Mobility
Mobile technologies, from wireless carriers, machine-to-machine connections and new devices, constantly affect corporate productivity. Use the latest vendor white papers to keep yourself ahead of the game.
-
A Fault-Tolerant Method for Enhancing Reliability of Services Composition Application in WSNs Based on BPEL
In recent years, some approaches have been presented for the seamless integration of WSNs with the existing, widely deployed SOA technologies such as XML, Web services, and the Business Process Execution Language (BPEL) to build a wireless sensor networks service application. However, there a great challenge on fault tolerant in...
Provided By University of Al-Jabal Al-Gharbi
-
Managing the BYOD Chaos
Enterprise computing, as we know it, is facing a dimensional shift with the widespread diffusion of the BYOD (Bring Your Own Device) phenomenon. BYOD is the latest trend where employees bring their personally-owned mobile devices, smartphones and tablets to their place of work, and use these devices to access files,...
Provided By SolarWinds
-
Meeting the mobile challenge with IBM System z
IBM Software for System z delivers the security, systems connectivity, and development capabilities to meet tough enterprise mobile requirements.
Mobile is huge. The use of mobile devices and apps is pervasive in our everyday lives - on average, mobile users check their devices 30 times per hour. And with...Provided By IBM
-
E-Guide: 4G LTE: transforming the mobile workforce
4G LTE technology has been around for less than four years and has already made a huge impact on mobile computing. Just imagine the innovations that will be possible in the next four years. This isn't just about making you more competitive, it's about opening new vistas and new opportunities....
Provided By Verizon
-
One hundred and One uses For Emergency Notification
When a disaster or crisis occurs, lack of communications and slow response team mobilization can make them far worse. Automated two-way communication enhances incident management by delivering disaster response, works over multiple mediums and can reach thousands or tens of thousands of people in minutes.
In this white paper,...Provided By Dell Software
-
What Enterprises Need To Know About Mobile
Mobile is exploding - in 2014 more users will connect to the Internet over mobile devices than desktop PCs. This HP infographic looks at what enterprises need to know to address top current and future mobile issues.
Provided By Hewlett-Packard (HP)
-
5 Mobile Application Considerations That You Can Conquer
There is a remarkable transformation in how people access systems and information. Mobile devices are rapidly overtaking computers as the primary information consumption means. In a recent report, The Economist has projected a growth in the number of mobile devices to reach 10 billion by 2020 and the shipment of...
Provided By Hewlett-Packard (HP)
-
Mobilizing The Business Of IT
Mobility has permeated every department in every organization. Yet, enterprise mobility has not entirely equated to enterprise IT mobility. Enabling mobility in the workplace is a top-of-mind goal for decision makers within every organization. This necessity is brought about by the consumerization of IT and the requirement to develop policies...
Provided By Hewlett-Packard (HP)
-
Network protection and UTM Buyers Guide
Using a UTM solution for your network protection used to be a compromise—while you gained in resource savings and ease of use, there was a payoff in terms of protection capabilities. This buyers guide looks at the factors you should consider when evaluating solutions to ensure you have the protection...
Provided By Sophos
-
Mobile Device Management Buyers Guide
Mobile device management (MDM) solutions allow IT organizations to centrally manage, monitor and support mobile devices from smartphones to tablets. By using an MDM solution to control and protect the data and configuration settings on users’ mobile devices, you can reduce support costs and security risks. In this guide, you'll...
Provided By Sophos
-
How to Secure Your Wireless Network
It isn’t hard to set up security for the wireless router in your basement: change the SSID, pick a strong password and perhaps install VPN software for remote access. But securing wireless networks in a business environment is much more demanding. Learn best practices that can help administrators go beyond...
Provided By Sophos
-
Top Ten Considerations for Deploying Lync on Smartphones and Tablets (Italian)
Microsoft Lync is not only changing the cost structure of enterprise telephony but it's also ushering in a new user experience in which every communication is transformed into a more collaborative and engaging interaction. It's impossible to achieve the promises of Lync if you haven't fully considered the underlying infrastructure....
Provided By Aruba Networks
-
Top Ten Considerations for Deploying Lync on Smartphones and Tablets (Spanish)
Microsoft Lync is not only changing the cost structure of enterprise telephony but it's also ushering in a new user experience in which every communication is transformed into a more collaborative and engaging interaction. It's impossible to achieve the promises of Lync if you haven't fully considered the underlying infrastructure....
Provided By Aruba Networks
-
Top Ten Considerations for Deploying Lync on Smartphones and Tablets (German)
Microsoft Lync is not only changing the cost structure of enterprise telephony but it's also ushering in a new user experience in which every communication is transformed into a more collaborative and engaging interaction. It’s impossible to achieve the promises of Lync if you haven’t fully considered the underlying infrastructure....
Provided By Aruba Networks
-
Top Ten Considerations for Deploying Lync on Smartphones and Tablets (French)
Microsoft Lync is not only changing the cost structure of enterprise telephony but it's also ushering in a new user experience in which every communication is transformed into a more collaborative and engaging interaction. It’s impossible to achieve the promises of Lync if you haven’t fully considered the underlying infrastructure....
Provided By Aruba Networks
-
What are the 5 BYOD requirements when it comes to Mobile UC?
The BYOD initiative has come a long - from a single platform to an explosion of highly-sophisticated smartphones and tablets. This shift has meant employees can choose their own smartphones. Download this whitepaper now to see how your organisation can benefit from these significant benefits below.
- Increased Productivity -...
Provided By ShoreTel
-
Frost & Sullivan White Paper: The Changing Role of Mobile Communications in the Workplace
As companies continue to support an increasingly virtual workforce, mobile communications are taking center stage. As companies start to make smart phones part of their technology roll-outs, they must find ways to keep costs in check while enabling access to enterprise applications and services. This paper will look at the...
Provided By ShoreTel
-
Cooperative Caching Framework for Mobile Cloud Computing
Due to the advancement in mobile devices and wireless networks mobile cloud computing, which combines mobile computing and cloud computing has gained momentum since 2009. The characteristics of mobile devices and wireless network makes the implementation of mobile cloud computing more complicated than for fixed clouds. This section lists some...
Provided By Global Journals
-
Enterprise Mobility Management embracing BYOD through secure app data delivery
The transformation of computing through mobility, consumerisation, bring your own device and flex-work offers powerful benefits for today's organisation- but it poses significant challenges for IT. These trends make it possible to increase business agility, individual productivity and job satisfaction by freeing people to choose the best time, place and...
Provided By Citrix Systems
-
Exploring Business Models for NFC Enabled Mobile Payment Services: The Case of Google Wallet and ISIS
Over the past few years, mobile payments have been present like a storm on the horizon. They have generated a lot of attention; yet have not reached wide adoption. Issues such as the complexity of the mobile payment ecosystem and the lack of sustainable business models have been accounted for...
Provided By Copenhagen Business School
-
Information Governance: The Key To Unlocking Dodd-Frank Regulations
This webinar offers solutions to the Dodd-Frank compliance issues and challenges that target the Financial Services Industry.
Provided By OpenText
-
Protecting Users & Data in the Mobile Enterprise
On Tuesday 4th of June, popular ZDNet contributor Phil Dobbie talked to:
Ed Metcalfe, Director of Product Marketing at McAfee & Perry Olson, Senior Director, Strategic Response and Global Activities at Intel.
They participated in a highly informative webinar that tackles the issues IT professionals need to know...Provided By Intel/McAfee
-
Business Model Development for a Mobile Context-aware Service
Mobile information services, preceded on tablet computers, Smartphone or other mobile devices, are a significant source of information for people now-a-days. By including context data, a new category of information services has been established. On the application side, a range of innovative services, providing the user with an added-value, could...
Provided By University of Lincoln
-
Alaskan Bank Virtualizes Branches for Productivity Benefits
Northrim is a commercial bank, headquartered in Anchorage, Alaska, committed to providing customer-first service. Business continuity and strong security are important competitive differentiators. Slow bandwidth delivery hampered employee productivity and affected customer service and different WAN configurations and server setups among branch offices create IT support challenges. They chose Cisco...
Provided By Cisco
-
20 Information Governance Questions and Answers in 40 Minutes
As a new means to managing information, Information Governance, is a hot topic right now. This webinar answers the top 20 questions that have been asked on the subject.
Provided By OpenText
-
On-demand Webcast - Application Performance Monitoring (APM) for Mobile Applications and Services
For many companies mobile applications are today a viable mean to generate customer revenue, loyalty and satisfaction. As the new business channel delivers business value, it means that companies should be able to proactively monitor, manage and improve the end user experience of these mobile application services. Join us to...
Provided By HP
-
Diversity Polynomials for the Analysis of Temporal Correlations in Wireless Networks
The interference in wireless networks is temporally correlated, since the node or user locations are correlated over time and the interfering transmitters are a subset of these nodes. For a wireless network where (potential) interferers form a Poisson point process and use ALOHA for channel access, the authors calculate the...
Provided By University of Northern Iowa
-
How to Securely Manage Mobile Apps: The App-Happy Enterprise
This playbook explores key aspects of the enterprise mobile revolution and provides a set of step-by-step directions on how to productively manage this new environment in a way that meets organizational imperatives while satisfying user needs.
INSIDE THIS PLAYBOOK:- Life in the App-Happy Mobile Enterprise
- Mobility Management Toolkit
Provided By SAP
-
eGuide: M2M: Changing the way we live and do business
Machine-to-machine communication (M2M) is all about protecting people, making services more responsive, business offerings more profitable, and ensuring that money, gasoline, and time can be conserved rather than wasted.
By leveraging a massive, secure wireless network, machines across disparate locations (from the middle of a city to a remote...Provided By Verizon
-
Joint Operator Pricing and Network Selection Game in Cognitive Radio Networks: Equilibrium, System Dynamics and Price of Anarchy
This paper addresses the joint pricing and network selection problem in cognitive radio networks. The problem is formulated as a Stackelberg game where first the primary and secondary operators set the network subscription price to maximize their revenue. Then, users perform the network selection process, deciding whether to pay more...
Provided By Institute of Electrical & Electronic Engineers
-
802.11ac Speeds & Feeds
The real-world performance of 802.11ac will differ based on access point configuration and mobile device type. Tune in to see how your 802.11ac mobile device will perform.
Provided By Aruba Networks
-
No More Sticky Clients
Now Aruba steps up to address the pervasive issue of "sticky clients." A sticky wireless client device is one that doesn't roam well from one AP to another. Watch how Aruba's 802.11ac rollout cleans up sticky clients.
Provided By Aruba Networks
-
Easy, cloud-based monitoring of network, server, and application performance.
Would you like an easier, more efficient way to make sure your network, servers, hypervisors, applications, and storage are performing the way they should? LogicMonitor is a cloud-based monitoring solution that lets you leverage a turnkey, redundant monitoring platform rather than pay your sysadmins to spend a lot of time...
Provided By LogicMonitor
-
Remote Data Replication: Combat Disasters And Optimize Business Operations
Offsite data replication is key to ensuring ongoing business operations, but it can be complex and costly, especially when performed over long distances. Join this discussion to discover how you can apply fast, cost effective and reliable remote replication that can:
- Meet Recovery Point Objectives (RPO) by reducing...
Provided By Silver Peak Systems, Inc.
-
The BlackBerry 10 Ready Program: Making the Transition Seamless
BlackBerry® has launched an enterprise-focused program to help make the transition to BlackBerry® 10 and BlackBerry® Enterprise Service 10 as seamless as possible. In this webcast, find out how to take advantage of these services, tools and offers – so your organization can make the most of BlackBerry 10 from...
Provided By BlackBerry
-
Straight From the Source: BlackBerry Panel Answers Your Top BlackBerry 10 Questions
There’s a lot to know about BlackBerry® 10. In this webcast, specialists from BlackBerry® answer the most common – and most important – questions BlackBerry customers are asking. From the big picture to the fine details, they’ll cover a wide range of burning issues.
Provided By BlackBerry
-
The BlackBerry Enterprise Vision and Roadmap
In this webcast, you’ll gain insight into where the mobile enterprise is heading and the vision and technology BlackBerry® has in place to get you there. Find out about innovative tools for Enterprise Mobility Management (EMM) including BlackBerry® Enterprise Service 10, and get all the details on the BlackBerry® software...
Provided By BlackBerry
-
A Lifecycle Approach To Delivering Mobile Applications
With the HP Mobile Application lifecycle, enterprise and service providers can develop IT strategy to prioritize their mobile opportunities, answer to the consumerization of the enterprise, and better serve their citizens and customers with new services.
Through the mobile application lifecycle, HP addresses all requirements of an enterprise with...Provided By Hewlett-Packard (HP)
-
Top 5 IT Benefits of the Next-Generation Workplace
The next-generation workplace is all about mobility. With more Internet-connected mobile devices than people in the world in 2013, IT must provide seamless connectivity to every class of user - employees, contractors, guests and even customers - appropriate to their role and type of device. It turns out, mobility in...
Provided By Aruba Networks
-
The Top 5 IT Benefits of the Next-Generation Workplace
The next-generation workplace is all about mobility. With more Internet-connected mobile devices than people in the world in 2013, it has become more apparent that IT must provide seamless connectivity to every class of user - employees, contractors, guests and even customers - appropriate to their role and type of...
Provided By Aruba Networks
- Meet Recovery Point Objectives (RPO) by reducing...
- Increased Productivity -...
-
GSM to LTE Migration
GSM has been a tremendously successful technology and has an unsurpassed installed base of infrastructure and subscribers. Leveraging GSM subscriber base, spectrum, coverage, and network infrastructure already in place will ensure that GSM operations continue to be profitable. GSM will remain for a considerable time serving many customers, supporting roamers,...
Provided By Motorola
-
Dual-Band Microstrip Patch Array Antenna Design for LTE and WLAN Application
In this paper, a dual-band microstrip patch array antenna is designed for both the MIMO 4G LTE and the WLAN systems. Design simulation and optimization processes are carried out with the aid of the Advanced Design System (ADS) electromagnetic simulator .The losses that are caused by both the substrate and...
Provided By International Journal of Communications and Engineering
-
Byte Error Correcting Code Using Cellular Automata
Cellular Automata (CA) has already established its novelty for bits and bytes Error Correcting Codes (ECC). The current work identifies weakness and limitation of existing CA-based byte ECC and proposes an improved CA-based double byte ECC which overcomes the identified. Weakness. The code is very much suited from VLSI design...
Provided By International Journal of Communications and Engineering
-
Bandwidth Enhancement in Multipatch Microstrip Antenna Array
Microstrip antennas are used in a wide range of applications, but due to its narrow impedance bandwidth restriction occurs. Microstrip patch antenna is very well known form of printed antenna. Microstrip patch antennas are getting popular in wireless application due to their low profile structure, simple geometry and low fabrication...
Provided By International Journal of Application or Innovation in Engineering & Management (IJAIEM)
-
Dynamic Power Management in Wireless Sensor Networks: State-of-the-Art
In the last few years, interest in wireless sensor networks has increased considerably. These networks can be useful for a large number of applications, including habitat monitoring, structural health monitoring, pipeline monitoring, transportation, precision agriculture, supply chain management, and many more. Typically, a wireless sensor network consists of a large...
Provided By Institute of Electrical & Electronic Engineers
-
MIMO Antenna Array Impact on Channel Capacity for a Realistic Macro-Cellular Urban Environment
In Multiple Input Multiple Output (MIMO) systems the antenna array configuration in the Base Station (BS) and Mobile Station (MS) has a large influence on the available channel capacity. In this paper, the authors first introduce a new Frequency Selective (FS) MIMO framework for macro-cells in a realistic urban environment....
Provided By Institute of Electrical & Electronic Engineers
-
Arising Issues In Wireless Sensor Networks: Current Proposals and Future Developments
Sensor Networks have been heralded as one of 21 most enabling technologies for 21st century by Business Week. In recent times wireless sensor networks have received significant attention from researchers due to its unlimited potential. However despite all this effort at providing improved services in these areas, issues still remain...
Provided By IOSR Journal of Engineering
-
Design and Simulation of Multiband Planar Inverted-F Antenna for Mobile Phone Applications
The proposed multiband planar inverted-F antenna has a very simple structure. The antenna has only one layer so it is easy to fabricate. The size of radiating patch of proposed antenna is 20mm? 25mm, while the size of ground plane is 39mm?39mm and height of antenna is 3mm. Mathematical tools...
Provided By Engg Journals Publications
-
Automatic Detection of Human and Energy Saving Based on Zigbee Communication
This paper proposes automatic detection of human and Energy saving room architecture to reduce standby power consumption and to make the room easily controllable with an IR remote control of a home appliance. To realize the proposed room architecture, the authors proposed and designed the Zigbee communication. Zigbee is a...
Provided By Engg Journals Publications
-
TCP Congestion Control Over HSDPA: An Experimental Evaluation
In this paper, the authors focus on the experimental evaluation of TCP over the High Speed Downlink Packet Access (HSDPA), an upgrade of UMTS that is getting worldwide deployment. Today, this is particularly important in view of the "Liberalization" brought in by the Linux OS which offers several variants of...
Provided By PoliTap
-
Protecting Users & Data in the Mobile Enterprise
On Tuesday 4th of June, popular ZDNet contributor Phil Dobbie talked to:
Ed Metcalfe, Director of Product Marketing at McAfee & Perry Olson, Senior Director, Strategic Response and Global Activities at Intel.
They participated in a highly informative webinar that tackles the issues IT professionals need to know...Provided By Intel/McAfee
-
Design: USB 1.1 SIE (Serial Interface Engine) Transmitter Using VHDL
USB has become a popular interface for exchanging data between PC's and peripherals. An increasing number of portable peripherals are using the USB interface to communicate with the PC. The design and implementation of a synthesizable model of the USB 1.1 protocol engine is presented in this report The PHY...
Provided By International Journal on Computer Science and Technology (IJCST)
-
PAPR Reduction Using Modified Selective Mapping Technique
Multi-carrier modulation is an attractive technique for fourth generation wireless communication. Orthogonal Frequency Division Multiplexing (OFDM) is multi-carrier transmission scheme. Its high Peak to Average Power Ratio (PAPR) of the transmitted signal is a major drawback. In this paper, the authors propose to reduce PAPR by probabilistic method Modified selective...
Provided By The International Journal of Advanced Networking and Applications
-
Study and Analysis of Fractal Linear Antenna Arrays
A fractal is a recursively generated object having a fractional dimension. They have no characteristic size, and are constructed of many copies of themselves at different scales. In this paper, the authors primarily focus on design of fractal linear array antenna for even number of elements and comparison of fractal...
Provided By IOSR Journal of Engineering
-
Authentication Schemes for Session Passwords Using Color and Images
Textual passwords are the most common method used for authentication. But textual passwords are vulnerable to eves dropping, dictionary attacks, social engineering and shoulder surfing. Graphical passwords are introduced as alternative techniques to textual passwords. Most of the graphical schemes are vulnerable to shoulder surfing. To address this problem, text...
Provided By Andhra University
-
Implementation of an Improved Secure System Detection for e-Passport by Using EPC RFID Tags
Current proposals for E-passport or ID-Card is similar to a regular passport with the addition of tiny contactless integrated circuit (computer chip) inserted in the back cover, which will act as a secure storage device of the same data visually displayed on the photo page of the passport. In addition,...
Provided By World Academy of Science, Engineering and Technology
-
Swarm Intelligence Based Service Discovery Architecture for Mobile Ad Hoc Networks
Service discovery in Mobile Ad-hoc NETworks (MANETs) is much more challenging, because of the reasons: frequent node mobility, nodes tend to have limited power supply and computational resources and clients join and leave networks more frequently. Hence it is necessary to develop a service discovery protocol such that it should...
Provided By EuroJournals
-
A Literature Review of Security Attack in Mobile Ad-Hoc Networks
Security is a major concern for protected communication between mobile nodes in a hostile environment. In hostile environments adversaries can bunch active and passive attacks against intercept able routing in embed in routing message and data packets. In this paper, the authors focus on fundamental security attacks in Mobile adhoc...
Provided By International Journal of Computer Applications
-
Mobile Browsing - Is Your Company at Risk?
This infographic gives a quick visual representation of some of the key findings of a recent Webroot research on web security in the US and UK. As cybercriminals increasingly exploit vulnerabilities in mobile browsers and apps, companies with mobile workforces face new challenges in protecting users and critical data. And...
Provided By Webroot Software
-
Your Company Data, Their Personal Device — What Could Go Wrong?
Employee use of smartphones and tablets to access corporate information and services is exploding. And that means IT organizations need to get beyond widely-held myths about improving their mobile security profile. Warning: Failure to do so is not an option.
Provided By Sophos
-
Reporting Biases And Survey Results: Evidence From European Professional Forecasters
Using data from the ECB's Survey of Professional Forecasters, the authors investigate the reporting practices of survey participants by comparing their point predictions and the mean/median/mode of their probability forecasts. They find that the individual point predictions, on average, tend to be biased towards favourable outcomes: They suggest too high...
Provided By European Central Bank
-
Optimal Monetary Policy And The Transmission Of Oil-Supply Shocks To The Euro Area Under Rational Expectations
This paper presents first the estimation of a two-country DSGE model for the euro area and the rest-of-the-world including relevant oil-price channels. The authors then investigate the optimal resolution of the policy tradeoffs emanating from oil-price disturbances. Their simulations show that the inflationary forces related to the use of oil...
Provided By European Central Bank
-
Is Forecasting With Large Models Informative? Assessing The Role Of Judgement In Macroeconomic Forecasts
The authors evaluate residual projection strategies in the context of a large-scale macro model of the euro area and smaller benchmark time-series models. The exercises attempt to measure the accuracy of model-based forecasts simulated both out-of-sample and in-sample. Both exercises incorporate alternative residual-projection methods, to assess the importance of unaccounted-for...
Provided By European Central Bank
-
Euros Influence Upon Trade: Rose Effect Versus Border Effect
This paper assesses the Euro's influence upon European trade by estimating two different indicators. The first is the so-called "Rose Effect", while the second is the "Border Effect". The former measures how much a country within a currency union trades more with its partners than with non-member countries, the latter...
Provided By European Central Bank
-
Stock Market Volatility And Learning
Introducing bounded rationality into a standard consumption based asset pricing model with a representative agent and time separable preferences strongly improves empirical performance. Learning causes momentum and mean reversion of returns and thereby excess volatility, persistence of price-dividend ratios, long-horizon return predictability and a risk premium, as in the habit...
Provided By European Central Bank
-
The Impact Of Reference Norms On Inflation Persistence When Wages Are Staggered
In this paper, the authors present an extension of the Taylor model with staggered wages in which wage-setting is also influenced by reference norms (i.e. by benchmark wages). They show that reference norms can considerably increase the persistence of inflation and the extent of real wage rigidity but that these...
Provided By European Central Bank
-
Optimal Sticky Prices Under Rational Inattention
This paper presents a model in which price setting firms decide what to pay attention to, subject to a constraint on information flow. When idiosyncratic conditions are more variable or more important than aggregate conditions, firms pay more attention to idiosyncratic conditions than to aggregate conditions. When the authors calibrate...
Provided By European Central Bank
-
Fair Allocation of Backhaul Resources in Multi-Cell MIMO Coordinated Beamforming
Coordinated beamforming in multipoint MIMO networks has been introduced to increase the overall capacity of wireless networks. In coordinated beamforming, the channel state information between the different MIMO access points/base stations in one hand, and the mobile stations on the other hand, needs to be shared among the MIMO nodes....
Provided By Cairo University
-
Distributed Flooding-Based Storage Algorithms for Large-Scale Sensor Networks
Wireless sensor networks consist of small devices (nodes) with limited CPU, bandwidth, and power. They can be deployed in isolated, tragedy, and obscured fields to monitor objects, detect fires, temperature, flood, and other disaster incidents. They can also be used in areas difficult to reach or where it is danger...
Provided By Cairo University
-
Proposed Relay Selection Scheme for Physical Layer Security in Cognitive Radio Networks
Cognitive Radio (CR) technology is one of the strong candidate technologies to solve the spectrum scarcity problems. In this paper, the authors tackle the problem of secure data transmission between a secondary user transmitter and receiver through a relay in the presence of an eavesdropper in a cognitive radio network....
Provided By Cairo University
-
A Mobile Health and Fitness Companion Demonstrator
Multimodal conversational spoken dialogues using physical and virtual agents provide a potential interface to motivate and support users in the domain of health and fitness. The paper presents a multimodal conversational Companion system focused on health and fitness, which has both a stationary and a mobile component. Spoken dialogue systems...
Provided By University of Tampere
-
Optical Wireless Communication and Recharging Mechanism of Wireless Sensor Network by Using CCRs
Broad spectrum of optical wireless communication is available, which can fulfill the requirements of high speed wireless communication. This is the basic advantage of optical wireless communication over conventional wireless communication technologies. The other important thing is the day by day decreasing size of wireless sensors with the advent of...
Provided By National University of Computer and Emerging Sciences
-
Weighted Clustering Using Comprehensive Learning Particle Swarm Optimization for Mobile Ad Hoc Networks
A mobile Ad-hoc network consists of dynamic nodes that can move freely. These nodes communicate with each other without a base station. In this paper, the authors propose a Comprehensive Learning Particle Swarm Optimization (CLPSO) based clustering algorithm for mobile ad hoc networks. It has the ability to find the...
Provided By National University of Computer and Emerging Sciences
-
Resource Allocation Strategies Based on the Signal- to-Leakage-Plus-Noise Ratio in LTE-A CoMP Systems
In this paper, the authors present two novel Resource Allocation (RA) strategies based on the Signal-to-Leakage-plus-Noise-Ratio (SLNR) for the DownLink (DL) of Coordinated Multi Point (CoMP) transmission in LTE-Advanced (LTE-A) system. The proposed RA strategies select the UEs that can efficiently share the same Resource Block (RB) without degrading the...
Provided By Cairo University
-
Experimenting With Fuzzy Logic for QoS Management in Mobile Ad Hoc Networks
This paper describes a semi-stateless approach based on a fuzzy logic system for wireless mobile ad hoc networks. The proposed model, called FuzzyMARS, assures service differentiation delivery with low delay transmission. FuzzyMARS integrates a set of mechanisms: a fuzzy logic system for best-effort traffic regulation, three schemes for real-time traffic...
Provided By University of Sherbrooke
-
Parallel Decentralized Network for the Detection of Unknown Signals Through Wireless Nakagami Fading Channels
In this paper analytical and simulation results for the decentralized detection of unknown signals are introduced. Parallel sensor network scheme is assumed. Additive White Gaussian Noise (AWGN) and Nakagami fading are assumed in both links, that is, from the source to the decentralized local sensors and from the sensors to...
Provided By Cairo University
-
Fuzzy-Based Adaptive Cross Layer Routing Protocol for Delay Sensitive Applications in MANET
In order for Mobile Ad hoc NETworks (MANET) to support service requirements of multimedia and real-time applications, the underlying routing protocol must provide Quality of Service (QoS) in terms of average End-To-End Delay (ETED). Towards this end, the authors investigate a number of conventional routing protocols, such as AODV (reactive...
Provided By Cairo University
-
Selection Criteria for Implementing Optimum WIMAX Frequency Spectrum
There is a wide range of working spectrum for implementation of Worldwide Interoperability for Microwave Access (WIMAX) and related broad band wireless technologies. This paper is about a work that was carried out by the authors in an attempt to identify technologically robust and economically viable solution for commercial implementation...
Provided By National University of Computer and Emerging Sciences
-
Formal Modeling of BeeAdHoc: A Bio-inspired Mobile Ad Hoc Network Routing Protocol
Design and development of routing protocols for Mobile Ad Hoc Networks (MANETs) is an active area of research. The standard practice among researchers working in this emerging domain is to evaluate the performance of their routing protocols in a network simulator. It is now a well known fact that the...
Provided By National University of Computer and Emerging Sciences
-
Kiara: An Open Source SIP System to Support Deaf Telephony
This paper describes Kiara, an open source SIP-based communication system that provides the building blocks to enable Deaf relay services. The paper has implemented a prototype that provides real-time text, voice and video to a variety of end user devices over a variety of networks. The work-in-progress concerns the addition...
Provided By University of the Western Cape