World Academic Union

Displaying 1-40 of 276 results

  • White Papers // Dec 2014

    Packet Reserving and Clogging Control via Routing Aware Packet Reserving Framework in MANET

    In MANET, mobile nodes communicate with each other using the wireless channel where transmission takes place with significant interference. The wireless medium used in MANET is a shared resource used by all the nodes available in MANET. Packet reserving is one important resource management scheme which controls the allocation of...

    Provided By World Academic Union

  • White Papers // Dec 2014

    A New Approach to Predicting Physical Biometrics from Behavioural Biometrics

    A relationship between face and signature biometrics is established in this paper. A new approach is developed to predict faces from signatures by using artificial intelligence. A Multi-Layer Perceptron (MLP) neural network is used to generate face details from features extracted from signatures, here face is the physical biometric and...

    Provided By World Academic Union

  • White Papers // Nov 2014

    A Review: Comparative Study of Enhanced Hierarchical Clustering Protocols in WSN

    Recent advances in wireless networking technologies introduce several energy aware routing protocols in sensor networks. Such protocols aim to extend the lifetime of network by reducing the energy consumption of nodes. Many researchers are looking for certain challenges that are predominant in the grounds of energy consumption. One such protocol...

    Provided By World Academic Union

  • White Papers // Nov 2014

    Reference Management Software: Comparative Analysis of RefWorks and Zotero

    In this paper, the authors present a comparison of reference management software between RefWorks and Zotero. The results were drawn by comparing two software and the novelty of this paper is the comparative analysis of software and it has shown that ReftWorks can import more information from the Google Scholar...

    Provided By World Academic Union

  • White Papers // Nov 2014

    A Comparative Analysis of Zotero and Mendeley Reference Management Software

    Reference management software helps researchers to write research papers in a desired format and it reduces workload burden for writers in terms of edit and proofread the references and finally avoid errors. This paper presents a comparison of the reference management software between Zotero and Mendeley and the results were...

    Provided By World Academic Union

  • White Papers // Nov 2014

    Combined Automatic Speech Recognition and Machine Translation in Business Correspondence Domain for English-Croatian

    In this paper, the authors present combined Automatic Speech Recognition (ASR) of English and Machine Translation (MT) for English and Croatian and Croatian-English language pairs in the domain of business correspondence. The first part presents results of training the ASR commercial system on English data sets, enriched by error analysis....

    Provided By World Academic Union

  • White Papers // Nov 2014

    Tool for Fast Detection of Java Code Snippets

    In this paper, the authors present general results on the Java source code snippet detection problem. They propose the tool which uses graph and subgraph isomorphism detection. A number of solutions for all of these tasks have been proposed in the literature. However, although that all these solutions are really...

    Provided By World Academic Union

  • White Papers // Oct 2014

    A Comparative Study of Novel Opportunistic Routing Protocols in Mobile Ad Hoc Networks

    The Mobile Ad hoc NETwork (MANET) is a type of wireless ad hoc network. Opportunistic routing is used, where the network has the features like dynamic topology changes and intermittent network connectivity. In delay tolerant network or disruption tolerant network opportunistic forwarding technique is widely used. The key idea of...

    Provided By World Academic Union

  • White Papers // Oct 2014

    Survey to Assess the Feasibility of Executing the Web-Based Collaboration Process Using WBCS

    The importance of the formal specification in the software life cycle is barely concealing to anyone. Formal specifications use mathematical notation to describe the properties of information system precisely, without unduly constraining the way in how these properties are achieved. Having a correct and quality software specification is not easy...

    Provided By World Academic Union

  • White Papers // Oct 2014

    A Selective 3-Anchor DV-Hop Algorithm Based on the Nearest Anchor for Wireless Sensor Network

    Information of nodes' locations is an important criterion for lots of applications in Wireless Sensor Networks (WSNs). In the hop-based range-free localization methods, anchors transmit the localization messages counting a hop count value to the whole network. Each node receives this message and calculates its own distance with anchor in...

    Provided By World Academic Union

  • White Papers // Oct 2014

    A Study on User Authentication Method Using Haptic Actuator and Security Evaluation

    As currently various portable devices were launched, smart business conducted using them became common. Since smart business can use company-internal resources in an external remote place, user authentication that can identify authentic users is an important factor. Commonly used user authentication is a method of using user ID and password....

    Provided By World Academic Union

  • White Papers // Oct 2014

    An Investigation of Performance versus Security in Cognitive Radio Networks with Supporting Cloud Platforms

    The growth of wireless devices affects the availability of limited frequencies or spectrum bands as it has been known that spectrum bands are a natural resource that cannot be added. Meanwhile, the licensed frequencies are idle most of the time. Cognitive radio is one of the solutions to solve those...

    Provided By World Academic Union

  • White Papers // Oct 2014

    Identification of Spam Keywords Using Hierarchical Category in C2C E-commerce

    Consumer-To-Consumer (C2C) E-commerce has been growing at a very high speed in recent years. Since identical or nearly-same kinds of products compete one another by relying on keyword search in C2C E-commerce, some sellers describe their products with spam keywords that are popular but are not related to their products....

    Provided By World Academic Union

  • White Papers // Oct 2014

    A Fast and Robust Protocol for Reconstruction and Re-Enactment of Historical Sites

    In this paper, the authors propose a novel reconstruction protocol for restoring missing surfaces and low-quality edges and shapes in photos of artifacts at historical sites. The protocol starts with the extraction of a cloud of points. This extraction process is based on four subordinate algorithms, which differ in the...

    Provided By World Academic Union

  • White Papers // Oct 2014

    Wavelet Based Residual Method of Detecting GSM Signal Strength Fading

    In this paper, the authors have measured GSM signal strength in order to detect the type of the signal fading phenomenon using one-dimensional multilevel wavelet residual method and neural network clustering to determine the average GSM signal strength received in the study area. The wavelet residual method predicted that the...

    Provided By World Academic Union

  • White Papers // Oct 2014

    A Hybrid Nature Inspired Algorithm for Generating Optimal Query Plan

    The emergence of the semantic web technology increases day-by-day due to the rapid growth of multiple web pages. Many standard formats are available to store the semantic web data. The most popular format is the Resource Description Framework (RDF). Querying large RDF graphs becomes a tedious procedure with a vast...

    Provided By World Academic Union

  • White Papers // Oct 2014

    DWT Based Image Steganalysis

    'Steganalysis' is one of the challenging and attractive interests for the researchers with the development of information hiding techniques. It is the procedure to detect the hidden information from the stego created by known steganographic algorithm. In this paper, a novel feature based image steganalysis technique is proposed. Various statistical...

    Provided By World Academic Union

  • White Papers // Oct 2014

    Protecting the Privacy and Trust of VIP Users on Social Network Sites

    There is a real threat on the VIPs personal pages on the Social Network Sites (SNS). The real threats to these pages is violation of privacy and theft of identity through creating fake pages that exploit their names and pictures to attract the victims and spread of lies. In this...

    Provided By World Academic Union

  • White Papers // Oct 2014

    Investigation on Novel Based Metaheuristic Algorithms for Combinatorial Optimization Problems in Ad Hoc Networks

    Routing in MANET is extremely challenging because of MANETs dynamic features, its limited bandwidth, frequent topology changes caused by node mobility and power energy consumption. In order to efficiently transmit data to destinations, the applicable routing algorithms must be implemented in mobile ad-hoc networks. Thus the users can increase the...

    Provided By World Academic Union

  • White Papers // Oct 2014

    Temporally Coherent 3D Animation Reconstruction from RGB-D Video Data

    In this paper, the authors present a new method to reconstruct a temporally coherent 3D animation from single or multi-view RGB-D video data using unbiased feature point sampling. Given RGB-D video data, in form of a 3D point cloud sequence, their method first extracts feature points using both color and...

    Provided By World Academic Union

  • White Papers // Oct 2014

    Functional Decomposition Based Effort Estimation Model for Software-Intensive Systems

    An effort estimation model is needed for software intensive projects that consist of hardware, embedded software or some combination of the two, as well as high level software solutions. This paper first focuses on functional decomposition techniques to measure functional complexity of a computer system and investigates its impact on...

    Provided By World Academic Union

  • White Papers // Sep 2014

    A Novel Method for Live Debugging of Production Web Applications by Dynamic Resource Replacement

    In this paper, the authors propose a novel methodology for enabling debugging and tracing of production web applications without affecting its normal flow and functionality. This method of debugging enables developers and maintenance engineers to replace a set of existing resources such as images, server side scripts, cascading style sheets...

    Provided By World Academic Union

  • White Papers // Sep 2014

    Towards Security in Virtualization of SDN

    In this paper, the authors analyze the potential security issues brought by the virtualization of a Software Defined Networks (SDNs). The virtualization of SDN is achieved by FlowVisor (FV). With FV, a physical network is divided into multiple isolated logical networks while the underlying resources are still shared by different...

    Provided By World Academic Union

  • White Papers // Sep 2014

    The Journey of a Malicious HTTP Request

    SQL injection on web applications is a very popular kind of attack. There are mechanisms such as intrusion detection systems in order to detect this attack. These strategies often rely on techniques implemented at high layers of the application but do not consider the low level of system calls. The...

    Provided By World Academic Union

  • White Papers // Sep 2014

    Quantitative Analysis of PCA, ICA, LDA and SVM in Face Recognition

    Face recognition is a technique to automatically identify or verify individuals. It receives great attention in identification, authentication, security and many more applications. Diverse methods had been proposed for this purpose and also a lot of comparative studies were performed. However, researchers could not reach unified conclusion. In this paper,...

    Provided By World Academic Union

  • White Papers // Sep 2014

    Bin Bloom Filter Using Heuristic Optimization Techniques for Spam Detection

    Bloom filter is a probabilistic and memory efficient data structure designed to answer rapidly whether an element is present in a set. It tells that the element is definitely not in the set but its presence is with certain probability. The trade-off to use Bloom filter is a certain configurable...

    Provided By World Academic Union

  • White Papers // Sep 2014

    Robust Features for Impulsive Noisy Speech Recognition Using Relative Spectral Analysis

    The goal of speech parameterization is to extract the relevant information about what is being spoken from the audio signal. In speech recognition systems Mel-Frequency Cepstral Coefficients (MFCC) and RelAtive SpecTrAl Mel-Frequency Cepstral Coefficients (RASTA-MFCC) are the two main techniques used. It will be shown in this paper, that it...

    Provided By World Academic Union

  • White Papers // Sep 2014

    Nonlinear Adaptive PID Control for a Semi-Batch Reactor Based On an RBF Network

    Control of a semi-batch polymerization reactor using an adaptive Radial Basis Function (RBF) neural network method is investigated in this paper. A neural network inverse model is used to estimate the valve position of the reactor; this method can identify the controlled system with the RBF neural network identifier. The...

    Provided By World Academic Union

  • White Papers // Sep 2014

    Inadequate Requirements Engineering Process: A Key Factor for Poor Software Development in Developing Nations: A Case Study

    Developing reliable and sustainable software products is today a big challenge among up - coming software developers. The inability to develop a comprehensive problem statement needed to execute proper requirements engineering process is missing. The need to describe the 'What' of a system in one document, written in a natural...

    Provided By World Academic Union

  • White Papers // Sep 2014

    Significant Role Analysis of Transmission Control Protocols in 4G Cellular Systems

    The society of 3rd Generation Partnership Project (3GPP) is completed developing Long Term Evolution Advanced (LTE-Advanced) systems as a standard 4G cellular system. This generation goals to produce conditions for a new radio-access technology geared to higher data rates, low latency, and better spectral efficiency. LTE-Advanced is an evolutionary step...

    Provided By World Academic Union

  • White Papers // Sep 2014

    Transformation Method CIM to PIM: From Business Processes Models Defined in BPMN to Use Case and Class Models Defined in UML

    In this paper, the authors propose a method to automatic transformation of CIM level to PIM level respecting the MDA approach. Their proposal is based on creating a good CIM level through well-defined rules allowing as achieving rich models that contain relevant information to facilitate the task of the transformation...

    Provided By World Academic Union

  • White Papers // Sep 2014

    Performance Analysis of Cluster Based Dual Tired Network Model with INTK Security Scheme in a Wireless Sensor Network

    A dual tiered network model is designed to overcome the problem of energy alert and fault tolerance. This model minimizes the delay time and overcome failure of links. Performance analysis of the dual tiered network model is studied in this paper, where the CA and LS schemes are compared with...

    Provided By World Academic Union

  • White Papers // Sep 2014

    Heterogeneous Artifacts Construction for Software Evolution Control

    The software evolution control requires a deep understanding of the changes and their impact on different system heterogeneous artifacts. And an understanding of descriptive knowledge of the developed software artifacts is a prerequisite condition for the success of the evolutionary process. The implementation of an evolutionary process is to make...

    Provided By World Academic Union

  • White Papers // Sep 2014

    Geospatial Network Analysis Using Particle Swarm Optimization

    The Shortest Path (SP) problem concerns with finding the shortest path from a specific origin to a specified destination in a given network while minimizing the total cost associated with the path. This problem has widespread applications. Important applications of the SP problem include vehicle routing in transportation systems particularly...

    Provided By World Academic Union

  • White Papers // Sep 2014

    On Measuring the Reusability Proneness of Mobile Applications

    The abnormal increase in the number of applications available for download in Android markets is a good indication that they are being reused. However, little is known about their real reusability potential. A considerable amount of these applications is reported as having a poor quality or being malicious. Hence, in...

    Provided By World Academic Union

  • White Papers // Aug 2014

    Study of the Vertical Handoff in Heterogeneous Networks and Implement Based On Opnet

    In this paper, the authors studied more in detail the performances of the vertical handover in the networks WLAN, WiMAX, UMTS before studying of it the procedure of handoff vertical, the whole buckled by simulations putting forward the performances of the handover in the heterogeneous networks. The goal of Vertical...

    Provided By World Academic Union

  • White Papers // Aug 2014

    Augmentation Opportunity of Transmission Control Protocol Performance in Wireless Networks and Cellular Systems

    The advancement in wireless technology with the wide use of mobile devices have drawn the attention of the research and technological communities towards wireless environments, such as Wireless Local Area Networks (WLANs), Wireless Wide Area Networks (WWANs), and mobile systems and ad-hoc networks. Unfortunately, wired and wireless networks are expressively...

    Provided By World Academic Union

  • White Papers // Aug 2014

    Service-Based Application Adaptation Strategies: A Survey

    Service Oriented Architecture (SOA) allows modeling of dynamic interaction between incongruous providers, which enables governing the development of complex applications. However, implementation of SOA comes with some challenges, including its adaptability and robustness. Dynamism is inherent to the nature of service based applications and of their running environment. These factors...

    Provided By World Academic Union

  • White Papers // Aug 2014

    Cluster Based Ant Colony Routing Algorithm for Mobile Ad-Hoc Networks

    Mobile Ad hoc NETworks (MANETs) is a network formed of a wireless nodes which communicate with others nodes without any existing network infrastructure. Ant colony based routing algorithms are known to grantee the packet delivery, but they suffer from the huge overhead of control messages which are needed to discover...

    Provided By World Academic Union

  • White Papers // Aug 2014

    Further the Effectiveness of Software Testability Measure

    With the invasive application of information system in society, software begins to take an important role in everyday life. Software testability is proposed to address the problem of increasing cost of test and the quality of software. Testability measure provides a quantified way to denote the testability of software. Many...

    Provided By World Academic Union

  • White Papers // Jan 2012

    Factors of Effective Business Software Systems Development and Enhancement Projects Work Effort Estimation

    Majority of Business Software Systems (BSS) Development and Enhancement Projects (D&EP) fail to meet criteria of their effectiveness, what leads to the considerable financial losses. One of the fundamental reasons for such projects' exceptionally low success rate are improperly derived estimates for their costs and time. In the case of...

    Provided By World Academic Union

  • White Papers // Dec 2011

    Location Based Clustering in Wireless Sensor Networks

    Due to the limited energy resources, energy efficient operation of sensor node is a key issue in wireless sensor networks. Clustering is an effective method to prolong the lifetime of energy constrained wireless sensor network. However, clustering in wireless sensor network faces several challenges such as selection of an optimal...

    Provided By World Academic Union

  • White Papers // Oct 2012

    3G WCDMA Mobile Network DoS Attack and Detection Technology

    Currently, there has been a 3G mobile networks data traffic explosion due to the large increase in the number of Smartphone users. Unlike a traditional wired infrastructure, 3G mobile networks have limited wireless resources and signaling procedures for complex wireless resource management. And mobile network security for various abnormal and...

    Provided By World Academic Union

  • White Papers // Oct 2012

    Assessment of Channel Unavailability Effect on the Wireless Networks Teletraffic Modeling and Analysis

    Whereas cellular wireless communication systems are subject to short- and long-term fading, the effect of wireless channel has largely been ignored in most of the teletraffic assessment researches. In this paper, a mathematical teletraffic model is proposed to estimate blocking and forced termination probabilities of cellular wireless networks as a...

    Provided By World Academic Union

  • White Papers // Oct 2012

    A Novel Feedback-Based Integrated FiWi Networks Architecture by Centralized Interlink-ONU Communication

    Integrated Fiber-Wireless (FiWi) access networks are a viable solution that can deliver the high profile quadruple play services. Passive Optical Networks (PON) networks integrated with wireless access networks provide ubiquitous characteristics for high bandwidth applications. Operation of PON improves by employing a variety of multiplexing techniques. One of it is...

    Provided By World Academic Union

  • White Papers // Oct 2012

    Using A Hybrid Algorithm to Improve the Quality of Services in Multicast Routing Problem

    A Hybrid Learning automata-Genetic Algorithm (HLGA) is proposed to solve QoS routing optimization problem of next generation networks. The algorithm complements the advantages of the Learning automato Algorithm (LA) and Genetic Algorithm (GA). It firstly uses the good global search capability of LA to generate initial population needed by GA...

    Provided By World Academic Union

  • White Papers // May 2012

    Towards Cloud Computing Anatomy

    Cloud Computing has recently emerged as a compelling paradigm for managing and delivering services over the internet. The rise of Cloud Computing is rapidly changing the landscape of information technology, and ultimately turning the long-held promise of utility computing into a reality. In this paper, the authors present the anatomy...

    Provided By World Academic Union

  • White Papers // Sep 2012

    Is the Use of Social Networking Sites Correlated with Internet Addiction? Facebook Use Among Taiwanese College Students

    The aim of this paper was to investigate the correlation between Facebook involvement and internet addiction. The authors sampled 577 university students in Taiwan and administered a survey of Facebook usage, Facebook Involvement Scale (FIS), and internet addiction scale. The FIS comprises three factors (salience, emotional support, and amusement). Results...

    Provided By World Academic Union

  • White Papers // Aug 2012

    M-ary Chaotic Sequence Based SLM-OFDM System for PAPR Reduction without Side-Information

    SeLected Mapping (SLM) is a PAPR reduction technique, which converts the OFDM signal into several independent signals by multiplication with the phase sequence set and transmits one of the signals with lowest PAPR. But it requires the index of the selected signal i.e. Side Information (SI) to be transmitted with...

    Provided By World Academic Union

  • White Papers // Oct 2012

    Effects of Mobile Phone Generated High Frequency Electromagnetic Field on the Viability and Biofilm Formation of Staphylococcus Aureus

    Staphylococcus aureus, one of the microflora in a human External Auditory Canal (EAC) is frequently exposed to High-Frequency ElectroMagnetic Field (HF-EMF) generated by mobile phones. It is normally non-pathogenic but in certain circumstances, it can cause infections. This study investigates the changes in the physiology of S. aureus when exposed...

    Provided By World Academic Union

  • White Papers // Oct 2012

    A Secure Mobile OTP Authentication Scheme for User Mobility Cloud VDI Environment

    Since Cloud environment has appeared as the most powerful keyword in the computing industry, the growth in VDI (Virtual Desktop Infrastructure) became remarkable in domestic market. In this paper, mobile OTP (One-Time Password) authentication method is proposed to secure mobile device portability through rapid and secure authentication using mobile devices...

    Provided By World Academic Union

  • White Papers // Oct 2012

    MIMO Performances in Tunnel Environment: Interpretation from the Channel Characteristics

    The objective of this paper is to study the performances in terms of bit error rate, of space-time code algorithms applied to MIMO communication in tunnels. Indeed, the channel characteristics in a tunnel are quite different than those of urban or indoor environment, due to the guiding effect of the...

    Provided By World Academic Union

  • White Papers // Feb 2012

    3D Sensing and Mapping for a Tracked Mobile Robot with a Movable Laser Ranger Finder

    In this paper, the authors present a sensing system for 3D sensing and mapping by a tracked mobile robot with an arm-type sensor movable unit and a Laser Range Finder (LRF). The arm-type sensor movable unit is mounted on the robot and the LRF is installed at the end of...

    Provided By World Academic Union

  • White Papers // Apr 2012

    Heuristic Optimization Techniques for Network Reconfiguration in Distribution System

    Network reconfiguration is an import means for optimal operation of distribution network. It is an operation in configuration to alter the network structure of distribution feeders. Network reconfiguration is an operation to modify the network topology. The implementation of network reconfiguration has many advantages such as loss minimization, increasing system...

    Provided By World Academic Union

  • White Papers // Apr 2012

    A Performance Evaluation of Cellular Network Suitability for VANET

    Recently, Vehicular Ad-hoc NETworks (VANETs) for Intelligent Transport System (ITS) have become able safety and convenience services surpassing the simple services such as an electronic toll collection system. To provide the proper services, VANET needs infrastructure over the country infrastructure. Thus, the authors have to spend a huge sum of...

    Provided By World Academic Union

  • White Papers // Apr 2012

    Network Reconfiguration for Load Balancing in Distribution System with Distributed Generation and Capacitor Placement

    In this paper, the authors present an efficient algorithm for optimization of radial distribution systems by a network reconfiguration to balance feeder loads and eliminate overload conditions. The system load-balancing index is used to determine the loading conditions of the system and maximum system loading capacity. The index value has...

    Provided By World Academic Union

  • White Papers // Apr 2012

    Taxonomy of Structured P2P Overlay Networks Security Attacks

    The survey and classification of the different security attacks in structured Peer-To-Peer (P2P) overlay networks can be useful to computer system designers, programmers, administrators, and users. In this paper, the authors attempt to provide taxonomy of structured P2P overlay networks security attacks. They have specially focused on the way these...

    Provided By World Academic Union

  • White Papers // Apr 2012

    Enhancing the Connectedness in Ad-hoc Mesh Networks Using the Terranet Technology

    In this paper, the authors try to find the critical number of nodes which makes the network fully connected in a particular area, and then propose a method to enhance the intermediate node to accept to be a router to forward the data from the sender to the receiver. Much...

    Provided By World Academic Union

  • White Papers // Apr 2012

    The Possibility to Resolve the Security Problems Through the LTE in Vehicular Ad-Hoc Networks

    Vehicular Ad-hoc NETworks (VANET) can provide communications between vehicles or infrastructures. It provides the convenience of driving and the secure driving to reduce accidents. In VANET, the security is more important because it is closely related to accidents. Additionally, VANET raises a privacy issue because it can track the location...

    Provided By World Academic Union

  • White Papers // Apr 2010

    A Group Key Agree Management Scheme for MANET

    Mobility of the nodes in mobile ad hoc network usually made huge change of network topology. This challenges the secure of the group communication quite a lot. Group key agree management model and security model for the MANET is presented in the paper. And group key agree management scheme was...

    Provided By World Academic Union

  • White Papers // Aug 2012

    Goal-Based Request Cloud Resource Broker in Medical Application

    In this paper, cloud resource broker using goal-based request in medical application is proposed. To handle recent huge production of digital images and data in medical informatics application, the cloud resource broker could be used by medical practitioner for proper process in discovering and selecting correct information and application. This...

    Provided By World Academic Union

  • White Papers // Jan 2012

    Topology Influence on TCP Congestion Control Performance in Multi-hop Ad Hoc Wireless

    Wireless Ad hoc nodes are freely and dynamically self-organize in communicating with others. Each node can act as host or router. However it actually depends on the capability of nodes in terms of its current power level, signal strength, number of hops, routing protocol, interference and others. In this research,...

    Provided By World Academic Union

  • White Papers // Dec 2012

    Adaptive Fuzzy Routing in Opportunistic Network (AFRON)

    Opportunistic network is a kind of Delay Tolerant Networks (DTN) where the nodes in this network come into contact with each other opportunistically and communicate wireless and, an end-to-end path between source and destination may have never existed, and disconnection and reconnection is common in the network. In such a...

    Provided By World Academic Union

  • White Papers // Dec 2012

    Controllable Electrical Power Plug Adapters Made As A ZigBee Wireless Sensor Network

    Using Internet communication, new home electronics have functions of monitoring and control from remote. However in many case these electronics work as standalone, and old electronics are not followed. Then, the authors developed the total remote system include not only new electronics but olds. This systems node is an adapter...

    Provided By World Academic Union

  • White Papers // Dec 2012

    Analyzing The Effect of Variable Round Time for Clustering Approach in Wireless Sensor Networks

    As wireless sensor networks are energy constraint networks so energy efficiency of sensor nodes is the main design issue. Clustering of nodes is an energy efficient approach. It prolongs the lifetime of wireless sensor networks by avoiding long distance communication. Clustering algorithms operate in rounds. Performance of clustering algorithm depends...

    Provided By World Academic Union

  • White Papers // Jun 2012

    Analysis of Student Motivation Behavior on e-Learning Based on Association rule mining

    This research aims to create a model for analysis of student motivation behavior on e-Learning based on association rule mining techniques in case of the Information Technology for Communication and Learning Course at Suan Sunandha Rajabhat University. The model was created under association rules, one of the data mining techniques...

    Provided By World Academic Union

  • White Papers // Jun 2012

    Designing a Framework for Network Security Protection

    As the Internet continues to grow at a rapid pace as the primary medium for communications and commerce and as telecommunication networks and systems continue to expand their global reach, digital information has become the most popular and important information resource and the people dependence upon the underlying cyber infrastructure...

    Provided By World Academic Union

  • White Papers // Jun 2012

    Improving the Quality of e-learning Courses in Higher Education through Student Satisfaction

    The purpose of the research is to characterize the levels of satisfaction of the students in e-learning post-graduate courses, taking into account specific dimensions of the course which were considered as benchmarks for the quality of this type of online learning initiative, as well as the levels of satisfaction towards...

    Provided By World Academic Union

  • White Papers // Oct 2012

    Modeling and Analysis for Effective Capacity of a Cross-Layer Optimized Wireless Networks

    New generation mobile communication networks have the ability of supporting triple play. In order that, Orthogonal Frequency Division Multiplexing (OFDM) access techniques have been chosen to enlarge the system ability for high data rates networks. Many of cross-layer modeling and optimization schemes for Quality of Service (QoS) and capacity of...

    Provided By World Academic Union

  • White Papers // Oct 2012

    Maximizing Sum-Rate for Multi-User Two-Way Relaying Networks with ANC Protocol

    In this paper the authors study the resource allocation problem for an OFDMA based cooperative Two-Way Relaying (TWR) network. They focus on Amplify and Forward (AF) Analog Network Coding (ANC) protocol. An optimization problem for two basic resources namely, sub-carrier and power is formulated for multi-user TWR networks. A joint...

    Provided By World Academic Union

  • White Papers // Oct 2012

    Hybrid Approach for Memory Analysis in Windows System

    Random Access Memory (RAM) is an important device in computer system. It can represent the snapshot on how the computer has been used by the user. With the growth of its importance, the computer memory has been an issue that has been discussed in digital forensics. A number of tools...

    Provided By World Academic Union

  • White Papers // Sep 2012

    Design and Implementation of a WiFi Based Home Automation System

    This paper presents a design and prototype implementation of new home automation system that uses Wi-Fi technology as a network infrastructure connecting its parts. The proposed system consists of two main components; the first part is the server (web server), which presents system core that manages, controls, and monitors users'...

    Provided By World Academic Union

  • White Papers // Aug 2012

    Hubs as Catalysts for Geospatial Communication in Kinship Networks

    Earlier studies in kinship networks have primarily focused on observing the social relationships existing between family relatives. In this paper, the authors pre-identified hubs in the network to investigate if they could play a catalyst role in the transfer of physical information. They conducted a case study of a ceremony...

    Provided By World Academic Union

  • White Papers // Aug 2012

    Evaluation of Efficient CSI Based Channel Feedback Techniques for Adaptive MIMO-OFDM Systems

    This paper explores the implementation of adaptive coding and modulation schemes for Multiple-Input Multiple-Output Orthogonal Frequency Division Multiplexing (MIMO-OFDM) feedback systems. Adaptive coding and modulation enables robust and spectrally-efficient transmission over time-varying channels. The basic premise is to estimate the channel at the receiver and feed this estimate back to...

    Provided By World Academic Union

  • White Papers // Mar 2012

    Local Algorithm for Establishing a Virtual Backbone in 3D Ad hoc Network

    Due to the limited lifetime of the nodes in Ad hoc and sensor networks, energy efficiency needs to be an important design consideration in any routing algorithm. It is known that by employing a virtual backbone in a wireless network, the efficiency of any routing scheme for the network can...

    Provided By World Academic Union

  • White Papers // Mar 2012

    Indoor Mapping by using Smartphone Device

    This paper presented the potential of smart phone to provide support on mapping the indoor asset. The advantage of using the smart phone to generate the indoor map is that it has the ability to capture, store and reproduces still or video images; indeed most of us do have this...

    Provided By World Academic Union

  • White Papers // Apr 2014

    A Distributed Approach to Extract High Utility Itemsets from XML Data

    In this paper, the authors investigate a new data mining capability that entails mining of High Utility Itemsets (HUI) in a distributed environment. Existing research in data mining deals with only presence or absence of an items and do not consider the semantic measures like weight or cost of the...

    Provided By World Academic Union

  • White Papers // Jun 2014

    Applying Spanning Tree Graph Theory for Automatic Database Normalization

    In knowledge and data engineering field, relational database is the best repository to store data in a real world. It has been using around the world more than eight decades. Normalization is the most important process for the analysis and design of relational databases. It aims at creating a set...

    Provided By World Academic Union

  • White Papers // Apr 2014

    Ontologies for Complex Event Processing

    There is currently a lot of work on systems that can analyze the events, e.g., Complex Event Processing (CEP). In this paper, five ontologies are described, which include the event concepts. The paper provides an overview and comparison of existing event models. The main criteria for comparison are that there...

    Provided By World Academic Union

  • White Papers // Jun 2014

    Enhance Security in XML Databases: XLog File for Severity-Aware Trust-Based Access Control

    The topic of enhancing security in XML databases is important as it includes protecting sensitive data and providing a secure environment to users. In order to improve security and provide dynamic access control for XML databases, the authors presented XLog file to calculate user trust values by recording users' bad...

    Provided By World Academic Union