World Academic Union

Displaying 1-40 of 154 results

  • White Papers // Jul 2014

    Design of a Low Cost Motion Data Acquisition Setup for Mechatronic Systems

    Motion sensors have been commonly used as a valuable component in mechatronic systems, however, many mechatronic designs and applications that need motion sensors cost enormous amount of money, especially high-tech systems. Design of a software for communication protocol between data acquisition card and motion sensor is another issue that has...

    Provided By World Academic Union

  • White Papers // Jun 2014

    Searchable Encryption in Cloud Storage

    Cloud outsource storage is one of important services in cloud computing. Cloud users upload data to cloud servers to reduce the cost of managing data and maintaining hardware and software. To ensure data confidentiality, users can encrypt their files before uploading them to a cloud system. However, retrieving the target...

    Provided By World Academic Union

  • White Papers // Jun 2014

    Ensuring Consistency under the Snapshot Isolation

    By running transactions under the snapshot isolation the authors can achieve a good level of concurrency, specially in databases with high-intensive read workloads. However, snapshot is not immune to all the problems that arise from competing transactions and therefore no serialization warranty exists. In this paper, they propose a technique...

    Provided By World Academic Union

  • White Papers // Jun 2014

    Enhance Security in XML Databases: XLog File for Severity-Aware Trust-Based Access Control

    The topic of enhancing security in XML databases is important as it includes protecting sensitive data and providing a secure environment to users. In order to improve security and provide dynamic access control for XML databases, the authors presented XLog file to calculate user trust values by recording users' bad...

    Provided By World Academic Union

  • White Papers // Jun 2014

    Applying Spanning Tree Graph Theory for Automatic Database Normalization

    In knowledge and data engineering field, relational database is the best repository to store data in a real world. It has been using around the world more than eight decades. Normalization is the most important process for the analysis and design of relational databases. It aims at creating a set...

    Provided By World Academic Union

  • White Papers // May 2014

    Frequency- and Content-Based Tag Cloud Font Distribution Algorithm

    The spread of web 2.0 has caused user-generated content explosion. Users can tag resources to describe and organize them. Tag clouds provide rough impression of relative importance of each tag within overall cloud in order to facilitate browsing among numerous tags and resources. The authors' paper is to enrich visualization...

    Provided By World Academic Union

  • White Papers // Apr 2014

    Ontologies for Complex Event Processing

    There is currently a lot of work on systems that can analyze the events, e.g., Complex Event Processing (CEP). In this paper, five ontologies are described, which include the event concepts. The paper provides an overview and comparison of existing event models. The main criteria for comparison are that there...

    Provided By World Academic Union

  • White Papers // Apr 2014

    A Distributed Approach to Extract High Utility Itemsets from XML Data

    In this paper, the authors investigate a new data mining capability that entails mining of High Utility Itemsets (HUI) in a distributed environment. Existing research in data mining deals with only presence or absence of an items and do not consider the semantic measures like weight or cost of the...

    Provided By World Academic Union

  • White Papers // Apr 2014

    Restructuring of XML Documents in the Form of Ontologies

    The intense use of the web has made it a very changing environment, its content is in permanent evolution to adapt to the demands. The standards have accompanied this evolution by passing from standards that regroup data with their presentations without any structuring such as HTML, to standards that separate...

    Provided By World Academic Union

  • White Papers // Mar 2014

    An Adaptive Virtual Desktop Service in Cloud Computing Platform

    Cloud computing is becoming more and more matured over the last few years and consequently the demands for better cloud services is increasing rapidly. One of the research topics to improve cloud services is the desktop computing in virtualized environment. This paper aims at the development of an adaptive virtual...

    Provided By World Academic Union

  • White Papers // Mar 2014

    Mobile Cloud Middleware: A New Service for Mobile Users

    Cloud Computing (CC) and Mobile Cloud Computing (MCC) have advanced rapidly the last few years. Today, MCC undergoes fast improvement and progress in terms of hardware (memory, embedded sensors, power consumption, touch screen, etc.) software (more and more sophisticated mobile applications) and transmission (higher data transmission rates achieved with different...

    Provided By World Academic Union

  • White Papers // Mar 2014

    ATM Service Analysis Using Predictive Data Mining

    The high utilization rate of Automated Teller Machine (ATM) has inevitably caused the phenomena of waiting for a long time in the queue. This in turn has increased the out of stock situations. The ATM utilization helps to determine the usage level and states the necessity of the ATM based...

    Provided By World Academic Union

  • White Papers // Mar 2014

    Migration of the Relational Data Base (RDB) to the Object Relational Data Base (ORDB)

    In this paper the authors propose an approach for translating an existing Relational DataBase (RDB) schema into ORDB. The transition is done with methods that can extract various functions from a RDB which is based on aggregations, associations between the various tables, and the reflexive relationships. These methods can extract...

    Provided By World Academic Union

  • White Papers // Mar 2014

    Design and Implementation of Quantum Cellular Automata Based Novel Adder Circuits

    The most important mathematical operation for any computing system is addition. An efficient adder can be of greater assistance in designing of any arithmetic circuits. Quantum-dot Cellular Automata (QCA) is a promising nanotechnology to create electronic circuits for computing devices and suitable candidate for next generation of computing systems. The...

    Provided By World Academic Union

  • White Papers // Mar 2014

    Enhance the Power of Sentiment Analysis

    Since big data has become substantially more accessible and manageable due to the development of powerful tools for dealing with unstructured data, people are eager to mine information from social media resources that could not be handled in the past. Sentiment analysis, as a novel branch of text mining, has...

    Provided By World Academic Union

  • White Papers // Feb 2014

    MATLAB-Based Graphical User Interface (GUI) for Data Mining as a Tool for Environment Management

    The application of data mining to environmental monitoring has become crucial for a number of tasks related to emergency management. Over recent years, many tools have been developed for Decision Support System (DSS) for emergency management. In this paper a Graphical User Interface (GUI) for environmental monitoring system is presented....

    Provided By World Academic Union

  • White Papers // Feb 2014

    Fault Tolerance in Distributed Database Systems

    Pioneer networked systems assume that connections are reliable, and a faulty operation will be considered in case of losing a connection. Transient connections are typical of mobile devices. Areas of application of data sharing system such as these, lead to the conclusion that network connections may not always be reliable,...

    Provided By World Academic Union

  • White Papers // Feb 2014

    Improvement of Data Transfer over Simple Object Access Protocol (SOAP)

    SOAP is defined by World Wide Web Consortium (W3C) as a simple and lightweight mechanism for exchanging structured and typed information between peers in a decentralized and distributed environment using eXtensible Markup Language (XML) on web services. This paper presents a designed algorithm which involves improvement of transferring data over...

    Provided By World Academic Union

  • White Papers // Feb 2014

    Indoor Localization by Pattern Matching Method Based On Extended Database

    In this paper the authors studied the CSS-based indoor localization system which is easy to implement, inexpensive to compose the systems, additionally CSS-based indoor localization system covers larger area than other system. However, this system has problem which is affected by reflected distance data. This problem in localization is caused...

    Provided By World Academic Union

  • White Papers // Feb 2014

    Big Data Strategy for Telco: Network Transformation

    Big data has the potential to improve the quality of services; enable infrastructure that businesses depend on to adapt continually and efficiently; improve the performance of employees; help organizations better understand customers; and reduce liability risks. Analytics and marketing models of fixed and mobile operators are falling short in combating...

    Provided By World Academic Union

  • White Papers // Feb 2014

    An Experiment of Three-Dimensional Point Clouds Using GoPro

    Construction of geo-spatial information recently tends to develop as multi-dimensional geo-spatial information. People constructing spatial information is also expanding its area to the general public from some experts. As well as, studies are in progress using a variety of devices, with the aim of near real-time update. In this paper,...

    Provided By World Academic Union

  • White Papers // Jan 2014

    Review and Comparison of Associative Classification Data Mining Approaches

    Associative Classification (AC) is a data mining approach that combines association rule and classification to build classification models (classifiers). AC has attracted a significant attention from several researchers mainly because it derives accurate classifiers that contain simple yet effective rules. In the last decade, a number of associative classification algorithms...

    Provided By World Academic Union

  • White Papers // Jan 2014

    Analysis of Diverse Clustering Tools in Data Mining

    Clustering in data mining is an unsupervised learning technique of aggregating the data objects into meaningful groups such that the intra cluster similarity of objects are maximized and inter cluster similarity of objects are minimized. Over the past decades several clustering tools were emerged in which clustering algorithms are inbuilt...

    Provided By World Academic Union

  • White Papers // Jan 2014

    A Review: Comparative Analysis of Different Categorical Data Clustering Ensemble Methods

    Over the past epoch a rampant amount of work has been done in the data clustering research under the unsupervised learning technique in data mining. Furthermore several algorithms and methods have been proposed focusing on clustering different data types, representation of cluster models, and accuracy rates of the clusters. However...

    Provided By World Academic Union

  • White Papers // Jan 2014

    Enhancing Privacy-Preserving Cloud Database Querying by Preventing Brute Force Attacks

    Considering the complexities involved in cloud computing, there are still plenty of issues that affect the privacy of data in cloud environment. Unless these problems get solved, the authors think that the problem of preserving privacy in cloud databases is still open. In tokenization and homomorphic cryptography based solutions for...

    Provided By World Academic Union

  • White Papers // Jan 2014

    Leakage Reduction ONOFIC Approach for Deep Submicron VLSI Circuits Design

    Minimizations of power dissipation, chip area with higher circuit performance are the necessary and key parameters in deep submicron regime. The leakage current increases sharply in deep submicron regime and directly affected the power dissipation of the logic circuits. In deep submicron region the power dissipation as well as high...

    Provided By World Academic Union

  • White Papers // Jan 2014

    Mining Educational Data to Support Students? Major Selection

    In this paper the authors aims to create the model for student in choosing an emphasized track of student majoring in computer science at Suan Sunandha Rajabhat University. This paper is to develop the suggested system using data mining technique to analyze knowledge and conduct decision rules. Such relationships can...

    Provided By World Academic Union

  • White Papers // Jan 2014

    Analysis of Users' Behavior on Book Loan Log Based On Association Rule Mining

    In this paper the authors aims to create a model for analysis of student behavior using library resources based on data mining technique in case of Suan Sunandha Rajabhat University. The model was created under association rules, apriori algorithm. The results were found 14 rules and the rules were tested...

    Provided By World Academic Union

  • White Papers // Jan 2014

    Time Series Regression with Meta-Clusters

    In this paper the authors present a preliminary attempt to apply classification of time series using meta-clusters in order to improve the quality of regression models. In this case, clustering was performed as a method to obtain subgroups of time series data with normal distribution from the inflow into wastewater...

    Provided By World Academic Union

  • White Papers // Jan 2014

    The Automated Selective Acquisition System

    To support design process for launching the product on time, Reverse Engineering (RE) process has been introduced for quickly generating 3D CAD model from its physical object. The accuracy of the 3D CAD model depends upon the data acquisition technique selected, contact or non-contact methods. In order to reduce times...

    Provided By World Academic Union

  • White Papers // Jan 2014

    A Multi Cordic Architecture on FPGA Platform

    Co-Ordinate Rotation DIgital Computer (CORDIC) is a unique digital computing unit intended for the computation of mathematical operations and functions. This paper presents a multi CORDIC processor that integrates different CORDIC architectures on a single FPGA chip and allows the user to select the CORDIC architecture to proceed with based...

    Provided By World Academic Union

  • White Papers // Dec 2013

    Modified Montgomery for RSA Cryptosystem

    Encryption and decryption in RSA are done by modular exponentiation which is achieved by repeated modular multiplication. Hence efficiency of modular multiplication directly determines the efficiency of RSA cryptosystem. This paper designs a modified montgomery modular multiplication in which addition of operands is computed by 4:2 compressors. The basic logic...

    Provided By World Academic Union

  • White Papers // Dec 2013

    New Approach for Constructing a Secure Biometric Database

    The multimodal biometric identification is the combination of several biometric systems; the challenge of this combination is to reduce some limitations of systems based on a single modality while significantly improving performance. In this paper, the authors propose a new approach to the construction and the protection of a multimodal...

    Provided By World Academic Union

  • White Papers // Dec 2013

    A Study on Abnormal Behavior Detection in BYOD Environment

    Advancement of communication technologies and smart devices in the recent times is leading to changes into the integrated wired and wireless communication environments. Since early days, businesses had started introducing environments for mobile device application to their operations in order to improve productivity (efficiency) and the closed corporate environment gradually...

    Provided By World Academic Union

  • White Papers // Dec 2013

    An Exploration on Competency-Based Curricula in Integrated Circuit Design

    In this paper the relationships between professional competences and school curriculain IC design industry are explored. The semi-structured questionnaire survey and focus group interview is the research method. Study participants are graduates of microelectronics engineering professional departments who are currently employed in the IC industry. The IC industries are defined...

    Provided By World Academic Union

  • White Papers // Dec 2013

    A Local Invariant Generalized Hough Transform Method for Integrated Circuit Visual Positioning

    In this paper, a Local Invariant Generalized Hough-Transform (LI-GHT) method is proposed for Integrated Circuit (IC) visual positioning. The original Generalized Hough Transform (GHT) is robust to external noise; however, it is not suitable for visual positioning of IC chips due to the Four-Dimensionality (4D) of parameter space which leads...

    Provided By World Academic Union

  • White Papers // Dec 2013

    Centralized Peak Consumption Smoothing Revisited for Habitat Energy Scheduling

    Currently, electricity suppliers must predict the consumption of their customers in order to deduce the power they need to produce. It is then important in a first step to optimize household consumptions to obtain more constant curves by limiting peaks in energy consumption. Here centralized real time scheduling is proposed...

    Provided By World Academic Union

  • White Papers // Dec 2013

    Runtime Monitoring Using Policy Based Approach to Control Information Flow for Mobile Apps

    Mobile applications are verified to check the correctness or evaluated to check the performance with respect to specific security properties such as availability, integrity and confidentiality. Where they are made available to the end users of the mobile application is achievable only to a limited degree using software engineering static...

    Provided By World Academic Union

  • White Papers // Dec 2013

    Evaluating Performance of an Anomaly Detection Module with Artificial Neural Network Implementation

    Anomaly detection techniques have been focused on two main components: data extraction and selection and the second one are the analysis performed over the obtained data. This paper is to analyze the influence that each of these components has over the system performance by evaluating detection over network scenarios with...

    Provided By World Academic Union

  • White Papers // Dec 2013

    Preliminary Evaluation of Passive UHF-Band RFID for Identifying Floating Objects on the Sea

    RFID system is used to identify objects such as passenger identification in public transportation, instead of linear or 2-dimensional barcodes. Key advantages of RFID system are to identify objects without physical contact, and to write arbitrary information into RFID tag. These advantages may help to improve maritime safety and efficiency...

    Provided By World Academic Union

  • White Papers // Jan 2012

    Factors of Effective Business Software Systems Development and Enhancement Projects Work Effort Estimation

    Majority of Business Software Systems (BSS) Development and Enhancement Projects (D&EP) fail to meet criteria of their effectiveness, what leads to the considerable financial losses. One of the fundamental reasons for such projects' exceptionally low success rate are improperly derived estimates for their costs and time. In the case of...

    Provided By World Academic Union

  • White Papers // Apr 2010

    A Group Key Agree Management Scheme for MANET

    Mobility of the nodes in mobile ad hoc network usually made huge change of network topology. This challenges the secure of the group communication quite a lot. Group key agree management model and security model for the MANET is presented in the paper. And group key agree management scheme was...

    Provided By World Academic Union

  • White Papers // Dec 2008

    The Survey of Handoff Issues in Wireless ATM Networks

    Wireless ATM (WATM) has emerged as an important component of the broadband wireless network infrastructure. While ATM supports for different traffic characteristics and QOS requirements, WATM networks provide wireless extension to the ATM-based B-ISDN networks by adding mobility support functions. The implementation of WATM poses several problems like mobility management,...

    Provided By World Academic Union

  • White Papers // Feb 2012

    3D Sensing and Mapping for a Tracked Mobile Robot with a Movable Laser Ranger Finder

    In this paper, the authors present a sensing system for 3D sensing and mapping by a tracked mobile robot with an arm-type sensor movable unit and a Laser Range Finder (LRF). The arm-type sensor movable unit is mounted on the robot and the LRF is installed at the end of...

    Provided By World Academic Union

  • White Papers // Apr 2012

    Heuristic Optimization Techniques for Network Reconfiguration in Distribution System

    Network reconfiguration is an import means for optimal operation of distribution network. It is an operation in configuration to alter the network structure of distribution feeders. Network reconfiguration is an operation to modify the network topology. The implementation of network reconfiguration has many advantages such as loss minimization, increasing system...

    Provided By World Academic Union

  • White Papers // Apr 2012

    A Performance Evaluation of Cellular Network Suitability for VANET

    Recently, Vehicular Ad-hoc NETworks (VANETs) for Intelligent Transport System (ITS) have become able safety and convenience services surpassing the simple services such as an electronic toll collection system. To provide the proper services, VANET needs infrastructure over the country infrastructure. Thus, the authors have to spend a huge sum of...

    Provided By World Academic Union

  • White Papers // Apr 2012

    Network Reconfiguration for Load Balancing in Distribution System with Distributed Generation and Capacitor Placement

    In this paper, the authors present an efficient algorithm for optimization of radial distribution systems by a network reconfiguration to balance feeder loads and eliminate overload conditions. The system load-balancing index is used to determine the loading conditions of the system and maximum system loading capacity. The index value has...

    Provided By World Academic Union

  • White Papers // Apr 2012

    Taxonomy of Structured P2P Overlay Networks Security Attacks

    The survey and classification of the different security attacks in structured Peer-To-Peer (P2P) overlay networks can be useful to computer system designers, programmers, administrators, and users. In this paper, the authors attempt to provide taxonomy of structured P2P overlay networks security attacks. They have specially focused on the way these...

    Provided By World Academic Union

  • White Papers // Apr 2012

    Enhancing the Connectedness in Ad-hoc Mesh Networks Using the Terranet Technology

    In this paper, the authors try to find the critical number of nodes which makes the network fully connected in a particular area, and then propose a method to enhance the intermediate node to accept to be a router to forward the data from the sender to the receiver. Much...

    Provided By World Academic Union

  • White Papers // Sep 2012

    Is the Use of Social Networking Sites Correlated with Internet Addiction? Facebook Use Among Taiwanese College Students

    The aim of this paper was to investigate the correlation between Facebook involvement and internet addiction. The authors sampled 577 university students in Taiwan and administered a survey of Facebook usage, Facebook Involvement Scale (FIS), and internet addiction scale. The FIS comprises three factors (salience, emotional support, and amusement). Results...

    Provided By World Academic Union

  • White Papers // Aug 2012

    M-ary Chaotic Sequence Based SLM-OFDM System for PAPR Reduction without Side-Information

    SeLected Mapping (SLM) is a PAPR reduction technique, which converts the OFDM signal into several independent signals by multiplication with the phase sequence set and transmits one of the signals with lowest PAPR. But it requires the index of the selected signal i.e. Side Information (SI) to be transmitted with...

    Provided By World Academic Union

  • White Papers // Oct 2012

    Effects of Mobile Phone Generated High Frequency Electromagnetic Field on the Viability and Biofilm Formation of Staphylococcus Aureus

    Staphylococcus aureus, one of the microflora in a human External Auditory Canal (EAC) is frequently exposed to High-Frequency ElectroMagnetic Field (HF-EMF) generated by mobile phones. It is normally non-pathogenic but in certain circumstances, it can cause infections. This study investigates the changes in the physiology of S. aureus when exposed...

    Provided By World Academic Union

  • White Papers // Oct 2012

    A Secure Mobile OTP Authentication Scheme for User Mobility Cloud VDI Environment

    Since Cloud environment has appeared as the most powerful keyword in the computing industry, the growth in VDI (Virtual Desktop Infrastructure) became remarkable in domestic market. In this paper, mobile OTP (One-Time Password) authentication method is proposed to secure mobile device portability through rapid and secure authentication using mobile devices...

    Provided By World Academic Union

  • White Papers // Oct 2012

    MIMO Performances in Tunnel Environment: Interpretation from the Channel Characteristics

    The objective of this paper is to study the performances in terms of bit error rate, of space-time code algorithms applied to MIMO communication in tunnels. Indeed, the channel characteristics in a tunnel are quite different than those of urban or indoor environment, due to the guiding effect of the...

    Provided By World Academic Union

  • White Papers // Oct 2012

    Using A Hybrid Algorithm to Improve the Quality of Services in Multicast Routing Problem

    A Hybrid Learning automata-Genetic Algorithm (HLGA) is proposed to solve QoS routing optimization problem of next generation networks. The algorithm complements the advantages of the Learning automato Algorithm (LA) and Genetic Algorithm (GA). It firstly uses the good global search capability of LA to generate initial population needed by GA...

    Provided By World Academic Union

  • White Papers // May 2012

    Towards Cloud Computing Anatomy

    Cloud Computing has recently emerged as a compelling paradigm for managing and delivering services over the internet. The rise of Cloud Computing is rapidly changing the landscape of information technology, and ultimately turning the long-held promise of utility computing into a reality. In this paper, the authors present the anatomy...

    Provided By World Academic Union

  • White Papers // Aug 2012

    Goal-Based Request Cloud Resource Broker in Medical Application

    In this paper, cloud resource broker using goal-based request in medical application is proposed. To handle recent huge production of digital images and data in medical informatics application, the cloud resource broker could be used by medical practitioner for proper process in discovering and selecting correct information and application. This...

    Provided By World Academic Union

  • White Papers // Jan 2012

    Topology Influence on TCP Congestion Control Performance in Multi-hop Ad Hoc Wireless

    Wireless Ad hoc nodes are freely and dynamically self-organize in communicating with others. Each node can act as host or router. However it actually depends on the capability of nodes in terms of its current power level, signal strength, number of hops, routing protocol, interference and others. In this research,...

    Provided By World Academic Union

  • White Papers // Dec 2012

    Adaptive Fuzzy Routing in Opportunistic Network (AFRON)

    Opportunistic network is a kind of Delay Tolerant Networks (DTN) where the nodes in this network come into contact with each other opportunistically and communicate wireless and, an end-to-end path between source and destination may have never existed, and disconnection and reconnection is common in the network. In such a...

    Provided By World Academic Union

  • White Papers // Dec 2012

    Controllable Electrical Power Plug Adapters Made As A ZigBee Wireless Sensor Network

    Using Internet communication, new home electronics have functions of monitoring and control from remote. However in many case these electronics work as standalone, and old electronics are not followed. Then, the authors developed the total remote system include not only new electronics but olds. This systems node is an adapter...

    Provided By World Academic Union

  • White Papers // Dec 2012

    Analyzing The Effect of Variable Round Time for Clustering Approach in Wireless Sensor Networks

    As wireless sensor networks are energy constraint networks so energy efficiency of sensor nodes is the main design issue. Clustering of nodes is an energy efficient approach. It prolongs the lifetime of wireless sensor networks by avoiding long distance communication. Clustering algorithms operate in rounds. Performance of clustering algorithm depends...

    Provided By World Academic Union

  • White Papers // Jun 2012

    Analysis of Student Motivation Behavior on e-Learning Based on Association rule mining

    This research aims to create a model for analysis of student motivation behavior on e-Learning based on association rule mining techniques in case of the Information Technology for Communication and Learning Course at Suan Sunandha Rajabhat University. The model was created under association rules, one of the data mining techniques...

    Provided By World Academic Union

  • White Papers // Jun 2012

    Designing a Framework for Network Security Protection

    As the Internet continues to grow at a rapid pace as the primary medium for communications and commerce and as telecommunication networks and systems continue to expand their global reach, digital information has become the most popular and important information resource and the people dependence upon the underlying cyber infrastructure...

    Provided By World Academic Union

  • White Papers // Jun 2012

    Improving the Quality of e-learning Courses in Higher Education through Student Satisfaction

    The purpose of the research is to characterize the levels of satisfaction of the students in e-learning post-graduate courses, taking into account specific dimensions of the course which were considered as benchmarks for the quality of this type of online learning initiative, as well as the levels of satisfaction towards...

    Provided By World Academic Union

  • White Papers // Oct 2012

    Modeling and Analysis for Effective Capacity of a Cross-Layer Optimized Wireless Networks

    New generation mobile communication networks have the ability of supporting triple play. In order that, Orthogonal Frequency Division Multiplexing (OFDM) access techniques have been chosen to enlarge the system ability for high data rates networks. Many of cross-layer modeling and optimization schemes for Quality of Service (QoS) and capacity of...

    Provided By World Academic Union

  • White Papers // Oct 2012

    Maximizing Sum-Rate for Multi-User Two-Way Relaying Networks with ANC Protocol

    In this paper the authors study the resource allocation problem for an OFDMA based cooperative Two-Way Relaying (TWR) network. They focus on Amplify and Forward (AF) Analog Network Coding (ANC) protocol. An optimization problem for two basic resources namely, sub-carrier and power is formulated for multi-user TWR networks. A joint...

    Provided By World Academic Union

  • White Papers // Oct 2012

    Hybrid Approach for Memory Analysis in Windows System

    Random Access Memory (RAM) is an important device in computer system. It can represent the snapshot on how the computer has been used by the user. With the growth of its importance, the computer memory has been an issue that has been discussed in digital forensics. A number of tools...

    Provided By World Academic Union

  • White Papers // Sep 2012

    Design and Implementation of a WiFi Based Home Automation System

    This paper presents a design and prototype implementation of new home automation system that uses Wi-Fi technology as a network infrastructure connecting its parts. The proposed system consists of two main components; the first part is the server (web server), which presents system core that manages, controls, and monitors users'...

    Provided By World Academic Union

  • White Papers // Aug 2012

    Hubs as Catalysts for Geospatial Communication in Kinship Networks

    Earlier studies in kinship networks have primarily focused on observing the social relationships existing between family relatives. In this paper, the authors pre-identified hubs in the network to investigate if they could play a catalyst role in the transfer of physical information. They conducted a case study of a ceremony...

    Provided By World Academic Union

  • White Papers // Aug 2012

    Evaluation of Efficient CSI Based Channel Feedback Techniques for Adaptive MIMO-OFDM Systems

    This paper explores the implementation of adaptive coding and modulation schemes for Multiple-Input Multiple-Output Orthogonal Frequency Division Multiplexing (MIMO-OFDM) feedback systems. Adaptive coding and modulation enables robust and spectrally-efficient transmission over time-varying channels. The basic premise is to estimate the channel at the receiver and feed this estimate back to...

    Provided By World Academic Union

  • White Papers // Mar 2012

    Local Algorithm for Establishing a Virtual Backbone in 3D Ad hoc Network

    Due to the limited lifetime of the nodes in Ad hoc and sensor networks, energy efficiency needs to be an important design consideration in any routing algorithm. It is known that by employing a virtual backbone in a wireless network, the efficiency of any routing scheme for the network can...

    Provided By World Academic Union

  • White Papers // Mar 2012

    Indoor Mapping by using Smartphone Device

    This paper presented the potential of smart phone to provide support on mapping the indoor asset. The advantage of using the smart phone to generate the indoor map is that it has the ability to capture, store and reproduces still or video images; indeed most of us do have this...

    Provided By World Academic Union

  • White Papers // Apr 2012

    The Possibility to Resolve the Security Problems Through the LTE in Vehicular Ad-Hoc Networks

    Vehicular Ad-hoc NETworks (VANET) can provide communications between vehicles or infrastructures. It provides the convenience of driving and the secure driving to reduce accidents. In VANET, the security is more important because it is closely related to accidents. Additionally, VANET raises a privacy issue because it can track the location...

    Provided By World Academic Union

  • White Papers // Dec 2011

    Location Based Clustering in Wireless Sensor Networks

    Due to the limited energy resources, energy efficient operation of sensor node is a key issue in wireless sensor networks. Clustering is an effective method to prolong the lifetime of energy constrained wireless sensor network. However, clustering in wireless sensor network faces several challenges such as selection of an optimal...

    Provided By World Academic Union

  • White Papers // Oct 2012

    3G WCDMA Mobile Network DoS Attack and Detection Technology

    Currently, there has been a 3G mobile networks data traffic explosion due to the large increase in the number of Smartphone users. Unlike a traditional wired infrastructure, 3G mobile networks have limited wireless resources and signaling procedures for complex wireless resource management. And mobile network security for various abnormal and...

    Provided By World Academic Union

  • White Papers // Oct 2012

    Assessment of Channel Unavailability Effect on the Wireless Networks Teletraffic Modeling and Analysis

    Whereas cellular wireless communication systems are subject to short- and long-term fading, the effect of wireless channel has largely been ignored in most of the teletraffic assessment researches. In this paper, a mathematical teletraffic model is proposed to estimate blocking and forced termination probabilities of cellular wireless networks as a...

    Provided By World Academic Union

  • White Papers // Oct 2012

    A Novel Feedback-Based Integrated FiWi Networks Architecture by Centralized Interlink-ONU Communication

    Integrated Fiber-Wireless (FiWi) access networks are a viable solution that can deliver the high profile quadruple play services. Passive Optical Networks (PON) networks integrated with wireless access networks provide ubiquitous characteristics for high bandwidth applications. Operation of PON improves by employing a variety of multiplexing techniques. One of it is...

    Provided By World Academic Union

  • White Papers // Apr 2014

    Ontologies for Complex Event Processing

    There is currently a lot of work on systems that can analyze the events, e.g., Complex Event Processing (CEP). In this paper, five ontologies are described, which include the event concepts. The paper provides an overview and comparison of existing event models. The main criteria for comparison are that there...

    Provided By World Academic Union

  • White Papers // Jun 2014

    Applying Spanning Tree Graph Theory for Automatic Database Normalization

    In knowledge and data engineering field, relational database is the best repository to store data in a real world. It has been using around the world more than eight decades. Normalization is the most important process for the analysis and design of relational databases. It aims at creating a set...

    Provided By World Academic Union

  • White Papers // Jul 2013

    Preliminary Overview of Data Mining Technology for Knowledge Management System in Institutions of Higher Learning

    Data mining has been integrated into application systems to enhance the quality of the decision-making process. This paper aims to focus on the integration of data mining technology and Knowledge Management System (KMS), due to the ability of data mining technology to create useful knowledge from large volumes of data....

    Provided By World Academic Union