World Academic Union

Displaying 1-40 of 276 results

  • White Papers // Apr 2010

    A Group Key Agree Management Scheme for MANET

    Mobility of the nodes in mobile ad hoc network usually made huge change of network topology. This challenges the secure of the group communication quite a lot. Group key agree management model and security model for the MANET is presented in the paper. And group key agree management scheme was...

    Provided By World Academic Union

  • White Papers // Apr 2012

    The Possibility to Resolve the Security Problems Through the LTE in Vehicular Ad-Hoc Networks

    Vehicular Ad-hoc NETworks (VANET) can provide communications between vehicles or infrastructures. It provides the convenience of driving and the secure driving to reduce accidents. In VANET, the security is more important because it is closely related to accidents. Additionally, VANET raises a privacy issue because it can track the location...

    Provided By World Academic Union

  • White Papers // Jan 2012

    Topology Influence on TCP Congestion Control Performance in Multi-hop Ad Hoc Wireless

    Wireless Ad hoc nodes are freely and dynamically self-organize in communicating with others. Each node can act as host or router. However it actually depends on the capability of nodes in terms of its current power level, signal strength, number of hops, routing protocol, interference and others. In this research,...

    Provided By World Academic Union

  • White Papers // Dec 2012

    Adaptive Fuzzy Routing in Opportunistic Network (AFRON)

    Opportunistic network is a kind of Delay Tolerant Networks (DTN) where the nodes in this network come into contact with each other opportunistically and communicate wireless and, an end-to-end path between source and destination may have never existed, and disconnection and reconnection is common in the network. In such a...

    Provided By World Academic Union

  • White Papers // Dec 2012

    Controllable Electrical Power Plug Adapters Made As A ZigBee Wireless Sensor Network

    Using Internet communication, new home electronics have functions of monitoring and control from remote. However in many case these electronics work as standalone, and old electronics are not followed. Then, the authors developed the total remote system include not only new electronics but olds. This systems node is an adapter...

    Provided By World Academic Union

  • White Papers // Dec 2012

    Analyzing The Effect of Variable Round Time for Clustering Approach in Wireless Sensor Networks

    As wireless sensor networks are energy constraint networks so energy efficiency of sensor nodes is the main design issue. Clustering of nodes is an energy efficient approach. It prolongs the lifetime of wireless sensor networks by avoiding long distance communication. Clustering algorithms operate in rounds. Performance of clustering algorithm depends...

    Provided By World Academic Union

  • White Papers // Jun 2012

    Analysis of Student Motivation Behavior on e-Learning Based on Association rule mining

    This research aims to create a model for analysis of student motivation behavior on e-Learning based on association rule mining techniques in case of the Information Technology for Communication and Learning Course at Suan Sunandha Rajabhat University. The model was created under association rules, one of the data mining techniques...

    Provided By World Academic Union

  • White Papers // Jun 2012

    Designing a Framework for Network Security Protection

    As the Internet continues to grow at a rapid pace as the primary medium for communications and commerce and as telecommunication networks and systems continue to expand their global reach, digital information has become the most popular and important information resource and the people dependence upon the underlying cyber infrastructure...

    Provided By World Academic Union

  • White Papers // Jun 2012

    Improving the Quality of e-learning Courses in Higher Education through Student Satisfaction

    The purpose of the research is to characterize the levels of satisfaction of the students in e-learning post-graduate courses, taking into account specific dimensions of the course which were considered as benchmarks for the quality of this type of online learning initiative, as well as the levels of satisfaction towards...

    Provided By World Academic Union

  • White Papers // Oct 2012

    Modeling and Analysis for Effective Capacity of a Cross-Layer Optimized Wireless Networks

    New generation mobile communication networks have the ability of supporting triple play. In order that, Orthogonal Frequency Division Multiplexing (OFDM) access techniques have been chosen to enlarge the system ability for high data rates networks. Many of cross-layer modeling and optimization schemes for Quality of Service (QoS) and capacity of...

    Provided By World Academic Union

  • White Papers // Oct 2012

    Maximizing Sum-Rate for Multi-User Two-Way Relaying Networks with ANC Protocol

    In this paper the authors study the resource allocation problem for an OFDMA based cooperative Two-Way Relaying (TWR) network. They focus on Amplify and Forward (AF) Analog Network Coding (ANC) protocol. An optimization problem for two basic resources namely, sub-carrier and power is formulated for multi-user TWR networks. A joint...

    Provided By World Academic Union

  • White Papers // Oct 2012

    Hybrid Approach for Memory Analysis in Windows System

    Random Access Memory (RAM) is an important device in computer system. It can represent the snapshot on how the computer has been used by the user. With the growth of its importance, the computer memory has been an issue that has been discussed in digital forensics. A number of tools...

    Provided By World Academic Union

  • White Papers // Sep 2012

    Design and Implementation of a WiFi Based Home Automation System

    This paper presents a design and prototype implementation of new home automation system that uses Wi-Fi technology as a network infrastructure connecting its parts. The proposed system consists of two main components; the first part is the server (web server), which presents system core that manages, controls, and monitors users'...

    Provided By World Academic Union

  • White Papers // Aug 2012

    Hubs as Catalysts for Geospatial Communication in Kinship Networks

    Earlier studies in kinship networks have primarily focused on observing the social relationships existing between family relatives. In this paper, the authors pre-identified hubs in the network to investigate if they could play a catalyst role in the transfer of physical information. They conducted a case study of a ceremony...

    Provided By World Academic Union

  • White Papers // Aug 2012

    Evaluation of Efficient CSI Based Channel Feedback Techniques for Adaptive MIMO-OFDM Systems

    This paper explores the implementation of adaptive coding and modulation schemes for Multiple-Input Multiple-Output Orthogonal Frequency Division Multiplexing (MIMO-OFDM) feedback systems. Adaptive coding and modulation enables robust and spectrally-efficient transmission over time-varying channels. The basic premise is to estimate the channel at the receiver and feed this estimate back to...

    Provided By World Academic Union

  • White Papers // Mar 2012

    Local Algorithm for Establishing a Virtual Backbone in 3D Ad hoc Network

    Due to the limited lifetime of the nodes in Ad hoc and sensor networks, energy efficiency needs to be an important design consideration in any routing algorithm. It is known that by employing a virtual backbone in a wireless network, the efficiency of any routing scheme for the network can...

    Provided By World Academic Union

  • White Papers // Mar 2012

    Indoor Mapping by using Smartphone Device

    This paper presented the potential of smart phone to provide support on mapping the indoor asset. The advantage of using the smart phone to generate the indoor map is that it has the ability to capture, store and reproduces still or video images; indeed most of us do have this...

    Provided By World Academic Union

  • White Papers // Dec 2011

    A Study of the ERP Project Life Cycles in Small-and-Medium - Sized Enterprises: Critical Issues and Lessons Learned

    In this paper, the authors increase their knowledge as regards how Small-and-Medium-Sized Enterprises (SMEs) tackle ERP implementation projects to achieve successful adoption and use of these systems within the organization. SMEs have scare resources to handle these kinds of projects which have proved to be risky and costly. There are...

    Provided By World Academic Union

  • White Papers // Aug 2012

    The Relationship between Knowledge Management Strategy and Information Technology Strategy

    Recently, a great number of theoretical frameworks have been proposed to develop the linkages between Knowledge Management (KM) and organizational strategies. However, while there has been much theorizing and case study in the area, validated research models integrating KM and information technology strategies for empirical testing of these theories have...

    Provided By World Academic Union

  • White Papers // Jul 2013

    Accounting for SMEs - How Important is Size in Choosing between Global and Local Standards?

    There is limited evidence from various countries about the possible impact of various criteria to be used to determine the scope of the IFRS for SMEs issued in 2009 and, research is needed in this area. The authors provide evidence from Romania, an emerging economy member of the European Union....

    Provided By World Academic Union

  • White Papers // Jul 2013

    Role of Personnel Planning in Business Continuity Management

    Business Continuity Management (BCM) identifies potential external and internal threats to an organization and their impacts to business operations. The goal of the paper is to identify, based on the analysis of employee turnover in organizations in the Czech Republic, the role of personnel planning in BCM. The paper is...

    Provided By World Academic Union

  • White Papers // Mar 2012

    Green Computing: From Current to Future Trends

    During recent years, attention in 'Green Computing' has moved research into energy-saving techniques for home computers to enterprise systems' Client and Server machines. Saving energy or reduction of carbon footprints is one of the aspects of Green Computing. The research in the direction of Green Computing is more than just...

    Provided By World Academic Union

  • White Papers // Jan 2013

    Multimedia Multicast Authentication Using Digital Signature

    Multicast is an efficient method to deliver data from a source to a group of receivers. Digital signature provides authenticity, integrity and non-repudiation to many kinds of applications in everywhere computing environment. Existing digital signature schemes are computationally expensive; the ideal approach of signing and verifying each packet independently raises...

    Provided By World Academic Union

  • White Papers // Aug 2012

    Goal-Based Request Cloud Resource Broker in Medical Application

    In this paper, cloud resource broker using goal-based request in medical application is proposed. To handle recent huge production of digital images and data in medical informatics application, the cloud resource broker could be used by medical practitioner for proper process in discovering and selecting correct information and application. This...

    Provided By World Academic Union

  • White Papers // Jan 2012

    Factors of Effective Business Software Systems Development and Enhancement Projects Work Effort Estimation

    Majority of Business Software Systems (BSS) Development and Enhancement Projects (D&EP) fail to meet criteria of their effectiveness, what leads to the considerable financial losses. One of the fundamental reasons for such projects' exceptionally low success rate are improperly derived estimates for their costs and time. In the case of...

    Provided By World Academic Union

  • White Papers // Jan 2014

    Review and Comparison of Associative Classification Data Mining Approaches

    Associative Classification (AC) is a data mining approach that combines association rule and classification to build classification models (classifiers). AC has attracted a significant attention from several researchers mainly because it derives accurate classifiers that contain simple yet effective rules. In the last decade, a number of associative classification algorithms...

    Provided By World Academic Union

  • White Papers // Jun 2013

    Research on Hybrid Neural Network in Intrusion Detection System

    In this paper, the authors present an intrusion detection system of hybrid neural network model based on RBF and Elman. It is used for anomaly detection and misuse detection. This model has the memory function .It can detect discrete and related aggressive behavior effectively. RBF network is a real-time pattern...

    Provided By World Academic Union

  • White Papers // Mar 2013

    Identify Features and Parameters to Devise an Accurate Intrusion Detection System Using Artificial Neural Network

    In this paper, the authors explain how features of attacks could be extracted from the packets. It also explains how vectors could be built and then applied to the input of any analysis stage. For analyzing, the work deploys the Feedforward-Back propagation neural network to act as misuse intrusion detection...

    Provided By World Academic Union

  • White Papers // Apr 2013

    Key Issues and Challenges of Intrusion Detection and Prevention System: Developing Proactive Protection in Wireless Network Environment

    Now-a-days, wireless technology plays an important role in public and personal communication. However, the growth of wireless networking has confused the traditional boundaries between trusted and untrusted networks. Wireless networks are subject to a variety of threats and attacks at present. An attacker has the ability to listen to all...

    Provided By World Academic Union

  • White Papers // Dec 2013

    Scenarios of Societal Security and Business Continuity Cycles

    Societal security, continuity scenarios and methodological cycling approach explained in this paper. Namely societal security organizational challenges ask implementation of international standards BS 25999-2 & global ISO 22300 which is a family of standards for business continuity management system. Efficient global organization system is distinguished of high entity

    Provided By World Academic Union

  • White Papers // Dec 2013

    Flexible Communication Platform for Crisis Management

    In this paper the authors describe the creation of a flexible communication platform for crisis management order to prepare and train members at national level. Topics disaster and emergency management are highly debated among experts. Fast communication will help to deal with emergencies. Problem is with the network connection and...

    Provided By World Academic Union

  • White Papers // Dec 2013

    A Proposed Optimized and Efficient Intrusion Detection System for Wireless Sensor Network

    In recent years intrusions on computer network are the major security threat. Hence, it is important to impede such intrusions. The hindrance of such intrusions entirely relies on its detection, which is primary concern of any security tool like Intrusion Detection System (IDS). Therefore, it is imperative to accurately detect...

    Provided By World Academic Union

  • White Papers // Apr 2013

    Information Fusion for Identity Verification

    In this paper, the authors propose a novel approach for ascertaining human identity based on fusion of profile face and gait biometric cues The identification approach based on feature learning in PCA-LDA subspace, and classification using multivariate Bayesian classifiers allows significant improvement in recognition accuracy for low resolution surveillance video...

    Provided By World Academic Union

  • White Papers // Dec 2013

    Evaluating Performance of an Anomaly Detection Module with Artificial Neural Network Implementation

    Anomaly detection techniques have been focused on two main components: data extraction and selection and the second one are the analysis performed over the obtained data. This paper is to analyze the influence that each of these components has over the system performance by evaluating detection over network scenarios with...

    Provided By World Academic Union

  • White Papers // Dec 2013

    Runtime Monitoring Using Policy Based Approach to Control Information Flow for Mobile Apps

    Mobile applications are verified to check the correctness or evaluated to check the performance with respect to specific security properties such as availability, integrity and confidentiality. Where they are made available to the end users of the mobile application is achievable only to a limited degree using software engineering static...

    Provided By World Academic Union

  • White Papers // Dec 2013

    Centralized Peak Consumption Smoothing Revisited for Habitat Energy Scheduling

    Currently, electricity suppliers must predict the consumption of their customers in order to deduce the power they need to produce. It is then important in a first step to optimize household consumptions to obtain more constant curves by limiting peaks in energy consumption. Here centralized real time scheduling is proposed...

    Provided By World Academic Union

  • White Papers // Dec 2013

    Modified Montgomery for RSA Cryptosystem

    Encryption and decryption in RSA are done by modular exponentiation which is achieved by repeated modular multiplication. Hence efficiency of modular multiplication directly determines the efficiency of RSA cryptosystem. This paper designs a modified montgomery modular multiplication in which addition of operands is computed by 4:2 compressors. The basic logic...

    Provided By World Academic Union

  • White Papers // Dec 2013

    New Approach for Constructing a Secure Biometric Database

    The multimodal biometric identification is the combination of several biometric systems; the challenge of this combination is to reduce some limitations of systems based on a single modality while significantly improving performance. In this paper, the authors propose a new approach to the construction and the protection of a multimodal...

    Provided By World Academic Union

  • White Papers // Dec 2013

    A Study on Abnormal Behavior Detection in BYOD Environment

    Advancement of communication technologies and smart devices in the recent times is leading to changes into the integrated wired and wireless communication environments. Since early days, businesses had started introducing environments for mobile device application to their operations in order to improve productivity (efficiency) and the closed corporate environment gradually...

    Provided By World Academic Union

  • White Papers // Dec 2013

    Preliminary Evaluation of Passive UHF-Band RFID for Identifying Floating Objects on the Sea

    RFID system is used to identify objects such as passenger identification in public transportation, instead of linear or 2-dimensional barcodes. Key advantages of RFID system are to identify objects without physical contact, and to write arbitrary information into RFID tag. These advantages may help to improve maritime safety and efficiency...

    Provided By World Academic Union