The Society of Digital Information and Wireless Communications (SDIWC)

Displaying 1-40 of 58 results

  • White Papers // Aug 2012

    Fractals Image Rendering and Compression Using GPUs

    Fractal image compression provides immense advantages as compared to conventional image compressions. Though the fractal image encoding time is comparatively quite high as compared to the conventional ones but the decoding time is far less and almost instantaneous. Besides, fractal images are resolution-independent, implying that these images will render the...

    Provided By The Society of Digital Information and Wireless Communications (SDIWC)

  • White Papers // Mar 2012

    IA-TCP: Improving Acknowledgement Mechanism of TCP for better performance in MANET

    A Mobile Ad hoc NETwork (MANET) is a collection of terminals equipped with one or several wireless network interfaces. In this paper, the authors suggest an improvement of the Transmission Control Protocol (TCP), called Improvement of the Acknowledgement mechanism of TCP (IA-TCP), to better performance in MANET. IA-TCP delays the...

    Provided By The Society of Digital Information and Wireless Communications (SDIWC)

  • White Papers // Jan 2012

    Improving Transport Protocol Performance in MANET by Exploiting the Backoff Algorithm of MAC Protocol

    In this paper, the authors propose an improvement to the transport protocol performance in Mobile Ad hoc NETwork (MANET) by exploiting the backoff algorithm of Medium Access Control (MAC) protocol. They are especially interested in the TCP (Transmission Control Protocol) performance parameters like the throughput and end-to-end delay. This improvement...

    Provided By The Society of Digital Information and Wireless Communications (SDIWC)

  • White Papers // Jan 2012

    Evaluation and Selection COTS Software Process: The State of the Art

    In the recent years, the Commercial Off-The-Shelf (COTS) products are being increasingly used in the world of software development. Therefore, evaluating and selecting appropriate COTS product is one of the most critical activities in COTS-based system development. Unfortunately, many methods that have been proposed in previous studies for evaluating and...

    Provided By The Society of Digital Information and Wireless Communications (SDIWC)

  • White Papers // Jan 2012

    Mobile Commerce Approach Based on Mobile Agent

    Telecommunications technologies are advanced; they introduced new technologies to meet the needs of individuals and organizations to make commercial transactions, where the authors find the birth of e-commerce after the emergence of the Internet. But this approach has limits like the use of a client/server model, which limit the use...

    Provided By The Society of Digital Information and Wireless Communications (SDIWC)

  • White Papers // Jan 2012

    Flexi-Adaptor; An Automated Web Content Adaptation for Mobile Devices

    Mobile web browsing usually involves a lot of horizontal and vertical scrolling, which makes web browsing time-consuming. A user may be interested in a section of a web page, which may not fit to the mobile screen and requires more scrolling in both directions. In this paper, the authors propose...

    Provided By The Society of Digital Information and Wireless Communications (SDIWC)

  • White Papers // Dec 2011

    Efficient Fingerprint Classification Using Singular Point

    Singular point is one of the local fingerprint features, and it is used as a landmark due its scale and rotation immutability. Singular point characteristics have been widely used as a feature vector for many fingerprint classification approaches. This paper introduces a new fingerprint classification method which utilizes a singular...

    Provided By The Society of Digital Information and Wireless Communications (SDIWC)

  • White Papers // Dec 2011

    Investigation of Malware Defence and Detection Techniques

    Malwares are considered as a major threat vector which can be potentially caused huge damage to both network infrastructure as well as network applications. In this paper, different techniques such as repacking, reverse engineering and hex editing for bypassing host-based Anti Virus (AV) signatures are illustrated, and the description and...

    Provided By The Society of Digital Information and Wireless Communications (SDIWC)

  • White Papers // Dec 2011

    The Effects of Varied Animation in Multimedia Learning: Is the Extra Effort Worthy?

    Animation in multimedia is said to be beneficial to learning especially when the learning material demands visual movements. The emergence of 3- Dimensional animated visuals has extended the presentation mode in multimedia learning. It is said that animated visuals in a 3-D representation not only possess motivational value that promotes...

    Provided By The Society of Digital Information and Wireless Communications (SDIWC)

  • White Papers // Dec 2011

    Wireless Ad-hoc Network Under Black-Hole Attack

    Wireless Ad-hoc Network is a temporary and decentralized type of wireless network. Due to security vulnerabilities in the routing protocol currently, this type of network is unprotected to network layer attacks. Black-hole attack is such a type of attack and is a Denial-of-Service (DoS) attack. Due to its nature, the...

    Provided By The Society of Digital Information and Wireless Communications (SDIWC)

  • White Papers // Dec 2011

    Exploring Ruby and Java Interoperability for Building Converged Web and SIP Applications

    In this paper, the authors present a Ruby infrastructure that can be used for rapid development of Web applications with SIP signaling capabilities. They construct this infrastructure by combining the Java based Cipango SIP/HTTP Servlet Application Server with the Ruby on Rails Web development framework. They provide detailed explanations of...

    Provided By The Society of Digital Information and Wireless Communications (SDIWC)

  • White Papers // Dec 2011

    Knowledge Based Approach to Software Development Process Modeling

    Modeling a software process is one way a can company decide which software process and/or its adjustment is the best solution for the current project. Modeling is the way the process is presented or simulated. Since, there are many different approaches to modeling and all of them have pros and...

    Provided By The Society of Digital Information and Wireless Communications (SDIWC)

  • White Papers // Dec 2011

    Software Engineering of Augmented Reality Remedial Paradigm for Negative Numbers: An Algorithm Visualization of Correct Thinking Process Flowchart

    The rapid advancement and accessibility of technology have opened up literally worlds of possibilities for mathematics education. Technology will continue to improve further and nations have to grow with these advancement and excellence in teaching and learning cannot be achieved through technology alone and the needs to properly addressing the...

    Provided By The Society of Digital Information and Wireless Communications (SDIWC)

  • White Papers // Dec 2011

    Comparison of System Dynamics and BPM for Software Process Simulation

    Modeling and simulation of a software process is one way a company can decide which software process and/or its adjustment is the best solution for its current project. Since, there are many different approaches to modeling and simulation and all of them have pros and cons, the very first task...

    Provided By The Society of Digital Information and Wireless Communications (SDIWC)

  • White Papers // Dec 2011

    Contention Window Optimization: An Enhancement to IEEE 802.11 DCF to Improve Quality of Service

    Wireless communication technology has gained widespread acceptance in recent years. Wireless Local Area Networks (WLANs) are becoming more and more popular and widely used, since they provide high data rates. The main characteristics of this technology are simplicity, flexibility and cost effectiveness. Recent applications include media streaming, interactive collaboration, videoconferencing...

    Provided By The Society of Digital Information and Wireless Communications (SDIWC)

  • White Papers // Dec 2011

    International Journal on New Computer Architectures and Their Applications: Information and Communication Systems e-Forensic Framework

    Early identification, discovering and taking legal proceedings against the perpetrator of an electronic incident are necessary. It is necessary to investigate all electronic incidents adequately and promptly and adapt the legal framework and laws related to e-Forensics. The e-Forensics is a relatively new discipline within which there is a low...

    Provided By The Society of Digital Information and Wireless Communications (SDIWC)

  • White Papers // Dec 2011

    An Extension and Improvement of the CloudSim Simulator

    Cloud computing has become a significant technology trend. With the cloud computing technology, users use a variety of devices to access programs, storage, and application development platforms over the Internet, via services offered by cloud computing providers. Advantages of the cloud computing technology include cost savings and high availability. Access...

    Provided By The Society of Digital Information and Wireless Communications (SDIWC)

  • White Papers // Dec 2011

    Cooperative Multi-Agents Detection With Spatially Distributed Array Sensors

    The aim of this paper deals with the design of a multi-agents system associated with array sensors dedicated to wireless telecommunications. The authors will present as first part, the spatially distributed array general modeled as well as the channel spatial propagation stimulus. Indeed, the integration and implementation of these systems...

    Provided By The Society of Digital Information and Wireless Communications (SDIWC)

  • White Papers // Dec 2011

    Towards a Versatile Wireless Platform for Low-Power Applications

    Traditional wireless sensor network architectures are based on low-power microcontrollers and highly integrated short range radio transceiver chips operating in one of the few ISM bands. This combination provides a convenient and proven approach to design and build inexpensive sensor nodes rapidly. However, the black box nature of these radio...

    Provided By The Society of Digital Information and Wireless Communications (SDIWC)

  • White Papers // Dec 2011

    A Web Service for Signing and Authenticating Digital Documents Based on Symmetric Cryptography Protocol

    Nowadays, recognizing whether or not a digital document has been counterfeit is a priority issue, particularly in organizations where legal information is handled digitally. Signing a digital document is maybe a preliminary solution. In general, the authors are interested in developing a web service that allows signing a document using...

    Provided By The Society of Digital Information and Wireless Communications (SDIWC)

  • White Papers // Dec 2011

    The Improvement of Mobile Services Providing Infrastructure Based on Priority Settings

    Industrial process control is becoming very important nowadays as more and more systems are integrated with most modern information technology based tools to achieve better process and its control performance results. Here, the main problems arise during the execution operations due to poor coordination of the initial safety conditions and...

    Provided By The Society of Digital Information and Wireless Communications (SDIWC)

  • White Papers // Dec 2011

    Architectural Framework for Generic Modeling and Diagramming in the Cloud

    This paper is aimed at presenting a concept of a flexible diagramming framework for building engineering and educational applications. The framework was designed to serve as a platform for online services and collaborative environments where users typically work on remotely stored, shared data through a browser-based user interface. The paper...

    Provided By The Society of Digital Information and Wireless Communications (SDIWC)

  • White Papers // Dec 2011

    Gait Analysis and Recognition Using Multi-Views Gait Database

    This paper presents an automatic gait recognition system that recognizes a person by the way he/she walks. The gait signature is obtained based on the contour width information of the silhouette. Using this statistical shape information, the authors could capture the compact structural and dynamic features of the walking pattern....

    Provided By The Society of Digital Information and Wireless Communications (SDIWC)

  • White Papers // Dec 2011

    Query Processing for Probabilistic State Diagrams Describing Multiple Robot Navigation in an Indoor Environment

    This paper describes the syntax and semantics of multi-level state diagrams to support probabilistic behavior of cooperating robots. The techniques are presented to analyze these diagrams by querying combined robots behaviors. It is shown how to use state abstraction and transition abstraction to create, verify and process large probabilistic state...

    Provided By The Society of Digital Information and Wireless Communications (SDIWC)

  • White Papers // Dec 2011

    Open User Involvement in Data Cleaning for Data Warehouse Quality

    High quality of data warehouse is a key to make smart strategic decisions. The data cleaning is program that performs to deal with the quality problems of data extracted from operational sources before their loading into data warehouse. As the data cleaning can introduce errors and some data require manually...

    Provided By The Society of Digital Information and Wireless Communications (SDIWC)

  • White Papers // Dec 2011

    From Relational Databases to XML Documents: Efficient Alternatives for Publishing

    XML language tends to become a standard for data exchanges between various Web applications. However, despite the big extent of the XML language, most of this applications store their information in relational databases. This fact is unlikely to be changed considering many advantages of the relational database systems like: fiability,...

    Provided By The Society of Digital Information and Wireless Communications (SDIWC)

  • White Papers // Dec 2011

    Contextual Adaptability Platform for Mobile and Ubiquitous Learning: A Step Towards a Pervasive Learning Environment

    The evolution and convergence of wireless technologies, mobile devices and sensors, has caused profound mutation in applications. Applications for e-learning are no exception to this trend; the mobile, ubiquitous and ambient learning have appeared next to the e-learning. Far from being simple extensions of distance learning, they pose several challenges....

    Provided By The Society of Digital Information and Wireless Communications (SDIWC)

  • White Papers // Dec 2011

    Efficient Information Dissemination and Collection Strategies for Wireless Sensor Networks

    Advances in wireless communication as well as in sensor technology have enabled many Wireless Senor Network (WSN) applications. Unfortunately, operational challenges faced by WSNs still hinder their wide deployment. Therefore, researchers are still looking for reliable, real time, and energy efficient structures and routing protocols which can effectively disseminate information...

    Provided By The Society of Digital Information and Wireless Communications (SDIWC)

  • White Papers // Dec 2011

    Reality of Aligning IT With Business in Czech Organizations

    Information Technologies (IT) supporting business strategies and business processes are often the most important factor for successful organizations. Aligning IT with the business depends on many factors, including communication and cooperation between the top management of organizations and the top management of IT departments in strategic decision making and planning....

    Provided By The Society of Digital Information and Wireless Communications (SDIWC)

  • White Papers // Dec 2011

    Assessment Procedure of the EM Interaction Between Mobile Phone Antennae and Human Body

    This paper presents a procedure for the evaluation of the ElectroMagnetic (EM) interaction between the mobile phone antenna and human body, i.e., head and hand, and investigates the factors may influence this interaction. These factors are considered for different mobile phone handset models, different form factors and different antenna types,...

    Provided By The Society of Digital Information and Wireless Communications (SDIWC)

  • White Papers // Nov 2011

    An Algorithm for Detecting Cycles in Undirected Graphs Using CUDA Technology

    Cycles count in a graph is an NP-complete problem. This paper minimizes the execution time to solve the problem compared to the other traditional serial, CPU based one. It reduces the hardware resources needed to a single commodity GPU. The authors developed an algorithm to approximate counting the number of...

    Provided By The Society of Digital Information and Wireless Communications (SDIWC)

  • White Papers // Nov 2011

    Singular Point Detection for Efficient Fingerprint Classification

    A singular point or singularity on fingerprint is considered as a fingerprint landmark due its scale, shift, and rotation immutability. It is used for both fingerprint classification and alignment in automatic fingerprint identification systems. This paper presents a comparative study between two singular point detection methods available in this paper....

    Provided By The Society of Digital Information and Wireless Communications (SDIWC)

  • White Papers // Nov 2011

    Infrastructure Sharing: A Cost Effective Alternative for Resiliency in 4G-LTE Mobile Networks

    With the fast growth of Internet and a new widespread interest in broadband networks, the unparalleled potential of Multi-Protocol Label Switching (MPLS) is leading to further research and development efforts. One of those areas of research is Path Protection Mechanism. An aim of the authors' ongoing research is to take...

    Provided By The Society of Digital Information and Wireless Communications (SDIWC)

  • White Papers // Nov 2011

    Dynamic Channel Estimation for MIMO-Constant Envelope Modulation

    The Multi-Input Multi-Output (MIMO)- Constant Envelope Modulation MIMOCEM is introduced as power and complexity efficient alternative to MIMO-OFDM for wireless backhaul networks. Due to a low resolution ADC (1-bit in the default operation) employed in the MIMO-CEM receiver, MIMO-CEM channel estimation is considered as one of the major challenges toward...

    Provided By The Society of Digital Information and Wireless Communications (SDIWC)

  • White Papers // Oct 2011

    Web Content Adaptation for Mobile Devices: A Greedy Approach

    Mobile internet browsing usually involves a lot of horizontal and vertical scrolling, which makes web browsing time-consuming. In addition to this, users may be interested in a section of a web page, which may not fit into the mobile screen. This requires more scrolling in both directions. In this paper,...

    Provided By The Society of Digital Information and Wireless Communications (SDIWC)

  • White Papers // Oct 2011

    Semantic Technology and Super-Peer Architecture for Internet Based Distributed System Resource Discovery

    Resource/service discovery is a very vital issue in Internet based distributed systems such as Grid and Cloud computing. In this paper, the authors address the RD issue in intergrid. They design a service discovery framework by integrating semantic technology, peer-to-peer network and intelligent agents. The framework has two main components...

    Provided By The Society of Digital Information and Wireless Communications (SDIWC)

  • White Papers // Oct 2011

    A Study on the Evaluation of Unit Testing for Android Systems

    Unit testing is a method for quickly assessing the building blocks of a program and for obtaining accurate error localizations. However, in order to achieve these qualities, the tests cases need to be isolated, since, an external call may imply a connection to a remote database. This requirement also makes...

    Provided By The Society of Digital Information and Wireless Communications (SDIWC)

  • White Papers // Oct 2011

    Review on Traditional and Agile Cost Estimation Success Factor in Software Development Project

    Software development project is one of the important areas in software engineering. Many researches have been conducted and looked into issues in software development project such as methodology used, costing, challenges, type of project and many more. However, the most crucial issues in software development project are costing. Moreover, current...

    Provided By The Society of Digital Information and Wireless Communications (SDIWC)

  • White Papers // Oct 2011

    Structuring the Information System Architecture Using Patterns

    Enterprise Architecture (EA) is an approach, which aims to align the business strategy and IT infrastructure in order to maximise the application and investment of IT facilities. In fact, EA is a conceptual framework that defines the structure of an enterprise, its components and their relationships. It involves a considerable...

    Provided By The Society of Digital Information and Wireless Communications (SDIWC)

  • White Papers // Oct 2011

    Removing Duplications in Email Addresses in Linear Time

    Currently, many government offices and companies use mailing lists for reaching their clients. Any mailing list needs continuous updates that include removing unsubscribed emails, inserting new coming emails, and removing duplications. Duplication can occur when merging two mailing lists into one master mailing list, where both the merged lists contain...

    Provided By The Society of Digital Information and Wireless Communications (SDIWC)

  • White Papers // Oct 2011

    Semantic Technology and Super-Peer Architecture for Internet Based Distributed System Resource Discovery

    Resource/service discovery is a very vital issue in Internet based distributed systems such as Grid and Cloud computing. In this paper, the authors address the RD issue in intergrid. They design a service discovery framework by integrating semantic technology, peer-to-peer network and intelligent agents. The framework has two main components...

    Provided By The Society of Digital Information and Wireless Communications (SDIWC)

  • White Papers // Oct 2011

    A Study on the Evaluation of Unit Testing for Android Systems

    Unit testing is a method for quickly assessing the building blocks of a program and for obtaining accurate error localizations. However, in order to achieve these qualities, the tests cases need to be isolated, since, an external call may imply a connection to a remote database. This requirement also makes...

    Provided By The Society of Digital Information and Wireless Communications (SDIWC)

  • White Papers // Oct 2011

    Review on Traditional and Agile Cost Estimation Success Factor in Software Development Project

    Software development project is one of the important areas in software engineering. Many researches have been conducted and looked into issues in software development project such as methodology used, costing, challenges, type of project and many more. However, the most crucial issues in software development project are costing. Moreover, current...

    Provided By The Society of Digital Information and Wireless Communications (SDIWC)

  • White Papers // Oct 2011

    Structuring the Information System Architecture Using Patterns

    Enterprise Architecture (EA) is an approach, which aims to align the business strategy and IT infrastructure in order to maximise the application and investment of IT facilities. In fact, EA is a conceptual framework that defines the structure of an enterprise, its components and their relationships. It involves a considerable...

    Provided By The Society of Digital Information and Wireless Communications (SDIWC)

  • White Papers // Oct 2011

    Removing Duplications in Email Addresses in Linear Time

    Currently, many government offices and companies use mailing lists for reaching their clients. Any mailing list needs continuous updates that include removing unsubscribed emails, inserting new coming emails, and removing duplications. Duplication can occur when merging two mailing lists into one master mailing list, where both the merged lists contain...

    Provided By The Society of Digital Information and Wireless Communications (SDIWC)

  • White Papers // Oct 2011

    Web Content Adaptation for Mobile Devices: A Greedy Approach

    Mobile internet browsing usually involves a lot of horizontal and vertical scrolling, which makes web browsing time-consuming. In addition to this, users may be interested in a section of a web page, which may not fit into the mobile screen. This requires more scrolling in both directions. In this paper,...

    Provided By The Society of Digital Information and Wireless Communications (SDIWC)

  • White Papers // Oct 2011

    Online Instructional Consultation for Higher Education Institutions in Malaysia: The System Architecture

    Evolution of communication technologies at present gives impetus to researchers and practitioners by simply put the computer-mediated communication tools on their telementoring application without really understand its potential benefits. This causes several issues and challenges confronting existing telementoring program which are: miscommunication due to lack of nonverbal cues, the need...

    Provided By The Society of Digital Information and Wireless Communications (SDIWC)

  • White Papers // Oct 2011

    EPS2Way: An Efficient Pairwise Test Data Generation Strategy

    Testing is a very important task to develop error free software. The funds and release time of a software product is limited, thus, it is nearly hard to execute the exhaustive test, i.e., to test all combinations of input data. Pairwise (2 way) test data generation strategy maintains higher reduction...

    Provided By The Society of Digital Information and Wireless Communications (SDIWC)

  • White Papers // Oct 2011

    Conversion Strategy of a System of Collaborating Design Patterns into UML Diagram for Design Pattern

    In a past publication, a proposal of a new set of UML diagram designed to picture a software system at architectural level by showing which patterns are being used has been presented. Progressing from the proposal, this publication presents an extensive example to precisely show the way to make the...

    Provided By The Society of Digital Information and Wireless Communications (SDIWC)

  • White Papers // Nov 2011

    Singular Point Detection for Efficient Fingerprint Classification

    A singular point or singularity on fingerprint is considered as a fingerprint landmark due its scale, shift, and rotation immutability. It is used for both fingerprint classification and alignment in automatic fingerprint identification systems. This paper presents a comparative study between two singular point detection methods available in this paper....

    Provided By The Society of Digital Information and Wireless Communications (SDIWC)

  • White Papers // Nov 2011

    Infrastructure Sharing: A Cost Effective Alternative for Resiliency in 4G-LTE Mobile Networks

    With the fast growth of Internet and a new widespread interest in broadband networks, the unparalleled potential of Multi-Protocol Label Switching (MPLS) is leading to further research and development efforts. One of those areas of research is Path Protection Mechanism. An aim of the authors' ongoing research is to take...

    Provided By The Society of Digital Information and Wireless Communications (SDIWC)

  • White Papers // Nov 2011

    An Algorithm for Detecting Cycles in Undirected Graphs Using CUDA Technology

    Cycles count in a graph is an NP-complete problem. This paper minimizes the execution time to solve the problem compared to the other traditional serial, CPU based one. It reduces the hardware resources needed to a single commodity GPU. The authors developed an algorithm to approximate counting the number of...

    Provided By The Society of Digital Information and Wireless Communications (SDIWC)

  • White Papers // Dec 2011

    Efficient Information Dissemination and Collection Strategies for Wireless Sensor Networks

    Advances in wireless communication as well as in sensor technology have enabled many Wireless Senor Network (WSN) applications. Unfortunately, operational challenges faced by WSNs still hinder their wide deployment. Therefore, researchers are still looking for reliable, real time, and energy efficient structures and routing protocols which can effectively disseminate information...

    Provided By The Society of Digital Information and Wireless Communications (SDIWC)

  • White Papers // Dec 2011

    Reality of Aligning IT With Business in Czech Organizations

    Information Technologies (IT) supporting business strategies and business processes are often the most important factor for successful organizations. Aligning IT with the business depends on many factors, including communication and cooperation between the top management of organizations and the top management of IT departments in strategic decision making and planning....

    Provided By The Society of Digital Information and Wireless Communications (SDIWC)

  • White Papers // Dec 2011

    Assessment Procedure of the EM Interaction Between Mobile Phone Antennae and Human Body

    This paper presents a procedure for the evaluation of the ElectroMagnetic (EM) interaction between the mobile phone antenna and human body, i.e., head and hand, and investigates the factors may influence this interaction. These factors are considered for different mobile phone handset models, different form factors and different antenna types,...

    Provided By The Society of Digital Information and Wireless Communications (SDIWC)

  • White Papers // Aug 2011

    Database Preprocessing and Comparison Between Data Mining Methods

    Database preprocessing is very important to utilize memory usage, compression is one of the preprocessing needed to reduce the memory required to store and load data for processing, the method of compression introduced in this paper was tested, by using proposed examples to show the effect of repetition in database,...

    Provided By The Society of Digital Information and Wireless Communications (SDIWC)

  • White Papers // Aug 2011

    An Efficient Temporal Partitioning Algorithm to Minimize Communication Cost for Reconfigurable Computing Systems

    In reconfigurable computing systems, full reconfigurable FPGA are evolving rapidly, due to their flexibility and high performance. In this paper, the authors focus on communication cost between partitions in order to develop an algorithm to solve temporal partitioning problems for full reconfigurable architecture. In fact, this algorithm optimizes the transfer...

    Provided By The Society of Digital Information and Wireless Communications (SDIWC)

  • White Papers // Jan 2012

    Improving Transport Protocol Performance in MANET by Exploiting the Backoff Algorithm of MAC Protocol

    In this paper, the authors propose an improvement to the transport protocol performance in Mobile Ad hoc NETwork (MANET) by exploiting the backoff algorithm of Medium Access Control (MAC) protocol. They are especially interested in the TCP (Transmission Control Protocol) performance parameters like the throughput and end-to-end delay. This improvement...

    Provided By The Society of Digital Information and Wireless Communications (SDIWC)

  • White Papers // Aug 2011

    A Scalable Block Compensation With Index Selection Mechanism to Achieve High Video Quality Retrieval

    Video quality retrieval is an important issue in reconstruction video sequences. The amounts of transmission bitstreams are very large to achieve high video quality reconstruction. Thus, high video quality retrieval is still a challenge problem. The aim of this paper is to reduce the transmission bitstreams and raise reconstruction video...

    Provided By The Society of Digital Information and Wireless Communications (SDIWC)

  • White Papers // Jan 2012

    Evaluation and Selection COTS Software Process: The State of the Art

    In the recent years, the Commercial Off-The-Shelf (COTS) products are being increasingly used in the world of software development. Therefore, evaluating and selecting appropriate COTS product is one of the most critical activities in COTS-based system development. Unfortunately, many methods that have been proposed in previous studies for evaluating and...

    Provided By The Society of Digital Information and Wireless Communications (SDIWC)

  • White Papers // Sep 2011

    Reusability Assessment of Open Source Components for Software Product Lines

    Software product lines and open source software are two emerging paradigms in software engineering. A common theme in both of these paradigms is 'Reuse'. Software product lines are a reuse centered approach that makes use of existing assets to develop new products. At the moment, a motivation for using open...

    Provided By The Society of Digital Information and Wireless Communications (SDIWC)

  • White Papers // Sep 2011

    Detecting Sleep Deprivation Attack Over MANET Using a Danger Theory - Based Algorithm

    MANET is a collection of mobile, decentralized, and self organized nodes. Securing MANET is a problem which adds more challenges on the research. This is because MANET properties make it harder to be secured than the other types of static networks. This paper objective is to summarize different types of...

    Provided By The Society of Digital Information and Wireless Communications (SDIWC)

  • White Papers // Sep 2011

    Exploration on Scalability of Database Bulk Insertion With Multithreading

    The advancement of database engine and multi-core processors technologies have enable database insertion to be implemented concurrently via multithreading programming. The objective of this paper is to evaluate the performance of using multithreading technique to perform database insertion of large data set with known size to enhance the performance of...

    Provided By The Society of Digital Information and Wireless Communications (SDIWC)

  • White Papers // Sep 2011

    An Empirical Framework Design to Examine the Improvement in Software Requirements Through Negotiation

    Negotiation is one promising effort during requirements elicitation process to improve the quality of software requirements. When negotiation is claimed beneficial theoretically, it is important that the deployment of negotiation is examined and the effectiveness of negotiation is evaluated through empirical study. This paper aims at providing an empirical framework...

    Provided By The Society of Digital Information and Wireless Communications (SDIWC)

  • White Papers // Sep 2011

    One-Time Key and Diameter Message Authentication Protocol for Proxy Mobile IPv6

    The working group of NetLMM has proposed a new approach, known as network-based mobility management protocol that is actively standardized by Internet Engineering Task Force called Proxy Mobile IPv6 where many mobility signaling messages are performed by a network entity on behalf of a mobile host. Proxy Mobile IPv6 is...

    Provided By The Society of Digital Information and Wireless Communications (SDIWC)

  • White Papers // Sep 2011

    Classification and Measurement on C Overflow Vulnerabilities Attack

    Since early 70s, software vulnerabilities have been classified and measured for various purposes including software assurance. Out of many software vulnerabilities, C vulnerabilities are the most common subject discussed, classified and measured. However, there are still gaps in those early works as C vulnerabilities still exist and reported by various...

    Provided By The Society of Digital Information and Wireless Communications (SDIWC)

  • White Papers // Sep 2011

    Applying Rough Set Theory in Multimedia Data Classification

    The huge size of multimedia data requires for efficient data classification and organization in providing effective multimedia data manipulation. Those valuable data must be captured and stored for potential purposes. One of the main problems in Multimedia Information System (MIS) is the management of multimedia data. As a consequence, multimedia...

    Provided By The Society of Digital Information and Wireless Communications (SDIWC)

  • White Papers // Oct 2011

    Derivation of Stochastic Reward Net (SRN) From UML Specification Considering Cost Efficient Deployment Management of Collaborative Service Components

    Performance evaluation of distributed system is always an intricate undertaking where system behavior is distributed among several components those are physically distributed. Bearing this concept in mind, the authors delineate a performance modeling framework for a distributed system that proposes a transformation process from high level UML notation to SRN...

    Provided By The Society of Digital Information and Wireless Communications (SDIWC)

  • White Papers // Oct 2011

    Towards a Dynamic File Integrity Monitor Through a Security Classification

    File is a component of a computer system that has importance value of its own, either in terms of availability, integrity, confidentiality and functionality to a system and application. If unintended changes happen on the related file, it may affect the security of related computer system. File Integrity Monitor (FIM)...

    Provided By The Society of Digital Information and Wireless Communications (SDIWC)

  • White Papers // Dec 2011

    Comparison of System Dynamics and BPM for Software Process Simulation

    Modeling and simulation of a software process is one way a company can decide which software process and/or its adjustment is the best solution for its current project. Since, there are many different approaches to modeling and simulation and all of them have pros and cons, the very first task...

    Provided By The Society of Digital Information and Wireless Communications (SDIWC)

  • White Papers // Nov 2011

    Dynamic Channel Estimation for MIMO-Constant Envelope Modulation

    The Multi-Input Multi-Output (MIMO)- Constant Envelope Modulation MIMOCEM is introduced as power and complexity efficient alternative to MIMO-OFDM for wireless backhaul networks. Due to a low resolution ADC (1-bit in the default operation) employed in the MIMO-CEM receiver, MIMO-CEM channel estimation is considered as one of the major challenges toward...

    Provided By The Society of Digital Information and Wireless Communications (SDIWC)

  • White Papers // Dec 2011

    Contention Window Optimization: An Enhancement to IEEE 802.11 DCF to Improve Quality of Service

    Wireless communication technology has gained widespread acceptance in recent years. Wireless Local Area Networks (WLANs) are becoming more and more popular and widely used, since they provide high data rates. The main characteristics of this technology are simplicity, flexibility and cost effectiveness. Recent applications include media streaming, interactive collaboration, videoconferencing...

    Provided By The Society of Digital Information and Wireless Communications (SDIWC)

  • White Papers // Dec 2011

    International Journal on New Computer Architectures and Their Applications: Information and Communication Systems e-Forensic Framework

    Early identification, discovering and taking legal proceedings against the perpetrator of an electronic incident are necessary. It is necessary to investigate all electronic incidents adequately and promptly and adapt the legal framework and laws related to e-Forensics. The e-Forensics is a relatively new discipline within which there is a low...

    Provided By The Society of Digital Information and Wireless Communications (SDIWC)

  • White Papers // Mar 2012

    IA-TCP: Improving Acknowledgement Mechanism of TCP for better performance in MANET

    A Mobile Ad hoc NETwork (MANET) is a collection of terminals equipped with one or several wireless network interfaces. In this paper, the authors suggest an improvement of the Transmission Control Protocol (TCP), called Improvement of the Acknowledgement mechanism of TCP (IA-TCP), to better performance in MANET. IA-TCP delays the...

    Provided By The Society of Digital Information and Wireless Communications (SDIWC)

  • White Papers // Aug 2012

    Fractals Image Rendering and Compression Using GPUs

    Fractal image compression provides immense advantages as compared to conventional image compressions. Though the fractal image encoding time is comparatively quite high as compared to the conventional ones but the decoding time is far less and almost instantaneous. Besides, fractal images are resolution-independent, implying that these images will render the...

    Provided By The Society of Digital Information and Wireless Communications (SDIWC)

  • White Papers // Dec 2011

    An Extension and Improvement of the CloudSim Simulator

    Cloud computing has become a significant technology trend. With the cloud computing technology, users use a variety of devices to access programs, storage, and application development platforms over the Internet, via services offered by cloud computing providers. Advantages of the cloud computing technology include cost savings and high availability. Access...

    Provided By The Society of Digital Information and Wireless Communications (SDIWC)

  • White Papers // Dec 2011

    Cooperative Multi-Agents Detection With Spatially Distributed Array Sensors

    The aim of this paper deals with the design of a multi-agents system associated with array sensors dedicated to wireless telecommunications. The authors will present as first part, the spatially distributed array general modeled as well as the channel spatial propagation stimulus. Indeed, the integration and implementation of these systems...

    Provided By The Society of Digital Information and Wireless Communications (SDIWC)

  • White Papers // Dec 2011

    Towards a Versatile Wireless Platform for Low-Power Applications

    Traditional wireless sensor network architectures are based on low-power microcontrollers and highly integrated short range radio transceiver chips operating in one of the few ISM bands. This combination provides a convenient and proven approach to design and build inexpensive sensor nodes rapidly. However, the black box nature of these radio...

    Provided By The Society of Digital Information and Wireless Communications (SDIWC)

  • White Papers // Dec 2011

    A Web Service for Signing and Authenticating Digital Documents Based on Symmetric Cryptography Protocol

    Nowadays, recognizing whether or not a digital document has been counterfeit is a priority issue, particularly in organizations where legal information is handled digitally. Signing a digital document is maybe a preliminary solution. In general, the authors are interested in developing a web service that allows signing a document using...

    Provided By The Society of Digital Information and Wireless Communications (SDIWC)

  • White Papers // Dec 2011

    The Improvement of Mobile Services Providing Infrastructure Based on Priority Settings

    Industrial process control is becoming very important nowadays as more and more systems are integrated with most modern information technology based tools to achieve better process and its control performance results. Here, the main problems arise during the execution operations due to poor coordination of the initial safety conditions and...

    Provided By The Society of Digital Information and Wireless Communications (SDIWC)