Scientific Research

Displaying 161-200 of 615 results

  • White Papers // Jun 2013

    OMT-G Modeling and Cloud Implementation of a Reference Database of Addressing in Morocco

    A reference database of addressing is an important resource for urban applications. The efficiency of an addressing sys-tem depends on both data quality and technical architecture. Data must respect a standard model that is flexible to meet different cases in the field. The technical architecture should be service oriented to...

    Provided By Scientific Research

  • White Papers // Jun 2013

    An Efficient Approach for Agile Web Based Project Estimation: AgileMOW

    There exist numerous sophisticated models and methods for estimating the size, cost and schedule of software projects. However, the ability to accurately predict the software cost of web based software for agile software projects is still dubious. The most appropriate web based software cost estimation in an agile software development...

    Provided By Scientific Research

  • White Papers // Jun 2013

    Opportunistic Unicast and Multicast Routing Protocol for VANET

    Vehicular Ad hoc NETwork (VANET) is a new paradigm of wireless network. Reliable and efficient unicast and multi-cast routing protocols are critical for VANETs. As a possible solution, Opportunistic Routing (OR) has received much attention recently. This paper focuses on the aspect of soft security by building trust opportunistic forwarding...

    Provided By Scientific Research

  • White Papers // Jun 2013

    Influences of Cloud Computing on E-Commerce Businesses and Industry

    Cloud computing has been one of the most popular topics on information technology, since it was proposed by Google in 2007. In the past years, cloud computing has become from a theoretical concept into the real applications in different industries such as telecommunication and healthcare. Inevitably, its influences on different...

    Provided By Scientific Research

  • White Papers // May 2013

    Cross-Layer Energy Analysis and Proposal of a MAC Protocol for Wireless Sensor Networks Dedicated to Building Monitoring Systems

    In a sustainable development context, the monitoring systems are essential to study the building energy performances. With the recent technology advances, these systems can be based on wireless sensor networks, where the energy efficiency is the main design challenge. To this end, most of the studies focus on low power...

    Provided By Scientific Research

  • White Papers // May 2013

    Performance of AF Relay Networks with Multiple Relays and Multiple Antennas at Destination Using MRC Combining

    Wireless relaying is a promising solution to overcome the channel impairments and provides high data rate coverage that appears for the next generation mobile communications. Cooperative diversity networks have recently been proposed as a way to form virtual antenna arrays where neighboring relay nodes assist the source to send the...

    Provided By Scientific Research

  • White Papers // May 2013

    Utility-Based Node Cooperation Mechanism in Wireless Sensor Networks

    In wireless sensor networks, due to the energy and resource constraints, nodes may be unwilling to forward packets for their neighbors. This can render severe deteriorations in the network performance and malfunctions of the system. To tackle such selfish behaviors and enhance the cooperation among sensors, based on reputation and...

    Provided By Scientific Research

  • White Papers // May 2013

    Framework of User Participation for the Interface Design in the SaaS Layer

    The development of software as a service represents a great advantage for the users of cloud computing, such as users of small, medium or large organizations. All these users possess different characteristics, which must be taken into account as reference for the interface development of a software product. This paper...

    Provided By Scientific Research

  • White Papers // May 2013

    A Hybrid Evaluation Framework of CMM and COBIT for Improving the Software Development Quality

    It is essential to study quality of software production like others. Software productions have special properties. They are intangible. So, qualitative evaluation encountered with complexity. Hence, proposing a model in order to evaluate the quality of software productions is considerable to most software managers and experts. In this paper, regarding...

    Provided By Scientific Research

  • White Papers // May 2013

    A Chain-Based Routing Protocol to Maximize the Lifetime of Wireless Sensor Networks

    Energy conservation is a key issue in the design of systems based on wireless sensor networks. Clustering routing protocols have been developed in order to reduce the network traffic toward the sink and therefore prolong the network lifetime. An alternative of clustering is to build chains instead of clusters. In...

    Provided By Scientific Research

  • White Papers // May 2013

    Advanced Border Intrusion Detection and Surveillance Using Wireless Sensor Network Technology

    Wireless Sensor Network (WSN) has been emerging in the last decade as a powerful tool for connecting physical and digital world. WSN has been used in many applications such habitat monitoring, building monitoring, smart grid and pipeline monitoring. In addition, few researchers have been experimenting with WSN in many mission-critical...

    Provided By Scientific Research

  • White Papers // May 2013

    Multimedia Streaming for Ad Hoc Wireless Mesh Networks Using Network Coding

    Over the past years, the authors have witnessed an explosive growth in the use of multimedia applications such as audio and video streaming with mobile and static devices. Multimedia streaming applications need new approaches to multimedia transmissions to meet the growing volume demand and quality expectations of multimedia traffic. This...

    Provided By Scientific Research

  • White Papers // Apr 2013

    A Survey of MANET Survivability Routing Techniques

    Mobile ad hoc networks have a wide range of application usage today, due to its great services, easy installation and configuration, and its other distinctive characteristics. In contrast, the attackers also have developed their own way to disrupt MANET normal operations. Many techniques, approaches and protocols have proposed to support...

    Provided By Scientific Research

  • White Papers // Apr 2013

    Services and Applications Based on Mobile User's Location Detection and Prediction

    As a result of great advances in mobile communication systems and due to widely usage of mobile equipments everywhere, there is urgent and increasing demand on mobile applications and services. Many wireless applications are deployed and available to customers via their mobile phones. Variety of these applications and services are...

    Provided By Scientific Research

  • White Papers // Apr 2013

    An Approach to Developing a Performance Test Based on the Tradeoffs From SW Architectures

    A quality of SoftWare (SW) is directly related to its performance testing, in which the system's efficiency and reliability are assessed. In a performance test, the standards for assessing its test results are not sufficiently determined due to the lack of a well-structured test developing methods which are found in...

    Provided By Scientific Research

  • White Papers // Apr 2013

    A Bootstrapping Approach for Software Reliability Measurement Based on a Discretized NHPP Model

    Discrete software reliability measurement has a proper characteristic for describing a software reliability growth process which depends on a unit of the software fault-detection period, such as the number of test runs, the number of executed test cases. This paper discusses discrete software reliability measurement based on a discretized Non-Homogeneous...

    Provided By Scientific Research

  • White Papers // Apr 2013

    Lognormal Process Software Reliability Modeling with Testing-Effort

    The authors propose a software reliability growth model with testing-effort based on a continuous-state space stochastic process, such as a lognormal process, and conduct its goodness-of-fit evaluation. They also discuss a parameter estimation method of their model. Then, they derive several software reliability assessment measures by the probability distribution of...

    Provided By Scientific Research

  • White Papers // Apr 2013

    Source-to-Source Translation and Software Engineering

    Source-to-source translation of programs from one high level language to another has been shown to be an effective aid to programming in many cases. By the use of this approach, it is sometimes possible to produce software more cheaply and reliably. However, the full potential of this technique has not...

    Provided By Scientific Research

  • White Papers // Apr 2013

    Improved Enhanced Chain Based Energy Efficient Wireless Sensor Network

    In this paper, the authors have proposed an energy efficient chain based protocol which is an improvement over ECBSN (Energy efficient Chain Based Sensor Network). ECBSN protocol has certain deficiencies like the non optimal selection of leader nodes in rounds, aggregation and transmission of data by head nodes that leads...

    Provided By Scientific Research

  • White Papers // Apr 2013

    MED-BS Clustering Algorithm for the Small-Scale Wireless Sensor Networks

    With the spectacular progress of technology, the authors have witnessed the appearance of Wireless Sensor Networks (WSNs) in several fields. In a hospital for example, each patient will be provided with one or more wireless sensors that gather their physiological data and send them towards a base station to treat...

    Provided By Scientific Research

  • White Papers // Apr 2013

    Broadband Quasi-Yagi Antenna for WiFi and WiMax Applications

    Now-a-days, Quasi-Yagi antenna is widely used in wireless communication for its high directivity, high radiation efficiency, low cost, low profile, as well as easy to fabrication. In this paper, the authors present a broadband Quasi-Yagi antenna. Good impedance matching is obtained by using parasitic elements. The antenna has been designed...

    Provided By Scientific Research

  • White Papers // Apr 2013

    Reliability Analysis of Controller Area Network Based Systems - A Review

    In this paper, the authors review the research work done on the reliability analysis of Controller Area Network (CAN) based systems. During the last couple of decades, real-time researchers have extended schedulability analysis to a mature technique which for nontrivial systems can be used to determine whether a set of...

    Provided By Scientific Research

  • White Papers // Apr 2013

    UWB System Based on the Modified Gegenbauer Function in MISO Channel

    In this paper, the authors propose a new multi-user rake receiver, based on the interference mutualization with a matrix representation for Multiple Input Single Output (MISO) channel. The proposed system used the modified Gegenbauer functions in order to generate the signal and to ensure the multi users transmission system. The...

    Provided By Scientific Research

  • White Papers // Mar 2013

    Artificial Intelligence Based Model for Channel Status Prediction: A New Spectrum Sensing Technique for Cognitive Radio

    The recent phenomena of tremendous growth in wireless communication application urge increasing need of radio spectrum, albeit it being a precious but natural resource. The recent technology under development to overview the situation is the concept of Cognitive Radio (CR). Recently the Artificial Intelligence (AI) tools are being considered for...

    Provided By Scientific Research

  • White Papers // Mar 2013

    Hybrid Mapping Scheme for Recent Orthogonal FDMA Schemes

    Single-Carrier Frequency-Division Multiple Access (SC-FDMA) and Orthogonal Frequency Division Multiple Access (OFDMA) systems are new orthogonal multiple access systems. They have been adopted in the 3GPP Long Term Evolution (3GPP-LTE). In these systems, there are only two types of subcarrier mapping schemes which are the interleaved and the localized. So,...

    Provided By Scientific Research

  • White Papers // Mar 2013

    Clustering in Wireless Multimedia Sensor Networks Using Spectral Graph Partitioning

    Wireless Sensor Network (WSN) consists of hundreds or even thousands of sensor nodes that are powered by small irreplaceable batteries. The sensors, which are randomly deployed in an environment, should collect data from their surrounding, process the data and finally send it to the sink through multi hops. Wireless Multimedia...

    Provided By Scientific Research

  • White Papers // Mar 2013

    An Ad-Hoc Low Cost Wireless Sensor Network for Smart Gas Metering

    The monitoring of power consumption has become of a great interest in recent years as well as the innovative technologies available to realize Wireless Sensor Networks (WSNs) have experienced a great growth. While smart metering technologies for electric energy are already established, as sensors power supply comes directly from power...

    Provided By Scientific Research

  • White Papers // Mar 2013

    Collaborative Design Theory and Related Key Technology Study Based on Cloud Computing

    Analyzes the main way of product distribution for collaborative design. According to the requirement of manufacturing collaborative design, apply cloud computing in manufacturing collaborative design and come up the concept of product collaborative cloud design. Study the product collaborative design theory based on cloud computing and the general key technology...

    Provided By Scientific Research

  • White Papers // Mar 2013

    Using UML Behavioral Model to Support Aspect Oriented Model

    Aspect oriented software development is an emerging paradigm of software development. The notion of this technique is separation of concerns which means to implement each concern in a single object in object oriented programming but still there are concerns which are distributed on different objects and are called crosscutting concerns...

    Provided By Scientific Research

  • White Papers // Mar 2013

    Selection and Research for Online Registration System's Database System

    Based on the Online Registration System (ORS) characteristics and key technology analysis, this paper points out that that a good performance and high stability of the ORS lies in the choice of the system database. Database clustering technology which has merits such as concurrent processing, easy expansion, and high security...

    Provided By Scientific Research

  • White Papers // Mar 2013

    Identification and Check of Inconsistencies between UML Diagrams

    Relationships between Unified Modeling Language (UML) diagrams are complex. The complexity leads to inconsistencies between UML diagrams easily. This paper focus on how to identify and check inconsistencies between UML diagrams. 13 consistency rules are given to identify inconsistencies between the most frequent 6 types of UML diagrams in the...

    Provided By Scientific Research

  • White Papers // Mar 2013

    TCLOUD: A New Model of Data Storage Providing Public Verifiability and Dynamic Data Recovery for Cloud Computing

    Cloud computing is a new paradigm of computing and is considered to be the next generation of information technology infrastructure for an enterprise. The distributed architecture of cloud data storage facilitates the customer to get benefits from the greater quality of storage and minimized the operating cost. This technology also...

    Provided By Scientific Research

  • White Papers // Mar 2013

    HA-SLA: A Hierarchical Autonomic SLA Model for SLA Monitoring in Cloud Computing

    Service Level Agreement (SLA) is a fundamental contract between service consumer and service provider which defined the qualities of agreed service. After SLA contraction, it should be monitored during the service invocations to confirm the service level objectives. Most of SLA structure and monitoring frameworks are brought from SOA and...

    Provided By Scientific Research

  • White Papers // Feb 2013

    Probabilistic Energy Value for Clustering in Wireless Sensors Networks

    Wireless sensors networks consist of a number of sensors nodes connected through a wireless network that collect data to be treated locally or relayed to the sink node using multi-hop wireless transmission. Several solutions were pro-posed to minimize the amount of information flowing within the network. Clustering algorithms is one...

    Provided By Scientific Research

  • White Papers // Feb 2013

    A Novel Optical Control Plane for Switching an Electro-Optical Hybrid Node in Translucent WDM Optical Networks

    In a translucent network scenario, development of an Optical Control Plane (OCP) that is aware of the location and number of available regenerators and All-Optical Wavelength Converters (AOWCs) is of paramount importance. However, current Generalized MultiProtocol Label Switching (GMPLS) protocol suite does not consider the distribution of regenerator and AOWC...

    Provided By Scientific Research

  • White Papers // Feb 2013

    Stochastic Modeling of Database Backup Policy for a Computer System

    As the computer system has developed much in this highly information-oriented society, database security has become a very important problem and its backup strategies need to be made more efficiently and safety. The image copy method has been used as the most simple and dependable recovery mechanism for media failure....

    Provided By Scientific Research

  • White Papers // Feb 2013

    Numerical Methods for Solving Turbulent Flows by Using Parallel Technologies

    Parallel implementation of algorithm of numerical solution of Navier-Stokes equations for large eddy simulation (LES) of turbulence is presented in this research. The Dynamic Smagorinsky model is applied for sub-grid simulation of tur-bulence. The numerical algorithm was worked out using a scheme of splitting on physical parameters. At the first...

    Provided By Scientific Research

  • White Papers // Feb 2013

    Collision Resolution MAC Protocols for Wireless Ad Hoc Networks

    In wireless ad hoc networks, nodes cooperatively form a network without any infrastructure such as a BS/AP (Base Station or Access Point). The widely-used contention-based MAC protocol, IEEE 802.11b, is inefficient in multi-hop networks due to the hidden and exposed terminal problems. The most popular schedule-based MAC protocol, TDMA (Time...

    Provided By Scientific Research

  • White Papers // Feb 2013

    Fairness Assurance through TXOP Tuning in IEEE 802.11p Vehicle-to-Infrastructure Networks for Drive-Thru Internet Applications

    In this paper, the authors addresses an unfairness problem that exists among vehicles of distinct velocities in IEEE 802.11p based Vehicle-To-Infrastructure (V2I) networks used for drive-thru Internet applications. The standard IEEE 802.11p does not take into account, the residence time of vehicles within the coverage of each Road Side Unit...

    Provided By Scientific Research

  • White Papers // Feb 2013

    Multi-Source Spatial Data Distribution Model and System Implementation

    The multi-source spatial data distribution is based on WebGIS, and it is an important part of multi-source geographic information management system. A new multi-source spatial data distribution model is proposed on the basis of multi-source data storage model and by combining existing map distribution technology. The author developed a multi-source...

    Provided By Scientific Research

  • White Papers // Feb 2009

    A Genetic Based Fuzzy Q-Learning Flow Controller for High-Speed Networks

    For the congestion problems in high-speed networks, a genetic based fuzzy Q-learning flow controller is proposed. Because of the uncertainties and highly time-varying, it is not easy to accurately obtain the complete information for high-speed networks. In this case, the Q-learning, which is independent of mathematic model, and prior-knowledge, has...

    Provided By Scientific Research

  • White Papers // May 2009

    Cooperative Self Encoded Spread Spectrum in Fading Channels

    Self-Encoded Spread Spectrum (SESS) is a unique realization of random spread spectrum. SESS eliminates the need for the traditional transmitting and receiving PN code generators. Instead, the time varying, random spreading sequence is obtained from the data source. Cooperative Diversity (CD) has been attracting increasing attention as a novel and...

    Provided By Scientific Research

  • White Papers // May 2009

    MATLAB Simulink Simulation Platform for Photonic Transmission Systems

    High speed and ultra-high capacity optical communications have emerged as the essential techniques for backbone global information transmission networks. As the bit rate of the transmission system gets higher and higher 40 Gb/s to 100 Gb/s the modeling of proposed modulation techniques is very important so as to avoid costly...

    Provided By Scientific Research

  • White Papers // May 2009

    Geospatial Information Service Based on Ad Hoc Network

    With the development of electronic technology, especially in the fields of computer and internet technology, mobile communication has made a rapid progress in recent years. More and more mobile phones with powerful functions have emerged in users daily life. The mobile geospatial information service involves the domain of mobile communication,...

    Provided By Scientific Research

  • White Papers // May 2009

    Hierarchical Hypercube Based Pairwise Key Establishment Scheme for Sensor Networks

    Security schemes of pairwise key establishment, which enable sensors to communicate with each other securely, play a fundamental role in research on security issue in wireless sensor networks. A general framework for key predistribution is presented, based on the idea of KDC (Key Distribution Center) and polynomial pool schemes. By...

    Provided By Scientific Research

  • White Papers // May 2009

    Adaptive Processing Gain Data Services in Cellular CDMA in Presence of Soft Handoff with Truncated ARQ

    An adaptive data transmission scheme based on Variable Spreading Gain (VSG) is studied in cellular CDMA network in presence of soft Hand-Off (HO). The processing gain is varied according to traffic intensity meeting a requirement on data Bit Error Rate (BER). The overall performance improvement due to processing gain adaptation...

    Provided By Scientific Research

  • White Papers // May 2009

    Ubiquitous Media with UPnP and RFID-Based User Interfaces

    The evolution of systems and networks, including PDA, handhelds, mobile phones, WLAN, and Bluetooth provides users new scenarios for media presentation. Because of the growing number of such (personal) devices in the Personal Area Network of the user it is necessary to set up a system, in which the user...

    Provided By Scientific Research

  • White Papers // Jun 2009

    Device-to-Device Communication Underlaying Cellular Communications Systems

    In this paper, the authors propose to facilitate local Peer-To-Peer communication by a Device-To-Device (D2D) radio that operates as an underlay network to an IMT-Advanced cellular network. It is expected that local services may utilize mobile Peer-To-Peer communication instead of central server based communication for rich multimedia services. The main...

    Provided By Scientific Research

  • White Papers // Jun 2009

    An Improved Power Estimation for Mobile Satellite Communication Systems

    In this paper, in order to increase system capacity and reduce the transmitting power of the user's equipment, the authors propose a efficient power estimation algorithm consisting of a modified Open-Loop Power Control (OLPC) and Closed-Loop Power Control (CLPC) for mobile satellite communications systems. The improved CLPC scheme, combining delay...

    Provided By Scientific Research

  • White Papers // Jun 2009

    Fast and Noniterative Scheduling in Input-Queued Switches

    Most high-end switches use an input-queued or a combined input- and output-queued architecture. The switch fabrics of these architectures commonly use an iterative scheduling system such as iSLIP. Iterative schedulers are not very scalable and can be slow. The authors propose a new scheduling algorithm that finds a maximum matching...

    Provided By Scientific Research

  • White Papers // Jun 2009

    On the Performance of Traffic Locality Oriented Route Discovery Algorithm with Delay

    In MANETs, traffic may follow certain pattern that is not necessarily spatial or temporal but rather to follow special needs as a part of group for collaboration purposes. The source node tends to communicate with a certain set of nodes more than others regardless of their location exhibiting traffic locality...

    Provided By Scientific Research

  • White Papers // Jun 2009

    A Novel Approach to Improve the Security of P2P File-Sharing Systems

    The recent and unprecedented surge of public interest in Peer-To-Peer (P2P) file-sharing systems has led to a variety of interesting research questions. How to minimize threats in such an open community is an important research topic. Trust models have been widely used in estimating the trustworthiness of peers in P2P...

    Provided By Scientific Research

  • White Papers // Jul 2009

    Self-Encoded Multiple Access Multiuser Convolutional Codes in Uplink and Downlink Cellular Systems

    Self-encoded spread spectrum eliminates the need for traditional Pseudo Noise (PN) code generators. In a Self-Encoded Multiple Access (SEMA) system, the number of users is not limited by the number of available sequences, unlike Code Division Multiple Access (CDMA) systems that employ PN codes such as m-, Gold or Kassami...

    Provided By Scientific Research

  • White Papers // Jul 2009

    True Random Bit Generator Using ZCDPLL Based on TMS320C6416

    A True Random Binary Generator (TRBG) based on a Zero Crossing Digital Phase-Locked Loop (ZCDPLL) is proposed. In order to face the challenges of using the proposed TRBG in cryptography, the proposed TRBG is subjected to the AIS 31 test suite. The ZCDPLL operate as chaotic generator for certain loop...

    Provided By Scientific Research

  • White Papers // Jul 2009

    Investigations into the Effect of Spatial Correlation on Channel Estimation and Capacity of Multiple Input Multiple Output System

    The paper reports on investigations into the effect of spatial correlation on channel estimation and capacity of a Multiple Input Multiple Output (MIMO) wireless communication system. Least Square (LS), Scaled Least Square (SLS) and Minimum Mean Square Error (MMSE) methods are considered for estimating channel properties of a MIMO system...

    Provided By Scientific Research

  • White Papers // Jul 2009

    BER Performance of Space-Time Coded MMSE DFE for Wideband Code Division Multiple Access (WCDMA)

    In recent times, there has been growing interests in integration of voice, data and video traffic in wireless communication networks. With these growing interests, WCDMA has immerged as an attractive access technique. The performance of WCDMA system is deteriorated in presence of multipath fading environment. The paper presents space-time coded...

    Provided By Scientific Research

  • White Papers // Jul 2009

    Optimal Positions of Relay Stations for Cluster-Based Two-Hop Cellular Network

    Multihop cellular networks is an exciting and a fledgling area of wireless communication which offers huge potential in terms of coverage enhancement, data-rates, power reduction, and various other quality of service improvements. However, resource allocation in MCN is an NP-hard problem. Hence, significant research needs to be done in this...

    Provided By Scientific Research

  • White Papers // Dec 2012

    A Scalable and Robust DHT Protocol for Structured P2P Network

    Distributed Hash Tables (DHTs) were originated from the design of structured Peer-To-Peer (P2P) systems. A DHT provides a key-based lookup service similar to a hash table. In this paper, the authors present the detailed design of a new DHT protocol, Tambour. The novelty of the protocol is that it uses...

    Provided By Scientific Research

  • White Papers // Dec 2012

    Modeling Components and Services of LTE Mobile Communications System

    The latest wireless broadband network standard is LTE (Long Term Evolution) which is developed by 3GPP (3rd Generation Partnership Project). It will enable mobile devices such as smart phones, tablets and laptops to access Internet at a very high speed along with lots of multimedia services. There are many issues...

    Provided By Scientific Research

  • White Papers // Dec 2012

    Simulation & Performance Evaluation of QoS Routing Protocol for Adhoc Networks Using Directional Communication

    A wireless ad-hoc network is a self-organized wireless network without fixed or backbone infrastructure. All nodes have routing capability and use peer-to-peer packet transmission or forward packets to other node using multi hop communication. Now-a-days Mobile Ad-hoc NETworks are being used for different applications and traffics, so it require Quality...

    Provided By Scientific Research

  • White Papers // Dec 2012

    Cryptanalysis of the Double-Moduli Cryptosystem

    In this paper, the authors present a lattice attack done on a NTRU-like scheme introduced by Verkhovsky in. They show how, based on the relation between the public and private key, they can construct an attack which allows any passive adversary to decrypt the encrypted messages. They explain, step by...

    Provided By Scientific Research

  • White Papers // Dec 2012

    Towards Cloud to Device Push Messaging on Android: Technologies, Possibilities and Challenges

    In this paper, the authors look at different push messaging alternatives available for Android. Push messaging provides an important aspect of server to device communication and they specifically focus on the integration of cloud computing with mobile devices through the use of push-based technologies. By conducting a benchmarking test, they...

    Provided By Scientific Research

  • White Papers // Dec 2012

    Improvement of the Round Key Generation of AES

    In modern society, computer network has already been covered. In people's daily lives, the information technology industries have become ubiquitous. In the civil and military, commercial's security which is playing an important role is very prominent. The key generation algorithm of AES was introduced, the weaknesses of the key generation...

    Provided By Scientific Research

  • White Papers // Nov 2012

    Deterministic Algorithm Computing All Generators: Application in Cryptographic Systems Design

    Primitive elements play important roles in the Diffie-Hellman protocol for establishment of secret communication keys, in the design of the ElGamal cryptographic system and as generators of pseudo-random numbers. In general, a deterministic algorithm that searches for primitive elements is currently unknown. In information-hiding schemes, where a primitive element is...

    Provided By Scientific Research

  • White Papers // Nov 2012

    The Research on QoS Model Design in Mobile Ad Hoc Networks

    Wireless Ad Hoc Networks is a special kind of wireless communication network. With the great development of multimedia applications, how to provide QoS guarantee in the MAC layer is the hot topic in wireless ad hoc network (MANET). This paper designed a QoS model in MANET. The feasibility and reliability...

    Provided By Scientific Research

  • White Papers // Nov 2012

    Global Electronic Dominance with Spatial Grasp

    A high-level control technology will be revealed that can dynamically establish overwhelming dominance over distributed networked systems with embedded electronic devices and any communications between them. It is based on implanting of universal control modules (that may be concealed) into key system points which collectively interpret complex but compact mission...

    Provided By Scientific Research

  • White Papers // Nov 2012

    Employing Power Allocation to Enhance Zero Forcing Scheme Advantages over Multi-Antenna Multiple Relay Networks

    A Multi-Antenna Multiple Relay (MAMR) network is considered and a variation of two-hop zero-forcing amplify-forward relaying method is proposed. Deploying ZF method together with application of diagonal power allocation matrices at the relays, it is shown that the overall MAMR network is simplified to M independent Single Antenna Multiple Relay...

    Provided By Scientific Research

  • White Papers // Jan 2012

    A Generic Service Architecture for Secure Ubiquitous Computing Systems

    The development of ubiquitous computing systems benefits tremendously from the service-oriented computing concept in seamless interoperation of heterogeneous devices. However, architectures, services interfaces and network implementation of the existing service-oriented systems differ case by case. Furthermore, many systems lack the capability of being applied to resource constrained devices, for example,...

    Provided By Scientific Research

  • White Papers // Jan 2012

    Secure Cooperative Spectrum Sensing based on the Distance Between Bodies of Evidence

    In Cognitive Radio (CR) networks, unlicensed secondary users need to conduct spectrum sensing to gain access to a licensed spectrum band. And cooperation among CR users will solve the problems caused by multipath fading and shadowing. In this paper, the authors propose a multi-threshold method at local nodes to cope...

    Provided By Scientific Research

  • White Papers // Jan 2012

    Content-Based Image Unequal Error Protection Strategies for an Open Loop MIMO System

    In this paper, the authors deals with strategies for optimizing the transmission of JPEG2000 coded images over a MIMO quasi-static Rayleigh fading channel, by exploiting different available MIMO STBC (Space Time Block Codes), as well as the image content to be transmitted. The aim is to propose a link adaptation...

    Provided By Scientific Research

  • White Papers // Dec 2011

    LDPC-Coded OFDM Transmission Based on Adaptive Power Weights in Cognitive Radio Systems

    In this paper, the authors propose a new scheme to improve the performance of an LDPC-coded OFDM based Cognitive Radio (CR) link by applying adaptive power weights. To minimize estimation errors of detected signals in all the CR subcarriers, power weights are allocated to the CR subcarriers at the secondary...

    Provided By Scientific Research

  • White Papers // Dec 2011

    Improved Authentication Accuracy by Individually Set Orders of the Fractional Fourier Transform and Effects of Damage of Fingerprint Image on Authentication Accuracy

    Recently, ubiquitous personal devices with a fingerprint authentication function have been increasing. In such devices, there is almost no possibility of the authentication by impostors unless they are lost or stolen. However, for example, in the management of entering and leaving a building, not only the fingerprint authentication device but...

    Provided By Scientific Research

  • White Papers // Dec 2011

    Biometric Signature of Private Key by Reliable Iris Recognition Based on Flexible-ICA Algorithm

    The numerical world is under a fast development generating facilities and threats. The recommended solutions are especially the protection of information in all its states. The levels of protection show a discrepancy from an application to another; governmental, commercial or even cybercriminal. The infrastructure used in modern cryptography is based...

    Provided By Scientific Research

  • White Papers // Dec 2011

    Towards Cloud Management by Autonomic Manager Collaboration

    The management of clouds comprised of hundreds of hosts and virtual machines present challenging problems to administrators in ensuring that performance agreements are met and that resources are efficiently utilized. Automated approaches can help in managing such environments. Autonomic managers using policy-based management can provide a useful approach to such...

    Provided By Scientific Research

  • White Papers // Dec 2011

    IaaS Public Cloud Computing Platform Scheduling Model and Optimization Analysis

    IaaS (Infrastructure as a Platform) public cloud is one mainstream service mode for public cloud computing. The design aim of one IaaS public cloud is to enlarge the hardware-usage of whole platform, optimize the virtual machine deployment and enhance the accept rate of service demand. In this paper, the authors...

    Provided By Scientific Research

  • White Papers // Nov 2011

    Algorithms for Integer Factorization Based on Counting Solutions of Various Modular Equations

    In this paper, the author presents a logical continuation of the author's recently-published paper. Security of modern communication based on RSA cryptographic protocols and their analogues is as crypto-immune as integer Factorization (iFac) is difficult. In this paper, the author considered enhanced algorithms for the iFac that are faster than...

    Provided By Scientific Research

  • White Papers // Nov 2011

    A Topology-Based Conflict Detection System for Firewall Policies Using Bit-Vector-Based Spatial Calculus

    Firewalls use packet filtering to either accept or deny packets on the basis of a set of predefined rules called filters. The firewall forms the initial layer of defense and protects the network from unauthorized access. However, maintaining firewall policies is always an error prone task, because the policies are...

    Provided By Scientific Research

  • White Papers // Nov 2011

    High-Gain Array Antenna Based on Composite Right/Left-Handed Transmission Line

    Electromagnetic meta-materials are effectively homogeneous artificial structures engineered to provide electromagnetic properties not readily observable in nature, such as, an index of refraction that may be negative, less than one, or modulated in a graded manner. In this paper, a meta-material-inspired antenna with high gain and good directivity is designed....

    Provided By Scientific Research

  • White Papers // Nov 2011

    Multilayer Hex-Cells: A New Class of Hex-Cell Interconnection Networks for Massively Parallel Systems

    Scalability is an important issue in the design of interconnection networks for massively parallel systems. In this paper, a scalable class of interconnection network of Hex-Cell for massively parallel systems is introduced. It is called Multi-Layer Hex-Cell (MLH). A node addressing scheme and routing algorithm are also presented and discussed....

    Provided By Scientific Research

  • White Papers // Nov 2011

    Analysis of Computer Network Reliability and Criticality: Technique and Features

    In this paper, the authors describes modern technologies of computer network reliability. Software tool is developed to estimate of the CCN critical failure probability (construction of a criticality matrix) by results of the FME(C)A-technique. The internal information factors, such as collisions and congestion of switchboards, routers and servers, influence on...

    Provided By Scientific Research