Scientific Research

Displaying 161-200 of 595 results

  • White Papers // Apr 2013

    Lognormal Process Software Reliability Modeling with Testing-Effort

    The authors propose a software reliability growth model with testing-effort based on a continuous-state space stochastic process, such as a lognormal process, and conduct its goodness-of-fit evaluation. They also discuss a parameter estimation method of their model. Then, they derive several software reliability assessment measures by the probability distribution of...

    Provided By Scientific Research

  • White Papers // Apr 2013

    Source-to-Source Translation and Software Engineering

    Source-to-source translation of programs from one high level language to another has been shown to be an effective aid to programming in many cases. By the use of this approach, it is sometimes possible to produce software more cheaply and reliably. However, the full potential of this technique has not...

    Provided By Scientific Research

  • White Papers // Apr 2013

    Improved Enhanced Chain Based Energy Efficient Wireless Sensor Network

    In this paper, the authors have proposed an energy efficient chain based protocol which is an improvement over ECBSN (Energy efficient Chain Based Sensor Network). ECBSN protocol has certain deficiencies like the non optimal selection of leader nodes in rounds, aggregation and transmission of data by head nodes that leads...

    Provided By Scientific Research

  • White Papers // Apr 2013

    MED-BS Clustering Algorithm for the Small-Scale Wireless Sensor Networks

    With the spectacular progress of technology, the authors have witnessed the appearance of Wireless Sensor Networks (WSNs) in several fields. In a hospital for example, each patient will be provided with one or more wireless sensors that gather their physiological data and send them towards a base station to treat...

    Provided By Scientific Research

  • White Papers // Apr 2013

    Broadband Quasi-Yagi Antenna for WiFi and WiMax Applications

    Now-a-days, Quasi-Yagi antenna is widely used in wireless communication for its high directivity, high radiation efficiency, low cost, low profile, as well as easy to fabrication. In this paper, the authors present a broadband Quasi-Yagi antenna. Good impedance matching is obtained by using parasitic elements. The antenna has been designed...

    Provided By Scientific Research

  • White Papers // Apr 2013

    Reliability Analysis of Controller Area Network Based Systems - A Review

    In this paper, the authors review the research work done on the reliability analysis of Controller Area Network (CAN) based systems. During the last couple of decades, real-time researchers have extended schedulability analysis to a mature technique which for nontrivial systems can be used to determine whether a set of...

    Provided By Scientific Research

  • White Papers // Apr 2013

    UWB System Based on the Modified Gegenbauer Function in MISO Channel

    In this paper, the authors propose a new multi-user rake receiver, based on the interference mutualization with a matrix representation for Multiple Input Single Output (MISO) channel. The proposed system used the modified Gegenbauer functions in order to generate the signal and to ensure the multi users transmission system. The...

    Provided By Scientific Research

  • White Papers // Mar 2013

    Artificial Intelligence Based Model for Channel Status Prediction: A New Spectrum Sensing Technique for Cognitive Radio

    The recent phenomena of tremendous growth in wireless communication application urge increasing need of radio spectrum, albeit it being a precious but natural resource. The recent technology under development to overview the situation is the concept of Cognitive Radio (CR). Recently the Artificial Intelligence (AI) tools are being considered for...

    Provided By Scientific Research

  • White Papers // Mar 2013

    Hybrid Mapping Scheme for Recent Orthogonal FDMA Schemes

    Single-Carrier Frequency-Division Multiple Access (SC-FDMA) and Orthogonal Frequency Division Multiple Access (OFDMA) systems are new orthogonal multiple access systems. They have been adopted in the 3GPP Long Term Evolution (3GPP-LTE). In these systems, there are only two types of subcarrier mapping schemes which are the interleaved and the localized. So,...

    Provided By Scientific Research

  • White Papers // Mar 2013

    Clustering in Wireless Multimedia Sensor Networks Using Spectral Graph Partitioning

    Wireless Sensor Network (WSN) consists of hundreds or even thousands of sensor nodes that are powered by small irreplaceable batteries. The sensors, which are randomly deployed in an environment, should collect data from their surrounding, process the data and finally send it to the sink through multi hops. Wireless Multimedia...

    Provided By Scientific Research

  • White Papers // Mar 2013

    An Ad-Hoc Low Cost Wireless Sensor Network for Smart Gas Metering

    The monitoring of power consumption has become of a great interest in recent years as well as the innovative technologies available to realize Wireless Sensor Networks (WSNs) have experienced a great growth. While smart metering technologies for electric energy are already established, as sensors power supply comes directly from power...

    Provided By Scientific Research

  • White Papers // Mar 2013

    Collaborative Design Theory and Related Key Technology Study Based on Cloud Computing

    Analyzes the main way of product distribution for collaborative design. According to the requirement of manufacturing collaborative design, apply cloud computing in manufacturing collaborative design and come up the concept of product collaborative cloud design. Study the product collaborative design theory based on cloud computing and the general key technology...

    Provided By Scientific Research

  • White Papers // Mar 2013

    Using UML Behavioral Model to Support Aspect Oriented Model

    Aspect oriented software development is an emerging paradigm of software development. The notion of this technique is separation of concerns which means to implement each concern in a single object in object oriented programming but still there are concerns which are distributed on different objects and are called crosscutting concerns...

    Provided By Scientific Research

  • White Papers // Mar 2013

    Selection and Research for Online Registration System's Database System

    Based on the Online Registration System (ORS) characteristics and key technology analysis, this paper points out that that a good performance and high stability of the ORS lies in the choice of the system database. Database clustering technology which has merits such as concurrent processing, easy expansion, and high security...

    Provided By Scientific Research

  • White Papers // Mar 2013

    Identification and Check of Inconsistencies between UML Diagrams

    Relationships between Unified Modeling Language (UML) diagrams are complex. The complexity leads to inconsistencies between UML diagrams easily. This paper focus on how to identify and check inconsistencies between UML diagrams. 13 consistency rules are given to identify inconsistencies between the most frequent 6 types of UML diagrams in the...

    Provided By Scientific Research

  • White Papers // Mar 2013

    TCLOUD: A New Model of Data Storage Providing Public Verifiability and Dynamic Data Recovery for Cloud Computing

    Cloud computing is a new paradigm of computing and is considered to be the next generation of information technology infrastructure for an enterprise. The distributed architecture of cloud data storage facilitates the customer to get benefits from the greater quality of storage and minimized the operating cost. This technology also...

    Provided By Scientific Research

  • White Papers // Feb 2013

    Probabilistic Energy Value for Clustering in Wireless Sensors Networks

    Wireless sensors networks consist of a number of sensors nodes connected through a wireless network that collect data to be treated locally or relayed to the sink node using multi-hop wireless transmission. Several solutions were pro-posed to minimize the amount of information flowing within the network. Clustering algorithms is one...

    Provided By Scientific Research

  • White Papers // Feb 2013

    A Novel Optical Control Plane for Switching an Electro-Optical Hybrid Node in Translucent WDM Optical Networks

    In a translucent network scenario, development of an Optical Control Plane (OCP) that is aware of the location and number of available regenerators and All-Optical Wavelength Converters (AOWCs) is of paramount importance. However, current Generalized MultiProtocol Label Switching (GMPLS) protocol suite does not consider the distribution of regenerator and AOWC...

    Provided By Scientific Research

  • White Papers // Feb 2013

    Stochastic Modeling of Database Backup Policy for a Computer System

    As the computer system has developed much in this highly information-oriented society, database security has become a very important problem and its backup strategies need to be made more efficiently and safety. The image copy method has been used as the most simple and dependable recovery mechanism for media failure....

    Provided By Scientific Research

  • White Papers // Feb 2013

    Numerical Methods for Solving Turbulent Flows by Using Parallel Technologies

    Parallel implementation of algorithm of numerical solution of Navier-Stokes equations for large eddy simulation (LES) of turbulence is presented in this research. The Dynamic Smagorinsky model is applied for sub-grid simulation of tur-bulence. The numerical algorithm was worked out using a scheme of splitting on physical parameters. At the first...

    Provided By Scientific Research

  • White Papers // Feb 2013

    Collision Resolution MAC Protocols for Wireless Ad Hoc Networks

    In wireless ad hoc networks, nodes cooperatively form a network without any infrastructure such as a BS/AP (Base Station or Access Point). The widely-used contention-based MAC protocol, IEEE 802.11b, is inefficient in multi-hop networks due to the hidden and exposed terminal problems. The most popular schedule-based MAC protocol, TDMA (Time...

    Provided By Scientific Research

  • White Papers // Feb 2013

    Fairness Assurance through TXOP Tuning in IEEE 802.11p Vehicle-to-Infrastructure Networks for Drive-Thru Internet Applications

    In this paper, the authors addresses an unfairness problem that exists among vehicles of distinct velocities in IEEE 802.11p based Vehicle-To-Infrastructure (V2I) networks used for drive-thru Internet applications. The standard IEEE 802.11p does not take into account, the residence time of vehicles within the coverage of each Road Side Unit...

    Provided By Scientific Research

  • White Papers // Feb 2013

    Multi-Source Spatial Data Distribution Model and System Implementation

    The multi-source spatial data distribution is based on WebGIS, and it is an important part of multi-source geographic information management system. A new multi-source spatial data distribution model is proposed on the basis of multi-source data storage model and by combining existing map distribution technology. The author developed a multi-source...

    Provided By Scientific Research

  • White Papers // Feb 2013

    Faster Method for Secure Transmission of Information with Sender Identification

    In this paper, the authors describes an algorithm for secure transmission of information via open communication channels based on the discrete logarithm problem. The proposed algorithm also provides sender identification (digital signature). It is twice as fast as the RSA algorithm and requires fifty per cent fewer exponentiations than the...

    Provided By Scientific Research

  • White Papers // Feb 2013

    A New Approach for Wireless Cellular Network Design

    Wise arrangement of antennas is critical in wireless cellular systems for both reduction of Co-Channel Interference (CCI) and increase the Quality of Service (QoS). In this paper, a novel architecture for antenna arrangement in CDMA wireless cellular systems is presented. In this architecture that the authors called Microzone, every cell...

    Provided By Scientific Research

  • White Papers // Feb 2013

    Efficient Spam Filtering System Based on Smart Cooperative Subjective and Objective Methods

    Most of the spam filtering techniques are based on objective methods such as the content filtering and DNS/reverse DNS checks. Recently, some cooperative subjective spam filtering techniques are proposed. Objective methods suffer from the false positive and false negative classification. Objective methods based on the content filtering are time consuming...

    Provided By Scientific Research

  • White Papers // Feb 2013

    Traffic-Distributed Clustering Scheme for Cluster-Based WSNs with Various Non-Uniform Traffic Fluctuations

    In Wireless Sensor Networks (WSNs), it is essential to save energy consumption at Sensor Nodes (SNs). A clustering technique is one of the approaches to save energy consumption, where several neighboring SNs form a cluster and transmit the sensed data to their Cluster Head (CH), and then the CH sends...

    Provided By Scientific Research

  • White Papers // Feb 2013

    Multi-Agent Architecture for the Design of WSN Applications

    Complex and distributed systems are more and more associated with the application of WSN (Wireless Sensor Network) technology. The design of such applications presents important challenges and requires the assistance of several methodologies and tools. Multi-Agent Systems (MAS) have been identified as one of the most suitable technologies to con-tribute...

    Provided By Scientific Research

  • White Papers // Jan 2013

    QoS Bandwidth Estimation Scheme for Delay Sensitive Applications in MANETs

    For last few years, Mobile Ad-hoc NETworks (MANETs) have attracted a great interest in case of wireless and multimedia technologies. Infrastructure less nature of MANETs makes Quality of Service (QoS) provisioning very challenging and important research aspect. To find a QoS constrained route from source to destination, the authors should...

    Provided By Scientific Research

  • White Papers // Jan 2013

    Public-Key Cryptosystems with Secret Encryptor and Digital Signature

    In this paper, the authors describe and compares a variety of algorithms for secure transmission of information via open communication channels based on the discrete logarithm problem that do not require search for a generator (primitive element). Modifications that simplify the cryptosystem are proposed, and, as a result, accelerate its...

    Provided By Scientific Research

  • White Papers // Jan 2013

    Hybrid Real-Time and Preset Processing for Indoor Radio Geo-Location in Dense Multipath Environments

    The existence of various geo-location applications and their accuracy requirements enhance the necessities for suitable processing techniques to solve the indoor geo-location problems. Since, Impulse Radio Ultra-WideBand (IR-UWB) signals have very short duration pulses; they can provide very accurate ranging and geo-location capability in short range indoor radio propagation environments....

    Provided By Scientific Research

  • White Papers // Jan 2013

    Optimizing Operating Cost of an Intrusion Detection System

    Very often it so happens that the cost of operating an Intrusion Detection System (IDS) exceeds the cost of purchasing the IDS itself. In such cases, regular operation and maintenance of the system becomes expensive. Thus, it becomes essential to reduce the operating cost of the IDS without compromising on...

    Provided By Scientific Research

  • White Papers // Jan 2013

    A Novel Decoder Based on Parallel Genetic Algorithms for Linear Block Codes

    Genetic algorithms offer very good performances for solving large optimization problems, especially in the domain of error-correcting codes. However, they have a major drawback related to the time complexity and memory occupation when running on a uniprocessor computer. This paper proposes a parallel decoder for linear block codes, using Parallel...

    Provided By Scientific Research

  • White Papers // Dec 2012

    Simple GUI Wireless Controller of Quadcopter

    This paper presents the development of remotely operated Quadcopter system. The Quadcopter is controlled through a Graphical User Interface (GUI) where the communication between GUI and Quadcopter is constructed by using wireless communication system. The Quadcopter balancing condition is sensed by FY90 controller and IMU 5DOF sensor. For smooth landing,...

    Provided By Scientific Research

  • White Papers // Dec 2012

    A New Method for Sensing Cognitive Radio Network under Malicious Attacker

    Cognitive radio has been designed for solving the problem of spectrum scarcity by using the spectrum of primary users who don't use their spectrum on that time. For sensing the spectrum, collaborative spectrum sensing has been utilized because of robustness. In this paper, a new collaborative spectrum method is proposed...

    Provided By Scientific Research

  • White Papers // Dec 2012

    Performance Analysis of Hybrid MAC Protocol for Cognitive Radio Networks

    The rapid growth in demand for broadband wireless services coupled with the recent developmental work on wireless communications technology and the static allocation of the spectrum have led to the artificial scarcity of the radio spectrum. The traditional command and control model (Static allocation) of spectrum allocation policy allows for...

    Provided By Scientific Research

  • White Papers // Dec 2012

    Scalable Incremental Network Programming for Multihop Wireless Sensors

    The authors present a network programming mechanism that can flexibly and quickly re-task a large multi-hop network of wireless sensor nodes. Their mechanism allows each sensor node to be incrementally reprogrammed with heterogeneous images of native program code using Rsync block comparison algorithm, point-to-point routing with the BLIP IPv6 stack,...

    Provided By Scientific Research

  • White Papers // Dec 2012

    Research of Web Real-Time Communication Based on Web Socket

    Regarding the limitations of traditional web real-time communication solutions such as polling, long-polling, flash plug-in, propose that using new coming Web Socket technology in the web real-time communication field, introduce the features of web socket technology, analysis the difference between web socket protocol and HTTP protocol, offer an approach to...

    Provided By Scientific Research

  • White Papers // Dec 2012

    A Scalable and Robust DHT Protocol for Structured P2P Network

    Distributed Hash Tables (DHTs) were originated from the design of structured Peer-To-Peer (P2P) systems. A DHT provides a key-based lookup service similar to a hash table. In this paper, the authors present the detailed design of a new DHT protocol, Tambour. The novelty of the protocol is that it uses...

    Provided By Scientific Research

  • White Papers // Dec 2012

    Modeling Components and Services of LTE Mobile Communications System

    The latest wireless broadband network standard is LTE (Long Term Evolution) which is developed by 3GPP (3rd Generation Partnership Project). It will enable mobile devices such as smart phones, tablets and laptops to access Internet at a very high speed along with lots of multimedia services. There are many issues...

    Provided By Scientific Research

  • White Papers // Sep 2009

    TCP-R with EPDN: Handling out of Order Packets in Error Prone Satellite Networks

    In this paper, the authors have shown that packet reordering is common, especially in satellite networks where there are link level retransmissions and multipath routing. Moreover, traditional satellite networks exhibit high corruption rates causing packet losses. Reordering and corruption of packets decrease the TCP performance of a network, mainly because...

    Provided By Scientific Research

  • White Papers // Feb 2009

    Game Theoretic Analysis of Joint Rate and Power Allocation in Cognitive Radio Networks

    Spectrum sharing is an essential enabling functionality to allow the coexistence between Primary User (PU) and Cognitive Users (CUs) in the same frequency band. In this paper, the authors consider joint rate and power allocation in cognitive radio networks by using game theory. The optimum rates and powers are obtained...

    Provided By Scientific Research

  • White Papers // Feb 2009

    Synchronous Dynamic Adjusting: An Anti-Collision Algorithm for an RF-UCard System

    An RF-UCard system is a contactless smartcard system with multiple chip operating systems and multiple applications. A multi-card collision occurs when more than one card within the reader's read field and thus lowers the efficiency of the system. This paper presents a novel and enhanced algorithm to solve the multi-card...

    Provided By Scientific Research

  • White Papers // Feb 2009

    Performance Analysis of Sub-Rating for Handoff Calls in HCN

    Hierarchical Cellular Networks (HCN) offer more efficient channel utilization and better Quality of Service (QoS) under the high tele-traffic condition compared to the single-tier system. One of the important measures of QoS in HCN as in any single-tier system is the handoff dropping rate. Although the existing approaches such as...

    Provided By Scientific Research

  • White Papers // Feb 2009

    On the Scalable Fairness and Efficient Active Queue Management of RED

    Internet routers generally see packets from a fast flow more often than a slow flow. This suggests that network fairness may be improved without per-flow information. In this paper, the authors propose a scheme using Most Recently Used List (MRUL)-a list storing statistics of limited active flows that sorted in...

    Provided By Scientific Research

  • White Papers // Feb 2009

    A Genetic Based Fuzzy Q-Learning Flow Controller for High-Speed Networks

    For the congestion problems in high-speed networks, a genetic based fuzzy Q-learning flow controller is proposed. Because of the uncertainties and highly time-varying, it is not easy to accurately obtain the complete information for high-speed networks. In this case, the Q-learning, which is independent of mathematic model, and prior-knowledge, has...

    Provided By Scientific Research

  • White Papers // May 2009

    Cooperative Self Encoded Spread Spectrum in Fading Channels

    Self-Encoded Spread Spectrum (SESS) is a unique realization of random spread spectrum. SESS eliminates the need for the traditional transmitting and receiving PN code generators. Instead, the time varying, random spreading sequence is obtained from the data source. Cooperative Diversity (CD) has been attracting increasing attention as a novel and...

    Provided By Scientific Research

  • White Papers // May 2009

    MATLAB Simulink Simulation Platform for Photonic Transmission Systems

    High speed and ultra-high capacity optical communications have emerged as the essential techniques for backbone global information transmission networks. As the bit rate of the transmission system gets higher and higher 40 Gb/s to 100 Gb/s the modeling of proposed modulation techniques is very important so as to avoid costly...

    Provided By Scientific Research

  • White Papers // May 2009

    Geospatial Information Service Based on Ad Hoc Network

    With the development of electronic technology, especially in the fields of computer and internet technology, mobile communication has made a rapid progress in recent years. More and more mobile phones with powerful functions have emerged in users daily life. The mobile geospatial information service involves the domain of mobile communication,...

    Provided By Scientific Research

  • White Papers // May 2009

    Hierarchical Hypercube Based Pairwise Key Establishment Scheme for Sensor Networks

    Security schemes of pairwise key establishment, which enable sensors to communicate with each other securely, play a fundamental role in research on security issue in wireless sensor networks. A general framework for key predistribution is presented, based on the idea of KDC (Key Distribution Center) and polynomial pool schemes. By...

    Provided By Scientific Research

  • White Papers // May 2009

    Adaptive Processing Gain Data Services in Cellular CDMA in Presence of Soft Handoff with Truncated ARQ

    An adaptive data transmission scheme based on Variable Spreading Gain (VSG) is studied in cellular CDMA network in presence of soft Hand-Off (HO). The processing gain is varied according to traffic intensity meeting a requirement on data Bit Error Rate (BER). The overall performance improvement due to processing gain adaptation...

    Provided By Scientific Research

  • White Papers // May 2009

    Ubiquitous Media with UPnP and RFID-Based User Interfaces

    The evolution of systems and networks, including PDA, handhelds, mobile phones, WLAN, and Bluetooth provides users new scenarios for media presentation. Because of the growing number of such (personal) devices in the Personal Area Network of the user it is necessary to set up a system, in which the user...

    Provided By Scientific Research

  • White Papers // Jun 2009

    Device-to-Device Communication Underlaying Cellular Communications Systems

    In this paper, the authors propose to facilitate local Peer-To-Peer communication by a Device-To-Device (D2D) radio that operates as an underlay network to an IMT-Advanced cellular network. It is expected that local services may utilize mobile Peer-To-Peer communication instead of central server based communication for rich multimedia services. The main...

    Provided By Scientific Research

  • White Papers // Jun 2009

    An Improved Power Estimation for Mobile Satellite Communication Systems

    In this paper, in order to increase system capacity and reduce the transmitting power of the user's equipment, the authors propose a efficient power estimation algorithm consisting of a modified Open-Loop Power Control (OLPC) and Closed-Loop Power Control (CLPC) for mobile satellite communications systems. The improved CLPC scheme, combining delay...

    Provided By Scientific Research

  • White Papers // Jun 2009

    Fast and Noniterative Scheduling in Input-Queued Switches

    Most high-end switches use an input-queued or a combined input- and output-queued architecture. The switch fabrics of these architectures commonly use an iterative scheduling system such as iSLIP. Iterative schedulers are not very scalable and can be slow. The authors propose a new scheduling algorithm that finds a maximum matching...

    Provided By Scientific Research

  • White Papers // Jun 2009

    On the Performance of Traffic Locality Oriented Route Discovery Algorithm with Delay

    In MANETs, traffic may follow certain pattern that is not necessarily spatial or temporal but rather to follow special needs as a part of group for collaboration purposes. The source node tends to communicate with a certain set of nodes more than others regardless of their location exhibiting traffic locality...

    Provided By Scientific Research

  • White Papers // Jun 2009

    A Novel Approach to Improve the Security of P2P File-Sharing Systems

    The recent and unprecedented surge of public interest in Peer-To-Peer (P2P) file-sharing systems has led to a variety of interesting research questions. How to minimize threats in such an open community is an important research topic. Trust models have been widely used in estimating the trustworthiness of peers in P2P...

    Provided By Scientific Research

  • White Papers // Jul 2009

    Self-Encoded Multiple Access Multiuser Convolutional Codes in Uplink and Downlink Cellular Systems

    Self-encoded spread spectrum eliminates the need for traditional Pseudo Noise (PN) code generators. In a Self-Encoded Multiple Access (SEMA) system, the number of users is not limited by the number of available sequences, unlike Code Division Multiple Access (CDMA) systems that employ PN codes such as m-, Gold or Kassami...

    Provided By Scientific Research

  • White Papers // Jul 2009

    True Random Bit Generator Using ZCDPLL Based on TMS320C6416

    A True Random Binary Generator (TRBG) based on a Zero Crossing Digital Phase-Locked Loop (ZCDPLL) is proposed. In order to face the challenges of using the proposed TRBG in cryptography, the proposed TRBG is subjected to the AIS 31 test suite. The ZCDPLL operate as chaotic generator for certain loop...

    Provided By Scientific Research

  • White Papers // Jul 2009

    Investigations into the Effect of Spatial Correlation on Channel Estimation and Capacity of Multiple Input Multiple Output System

    The paper reports on investigations into the effect of spatial correlation on channel estimation and capacity of a Multiple Input Multiple Output (MIMO) wireless communication system. Least Square (LS), Scaled Least Square (SLS) and Minimum Mean Square Error (MMSE) methods are considered for estimating channel properties of a MIMO system...

    Provided By Scientific Research

  • White Papers // Jul 2009

    BER Performance of Space-Time Coded MMSE DFE for Wideband Code Division Multiple Access (WCDMA)

    In recent times, there has been growing interests in integration of voice, data and video traffic in wireless communication networks. With these growing interests, WCDMA has immerged as an attractive access technique. The performance of WCDMA system is deteriorated in presence of multipath fading environment. The paper presents space-time coded...

    Provided By Scientific Research

  • White Papers // Jul 2009

    Optimal Positions of Relay Stations for Cluster-Based Two-Hop Cellular Network

    Multihop cellular networks is an exciting and a fledgling area of wireless communication which offers huge potential in terms of coverage enhancement, data-rates, power reduction, and various other quality of service improvements. However, resource allocation in MCN is an NP-hard problem. Hence, significant research needs to be done in this...

    Provided By Scientific Research

  • White Papers // Dec 2012

    A Scalable and Robust DHT Protocol for Structured P2P Network

    Distributed Hash Tables (DHTs) were originated from the design of structured Peer-To-Peer (P2P) systems. A DHT provides a key-based lookup service similar to a hash table. In this paper, the authors present the detailed design of a new DHT protocol, Tambour. The novelty of the protocol is that it uses...

    Provided By Scientific Research

  • White Papers // Dec 2012

    Modeling Components and Services of LTE Mobile Communications System

    The latest wireless broadband network standard is LTE (Long Term Evolution) which is developed by 3GPP (3rd Generation Partnership Project). It will enable mobile devices such as smart phones, tablets and laptops to access Internet at a very high speed along with lots of multimedia services. There are many issues...

    Provided By Scientific Research

  • White Papers // Dec 2012

    Simulation & Performance Evaluation of QoS Routing Protocol for Adhoc Networks Using Directional Communication

    A wireless ad-hoc network is a self-organized wireless network without fixed or backbone infrastructure. All nodes have routing capability and use peer-to-peer packet transmission or forward packets to other node using multi hop communication. Now-a-days Mobile Ad-hoc NETworks are being used for different applications and traffics, so it require Quality...

    Provided By Scientific Research

  • White Papers // Dec 2012

    Cryptanalysis of the Double-Moduli Cryptosystem

    In this paper, the authors present a lattice attack done on a NTRU-like scheme introduced by Verkhovsky in. They show how, based on the relation between the public and private key, they can construct an attack which allows any passive adversary to decrypt the encrypted messages. They explain, step by...

    Provided By Scientific Research

  • White Papers // Dec 2012

    Towards Cloud to Device Push Messaging on Android: Technologies, Possibilities and Challenges

    In this paper, the authors look at different push messaging alternatives available for Android. Push messaging provides an important aspect of server to device communication and they specifically focus on the integration of cloud computing with mobile devices through the use of push-based technologies. By conducting a benchmarking test, they...

    Provided By Scientific Research

  • White Papers // Dec 2012

    Improvement of the Round Key Generation of AES

    In modern society, computer network has already been covered. In people's daily lives, the information technology industries have become ubiquitous. In the civil and military, commercial's security which is playing an important role is very prominent. The key generation algorithm of AES was introduced, the weaknesses of the key generation...

    Provided By Scientific Research

  • White Papers // Nov 2012

    Deterministic Algorithm Computing All Generators: Application in Cryptographic Systems Design

    Primitive elements play important roles in the Diffie-Hellman protocol for establishment of secret communication keys, in the design of the ElGamal cryptographic system and as generators of pseudo-random numbers. In general, a deterministic algorithm that searches for primitive elements is currently unknown. In information-hiding schemes, where a primitive element is...

    Provided By Scientific Research

  • White Papers // Nov 2012

    The Research on QoS Model Design in Mobile Ad Hoc Networks

    Wireless Ad Hoc Networks is a special kind of wireless communication network. With the great development of multimedia applications, how to provide QoS guarantee in the MAC layer is the hot topic in wireless ad hoc network (MANET). This paper designed a QoS model in MANET. The feasibility and reliability...

    Provided By Scientific Research

  • White Papers // Nov 2012

    Global Electronic Dominance with Spatial Grasp

    A high-level control technology will be revealed that can dynamically establish overwhelming dominance over distributed networked systems with embedded electronic devices and any communications between them. It is based on implanting of universal control modules (that may be concealed) into key system points which collectively interpret complex but compact mission...

    Provided By Scientific Research

  • White Papers // Nov 2012

    Employing Power Allocation to Enhance Zero Forcing Scheme Advantages over Multi-Antenna Multiple Relay Networks

    A Multi-Antenna Multiple Relay (MAMR) network is considered and a variation of two-hop zero-forcing amplify-forward relaying method is proposed. Deploying ZF method together with application of diagonal power allocation matrices at the relays, it is shown that the overall MAMR network is simplified to M independent Single Antenna Multiple Relay...

    Provided By Scientific Research

  • White Papers // Jan 2012

    A Generic Service Architecture for Secure Ubiquitous Computing Systems

    The development of ubiquitous computing systems benefits tremendously from the service-oriented computing concept in seamless interoperation of heterogeneous devices. However, architectures, services interfaces and network implementation of the existing service-oriented systems differ case by case. Furthermore, many systems lack the capability of being applied to resource constrained devices, for example,...

    Provided By Scientific Research

  • White Papers // Jan 2012

    Secure Cooperative Spectrum Sensing based on the Distance Between Bodies of Evidence

    In Cognitive Radio (CR) networks, unlicensed secondary users need to conduct spectrum sensing to gain access to a licensed spectrum band. And cooperation among CR users will solve the problems caused by multipath fading and shadowing. In this paper, the authors propose a multi-threshold method at local nodes to cope...

    Provided By Scientific Research

  • White Papers // Jan 2012

    Content-Based Image Unequal Error Protection Strategies for an Open Loop MIMO System

    In this paper, the authors deals with strategies for optimizing the transmission of JPEG2000 coded images over a MIMO quasi-static Rayleigh fading channel, by exploiting different available MIMO STBC (Space Time Block Codes), as well as the image content to be transmitted. The aim is to propose a link adaptation...

    Provided By Scientific Research

  • White Papers // Dec 2011

    LDPC-Coded OFDM Transmission Based on Adaptive Power Weights in Cognitive Radio Systems

    In this paper, the authors propose a new scheme to improve the performance of an LDPC-coded OFDM based Cognitive Radio (CR) link by applying adaptive power weights. To minimize estimation errors of detected signals in all the CR subcarriers, power weights are allocated to the CR subcarriers at the secondary...

    Provided By Scientific Research

  • White Papers // Dec 2011

    Improved Authentication Accuracy by Individually Set Orders of the Fractional Fourier Transform and Effects of Damage of Fingerprint Image on Authentication Accuracy

    Recently, ubiquitous personal devices with a fingerprint authentication function have been increasing. In such devices, there is almost no possibility of the authentication by impostors unless they are lost or stolen. However, for example, in the management of entering and leaving a building, not only the fingerprint authentication device but...

    Provided By Scientific Research

  • White Papers // Dec 2011

    Biometric Signature of Private Key by Reliable Iris Recognition Based on Flexible-ICA Algorithm

    The numerical world is under a fast development generating facilities and threats. The recommended solutions are especially the protection of information in all its states. The levels of protection show a discrepancy from an application to another; governmental, commercial or even cybercriminal. The infrastructure used in modern cryptography is based...

    Provided By Scientific Research

  • White Papers // Dec 2011

    Towards Cloud Management by Autonomic Manager Collaboration

    The management of clouds comprised of hundreds of hosts and virtual machines present challenging problems to administrators in ensuring that performance agreements are met and that resources are efficiently utilized. Automated approaches can help in managing such environments. Autonomic managers using policy-based management can provide a useful approach to such...

    Provided By Scientific Research

  • White Papers // Dec 2011

    IaaS Public Cloud Computing Platform Scheduling Model and Optimization Analysis

    IaaS (Infrastructure as a Platform) public cloud is one mainstream service mode for public cloud computing. The design aim of one IaaS public cloud is to enlarge the hardware-usage of whole platform, optimize the virtual machine deployment and enhance the accept rate of service demand. In this paper, the authors...

    Provided By Scientific Research