University of Bridgeport

Displaying 1-29 of 29 results

  • White Papers // Dec 2011

    Hierarchical Coordination for Data Gathering (HCDG) in Wireless Sensor Networks

    A Wireless Sensor Network (WSN) consists of large number of sensor nodes where each node operates by a finite battery for sensing, computing, and performing wireless communication tasks. Energy aware routing and MAC protocols were proposed to prolong the lifetime of WSNs. MAC protocols reduce energy consumption by putting the...

    Provided By University of Bridgeport

  • White Papers // Dec 2011

    A Simulation Model for the Life-Time of Wireless Sensor Networks

    In this paper, the authors present a model for the lifetime of wireless sensor networks. The model takes into consideration several parameters such as the total number of sensors, network size, percentage of sink nodes, location of sensors, the mobility of sensors, and power consumption. A definition of the life...

    Provided By University of Bridgeport

  • White Papers // Dec 2011

    A Simulation Model for the Lifetime of Wireless Sensor Networks

    In this paper, the authors present a model for the lifetime of wireless sensor networks. The model takes into consideration several parameters such as the total number of sensors, network size, percentage of sink nodes, location of sensors, the mobility of sensors, and power consumption. A definition of the life...

    Provided By University of Bridgeport

  • White Papers // Mar 2011

    Femto Cells: Current Status and Future Directions

    This is a survey paper on the recently developed and rapidly evolving field of femtocells. Quite often, it is noticed that cell-phone signals are strongly attenuated, when indoors, leading to call dropping or poor call quality. Femtocells are mini base stations that are deployed in users' homes so that the...

    Provided By University of Bridgeport

  • White Papers // Nov 2010

    A New Scheme for Improving Route Discovery and Route Maintenance for Mobile Ad Hoc Networks (MANET)

    This paper presents a new scheme for the Distance Source Routing (DSR) protocol which shows the improvement over the two major metrics of the DSR protocol: route discovery and route maintenance. In addition, the authors present a mathematical model that includes probability density function for these two observed metrics. Their...

    Provided By University of Bridgeport

  • White Papers // Nov 2010

    Energy Efficient Military Mobile Base Station Placement

    This research deals with an energy efficient network for military mobile base station placement. The proposed method is based on minimizing the energy loss of military communication networks where the base station is moving along a preset path and the users are constantly moving in an independent speed and direction....

    Provided By University of Bridgeport

  • White Papers // Oct 2010

    Security in Wireless Sensor Networks: Key Management Module in SOOAWSN

    Due to high restrictions in wireless sensor networks, where the resources are limited, clustering protocols for routing organization have been proposed in much research for increasing system throughput, decreasing system delay and saving energy. Even these algorithms have proposed some levels of security, but because of their dynamic nature of...

    Provided By University of Bridgeport

  • White Papers // Oct 2010

    Performance Analysis of Multimedia Compression Algorithms

    Multimedia is a technology used to process textual data, audios and videos, images and animations. Multimedia applications are used in different fields of life like entertainment, video conferencing, application sharing, distance learning, remote working and online games. An example of multimedia applications is WebEx video conferencing. WebEx is an application...

    Provided By University of Bridgeport

  • White Papers // Aug 2010

    Adverse Implications Of Basel 2

    Recent global financial system problems are forcing governments to consider strengthened regulation, supervision and capital adequacy rules. The Basel 2 Accords require banks to maintain levels of Tier I and Tier II capital that may be difficult to attain based on recent financial statements of international financial institutions. Using available...

    Provided By University of Bridgeport

  • White Papers // Aug 2010

    A Self-Deployment Obstacle Avoidance (SOA) Algorithm for Mobile Sensor Networks

    A mobile sensor network is a distributed collection of nodes, each of which has sensing, computing, communicating, and locomotion capabilities. This paper presents a Self-deployment Obstacle Avoidance (SOA) algorithm for mobile sensor networks. The proposed SOA algorithm provides full coverage and can be efficiently used in a complex, unstable, and...

    Provided By University of Bridgeport

  • White Papers // Aug 2010

    Parameterized Affect of Transmissionrange on Lost of Network Connectivity (LNC) of Wireless Sensor Networks

    Wireless Sensor Networks, referred to as WSNs, and are made up of various types of sensor nodes. Recent developments in micro electro-mechanical technology have given rise to new integrated circuitry, microprocessor hardware and nano technology, wireless technology, and advanced networking routing protocols. Hospitals and health service facilities, the armed forces,...

    Provided By University of Bridgeport

  • White Papers // May 2010

    Interference of 802.11B WLAN and Bluetooth: Analysis and Performance Evaluation

    IEEE 802.11 and Bluetooth, these two operating in the unlicensed 2.4 GHz frequency band are becoming more and more popular in the mobile computing world. The number of devices equipped with IEEE 802.11 and Bluetooth is growing drastically. Result is the number of co-located devices, say within 10 meters, grown...

    Provided By University of Bridgeport

  • White Papers // Apr 2010

    Performance Model for a Conservative Distributed Simulation Environment Using Null Messages to Avoid Deadlock

    A conservative distributed simulation requires all Logical Processes (LPs) to follow the causality constraint requirement. This implies that all event-messages are processed in strictly timestamp order. Apart from the timestamp of each event generated by LPs, synchronization between all LPs is the second most important requirements. Finally, there must not...

    Provided By University of Bridgeport

  • White Papers // Apr 2010

    Performance Evaluation of Routing Protocols in Wireless Sensor Networks

    The efficiency of sensor networks strongly depends on the routing protocol used. In this paper, the authors analyze three different types of routing protocols: LEACH, PEGASIS, and VGA. Sensor networks are simulated using Sensoria simulator. Several simulations are conducted to analyze the performance of these protocols including the power consumption...

    Provided By University of Bridgeport

  • White Papers // Mar 2010

    IEEE 802.11 & Bluetooth Interference: Simulation and Coexistence

    IEEE 802.11 and Bluetooth, these two operating in the unlicensed 2.4 GHz frequency band are becoming more and more popular in the mobile computing world. The number of devices equipped with IEEE 802.11 and Bluetooth is growing drastically. Result is the number of co-located devices, say within 10meters, grown to...

    Provided By University of Bridgeport

  • White Papers // Jan 2010

    Deterministic Formulization of End-to-End Delay and Bandwidth Efficiency for Multicast Systems

    End-System Multicasting (ESM) is a promising application-layer scheme that has been recently proposed for implementing multicast routing in the application layer as a practical alternative to the IP multicasting. Moreover, ESM is an efficient application layer solution where all the multicast functionality is shifted to the end users. However, the...

    Provided By University of Bridgeport

  • White Papers // Jan 2010

    Combining Private and Public Key Encryption Techniques for Providing Extreme Secure Environment for an Academic Institution Application

    This paper presents the implementation of a secure application for an academic institution that offers numerous services to both students and the faculty. The primary focus of this paper is to provide a technical implementation of a new architecture for encrypting the database. The scope of this paper mainly includes...

    Provided By University of Bridgeport

  • White Papers // Jan 2010

    Deterministic Formulization of End-to-End Delay for Multicast Systems

    End-System Multicasting (ESM) is a promising application-layer scheme that has been recently proposed for implementing multicast routing in the application layer as a practical alternative to the IP multicasting. Moreover, ESM is an efficient application layer solution where all the multicast functionality is shifted to the end users. However, the...

    Provided By University of Bridgeport

  • White Papers // Nov 2009

    A Quantitative Analysis of Handover Time at MAC Layer for Wireless Mobile Networks

    Extensive studies have been carried out for reducing the handover time of wireless mobile network at Medium Access Control (MAC) layer. However, none of them show the impact of reduced handover time on the overall performance of wireless mobile networks. This paper presents a quantitative analysis to show the impact...

    Provided By University of Bridgeport

  • White Papers // Aug 2009

    The Use of Orthogonal Frequency Code Division (OFCD) Multiplexing in Wireless Mesh Network (WMN)

    In the present scenario, improvement in the data rate, network capacity, scalability, and the network throughput are some of the most serious issues in Wireless Mesh Networks (WMN). Specifically, a major obstacle that hinders the widespread adoption of WMN is the severe limits on throughput and the network capacity. This...

    Provided By University of Bridgeport

  • White Papers // Aug 2009

    Deterministic Formulization of SNR for Wireless Multiuser DS-CDMA Networks

    Wireless multiuser receivers suffer from their relatively higher computational complexity that prevents widespread use of this technique. In addition, one of the main characteristics of multi-channel communications that can severely degrade the performance is the inconsistent and low values of SNR that result in high BER and poor channel capacity....

    Provided By University of Bridgeport

  • White Papers // Aug 2009

    A New Scheme for Minimizing Malicious Behavior of Mobile Nodes in Mobile Ad Hoc Networks

    The performance of Mobile Ad hoc NETworks (MANET) depends on the cooperation of all active nodes. However, supporting a MANET is a cost-intensive activity for a mobile node. From a single mobile node perspective, the detection of routes as well as forwarding packets consume local CPU time, memory, network-bandwidth, and...

    Provided By University of Bridgeport

  • White Papers // Aug 2009

    Minimizing Cache Timing Attack Using Dynamic Cache Flushing (DCF) Algorithm

    Rijndael algorithm was unanimously chosen as the Advanced Encryption Standard (AES) by the panel of researchers at National Institute of Standards and Technology (NIST) in October 2000. Since then, Rijndael was destined to be used massively in various software as well as hardware entities for encrypting data. However, a few...

    Provided By University of Bridgeport

  • White Papers // Jul 2009

    Getting the Tail to Wag - Developing Innovation Capability in SMEs

    In terms of improving the ways in which knowledge is translated into value in the form of product, process and service innovation it is clear that the concept of absorptive capacity is important. This paper reviews the concept of absorptive capacity and its relationship to innovation management capability. It explores...

    Provided By University of Bridgeport

  • White Papers // Jul 2009

    A New Mechanism to Solve IEEE 802.16 Authentication Vulnerabilities

    Here is a new technology that can provide broadband access at a high bandwidth. It's called WiMax (Worldwide) Interoperability for Microwave Access. The availability of microwaves towers provides a very cost effective for delivering high bandwidth in metropolitan cities. It is a multi-hop network where security is a major issue...

    Provided By University of Bridgeport

  • White Papers // Jul 2009

    Clustered Hierarchy in Sensor Networks: Performance and Security

    Many papers have been proposed in order to increase the wireless sensor networks performance; This kind of network has limited resources, where the energy in each sensor came from a small battery that sometime is hard to be replaced or recharged. Transmission energy is the most concern part where the...

    Provided By University of Bridgeport

  • White Papers // Jun 2009

    A Low-Complexity Algorithm for Improving Computing Power of Multiuser Receivers for Next Generation Wireless Systems

    A new Transformation Matrix (TM) algorithm for reducing the computational complexity of multiuser receivers for DS-CDMA wireless system is presented. Next generation multiuser wireless receivers will need to use low computational complexity algorithm in order to perform both fast signal detection and error estimation. Several multiuser signal detection algorithms have...

    Provided By University of Bridgeport

  • White Papers // Mar 2009

    A Cross-Layer Design Approach for Improving QoS of Wireless Networks

    Because the existing wireless network design is not enough to satisfy various demands. Especially a lot of integrated data, voice, audio, video and other media files. These different programs have different characteristics, or the same type of program has different parts, they need different levels of Quality of Service (QoS)....

    Provided By University of Bridgeport

  • White Papers // Mar 2009

    Performance Analysis of Switches in High Speed LAN

    This paper presents an analysis of switches in high speed LAN. In order to support the analysis, this paper provides both analytical and mathematical models. The proposed analytical model is based on a finite state Markov model developed for analyzing networks with virtual channels in a switched LAN. The proposed...

    Provided By University of Bridgeport

  • White Papers // Aug 2009

    Minimizing Cache Timing Attack Using Dynamic Cache Flushing (DCF) Algorithm

    Rijndael algorithm was unanimously chosen as the Advanced Encryption Standard (AES) by the panel of researchers at National Institute of Standards and Technology (NIST) in October 2000. Since then, Rijndael was destined to be used massively in various software as well as hardware entities for encrypting data. However, a few...

    Provided By University of Bridgeport

  • White Papers // Aug 2009

    The Use of Orthogonal Frequency Code Division (OFCD) Multiplexing in Wireless Mesh Network (WMN)

    In the present scenario, improvement in the data rate, network capacity, scalability, and the network throughput are some of the most serious issues in Wireless Mesh Networks (WMN). Specifically, a major obstacle that hinders the widespread adoption of WMN is the severe limits on throughput and the network capacity. This...

    Provided By University of Bridgeport

  • White Papers // Mar 2011

    Femto Cells: Current Status and Future Directions

    This is a survey paper on the recently developed and rapidly evolving field of femtocells. Quite often, it is noticed that cell-phone signals are strongly attenuated, when indoors, leading to call dropping or poor call quality. Femtocells are mini base stations that are deployed in users' homes so that the...

    Provided By University of Bridgeport

  • White Papers // Dec 2011

    A Simulation Model for the Life-Time of Wireless Sensor Networks

    In this paper, the authors present a model for the lifetime of wireless sensor networks. The model takes into consideration several parameters such as the total number of sensors, network size, percentage of sink nodes, location of sensors, the mobility of sensors, and power consumption. A definition of the life...

    Provided By University of Bridgeport

  • White Papers // Dec 2011

    A Simulation Model for the Lifetime of Wireless Sensor Networks

    In this paper, the authors present a model for the lifetime of wireless sensor networks. The model takes into consideration several parameters such as the total number of sensors, network size, percentage of sink nodes, location of sensors, the mobility of sensors, and power consumption. A definition of the life...

    Provided By University of Bridgeport

  • White Papers // Dec 2011

    Hierarchical Coordination for Data Gathering (HCDG) in Wireless Sensor Networks

    A Wireless Sensor Network (WSN) consists of large number of sensor nodes where each node operates by a finite battery for sensing, computing, and performing wireless communication tasks. Energy aware routing and MAC protocols were proposed to prolong the lifetime of WSNs. MAC protocols reduce energy consumption by putting the...

    Provided By University of Bridgeport

  • White Papers // Aug 2009

    Deterministic Formulization of SNR for Wireless Multiuser DS-CDMA Networks

    Wireless multiuser receivers suffer from their relatively higher computational complexity that prevents widespread use of this technique. In addition, one of the main characteristics of multi-channel communications that can severely degrade the performance is the inconsistent and low values of SNR that result in high BER and poor channel capacity....

    Provided By University of Bridgeport

  • White Papers // Aug 2009

    A New Scheme for Minimizing Malicious Behavior of Mobile Nodes in Mobile Ad Hoc Networks

    The performance of Mobile Ad hoc NETworks (MANET) depends on the cooperation of all active nodes. However, supporting a MANET is a cost-intensive activity for a mobile node. From a single mobile node perspective, the detection of routes as well as forwarding packets consume local CPU time, memory, network-bandwidth, and...

    Provided By University of Bridgeport

  • White Papers // Nov 2010

    A New Scheme for Improving Route Discovery and Route Maintenance for Mobile Ad Hoc Networks (MANET)

    This paper presents a new scheme for the Distance Source Routing (DSR) protocol which shows the improvement over the two major metrics of the DSR protocol: route discovery and route maintenance. In addition, the authors present a mathematical model that includes probability density function for these two observed metrics. Their...

    Provided By University of Bridgeport

  • White Papers // Jul 2009

    Getting the Tail to Wag - Developing Innovation Capability in SMEs

    In terms of improving the ways in which knowledge is translated into value in the form of product, process and service innovation it is clear that the concept of absorptive capacity is important. This paper reviews the concept of absorptive capacity and its relationship to innovation management capability. It explores...

    Provided By University of Bridgeport

  • White Papers // Jun 2009

    A Low-Complexity Algorithm for Improving Computing Power of Multiuser Receivers for Next Generation Wireless Systems

    A new Transformation Matrix (TM) algorithm for reducing the computational complexity of multiuser receivers for DS-CDMA wireless system is presented. Next generation multiuser wireless receivers will need to use low computational complexity algorithm in order to perform both fast signal detection and error estimation. Several multiuser signal detection algorithms have...

    Provided By University of Bridgeport

  • White Papers // Mar 2009

    Performance Analysis of Switches in High Speed LAN

    This paper presents an analysis of switches in high speed LAN. In order to support the analysis, this paper provides both analytical and mathematical models. The proposed analytical model is based on a finite state Markov model developed for analyzing networks with virtual channels in a switched LAN. The proposed...

    Provided By University of Bridgeport

  • White Papers // Jul 2009

    A New Mechanism to Solve IEEE 802.16 Authentication Vulnerabilities

    Here is a new technology that can provide broadband access at a high bandwidth. It's called WiMax (Worldwide) Interoperability for Microwave Access. The availability of microwaves towers provides a very cost effective for delivering high bandwidth in metropolitan cities. It is a multi-hop network where security is a major issue...

    Provided By University of Bridgeport

  • White Papers // Mar 2009

    A Cross-Layer Design Approach for Improving QoS of Wireless Networks

    Because the existing wireless network design is not enough to satisfy various demands. Especially a lot of integrated data, voice, audio, video and other media files. These different programs have different characteristics, or the same type of program has different parts, they need different levels of Quality of Service (QoS)....

    Provided By University of Bridgeport

  • White Papers // May 2010

    Interference of 802.11B WLAN and Bluetooth: Analysis and Performance Evaluation

    IEEE 802.11 and Bluetooth, these two operating in the unlicensed 2.4 GHz frequency band are becoming more and more popular in the mobile computing world. The number of devices equipped with IEEE 802.11 and Bluetooth is growing drastically. Result is the number of co-located devices, say within 10 meters, grown...

    Provided By University of Bridgeport

  • White Papers // Mar 2010

    IEEE 802.11 & Bluetooth Interference: Simulation and Coexistence

    IEEE 802.11 and Bluetooth, these two operating in the unlicensed 2.4 GHz frequency band are becoming more and more popular in the mobile computing world. The number of devices equipped with IEEE 802.11 and Bluetooth is growing drastically. Result is the number of co-located devices, say within 10meters, grown to...

    Provided By University of Bridgeport

  • White Papers // Aug 2010

    Adverse Implications Of Basel 2

    Recent global financial system problems are forcing governments to consider strengthened regulation, supervision and capital adequacy rules. The Basel 2 Accords require banks to maintain levels of Tier I and Tier II capital that may be difficult to attain based on recent financial statements of international financial institutions. Using available...

    Provided By University of Bridgeport

  • White Papers // Aug 2010

    A Self-Deployment Obstacle Avoidance (SOA) Algorithm for Mobile Sensor Networks

    A mobile sensor network is a distributed collection of nodes, each of which has sensing, computing, communicating, and locomotion capabilities. This paper presents a Self-deployment Obstacle Avoidance (SOA) algorithm for mobile sensor networks. The proposed SOA algorithm provides full coverage and can be efficiently used in a complex, unstable, and...

    Provided By University of Bridgeport

  • White Papers // Jan 2010

    Deterministic Formulization of End-to-End Delay and Bandwidth Efficiency for Multicast Systems

    End-System Multicasting (ESM) is a promising application-layer scheme that has been recently proposed for implementing multicast routing in the application layer as a practical alternative to the IP multicasting. Moreover, ESM is an efficient application layer solution where all the multicast functionality is shifted to the end users. However, the...

    Provided By University of Bridgeport

  • White Papers // Jul 2009

    Clustered Hierarchy in Sensor Networks: Performance and Security

    Many papers have been proposed in order to increase the wireless sensor networks performance; This kind of network has limited resources, where the energy in each sensor came from a small battery that sometime is hard to be replaced or recharged. Transmission energy is the most concern part where the...

    Provided By University of Bridgeport

  • White Papers // Oct 2010

    Security in Wireless Sensor Networks: Key Management Module in SOOAWSN

    Due to high restrictions in wireless sensor networks, where the resources are limited, clustering protocols for routing organization have been proposed in much research for increasing system throughput, decreasing system delay and saving energy. Even these algorithms have proposed some levels of security, but because of their dynamic nature of...

    Provided By University of Bridgeport

  • White Papers // Jan 2010

    Combining Private and Public Key Encryption Techniques for Providing Extreme Secure Environment for an Academic Institution Application

    This paper presents the implementation of a secure application for an academic institution that offers numerous services to both students and the faculty. The primary focus of this paper is to provide a technical implementation of a new architecture for encrypting the database. The scope of this paper mainly includes...

    Provided By University of Bridgeport

  • White Papers // Jan 2010

    Deterministic Formulization of End-to-End Delay for Multicast Systems

    End-System Multicasting (ESM) is a promising application-layer scheme that has been recently proposed for implementing multicast routing in the application layer as a practical alternative to the IP multicasting. Moreover, ESM is an efficient application layer solution where all the multicast functionality is shifted to the end users. However, the...

    Provided By University of Bridgeport

  • White Papers // Apr 2010

    Performance Model for a Conservative Distributed Simulation Environment Using Null Messages to Avoid Deadlock

    A conservative distributed simulation requires all Logical Processes (LPs) to follow the causality constraint requirement. This implies that all event-messages are processed in strictly timestamp order. Apart from the timestamp of each event generated by LPs, synchronization between all LPs is the second most important requirements. Finally, there must not...

    Provided By University of Bridgeport

  • White Papers // Apr 2010

    Performance Evaluation of Routing Protocols in Wireless Sensor Networks

    The efficiency of sensor networks strongly depends on the routing protocol used. In this paper, the authors analyze three different types of routing protocols: LEACH, PEGASIS, and VGA. Sensor networks are simulated using Sensoria simulator. Several simulations are conducted to analyze the performance of these protocols including the power consumption...

    Provided By University of Bridgeport

  • White Papers // Oct 2010

    Performance Analysis of Multimedia Compression Algorithms

    Multimedia is a technology used to process textual data, audios and videos, images and animations. Multimedia applications are used in different fields of life like entertainment, video conferencing, application sharing, distance learning, remote working and online games. An example of multimedia applications is WebEx video conferencing. WebEx is an application...

    Provided By University of Bridgeport

  • White Papers // Aug 2010

    Parameterized Affect of Transmissionrange on Lost of Network Connectivity (LNC) of Wireless Sensor Networks

    Wireless Sensor Networks, referred to as WSNs, and are made up of various types of sensor nodes. Recent developments in micro electro-mechanical technology have given rise to new integrated circuitry, microprocessor hardware and nano technology, wireless technology, and advanced networking routing protocols. Hospitals and health service facilities, the armed forces,...

    Provided By University of Bridgeport

  • White Papers // Nov 2009

    A Quantitative Analysis of Handover Time at MAC Layer for Wireless Mobile Networks

    Extensive studies have been carried out for reducing the handover time of wireless mobile network at Medium Access Control (MAC) layer. However, none of them show the impact of reduced handover time on the overall performance of wireless mobile networks. This paper presents a quantitative analysis to show the impact...

    Provided By University of Bridgeport

  • White Papers // Nov 2010

    Energy Efficient Military Mobile Base Station Placement

    This research deals with an energy efficient network for military mobile base station placement. The proposed method is based on minimizing the energy loss of military communication networks where the base station is moving along a preset path and the users are constantly moving in an independent speed and direction....

    Provided By University of Bridgeport