University of Bradford

Displaying 1-27 of 27 results

  • White Papers // Nov 2013

    The Realm of the Pairings

    Bilinear maps, or pairings, initially proposed in a cryptologic context for cryptanalytic purposes, proved afterward to be an amazingly flexible and useful tool for the construction of cryptosystems with unique features. Yet, they are notoriously hard to implement efficiently, so that their effective deployment requires a careful choice of parameters...

    Provided By University of Bradford

  • White Papers // Nov 2013

    A Note on High-Security General-Purpose Elliptic Curves

    General-purpose elliptic curves are necessary to attain high-efficiency implementations of the most common cryptographic protocols like asymmetric encryption and plain digital signatures (but setting aside less conventional application like identity-based encryption). The standard NIST curves, though fairly efficient overall, arguably no longer represent the state of the art in the...

    Provided By University of Bradford

  • White Papers // Feb 2013

    HACBA: New Approach to Hierarchical Routing for Wireless Sensor Network

    Wireless Sensor Networks are composed by sensors distributed in an environment. They are responsible to monitor and transmit its physical characteristics. These networks require robust wireless communication protocols that are energy efficient. In this paper, the authors present a hierarchical protocol, Hardware-Adaptative Clustering Based Algorithm (HACBA), derived from the Low...

    Provided By University of Bradford

  • White Papers // Feb 2013

    Methodology for Objective Evaluation of Video Broadcasting Quality Using a Video Camera at the User's Home

    In this paper, a methodology for objective evaluation of the quality of video programs, without reference, recording these programs in the users' residence using a video camera is presented. The methodology is based on the use of a digital watermark embedded in the original program. The watermark is invisible to...

    Provided By University of Bradford

  • White Papers // Sep 2012

    Trust Measurements Yeld Distributed Decision Support in Cloud Computing

    In this paper, the authors propose the creation of a trust model to ensure the reliable files exchange between the users of a private cloud. To validate the proposed model, a simulation environment with the tool CloudSim was used. Its use to run the simulations of the adopted scenarios allowed...

    Provided By University of Bradford

  • White Papers // May 2012

    Adaptive Multicast Streaming Based on Scalable Video Blocks and TFMCC Protocol

    This paper presents an architecture for live streaming of scalable video, which is encoded using the H.264 SVC (Scalable Video Coding) standard and transmitted over multicast groups on a Peer-To-Peer (P2P) network. The architecture has two characteristics: the utilization of a paradigm of video compression based on independent compressed blocks...

    Provided By University of Bradford

  • White Papers // Mar 2012

    A Flexible Framework Based on Reinforcement Learning for Adaptive Modulation and Coding in OFDM Wireless Systems

    This paper presents a machine learning approach for link adaptation in orthogonal frequency-division multiplexing systems through adaptive modulation and coding. Although machine learning techniques have attracted attention for link adaptation, most of the schemes proposed so far are based on off-line training algorithms, which make them not well suited for...

    Provided By University of Bradford

  • White Papers // Nov 2011

    Load-Aware Radio Access Selection in Heterogeneous Terrestrial Wireless Networks

    Terrestrial wireless network technologies such as UMTS, WiMax and WLAN are used to provide network access for both voice and data services. In big cities the densely populated areas like town centres, shopping centres and train stations which have coverage of multiple wireless networks, a large number of mobile users...

    Provided By University of Bradford

  • White Papers // Jun 2011

    Experimental Throughput Analysis for 802.11n System and MIMO Indoor Propagation Prediction

    This paper presents an analysis of a commercial 802.11n MIMO 2x3 dual band (2.4 & 5 GHz) system focusing on the operational throughput performance over an indoor environment with Line of Sight and Non Line of Sight scenarios. Although many authors have provided evidence on the effectiveness of this technology...

    Provided By University of Bradford

  • White Papers // Jun 2011

    Adaptive Cluster Management for Energy Efficient Sensor Networks

    This paper considers ways to improve the prolong life time of the wireless sensor networks. Power consumption during communication phases is the greatest limiting factor to sensor network lifetime. The authors' work aims to increase the lifetime or data communication capacity of cluster based schemes. In this paper, they propose...

    Provided By University of Bradford

  • White Papers // Mar 2011

    A New Localized Network Based Routing Model in Computer and Communication Networks

    In view of the fact that routing algorithms are network layer entities and the varying performance of any routing algorithm depends on the underlying networks. Localized routing algorithms avoid the problems associated with the maintenance of global network state by using statistics of flow blocking probabilities. The authors developed a...

    Provided By University of Bradford

  • White Papers // Feb 2011

    Managing Variability in Business Processes: An Aspect-Oriented Approach

    Business processes specify key activities in an organization, some of which can be automated. It is often the case that replication of activities across such processes occurs and failure in identifying such replication results in organizational costs. To minimize this risk and optimize organizational re-sources, in this paper, the authors...

    Provided By University of Bradford

  • White Papers // Feb 2011

    Enhanced Mobile IP Handover Using Link Layer Information

    The main source of the problem in Mobile handover is the latency and packet loss introduced by the lengthy registration processes. The registration messages must traverse all the way to the Home Agent (HA) and back. In addition, the packets sent by the Corresponding Node (CNs) are lost until they...

    Provided By University of Bradford

  • White Papers // Jan 2011

    Performance Evaluation of Secure Call Admission Control (SCAC) and Secure Socket Layer (SSL)

    With the increasing demand for computer communications the need for security is growing dramatically. The existing research related to security mechanisms focuses on security of the data transmission in the communication networks only. The developed specific Secure Call Admission Control (SCAC) is a set of technologies and solutions to enforce...

    Provided By University of Bradford

  • White Papers // Jan 2011

    An Information Theoretic Approach for the Performance Evaluation of MultihopWireless Ad Hoc Networks

    The information theoretic principles of Maximum Entropy (ME) and Minimum Relative Entropy (MRE) are employed, as least-biased methods of inference, towards the analysis of a multi-hop ad hoc system with bursty arrivals and Repetitive Service (RS) blocking. The system consists of K MAC layer and R IP layer finite capacity...

    Provided By University of Bradford

  • White Papers // Nov 2010

    Approach Towards Energy Efficient Power Amplifier for 4G Communications

    The biggest challenge for future 4G systems is the need to limit the energy consumptions of battery-powered and base station devices, with the aim to prolong their operational time and avoid active cooling in the base station. The green wireless communications requires research in areas such as energy efficient RF...

    Provided By University of Bradford

  • White Papers // Aug 2010

    Tourism In The Context Of Regionalism And Trade Patterns

    This paper outlines the current empirical literature examining the determinants of demand for tourism; where the lack of analysis around the impact of trade is found to be of particular cause for concern. Yet investigating the trade-tourism link is argued to be only part of the story since trade and...

    Provided By University of Bradford

  • White Papers // Jul 2010

    Cross Layer Optimization for Data Gathering in Wireless Multimedia Sensor Networks Within Expected Network Lifetime

    The use of multimedia sensor nodes can significantly enhance the capability of Wireless Sensor Networks (WSNs) for event description. In a number of scenarios, e.g., an erupting volcano, the WSNs are not deployed to work for an extremely long time. Instead, the WSNs aim to deliver continuous and reliable multimedia...

    Provided By University of Bradford

  • White Papers // Nov 2009

    FEC and UEP Scheme for Multimedia Transmission Over Wireless Channel

    Due to the fruitful and diversified contents of multimedia traffic and susceptible circumstances of wireless communications, using Unequal Error Protection (UEP) is now an active research subject. In this paper the authors propose an error rate weighted transmission scheme that combines both the convolution coding and non-uniform QAM schemes for...

    Provided By University of Bradford

  • White Papers // Sep 2009

    Leadership And Authenticity: A Sartrean Critique

    Currently 'Authentic Leadership' is attracting increasing attention. Authenticity is an important concept within existentialist thinking and a Sartrean critique of authentic leadership is offered here. The authors examine interpretations of authenticity and its conflation with concepts such as morality and ethical behaviour. Current literature implies authenticity as relating to an...

    Provided By University of Bradford

  • White Papers // Aug 2009

    A New Watermarking Scheme for Colour Images Captured by Mobile Phone Cameras

    A new frequency domain based watermarking scheme for colour images captured by mobile phone cameras is proposed. The proposed technique embeds personal mobile phone numbers inside the image. The aim of the scheme is to protect the copy right ownership of the image. Each bit of the decimal digits is...

    Provided By University of Bradford

  • White Papers // Jun 2009

    Projects For Regeneration: Making Them Work

    The paper analyses approaches to the management of two projects within the regeneration portfolio of a large UK metropolitan council. Developing a theoretical framework drawing both from mainstream project methodologies and international development, the paper highlights a number of key issues which need to be addressed, including entrepreneurship, participation, stakeholder...

    Provided By University of Bradford

  • White Papers // May 2009

    Routing in Content Addressable Networks: Algorithms and Performance

    Virtual networking has evolved into a platform that is able to service new services and applications such as large-scale data sharing, multimedia services, and application-level multicast communication. With this evolution of networking, features such as robust routing, efficient search, scalability, decentralization, fault tolerance, trust and authentication become of relevance. Network...

    Provided By University of Bradford

  • White Papers // Apr 2009

    Europe And Its Industry's Future: Benign Neglect Or European Interest?

    The European Union and its industry are facing unprecedented challenges since the inception of European construction in post-War times. The speed of economic globalization, in which the EU's open economy is deeply immersed, and the rapid upsurge, in recent years, of major emerging economic powers are having an ever greater...

    Provided By University of Bradford

  • White Papers // Feb 2009

    Changing Trade Structure And Its Implications For China

    Based on the insight that the type of product an economy exports can have important implications for its economic performance and that goods exported predominantly by rich countries will have different characteristics from those exported by poor countries, Lall et al (2006) put forward a novel means of classifying commodities...

    Provided By University of Bradford

  • White Papers // Jan 2009

    New Algorithm to Control TCP Behavior Over Lossy Links

    TCP (Transmission Control Protocol) is one of the most used transport protocol in the Internet. Many widely used applications use TCP for sending data like the File Transfer Protocol (FTP), Telnet and Web-HTTP connections. TCP was found to be performing poorly over lossy links when transmission (non-congestion) errors existed. This...

    Provided By University of Bradford

  • White Papers // Jan 2009

    A Paler Shade Of Litigation: Still More Confusion In Musical Property Rights

    This paper gives an economic analysis of the judicial decisions in the disputes over authorship of Procol Harum's 'A Whiter Shade of Pale'. The first legal contest took place in 2006, 39 years after the song was written and was found in favour of the plaintiff (Fisher), in the first...

    Provided By University of Bradford

  • White Papers // Feb 2013

    HACBA: New Approach to Hierarchical Routing for Wireless Sensor Network

    Wireless Sensor Networks are composed by sensors distributed in an environment. They are responsible to monitor and transmit its physical characteristics. These networks require robust wireless communication protocols that are energy efficient. In this paper, the authors present a hierarchical protocol, Hardware-Adaptative Clustering Based Algorithm (HACBA), derived from the Low...

    Provided By University of Bradford

  • White Papers // Feb 2013

    Methodology for Objective Evaluation of Video Broadcasting Quality Using a Video Camera at the User's Home

    In this paper, a methodology for objective evaluation of the quality of video programs, without reference, recording these programs in the users' residence using a video camera is presented. The methodology is based on the use of a digital watermark embedded in the original program. The watermark is invisible to...

    Provided By University of Bradford

  • White Papers // Aug 2009

    A New Watermarking Scheme for Colour Images Captured by Mobile Phone Cameras

    A new frequency domain based watermarking scheme for colour images captured by mobile phone cameras is proposed. The proposed technique embeds personal mobile phone numbers inside the image. The aim of the scheme is to protect the copy right ownership of the image. Each bit of the decimal digits is...

    Provided By University of Bradford

  • White Papers // May 2009

    Routing in Content Addressable Networks: Algorithms and Performance

    Virtual networking has evolved into a platform that is able to service new services and applications such as large-scale data sharing, multimedia services, and application-level multicast communication. With this evolution of networking, features such as robust routing, efficient search, scalability, decentralization, fault tolerance, trust and authentication become of relevance. Network...

    Provided By University of Bradford

  • White Papers // Apr 2009

    Europe And Its Industry's Future: Benign Neglect Or European Interest?

    The European Union and its industry are facing unprecedented challenges since the inception of European construction in post-War times. The speed of economic globalization, in which the EU's open economy is deeply immersed, and the rapid upsurge, in recent years, of major emerging economic powers are having an ever greater...

    Provided By University of Bradford

  • White Papers // Jan 2011

    Performance Evaluation of Secure Call Admission Control (SCAC) and Secure Socket Layer (SSL)

    With the increasing demand for computer communications the need for security is growing dramatically. The existing research related to security mechanisms focuses on security of the data transmission in the communication networks only. The developed specific Secure Call Admission Control (SCAC) is a set of technologies and solutions to enforce...

    Provided By University of Bradford

  • White Papers // Feb 2011

    Enhanced Mobile IP Handover Using Link Layer Information

    The main source of the problem in Mobile handover is the latency and packet loss introduced by the lengthy registration processes. The registration messages must traverse all the way to the Home Agent (HA) and back. In addition, the packets sent by the Corresponding Node (CNs) are lost until they...

    Provided By University of Bradford

  • White Papers // Mar 2011

    A New Localized Network Based Routing Model in Computer and Communication Networks

    In view of the fact that routing algorithms are network layer entities and the varying performance of any routing algorithm depends on the underlying networks. Localized routing algorithms avoid the problems associated with the maintenance of global network state by using statistics of flow blocking probabilities. The authors developed a...

    Provided By University of Bradford

  • White Papers // Sep 2009

    Leadership And Authenticity: A Sartrean Critique

    Currently 'Authentic Leadership' is attracting increasing attention. Authenticity is an important concept within existentialist thinking and a Sartrean critique of authentic leadership is offered here. The authors examine interpretations of authenticity and its conflation with concepts such as morality and ethical behaviour. Current literature implies authenticity as relating to an...

    Provided By University of Bradford

  • White Papers // Aug 2010

    Tourism In The Context Of Regionalism And Trade Patterns

    This paper outlines the current empirical literature examining the determinants of demand for tourism; where the lack of analysis around the impact of trade is found to be of particular cause for concern. Yet investigating the trade-tourism link is argued to be only part of the story since trade and...

    Provided By University of Bradford

  • White Papers // Jun 2009

    Projects For Regeneration: Making Them Work

    The paper analyses approaches to the management of two projects within the regeneration portfolio of a large UK metropolitan council. Developing a theoretical framework drawing both from mainstream project methodologies and international development, the paper highlights a number of key issues which need to be addressed, including entrepreneurship, participation, stakeholder...

    Provided By University of Bradford

  • White Papers // Feb 2009

    Changing Trade Structure And Its Implications For China

    Based on the insight that the type of product an economy exports can have important implications for its economic performance and that goods exported predominantly by rich countries will have different characteristics from those exported by poor countries, Lall et al (2006) put forward a novel means of classifying commodities...

    Provided By University of Bradford

  • White Papers // Jan 2009

    A Paler Shade Of Litigation: Still More Confusion In Musical Property Rights

    This paper gives an economic analysis of the judicial decisions in the disputes over authorship of Procol Harum's 'A Whiter Shade of Pale'. The first legal contest took place in 2006, 39 years after the song was written and was found in favour of the plaintiff (Fisher), in the first...

    Provided By University of Bradford

  • White Papers // Nov 2009

    FEC and UEP Scheme for Multimedia Transmission Over Wireless Channel

    Due to the fruitful and diversified contents of multimedia traffic and susceptible circumstances of wireless communications, using Unequal Error Protection (UEP) is now an active research subject. In this paper the authors propose an error rate weighted transmission scheme that combines both the convolution coding and non-uniform QAM schemes for...

    Provided By University of Bradford

  • White Papers // Jan 2009

    New Algorithm to Control TCP Behavior Over Lossy Links

    TCP (Transmission Control Protocol) is one of the most used transport protocol in the Internet. Many widely used applications use TCP for sending data like the File Transfer Protocol (FTP), Telnet and Web-HTTP connections. TCP was found to be performing poorly over lossy links when transmission (non-congestion) errors existed. This...

    Provided By University of Bradford

  • White Papers // Jul 2010

    Cross Layer Optimization for Data Gathering in Wireless Multimedia Sensor Networks Within Expected Network Lifetime

    The use of multimedia sensor nodes can significantly enhance the capability of Wireless Sensor Networks (WSNs) for event description. In a number of scenarios, e.g., an erupting volcano, the WSNs are not deployed to work for an extremely long time. Instead, the WSNs aim to deliver continuous and reliable multimedia...

    Provided By University of Bradford

  • White Papers // Nov 2010

    Approach Towards Energy Efficient Power Amplifier for 4G Communications

    The biggest challenge for future 4G systems is the need to limit the energy consumptions of battery-powered and base station devices, with the aim to prolong their operational time and avoid active cooling in the base station. The green wireless communications requires research in areas such as energy efficient RF...

    Provided By University of Bradford

  • White Papers // Jun 2011

    Experimental Throughput Analysis for 802.11n System and MIMO Indoor Propagation Prediction

    This paper presents an analysis of a commercial 802.11n MIMO 2x3 dual band (2.4 & 5 GHz) system focusing on the operational throughput performance over an indoor environment with Line of Sight and Non Line of Sight scenarios. Although many authors have provided evidence on the effectiveness of this technology...

    Provided By University of Bradford

  • White Papers // Jan 2011

    An Information Theoretic Approach for the Performance Evaluation of MultihopWireless Ad Hoc Networks

    The information theoretic principles of Maximum Entropy (ME) and Minimum Relative Entropy (MRE) are employed, as least-biased methods of inference, towards the analysis of a multi-hop ad hoc system with bursty arrivals and Repetitive Service (RS) blocking. The system consists of K MAC layer and R IP layer finite capacity...

    Provided By University of Bradford

  • White Papers // Nov 2011

    Load-Aware Radio Access Selection in Heterogeneous Terrestrial Wireless Networks

    Terrestrial wireless network technologies such as UMTS, WiMax and WLAN are used to provide network access for both voice and data services. In big cities the densely populated areas like town centres, shopping centres and train stations which have coverage of multiple wireless networks, a large number of mobile users...

    Provided By University of Bradford

  • White Papers // Jun 2011

    Adaptive Cluster Management for Energy Efficient Sensor Networks

    This paper considers ways to improve the prolong life time of the wireless sensor networks. Power consumption during communication phases is the greatest limiting factor to sensor network lifetime. The authors' work aims to increase the lifetime or data communication capacity of cluster based schemes. In this paper, they propose...

    Provided By University of Bradford

  • White Papers // May 2012

    Adaptive Multicast Streaming Based on Scalable Video Blocks and TFMCC Protocol

    This paper presents an architecture for live streaming of scalable video, which is encoded using the H.264 SVC (Scalable Video Coding) standard and transmitted over multicast groups on a Peer-To-Peer (P2P) network. The architecture has two characteristics: the utilization of a paradigm of video compression based on independent compressed blocks...

    Provided By University of Bradford

  • White Papers // Mar 2012

    A Flexible Framework Based on Reinforcement Learning for Adaptive Modulation and Coding in OFDM Wireless Systems

    This paper presents a machine learning approach for link adaptation in orthogonal frequency-division multiplexing systems through adaptive modulation and coding. Although machine learning techniques have attracted attention for link adaptation, most of the schemes proposed so far are based on off-line training algorithms, which make them not well suited for...

    Provided By University of Bradford

  • White Papers // Nov 2013

    A Note on High-Security General-Purpose Elliptic Curves

    General-purpose elliptic curves are necessary to attain high-efficiency implementations of the most common cryptographic protocols like asymmetric encryption and plain digital signatures (but setting aside less conventional application like identity-based encryption). The standard NIST curves, though fairly efficient overall, arguably no longer represent the state of the art in the...

    Provided By University of Bradford

  • White Papers // Nov 2013

    The Realm of the Pairings

    Bilinear maps, or pairings, initially proposed in a cryptologic context for cryptanalytic purposes, proved afterward to be an amazingly flexible and useful tool for the construction of cryptosystems with unique features. Yet, they are notoriously hard to implement efficiently, so that their effective deployment requires a careful choice of parameters...

    Provided By University of Bradford

  • White Papers // Feb 2011

    Managing Variability in Business Processes: An Aspect-Oriented Approach

    Business processes specify key activities in an organization, some of which can be automated. It is often the case that replication of activities across such processes occurs and failure in identifying such replication results in organizational costs. To minimize this risk and optimize organizational re-sources, in this paper, the authors...

    Provided By University of Bradford

  • White Papers // Sep 2012

    Trust Measurements Yeld Distributed Decision Support in Cloud Computing

    In this paper, the authors propose the creation of a trust model to ensure the reliable files exchange between the users of a private cloud. To validate the proposed model, a simulation environment with the tool CloudSim was used. Its use to run the simulations of the adopted scenarios allowed...

    Provided By University of Bradford