Scientific Research

Displaying 241-280 of 615 results

  • White Papers // Nov 2012

    The Research on QoS Model Design in Mobile Ad Hoc Networks

    Wireless Ad Hoc Networks is a special kind of wireless communication network. With the great development of multimedia applications, how to provide QoS guarantee in the MAC layer is the hot topic in wireless ad hoc network (MANET). This paper designed a QoS model in MANET. The feasibility and reliability...

    Provided By Scientific Research

  • White Papers // Nov 2012

    Global Electronic Dominance with Spatial Grasp

    A high-level control technology will be revealed that can dynamically establish overwhelming dominance over distributed networked systems with embedded electronic devices and any communications between them. It is based on implanting of universal control modules (that may be concealed) into key system points which collectively interpret complex but compact mission...

    Provided By Scientific Research

  • White Papers // Nov 2012

    Employing Power Allocation to Enhance Zero Forcing Scheme Advantages over Multi-Antenna Multiple Relay Networks

    A Multi-Antenna Multiple Relay (MAMR) network is considered and a variation of two-hop zero-forcing amplify-forward relaying method is proposed. Deploying ZF method together with application of diagonal power allocation matrices at the relays, it is shown that the overall MAMR network is simplified to M independent Single Antenna Multiple Relay...

    Provided By Scientific Research

  • White Papers // Nov 2012

    QoS Based Framework for Effective Web Services in Cloud Computing

    Enhancements in technology always follow Consumer requirements. Consumer requires best of service with least possible mismatch and on time. Numerous applications available today are based on Web Services and Cloud Computing. Recently, there exist many Web Services with similar functional characteristics. Choosing \"A-right\" Service from group of similar Web Service...

    Provided By Scientific Research

  • White Papers // Nov 2012

    A Load Balance Clustering Routing Algorism Based on SOM

    In order to solve the uneven node load in the tradition clustering routing protocols, a new clustering algorism based on SOM is proposed. Firstly, the network radio model and the energy consumption model are defined. A new algorism using SOM to form the cluster and select the cluster head is...

    Provided By Scientific Research

  • White Papers // Nov 2012

    Rapid and Flexible User-Defined Low-Level Hybridization for Metaheuristics Algorithm in Software Framework

    The metaheuristics algorithm is increasingly important in solving many kinds of real-life optimization problems but the implementation involves programming difficulties. As a result, many researchers have relied on software framework to accelerate the development life cycle. However, the available software frameworks were mostly designed for rapid development rather than flexible...

    Provided By Scientific Research

  • White Papers // Nov 2012

    A Practical Target Tracking Technique in Sensor Network Using Clustering Algorithm

    Sensor network basically has many intrinsic limitations such as energy consumption, sensor coverage and connectivity, and sensor processing capability. Tracking a moving target in clusters of sensor network online with less complexity algorithm and computational burden is the authors' ultimate goal. Particle Filtering (PF) technique, augmenting handoff and K-means classification...

    Provided By Scientific Research

  • White Papers // Oct 2012

    Design of Broadband RoF PON for the Last Mile

    An increase in the demand of broadband service has encouraged research and study to find a solution to offer an adequate amount of service. Living in this digital world with downloading video, voice or data leads occasionally to have a shortage of bandwidth in the provided data. One of the...

    Provided By Scientific Research

  • White Papers // Oct 2012

    A Novel Offline PLI-RWA and Hybrid Node Architecture for Zero Blocking and Time Delay Reduction in Translucent Optical WDM Networks

    In this paper, The authors contrive a model that underpins the offline Physical Layer Impairment-Routing and Wavelength Assignment (PLI-RWA) issue in translucent networks. The authors introduce an innovative PLI-Signal Quality Aware RWA (PLI-SQARWA) algorithm that guarantees zero blocking due to signal degradation and wavelength contention and aims at minimizing the...

    Provided By Scientific Research

  • White Papers // Oct 2012

    Finding Optimal Allocation of Constrained Cloud Capacity Using Hyperbolic Voronoi Diagrams on the Sphere

    The authors consider a network of computer data centers on the earth surface delivering computing as a service to a big number of users. The problem is to assign users to data centers to minimize the total communication distance between computing resources and their users in the face of capacity...

    Provided By Scientific Research

  • White Papers // Oct 2012

    Network Connectivity Probability of Linear Vehicular Ad Hoc Networks on Two-Way Street

    In this paper, the authors present an analytical model to determine the network connectivity probability of a linear vehicular Ad-hoc NETwork (VANET) formed by communication equipped vehicles on a two-way street scenario. They consider the highway to be consisting of two lanes with vehicles moving in both directions on these...

    Provided By Scientific Research

  • White Papers // Oct 2012

    Design of Network Architecture Using Mobile Gateways for DLNA Devices in Wide Area Networks

    The prevalence of information appliances supporting DLNA (Digital Living Network Alliance) such as televisions, recorders, and mobile phones has made it possible to share digital contents (e.g. videos, music and pictures) among appliances connected to a local network. However, DLNA does not let the people share contents over different networks...

    Provided By Scientific Research

  • White Papers // Oct 2012

    Software Measurement Methods: An Analysis of Two Designs

    In software engineering, software measures are often proposed without precise identification of the measurable concepts they attempt to quantify: consequently, the numbers obtained are challenging to reproduce in different measurement contexts and to interpret, either as base measures or in combination as derived measures. The lack of consistency when using...

    Provided By Scientific Research

  • White Papers // Oct 2012

    Inkjet-Printed UHF RFID Tags on Renewable Materials

    Radio Frequency IDentification (RFID) provides great potential for different Internet of Things (IOT) applications. In the future, material choices in these IOT devices will have a huge effect on the environment and thus use of renewable materials is a growing trend. In this paper, passive Ultra High Frequency (UHF) RFID...

    Provided By Scientific Research

  • White Papers // Oct 2012

    Application of Full Text Search Engine Based on Lucene

    With the rapid development of Internet and with the explosive growth of web information, Internet users how to remove the impurities and retained the essence quickly and easily to gain the information they need in the vast ocean of information to become a hot research topic in this field. This...

    Provided By Scientific Research

  • White Papers // Oct 2012

    UMIS: A Service for User Model Interoperability

    In this paper, the authors describe UMIS, a service architecture that enables user adaptive applications to exchange User Model data on the Web. UMIS provides a set of facilities that allow applications to interoperate with minimum changes in their internal logics and knowledge representation. The goal is to support the...

    Provided By Scientific Research

  • White Papers // Oct 2012

    Structural Properties of Optimal Scheduling Policies for Wireless Data Transmission

    The authors analyze a cell with a fixed number of users in a time period network. The base station schedules to serve at most one user in a given time period based on information about the available data rates and other parameter(s) for all the users in the cell. They...

    Provided By Scientific Research

  • White Papers // Oct 2012

    Distributed Relay Beamforming in Cognitive Two-Way Networks: SINR Balancing Approach

    In this paper, the authors study the problem of distributed relay beamforming for a bidirectional cognitive relay network which consists of two secondary transceivers and K ognitive relay nodes and a primary network with a transmitter and receiver, using underlay model. For effective use of spectrum, they propose a Multiple...

    Provided By Scientific Research

  • White Papers // Oct 2012

    Detection the Spectrum Holes in the Primary Bandwidth of the Cognitive Radio Systems in Presence Noise and Attenuation

    Cognitive Radio (CR) and Dynamic Spectrum Access (DSA) represent two complementary developments that will re-fashion the world of wireless communication. In order to investigate the roles of knowledge representation and reasoning technologies in this domain, the authors have developed an experimental cognitive radio simulation environment. That is, a conventional radio...

    Provided By Scientific Research

  • White Papers // Oct 2012

    Random Access Algorithms in Packet Networks- A Review of Three Research Decades

    In this paper, the authors are focusing on the "Random-access" approach, for the accessing of a single, errorless, slotted channel, by independent, identical, packet transmitting, bursty users. They present a coherent and systematic review of Random Access Algorithms for packet networks, as developed over three and a half decades. They...

    Provided By Scientific Research

  • White Papers // Oct 2012

    A Cellular-Assisted Efficient Handover Algorithm for Wireless Sensor Networks

    Heterogeneous network convergence and handover have become very hot in recent years. This paper proposed an efficient handover scheme in Multi-PAN Wireless Sensor Networks (WSNs). A number of edge nodes are set at the edge of each Personal Area Networks (PANs). A User Equipment (UE), which has WSN and cellular...

    Provided By Scientific Research

  • White Papers // Oct 2012

    A Facilitated Interface to Generate a Combined Textual and Graphical Database System Using Widely Available Software

    Data-Base Management System (DBMS) is the current standard for storing information. A DBMS organizes and maintains a structure of storage of data. Databases make it possible to store vast amounts of randomly created information and then retrieve items using associative reasoning in search routines. However, design of databases is cumbersome....

    Provided By Scientific Research

  • White Papers // Oct 2012

    Low Power Transceiver Design Parameters for Wireless Sensor Networks

    Designing low power sensor networks has been the general goal of design engineers, scientist and end users. It is desired to have a Wireless Sensor Network (WSN) that will run on little power (if possible, none at all) thereby saving cost, and the inconveniences of having to replace batteries in...

    Provided By Scientific Research

  • White Papers // Oct 2012

    Zigbee Based Wireless Sensor and Actuator Network for Service Robot Intelligent Space

    Wireless sensor and actuator network is the key technology of service robot intelligent space. This paper is concerned with design and implementation of a ZigBee based wireless sensor and actuator network, which has been applied in their service robot intelligent space successfully. Firstly, a simplified ZigBee stack applied to ZWSAN...

    Provided By Scientific Research

  • White Papers // Oct 2012

    Compact Wideband Rectangular Monopole Antenna for Wireless Applications

    In this paper, the authors present a compact wideband microstrip-fed planar monopole antenna composed of a rectangular patch and slotted ground structure. By placing pair of symmetrical square stubs, making slots in the stubs, putting stubs on the sides of the radiating patch, gives wide-band characteristics. The antenna only one...

    Provided By Scientific Research

  • White Papers // Oct 2012

    State Estimation Over Customized Wireless Network

    In this paper, the state estimation techniques are investigated over customized wireless network for a continuous-time plant. It is assumed that the plant is connected to the controller over the proposed network. The feedback control over wireless networks includes limited bandwidth, time-varying and unknown delays with a high probability of...

    Provided By Scientific Research

  • White Papers // Oct 2012

    Dynamic Identity Based Authentication Protocol for Two-Server Architecture

    Most of the password based authentication protocols make use of the single authentication server for user's authentication. User's verifier information stored on the single server is a main point of susceptibility and remains an attractive target for the attacker. On the other hand, multi-server architecture based authentication protocols make it...

    Provided By Scientific Research

  • White Papers // Oct 2012

    Identifier Migration for Identity Continuance in Single Sign-On

    Single Sign-On (SSO) is an identity management technique that provides the ability to use multiple web services with one set of credentials. However, when the authentication server is down or unavailable, users cannot access these web services, regardless of whether they are operating normally. Therefore, it is important to enable...

    Provided By Scientific Research

  • White Papers // Oct 2012

    MAMNID: A Load Balance Network Diagnosis Model Based on Mobile Agents

    In this paper, the authors propose MAMNID, a mobile agent-based model for networks incidents diagnosis. It is a load-balance and resistance to attack model, based on mobile agents to mitigate the weaknesses of centralized systems like that proposed by the researcher which consists in gathering data to diagnose from their...

    Provided By Scientific Research

  • White Papers // Oct 2012

    Category-Based Intrusion Detection Using PCA

    Existing Intrusion Detection Systems (IDS) examine all the network features to detect intrusion or misuse patterns. In feature-based intrusion detection, some selected features may found to be redundant, useless or less important than the rest. This paper proposes a category-based selection of effective parameters for intrusion detection using Principal Components...

    Provided By Scientific Research

  • White Papers // Sep 2012

    Model Based Data Transmission: Analysis of Link Budget Requirement Reduction

    Communications capability can be a significant constraint on the utility of a spacecraft. While conventionally enhanced through the use of a larger transmitting or receiving antenna or through augmenting transmission power, communications capability can also be enhanced via incorporating more data in every unit of transmission. Model Based Transmission Reduction...

    Provided By Scientific Research

  • White Papers // Sep 2012

    Capacity Calculation and Sub-Optimal Power Allocation Scheme for OFDM-Based Systems

    For emerging cellular wireless systems, the mitigation of inter-cell interference is the key to achieve a high capacity and good user experience. This paper is devoted to the performance analysis of interference mitigation techniques for the downlink in an Orthogonal Frequency Division Multiple Access (OFDMA) network, with a focus on...

    Provided By Scientific Research

  • White Papers // Sep 2012

    Secure Messaging Implementation in OpenSC

    Smartcards are used for a rapidly increasing number of applications including electronic identity, driving licenses, physical access, health care, digital signature, and electronic payments. The use of a specific smartcard in a \"Closed\" environment generally provides a high level of security. In a closed environment no other smartcards are employed...

    Provided By Scientific Research

  • White Papers // Sep 2012

    A Game Comparative Study: Object-Oriented Paradigm and Notification-Oriented Paradigm

    This paper presents a new programming paradigm named Notification-Oriented Paradigm (NOP) and analyses the performance aspects of NOP programs by means of an experiment. NOP provides a new manner to conceive, structure, and execute software, which would allow better performance, causal-knowledge organization, and decoupling than standard solutions based upon usual...

    Provided By Scientific Research

  • White Papers // Sep 2012

    Realization of Network Bypass Protecting Instrument Based on ARM-Linux

    With the control mode of value-added network services equipment changing from bypass intervention to serial control, in order to minimize the security problems which are caused by the failure of the network equipment, this paper proposes a stable, fast and intelligent network bypass protection system combined with the ARM embedded...

    Provided By Scientific Research

  • White Papers // Sep 2012

    Unified Mogramming with Var-Oriented Modeling and Exertion-Oriented Programming Languages

    The Service ORiented Computing EnviRonment (SORCER) targets service abstractions for transdisciplinary complexity with support for heterogeneous Service-Oriented (SO) computing. SORCER's models are expressed in a top-down Var-oriented Modeling Language (VML) unified with programs in a bottoms-up Exertion-Oriented Language (EOL). In this paper, the introduction to mogramming (modeling and programing), which...

    Provided By Scientific Research

  • White Papers // Sep 2012

    Network Intrusion Detection and Visualization Using Aggregations in a Cyber Security Data Warehouse

    The challenge of achieving situational understanding is a limiting factor in effective, timely and adaptive cyber security analysis. Anomaly detection fills a critical role in network assessment and trend analysis, both of which underlie the establishment of comprehensive situational understanding. To that end, the authors propose a cyber security data...

    Provided By Scientific Research

  • White Papers // Sep 2012

    Stochastic Binary Neural Networks for Qualitatively Robust Predictive Model Mapping

    The authors consider the case where the statistical behavior of environmental models must be learned in real time. In particular, they focus on learning such behavior predictively, as may be applicable in data compression, hypothesis testing or model identification, while statistical qualitative robustness for protection against outlier data is sought...

    Provided By Scientific Research

  • White Papers // Sep 2012

    A Hybrid Method for Edge Continuity Based on Pixel Neighbors Pattern Analysis (PNPA) for Remote Sensing Satellite Images

    Edge enhancement is derived from lack of accurate result from edge detection techniques. The image which is captured from long distances carries a lot of noise and blur which causes edge discontinuity. Although some novel algorithms which are based on cellular neural network, fuzzy enhancement and binary morphology have shown...

    Provided By Scientific Research

  • White Papers // Sep 2012

    Mathematical Models and Optimization in Line Structure Routing: Survey and Advanced Results

    In this paper, the authors show the optimization problem of line structure (primarily railroad) routing. The improved mathematical models and algorithms of vertical alignment by set versions of the route plan are offered. The problem is solved in some stages in interrelation with other design problems. The original algorithm of...

    Provided By Scientific Research

  • White Papers // Mar 2012

    Formal Verification of Secrecy in Group Key Protocols Using Event-B

    Group key security protocols play an important role in today's communication systems. Their verification, however, remains a great challenge because of the dynamic characteristics of group key construction and distribution protocols. Security properties that are well defined in normal two-party protocols have different meanings and different interpretations in group key...

    Provided By Scientific Research

  • White Papers // Mar 2012

    Accuracy Analysis in Fingerprint Authentication Using the Fractional Fourier Transform without Misalignment Correction of Scanned Images

    In many fingerprint authentication devices, a frame to insert the fingertip or a hollow to put the fingertip is used to avoid the position or rotation misalignment of a newly scanned genuine fingerprint image, when the fingerprint authentication is conducted. Moreover, the misalignment correction by the numerical calculation is indispensable...

    Provided By Scientific Research

  • White Papers // Mar 2012

    The Injection Velocity and Apogee Simulation for Transfer Elliptical Satellite Orbits

    Basic resources for communication satellites are communication radio-frequencies and satellite orbits. An orbit is the trajectory followed by the satellite. The communication between the satellite and a ground station is established only when the satellite is consolidated in its own orbit and it is visible from the ground station. Different...

    Provided By Scientific Research

  • White Papers // Feb 2012

    Role of Cross Layer Based Intrusion Detection System for Wireless Domain

    Wireless mesh networks are very common both for organizations and individuals. Many laptops, computers have wireless cards preinstalled for buyer. However a wireless networking has many security issues. An Intrusions Detection System aim to detect the different attacks against network and system. An Intrusion Detection System should be capable for...

    Provided By Scientific Research

  • White Papers // Feb 2012

    A Low Energy Uneven Cluster Protocol Design for Wireless Sensor Network

    A low energy uneven cluster protocol design method is proposed. Aiming at the random choosing for cluster head of traditional leach protocol, and the defect of the single hop from all the cluster heads to the sink node, an improved method for leave protocol is advanced. Firstly, the election model...

    Provided By Scientific Research

  • White Papers // Feb 2012

    Increasing Throughput and Reducing Delay in Wireless Sensor Networks Using Interference Alignment

    With the advent of sensor nodes with higher communication and sensing capabilities, the challenge arises in forming a data gathering network to maximize the network capacity. The channel sharing for higher data transmission leads to interfering problems. The effects of interferences become increasingly important when simultaneous transmissions are done in...

    Provided By Scientific Research

  • White Papers // Feb 2012

    Spray and Dynamic: Advanced Routing in Delay Tolerant Networks

    In this paper, the authors addresses the problem of routing in Delay Tolerant Networks (DTNs). Delay Tolerant Networks are wireless networks where disconnections occur frequently due to mobility of nodes, failures of energy, the low density of nodes, or when the network extends over long distances. In these cases, traditional...

    Provided By Scientific Research

  • White Papers // Feb 2012

    Research on User Permission Isolation for Multi-Users Service-Oriented Program

    For the super user privilege control problem in system services, a user permission isolation method is proposed. Based on virtualization technology, the permission limited environments are constructed for different users. According to privilege sets, the users, mapping relations are built among users, isolated domains and program modules. Besides, the authors...

    Provided By Scientific Research

  • White Papers // Feb 2012

    Optimal Allocation of Radio Resource in Cellular LTE Downlink Based on Truncated Dynamic Programming Under Uncertainty

    In the cellular Long-Term Evolution (LTE) downlink, the smallest radio resource unit a scheduler can assign to a user is a Resource Block (RB). Each RB consists of Twelve (12) adjacent Orthogonal Frequency Division Multiplexing (OFDM) sub-carriers with inter-subcarrier spacing of 15 kHz. Over the years, researchers have investigated the...

    Provided By Scientific Research

  • White Papers // Feb 2012

    MIMO Spectral Efficiency over Energy Consumption Requirements: Application to WSNs

    In this paper, the authors presents the evaluation of the "Capacity to the total energy consumption per bit ratio" of multiple antennas systems with distributed fashion. They propose an adequate geometric channel modeling for the wireless communication system which operates in indoor propagation environment with scatterers. The channel model is...

    Provided By Scientific Research

  • White Papers // Jan 2012

    Computation of Complex Primes Using Elliptic Curves: Application for Cryptosystem Design

    Knowledge of how to count the number of points on Elliptic Curve (EC) provides certain advantage in the design of cryptographic systems for secure communication in various applicational environments (transfer of funds in banking, transmission of sensitive information between inventor and his/her attorney, national security agencies, military applications, diplomatic communications,...

    Provided By Scientific Research

  • White Papers // Jan 2012

    A Novel Cooperative Spectrum Sharing Algorithm Based on Optimal Cognitive Radio User Selection

    In this paper, the authors consider the problem of Cognitive Radio (CR) user selection to maximize overall CR Network (CRN) throughput when the available spectrum bandwidth is less than the demand by all CR users. They formulate optimal CR user selection problem. Then, based on approximation of the average received...

    Provided By Scientific Research

  • White Papers // Jan 2012

    Improved Multiple-Scenario Radio Network Dimensioning for WCDMA

    In Wideband Code Division Multiple Access (WCDMA) cellular systems, the coverage radius of a cell depends on its current capacity level. As a result, existing WCDMA radio network dimensioning approaches require that coverage and capacity planning be carried out jointly in an iterative manner in order to obtain the minimum...

    Provided By Scientific Research

  • White Papers // Jan 2012

    Multi-Resolution Fourier Analysis Part II: Missing Signal Recovery and Observation Results

    In this paper, the authors report application procedures and observed results of multi-resolution Fourier analysis proposed in the first part of this series. Missing signal recovery derived from multi-resolution theory is developed. It is shown that multi-resolution Fourier analysis enhances dramatically performances of Fourier spectra suffering limitations traced to implicit...

    Provided By Scientific Research

  • White Papers // Jan 2012

    Modeling Transfer Function of Electrical Power Lines for Broadband Power Line Communication

    The indoor access network is characterized by several branches that cause many reflections. In this paper, the authors present an approach to model the transfer function of electrical power lines for broadband power line communication. The assuming channel consists of three wires, which is widely used in many countries. As...

    Provided By Scientific Research

  • White Papers // Jan 2012

    Comparison of Kurtosis and Fourth Power Detectors with Applications to IR-UWB OOK Systems

    On-Off Keying (OOK) is one of the modulation schemes for non-coherent impulse radio ultra-wideband systems. In this paper, the utilization of the Kurtosis Detector (KD) and Fourth power Detector (FD) receivers for OOK signaling is introduced. The authors investigate the effect of integration interval and the optimum threshold on the...

    Provided By Scientific Research

  • White Papers // Sep 2012

    Secure Messaging Implementation in OpenSC

    Smartcards are used for a rapidly increasing number of applications including electronic identity, driving licenses, physical access, health care, digital signature, and electronic payments. The use of a specific smartcard in a \"Closed\" environment generally provides a high level of security. In a closed environment no other smartcards are employed...

    Provided By Scientific Research

  • White Papers // Sep 2011

    Status of the Utilisation of E-Commerce Resources by Small and Medium (SMES) Enterprises in Nigeria

    The major purpose of this paper was to explore the utilization of e-commerce by SMEs in marketing industrial products in Lagos metropolis (Nigeria). Two research questions were answered and two hypotheses tested at 0.05 level of significance. The population for the study consisted of 532 managers of SMEs that are...

    Provided By Scientific Research

  • White Papers // Feb 2010

    A Literature Review on the Studies of Internet Retailing Management

    This paper reviewed the studies of Internet retailing management. It found that, in general, most of the papers on the topic took focus on Internet retailing strategy and online merchandise management. Specifically, it drawn following conclusions: First, there were six major incentives for firms to adopt Internet retailing, including improving...

    Provided By Scientific Research

  • White Papers // Aug 2012

    The Size, Structure and Characteristics of Finland's ITS Industry

    Intelligent Transport Systems (ITS) are seen as a high-growth segment within the transport sector, as Information and Communication Technologies (ICT) push their way through different industries. ITS products and services has been developed, and its myriad benefits has been introduced which are promising for new business opportunities and investors. Its...

    Provided By Scientific Research

  • White Papers // Mar 2013

    Collaborative Design Theory and Related Key Technology Study Based on Cloud Computing

    Analyzes the main way of product distribution for collaborative design. According to the requirement of manufacturing collaborative design, apply cloud computing in manufacturing collaborative design and come up the concept of product collaborative cloud design. Study the product collaborative design theory based on cloud computing and the general key technology...

    Provided By Scientific Research

  • White Papers // Jul 2012

    A Study of the Relation Between Market System Evolution and Enterprise Institution Change

    Market system which takes exchange rules as the main body has experienced the evolution from classical market system to modern market system. The basic mark of classical market is free competition. The economic operation was regulated by a single market. However, in modern market system, market mechanism and plan mechanism...

    Provided By Scientific Research

  • White Papers // Jun 2013

    OMT-G Modeling and Cloud Implementation of a Reference Database of Addressing in Morocco

    A reference database of addressing is an important resource for urban applications. The efficiency of an addressing sys-tem depends on both data quality and technical architecture. Data must respect a standard model that is flexible to meet different cases in the field. The technical architecture should be service oriented to...

    Provided By Scientific Research

  • White Papers // Nov 2012

    QoS Based Framework for Effective Web Services in Cloud Computing

    Enhancements in technology always follow Consumer requirements. Consumer requires best of service with least possible mismatch and on time. Numerous applications available today are based on Web Services and Cloud Computing. Recently, there exist many Web Services with similar functional characteristics. Choosing \"A-right\" Service from group of similar Web Service...

    Provided By Scientific Research

  • White Papers // May 2013

    Framework of User Participation for the Interface Design in the SaaS Layer

    The development of software as a service represents a great advantage for the users of cloud computing, such as users of small, medium or large organizations. All these users possess different characteristics, which must be taken into account as reference for the interface development of a software product. This paper...

    Provided By Scientific Research

  • White Papers // Dec 2012

    Game Analysis of SME Financing

    The SMEs (Small and Medium-sized Enterprises) play important role in the economy. However, the financing problem is a big difficulty, which has plagued the SMEs' development. Information asymmetry is the main reason for the SMEs' gaining funds so hard. The information asymmetry between banks and enterprises is that banks do...

    Provided By Scientific Research

  • White Papers // Jan 2014

    Investigating Approaches of Data Integrity Preservation for Secure Data Aggregation in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) typically use in-network processing to reduce the communication overhead. Due to the fusion of data items sourced at different nodes into a single one during in-network processing, the sanctity of the aggregated data needs to be ensured. Especially, the data integrity of the aggregated result is...

    Provided By Scientific Research

  • White Papers // Jan 2014

    Comparative Evaluation of Elliptic Curve Cryptography Based Homomorphic Encryption Schemes for a Novel Secure Multiparty Computation

    In this paper, the authors focus on elliptic curve cryptography based approach for Secure Multiparty Computation (SMC) problem. Widespread proliferation of data and the growth of communication technologies have enabled collaborative computations among parties in distributed scenario. Preserving privacy of data owned by parties is crucial in such scenarios. Classical...

    Provided By Scientific Research

  • White Papers // Jul 2012

    Feedback Reliability Ratio of an Intrusion Detection System

    The behavior and nature of attacks and threats to computer network systems have been evolving rapidly with the advances in computer security technology. At the same time however, computer criminals and other malicious elements find ways and methods to thwart such protective measures and find techniques of penetrating such secure...

    Provided By Scientific Research

  • White Papers // Jan 2014

    Simulation Study Based on Somewhat Homomorphic Encryption

    The researcher, put forward the concept of a fully homomorphic encryption, namely under the condition of not unlocking to various operations of crypto-graph, the results from the decrypted plaintext and operation results of the same accordingly. At present paper, homomorphic encryption scheme is most focusing on algorithm efficiency and security...

    Provided By Scientific Research

  • White Papers // Jan 2014

    An Algorithm and Data Process Scheme for Indoor Location Based on Mobile Devices

    Limited by the sampling capacity of the mobile devices, many real-time indoor location systems have such problems as low accuracy, large variance, and non-smooth movement of the estimated position. A new positioning algorithm and a new processing method for sampled data are proposed. Firstly, a positioning algorithm is de-signed based...

    Provided By Scientific Research

  • White Papers // Oct 2013

    Performance Analysis of an Autoconfiguration Addressing Protocol for Ad Hoc Networks

    A Mobile Ad hoc NETwork (MANET) is a group of mobile nodes which cooperatively and spontaneously form an IP-based network with no centralized administration. Autoconfiguration protocols are important in maintaining Mobile Ad hoc NETworks (MANETs). In this paper, the authors present an auto configuration protocol called the One-Step Addressing (OSA)...

    Provided By Scientific Research

  • White Papers // Jan 2014

    Performance Analysis of RFID Framed Slotted Aloha Anti-Collision Protocol

    In this paper, the authors develop a novel mathematical model to estimate the probability distribution function of the number of tags discovered after a certain number of interrogation rounds. In addition, the pdfs of the number of rounds needed to discover all the tags are also calculated. The estimation of...

    Provided By Scientific Research

  • White Papers // Oct 2013

    Track Paging an Optimal Method for Minimizing Paging and Signaling Cost in Mobile IP

    Mobile IP is an Internet standards protocol, which enhances the existing Internet Protocol (IP) to accommodate mobility. In mobile IP protocol, to find the exact location of mobile node for transferring incoming packets to them has a lot of signaling cost. So increasing the performance and decreasing the signaling cost...

    Provided By Scientific Research

  • White Papers // Jul 2014

    Cloud Computing and Big Data: A Review of Current Service Models and Hardware Perspectives

    Big data applications are pervading more and more aspects of the people life, encompassing commercial and scientific uses at increasing rates as they move towards exascale analytics. Examples of big data applications include storing and accessing user data in commercial clouds, mining of social data, and analysis of large-scale simulations...

    Provided By Scientific Research

  • White Papers // Jul 2014

    Formal Methods for Commercial Applications Issues vs. Solutions

    It was advocated that in 21st century, most of software will be developed with benefits of formal methods. The benefits include faults found in earlier stage of software development, automating, checking the certain properties and minimizing rework. In spite of their recognition in academic world and these claimed advantages, formal...

    Provided By Scientific Research

  • White Papers // Jul 2014

    Software Frameworks, Architectural and Design Patterns

    Software systems can be among the most complex constructions in engineering disciplines and can span into years of development. Most software systems though implement in part what has already been built and tend to follow known or nearly known architectures. Although most software systems are not of the size of...

    Provided By Scientific Research

  • White Papers // Jul 2014

    Refining Use/Misuse/Mitigation Use Cases for Security Requirements

    The authors investigate security at the same time as the functional requirements by refining and integrating use, misuse, and mitigation use cases. Security requirements rely on the interactions among normal system execution (use cases), attacks (misuse cases), and necessary security strategies (mitigation use cases), but previous approaches only use a...

    Provided By Scientific Research

  • White Papers // Jul 2014

    Regression Testing in Developer Environment for Absence of Code Coverage

    The techniques of test case prioritization schedule the execution order of test cases to attain respective target, such as enhanced level of forecasting the fault. The requirement of the prioritization can be viewed as the en-route for deriving an order of relation on a given set of test cases which...

    Provided By Scientific Research

  • White Papers // Jun 2014

    Computer Aided Call for Tenders: A Tool for Software Bidding

    Under a broad comprehension of software engineering, it is preferred the term software life cycle instead of just software production. The reason is that cycle starts at software conception and stops when the software is relegated. Given contemporary companies' market strategies of focusing on their competitive advantages, most of them...

    Provided By Scientific Research