Scientific Research

Displaying 161-200 of 274 results

  • White Papers // Dec 2011

    IaaS Public Cloud Computing Platform Scheduling Model and Optimization Analysis

    IaaS (Infrastructure as a Platform) public cloud is one mainstream service mode for public cloud computing. The design aim of one IaaS public cloud is to enlarge the hardware-usage of whole platform, optimize the virtual machine deployment and enhance the accept rate of service demand. In this paper, the authors...

    Provided By Scientific Research

  • White Papers // Nov 2011

    Investigation of Upstream Near-Far Problem in VDSL Systems via Complete Adaptive Iterative Water Filling Algorithm

    Crosstalk is the main degrading factor in Digital Subscriber Line (DSL) systems which are the result of electromagnetic coupling between two adjacent twisted pairs in a cable. Very-high bit-rate Digital Subscriber Line (VDSL) systems which use higher frequencies for data transmission than the other DSL systems, this effect is more...

    Provided By Scientific Research

  • White Papers // Nov 2011

    Algorithms for Integer Factorization Based on Counting Solutions of Various Modular Equations

    In this paper, the author presents a logical continuation of the author's recently-published paper. Security of modern communication based on RSA cryptographic protocols and their analogues is as crypto-immune as integer Factorization (iFac) is difficult. In this paper, the author considered enhanced algorithms for the iFac that are faster than...

    Provided By Scientific Research

  • White Papers // Nov 2011

    A Topology-Based Conflict Detection System for Firewall Policies Using Bit-Vector-Based Spatial Calculus

    Firewalls use packet filtering to either accept or deny packets on the basis of a set of predefined rules called filters. The firewall forms the initial layer of defense and protects the network from unauthorized access. However, maintaining firewall policies is always an error prone task, because the policies are...

    Provided By Scientific Research

  • White Papers // Nov 2011

    High-Gain Array Antenna Based on Composite Right/Left-Handed Transmission Line

    Electromagnetic meta-materials are effectively homogeneous artificial structures engineered to provide electromagnetic properties not readily observable in nature, such as, an index of refraction that may be negative, less than one, or modulated in a graded manner. In this paper, a meta-material-inspired antenna with high gain and good directivity is designed....

    Provided By Scientific Research

  • White Papers // Nov 2011

    Multilayer Hex-Cells: A New Class of Hex-Cell Interconnection Networks for Massively Parallel Systems

    Scalability is an important issue in the design of interconnection networks for massively parallel systems. In this paper, a scalable class of interconnection network of Hex-Cell for massively parallel systems is introduced. It is called Multi-Layer Hex-Cell (MLH). A node addressing scheme and routing algorithm are also presented and discussed....

    Provided By Scientific Research

  • White Papers // Nov 2011

    Analysis of Computer Network Reliability and Criticality: Technique and Features

    In this paper, the authors describes modern technologies of computer network reliability. Software tool is developed to estimate of the CCN critical failure probability (construction of a criticality matrix) by results of the FME(C)A-technique. The internal information factors, such as collisions and congestion of switchboards, routers and servers, influence on...

    Provided By Scientific Research

  • White Papers // Nov 2011

    Distributed Frequency Assignment Using Hierarchical Cooperative Multi-Agent System

    Recent demand for wireless communication continues to grow rapidly as a result of the increasing number of users, the emergence of new user requirements and the trend to new access technologies. At the same time, the electromagnetic spectrum or frequencies allocated for this purpose are still limited. This makes solving...

    Provided By Scientific Research

  • White Papers // Nov 2011

    Computer-Based Infrastructure Sector Interdependencies and Security Implications

    Traditionally, the analysis of sector interdependencies has involved the characterization of all infrastructure-to-infrastructure interconnections and some of the main infrastructure integrals that, once lost or be tampered with, will compromise the performance and security issues with the other interconnected infrastructures. Therefore, the paper dwells much on the security implications which...

    Provided By Scientific Research

  • White Papers // Nov 2011

    Study of a Kit of GSM Radio Operator Site for Event-Driven Movable Coverage: Application to the Deployment of a Site of the Orange Operator in Ivory Coast

    The mobile communication is now-a-days one of the basic needs of humanity. It is essential to the flourishing of human beings. Considering this reality, the need to use its mobile phone is become more important and diversified. The subscribers of the various mobile telephone operators are increasingly demanding. This situation...

    Provided By Scientific Research

  • White Papers // Nov 2011

    Performance and Capacity Planning of NGN

    There have been various emerging trends in the deployment of telecom networks recently. Due to liberalization and technological advancements a common core network for voice and data based on MPLS has been implemented by Telecom service providers. By offering a variety of data and multimedia services, the revenue generating process...

    Provided By Scientific Research

  • White Papers // Oct 2011

    Introduction to Secure PRNGs

    Pseudo-Random Number Generators (PRNGs) are required for generating secret keys in cryptographic algorithms, generating sequences of packet in Network simulations (workload generators) and other applications in various fields. In this paper, the authors will discuss a list of some requirements for generating a reliable random sequence and then will present...

    Provided By Scientific Research

  • White Papers // Oct 2011

    A Threshold Signature Scheme Based on TPM

    Rapid development of the computer and network technology has made human society into the information age. For the traditional threshold signature mechanism does not considers whether the nodes which generate part signature are trusted and the traditional signature strategy doesn't do well in resisting internal attacks and external attacks and...

    Provided By Scientific Research

  • White Papers // Oct 2011

    An Implementation Method for ZigBee Network Layer

    ZigBee network layer support star, tree and mesh topology structure. The tree structure and the network structure is naturally the P2P network. In the star structure, there is a device called ZC (ZigBee Coordinator, ZigBee) which is used to start up and maintain the devices of the network and the...

    Provided By Scientific Research

  • White Papers // Oct 2011

    Chip Interleaved Multirate and Multimedia Transmission in Self-Encoded Communication System with Iterative Detection over Fading Channels

    In this paper, the authors investigate the Self-Encoded Multirate and the Multimedia (SEMM) transmission. In SEMM system, multiple applications transmit their information simultaneously with different bit rate via Self-Encoded Spreading Spectrum (SESS), where the spreading codes are derived from the previous bits rather than the pseudorandom code generator. At the...

    Provided By Scientific Research

  • White Papers // Oct 2011

    Beam Selection and Antenna Selection: A Hybrid Transmission Scheme Over MIMO Systems Operating with Vary Antenna Arrays

    In this paper, the authors have proposed a hybrid transmission scheme which involves beam selection and antenna selection techniques over a MIMO system operating with vary antenna array. Optimal subset of transmit antennas are selected via fast successive selection scheme designed to optimize the target eigenbeam. Optimal eigenbeams corresponding to...

    Provided By Scientific Research

  • White Papers // Oct 2011

    Reliable Battery-Aware Cooperative Multicasting for MBS WiMAX Traffic

    Recently, relay agents selection schemes were introduced to support downlink multicasting in WiMAX single frequency networks. Such schemes were devised to work cooperatively in order to facilitate reliable Multicast Broadcast Multimedia Services (MBMS) traffic delivery over wireless channels without any consideration to mobile relay agents' battery energy levels. In this...

    Provided By Scientific Research

  • White Papers // Oct 2011

    Using LDMOS Transistor in Class-F Power Amplifier for WCDMA Applications

    The fundamental operating principle of a Class F power amplifier and the factors aiding or affecting Class F performance were explicated previously. A Class F power amplifier design which satisfies WCDMA specifications is explained in this paper. The Class F amplifier was designed by employing Motorola's LDMOS (Laterally Diffused Metal...

    Provided By Scientific Research

  • White Papers // Oct 2011

    Route Optimization for Network Mobility Based Aeronautical Network Using Correspondent Router

    The future aeronautical network will be based on IPv6 and the services over the aeronautical network will be classified into 3 domains: Air Traffic Services (ATS), Airline Operational Services (AOS) and Passenger Information and Entertainment Services (PIES), among which the ATS and AOS domains are important for aircraft safety and...

    Provided By Scientific Research

  • White Papers // Oct 2011

    Advances in Intrusion Detection System for WLAN

    A wireless network is not as secure as compare the wired network because the data is transferred on air so any intruder can use hacking techniques to access that data. Indeed, it is difficult to protect the data and provide the user a secure information system for lifetime. An intrusions...

    Provided By Scientific Research

  • White Papers // Sep 2011

    Conditional Diagnosability of the Locally Twisted Cubes under the PMC Model

    In a multiprocessor systems, it is important to local and to replace the faulty processors to maintain systempsilas high reliability. The fault diagnosis, which is the process of identifying fault processors in a multiprocessor system through testing. The conditional diagnosis requires that for each processor u in a system, all...

    Provided By Scientific Research

  • White Papers // Sep 2011

    A LEACH-Head Expected Frequency Appraisal Algorithm for Water-Environment Monitoring Networks

    Water-environment Monitoring Network (WMN) is a Wireless Sensor Network based real-time system, which collects, transmits, analyzes and processes water-environment parameters in large area. Both cluster selection mechanisms and energy saving strategies play an important role on designing network routing protocols for the WMN. Since those existing routing algorithms can not...

    Provided By Scientific Research

  • White Papers // Sep 2011

    A Simple Symbol Estimation for Soft Information Relaying in Cooperative Relay Channels

    In this paper, the authors proposes Symbol-based Soft Forwarding (SSF) protocol for coded transmissions which is based on a simple proposed soft symbol estimation at relay nodes. They present a simple strategy of forwarding soft information based on a simple linear summation of likelihood functions of each symbol. Specifically, with...

    Provided By Scientific Research

  • White Papers // Sep 2011

    The Range and Horizon Plane Simulation for Ground Stations of Low Earth Orbiting (LEO) Satellites

    Communication via satellite begins when the satellite is positioned in the desired orbital position. Ground stations can communicate with LEO (Low Earth Orbiting) satellites only when the satellite is in their visibility region. The ground station's ideal horizon plane is in fact the visibility region under 0? of elevation angle....

    Provided By Scientific Research

  • White Papers // Sep 2011

    Measurement Process of MOSFET Device Parameters with VEE Pro Software for DP4T RF Switch

    To design a Double-Pole Four-Throw (DP4T) RF switch, measurement of device parameters is required. In this DP4T RF switch CMOS is a unit cell, so with a thin oxide layer of thickness 628 ? which is measured optically. Some of the material parameters were found by the curve drawn between...

    Provided By Scientific Research

  • White Papers // Sep 2011

    Status of the Utilisation of E-Commerce Resources by Small and Medium (SMES) Enterprises in Nigeria

    The major purpose of this paper was to explore the utilization of e-commerce by SMEs in marketing industrial products in Lagos metropolis (Nigeria). Two research questions were answered and two hypotheses tested at 0.05 level of significance. The population for the study consisted of 532 managers of SMEs that are...

    Provided By Scientific Research

  • White Papers // Jul 2011

    Location Based Performance of WiMAX Network for QoS With Optimal Base Stations (BS)

    In this paper, the authors are given concept of their WiMAX (Worldwide Interoperability for Microwave Access) network performance for QoS monitoring and optimization solution for BS (Base Station) with multimedia application. In the communication sector, the optimal objective is to equate quality and cost. Due to its large coverage area,...

    Provided By Scientific Research

  • White Papers // Jul 2011

    Side-Channel Analysis for Detecting Protocol Tunneling

    Protocol tunneling is widely used to add security and/or privacy to Internet applications. Recent research has exposed side channel vulnerabilities that leak information about tunneled protocols. The authors first discuss the timing side channels that have been found in protocol tunneling tools. They then show how to infer Hidden Markov...

    Provided By Scientific Research

  • White Papers // Jul 2011

    WiFi/WiMAX Seamless Convergence with Adaptive Vertical Handover for Continuity of Internet Access

    The next generation of the wireless networks will consist of several overlapping tiers. Provision of undisrupted communication to mobile users is a challenging task. Handover delay is one of the problematic issues that users are faced in the heterogeneous networks. However, in the case of both the WiMAX and the...

    Provided By Scientific Research

  • White Papers // Jul 2011

    Secured Electronic Voting Protocol Using Biometric Authentication

    In this paper, the authors proposes a new secure e-voting protocol. This new scheme does not require a special voting channel and communication can occur entirely over the existing Internet. This method integrates Internet convenience and cryptology. In the existing protocols either the tallier has to wait for the decryption...

    Provided By Scientific Research

  • White Papers // Jul 2011

    Internet of Things: Services and Applications Categorization

    In this paper, the authors attempt to categorize the services provided by the Internet of Things (IoT) in order to help application developers build upon a base service. First they introduce the four main categories of services and then follow by providing a number of examples of each of the...

    Provided By Scientific Research

  • White Papers // Apr 2011

    Integrating RFIDs and Smart Objects into a Unified Internet of Things Architecture

    The term Internet of Things refers to the networked interconnection of objects of diverse nature, such as electronic devices, sensors, but also physical objects and beings as well as virtual data and environments. Although the basic concept of the Internet of Things sounds simple, its application is difficult and, so...

    Provided By Scientific Research

  • White Papers // Apr 2011

    Developing E-society Cognitive Platform Based on the Social Agent E-learning Goal Oriented

    In this paper, the authors introduce the e-society cognitive approach based on the social agent. The social agent is e-learning oriented. The e-society cognitive platform may consider different fields like e-learning, e-health, e-commerce, e-medicine and e-government. In this paper, they will introduce the e-society platform. The e-society platform supports the...

    Provided By Scientific Research

  • White Papers // May 2010

    Downlink MBER Transmit Beamforming Design Based on Uplink MBER Receive Beamforming for TDD-SDMA Induced MIMO Systems

    The downlink Minimum Bit Error Rate (MBER) transmit beamforming is directly designed based on the uplink MBER receive beamforming solution for Time Division Duplex (TDD) Space-Division Multiple-Access (SDMA) induced Multiple-Input Multiple-Output (MIMO) systems, where the Base Station (BS) is equipped with multiple antennas to support multiple single-antenna Mobile Terminals (MTs)....

    Provided By Scientific Research

  • White Papers // Apr 2010

    Multiobjective Duality in Variational Problems with Higher Order Derivatives

    Calculus of variation is a powerful technique for the solution of various problems appearing in dynamics of rigid bodies, optimization of orbits, theory of variations and many other fields. A multi-objective variational problem involving higher order derivatives is considered and optimality conditions for this problem are derived. A Mond-Weir type...

    Provided By Scientific Research

  • White Papers // Apr 2010

    Method of Carrier Acquisition and Track for HAPS

    Now the HAPS (High Altitude Platform Station) system has been concentrated on research because of important values in military and application. This paper emphasizes on the characteristics and schemes of carrier acquisition and track in high dynamic and high information-rate situation. Carrier acquisition model is analyzed theoretically and the design...

    Provided By Scientific Research

  • White Papers // Mar 2010

    PBB Efficiency Evaluation via Colored Petri Net Models

    Basic components of Provider Backbone Bridge (PBB) network models were constructed: PBB interior switch, PBB edge switch - with the dynamic filling up of address tables. The modeling of PBB networks was implemented. The results of simulation reveal definite imperfections of PBB technology caused by the broadcasting and sensitivity to...

    Provided By Scientific Research

  • White Papers // Feb 2010

    A Literature Review on the Studies of Internet Retailing Management

    This paper reviewed the studies of Internet retailing management. It found that, in general, most of the papers on the topic took focus on Internet retailing strategy and online merchandise management. Specifically, it drawn following conclusions: First, there were six major incentives for firms to adopt Internet retailing, including improving...

    Provided By Scientific Research

  • White Papers // Dec 2009

    ADPF Algorithm for Target Tracking in WSN

    Particle Filtering (PF) has been widely used in solving nonlinear/non Gaussian filtering problems. Inferring to the target tracking in a Wireless Sensor Network (WSN), Distributed PF (DPF) was used due to the limitation of nodes' computing capacity. In this paper, a novel filtering method - Asynchronous DPF (ADPF) for target...

    Provided By Scientific Research

  • White Papers // Dec 2009

    Designing Intrusion Detection System for Web Documents Using Neural Network

    Cryptographic systems are the most widely used techniques for information security. These systems however have their own pitfalls as they rely on prevention as their sole means of defense. That is why most of the organizations are attracted to the Intrusion Detection Systems. The Intrusion Detection Systems can be broadly...

    Provided By Scientific Research

  • White Papers // Sep 2009

    TCP-R with EPDN: Handling out of Order Packets in Error Prone Satellite Networks

    In this paper, the authors have shown that packet reordering is common, especially in satellite networks where there are link level retransmissions and multipath routing. Moreover, traditional satellite networks exhibit high corruption rates causing packet losses. Reordering and corruption of packets decrease the TCP performance of a network, mainly because...

    Provided By Scientific Research

  • White Papers // Feb 2009

    Game Theoretic Analysis of Joint Rate and Power Allocation in Cognitive Radio Networks

    Spectrum sharing is an essential enabling functionality to allow the coexistence between Primary User (PU) and Cognitive Users (CUs) in the same frequency band. In this paper, the authors consider joint rate and power allocation in cognitive radio networks by using game theory. The optimum rates and powers are obtained...

    Provided By Scientific Research

  • White Papers // Feb 2009

    Synchronous Dynamic Adjusting: An Anti-Collision Algorithm for an RF-UCard System

    An RF-UCard system is a contactless smartcard system with multiple chip operating systems and multiple applications. A multi-card collision occurs when more than one card within the reader's read field and thus lowers the efficiency of the system. This paper presents a novel and enhanced algorithm to solve the multi-card...

    Provided By Scientific Research

  • White Papers // Feb 2009

    Performance Analysis of Sub-Rating for Handoff Calls in HCN

    Hierarchical Cellular Networks (HCN) offer more efficient channel utilization and better Quality of Service (QoS) under the high tele-traffic condition compared to the single-tier system. One of the important measures of QoS in HCN as in any single-tier system is the handoff dropping rate. Although the existing approaches such as...

    Provided By Scientific Research

  • White Papers // Feb 2009

    On the Scalable Fairness and Efficient Active Queue Management of RED

    Internet routers generally see packets from a fast flow more often than a slow flow. This suggests that network fairness may be improved without per-flow information. In this paper, the authors propose a scheme using Most Recently Used List (MRUL)-a list storing statistics of limited active flows that sorted in...

    Provided By Scientific Research

  • White Papers // Feb 2009

    A Genetic Based Fuzzy Q-Learning Flow Controller for High-Speed Networks

    For the congestion problems in high-speed networks, a genetic based fuzzy Q-learning flow controller is proposed. Because of the uncertainties and highly time-varying, it is not easy to accurately obtain the complete information for high-speed networks. In this case, the Q-learning, which is independent of mathematic model, and prior-knowledge, has...

    Provided By Scientific Research

  • White Papers // May 2009

    Cooperative Self Encoded Spread Spectrum in Fading Channels

    Self-Encoded Spread Spectrum (SESS) is a unique realization of random spread spectrum. SESS eliminates the need for the traditional transmitting and receiving PN code generators. Instead, the time varying, random spreading sequence is obtained from the data source. Cooperative Diversity (CD) has been attracting increasing attention as a novel and...

    Provided By Scientific Research

  • White Papers // May 2009

    MATLAB Simulink Simulation Platform for Photonic Transmission Systems

    High speed and ultra-high capacity optical communications have emerged as the essential techniques for backbone global information transmission networks. As the bit rate of the transmission system gets higher and higher 40 Gb/s to 100 Gb/s the modeling of proposed modulation techniques is very important so as to avoid costly...

    Provided By Scientific Research

  • White Papers // May 2009

    Geospatial Information Service Based on Ad Hoc Network

    With the development of electronic technology, especially in the fields of computer and internet technology, mobile communication has made a rapid progress in recent years. More and more mobile phones with powerful functions have emerged in users daily life. The mobile geospatial information service involves the domain of mobile communication,...

    Provided By Scientific Research

  • White Papers // May 2009

    Hierarchical Hypercube Based Pairwise Key Establishment Scheme for Sensor Networks

    Security schemes of pairwise key establishment, which enable sensors to communicate with each other securely, play a fundamental role in research on security issue in wireless sensor networks. A general framework for key predistribution is presented, based on the idea of KDC (Key Distribution Center) and polynomial pool schemes. By...

    Provided By Scientific Research

  • White Papers // May 2009

    Adaptive Processing Gain Data Services in Cellular CDMA in Presence of Soft Handoff with Truncated ARQ

    An adaptive data transmission scheme based on Variable Spreading Gain (VSG) is studied in cellular CDMA network in presence of soft Hand-Off (HO). The processing gain is varied according to traffic intensity meeting a requirement on data Bit Error Rate (BER). The overall performance improvement due to processing gain adaptation...

    Provided By Scientific Research

  • White Papers // May 2009

    Ubiquitous Media with UPnP and RFID-Based User Interfaces

    The evolution of systems and networks, including PDA, handhelds, mobile phones, WLAN, and Bluetooth provides users new scenarios for media presentation. Because of the growing number of such (personal) devices in the Personal Area Network of the user it is necessary to set up a system, in which the user...

    Provided By Scientific Research

  • White Papers // Jun 2009

    Device-to-Device Communication Underlaying Cellular Communications Systems

    In this paper, the authors propose to facilitate local Peer-To-Peer communication by a Device-To-Device (D2D) radio that operates as an underlay network to an IMT-Advanced cellular network. It is expected that local services may utilize mobile Peer-To-Peer communication instead of central server based communication for rich multimedia services. The main...

    Provided By Scientific Research

  • White Papers // Jun 2009

    An Improved Power Estimation for Mobile Satellite Communication Systems

    In this paper, in order to increase system capacity and reduce the transmitting power of the user's equipment, the authors propose a efficient power estimation algorithm consisting of a modified Open-Loop Power Control (OLPC) and Closed-Loop Power Control (CLPC) for mobile satellite communications systems. The improved CLPC scheme, combining delay...

    Provided By Scientific Research

  • White Papers // Jun 2009

    Fast and Noniterative Scheduling in Input-Queued Switches

    Most high-end switches use an input-queued or a combined input- and output-queued architecture. The switch fabrics of these architectures commonly use an iterative scheduling system such as iSLIP. Iterative schedulers are not very scalable and can be slow. The authors propose a new scheduling algorithm that finds a maximum matching...

    Provided By Scientific Research

  • White Papers // Jun 2009

    On the Performance of Traffic Locality Oriented Route Discovery Algorithm with Delay

    In MANETs, traffic may follow certain pattern that is not necessarily spatial or temporal but rather to follow special needs as a part of group for collaboration purposes. The source node tends to communicate with a certain set of nodes more than others regardless of their location exhibiting traffic locality...

    Provided By Scientific Research

  • White Papers // Jun 2009

    A Novel Approach to Improve the Security of P2P File-Sharing Systems

    The recent and unprecedented surge of public interest in Peer-To-Peer (P2P) file-sharing systems has led to a variety of interesting research questions. How to minimize threats in such an open community is an important research topic. Trust models have been widely used in estimating the trustworthiness of peers in P2P...

    Provided By Scientific Research

  • White Papers // Jul 2009

    Self-Encoded Multiple Access Multiuser Convolutional Codes in Uplink and Downlink Cellular Systems

    Self-encoded spread spectrum eliminates the need for traditional Pseudo Noise (PN) code generators. In a Self-Encoded Multiple Access (SEMA) system, the number of users is not limited by the number of available sequences, unlike Code Division Multiple Access (CDMA) systems that employ PN codes such as m-, Gold or Kassami...

    Provided By Scientific Research

  • White Papers // Jul 2009

    True Random Bit Generator Using ZCDPLL Based on TMS320C6416

    A True Random Binary Generator (TRBG) based on a Zero Crossing Digital Phase-Locked Loop (ZCDPLL) is proposed. In order to face the challenges of using the proposed TRBG in cryptography, the proposed TRBG is subjected to the AIS 31 test suite. The ZCDPLL operate as chaotic generator for certain loop...

    Provided By Scientific Research

  • White Papers // Jul 2009

    Investigations into the Effect of Spatial Correlation on Channel Estimation and Capacity of Multiple Input Multiple Output System

    The paper reports on investigations into the effect of spatial correlation on channel estimation and capacity of a Multiple Input Multiple Output (MIMO) wireless communication system. Least Square (LS), Scaled Least Square (SLS) and Minimum Mean Square Error (MMSE) methods are considered for estimating channel properties of a MIMO system...

    Provided By Scientific Research

  • White Papers // Jul 2009

    BER Performance of Space-Time Coded MMSE DFE for Wideband Code Division Multiple Access (WCDMA)

    In recent times, there has been growing interests in integration of voice, data and video traffic in wireless communication networks. With these growing interests, WCDMA has immerged as an attractive access technique. The performance of WCDMA system is deteriorated in presence of multipath fading environment. The paper presents space-time coded...

    Provided By Scientific Research

  • White Papers // Jul 2009

    Optimal Positions of Relay Stations for Cluster-Based Two-Hop Cellular Network

    Multihop cellular networks is an exciting and a fledgling area of wireless communication which offers huge potential in terms of coverage enhancement, data-rates, power reduction, and various other quality of service improvements. However, resource allocation in MCN is an NP-hard problem. Hence, significant research needs to be done in this...

    Provided By Scientific Research

  • White Papers // Dec 2012

    A Scalable and Robust DHT Protocol for Structured P2P Network

    Distributed Hash Tables (DHTs) were originated from the design of structured Peer-To-Peer (P2P) systems. A DHT provides a key-based lookup service similar to a hash table. In this paper, the authors present the detailed design of a new DHT protocol, Tambour. The novelty of the protocol is that it uses...

    Provided By Scientific Research

  • White Papers // Dec 2012

    Modeling Components and Services of LTE Mobile Communications System

    The latest wireless broadband network standard is LTE (Long Term Evolution) which is developed by 3GPP (3rd Generation Partnership Project). It will enable mobile devices such as smart phones, tablets and laptops to access Internet at a very high speed along with lots of multimedia services. There are many issues...

    Provided By Scientific Research

  • White Papers // Dec 2012

    Simulation & Performance Evaluation of QoS Routing Protocol for Adhoc Networks Using Directional Communication

    A wireless ad-hoc network is a self-organized wireless network without fixed or backbone infrastructure. All nodes have routing capability and use peer-to-peer packet transmission or forward packets to other node using multi hop communication. Now-a-days Mobile Ad-hoc NETworks are being used for different applications and traffics, so it require Quality...

    Provided By Scientific Research

  • White Papers // Dec 2012

    Cryptanalysis of the Double-Moduli Cryptosystem

    In this paper, the authors present a lattice attack done on a NTRU-like scheme introduced by Verkhovsky in. They show how, based on the relation between the public and private key, they can construct an attack which allows any passive adversary to decrypt the encrypted messages. They explain, step by...

    Provided By Scientific Research

  • White Papers // Dec 2012

    Towards Cloud to Device Push Messaging on Android: Technologies, Possibilities and Challenges

    In this paper, the authors look at different push messaging alternatives available for Android. Push messaging provides an important aspect of server to device communication and they specifically focus on the integration of cloud computing with mobile devices through the use of push-based technologies. By conducting a benchmarking test, they...

    Provided By Scientific Research

  • White Papers // Dec 2012

    Improvement of the Round Key Generation of AES

    In modern society, computer network has already been covered. In people's daily lives, the information technology industries have become ubiquitous. In the civil and military, commercial's security which is playing an important role is very prominent. The key generation algorithm of AES was introduced, the weaknesses of the key generation...

    Provided By Scientific Research

  • White Papers // Nov 2012

    Deterministic Algorithm Computing All Generators: Application in Cryptographic Systems Design

    Primitive elements play important roles in the Diffie-Hellman protocol for establishment of secret communication keys, in the design of the ElGamal cryptographic system and as generators of pseudo-random numbers. In general, a deterministic algorithm that searches for primitive elements is currently unknown. In information-hiding schemes, where a primitive element is...

    Provided By Scientific Research

  • White Papers // Nov 2012

    The Research on QoS Model Design in Mobile Ad Hoc Networks

    Wireless Ad Hoc Networks is a special kind of wireless communication network. With the great development of multimedia applications, how to provide QoS guarantee in the MAC layer is the hot topic in wireless ad hoc network (MANET). This paper designed a QoS model in MANET. The feasibility and reliability...

    Provided By Scientific Research

  • White Papers // Nov 2012

    Global Electronic Dominance with Spatial Grasp

    A high-level control technology will be revealed that can dynamically establish overwhelming dominance over distributed networked systems with embedded electronic devices and any communications between them. It is based on implanting of universal control modules (that may be concealed) into key system points which collectively interpret complex but compact mission...

    Provided By Scientific Research

  • White Papers // Nov 2012

    Employing Power Allocation to Enhance Zero Forcing Scheme Advantages over Multi-Antenna Multiple Relay Networks

    A Multi-Antenna Multiple Relay (MAMR) network is considered and a variation of two-hop zero-forcing amplify-forward relaying method is proposed. Deploying ZF method together with application of diagonal power allocation matrices at the relays, it is shown that the overall MAMR network is simplified to M independent Single Antenna Multiple Relay...

    Provided By Scientific Research

  • White Papers // Jan 2012

    A Generic Service Architecture for Secure Ubiquitous Computing Systems

    The development of ubiquitous computing systems benefits tremendously from the service-oriented computing concept in seamless interoperation of heterogeneous devices. However, architectures, services interfaces and network implementation of the existing service-oriented systems differ case by case. Furthermore, many systems lack the capability of being applied to resource constrained devices, for example,...

    Provided By Scientific Research

  • White Papers // Jan 2012

    Secure Cooperative Spectrum Sensing based on the Distance Between Bodies of Evidence

    In Cognitive Radio (CR) networks, unlicensed secondary users need to conduct spectrum sensing to gain access to a licensed spectrum band. And cooperation among CR users will solve the problems caused by multipath fading and shadowing. In this paper, the authors propose a multi-threshold method at local nodes to cope...

    Provided By Scientific Research

  • White Papers // Jan 2012

    Content-Based Image Unequal Error Protection Strategies for an Open Loop MIMO System

    In this paper, the authors deals with strategies for optimizing the transmission of JPEG2000 coded images over a MIMO quasi-static Rayleigh fading channel, by exploiting different available MIMO STBC (Space Time Block Codes), as well as the image content to be transmitted. The aim is to propose a link adaptation...

    Provided By Scientific Research

  • White Papers // Dec 2011

    LDPC-Coded OFDM Transmission Based on Adaptive Power Weights in Cognitive Radio Systems

    In this paper, the authors propose a new scheme to improve the performance of an LDPC-coded OFDM based Cognitive Radio (CR) link by applying adaptive power weights. To minimize estimation errors of detected signals in all the CR subcarriers, power weights are allocated to the CR subcarriers at the secondary...

    Provided By Scientific Research

  • White Papers // Dec 2011

    Improved Authentication Accuracy by Individually Set Orders of the Fractional Fourier Transform and Effects of Damage of Fingerprint Image on Authentication Accuracy

    Recently, ubiquitous personal devices with a fingerprint authentication function have been increasing. In such devices, there is almost no possibility of the authentication by impostors unless they are lost or stolen. However, for example, in the management of entering and leaving a building, not only the fingerprint authentication device but...

    Provided By Scientific Research

  • White Papers // Dec 2011

    Biometric Signature of Private Key by Reliable Iris Recognition Based on Flexible-ICA Algorithm

    The numerical world is under a fast development generating facilities and threats. The recommended solutions are especially the protection of information in all its states. The levels of protection show a discrepancy from an application to another; governmental, commercial or even cybercriminal. The infrastructure used in modern cryptography is based...

    Provided By Scientific Research

  • White Papers // Dec 2011

    Towards Cloud Management by Autonomic Manager Collaboration

    The management of clouds comprised of hundreds of hosts and virtual machines present challenging problems to administrators in ensuring that performance agreements are met and that resources are efficiently utilized. Automated approaches can help in managing such environments. Autonomic managers using policy-based management can provide a useful approach to such...

    Provided By Scientific Research

  • White Papers // Dec 2011

    IaaS Public Cloud Computing Platform Scheduling Model and Optimization Analysis

    IaaS (Infrastructure as a Platform) public cloud is one mainstream service mode for public cloud computing. The design aim of one IaaS public cloud is to enlarge the hardware-usage of whole platform, optimize the virtual machine deployment and enhance the accept rate of service demand. In this paper, the authors...

    Provided By Scientific Research