Scientific Research

Displaying 1-40 of 278 results

  • White Papers // Jan 2014

    Comparative Evaluation of Elliptic Curve Cryptography Based Homomorphic Encryption Schemes for a Novel Secure Multiparty Computation

    In this paper, the authors focus on elliptic curve cryptography based approach for Secure Multiparty Computation (SMC) problem. Widespread proliferation of data and the growth of communication technologies have enabled collaborative computations among parties in distributed scenario. Preserving privacy of data owned by parties is crucial in such scenarios. Classical...

    Provided By Scientific Research

  • White Papers // Jan 2014

    Investigating Approaches of Data Integrity Preservation for Secure Data Aggregation in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) typically use in-network processing to reduce the communication overhead. Due to the fusion of data items sourced at different nodes into a single one during in-network processing, the sanctity of the aggregated data needs to be ensured. Especially, the data integrity of the aggregated result is...

    Provided By Scientific Research

  • White Papers // Jun 2013

    OMT-G Modeling and Cloud Implementation of a Reference Database of Addressing in Morocco

    A reference database of addressing is an important resource for urban applications. The efficiency of an addressing sys-tem depends on both data quality and technical architecture. Data must respect a standard model that is flexible to meet different cases in the field. The technical architecture should be service oriented to...

    Provided By Scientific Research

  • White Papers // May 2013

    Framework of User Participation for the Interface Design in the SaaS Layer

    The development of software as a service represents a great advantage for the users of cloud computing, such as users of small, medium or large organizations. All these users possess different characteristics, which must be taken into account as reference for the interface development of a software product. This paper...

    Provided By Scientific Research

  • White Papers // Mar 2013

    Collaborative Design Theory and Related Key Technology Study Based on Cloud Computing

    Analyzes the main way of product distribution for collaborative design. According to the requirement of manufacturing collaborative design, apply cloud computing in manufacturing collaborative design and come up the concept of product collaborative cloud design. Study the product collaborative design theory based on cloud computing and the general key technology...

    Provided By Scientific Research

  • White Papers // Mar 2013

    An Ad-Hoc Low Cost Wireless Sensor Network for Smart Gas Metering

    The monitoring of power consumption has become of a great interest in recent years as well as the innovative technologies available to realize Wireless Sensor Networks (WSNs) have experienced a great growth. While smart metering technologies for electric energy are already established, as sensors power supply comes directly from power...

    Provided By Scientific Research

  • White Papers // Feb 2013

    A Novel Optical Control Plane for Switching an Electro-Optical Hybrid Node in Translucent WDM Optical Networks

    In a translucent network scenario, development of an Optical Control Plane (OCP) that is aware of the location and number of available regenerators and All-Optical Wavelength Converters (AOWCs) is of paramount importance. However, current Generalized MultiProtocol Label Switching (GMPLS) protocol suite does not consider the distribution of regenerator and AOWC...

    Provided By Scientific Research

  • White Papers // Feb 2013

    Numerical Methods for Solving Turbulent Flows by Using Parallel Technologies

    Parallel implementation of algorithm of numerical solution of Navier-Stokes equations for large eddy simulation (LES) of turbulence is presented in this research. The Dynamic Smagorinsky model is applied for sub-grid simulation of tur-bulence. The numerical algorithm was worked out using a scheme of splitting on physical parameters. At the first...

    Provided By Scientific Research

  • White Papers // Feb 2013

    Collision Resolution MAC Protocols for Wireless Ad Hoc Networks

    In wireless ad hoc networks, nodes cooperatively form a network without any infrastructure such as a BS/AP (Base Station or Access Point). The widely-used contention-based MAC protocol, IEEE 802.11b, is inefficient in multi-hop networks due to the hidden and exposed terminal problems. The most popular schedule-based MAC protocol, TDMA (Time...

    Provided By Scientific Research

  • White Papers // Feb 2013

    Fairness Assurance through TXOP Tuning in IEEE 802.11p Vehicle-to-Infrastructure Networks for Drive-Thru Internet Applications

    In this paper, the authors addresses an unfairness problem that exists among vehicles of distinct velocities in IEEE 802.11p based Vehicle-To-Infrastructure (V2I) networks used for drive-thru Internet applications. The standard IEEE 802.11p does not take into account, the residence time of vehicles within the coverage of each Road Side Unit...

    Provided By Scientific Research

  • White Papers // Feb 2013

    Multi-Source Spatial Data Distribution Model and System Implementation

    The multi-source spatial data distribution is based on WebGIS, and it is an important part of multi-source geographic information management system. A new multi-source spatial data distribution model is proposed on the basis of multi-source data storage model and by combining existing map distribution technology. The author developed a multi-source...

    Provided By Scientific Research

  • White Papers // Feb 2013

    Faster Method for Secure Transmission of Information with Sender Identification

    In this paper, the authors describes an algorithm for secure transmission of information via open communication channels based on the discrete logarithm problem. The proposed algorithm also provides sender identification (digital signature). It is twice as fast as the RSA algorithm and requires fifty per cent fewer exponentiations than the...

    Provided By Scientific Research

  • White Papers // Feb 2013

    A New Approach for Wireless Cellular Network Design

    Wise arrangement of antennas is critical in wireless cellular systems for both reduction of Co-Channel Interference (CCI) and increase the Quality of Service (QoS). In this paper, a novel architecture for antenna arrangement in CDMA wireless cellular systems is presented. In this architecture that the authors called Microzone, every cell...

    Provided By Scientific Research

  • White Papers // Feb 2013

    Efficient Spam Filtering System Based on Smart Cooperative Subjective and Objective Methods

    Most of the spam filtering techniques are based on objective methods such as the content filtering and DNS/reverse DNS checks. Recently, some cooperative subjective spam filtering techniques are proposed. Objective methods suffer from the false positive and false negative classification. Objective methods based on the content filtering are time consuming...

    Provided By Scientific Research

  • White Papers // Feb 2013

    Traffic-Distributed Clustering Scheme for Cluster-Based WSNs with Various Non-Uniform Traffic Fluctuations

    In Wireless Sensor Networks (WSNs), it is essential to save energy consumption at Sensor Nodes (SNs). A clustering technique is one of the approaches to save energy consumption, where several neighboring SNs form a cluster and transmit the sensed data to their Cluster Head (CH), and then the CH sends...

    Provided By Scientific Research

  • White Papers // Jan 2013

    QoS Bandwidth Estimation Scheme for Delay Sensitive Applications in MANETs

    For last few years, Mobile Ad-hoc NETworks (MANETs) have attracted a great interest in case of wireless and multimedia technologies. Infrastructure less nature of MANETs makes Quality of Service (QoS) provisioning very challenging and important research aspect. To find a QoS constrained route from source to destination, the authors should...

    Provided By Scientific Research

  • White Papers // Jan 2013

    Public-Key Cryptosystems with Secret Encryptor and Digital Signature

    In this paper, the authors describe and compares a variety of algorithms for secure transmission of information via open communication channels based on the discrete logarithm problem that do not require search for a generator (primitive element). Modifications that simplify the cryptosystem are proposed, and, as a result, accelerate its...

    Provided By Scientific Research

  • White Papers // Jan 2013

    Hybrid Real-Time and Preset Processing for Indoor Radio Geo-Location in Dense Multipath Environments

    The existence of various geo-location applications and their accuracy requirements enhance the necessities for suitable processing techniques to solve the indoor geo-location problems. Since, Impulse Radio Ultra-WideBand (IR-UWB) signals have very short duration pulses; they can provide very accurate ranging and geo-location capability in short range indoor radio propagation environments....

    Provided By Scientific Research

  • White Papers // Jan 2013

    Optimizing Operating Cost of an Intrusion Detection System

    Very often it so happens that the cost of operating an Intrusion Detection System (IDS) exceeds the cost of purchasing the IDS itself. In such cases, regular operation and maintenance of the system becomes expensive. Thus, it becomes essential to reduce the operating cost of the IDS without compromising on...

    Provided By Scientific Research

  • White Papers // Jan 2013

    A Novel Decoder Based on Parallel Genetic Algorithms for Linear Block Codes

    Genetic algorithms offer very good performances for solving large optimization problems, especially in the domain of error-correcting codes. However, they have a major drawback related to the time complexity and memory occupation when running on a uniprocessor computer. This paper proposes a parallel decoder for linear block codes, using Parallel...

    Provided By Scientific Research

  • White Papers // Dec 2012

    Simple GUI Wireless Controller of Quadcopter

    This paper presents the development of remotely operated Quadcopter system. The Quadcopter is controlled through a Graphical User Interface (GUI) where the communication between GUI and Quadcopter is constructed by using wireless communication system. The Quadcopter balancing condition is sensed by FY90 controller and IMU 5DOF sensor. For smooth landing,...

    Provided By Scientific Research

  • White Papers // Dec 2012

    A New Method for Sensing Cognitive Radio Network under Malicious Attacker

    Cognitive radio has been designed for solving the problem of spectrum scarcity by using the spectrum of primary users who don't use their spectrum on that time. For sensing the spectrum, collaborative spectrum sensing has been utilized because of robustness. In this paper, a new collaborative spectrum method is proposed...

    Provided By Scientific Research

  • White Papers // Dec 2012

    Performance Analysis of Hybrid MAC Protocol for Cognitive Radio Networks

    The rapid growth in demand for broadband wireless services coupled with the recent developmental work on wireless communications technology and the static allocation of the spectrum have led to the artificial scarcity of the radio spectrum. The traditional command and control model (Static allocation) of spectrum allocation policy allows for...

    Provided By Scientific Research

  • White Papers // Dec 2012

    Scalable Incremental Network Programming for Multihop Wireless Sensors

    The authors present a network programming mechanism that can flexibly and quickly re-task a large multi-hop network of wireless sensor nodes. Their mechanism allows each sensor node to be incrementally reprogrammed with heterogeneous images of native program code using Rsync block comparison algorithm, point-to-point routing with the BLIP IPv6 stack,...

    Provided By Scientific Research

  • White Papers // Dec 2012

    A Scalable and Robust DHT Protocol for Structured P2P Network

    Distributed Hash Tables (DHTs) were originated from the design of structured Peer-To-Peer (P2P) systems. A DHT provides a key-based lookup service similar to a hash table. In this paper, the authors present the detailed design of a new DHT protocol, Tambour. The novelty of the protocol is that it uses...

    Provided By Scientific Research

  • White Papers // Dec 2012

    Modeling Components and Services of LTE Mobile Communications System

    The latest wireless broadband network standard is LTE (Long Term Evolution) which is developed by 3GPP (3rd Generation Partnership Project). It will enable mobile devices such as smart phones, tablets and laptops to access Internet at a very high speed along with lots of multimedia services. There are many issues...

    Provided By Scientific Research

  • White Papers // Dec 2012

    Simulation & Performance Evaluation of QoS Routing Protocol for Adhoc Networks Using Directional Communication

    A wireless ad-hoc network is a self-organized wireless network without fixed or backbone infrastructure. All nodes have routing capability and use peer-to-peer packet transmission or forward packets to other node using multi hop communication. Now-a-days Mobile Ad-hoc NETworks are being used for different applications and traffics, so it require Quality...

    Provided By Scientific Research

  • White Papers // Dec 2012

    Cryptanalysis of the Double-Moduli Cryptosystem

    In this paper, the authors present a lattice attack done on a NTRU-like scheme introduced by Verkhovsky in. They show how, based on the relation between the public and private key, they can construct an attack which allows any passive adversary to decrypt the encrypted messages. They explain, step by...

    Provided By Scientific Research

  • White Papers // Dec 2012

    Towards Cloud to Device Push Messaging on Android: Technologies, Possibilities and Challenges

    In this paper, the authors look at different push messaging alternatives available for Android. Push messaging provides an important aspect of server to device communication and they specifically focus on the integration of cloud computing with mobile devices through the use of push-based technologies. By conducting a benchmarking test, they...

    Provided By Scientific Research

  • White Papers // Dec 2012

    Improvement of the Round Key Generation of AES

    In modern society, computer network has already been covered. In people's daily lives, the information technology industries have become ubiquitous. In the civil and military, commercial's security which is playing an important role is very prominent. The key generation algorithm of AES was introduced, the weaknesses of the key generation...

    Provided By Scientific Research

  • White Papers // Dec 2012

    Game Analysis of SME Financing

    The SMEs (Small and Medium-sized Enterprises) play important role in the economy. However, the financing problem is a big difficulty, which has plagued the SMEs' development. Information asymmetry is the main reason for the SMEs' gaining funds so hard. The information asymmetry between banks and enterprises is that banks do...

    Provided By Scientific Research

  • White Papers // Dec 2012

    Research of Web Real-Time Communication Based on Web Socket

    Regarding the limitations of traditional web real-time communication solutions such as polling, long-polling, flash plug-in, propose that using new coming Web Socket technology in the web real-time communication field, introduce the features of web socket technology, analysis the difference between web socket protocol and HTTP protocol, offer an approach to...

    Provided By Scientific Research

  • White Papers // Nov 2012

    Performance Evaluation of Adaptive Modulation Based MC-CDMA System

    In today's scenario mobile phones are not used only for messaging and talking, now the people use mobiles also to access Internet. For that the authors need higher data rates. Mobiles use wireless communication channel, which is very fast varying channel. To increase the data rate they have to utilize...

    Provided By Scientific Research

  • White Papers // Nov 2012

    Cognitive Radio Ad-Hoc Networks: Some New Results on Multi-Channel Hidden Terminal Problem

    Recently the Cognitive Radio (CR), in particular the CR Ad-Hoc Network (CRAHN) technology appears as a burgeoning area in wireless communication that enables utilization of limited network resources in more efficient and intelligent way; studies indicate that opportunistic utilization of the available radio frequency spectrum, without interfering the licensed Primary...

    Provided By Scientific Research

  • White Papers // Nov 2012

    Performance Evaluation of Traffic Engineering Signal Protocols in IPV6 MPLS Networks

    This paper studies the performance of Traffic Engineering (TE) signal protocols used for load balancing in Multi-Protocol Label Switching (MPLS) networks, namely; Constraint Based Routed Label Distribution Protocol LDP (CR-LDP) and Resource Reservation Protocol (RSVP). Furthermore, the performance of an MPLS network uses these TE signal protocols is compared to...

    Provided By Scientific Research

  • White Papers // Nov 2012

    Fast Converging Generalized Turbo Decoding Scheme with Enhanced Throughput for Mobile Radio

    The use of turbo codes enhances the data transmission efficiency and optimizes the performance of a communication system over wireless fading channels. In this paper, the authors present a brief overview of the various components of the turbo coding scheme, analyze the complexities of the most popular turbo decoding algorithms...

    Provided By Scientific Research

  • White Papers // Nov 2012

    Deterministic Algorithm Computing All Generators: Application in Cryptographic Systems Design

    Primitive elements play important roles in the Diffie-Hellman protocol for establishment of secret communication keys, in the design of the ElGamal cryptographic system and as generators of pseudo-random numbers. In general, a deterministic algorithm that searches for primitive elements is currently unknown. In information-hiding schemes, where a primitive element is...

    Provided By Scientific Research

  • White Papers // Nov 2012

    The Research on QoS Model Design in Mobile Ad Hoc Networks

    Wireless Ad Hoc Networks is a special kind of wireless communication network. With the great development of multimedia applications, how to provide QoS guarantee in the MAC layer is the hot topic in wireless ad hoc network (MANET). This paper designed a QoS model in MANET. The feasibility and reliability...

    Provided By Scientific Research

  • White Papers // Nov 2012

    Global Electronic Dominance with Spatial Grasp

    A high-level control technology will be revealed that can dynamically establish overwhelming dominance over distributed networked systems with embedded electronic devices and any communications between them. It is based on implanting of universal control modules (that may be concealed) into key system points which collectively interpret complex but compact mission...

    Provided By Scientific Research

  • White Papers // Nov 2012

    Employing Power Allocation to Enhance Zero Forcing Scheme Advantages over Multi-Antenna Multiple Relay Networks

    A Multi-Antenna Multiple Relay (MAMR) network is considered and a variation of two-hop zero-forcing amplify-forward relaying method is proposed. Deploying ZF method together with application of diagonal power allocation matrices at the relays, it is shown that the overall MAMR network is simplified to M independent Single Antenna Multiple Relay...

    Provided By Scientific Research

  • White Papers // Jan 2014

    Investigating Approaches of Data Integrity Preservation for Secure Data Aggregation in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) typically use in-network processing to reduce the communication overhead. Due to the fusion of data items sourced at different nodes into a single one during in-network processing, the sanctity of the aggregated data needs to be ensured. Especially, the data integrity of the aggregated result is...

    Provided By Scientific Research

  • White Papers // Jan 2014

    Comparative Evaluation of Elliptic Curve Cryptography Based Homomorphic Encryption Schemes for a Novel Secure Multiparty Computation

    In this paper, the authors focus on elliptic curve cryptography based approach for Secure Multiparty Computation (SMC) problem. Widespread proliferation of data and the growth of communication technologies have enabled collaborative computations among parties in distributed scenario. Preserving privacy of data owned by parties is crucial in such scenarios. Classical...

    Provided By Scientific Research

  • White Papers // Jun 2009

    Mobility Trigger Management: Implementation and Evaluation

    Modern mobile devices have several network interfaces and can run various network applications. In order to remain always best connected; events need to be communicated through the entire protocol stack in an efficient manner. Current implementations can handle only a handful of low level events that may trigger actions for...

    Provided By Scientific Research

  • White Papers // May 2009

    Energy Aware Clustered Based Multipath Routing in Mobile Ad Hoc Networks

    With the advance of wireless communication technologies, small-size and high-performance computing and communication devices are increasingly used in daily life. After the success of second generation mobile system, more interest was started in wireless communications. A Mobile Ad hoc NETwork (MANET) is a wireless network without any fixed infrastructure or...

    Provided By Scientific Research

  • White Papers // Jul 2011

    Location Based Performance of WiMAX Network for QoS With Optimal Base Stations (BS)

    In this paper, the authors are given concept of their WiMAX (Worldwide Interoperability for Microwave Access) network performance for QoS monitoring and optimization solution for BS (Base Station) with multimedia application. In the communication sector, the optimal objective is to equate quality and cost. Due to its large coverage area,...

    Provided By Scientific Research

  • White Papers // Jan 2012

    A Novel Statistical AOA Model Pertinent to Indoor Geolocation

    A novel statistical Angle-Of-Arrival (AOA) model for indoor geolocation applications is presented. The modeling approach focuses on the arrivals of the multipath components with respect to the Line-Of-Sight (LOS) path which is an important component especially when indoor geolocation applications are considered. The model is particularly important for indoor applications...

    Provided By Scientific Research

  • White Papers // Sep 2012

    Capacity Calculation and Sub-Optimal Power Allocation Scheme for OFDM-Based Systems

    For emerging cellular wireless systems, the mitigation of inter-cell interference is the key to achieve a high capacity and good user experience. This paper is devoted to the performance analysis of interference mitigation techniques for the downlink in an Orthogonal Frequency Division Multiple Access (OFDMA) network, with a focus on...

    Provided By Scientific Research

  • White Papers // Nov 2012

    Performance Evaluation of Traffic Engineering Signal Protocols in IPV6 MPLS Networks

    This paper studies the performance of Traffic Engineering (TE) signal protocols used for load balancing in Multi-Protocol Label Switching (MPLS) networks, namely; Constraint Based Routed Label Distribution Protocol LDP (CR-LDP) and Resource Reservation Protocol (RSVP). Furthermore, the performance of an MPLS network uses these TE signal protocols is compared to...

    Provided By Scientific Research

  • White Papers // Oct 2012

    A Novel Offline PLI-RWA and Hybrid Node Architecture for Zero Blocking and Time Delay Reduction in Translucent Optical WDM Networks

    In this paper, The authors contrive a model that underpins the offline Physical Layer Impairment-Routing and Wavelength Assignment (PLI-RWA) issue in translucent networks. The authors introduce an innovative PLI-Signal Quality Aware RWA (PLI-SQARWA) algorithm that guarantees zero blocking due to signal degradation and wavelength contention and aims at minimizing the...

    Provided By Scientific Research

  • White Papers // Oct 2012

    Design of Network Architecture Using Mobile Gateways for DLNA Devices in Wide Area Networks

    The prevalence of information appliances supporting DLNA (Digital Living Network Alliance) such as televisions, recorders, and mobile phones has made it possible to share digital contents (e.g. videos, music and pictures) among appliances connected to a local network. However, DLNA does not let the people share contents over different networks...

    Provided By Scientific Research

  • White Papers // Oct 2012

    Network Connectivity Probability of Linear Vehicular Ad Hoc Networks on Two-Way Street

    In this paper, the authors present an analytical model to determine the network connectivity probability of a linear vehicular Ad-hoc NETwork (VANET) formed by communication equipped vehicles on a two-way street scenario. They consider the highway to be consisting of two lanes with vehicles moving in both directions on these...

    Provided By Scientific Research

  • White Papers // Nov 2012

    Cognitive Radio Ad-Hoc Networks: Some New Results on Multi-Channel Hidden Terminal Problem

    Recently the Cognitive Radio (CR), in particular the CR Ad-Hoc Network (CRAHN) technology appears as a burgeoning area in wireless communication that enables utilization of limited network resources in more efficient and intelligent way; studies indicate that opportunistic utilization of the available radio frequency spectrum, without interfering the licensed Primary...

    Provided By Scientific Research

  • White Papers // Feb 2012

    Optimal Number of Relays in Cooperative Communication in Wireless Sensor Networks

    Wireless Sensor Networks (WSN) typically consist of resource constrained micro sensors that organize itself into multi-hop wireless network. Sensors collect data and send it directly, or through intermediate hops in cooperative communication system, to the collection point. These sensors are powered up by batteries, for which the replacement or recharging...

    Provided By Scientific Research

  • White Papers // Apr 2012

    Inter-Network Resource Sharing in IEEE 802.22 Networks

    IEEE 802.22 is the first worldwide standard for Cognitive Networks (CNs) that exploits unused spectrum of the television broadcast service. An IEEE 802.22 network is also called Wireless Regional Area Network (WRAN). An open issue in cognitive 802.22 networks is represented by the resource distribution among WRANs. In this paper...

    Provided By Scientific Research

  • White Papers // Apr 2012

    MAC-PHY Cross-Layer for High Channel Capacity of Multiple-Hop MIMO Relay System

    For the high end-to-end channel capacity, the amplify-and-forward scheme multiple-hop MIMO relays system is considered. The distance between each transceiver is optimized to prevent some relays from being the bottleneck and guarantee the high end-to-end channel capacity. However, in some cases, the location of relays can't be set at the...

    Provided By Scientific Research

  • White Papers // Apr 2012

    An Average Power Reduction Method for Web Applications on Wireless Terminals

    Recently, there is a widespread use of Web browser-based Web applications such as e-mails and chats. However, frequent communication between mobile wireless terminals and HTTP servers give rise to problematic increases of average power consumption for the mobile devices. Current attempts to tackle this problem focus on reducing power consumption...

    Provided By Scientific Research

  • White Papers // Apr 2012

    The Tight Bound for the Number of Pilots in Channel Estimation for OFDM Systems

    Coherent detection in OFDM systems requires accurate Channel State Information (CSI) at the receiver. Channel estimation based on pilot-symbol-assisted transmissions provides a reliable way to obtain CSI. Use of pilot symbols for channel estimation, introduces overhead and it is desirable to keep the number of pilot symbols as minimum as...

    Provided By Scientific Research

  • White Papers // May 2012

    Load Balancing in IP/MPLS Networks: A Survey

    The present era has witnessed tremendous growth of the Internet and various applications that are supported by it. There is an enormous pressure on Internet Service Providers (ISPs) to make available adequate services for the traffics like VoIP and Video on demand. Since the resources like computing power, bandwidth etc....

    Provided By Scientific Research

  • White Papers // Apr 2012

    Homogeneous and Heterogeneous Traffic of Data Packets on Complex Networks: The Traffic Congestion Phenomenon

    The authors study the congestion phenomenon in a mathematical model of the data packets traffic in transmission networks as a function of the topology and of the load of the network. Two types of traffic are considered: homogeneous and heterogeneous traffic. The congestion phenomenon is studied in stationary conditions through...

    Provided By Scientific Research

  • White Papers // Mar 2012

    Study of Modeling for Scalable and Monitorable Network on Chip

    The performance of multiple processor based on Network on Chip (NoC) is limited to the communication efficiency of network. It is difficult to be optimized of routing and arbitration algorithm and be assessed of performance in the beginning of design because of its complex test cases. This paper constructs a...

    Provided By Scientific Research

  • White Papers // Jun 2012

    Optimization of Security Communication Wired Network by Means of Genetic Algorithms

    The realization of security wired network is very critical when the network itself must be installed in an environment full of restrictions and constrains such as historical palaces, characterized by unique architectural features. The purpose of this paper is to illustrate an advanced installation design technique of security wired network...

    Provided By Scientific Research

  • White Papers // Jul 2012

    OFDMA Uplink Frequency Offset Estimation with Multi-Access Interference Mitigation

    In this paper, the authors consider the frequency offset estimation for Orthogonal Frequency-Division Multiple Access (OF- DMA) Up Link (UL) transmissions. They first analyze the negative effect of Multi-Access-Interference (MAI) on OFDMA UL, and then propose two interference reduction/elimination methods, i.e., the Reduced-Rank-Projector (RRP) and Shift-Sampling-Projector (SSP) methods, to eliminate/reduce...

    Provided By Scientific Research

  • White Papers // May 2012

    User Informatics Optimized Search and Retrieval-Congestion Avoidance Scheme for 4G Networks

    The objective of 4G network is to provide best services to the users which in turn made the performance of existing network more critical. Further, the large traffic generated in such networks creates congestion resulting in overloading of the system. Frequent delays, loss of packets, and in addition the number...

    Provided By Scientific Research

  • White Papers // Apr 2012

    Pilot Based Channel Estimation in Broadband Power Line Communication Networks

    In this paper pilot based channel estimation is being considered for Broadband Power Line Communication (BPLC) networks witch used Orthogonal Frequency Division Multiplexing (OFDM) in order to transmit high rate data. To estimate channel in time or frequency some pilot must be used. Number of these pilots and deployment of...

    Provided By Scientific Research

  • White Papers // Dec 2012

    Performance Analysis of Hybrid MAC Protocol for Cognitive Radio Networks

    The rapid growth in demand for broadband wireless services coupled with the recent developmental work on wireless communications technology and the static allocation of the spectrum have led to the artificial scarcity of the radio spectrum. The traditional command and control model (Static allocation) of spectrum allocation policy allows for...

    Provided By Scientific Research

  • White Papers // Dec 2012

    Scalable Incremental Network Programming for Multihop Wireless Sensors

    The authors present a network programming mechanism that can flexibly and quickly re-task a large multi-hop network of wireless sensor nodes. Their mechanism allows each sensor node to be incrementally reprogrammed with heterogeneous images of native program code using Rsync block comparison algorithm, point-to-point routing with the BLIP IPv6 stack,...

    Provided By Scientific Research

  • White Papers // Dec 2012

    Simple GUI Wireless Controller of Quadcopter

    This paper presents the development of remotely operated Quadcopter system. The Quadcopter is controlled through a Graphical User Interface (GUI) where the communication between GUI and Quadcopter is constructed by using wireless communication system. The Quadcopter balancing condition is sensed by FY90 controller and IMU 5DOF sensor. For smooth landing,...

    Provided By Scientific Research

  • White Papers // Dec 2012

    A New Method for Sensing Cognitive Radio Network under Malicious Attacker

    Cognitive radio has been designed for solving the problem of spectrum scarcity by using the spectrum of primary users who don't use their spectrum on that time. For sensing the spectrum, collaborative spectrum sensing has been utilized because of robustness. In this paper, a new collaborative spectrum method is proposed...

    Provided By Scientific Research

  • White Papers // Jul 2012

    The Influence of Memetic Primers in Online Comments in Video Game Blogs

    Through investigating a particular blog, several factors were found which have significant influence on reader actions. This paper uses the term "Memetic primers" for those styles that most often cause readers to take notice of a particular comment, remember information included in it and take action. The memetic primers were...

    Provided By Scientific Research

  • White Papers // Jul 2012

    P2P Model Based on Isolated Broadcast Domains

    Resource location is the most important issue for Peer-To-Peer (P2P) system and flooding is the fundamental mechanism for unstructured P2P systems. Redundant messages will exponential growth with flooding scope increasing which severely influences the scalability of the system. In this paper, a new P2P model based on isolated broadcast domains...

    Provided By Scientific Research

  • White Papers // Oct 2012

    Inkjet-Printed UHF RFID Tags on Renewable Materials

    Radio Frequency IDentification (RFID) provides great potential for different Internet of Things (IOT) applications. In the future, material choices in these IOT devices will have a huge effect on the environment and thus use of renewable materials is a growing trend. In this paper, passive Ultra High Frequency (UHF) RFID...

    Provided By Scientific Research

  • White Papers // Oct 2012

    Application of Full Text Search Engine Based on Lucene

    With the rapid development of Internet and with the explosive growth of web information, Internet users how to remove the impurities and retained the essence quickly and easily to gain the information they need in the vast ocean of information to become a hot research topic in this field. This...

    Provided By Scientific Research

  • White Papers // Oct 2012

    UMIS: A Service for User Model Interoperability

    In this paper, the authors describe UMIS, a service architecture that enables user adaptive applications to exchange User Model data on the Web. UMIS provides a set of facilities that allow applications to interoperate with minimum changes in their internal logics and knowledge representation. The goal is to support the...

    Provided By Scientific Research

  • White Papers // Aug 2009

    The Study and Application of the IoT in Pet Systems

    The interaction between human and physical devices and devices in the real world is gaining more attention and requires a natural and intuitive methodology to employ. According to this idea and living well, life has been a growing demand. Thus, how to raise pets in an easy way has been...

    Provided By Scientific Research

  • White Papers // Aug 2009

    The Comparisonal Analysis of the Concept of Rectangular and Hexagonal Pilot in OFDM

    Channel estimation in coherent OFDM by inserting pilot-symbols into two-dimensional time-frequency lattice is a promising candidate for improving channel transmission capacity in future wireless communication systems. This paper proposes a new Cartesian mathematical concept of the Hexagonal Pilot Pattern, Hexagonal Pilot with Virtual and Rectangular Pilot Pattern. The main focus...

    Provided By Scientific Research

  • White Papers // Aug 2009

    Principle of Link Evaluation

    Link Evaluation (LE) is proposed in system evaluation to reduce complexity. It is important to practical systems also for link adaptation. Current algorithms for link evaluation are developed by simulation method, lacking of theoretical description. Although they provide some good accuracy for some scenarios, all of them are not universal....

    Provided By Scientific Research

  • White Papers // Aug 2009

    Comparison and Design of Decoder in B3G Mobile Communication System

    Turbo code has been shown to have ability to achieve performance that is close to Shannon limit. It has been adopted by various commercial communication systems. Both Universal Mobile Telecommunications System (UMTS) TDD and FDD have also employed turbo code as the error correction coding scheme. It out-performs convolutional code...

    Provided By Scientific Research

  • White Papers // Aug 2009

    Approximate Analysis of Power Offset Over Spatially Correlated MIMO Channels

    Power offset is zero-order term in the capacity versus signal-to-noise ratio curve. In this paper, approximate analysis of power offset is presented to describe MIMO system with uniform linear antenna arrays of fixed length. It is assumed that the number of receive antenna is larger than that of transmit antenna....

    Provided By Scientific Research

  • White Papers // Aug 2009

    A Cross-Layer Scheme for Handover in 802.16e Network with F-HMIPv6 Mobility

    IEEE802.16e is the major global cellular wireless standard that enables low-cost mobile Internet application. However, existing handover process system still has latency affects time-sensitive applications. In this paper, the handover procedures of 802.16e and Fast Handover for Hierarchical MIPv6 (F-HMIPv6) are reconstructed to achieve a better transmission performance. The concept...

    Provided By Scientific Research

  • White Papers // Aug 2009

    A Study of Multi-Node and Dual-Hop Collaborative Communication Performance Based on Harmonic Mean Method

    MIMO technique has been regarded as the essential technique for beyond 3G mobile cellular networks. The Benefits of MIMO system have been extensively studied by researchers in both academic and industry. It successfully meets the rapidly growing demand for high rate, voice and especially for multimedia services. Closed form expressions...

    Provided By Scientific Research