shahi.nishiy

Displaying 1-8 of 8 results

  • White Papers // Nov 2012

    Adaptive Anomaly-Based Intrusion Detection System Using Fuzzy Controller

    In this paper, the authors present an anomaly-based intrusion detection system to improve the system performance. Fuzzy rule-based modeling and fuzzy controller are used to create a detection model in the training phase and update this model in the test phase respectively. Moreover, the results of system's predictions buffered and...

    Provided By shahi.nishiy

  • White Papers // Oct 2012

    Design and Implementation of Multistage Interconnection Networks for SoC Networks

    In this paper the focus is on a family of Interconnection Networks (INs) known as Multistage Interconnection Networks (MINs). When it is exploited in Network-on-Chip (NoC) architecture designs, smaller circuit area, lower power consumption, less junctions and broader bandwidth can be achieved. Each MIN can be considered as an alternative...

    Provided By shahi.nishiy

  • White Papers // Jun 2012

    A Fair Radio Resource Allocation Algorithm for Uplink of FBMC Based CR Systems

    Spectrum scarcity seems to be the most challenging issue to be solved in new wireless telecommunication services. It is shown that spectrum unavailability is mainly due to spectrum inefficient utilization and inappropriate physical layer execution rather than spectrum shortage. Daily increasing demand for new wireless services with higher data rate...

    Provided By shahi.nishiy

  • White Papers // Jun 2012

    Achievable Outage Rates in Cognitive Radio Networks Under Imperfect Spectrum Sensing

    Cognitive Radio (CR) technology has been recommended as a key solution to the problem of inefficient use of the allocated spectrum to primary licensed users. This technology allows unlicensed or Secondary Users (SU) to access spectrum bands allocated to licensed or Primary Users (PU) while the interference imposed on the...

    Provided By shahi.nishiy

  • White Papers // Mar 2012

    A Certificateless Proxy Signature Scheme Secure in Standard Model

    A proxy signature scheme allows one user to delegate his/her signing authority to another user called a proxy signer in such a way that the latter can sign messages on behalf of the former. Moreover, after verification, the verifier is convinced of the original signer's agreement on the signed message....

    Provided By shahi.nishiy

  • White Papers // Dec 2011

    Metrics for BPEL Process Context-Independency Analysis

    BPEL processes are workflow-oriented composite services for service-oriented solutions. Rapidly changing environment and turbulent market conditions require flexible BPEL processes to adapt with several modifications during their lifecycles. Such adaptability and flexibility requires the low degree of dependency or coupling between a BPEL process and its surrounding environment. In fact,...

    Provided By shahi.nishiy

  • White Papers // Jan 2011

    A Metric for Measuring BPEL Process Context-Independency

    BPEL provides a workflow-oriented composition model for service-oriented solutions that facilitates the system integration through orchestration and choreography of services. In some cases, BPEL process designs can be highly complex owing to the vast number of services executed in global markets. Such heavy coupling and context dependency with partners in...

    Provided By shahi.nishiy

  • White Papers // Mar 2010

    Towards a Systematic, Cost-Effective Approach for ERP Selection

    Existing experiences indicate that one of the most prominent reasons that some ERP implementations fail is related to selecting an improper ERP package. Among those important factors resulting in inappropriate ERP selections, one is to ignore preliminary activities that should be done before the evaluation of ERP packages. Another factor...

    Provided By shahi.nishiy

  • White Papers // Mar 2012

    A Certificateless Proxy Signature Scheme Secure in Standard Model

    A proxy signature scheme allows one user to delegate his/her signing authority to another user called a proxy signer in such a way that the latter can sign messages on behalf of the former. Moreover, after verification, the verifier is convinced of the original signer's agreement on the signed message....

    Provided By shahi.nishiy

  • White Papers // Jun 2012

    A Fair Radio Resource Allocation Algorithm for Uplink of FBMC Based CR Systems

    Spectrum scarcity seems to be the most challenging issue to be solved in new wireless telecommunication services. It is shown that spectrum unavailability is mainly due to spectrum inefficient utilization and inappropriate physical layer execution rather than spectrum shortage. Daily increasing demand for new wireless services with higher data rate...

    Provided By shahi.nishiy

  • White Papers // Jun 2012

    Achievable Outage Rates in Cognitive Radio Networks Under Imperfect Spectrum Sensing

    Cognitive Radio (CR) technology has been recommended as a key solution to the problem of inefficient use of the allocated spectrum to primary licensed users. This technology allows unlicensed or Secondary Users (SU) to access spectrum bands allocated to licensed or Primary Users (PU) while the interference imposed on the...

    Provided By shahi.nishiy

  • White Papers // Oct 2012

    Design and Implementation of Multistage Interconnection Networks for SoC Networks

    In this paper the focus is on a family of Interconnection Networks (INs) known as Multistage Interconnection Networks (MINs). When it is exploited in Network-on-Chip (NoC) architecture designs, smaller circuit area, lower power consumption, less junctions and broader bandwidth can be achieved. Each MIN can be considered as an alternative...

    Provided By shahi.nishiy

  • White Papers // Dec 2011

    Metrics for BPEL Process Context-Independency Analysis

    BPEL processes are workflow-oriented composite services for service-oriented solutions. Rapidly changing environment and turbulent market conditions require flexible BPEL processes to adapt with several modifications during their lifecycles. Such adaptability and flexibility requires the low degree of dependency or coupling between a BPEL process and its surrounding environment. In fact,...

    Provided By shahi.nishiy

  • White Papers // Jan 2011

    A Metric for Measuring BPEL Process Context-Independency

    BPEL provides a workflow-oriented composition model for service-oriented solutions that facilitates the system integration through orchestration and choreography of services. In some cases, BPEL process designs can be highly complex owing to the vast number of services executed in global markets. Such heavy coupling and context dependency with partners in...

    Provided By shahi.nishiy

  • White Papers // Mar 2010

    Towards a Systematic, Cost-Effective Approach for ERP Selection

    Existing experiences indicate that one of the most prominent reasons that some ERP implementations fail is related to selecting an improper ERP package. Among those important factors resulting in inappropriate ERP selections, one is to ignore preliminary activities that should be done before the evaluation of ERP packages. Another factor...

    Provided By shahi.nishiy

  • White Papers // Nov 2012

    Adaptive Anomaly-Based Intrusion Detection System Using Fuzzy Controller

    In this paper, the authors present an anomaly-based intrusion detection system to improve the system performance. Fuzzy rule-based modeling and fuzzy controller are used to create a detection model in the training phase and update this model in the test phase respectively. Moreover, the results of system's predictions buffered and...

    Provided By shahi.nishiy