reduce complexity. It is important to practical systems also for link adaptation. Current algorithms for link evaluation are developed by simulation method, lacking of theoretical description. Although they provide some good accuracy for some scenarios, all of them are not universal....

    Provided By Scientific Research

  • White Papers // Aug 2009

    Comparison and Design of Decoder in B3G Mobile Communication System

    Turbo code has been shown to have ability to achieve performance that is close to Shannon limit. It has been adopted by various commercial communication systems. Both Universal Mobile Telecommunications System (UMTS) TDD and FDD have also employed turbo code as the error correction coding scheme. It out-performs convolutional code...

    Provided By Scientific Research

  • White Papers // Aug 2009

    Approximate Analysis of Power Offset Over Spatially Correlated MIMO Channels

    Power offset is zero-order term in the capacity versus signal-to-noise ratio curve. In this paper, approximate analysis of power offset is presented to describe MIMO system with uniform linear antenna arrays of fixed length. It is assumed that the number of receive antenna is larger than that of transmit antenna....

    Provided By Scientific Research

  • White Papers // Aug 2009

    A Cross-Layer Scheme for Handover in 802.16e Network with F-HMIPv6 Mobility

    IEEE802.16e is the major global cellular wireless standard that enables low-cost mobile Internet application. However, existing handover process system still has latency affects time-sensitive applications. In this paper, the handover procedures of 802.16e and Fast Handover for Hierarchical MIPv6 (F-HMIPv6) are reconstructed to achieve a better transmission performance. The concept...

    Provided By Scientific Research

  • White Papers // Aug 2009

    A Study of Multi-Node and Dual-Hop Collaborative Communication Performance Based on Harmonic Mean Method

    MIMO technique has been regarded as the essential technique for beyond 3G mobile cellular networks. The Benefits of MIMO system have been extensively studied by researchers in both academic and industry. It successfully meets the rapidly growing demand for high rate, voice and especially for multimedia services. Closed form expressions...

    Provided By Scientific Research

  • White Papers // Aug 2009

    A Novel Scheme with Adaptive Sampling for Better Spectrum Utilization in Cognitive Radios

    In Cognitive Radio (CR) networks, cognitive users need continuously monitor spectrum to decrease or avoid interference to primary users, yet attain a reasonable throughput. In this paper, the authors exploit a scheme to dynamically change the detection time duration to gain maximum throughput. Meanwhile the average detection time is kept...

    Provided By Scientific Research

  • White Papers // Oct 2012

    Detection the Spectrum Holes in the Primary Bandwidth of the Cognitive Radio Systems in Presence Noise and Attenuation

    Cognitive Radio (CR) and Dynamic Spectrum Access (DSA) represent two complementary developments that will re-fashion the world of wireless communication. In order to investigate the roles of knowledge representation and reasoning technologies in this domain, the authors have developed an experimental cognitive radio simulation environment. That is, a conventional radio...

    Provided By Scientific Research

  • White Papers // Oct 2012

    Random Access Algorithms in Packet Networks- A Review of Three Research Decades

    In this paper, the authors are focusing on the "Random-access" approach, for the accessing of a single, errorless, slotted channel, by independent, identical, packet transmitting, bursty users. They present a coherent and systematic review of Random Access Algorithms for packet networks, as developed over three and a half decades. They...

    Provided By Scientific Research

  • White Papers // Oct 2012

    A Cellular-Assisted Efficient Handover Algorithm for Wireless Sensor Networks

    Heterogeneous network convergence and handover have become very hot in recent years. This paper proposed an efficient handover scheme in Multi-PAN Wireless Sensor Networks (WSNs). A number of edge nodes are set at the edge of each Personal Area Networks (PANs). A User Equipment (UE), which has WSN and cellular...

    Provided By Scientific Research

  • White Papers // Sep 2012

    Unified Mogramming with Var-Oriented Modeling and Exertion-Oriented Programming Languages

    The Service ORiented Computing EnviRonment (SORCER) targets service abstractions for transdisciplinary complexity with support for heterogeneous Service-Oriented (SO) computing. SORCER's models are expressed in a top-down Var-oriented Modeling Language (VML) unified with programs in a bottoms-up Exertion-Oriented Language (EOL). In this paper, the introduction to mogramming (modeling and programing), which...

    Provided By Scientific Research

  • White Papers // Sep 2012

    Network Intrusion Detection and Visualization Using Aggregations in a Cyber Security Data Warehouse

    The challenge of achieving situational understanding is a limiting factor in effective, timely and adaptive cyber security analysis. Anomaly detection fills a critical role in network assessment and trend analysis, both of which underlie the establishment of comprehensive situational understanding. To that end, the authors propose a cyber security data...

    Provided By Scientific Research