University of Applied Sciences

Displaying 1-21 of 21 results

  • White Papers // Jul 2012

    Incorporating Information Security in Analysis of Business Strategy: A Conceptual Framework

    The rise of Information Technology over the past decades has contributed to the increase of digital and electronic information processing greatly. As a result, information security has become a major strategic concern of firms and business strategy needs to incorporate information security deliberately. This paper explores strategic implications of information...

    Provided By University of Applied Sciences

  • White Papers // Feb 2012

    On the Optimal Blacklisting Threshold for Link Selection in Wireless Sensor Networks

    Empirical studies on link blacklisting show that the delivery rate is very sensitive to the calibration of the blacklisting threshold. If the calibration is too restrictive (the threshold is too high), all neighbors get blacklisted. On the other hand, if the calibration is too loose (the threshold is too low),...

    Provided By University of Applied Sciences

  • White Papers // Aug 2011

    Introducing Layers of Abstraction to Semantic Web Programming

    The authors have presented a novel approach for realizing layers of abstraction in ontology modeling and Semantic Web applications. A concept framework allows specifying higher-level, more specific concepts on top of lower-level, more general concepts. From concept specifications, code for asserting statements (Lisp functions) as well as for reasoning and...

    Provided By University of Applied Sciences

  • White Papers // Jul 2011

    Towards Realistic and Credible Wireless Sensor Network Evaluation

    This paper explores the problem of realistically evaluating Wireless Sensor Network (WSN) applications, algorithms and protocols. It surveys the currently available techniques, such as simulators, testbeds and real world deployments and compares their properties and challenges. While the authors underline the significance of simulation tools, they also observe that the...

    Provided By University of Applied Sciences

  • White Papers // Mar 2011

    On the Interplay of Low-Power Wireless Connectivity and Energy Consumption

    The authors present an extensive set of experimental results on two remote-access wireless sensor network testbeds that illustrate the interplay between network connectivity and energy consumption. Using collection on top of a duty-cycled link layer, they observe that the energy consumption of unicast traffic is heavily affected by insufficient connectivity...

    Provided By University of Applied Sciences

  • White Papers // Feb 2011

    Sensor Node Lifetime: An Experimental Study

    Node lifetime is a key performance metric in Wireless Sensor Network (WSN) research. Simplistic assumptions and naive lifetime estimation techniques invariably prove to be extremely unreliable in practice, to the point that premature battery depletion notoriously affects real-world deployments. In this paper, the authors adopt an experimental approach and employ...

    Provided By University of Applied Sciences

  • White Papers // Jan 2011

    Radio-Based Trail Usage Monitoring With Low-End Motes

    Outdoor automated people counting is essential to the proper management of recreational and protected areas. The authors present a solution for radio-based people counting that employs low-end motes to detect the signature of shadowing events left by humans on the RF signal as they interrupt the line-of-sight path between a...

    Provided By University of Applied Sciences

  • White Papers // Sep 2010

    Study of Algorithms to Optimize Frequency Assignment for Autonomous IEEE 802.11 Access Points

    This paper points to an automatic channel assignment for unadministrated, chaotic WLANs to take advantage on the given capacity of the IEEE 802.11 frequency spectrum and to enhance the quality of the entire WLAN sphere. This paper determines four public channel assignment algorithms for IEEE 802.11 networks. The authors show...

    Provided By University of Applied Sciences

  • White Papers // May 2010

    Implementation of the Wireless Autonomous Spanning Tree Protocol on Mote-Class Devices

    The Wireless Autonomous Spanning Tree Protocol combines medium access control and routing to streamline energy-efficient communication in Wireless Body Area Networks. As these networks generally contain low-end resource-constrained devices, a thorough evaluation on real hardware is essential to the validation of any protocol. The authors present their implementation of the...

    Provided By University of Applied Sciences

  • White Papers // May 2010

    Experiences in Using Integrated Multimedia Streaming Services to Support E-Learning in Manufacturing Processes

    Most E-Learning projects tend to separate learning activities from everyday work. This paper presents an approach where closer integration between learning and work is achieved by integrating multimedia services into manufacturing processes. The goal of E-Learning services integration in manufacturing is, through the development of new multimedia solutions, to accelerate...

    Provided By University of Applied Sciences

  • White Papers // Nov 2009

    The Concept of Memory Stubs as a Specialization of Dynamic Performance Stubs to Simulate Memory Access Behavior

    Dynamic performance stubs provide a framework for the simulation of the performance behavior of software modules and functions. Stubs can be used for a cost-benefit analysis of the gain from performance optimization and therefore, for a gain oriented performance improvement, and can be also be used to identify "Hidden" bottlenecks...

    Provided By University of Applied Sciences

  • White Papers // Jun 2009

    A Conceptual Framework for the Integration of IT Infrastructure Management, IT Service Management and IT Governance

    The definition and use of standardized IT Management techniques and processes provide the basis for IT Service Management and IT Governance. With the establishment of de facto standard "Best Practice" reference and process models such as the IT Infrastructure Library (ITIL) or Control Objectives for IT and related Technologies (CobiT),...

    Provided By University of Applied Sciences

  • White Papers // Jun 2009

    FHOJ: A New Java Benchmark Framework

    There are some existing Java benchmarks, application benchmarks as well as micro benchmarks or mixture both of them, such as: Java Grande, Spec98, CaffeMark, HBech, etc. But none of them deal with behaviors of multi tasks operating systems. As a result, the achieved outputs are not satisfied for performance evaluation...

    Provided By University of Applied Sciences

  • White Papers // Jan 2009

    QoS Enabled Mobility Support for Mesh Networks

    Existing solutions for building wireless mesh networks suffer from reduced efficiency. This is due to lack of reliable self-configuration procedures that can dynamically adapt to varying network conditions, lack of efficient and scalable end-to-end Quality of Service (QoS) support, and lack of generalized and seamless mobility support. Therefore, ensuring a...

    Provided By University of Applied Sciences

  • White Papers // Dec 2008

    MMSE Based Interference Processing for Satellite Broadcast Reception

    The problem of Adjacent Satellite Interference (ACI) within the Direct-To-Home (DTH) satellite broadcast reception scenario is considered. The use of small DTH front-end reception systems results inevitably in a higher interference level from adjacent satellites using the same frequency band. The growth in satellite communication and the trend to small...

    Provided By University of Applied Sciences

  • White Papers // Sep 2008

    Integrated Mobility and Resource Management Mechanism for FMC Networks

    A network based method for an intelligent distribution of transport resources of heterogeneous points of attachment to the network among mobile nodes with multiple network interfaces is presented in this paper. Selection of the used network for a particular multimedia session is based on the QoS situation in access networks...

    Provided By University of Applied Sciences

  • White Papers // Sep 2008

    Implementation of a Security System Based on RFID and WSN Technology

    Over the last few year the author has observed a convergence of Wireless Sensor Networks (WSNs) and RFID systems. In the next generation "Super RFID technology" traditional passive tags will be replaced using dedicated WSNs that extend standard tags to allow data acquisition and data storage, e.g. for monitoring purposes....

    Provided By University of Applied Sciences

  • White Papers // Jun 2008

    Tracking of Transport Vehicles for Warehouse Management Using a Wireless Sensor Network

    A warehouse management system is a key part of the supply chain and controls the movement of goods within a warehouse. Usually the state of a warehouse is managed in a central database, which must be updated for every storage and retrieval activity. The entire process is prone to errors,...

    Provided By University of Applied Sciences

  • White Papers // Jun 2008

    Supporting Mobile GIS Applications by Geospatial Web Services

    Spatial Data Infrastructures (SDI) providing geospatial web services as well as mobile GIS software become more and more popular. Fields like disaster management require the use of SDIs as well as of mobile applications. However, the scarce resources of mobile devices in respect of memory size, computing power, and display...

    Provided By University of Applied Sciences

  • White Papers // May 2008

    Evaluation of RAN Concepts for Enhancing MBMS in the Framework of C-MOBILE

    The European IST project C-MOBILE aims at enhancing the Multimedia Broadcast/Multicast Service (MBMS) support in 3G and beyond-3G systems at radio access and core network level. This paper gives an overview of promising candidate concepts for MBMS improvements on RAN (Radio Access Network) level, and for each concept provides a...

    Provided By University of Applied Sciences

  • White Papers // Apr 2008

    Performance Evaluation of Topologies for Cooperative and Dynamic Resource Relaying

    Relaying has been proposed to support users suffering from high shadowing or high interference and therefore being not able to receive high data rates. With adaptive relaying, a higher Modulation and Coding Scheme (MCS) can be used which increases the feasible data rate. The investigation of relaying techniques widely concentrates...

    Provided By University of Applied Sciences

  • White Papers // Jun 2009

    A Conceptual Framework for the Integration of IT Infrastructure Management, IT Service Management and IT Governance

    The definition and use of standardized IT Management techniques and processes provide the basis for IT Service Management and IT Governance. With the establishment of de facto standard "Best Practice" reference and process models such as the IT Infrastructure Library (ITIL) or Control Objectives for IT and related Technologies (CobiT),...

    Provided By University of Applied Sciences

  • White Papers // Sep 2008

    Integrated Mobility and Resource Management Mechanism for FMC Networks

    A network based method for an intelligent distribution of transport resources of heterogeneous points of attachment to the network among mobile nodes with multiple network interfaces is presented in this paper. Selection of the used network for a particular multimedia session is based on the QoS situation in access networks...

    Provided By University of Applied Sciences

  • White Papers // May 2010

    Experiences in Using Integrated Multimedia Streaming Services to Support E-Learning in Manufacturing Processes

    Most E-Learning projects tend to separate learning activities from everyday work. This paper presents an approach where closer integration between learning and work is achieved by integrating multimedia services into manufacturing processes. The goal of E-Learning services integration in manufacturing is, through the development of new multimedia solutions, to accelerate...

    Provided By University of Applied Sciences

  • White Papers // Jul 2011

    Towards Realistic and Credible Wireless Sensor Network Evaluation

    This paper explores the problem of realistically evaluating Wireless Sensor Network (WSN) applications, algorithms and protocols. It surveys the currently available techniques, such as simulators, testbeds and real world deployments and compares their properties and challenges. While the authors underline the significance of simulation tools, they also observe that the...

    Provided By University of Applied Sciences

  • White Papers // Aug 2011

    Introducing Layers of Abstraction to Semantic Web Programming

    The authors have presented a novel approach for realizing layers of abstraction in ontology modeling and Semantic Web applications. A concept framework allows specifying higher-level, more specific concepts on top of lower-level, more general concepts. From concept specifications, code for asserting statements (Lisp functions) as well as for reasoning and...

    Provided By University of Applied Sciences

  • White Papers // Nov 2009

    The Concept of Memory Stubs as a Specialization of Dynamic Performance Stubs to Simulate Memory Access Behavior

    Dynamic performance stubs provide a framework for the simulation of the performance behavior of software modules and functions. Stubs can be used for a cost-benefit analysis of the gain from performance optimization and therefore, for a gain oriented performance improvement, and can be also be used to identify "Hidden" bottlenecks...

    Provided By University of Applied Sciences

  • White Papers // May 2008

    Evaluation of RAN Concepts for Enhancing MBMS in the Framework of C-MOBILE

    The European IST project C-MOBILE aims at enhancing the Multimedia Broadcast/Multicast Service (MBMS) support in 3G and beyond-3G systems at radio access and core network level. This paper gives an overview of promising candidate concepts for MBMS improvements on RAN (Radio Access Network) level, and for each concept provides a...

    Provided By University of Applied Sciences

  • White Papers // Apr 2008

    Performance Evaluation of Topologies for Cooperative and Dynamic Resource Relaying

    Relaying has been proposed to support users suffering from high shadowing or high interference and therefore being not able to receive high data rates. With adaptive relaying, a higher Modulation and Coding Scheme (MCS) can be used which increases the feasible data rate. The investigation of relaying techniques widely concentrates...

    Provided By University of Applied Sciences

  • White Papers // Dec 2008

    MMSE Based Interference Processing for Satellite Broadcast Reception

    The problem of Adjacent Satellite Interference (ACI) within the Direct-To-Home (DTH) satellite broadcast reception scenario is considered. The use of small DTH front-end reception systems results inevitably in a higher interference level from adjacent satellites using the same frequency band. The growth in satellite communication and the trend to small...

    Provided By University of Applied Sciences

  • White Papers // Feb 2012

    On the Optimal Blacklisting Threshold for Link Selection in Wireless Sensor Networks

    Empirical studies on link blacklisting show that the delivery rate is very sensitive to the calibration of the blacklisting threshold. If the calibration is too restrictive (the threshold is too high), all neighbors get blacklisted. On the other hand, if the calibration is too loose (the threshold is too low),...

    Provided By University of Applied Sciences

  • White Papers // Mar 2011

    On the Interplay of Low-Power Wireless Connectivity and Energy Consumption

    The authors present an extensive set of experimental results on two remote-access wireless sensor network testbeds that illustrate the interplay between network connectivity and energy consumption. Using collection on top of a duty-cycled link layer, they observe that the energy consumption of unicast traffic is heavily affected by insufficient connectivity...

    Provided By University of Applied Sciences

  • White Papers // Jan 2011

    Radio-Based Trail Usage Monitoring With Low-End Motes

    Outdoor automated people counting is essential to the proper management of recreational and protected areas. The authors present a solution for radio-based people counting that employs low-end motes to detect the signature of shadowing events left by humans on the RF signal as they interrupt the line-of-sight path between a...

    Provided By University of Applied Sciences

  • White Papers // Feb 2011

    Sensor Node Lifetime: An Experimental Study

    Node lifetime is a key performance metric in Wireless Sensor Network (WSN) research. Simplistic assumptions and naive lifetime estimation techniques invariably prove to be extremely unreliable in practice, to the point that premature battery depletion notoriously affects real-world deployments. In this paper, the authors adopt an experimental approach and employ...

    Provided By University of Applied Sciences

  • White Papers // May 2010

    Implementation of the Wireless Autonomous Spanning Tree Protocol on Mote-Class Devices

    The Wireless Autonomous Spanning Tree Protocol combines medium access control and routing to streamline energy-efficient communication in Wireless Body Area Networks. As these networks generally contain low-end resource-constrained devices, a thorough evaluation on real hardware is essential to the validation of any protocol. The authors present their implementation of the...

    Provided By University of Applied Sciences

  • White Papers // Jun 2008

    Tracking of Transport Vehicles for Warehouse Management Using a Wireless Sensor Network

    A warehouse management system is a key part of the supply chain and controls the movement of goods within a warehouse. Usually the state of a warehouse is managed in a central database, which must be updated for every storage and retrieval activity. The entire process is prone to errors,...

    Provided By University of Applied Sciences

  • White Papers // Jul 2012

    Incorporating Information Security in Analysis of Business Strategy: A Conceptual Framework

    The rise of Information Technology over the past decades has contributed to the increase of digital and electronic information processing greatly. As a result, information security has become a major strategic concern of firms and business strategy needs to incorporate information security deliberately. This paper explores strategic implications of information...

    Provided By University of Applied Sciences

  • White Papers // Sep 2008

    Implementation of a Security System Based on RFID and WSN Technology

    Over the last few year the author has observed a convergence of Wireless Sensor Networks (WSNs) and RFID systems. In the next generation "Super RFID technology" traditional passive tags will be replaced using dedicated WSNs that extend standard tags to allow data acquisition and data storage, e.g. for monitoring purposes....

    Provided By University of Applied Sciences

  • White Papers // Jun 2008

    Supporting Mobile GIS Applications by Geospatial Web Services

    Spatial Data Infrastructures (SDI) providing geospatial web services as well as mobile GIS software become more and more popular. Fields like disaster management require the use of SDIs as well as of mobile applications. However, the scarce resources of mobile devices in respect of memory size, computing power, and display...

    Provided By University of Applied Sciences

  • White Papers // Jan 2009

    QoS Enabled Mobility Support for Mesh Networks

    Existing solutions for building wireless mesh networks suffer from reduced efficiency. This is due to lack of reliable self-configuration procedures that can dynamically adapt to varying network conditions, lack of efficient and scalable end-to-end Quality of Service (QoS) support, and lack of generalized and seamless mobility support. Therefore, ensuring a...

    Provided By University of Applied Sciences

  • White Papers // Jun 2009

    FHOJ: A New Java Benchmark Framework

    There are some existing Java benchmarks, application benchmarks as well as micro benchmarks or mixture both of them, such as: Java Grande, Spec98, CaffeMark, HBech, etc. But none of them deal with behaviors of multi tasks operating systems. As a result, the achieved outputs are not satisfied for performance evaluation...

    Provided By University of Applied Sciences

  • White Papers // Sep 2010

    Study of Algorithms to Optimize Frequency Assignment for Autonomous IEEE 802.11 Access Points

    This paper points to an automatic channel assignment for unadministrated, chaotic WLANs to take advantage on the given capacity of the IEEE 802.11 frequency spectrum and to enhance the quality of the entire WLAN sphere. This paper determines four public channel assignment algorithms for IEEE 802.11 networks. The authors show...

    Provided By University of Applied Sciences