University of Calabria

Displaying 1-22 of 22 results

  • White Papers // Jan 2014

    Performance Evaluation of ECC in Single and Multi Processor Architectures on FPGA Based Embedded System

    ECC is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. Cryptographic algorithms are computationally costly and the challenge is more if the authors need to execute them in resource constrained embedded systems. Field Programmable Gate Arrays (FPGAs) having programmable logic de-vices and...

    Provided By University of Calabria

  • White Papers // Sep 2013

    A Novel Technique to Detect Intrusion in MANET

    In this paper a novel technique has been proposed for intrusion detection in MANET, where agents are fired from a node for each node randomly and detect the defective nodes. Detection is based on Triangular Encryption technique (TE), and AODV is taken as routing protocol. The scheme is an 'Agent'...

    Provided By University of Calabria

  • White Papers // Jan 2013

    Single Layer Monopole Hexagonal Microstrip Patch Antenna for Direct Broadcast Satellite (DBS) System

    In recent years, great interest was focused on micro-strip antennas for their small volumes, low profiles, excellent integration, low costs and good performance. With the continuous growth of wireless communication service and the constant miniaturization of communication equipment, there are higher and higher demands for the volume of antennas, integration...

    Provided By University of Calabria

  • White Papers // Oct 2012

    SEGNET: Secure Geo-Sensor Network Model

    Wireless GEO-Sensor NETworks (GEONET) is suitable for critical applications in hostile environments due to its flexibility in deployment. But low power geo-sensor nodes are easily compromised by security threats like battery exhaustion attack which may give rise to unavoidable circumstances. In this type of attack, intruder forcefully resists legitimate sensor...

    Provided By University of Calabria

  • White Papers // Jul 2012

    A Simple 1-Byte 1-Clock RC4 Design and Its Efficient Implementation in FPGA Coprocessor for Secured Ethernet Communication

    In the field of cryptography till date the 1-byte in 1-clock is the best known RC4 hardware design, while the 1-byte in 3clocks is the best known implementation. The design algorithm in considers two consecutive bytes together and processes them in 2 clocks. The design of 1-byte in 3-clocks is...

    Provided By University of Calabria

  • White Papers // Jun 2012

    A New Scale for Attribute Dependency in Large Database Systems

    Large, data centric applications are characterized by its different attributes. In modern day, a huge majority of the large data centric applications are based on relational model. The databases are collection of tables and every table consists of numbers of attributes. The data is accessed typically through SQL queries. The...

    Provided By University of Calabria

  • White Papers // Jun 2011

    Cloud Computing and Software Agents: Towards Cloud Intelligent Services

    Cloud computing systems provide large-scale infrastructures for high-performance computing that are "Elastic" since they are able to adapt to user and application needs. Clouds are used through a service-oriented interface that implements the software-as-a-service paradigm to offer Cloud services on demand. This paper discusses Cloud computing models and architectures, their...

    Provided By University of Calabria

  • White Papers // Jun 2011

    Agent-Based Development of Wireless Sensor Network Applications

    Due to the growing exploitation of Wireless Sensor Networks (WSNs) for enhancing all major conventional application domains and enabling brand new application domains, the development of applications based on WSNs has recently gained a significant focus. Thus, design methods, middleware and frameworks have been defined and made available to support...

    Provided By University of Calabria

  • White Papers // Jan 2011

    Meta-Heuristic Techniques and Swarm Intelligence in Mobile Ad Hoc Networks

    The infrastructure-less and the dynamic nature of Mobile Ad hoc NETworks (MANETs) demands new set of networking strategies to be implemented in order to provide efficient end-to-end communication. MANETs employ the traditional TCP/IP structure to provide end-to-end communication between nodes. However, due to their mobility and the limited resource in...

    Provided By University of Calabria

  • White Papers // Dec 2010

    Distributed XML Design

    A distributed XML document is an XML document that spans several machines. The authors assume that a distribution design of the document tree is given, consisting of an XML kernel-document T[f1,...,fn] where some leaves are "Docking points" for external resources providing XML subtrees (f1,. .., fn, standing, e.g., for Web...

    Provided By University of Calabria

  • White Papers // Sep 2010

    The Practical Experience of Implementing a GSM BTS Through Open Software/Hardware

    The objective of this paper is to show the implementation experience of a GSM Base Transceiver System (BTS) by using Universal Software Radio Peripheral, which is a multi-purpose motherboard for Software Defined Radio (SDR), and a Personal Computer (PC). The OpenBTS project provides a software suite, created for the GNU...

    Provided By University of Calabria

  • White Papers // May 2010

    Transaction Management for Distributed Database using Petri Nets

    Large and medium sized organizations are functionally distributed in a structured or unstructured form over different locations like continents, countries, plants, divisions, departments, laboratories, work-groups and so on. As there is no single global clock available for synchronizing the transactions, some cost effective yet easily deployable generic framework for asynchronous...

    Provided By University of Calabria

  • White Papers // May 2010

    Modelling and Solving Optimal Placement Problems in Wireless Sensor Networks

    In this paper, the optimal sensor displacement problem in wireless sensor networks is addressed. It is assumed that a network, consisting of independent, collaborative and mobile nodes, is available. Starting from an initial configuration, the aim is to define a specific sensors displacement, which allows the network to achieve high...

    Provided By University of Calabria

  • White Papers // Mar 2010

    A General Simulation Framework for Supply Chain Modeling: State of the Art and Case Study

    Nowadays there is a large availability of discrete event simulation software that can be easily used in different domains: from industry to supply chain, from healthcare to business management, from training to complex systems design. Simulation engines of commercial discrete event simulation software use specific rules and logics for simulation...

    Provided By University of Calabria

  • White Papers // Feb 2010

    A Proximity-Based Self-Organizing Framework for Service Composition and Discovery

    The ICT market is experiencing an important shift from the request/provisioning of products toward a service-oriented view where everything (computing, storage, applications) is provided as a network-enabled service. It often happens that a solution to a problem cannot be offered by a single service, but by composing multiple basic services...

    Provided By University of Calabria

  • White Papers // Nov 2009

    An XML-Based Multi-Agent System for Supporting Online Recruitment Services

    In this paper the authors propose an XML-based multi-agent recommender system for supporting online recruitment services. The system is characterized by the following features: It handles user profiles for personalizing the job search over the Internet; it is based on the Intelligent Agent Technology; it uses XML for guaranteeing a...

    Provided By University of Calabria

  • White Papers // Oct 2009

    Simulations of the Impact of Controlled Mobility for Routing Protocols

    This paper addresses mobility control routing in wireless networks. Given a data flow request between a source-destination pair, the problem is to move nodes towards the best placement, such that the performance of the network is improved. The authors' purpose is to find the best nodes selection depending on the...

    Provided By University of Calabria

  • White Papers // Oct 2009

    EBC: A Topology Control Algorithm for Achieving High QoS in Sensor Networks

    A novel approach for achieving high Quality of Service (QoS) in sensor networks via topology control is introduced and experimentally assessed in this paper. The authors' approach falls in the broader discipline of graph structural mining, and exploits a leading concept initially studied in the context of Social Network Analysis...

    Provided By University of Calabria

  • White Papers // Jun 2009

    On the Storage, Management and Analysis of (Multi) Similarity for Large Scale Protein Structure Datasets in the Grid

    Assessment of the (Multi) Similarity among a set of protein structures is achieved through an ensemble of protein structure comparison methods/algorithms. This leads to the generation of a multitude of data that varies both in type and size. After passing through standardization and normalization, this data is further used in...

    Provided By University of Calabria

  • White Papers // Mar 2009

    A Reactive and Dependable Transport Protocol for Wireless Mesh Networks

    In the last few years, several different mesh network architectures have been conceived by both industry and academia; however, many issues on the deployment of efficient and fair transport protocols are still open. One of these issues is rate adaptation, that is, how to allocate the network resources among multiple...

    Provided By University of Calabria

  • White Papers // Feb 2009

    Do You Think Your Risk Is Fair Paid? Evidence From Italian Labor Market

    Starting from Adam Smith's intuition, compensating wage differentials are one of the most widespread explanations to describe why agents should bear occupational risk of injury and death. For nearly thirty years, economists have attempted to find empirical evidence on such wage differentials mostly relying on estimation of a simple wage...

    Provided By University of Calabria

  • White Papers // Feb 2009

    Optimization Models for Determining Performance Benchmarks in Wireless Sensor Networks

    In this paper, the authors propose some "Innovative" optimization models for Wireless Sensor Networks (WSNs). The models are chosen depending on the task the network is called to execute and they focus on the optimization of some specific performance objectives. Indeed, starting from a generic configuration, the optimal solution defines...

    Provided By University of Calabria

  • White Papers // Jan 2013

    Single Layer Monopole Hexagonal Microstrip Patch Antenna for Direct Broadcast Satellite (DBS) System

    In recent years, great interest was focused on micro-strip antennas for their small volumes, low profiles, excellent integration, low costs and good performance. With the continuous growth of wireless communication service and the constant miniaturization of communication equipment, there are higher and higher demands for the volume of antennas, integration...

    Provided By University of Calabria

  • White Papers // Oct 2012

    SEGNET: Secure Geo-Sensor Network Model

    Wireless GEO-Sensor NETworks (GEONET) is suitable for critical applications in hostile environments due to its flexibility in deployment. But low power geo-sensor nodes are easily compromised by security threats like battery exhaustion attack which may give rise to unavoidable circumstances. In this type of attack, intruder forcefully resists legitimate sensor...

    Provided By University of Calabria

  • White Papers // Jun 2009

    On the Storage, Management and Analysis of (Multi) Similarity for Large Scale Protein Structure Datasets in the Grid

    Assessment of the (Multi) Similarity among a set of protein structures is achieved through an ensemble of protein structure comparison methods/algorithms. This leads to the generation of a multitude of data that varies both in type and size. After passing through standardization and normalization, this data is further used in...

    Provided By University of Calabria

  • White Papers // Feb 2009

    Do You Think Your Risk Is Fair Paid? Evidence From Italian Labor Market

    Starting from Adam Smith's intuition, compensating wage differentials are one of the most widespread explanations to describe why agents should bear occupational risk of injury and death. For nearly thirty years, economists have attempted to find empirical evidence on such wage differentials mostly relying on estimation of a simple wage...

    Provided By University of Calabria

  • White Papers // Dec 2010

    Distributed XML Design

    A distributed XML document is an XML document that spans several machines. The authors assume that a distribution design of the document tree is given, consisting of an XML kernel-document T[f1,...,fn] where some leaves are "Docking points" for external resources providing XML subtrees (f1,. .., fn, standing, e.g., for Web...

    Provided By University of Calabria

  • White Papers // Nov 2009

    An XML-Based Multi-Agent System for Supporting Online Recruitment Services

    In this paper the authors propose an XML-based multi-agent recommender system for supporting online recruitment services. The system is characterized by the following features: It handles user profiles for personalizing the job search over the Internet; it is based on the Intelligent Agent Technology; it uses XML for guaranteeing a...

    Provided By University of Calabria

  • White Papers // Mar 2010

    A General Simulation Framework for Supply Chain Modeling: State of the Art and Case Study

    Nowadays there is a large availability of discrete event simulation software that can be easily used in different domains: from industry to supply chain, from healthcare to business management, from training to complex systems design. Simulation engines of commercial discrete event simulation software use specific rules and logics for simulation...

    Provided By University of Calabria

  • White Papers // Feb 2010

    A Proximity-Based Self-Organizing Framework for Service Composition and Discovery

    The ICT market is experiencing an important shift from the request/provisioning of products toward a service-oriented view where everything (computing, storage, applications) is provided as a network-enabled service. It often happens that a solution to a problem cannot be offered by a single service, but by composing multiple basic services...

    Provided By University of Calabria

  • White Papers // Jan 2011

    Meta-Heuristic Techniques and Swarm Intelligence in Mobile Ad Hoc Networks

    The infrastructure-less and the dynamic nature of Mobile Ad hoc NETworks (MANETs) demands new set of networking strategies to be implemented in order to provide efficient end-to-end communication. MANETs employ the traditional TCP/IP structure to provide end-to-end communication between nodes. However, due to their mobility and the limited resource in...

    Provided By University of Calabria

  • White Papers // May 2010

    Modelling and Solving Optimal Placement Problems in Wireless Sensor Networks

    In this paper, the optimal sensor displacement problem in wireless sensor networks is addressed. It is assumed that a network, consisting of independent, collaborative and mobile nodes, is available. Starting from an initial configuration, the aim is to define a specific sensors displacement, which allows the network to achieve high...

    Provided By University of Calabria

  • White Papers // Sep 2010

    The Practical Experience of Implementing a GSM BTS Through Open Software/Hardware

    The objective of this paper is to show the implementation experience of a GSM Base Transceiver System (BTS) by using Universal Software Radio Peripheral, which is a multi-purpose motherboard for Software Defined Radio (SDR), and a Personal Computer (PC). The OpenBTS project provides a software suite, created for the GNU...

    Provided By University of Calabria

  • White Papers // Mar 2009

    A Reactive and Dependable Transport Protocol for Wireless Mesh Networks

    In the last few years, several different mesh network architectures have been conceived by both industry and academia; however, many issues on the deployment of efficient and fair transport protocols are still open. One of these issues is rate adaptation, that is, how to allocate the network resources among multiple...

    Provided By University of Calabria

  • White Papers // Oct 2009

    Simulations of the Impact of Controlled Mobility for Routing Protocols

    This paper addresses mobility control routing in wireless networks. Given a data flow request between a source-destination pair, the problem is to move nodes towards the best placement, such that the performance of the network is improved. The authors' purpose is to find the best nodes selection depending on the...

    Provided By University of Calabria

  • White Papers // Feb 2009

    Optimization Models for Determining Performance Benchmarks in Wireless Sensor Networks

    In this paper, the authors propose some "Innovative" optimization models for Wireless Sensor Networks (WSNs). The models are chosen depending on the task the network is called to execute and they focus on the optimization of some specific performance objectives. Indeed, starting from a generic configuration, the optimal solution defines...

    Provided By University of Calabria

  • White Papers // Oct 2009

    EBC: A Topology Control Algorithm for Achieving High QoS in Sensor Networks

    A novel approach for achieving high Quality of Service (QoS) in sensor networks via topology control is introduced and experimentally assessed in this paper. The authors' approach falls in the broader discipline of graph structural mining, and exploits a leading concept initially studied in the context of Social Network Analysis...

    Provided By University of Calabria

  • White Papers // Jun 2011

    Agent-Based Development of Wireless Sensor Network Applications

    Due to the growing exploitation of Wireless Sensor Networks (WSNs) for enhancing all major conventional application domains and enabling brand new application domains, the development of applications based on WSNs has recently gained a significant focus. Thus, design methods, middleware and frameworks have been defined and made available to support...

    Provided By University of Calabria

  • White Papers // Jun 2011

    Cloud Computing and Software Agents: Towards Cloud Intelligent Services

    Cloud computing systems provide large-scale infrastructures for high-performance computing that are "Elastic" since they are able to adapt to user and application needs. Clouds are used through a service-oriented interface that implements the software-as-a-service paradigm to offer Cloud services on demand. This paper discusses Cloud computing models and architectures, their...

    Provided By University of Calabria

  • White Papers // Jul 2012

    A Simple 1-Byte 1-Clock RC4 Design and Its Efficient Implementation in FPGA Coprocessor for Secured Ethernet Communication

    In the field of cryptography till date the 1-byte in 1-clock is the best known RC4 hardware design, while the 1-byte in 3clocks is the best known implementation. The design algorithm in considers two consecutive bytes together and processes them in 2 clocks. The design of 1-byte in 3-clocks is...

    Provided By University of Calabria

  • White Papers // Jun 2012

    A New Scale for Attribute Dependency in Large Database Systems

    Large, data centric applications are characterized by its different attributes. In modern day, a huge majority of the large data centric applications are based on relational model. The databases are collection of tables and every table consists of numbers of attributes. The data is accessed typically through SQL queries. The...

    Provided By University of Calabria

  • White Papers // Jan 2014

    Performance Evaluation of ECC in Single and Multi Processor Architectures on FPGA Based Embedded System

    ECC is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. Cryptographic algorithms are computationally costly and the challenge is more if the authors need to execute them in resource constrained embedded systems. Field Programmable Gate Arrays (FPGAs) having programmable logic de-vices and...

    Provided By University of Calabria

  • White Papers // May 2010

    Transaction Management for Distributed Database using Petri Nets

    Large and medium sized organizations are functionally distributed in a structured or unstructured form over different locations like continents, countries, plants, divisions, departments, laboratories, work-groups and so on. As there is no single global clock available for synchronizing the transactions, some cost effective yet easily deployable generic framework for asynchronous...

    Provided By University of Calabria

  • White Papers // Sep 2013

    A Novel Technique to Detect Intrusion in MANET

    In this paper a novel technique has been proposed for intrusion detection in MANET, where agents are fired from a node for each node randomly and detect the defective nodes. Detection is based on Triangular Encryption technique (TE), and AODV is taken as routing protocol. The scheme is an 'Agent'...

    Provided By University of Calabria