UBICC

Displaying 1-6 of 6 results

  • White Papers // Dec 2012

    Multiuser Detection in DSSS Systems

    This paper describes Multiuser detection with minimized Multiple Access Interference (MAI). Multiuser detection seeks to enhance the performance of non-orthogonal signaling schemes for multiple access communications by combating the MAI caused by the presence of more than one user in the channel. The conventional Code Division Multiple Access (CDMA) system...

    Provided By UBICC

  • White Papers // Dec 2012

    Cross Layer Using End-to-End Delay Assessment for Routing Protocol in Vehicular Ad Hoc Network

    The moving with fast velocity of each node in Vehicular Ad hoc NETwork (VANET) results in the existence transient communication links, which degrade the performance of developed protocols. Established routes frequently become invalid, and existing communication flows are interrupted, incurring delay and additional overhead. In this paper, the authors use...

    Provided By UBICC

  • White Papers // Jul 2012

    Multiple Fault Tolerance in MPLS Network Using Open Source Network Simulator

    Multi-Protocol Label Switching (MPLS) is a label based switching technique initiated by Internet Engineering Task Force to bring the speed of layer 2 switching to layer 3. Its label based switching technique allows routers to make the forwarding decision based on the contents of label instead of performing a complex...

    Provided By UBICC

  • White Papers // May 2012

    How Sage Helps to Implement Goppa Codes and the Mceliece Public Key Crypto System

    Common cryptographic methods, especially Public Key Crypto Systems, PKCS based on difficulty to factor large integers or to compute the discrete logarithm, commonly deployed today will not resist attacks using quantum computers once these are operational. However, there are alternatives like hash based digital signature schemes, lattice based cryptography, or...

    Provided By UBICC

  • White Papers // May 2012

    Lorenz-Based Chaotic Secure Communication Schemes

    Secure communication systems employing chaos have recently attracted significant interest. This is partly due to their high unpredictability and simplicity of implementation over conventional secure communications systems. This study presents the implementation of four chaotic modulation techniques employing Lorenz system as chaos generator. The techniques are Chaotic Masking (CM), Chaos...

    Provided By UBICC

  • White Papers // Feb 2012

    Load Balancing in the Macro Pipeline Multiprocessor System Using Processing Elements Stealing Technique

    The exponential increase in amount of processing power required by applications has been observed to be disproportionately leading the available processing power. Recent researches have shown that the key to balance this disproportionate is to shift the processor architecture towards multiprocessor or multicore architecture. In spite of the high performance...

    Provided By UBICC

  • White Papers // Jul 2012

    Multiple Fault Tolerance in MPLS Network Using Open Source Network Simulator

    Multi-Protocol Label Switching (MPLS) is a label based switching technique initiated by Internet Engineering Task Force to bring the speed of layer 2 switching to layer 3. Its label based switching technique allows routers to make the forwarding decision based on the contents of label instead of performing a complex...

    Provided By UBICC

  • White Papers // May 2012

    How Sage Helps to Implement Goppa Codes and the Mceliece Public Key Crypto System

    Common cryptographic methods, especially Public Key Crypto Systems, PKCS based on difficulty to factor large integers or to compute the discrete logarithm, commonly deployed today will not resist attacks using quantum computers once these are operational. However, there are alternatives like hash based digital signature schemes, lattice based cryptography, or...

    Provided By UBICC

  • White Papers // May 2012

    Lorenz-Based Chaotic Secure Communication Schemes

    Secure communication systems employing chaos have recently attracted significant interest. This is partly due to their high unpredictability and simplicity of implementation over conventional secure communications systems. This study presents the implementation of four chaotic modulation techniques employing Lorenz system as chaos generator. The techniques are Chaotic Masking (CM), Chaos...

    Provided By UBICC

  • White Papers // Feb 2012

    Load Balancing in the Macro Pipeline Multiprocessor System Using Processing Elements Stealing Technique

    The exponential increase in amount of processing power required by applications has been observed to be disproportionately leading the available processing power. Recent researches have shown that the key to balance this disproportionate is to shift the processor architecture towards multiprocessor or multicore architecture. In spite of the high performance...

    Provided By UBICC

  • White Papers // Dec 2012

    Multiuser Detection in DSSS Systems

    This paper describes Multiuser detection with minimized Multiple Access Interference (MAI). Multiuser detection seeks to enhance the performance of non-orthogonal signaling schemes for multiple access communications by combating the MAI caused by the presence of more than one user in the channel. The conventional Code Division Multiple Access (CDMA) system...

    Provided By UBICC

  • White Papers // Dec 2012

    Cross Layer Using End-to-End Delay Assessment for Routing Protocol in Vehicular Ad Hoc Network

    The moving with fast velocity of each node in Vehicular Ad hoc NETwork (VANET) results in the existence transient communication links, which degrade the performance of developed protocols. Established routes frequently become invalid, and existing communication flows are interrupted, incurring delay and additional overhead. In this paper, the authors use...

    Provided By UBICC