Universal Association of Computer and Electronics Engineers

Displaying 81-87 of 87 results

  • White Papers // Apr 2012

    Analyzing the Effect of Playout Buffer Adjustment on Voice Quality for VoIP Based Social-Network Applications

    Social networks are making the dream of real time group communication a reality. Voice over Internet Protocol (VoIP)based social network applications are becoming popular but are also suffering from Quality of Service (QoS) and Quality of Experience (QoE) issues. In order to add to its popularity and reliance VoIP based...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // Apr 2012

    Seamless Handover Between CDMA2000 and 802.11 WLAN Using MSCTP

    The invention of mobile devices such as laptops, hand-held computers, and cellular phones has changed the whole Internet world. The main feature of mobile devices is that they can access the Internet wirelessly by different air interfaces using different technologies while roaming. This makes mobile devices become increasingly popular. However,...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // Apr 2012

    Performance Comparision of LEACH, SEP and DEEC Protocol in Wireless Sensor Network

    Wireless Sensor Network is the network of power-limited sensing devices called sensors. Wireless sensor network is differ from other networks in terms of optimization of amount of energy because when these sensors sense and transmit data to other sensors present in the network, considerable amount of energy is dissipated. Various...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // Apr 2012

    Malware Incident Handling

    The paper will be a detailed introduction of malware handling for security professionals. This paper will also serve as a guideline for the reader to perform malware handling by providing definitions, tools to use, and real world demonstration to the reader with enough information to successfully perform malware incident handling....

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // Apr 2012

    Controlling Free Riding Using Extended Point Based Incentive Mechanism in Peer-to-Peer Networks

    Over the years of the emergence of peer-to-peer systems a phenomenon named 'Free Riding' has affected its performance and become a serious threat to be resolved. Free riding phenomenon was first felt in the study of Gnutella. As the number of free riders increases, the performance of the overall system...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // Aug 2011

    Parameters Effecting Mobile Number Portability and Fuzzy Logic Based MNP Decision

    Mobile Number Portability (MNP) means that a subscriber of one telecommunication operator is able to keep his telephone number unchanged when switching to another operator. As one of the development trends of the international telecommunication industry, number portability has been introduced in many countries around the world and has played...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2011

    Communication in Parallel and Distributed Systems

    Communication is an essential part of distributed computing and parallel computing. There exist many topologies, network architectures and routing schemas for such type of communication. In this paper, the authors will review a few selected network architectures and routing schemes, which are continually going through evolution process. Parallel and distributed...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Performance Evaluation of Various Routing Protocols Used in Manet

    A Mobile Ad-hoc NETwork (MANET) is a kind of wireless ad-hoc network, and is a self-configuring network of mobile routers connected wirelessly. MANET may operate in a standalone fashion, or may be connected to the larger Internet. Many routing protocols have been developed for MANETs over the past few years....

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Computer Based Audio Steganography

    People use cryptography to send secret messages to one another without a third party overseeing the message. Steganography is a type of cryptography in which the secret message is hidden in another message. In this paper, a method of hiding the speech signal inside a music file using LSB coding...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Capacity Analysis of MIMO Systems

    Multiple-Input Multiple-Output (MIMO) Systems are used in wireless communication for enhancement of capacity. The main aim of this paper is to carry out investigations of MIMO system capacity and to observe the performance of MIMO system by using Water filling Algorithm. In which Diversity gain and spatial multiplexing gain are...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    An Approach for Geographic Routing Using Virtual Coordinates for WMN

    Several routing algorithms that exploit geographic information (e.g., GPSR) have been proposed. These algorithms refer to the nodes by their location, not address, and use this information to route greedily, when possible, towards the destination. However, there are many situations where location information is not available at the nodes, and...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Space Time Block Codes: An Overview

    The demand for mobile communication systems with high data rates has dramatically increased in recent years. New methods are necessary in order to satisfy this huge communications demand, exploiting the limited resources such as bandwidth and power as efficient as possible. In wireless communication systems, multiple antennas when used with...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Effects of Hidden Terminals and their Alleviation in Multi Rate Ad Hoc Networks

    In multi rate ad hoc networks the hidden terminal problem is unique and there is a limited understanding of its effect on network performance. In this paper, the authors studied the effects of hidden terminals in multi rate mobile ad hoc networks environments. In IEEE 802.11 base WLANs only the...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Event Based Energy Efficient Routing Protocol for Wireless Sensor Networks (WSNs)

    Sensor nodes that are deployed in the wireless sensor field are equipped with limited energy power. The most important problem in the wireless sensor network is to develop the energy efficient, reliable and robust routing protocol. To achieve these targets, the authors have proposed a new Event-Based Energy Efficient Routing...

    Provided By Universal Association of Computer and Electronics Engineers