Scientific Research

Displaying 41-80 of 724 results

  • White Papers // Jul 2014

    Cloud Computing and Big Data: A Review of Current Service Models and Hardware Perspectives

    Big data applications are pervading more and more aspects of the people life, encompassing commercial and scientific uses at increasing rates as they move towards exascale analytics. Examples of big data applications include storing and accessing user data in commercial clouds, mining of social data, and analysis of large-scale simulations...

    Provided By Scientific Research

  • White Papers // Jul 2014

    Regression Testing in Developer Environment for Absence of Code Coverage

    The techniques of test case prioritization schedule the execution order of test cases to attain respective target, such as enhanced level of forecasting the fault. The requirement of the prioritization can be viewed as the en-route for deriving an order of relation on a given set of test cases which...

    Provided By Scientific Research

  • White Papers // Jul 2014

    Fine-Grained Work Element Standardization for Project Effort Estimation

    Traditional project effort estimation utilizes development models that span the entire project life cycle and thus culminates estimation errors. This paper is the first attempt to break each project activity down to smaller work elements. There are eight work elements, each of which is being defined and symbolized with visually...

    Provided By Scientific Research

  • White Papers // Jul 2014

    FOTool: Modelling Indigenous Community Cultures in Sarawak

    Formal-Object Tool (FOTool) is a software modeling approach that integrates formal specification and object oriented model. FOTool integrates the rigour of formal methods and the ease of use of Object Oriented (OO) techniques. The idea of FOTool is to provide an easy interface by allowing the application developer to develop...

    Provided By Scientific Research

  • White Papers // Jul 2014

    Open-Access Framework for Efficient Object-Oriented Development of Video Analysis Software

    The increasing use of digital video everyday in a multitude of electronic devices, including mobile phones, tablets and laptops, poses the need for quick development of cross-platform video software. However current approaches to this direction usually require a long learning curve and their development lacks standardization. This results in software...

    Provided By Scientific Research

  • White Papers // Jul 2014

    Security and Audit Trail Capabilities of a Facilitated Interface Used to Populate a Database System With Text and Graphical Data Using Widely Available Software

    In this paper, the authors described techniques used to capture, store, and retrieve narrative data forms from a database using widely available off the shelf software. This concept makes use of the security and versioning features of database architecture together with those of image-supported electronic document information capture. They present...

    Provided By Scientific Research

  • White Papers // Jul 2014

    Requirement Change Management in Global Software Environment Using Cloud Computing

    The successful implementation of any software project depends upon the requirements. Change in requirements at any stage during the life cycle of software development is taken as a healthy process. However, making out this change in a co-located environment is somewhat easier than the distributed environment where stakeholders are scattered...

    Provided By Scientific Research

  • White Papers // Jul 2014

    Formal Methods for Commercial Applications Issues vs. Solutions

    It was advocated that in 21st century, most of software will be developed with benefits of formal methods. The benefits include faults found in earlier stage of software development, automating, checking the certain properties and minimizing rework. In spite of their recognition in academic world and these claimed advantages, formal...

    Provided By Scientific Research

  • White Papers // Jul 2014

    Software Frameworks, Architectural and Design Patterns

    Software systems can be among the most complex constructions in engineering disciplines and can span into years of development. Most software systems though implement in part what has already been built and tend to follow known or nearly known architectures. Although most software systems are not of the size of...

    Provided By Scientific Research

  • White Papers // Jul 2014

    Refining Use/Misuse/Mitigation Use Cases for Security Requirements

    The authors investigate security at the same time as the functional requirements by refining and integrating use, misuse, and mitigation use cases. Security requirements rely on the interactions among normal system execution (use cases), attacks (misuse cases), and necessary security strategies (mitigation use cases), but previous approaches only use a...

    Provided By Scientific Research

  • White Papers // Jul 2014

    Tree-Based Revocation for Certificateless Authentication in Vehicular Ad-Hoc Networks

    In this paper, the authors propose authentication based on identity as a way to increase the efficiency and security of communications in vehicular ad-hoc networks. When using identity-based cryptography to achieve certificate-less authentication, membership revocation is not a trivial problem. Thus, in order to improve the performance of revocation in...

    Provided By Scientific Research

  • White Papers // Jul 2014

    Adaptive Mobile Applications to Dynamic Context

    As mobile devices continue to become more resource-rich in terms of their processing power, memory, and display, they can support sophisticated applications ranging from browsing and messaging to navigation and gaming. Context-aware computing is a mobile computing paradigm in which applications can discover and take advantage of contextual information, such...

    Provided By Scientific Research

  • White Papers // Jul 2014

    Semantic Recognition of a Data Structure in Big-Data

    Data governance is a subject that is becoming increasingly important in business and government. In fact, good governance data allows improved interactions between employees of one or more organizations. Data quality represents a great challenge because the cost of non-quality can be very high. Therefore, the use of data quality...

    Provided By Scientific Research

  • White Papers // Jul 2014

    Design of Reconfigurable Band Notches Antenna for Cognitive Radio Applications

    In this paper, an antenna with reconfigurable band notches, for cognitive radio applications, is proposed. The antenna can be operated as ultra wideband, and is reconfigurable in terms of the ability to select a notched band in the SRR resonant frequency. The reconfigurable band notches are induced using a band-stop...

    Provided By Scientific Research

  • White Papers // Jul 2014

    An Efficient Billing Scheme for Trusted Nodes Using Fuzzy Logic in Wireless Sensor Networks

    Extending the lifetime of the Wireless Sensor Networks (WSNs), where recharging sensors is not always possible, has been a major concern for researchers for the past decade. In this paper, the authors study the cooperation between nodes in wireless sensor networks in forwarding packets to others, and they propose a...

    Provided By Scientific Research

  • White Papers // Jul 2014

    Dual Band MIMO Antenna Composed of Two Low Profile Unbalanced Fed Inverted L Antennas for Wireless Communications

    The dual band antennas have been investigated with the development of wireless communication systems in recent years. Most of these dual or multiple band antennas have an omnidirectional radiation pattern. A low profile dual-band Multiple-Input-Multiple-Output (MIMO) antenna system is proposed. The proposed MIMO antenna consists of two low profiles unbalanced...

    Provided By Scientific Research

  • White Papers // Jul 2014

    Keystroke Authentication on Enhanced Needleman Alignment Algorithm

    An important point for computer systems is the identification of users for authentication. One of these identification methods is keystroke dynamics. The keystroke dynamics is a biometric measurement in terms of keystroke press duration and keystroke latency. However, several problems are arisen like the similarity between users and identification accuracy....

    Provided By Scientific Research

  • White Papers // Jun 2014

    Connectivity-Based Data Gathering with Path-Constrained Mobile Sink in Wireless Sensor Networks

    The design of an effective and robust data gathering algorithm is crucial to the overall performance of Wireless Sensor Networks (WSN). However, using traditional routing algorithms for data gathering is energy-inefficient for sensor nodes with limited power resources and multi-hop communication protocols. Data gathering with mobile sinks provided an effective...

    Provided By Scientific Research

  • White Papers // Jun 2014

    Analysis of Hops Length in Wireless Sensor Networks

    Wireless sensor networks are provided with a limited source of power. The lifetime of such networks is an overwhelming matter in most network applications. This lifetime depends strongly on how efficiently such energy is distributed over the nodes especially during transmitting and receiving data. Each node may route messages to...

    Provided By Scientific Research

  • White Papers // Jun 2014

    Differentially-Keyed IR-UWB Signals for MA with Differential-Detection Receiver

    Non-coherent communication receivers (differential-detectors) have simple design, however, they always incur Bit Error Rate (BER) performance loss up to 3dB compared to coherent receivers. In this paper, a differential-detector is proposed for Impulse Radio Ultra WideBand (IR-UWB) communication systems. The system employs bit-level Differential Phase Shift Keying (DPSK) combined with...

    Provided By Scientific Research

  • White Papers // Jun 2014

    Performance of WSNs Under the Effect of Collisions and Interference

    In this paper, the authors propose a methodology for calculating the energy consumed by a Wireless Sensor Network (WSN) as well as its throughput under the effect of a jamming node modeling interference to account for collisions and retransmissions. Accordingly, the proposed methodology takes into consideration retransmissions and data dropped...

    Provided By Scientific Research

  • White Papers // Jun 2014

    Smart Location-Based Mobile Shopping Android Application

    In the paper, a smart location-based mobile shopping application for Android devices is proposed. The Geo-position of the user's mobile device is utilized to produce location information in shopping application. The flow of the application is that user searches a product, and then SAGO identifies the location and searches the...

    Provided By Scientific Research

  • White Papers // Jun 2014

    Reliability Estimation of Services Oriented Systems Using Adaptive Neuro Fuzzy Inference System

    In order to make system reliable, it should inhibit guarantee for basic service, data flow, composition of services, and the complete workflow. In Service-Oriented Architecture (SOA), the entire software system consists of an interacting group of autonomous services. Some soft computing approaches have been developed for estimating the reliability of...

    Provided By Scientific Research

  • White Papers // Jun 2014

    An Analytical Framework for Disconnection Prediction in Wireless Networks

    The stability and reliability of links in wireless networks is dependent on a number of factors such as the topology of the area, inter-base station or inter-mobile station distances, weather conditions and so on. Link instability in wireless networks has a negative impact on the data throughput and thus, the...

    Provided By Scientific Research

  • White Papers // Jun 2014

    Computer Aided Call for Tenders: A Tool for Software Bidding

    Under a broad comprehension of software engineering, it is preferred the term software life cycle instead of just software production. The reason is that cycle starts at software conception and stops when the software is relegated. Given contemporary companies' market strategies of focusing on their competitive advantages, most of them...

    Provided By Scientific Research

  • White Papers // Jun 2014

    Iterative Soft Decoding of Multiple Description Image over Wireless Channel

    Motivated by recent results in multiple description images coding over wireless networks, the authors propose a scheme for transmission of multiple descriptions through hybrid packet loss and additive white Gaussian noise channel. Each description is coded into multiple bit-streams by applying SPIHT coding on wavelet trees along spatial orientations and...

    Provided By Scientific Research

  • White Papers // Jun 2014

    Practical Security Approaches Against Border Gateway Protocol (BGP) Session Hijacking Attacks Between Autonomous Systems

    The Border Gateway Protocol (BGP) is the default inter domain routing protocol used on the internet for exchanging information between autonomous systems. Available literature suggests that BGP is vulnerable to session hijacking attacks. There are a number of proposals aimed at improving BGP security which have not been fully implemented....

    Provided By Scientific Research

  • White Papers // Jun 2014

    A Survey of SQL Injection Attack Detection and Prevention

    Structured Query Language Injection Attack (SQLIA) is the most exposed to attack on the Internet. From this attack, the attacker can take control of the database therefore be able to interpolate the data from the database server for the website. Hence, the big challenge became to secure such website against...

    Provided By Scientific Research

  • White Papers // Jun 2014

    Apple's Lion vs Microsoft's Windows 7: Comparing Built-In Protection Against ICMP Flood Attacks

    With the increase in the number of computers connected to Internet, the number of Distributed Denial of Service (DDoS) attacks has also been increasing. A DDoS attack consumes the computing resources of a computer or a server, by degrading its computing performance or by preventing legitimate users from accessing its...

    Provided By Scientific Research

  • White Papers // Jun 2014

    Multilayer Authentication for Communication Systems Based on Physical-Layer Attributes

    In this paper, a multilayer security solution is introduced, in order to accord the required end-to-end security blanket to the heterogeneous networks by considering the properties used by authentication at the physical-layer in transport-layer authentication. In particular, after achieving an authentication level based on the estimated Channel Impulse Response (CIR)...

    Provided By Scientific Research

  • White Papers // Jun 2014

    Creation of Virtual Wi-Fi Access Point and Secured Wi-Fi Pairing, through NFC

    The growing ubiquity of Wi-Fi networks combined with the integration of low-cost Wi-Fi chipsets in all devices makes Wi-Fi as the wireless technology the most used for accessing to internet. This means that the development of a Wi-Fi strategy has become an imperative for almost all operators worldwide. In this...

    Provided By Scientific Research

  • White Papers // Jun 2014

    Multi-Cultural Dynamics on Social Networks Under External Random Perturbations

    In this paper, the authors deal with the development of multi-cultural network-centric dynamic models under the influence of personal intra- and inter-members, as well as community. Each individual member of a society is influenced by the user interactions with fellow members of the family, neighborhood, region and the universe. The...

    Provided By Scientific Research

  • White Papers // May 2014

    Analysis of Different Call Admission Control Strategies and Its Impact on the Performance of LTE-Advanced Networks

    The Call Admission Control (CAC) optimizes the use of allocated channels against offered traffic maintaining the required Quality of Service (QoS). Provisioning QoS to user at cell-edge is a challenge where there is limitation in cell resources due to Inter-Cell Interference (ICI). Soft Frequency Reuse is ICI mitigation scheme that...

    Provided By Scientific Research

  • White Papers // May 2014

    On the Development of Realistic Cross Layer Communication Protocol for Wireless Sensor Networks

    Traditional protocols in Wireless Sensor Networks (WSNs) follow the strict layering techniques which lead to the degradation in performance of the QoS (Quality of Service) parameters. Battery powered tiny sensor nodes with constraints of energy and guaranteed time require the efficient communication protocols with innovative and optimized approach to attain...

    Provided By Scientific Research

  • White Papers // May 2014

    Cognitive Software Engineering: A Research Framework and Roadmap

    The work of software engineers is inherently cognitive. Integral to their duties is understanding and developing several artifacts. Each one is based on a specific model and a given level of abstraction. What distinguishes software engineering is the logical complexity of some artifacts (especially programs), the high dependency among them,...

    Provided By Scientific Research

  • White Papers // May 2014

    Challenges for Software Engineering in Automation

    In this paper, the authors give an introduction to the essential challenges of software engineering and requirements that software has to fulfill in the domain of automation. Besides, the functional characteristics, specific constraints and circumstances are considered for deriving requirements concerning usability, the technical process, the automation functions, used platform...

    Provided By Scientific Research

  • White Papers // May 2014

    A Survey of Concepts Location Enhancement for Program Comprehension and Maintenance

    When correcting a fault, adding a new concept or feature, or adapting a system to conform to a new platform, software engineers must first find the relevant parts of the code that correspond to a particular change. This is termed as concept or feature location process. Several techniques have been...

    Provided By Scientific Research

  • White Papers // May 2014

    Bandwidth Constrained Priority-Based Routing Algorithm for Mobile Ad Hoc Networks

    A Mobile Ad hoc NETwork (MANET) is a dynamically formed self-configured network by an autonomous system of mobile nodes connected by wireless links. With the advancements of wireless technology, the necessity of Quality of Service (QoS) is increasing rapidly. Developing QoS constraint routing protocol for MANETs is still a challenging...

    Provided By Scientific Research

  • White Papers // May 2014

    Application of Machine-Learning Based Prediction Techniques in Wireless Networks

    Wireless networks are key enablers of ubiquitous communication. With the evolution of networking technologies and the need for these to inter-operate and dynamically adapt to user requirements, intelligent networks are the need of the hour. Use of machine learning techniques allows these networks to adapt to changing environments and enables...

    Provided By Scientific Research

  • White Papers // May 2014

    Community Detection in Dynamic Social Networks

    There are many community detection algorithms for discovering communities in networks, but very few deal with networks that change structure. The SCANs (Structural Clustering Algorithm for Networks) algorithm is one of these algorithms that detect communities in static networks. To make SCAN more effective for the dynamic social networks that...

    Provided By Scientific Research

  • White Papers // Sep 2012

    MDCHeS: Model-Driven Dynamic Composition of Heterogeneous Service

    Web service composition provides an opportunity for enterprises to increase the ability to adapt themselves to frequent changes in users' requirements by integrating existing services. The authors' paper has focused on proposing a framework to support dynamic composition and to use both SOAP-based and RESTful Web services simultaneously in composite...

    Provided By Scientific Research

  • White Papers // Sep 2012

    Primality Testing Using Complex Integers and Pythagorean Triplets

    Prime integers and their generalizations play important roles in protocols for secure transmission of information via open channels of telecommunication networks. Generation of multidigit large primes in the design stage of a cryptographic system is a formidable task. Fermat primality checking is one of the simplest of all tests. Unfortunately,...

    Provided By Scientific Research

  • White Papers // Sep 2012

    Classification of Multi-User Chirp Modulation Signals Using Wavelet Higher-Order-Statistics Features and Artificial Intelligence Techniques

    Higher order statistical features have been recently proved to be very efficient in the classification of wideband communications and radar signals with great accuracy. On the other hand, the denoising properties of the Wavelet Transform make WT an efficient signal processing tool in noisy environments. A novel technique for the...

    Provided By Scientific Research

  • White Papers // Sep 2012

    Context-Aware Rate-Adaptive Beaconing for Efficient and Scalable Vehicular Safety Communication

    Vehicular safety applications, such as cooperative collision warning systems, rely on beaconing to provide situational awareness that is needed to predict and therefore to avoid possible collisions. Beaconing is the continual exchange of vehicle motion-state information, such as position, speed and heading, which enables each vehicle to track its neighboring...

    Provided By Scientific Research

  • White Papers // Sep 2012

    High Security Nested PWLCM Chaotic Map Bit-Level Permutation Based Image Encryption

    Chaotic systems produce pseudo-random sequences with good randomness; therefore, these systems are suitable to efficient image encryption. In this paper, a low complexity image encryption based on Nested Piece Wise Linear Chaotic Map (NPWLCM) is proposed. Bit planes of the grey or color levels are shuffled to increase the encryption...

    Provided By Scientific Research

  • White Papers // Sep 2012

    Majority Voting Procedure Allowing Soft Decision Decoding of Linear Block Codes on Binary Channels

    In this paper, the authors present an efficient algorithm to decode linear block codes on binary channels. The main idea consists in using a vote procedure in order to elaborate artificial reliabilities of the binary received word and to present the obtained real vector r as inputs of a SIHO...

    Provided By Scientific Research

  • White Papers // Sep 2012

    Predictive FTF Adaptive Algorithm for Mobile Channels Estimation

    The aim of this paper is to improve the performance of Fast Transversal Filter (FTF) adaptive algorithm used for mobile channel estimation. A multi-ray Jakes mobile channel model with a Doppler frequency shift is used in the simulation. The channel estimator obtains the Sampled channel Impulse Response (SIR) from the...

    Provided By Scientific Research

  • White Papers // Feb 2013

    Collision Resolution MAC Protocols for Wireless Ad Hoc Networks

    In wireless ad hoc networks, nodes cooperatively form a network without any infrastructure such as a BS/AP (Base Station or Access Point). The widely-used contention-based MAC protocol, IEEE 802.11b, is inefficient in multi-hop networks due to the hidden and exposed terminal problems. The most popular schedule-based MAC protocol, TDMA (Time...

    Provided By Scientific Research

  • White Papers // Feb 2012

    Adaptive Routing Algorithms and Implementation for TESH Network

    The Tori-connected mESH (TESH) Network is a k-ary n-cube network of multiple basic modules, in which the basic modules are 2D-mesh networks that are hierarchically interconnected for higher level k-ary n-cube networks. Many adaptive routing algorithms for k-ary n-cube networks have already been proposed. Thus, those algorithms can also be...

    Provided By Scientific Research

  • White Papers // Feb 2012

    Fuzzy Voice Coding with Significant Impulses Modeling and Redundant Waveform Recycling

    In this paper, the authors proposes a voice codification based on two algorithms that make the wave form codification in time domain. The first uses the Significant Impulse Model (SIM), which has as a goal to operate as an endpoint detector and as a dawn sampling, through the detection and...

    Provided By Scientific Research

  • White Papers // Nov 2012

    Employing Power Allocation to Enhance Zero Forcing Scheme Advantages over Multi-Antenna Multiple Relay Networks

    A Multi-Antenna Multiple Relay (MAMR) network is considered and a variation of two-hop zero-forcing amplify-forward relaying method is proposed. Deploying ZF method together with application of diagonal power allocation matrices at the relays, it is shown that the overall MAMR network is simplified to M independent Single Antenna Multiple Relay...

    Provided By Scientific Research

  • White Papers // Nov 2012

    Improving Inter-Domain Fast Handover Using MIH Services in Mobile WiMAX

    Recently, the IP connectivity during the Mobile Node (MN) movement between Base Stations (BSs) belonging to different Internet Service Providers (ISPs) is still a key issue to be tackled. In this paper, therefore, the authors develop a new scheme to improve the performance of inter-domain fast handover over mobile WiMAX...

    Provided By Scientific Research

  • White Papers // Nov 2012

    Dynamic 3-D Indoor Radio Propagation Model and Applications with Radios from 433 MHZ to 2.4 GHz

    Proliferation of indoor sensor infrastructure has created a new niche for mobile communications, yet research in indoor radio propagation still has not generated a definite model that is able to precisely capture radio signatures in 3-D environments and effectively apply to radios at a wide range of frequency bands. This...

    Provided By Scientific Research

  • White Papers // Nov 2012

    Simulation and Measurements of VSWR for Microwave Communication Systems

    Now-a-days, microwave frequency systems, in many applications are used. Regardless of the application, all microwave communication systems are faced with transmission line matching problem, related to the load or impedance connected to them. The mismatching of microwave lines with the load connected to them generates reflected waves. Mismatching is identified...

    Provided By Scientific Research

  • White Papers // Nov 2012

    On the Computing of the Minimum Distance of Linear Block Codes by Heuristic Methods

    The evaluation of the minimum distance of linear block codes remains an open problem in coding theory and it is not easy to determine its true value by classical methods, for this reason the problem has been solved in the literature with heuristic techniques such as genetic algorithms and local...

    Provided By Scientific Research

  • White Papers // Nov 2012

    AZR-LEACH: An Energy Efficient Routing Protocol for Wireless Sensor Networks

    Reducing the energy consumption of available resources is still a problem to be solved in Wireless Sensor Networks (WSNs). Many types of existing routing protocols are developed to save power consumption. In these protocols, cluster-based routing protocols are found to be more energy efficient. A cluster head is selected to...

    Provided By Scientific Research

  • White Papers // Oct 2012

    Structural Properties of Optimal Scheduling Policies for Wireless Data Transmission

    The authors analyze a cell with a fixed number of users in a time period network. The base station schedules to serve at most one user in a given time period based on information about the available data rates and other parameter(s) for all the users in the cell. They...

    Provided By Scientific Research

  • White Papers // Oct 2012

    Distributed Relay Beamforming in Cognitive Two-Way Networks: SINR Balancing Approach

    In this paper, the authors study the problem of distributed relay beamforming for a bidirectional cognitive relay network which consists of two secondary transceivers and K ognitive relay nodes and a primary network with a transmitter and receiver, using underlay model. For effective use of spectrum, they propose a Multiple...

    Provided By Scientific Research

  • White Papers // Oct 2012

    Detection the Spectrum Holes in the Primary Bandwidth of the Cognitive Radio Systems in Presence Noise and Attenuation

    Cognitive Radio (CR) and Dynamic Spectrum Access (DSA) represent two complementary developments that will re-fashion the world of wireless communication. In order to investigate the roles of knowledge representation and reasoning technologies in this domain, the authors have developed an experimental cognitive radio simulation environment. That is, a conventional radio...

    Provided By Scientific Research

  • White Papers // Oct 2012

    Random Access Algorithms in Packet Networks- A Review of Three Research Decades

    In this paper, the authors are focusing on the "Random-access" approach, for the accessing of a single, errorless, slotted channel, by independent, identical, packet transmitting, bursty users. They present a coherent and systematic review of Random Access Algorithms for packet networks, as developed over three and a half decades. They...

    Provided By Scientific Research

  • White Papers // Oct 2012

    A Cellular-Assisted Efficient Handover Algorithm for Wireless Sensor Networks

    Heterogeneous network convergence and handover have become very hot in recent years. This paper proposed an efficient handover scheme in Multi-PAN Wireless Sensor Networks (WSNs). A number of edge nodes are set at the edge of each Personal Area Networks (PANs). A User Equipment (UE), which has WSN and cellular...

    Provided By Scientific Research

  • White Papers // Sep 2012

    Unified Mogramming with Var-Oriented Modeling and Exertion-Oriented Programming Languages

    The Service ORiented Computing EnviRonment (SORCER) targets service abstractions for transdisciplinary complexity with support for heterogeneous Service-Oriented (SO) computing. SORCER's models are expressed in a top-down Var-oriented Modeling Language (VML) unified with programs in a bottoms-up Exertion-Oriented Language (EOL). In this paper, the introduction to mogramming (modeling and programing), which...

    Provided By Scientific Research

  • White Papers // Jan 2013

    Optimizing Operating Cost of an Intrusion Detection System

    Very often it so happens that the cost of operating an Intrusion Detection System (IDS) exceeds the cost of purchasing the IDS itself. In such cases, regular operation and maintenance of the system becomes expensive. Thus, it becomes essential to reduce the operating cost of the IDS without compromising on...

    Provided By Scientific Research

  • White Papers // Jan 2013

    A Novel Decoder Based on Parallel Genetic Algorithms for Linear Block Codes

    Genetic algorithms offer very good performances for solving large optimization problems, especially in the domain of error-correcting codes. However, they have a major drawback related to the time complexity and memory occupation when running on a uniprocessor computer. This paper proposes a parallel decoder for linear block codes, using Parallel...

    Provided By Scientific Research

  • White Papers // Dec 2012

    Research of Web Real-Time Communication Based on Web Socket

    Regarding the limitations of traditional web real-time communication solutions such as polling, long-polling, flash plug-in, propose that using new coming Web Socket technology in the web real-time communication field, introduce the features of web socket technology, analysis the difference between web socket protocol and HTTP protocol, offer an approach to...

    Provided By Scientific Research

  • White Papers // Dec 2012

    A Scalable and Robust DHT Protocol for Structured P2P Network

    Distributed Hash Tables (DHTs) were originated from the design of structured Peer-To-Peer (P2P) systems. A DHT provides a key-based lookup service similar to a hash table. In this paper, the authors present the detailed design of a new DHT protocol, Tambour. The novelty of the protocol is that it uses...

    Provided By Scientific Research

  • White Papers // Dec 2012

    Modeling Components and Services of LTE Mobile Communications System

    The latest wireless broadband network standard is LTE (Long Term Evolution) which is developed by 3GPP (3rd Generation Partnership Project). It will enable mobile devices such as smart phones, tablets and laptops to access Internet at a very high speed along with lots of multimedia services. There are many issues...

    Provided By Scientific Research

  • White Papers // Dec 2012

    Simulation & Performance Evaluation of QoS Routing Protocol for Adhoc Networks Using Directional Communication

    A wireless ad-hoc network is a self-organized wireless network without fixed or backbone infrastructure. All nodes have routing capability and use peer-to-peer packet transmission or forward packets to other node using multi hop communication. Now-a-days Mobile Ad-hoc NETworks are being used for different applications and traffics, so it require Quality...

    Provided By Scientific Research

  • White Papers // Dec 2012

    Cryptanalysis of the Double-Moduli Cryptosystem

    In this paper, the authors present a lattice attack done on a NTRU-like scheme introduced by Verkhovsky in. They show how, based on the relation between the public and private key, they can construct an attack which allows any passive adversary to decrypt the encrypted messages. They explain, step by...

    Provided By Scientific Research

  • White Papers // Dec 2012

    Towards Cloud to Device Push Messaging on Android: Technologies, Possibilities and Challenges

    In this paper, the authors look at different push messaging alternatives available for Android. Push messaging provides an important aspect of server to device communication and they specifically focus on the integration of cloud computing with mobile devices through the use of push-based technologies. By conducting a benchmarking test, they...

    Provided By Scientific Research

  • White Papers // Dec 2012

    Improvement of the Round Key Generation of AES

    In modern society, computer network has already been covered. In people's daily lives, the information technology industries have become ubiquitous. In the civil and military, commercial's security which is playing an important role is very prominent. The key generation algorithm of AES was introduced, the weaknesses of the key generation...

    Provided By Scientific Research

  • White Papers // Nov 2012

    Deterministic Algorithm Computing All Generators: Application in Cryptographic Systems Design

    Primitive elements play important roles in the Diffie-Hellman protocol for establishment of secret communication keys, in the design of the ElGamal cryptographic system and as generators of pseudo-random numbers. In general, a deterministic algorithm that searches for primitive elements is currently unknown. In information-hiding schemes, where a primitive element is...

    Provided By Scientific Research

  • White Papers // Nov 2012

    The Research on QoS Model Design in Mobile Ad Hoc Networks

    Wireless Ad Hoc Networks is a special kind of wireless communication network. With the great development of multimedia applications, how to provide QoS guarantee in the MAC layer is the hot topic in wireless ad hoc network (MANET). This paper designed a QoS model in MANET. The feasibility and reliability...

    Provided By Scientific Research

  • White Papers // Nov 2012

    Global Electronic Dominance with Spatial Grasp

    A high-level control technology will be revealed that can dynamically establish overwhelming dominance over distributed networked systems with embedded electronic devices and any communications between them. It is based on implanting of universal control modules (that may be concealed) into key system points which collectively interpret complex but compact mission...

    Provided By Scientific Research

  • White Papers // Aug 2009

    Uncertain IMM Estimator for Multi-Sensor Target Tracking

    Interacting Multiple Model (IMM) estimator can provide better performance of target tracking than mono model Kalman filter. In multi-sensor system ordinarily, availability of measurement from different sensors is stochastic and it is difficult to construct uniform global observation vector and observation matrix appropriately in existing method. An IMM estimator for...

    Provided By Scientific Research

  • White Papers // Sep 2009

    Joint Detection for Image Transmission Based on Schur Algorithm Over Wireless Sensor Network

    To achieve much efficient multimedia transmission over an error-prone wireless network, there are still some problem must to be solved, especially in energy limited wireless sensor network. In this paper, the authors propose a joint detection based on Schur algorithm for image wireless transmission over Wireless Sensor Network. To eliminate...

    Provided By Scientific Research

  • White Papers // Nov 2009

    Using the Power Control and Cooperative Communication for Energy Saving in Mobile Ad Hoc Networks

    In this paper, the authors investigate the energy saving problem in mobile ad hoc network and give out an improved variable-range transmission power control algorithm based on Minimum Spanning Tree (MST) algorithm. Using previous work by Gomez and Campbell, they show that in consider of node's mobility, the previous variable-range...

    Provided By Scientific Research

  • White Papers // Dec 2009

    On Possible A-Priori "Imprinting" of General Relativity Itself on the Performed Lense-Thirring Tests with LAGEOS Satellites

    The term "GravitoMagnetism" (GM) denotes those gravitational phenomena concerning orbiting test particles, precessing gyroscopes, moving clocks and atoms and propagating electromagnetic waves which in the framework of the Einstein's General Theory of Relativity (GTR), arise from non-static distributions of matter and energy. The impact of possible a-priori "Imprinting" effects of...

    Provided By Scientific Research

  • White Papers // Nov 2009

    Joint Power Control and Spectrum Allocation for Cognitive Radio with QoS Constraint

    Spectrum sharing with Quality of Service (QoS) requirement and power constraint on cognitive users is studied. The objective is to maximize the system throughput. This problem is modeled as a mixed integer nonlinear programming problem and then transformed to a continuous nonlinear programming problem through eliminating integer variables. The authors...

    Provided By Scientific Research

  • White Papers // Dec 2009

    ADPF Algorithm for Target Tracking in WSN

    Particle Filtering (PF) has been widely used in solving nonlinear/non Gaussian filtering problems. Inferring to the target tracking in a Wireless Sensor Network (WSN), Distributed PF (DPF) was used due to the limitation of nodes' computing capacity. In this paper, a novel filtering method - Asynchronous DPF (ADPF) for target...

    Provided By Scientific Research