Sultan Qaboos University

Displaying 1-13 of 13 results

  • White Papers // Sep 2011

    Parallel Routing in Mobile Ad-Hoc Networks

    This paper proposes and evaluates a new position-based Parallel Routing Protocol (PRP) for simultaneously routing multiple data packets over disjoint paths in a Mobile Ad-hoc NETwork (MANET) for higher reliability and reduced communication delays. PRP views the geographical region where the MANET is located as a virtual 2-dimensional grid of...

    Provided By Sultan Qaboos University

  • White Papers // Jan 2011

    A Modified AES Based Algorithm for Image Encryption

    With the fast evolution of digital data exchange, security information becomes much important in data storage and transmission. Due to the increasing use of images in industrial process, it is essential to protect the confidential image data from unauthorized access. In this paper, the authors analyze the Advanced Encryption Standard...

    Provided By Sultan Qaboos University

  • White Papers // Aug 2010

    Improvement of Bit-Error-Rate in Optical Fiber Receivers

    In this paper, a post processing scheme is suggested for improvement of Bit Error-Rate (BER) in optical fiber transmission receivers. The developed scheme has been tested on optical fiber systems operating with a Non-Return-to-Zero (NRZ) format at transmission rates of up to 10Gbps. The transmission system considered is based on...

    Provided By Sultan Qaboos University

  • White Papers // Apr 2010

    Coupled FPGA/ASIC Implementation of Elliptic Curve Crypto-Processor

    In this paper, the authors propose an elliptic curve key generation processor over GF(2163) scheme based on the Montgomery scalar multiplication algorithm. The new architecture is performed using polynomial basis. The Finite Field operations use a cellular automata multiplier and Fermat algorithm for inversion. For real time implementation, the architecture...

    Provided By Sultan Qaboos University

  • White Papers // Jan 2010

    HW/SW Design-Based Implementation of Vector Median Rational Hybrid Filter

    A new code sign implementation of vector median rational hybrid filter based on efficient hardware/software implementation is introduced and applied to colour image filtering problems. This filter is used essentially to remove impulsive and Gaussian noise in colour images. In the design the authors start by implementing the software solution...

    Provided By Sultan Qaboos University

  • White Papers // Jul 2009

    Impact Of The Nature & Characteristics Of Organizations On Nonfinancial Performance Measurement

    Several studies have been devoted to examining Management Accounting (MA) practices in organizations, while few others examined the differences between management accounting practices in services and manufacturing organizations. However, most of these studies have examined management accounting practices irrespective of the nature and characteristics of organizations. Little is known about...

    Provided By Sultan Qaboos University

  • White Papers // Jun 2009

    A Fuzzy Logic Based Navigation of a Mobile Robot

    One of the long standing challenging aspects in mobile robotics is the ability to navigate autonomously, avoiding modeled and unmodeled obstacles especially in crowded and unpredictably changing environment. A successful way of structuring the navigation task in order to deal with the problem is within behavior based navigation approaches. In...

    Provided By Sultan Qaboos University

  • White Papers // Jun 2009

    Effective Keyword and Similarity Thresholds for the Discovery of Themes From the User Web Access Patterns

    Clustering techniques have been used by many intelligent software agents to group similar access patterns of the Web users into high level themes which express users intentions and interests. However, such techniques have been mostly focusing on one salient feature of the Web document visited by the user, namely the...

    Provided By Sultan Qaboos University

  • White Papers // Feb 2009

    The Use of Wireless Sensor Networks for Homeland Security

    One of the aspects of homeland security is to secure public areas and buildings against intrusion. The use of Wireless Sensor Networks (WSN) is an efficient and reliable solution for doing perimeter surveillance, which allows detecting intrusions and the timely location of dangerous devices. The deployment of WSNs for these...

    Provided By Sultan Qaboos University

  • White Papers // Feb 2009

    MIMO Channel Gain Mechanisms Relative to SISO Channel

    In contrast to the rest of wireless communication technologies, Multiple-Input Multiple-Output (MIMO) technology enjoys different gain mechanisms that make it very attractive for reliable high data rate wireless communications. This paper presents a study on these gain mechanisms with particular emphasize on the case of high average receive Signal to...

    Provided By Sultan Qaboos University

  • White Papers // Feb 2009

    OFDM Performance Under Mobile-to-Mobile Channels

    Mobile-To-Mobile (MTM) communications are new fields and find increasing applications in many futuristic areas. The characteristics of MTM channels have been studied through many scientist and researchers. The main feature of MTM channels is that the Doppler effects come from both, transmitter and receiver, due to mobilization of both systems....

    Provided By Sultan Qaboos University

  • White Papers // Feb 2009

    Tracking The Impact Of Change In Ownership On The Efficiency Of Commercial Banks In MENA Countries Using A Malmquist Index-Based Approach

    The aim of this paper is to track the impact of ownership including Mergers and Acquisitions (M&A) in the MENA-region's banking industry on the technical efficiency of its commercial banking units, technical efficiency being the goodness in transforming inputs into outputs. To assess such change, this paper uses Malmquist Productivity...

    Provided By Sultan Qaboos University

  • White Papers // Jan 2009

    Impact of Implementing VPN to Secure Wireless LAN

    Many corporations are seriously concerned about security of networks and therefore, their network supervisors are still reluctant to install WLANs. In this regards, the IEEE802.11i standard was developed to address the security problems, even though the mistrust of the wireless LAN technology is still existing. The thought was that the...

    Provided By Sultan Qaboos University

  • White Papers // Jan 2009

    Impact of Implementing VPN to Secure Wireless LAN

    Many corporations are seriously concerned about security of networks and therefore, their network supervisors are still reluctant to install WLANs. In this regards, the IEEE802.11i standard was developed to address the security problems, even though the mistrust of the wireless LAN technology is still existing. The thought was that the...

    Provided By Sultan Qaboos University

  • White Papers // Jul 2009

    Impact Of The Nature & Characteristics Of Organizations On Nonfinancial Performance Measurement

    Several studies have been devoted to examining Management Accounting (MA) practices in organizations, while few others examined the differences between management accounting practices in services and manufacturing organizations. However, most of these studies have examined management accounting practices irrespective of the nature and characteristics of organizations. Little is known about...

    Provided By Sultan Qaboos University

  • White Papers // Jun 2009

    Effective Keyword and Similarity Thresholds for the Discovery of Themes From the User Web Access Patterns

    Clustering techniques have been used by many intelligent software agents to group similar access patterns of the Web users into high level themes which express users intentions and interests. However, such techniques have been mostly focusing on one salient feature of the Web document visited by the user, namely the...

    Provided By Sultan Qaboos University

  • White Papers // Feb 2009

    Tracking The Impact Of Change In Ownership On The Efficiency Of Commercial Banks In MENA Countries Using A Malmquist Index-Based Approach

    The aim of this paper is to track the impact of ownership including Mergers and Acquisitions (M&A) in the MENA-region's banking industry on the technical efficiency of its commercial banking units, technical efficiency being the goodness in transforming inputs into outputs. To assess such change, this paper uses Malmquist Productivity...

    Provided By Sultan Qaboos University

  • White Papers // Jan 2010

    HW/SW Design-Based Implementation of Vector Median Rational Hybrid Filter

    A new code sign implementation of vector median rational hybrid filter based on efficient hardware/software implementation is introduced and applied to colour image filtering problems. This filter is used essentially to remove impulsive and Gaussian noise in colour images. In the design the authors start by implementing the software solution...

    Provided By Sultan Qaboos University

  • White Papers // Apr 2010

    Coupled FPGA/ASIC Implementation of Elliptic Curve Crypto-Processor

    In this paper, the authors propose an elliptic curve key generation processor over GF(2163) scheme based on the Montgomery scalar multiplication algorithm. The new architecture is performed using polynomial basis. The Finite Field operations use a cellular automata multiplier and Fermat algorithm for inversion. For real time implementation, the architecture...

    Provided By Sultan Qaboos University

  • White Papers // Jun 2009

    A Fuzzy Logic Based Navigation of a Mobile Robot

    One of the long standing challenging aspects in mobile robotics is the ability to navigate autonomously, avoiding modeled and unmodeled obstacles especially in crowded and unpredictably changing environment. A successful way of structuring the navigation task in order to deal with the problem is within behavior based navigation approaches. In...

    Provided By Sultan Qaboos University

  • White Papers // Jan 2011

    A Modified AES Based Algorithm for Image Encryption

    With the fast evolution of digital data exchange, security information becomes much important in data storage and transmission. Due to the increasing use of images in industrial process, it is essential to protect the confidential image data from unauthorized access. In this paper, the authors analyze the Advanced Encryption Standard...

    Provided By Sultan Qaboos University

  • White Papers // Aug 2010

    Improvement of Bit-Error-Rate in Optical Fiber Receivers

    In this paper, a post processing scheme is suggested for improvement of Bit Error-Rate (BER) in optical fiber transmission receivers. The developed scheme has been tested on optical fiber systems operating with a Non-Return-to-Zero (NRZ) format at transmission rates of up to 10Gbps. The transmission system considered is based on...

    Provided By Sultan Qaboos University

  • White Papers // Feb 2009

    The Use of Wireless Sensor Networks for Homeland Security

    One of the aspects of homeland security is to secure public areas and buildings against intrusion. The use of Wireless Sensor Networks (WSN) is an efficient and reliable solution for doing perimeter surveillance, which allows detecting intrusions and the timely location of dangerous devices. The deployment of WSNs for these...

    Provided By Sultan Qaboos University

  • White Papers // Feb 2009

    MIMO Channel Gain Mechanisms Relative to SISO Channel

    In contrast to the rest of wireless communication technologies, Multiple-Input Multiple-Output (MIMO) technology enjoys different gain mechanisms that make it very attractive for reliable high data rate wireless communications. This paper presents a study on these gain mechanisms with particular emphasize on the case of high average receive Signal to...

    Provided By Sultan Qaboos University

  • White Papers // Feb 2009

    OFDM Performance Under Mobile-to-Mobile Channels

    Mobile-To-Mobile (MTM) communications are new fields and find increasing applications in many futuristic areas. The characteristics of MTM channels have been studied through many scientist and researchers. The main feature of MTM channels is that the Doppler effects come from both, transmitter and receiver, due to mobilization of both systems....

    Provided By Sultan Qaboos University

  • White Papers // Sep 2011

    Parallel Routing in Mobile Ad-Hoc Networks

    This paper proposes and evaluates a new position-based Parallel Routing Protocol (PRP) for simultaneously routing multiple data packets over disjoint paths in a Mobile Ad-hoc NETwork (MANET) for higher reliability and reduced communication delays. PRP views the geographical region where the MANET is located as a virtual 2-dimensional grid of...

    Provided By Sultan Qaboos University