Mobility
Mobile technologies, from wireless carriers, machine-to-machine connections and new devices, constantly affect corporate productivity. Use the latest vendor white papers to keep yourself ahead of the game.
-
An Efficient Unicast Routing Protocol for AdHoc Wireless Sensor Networks
Ad hoc wireless sensor networks are dynamic in their topology, so the routing packets become difficult due to which the problems become more. One of the problems is route recovery. The route recovery algorithm is proposed for ad hoc wireless sensor networks. In this when a source need to find...
Provided By Creative Commons
-
Reduction of Greedy Forwarding Using Overlay Multicasting in Mobile Ad Hoc Networks
Mobile Ad-hoc NETwork (MANET) is a self configuring network composed of mobile nodes without any fixed infrastructure. Group communications are important in Mobile Ad hoc NETworks (MANET). Multicast is an efficient method for implementing group communications. But, it is big challenge to implement the well-organized and scalable multicast in MANET...
Provided By Creative Commons
-
Forward Error Correction Code for MIMO-OFDM System in AWGN and Rayleigh Fading Channel
Orthogonal Frequency Division Multiplexing (OFDM) is a popular method for high data rate wireless transmission. OFDM may be combined with antenna arrays at the transmitter and receiver to increase the diversity gain and/or to enhance the system capacity on time-variant and frequency-selective channels, resulting in a Multiple-Input Multiple-Output (MIMO) configuration....
Provided By Anna University
-
Effect of Physical Layer Limitations on the MAC Layer Capacity of Mobile WiMAX System, Analysis and Simulation
In this paper, the effect of physical layer limitations on the MAC layer capacity of mobile WiMAX system is analyzed mathematically. The downlink physical layer simulation results show the best burst profiles for a mobile WiMAX system working in a multipath fading channel under the Quality of Service (QoS) requirements...
Provided By University of Mostar
-
Various Hierarchical Routing Protocols in Wireless Sensor Network: A Survey
In a hierarchical architecture, higher energy nodes can be used to process and send the information while low energy nodes can be used to perform the sensing in the proximity of the target. This means that creation of clusters and assigning special tasks to cluster heads can greatly contribute to...
Provided By Creative Commons
-
Reducing the Peak to Average Power Ratio of MIMO-OFDM Systems
In this paper, the authors proposed a Particle Swarm Optimization (PSO) based Partial Transmit Sequence (PTS) technique in order to achieve the lowest Peak-to-Average Power Ratio(PAPR) in Multiple Input Multiple Output-Orthogonal Frequency Division Multiplexing (MIMO-OFDM) systems. their approach consist of applying the PSO based PTS on each antenna of the...
Provided By Southern Hills Church of Christ
-
Multipath Fading in Wireless Sensor Mote
In this paper, the authors study about the new technology as to transfer the data with the help of smart device, sensor mote. In this paper, they study about the multi path fading implications (to transfer the data) that can happen in smart device, smart dust. Smart dust is so...
Provided By International Journal of Scientific Research Engineering &Technology (IJSRET)
-
Adaptive Noise Reduction Techniques for VoIP Networks
Voice over IP (VoIP) has had a strong effect on global communications by allowing human voice and fax information to travel over existing packet data networks along with traditional data packets. The convergence of voice and data in the same network brings both benefits and constraints to users. Among the...
Provided By IRJCSEA
-
Transmission of Emergency Data Over Wireless Networks by Using Biosensors
The biggest challenge in heal theme is the assurance of healthcare for every individual. People suffer from major health problems and are not provided with appropriate monitoring due to inadequate infrastructure and lacking human resources. Therefore using bio-sensors, medical data can be collected and can be supervised. The main objective...
Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
-
A Confidentiality Scheme for Energy Efficient LEACH Protocol Using Homomorphic Encryption
Wireless Sensor Network (WSN) has been an active research area over the past few years. However, the salient limit is energy. Due to this limitation, it seems important to design a routing protocol for WSN so that sensing data can be transmitted to the receiver securely and efficiently and at...
Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
-
Emerging New Trends in Transmission of Real Time Application (VOIP) to NGN By RTP
A major consideration with the NGN is that it provides an equivalent voice service quality and resiliency as the current telephone network. The analysis carried out for this paper looked that without making any real time arrangement in data network in case of IP network will definitely detorate the Quality...
Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
-
A New Efficient and Reliable On-Demand Routing Protocol for MANET (ERORPM)
Mobile Ad-hoc NETworks (MANETs) belongs to a class of wireless network that is a spontaneous network can be formed dynamically and randomly without the need for infrastructural setups; therefore the mobile hosts communicate over multi-hop wireless links. In addition to the high degree of mobility, MANET nodes are distinguished by...
Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
-
Detection of Denial of Service attacks on Mobile Internet Protocol Nodes
DDoS (Distributed Denial of Service) attacks are the most common network attacks that had caused a serious economic loss so it is has to been stopped as early as possible to protect network damage. Earlier solutions for this problem are based on port-hopping between pairs of processors which are synchronous...
Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
-
Managing the Buffer Occupancy in Multi-Input-Multi-Output Network Systems using SAAP Approach
In Multi-Input Multi-Output service, design of distributed explicit control flow procedures are being considered recently because of the abundance in wired/wireless applications. Several multicasting approaches are proposed for achieving the proper flow control in MIMO systems. One of the approach is SPID (Distributed self-tuning proportional integrative plus derivate) and SPI...
Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
-
Location Monitoring System in Wireless Sensor Networks Using Aggregate Query Processor
Monitoring personal locations with a potentially untrusted server poses privacy threats to the monitored individuals. To this end, the authors propose a privacy-preserving location monitoring system for wireless sensor networks. In their system, they design two in-network location anonymization algorithms, namely, resource- and quality-aware algorithms that aim to enable the...
Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
-
Routing Protocols in Wireless Ad-hoc Networks: A Comparative Study
Ad-hoc wireless networks are characterized by multihop wireless connectivity, infrastructure less environment and frequently changing topology. As the wireless links are highly error prone and can go down frequently due to mobility of nodes, therefore, stable routing is a very critical task due to highly dynamic environment in ad-hoc wireless...
Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
-
A Secure Communication Mechanism for MHC Networks Using Payment Ratio
Multi-hop Cellular Networks (MCN) appear to be a promising combination of the dynamics of the Mobile Ad-hoc NETworks and the reliability of the infra-structured wireless networks. In MCN, the mobile nodes usually depend on other packets to improve network performance. However, there are some selfish users who are reluctant to...
Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
-
Analytical Model of Energy Consumption in Clustered Wireless Sensor Networks
In recent years, energy efficiency and data aggregation is a major concern in many applications of Wireless Sensor Networks (WSNs). WSNs, consists of a large number of sensor nodes. Each sensor node senses environmental phenomenon and sends the report to a sink node. Since the sensor nodes are powered by...
Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
-
A Secure Reputation-Based Clustering Algorithm for Cluster Based Energy Optimized Mobile Ad-Hoc Network
An economical approach for organizing large ad hoc networks is to divide the nodes into multiple clusters and designate for every cluster, a cluster head that is accountable for holding inter cluster control information. In Clustering, ad-hoc networks are divided into groups which are managed by elected nodes known as...
Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
-
Sustaining Proficient and Scalable Multicasting More Than Transportable Ad Hoc
Group communications are important in Mobile Ad-hoc NETworks (MANETs). Multicast is a resourceful method for implementing group infrastructure. However, it is testing to implement efficient and scalable multicast in MANET due to the complexity in group attachment management and multicast packet forwarding over a active topology. The authors propose a...
Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
-
An Efficient QOS Based Multimedia Content Distribution Mechanism in P2P Network
Peer-To-Peer network is one in which each node in the network can act as a client or server for the other nodes in the network. It allows shared access to various resources such as files, peripherals, and sensors without the need for a central server. Content distribution in the P2P...
Provided By International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
-
Battery Power Saving Profile with Learning Engine in Android Phones
Android is an open platform which is becoming very popular operating system. Its open source code is easily handled by the users to get and use new contents and applications on their handsets. Android is based on Linux kernel. Android device are being activated per day and power management of...
Provided By Lovely Professional University
-
Analysis of QOS Parameters of AAMRP and IODMRP Using SBPGP Security Model
MANET has gained popularity in various fields as in vehicles, data transmission and bulk data transmission to a large single set of nodes. To accomplish this task routing protocol employ an important role in MANET. Different types of routing protocols have been proposed for different task to be done. Most...
Provided By Lovely Professional University
-
Implementation and Analysis of Various PAPR Reduction Techniques Using MATLAB
Orthogonal Frequency Division Multiplexing is a new and emerging technology that provide users with high data rate. But every coin has two sides, pros and cons. So does OFDM. On the better side it provides users with high data rate but on the down side the authors have PAPR. The...
Provided By Lovely Professional University
-
Enhanced AODV for Mobile Ad-hoc Networks
A mobile ad-hoc network comprises of mobile nodes that can communicate with the nodes within their radio range and also with those which are outside range by using route discovery mechanisms. The nodes in an ad-hoc network can act as a host and also as a router that can route...
Provided By Lovely Professional University
-
Performance Evaluation of ATM Networks With Round Robin and Weighted Round Robin Algorithm
The Asynchronous Transfer Mode (ATM) Network is believed to be capable of supporting various services with drastically different traffic characteristics and Quality of Service (QoS) requirements. The deployment of integrated services with a broad range of burstiness characteristics and their integration through statistical multiplexing has focused a great deal of...
Provided By International Journal of Computer Science and Telecommunications
-
A Survey on Caching, Replication and Crowdsourcing in Mobile Environment
In this new era of technology, the mobile devices are available with various features. The main functionality of the mobile devices became effective information sharing i.e. information access on every finger touch, which makes the whole world small. The information sharing is done through various platforms like social networking, cloud...
Provided By International Journal of Computer Science and Telecommunications
-
A Comparative Study of Handoff Schemes in Vehicle to Infrastructure Using Mobile WiMAX
With the increase in user mobility, there is need for seamless handover when mobile applications and services are being used especially in the context of vehicular Ad-Hoc NETworks (VANET), in order to enhance the user experience thus affecting the quality of service. This paper looks at VANET with WiMAX with...
Provided By International Journal of Computer Science and Telecommunications
-
A Photovoltaic (Cell, Module, Array) Simulation and Monitoring Model Using MATLAB/GUI Interface
In this paper, the authors present the implementation of a generalized photovoltaic simulation model using MATLAB/GUI interface. The model is developed using basic circuit equations of the Photovoltaic (PV) cells including the effects of solar radiation and temperature changes. These effects added in real time operation simultaneously. Since the PV...
Provided By Fayoum University
-
Optimal Selective Feedback Policies for Opportunistic Beamforming
This paper studies the structure of downlink sum-rate maximizing selective decentralized feedback policies for opportunistic beamforming under finite feedback constraints on the average number of mobile users feeding back. First, it is shown that any sum-rate maximizing selective decentralized feedback policy must be a threshold feedback policy. This result holds...
Provided By Institute of Electrical & Electronic Engineers
-
Sub-Nyquist Radar Via Doppler Focusing
The authors investigate the problem of a monostatic pulse-Doppler radar transceiver trying to detect targets, sparsely populated in the radar's unambiguous time-frequency region. Several past works employ Compressed Sensing (CS) algorithms to this type of problem, but either do not address sample rate reduction, impose constraints on the radar transmitter,...
Provided By Institute of Electrical & Electronic Engineers
-
A 2.0 Gb/s Throughput Decoder for QC-LDPC Convolutional Codes
In this paper, the authors propose decoder architecture for Low Density Parity-Check Convolutional Code (LDPCCC). Specifically, the LDPCCC is derived from a Quasi-Cyclic (QC) LDPC block code. By making use of the quasi-cyclic structure, the proposed LDPCCC decoder adopts dynamic message storage in the memory and uses a simple address...
Provided By Institute of Electrical & Electronic Engineers
-
A Solution for Network Life Time Problem Using Content Based Energy Efficient Routing Algorithm
In this paper, the authors consider an overarching problem that encompasses both performance metrics. In particular, they study the network capacity problem under a given network lifetime requirement. Specifically, for a wireless sensor network where each node is provisioned with an initial energy, if all nodes are required to live...
Provided By Engg Journals Publications
-
An Efficient QoS Mechanism for Multicast Routing With ODMRP in Wireless Adhoc Networks
The wireless usage has increased rapidly and there is a huge shift in users' expectations. Ad hoc networks can provide better features if there is a proper QoS multicasting strategy developed. The On Demand Multicast Routing Protocol (ODMRP) is a group communication protocol with low control overhead. There are many...
Provided By Engg Journals Publications
-
SMTCI: Secure Multi-Trial Trust Evaluation and Cost-Effective Incentive Mechanism for Multi-Hop Cellular Networks
In multi-hop cellular networks, finding an optimum and trusted route in the network through intermediate node is a major issue. At MCN, or the next-generation wireless networks, can significantly improve network performance and deployment and help implement many novel applications and services. However, when compared to wired and single-hop wireless...
Provided By Engg Journals Publications
-
PAPR Reduction in OFDM Using Partial Transmit Sequence (PTS)
In recent years, OFDM has gained a lot of interest in diverse-digital communication applications. This has been due to its favorable properties like high spectral efficiency and robustness to channel fading. Some of the major drawbacks in OFDM are its high Peak-to-Average-Power Ratio (PAPR) of the transmitted signals and the...
Provided By Engg Journals Publications
-
Deploying a Single or a Double Cluster Head Particle Swarm Optimization Technique Based on WSN Scenarios
Designing a WSN involves taking into account two most important design criterions. One is achieving the energy optimization and other is enhancing the network longevity. Particle Swarm Optimization (PSO) technique is an efficient protocol which is capable of achieving these deign goals. Now PSO algorithm can be designed either having...
Provided By Engg Journals Publications
-
A Power Efficient NOC Router Design
In this paper, the authors present the NOC router architecture with five port support which utilizes dual crossbar arrangement, the latency which arises due to the dual cross bar architecture is reduced by using predominant routing algorithm. This arrangement is more efficient and reduces about 10 % of device utilization...
Provided By Engg Journals Publications
-
Modified Low Energy Adaptive Clustering Hierarchy for Heterogeneous Wireless Sensor Network
In wireless sensor network, it is an important task to collect the data periodically from various sensors node for monitoring and recording the physical conditions of the environment. The sensed data must be transmitted and received between the nodes in the network. The Low Energy Adaptive Clustering Hierarchy (LEACH) is...
Provided By Engg Journals Publications
-
Performance Enhanced Router Design for Network on Chip
Network on chip is a new paradigm for on chip design that is able to sustain the communication provisions for the SoC with the desired performance. NOC applies networking methodology concepts to system on chip data transfer and it gives noticeable elevation over conventional bus based communication. NOC router is...
Provided By Engg Journals Publications
-
Haptic Interaction in Virtual Reality Environments Through Android-Based Handheld Terminals
The integration of intuitive haptic interaction for navigating within virtual spaces may suppose a key factor for spreading 3Drelated technologies in Ambient Assisted Living environments. This paper presents a case study that makes use of an Android-based portable terminal for evaluating low cost solutions for everyday life applications derived from...
Provided By University of Salzburg
-
Employment Effects Of Acquisitions: Evidence From Acquired European Firms
This paper examines the employment effects of acquisitions for acquired European firms taking non-random selection of acquisition targets explicitly into account. Following the empirical firm growth literature and theories put forward in the Mergers and Acquisition (M&A) literature the authors control for convergence dynamics in firm size and distinguish between...
Provided By University of Salzburg
-
CSL: A Language to Specify and Re-Specify Mobile Sensor Network Behaviors
The Collaborative Sensing Language (CSL) is a high-level feedback control language for Mobile Sensor Networks (MSN). It specifies MSN controllers to accomplish network objectives with a dynamically changing ad-hoc resource pool. Furthermore, CSL is designed to allow the updating of controllers during execution (patching). This enables hierarchical control with simpler...
Provided By University of Salzburg
-
Cyber-Physical Cloud Computing: The Binding and Migration Problem
The authors take the paradigm of cloud computing developed in the cyber-world and put it into the physical world to create a cyber-physical computing cloud. A server in this cloud moves in space making it a vehicle with physical constraints. Such vehicles also have sensors and actuators elevating mobile sensor...
Provided By University of Salzburg
-
Advances in Adaptive Secure Message-Oriented Middleware for Distributed Business-Critical Systems
Distributed business-critical systems are often implemented using distributed messaging infrastructures with increasingly stringent requirements with regard to resilience, security, adaptability, intelligence and scalability. Current systems have limited ability in meeting these requirements. This paper describes advances in adaptive security, security metrics, anomaly detection and resilience, and authentication architecture in such...
Provided By Queen Mary, University of London
-
Cooperative Control of WCDMA System Under Geographically Congested Situations
This paper extends recent developments in geographic load balancing techniques for cellular mobile communication systems using the Bubble Oscillation Algorithm (BOA), by investigating the potential in situations where non uniform topography is modelled, the different types of traffic anticipated in the more mature 3G systems are modelled. Enhancement of system...
Provided By Queen Mary, University of London
-
Call Admission Control Under QoS Constraints Using NeuroEvolution of Topologies
In this paper, the authors solve the Call Admission Control (CAC) problem in a cellular network via a form of NeuroEvolution algorithm. The results are compared with Complete Sharing scheme, which allows all types of traffic to access all available channels at all time, and show that their proposed CAC...
Provided By Queen Mary, University of London
-
A Simulation Study of the PLC-MAC Performance Using Network Simulator-2
Power Line Communication (PLC) technology can be a viable solution for the future ubiquitous networks because it provides a cheaper alternative to other wired technology currently being used for communication. However, for the better performance of PLC-based networks, their physical layer and Medium Access Control (MAC) protocols need to be...
Provided By Ajou University
-
Label-Switched Routing Protocol With Local Multi-Paths for Reliable Message Delivery in Ubiquitous Tactical MANET Environments
Multipath routing protocols provide several alternative paths between source and destination nodes to achieve seamless and reliable communications in MANET (Mobile Ad-hoc NETwork) environments. Since nodes in tactical MANET environments are frequently moving, however, the possibility that alternative paths as well as the primary route are broken is much higher...
Provided By Ajou University
-
Available-Bandwidth Estimation Considering Transmission Overheads in IEEE 802.11 Wireless LANs
Calculation of the bandwidth available on a given channel is critical for the provision of bandwidth constrained services in IEEE 802.11 wireless LAN environments. Although there are numerous studies on available-bandwidth estimation based on active probing packets, mathematical models, and passive measurements, accuracy is still an issue. In this paper,...
Provided By Ajou University
-
Design of Baseband Analog Chain With Optimum Allocation of Gain and Filter Rejection for WLAN Applications
This paper describes a BaseBand Analog (BBA) chain for Wireless Local Area Network (WLAN) applications. For the given specifications of the receiver BBA chain, the optimum allocation of the gain and filter rejection of each block in a BBA chain is achieved to maximize the SFDR. The fully integrated BBA...
Provided By Ajou University
-
An Approach to Mitigating Sybil Attack in Wireless Networks Using ZigBee
Various sensors employing ZigBee protocol send environment information to a home gateway. The home gateway manages every devices, sensors and services according to the information. However, if an attacker fabricates the information with malevolent purpose, the system may perform any inadvertent service, which may be harmful to users. Sybil attack...
Provided By Ajou University
-
An Efficient Multicasting for Multi-Channel Multi-Interface Wireless Mesh Networks
Multicasting can be an effective routing service in Wireless Mesh Networks (WMNs), which have gained significant acceptance in recent years due to its potentials of providing a low-cost wireless backhaul service to mobile clients. Many applications in WMNs require efficient and reliable multicast communication, i.e., with high delivery ratio but...
Provided By Ajou University
-
Downstream Backhaul Packet Control for Mobile Wireless Networks
A backhaul network in mobile wireless systems consists of lower-level Base Stations (BSs) and upper-level Access Routers (ARs). While the legacy model considers only a queue at a BS for downstream traffic, the authors focus on queues at both the BS and the AR, hence calling it the split two-level...
Provided By Ajou University
-
FFRDV: Fastest-Ferry Routing in DTN-Enabled Vehicular Ad Hoc Networks
Non-real-time communication is the markedness of Vehicular Ad hoc NETworks (VANETs) because of the rapidly changing topology. A Delay/Disruption Tolerant Network (DTN) is defined as a dynamic network where the contacts among participants of the network are intermittent or link performances are highly unsteady. In such a periodic and disrupted...
Provided By Ajou University
-
Optimal Staffing Level of Network Operations and Management Centers
In this paper, the authors try to monitor and optimize the productivity of network operations and management centers in a big telecommunication company. To achieve this goal, they apply linear programming and simulation techniques and propose system architecture. Linear programming and simulation are most frequently used techniques in management science...
Provided By Ajou University
-
An Adaptive MAC Scheduling Algorithm for Guaranteed QoS in IEEE 802.11e HCC
The IEEE 802.11e standard guarantees QoS in the MAC layer by using new HCF (Hybrid Coordination Function) protocol. The HCF is composed of two access functions: a distributed contention-based channel access function (EDCA) providing prioritized QoS and a centralized polling-based channel access function (HCCA) providing parameterized QoS. In this paper,...
Provided By Ajou University
-
Business Process Management of Telecommunication Companies: Fulfillment and Operations Support and Readiness Cases
In this paper, the authors consider business process management for a certain business process of telecom companies. Generally, business process management is the management of flow of business activities in an effective and efficient way. If companies have effective and efficient business management process, that is a strong weapon for...
Provided By Ajou University
-
A Novel Approach to Detect Network Attacks Using G-HMM-Based Temporal Relations Between Internet Protocol Packets
This paper introduces novel attack detection approaches on mobile and wireless device security and network which consider temporal relations between internet packets. In this paper, the authors first present a field selection technique using a Genetic Algorithm and generate a Packet-based Mining Association Rule from an original Mining Association Rule...
Provided By Ajou University
-
Intercell Radio Resource Management Through Network Coordination for IMT-Advanced Systems
In IMT-Advanced systems, a cross-layer approach coupling network coordination and radio resource managements enables mitigation of intercell interference and throughput improvement of cell-edge users. To facilitate coordination among base stations, the authors propose a new radio-resource management framework where cell-edge users and cell-interior users are separately managed by two different...
Provided By Ajou University
-
Congestion-Aware Multi-Gateway Routing for Wireless Mesh Video Surveillance Networks
In video surveillance and monitoring systems based on wireless mesh networks, large volumes of multimedia data with different priorities and time demands are generated by video cameras and wireless sensors. Hence, one of the key issues is how to alleviate network congestion for highly reliable transfer of multimedia data towards...
Provided By Ajou University
-
Outsource Operations - Not Responsibility: An Outsourcing Service Model
Outsourcing in the telecom sector has raised one specific interesting regulatory issue that actually has relevance for any organization that is outsourcing. Licenses governing spectrum allocation in the mobile space usually stipulate that mobile operators must retain "Functional control" of their network. The telecom sector is highly regulated; network operators...
Provided By Sourcingmag.com
-
Wi-MuMe: WiMAX MuLTIHOP MeSH - A Relay Based Approach to Deliver Broadband to Rural Communities
Multi-hop relay based WiMAX is one of the proposed solutions to address the problem of capacity and coverage expansion in the developing and under-developed regions of the world. Compared with the Point to Multi-Point (PMP) based communication; the mesh mode of WiMAX can provide better coverage, bandwidth, flexibility and scalability....
Provided By Indian Institute of Information Technology Bangalore
-
A Survey on Wireless Sensor Networks Security
Wireless Sensor Networks (WSNs) are a most challenging and emerging technology for the research due to their vital scope in the field coupled with their low processing power and associated low energy. Today wireless sensor networks are broadly used in environmental control, surveillance tasks, monitoring, tracking and controlling etc. On...
Provided By Indian Institute of Information Technology Bangalore
-
A Multifactor Secure Authentication System for Wireless Payment
Organizations are deploying wireless based online payment applications to expand their business globally, it increases the growing need of regulatory requirements for the protection of confidential data, and especially in internet based financial areas. Existing internet based authentication systems often use either the Web or the Mobile channel individually to...
Provided By Indian Institute of Information Technology Bangalore
-
A General Inter-AP Handoff Model for the Express Mobile Gateway
This paper is to study how to realize the seamless inter-AP handoff for the express mobile gateway on the train, which not only must execute the handoff rapidly, but also have to make the handoff decision quickly. Hence, the special and general inter-AP handoff concepts presented firstly and then a...
Provided By Fujian University of Technology
-
Incorporating Potential Energy Filed Into Efficient Routing in Wireless Microsensor Networks
Wireless sensor lifespan is one of the most important performance indexes for wireless microsensor networks. Since the radio transmission consumes a lot of energy and working load for sensors are usually non-equalizing, therefore, how to equilibrate working load for sensors can effectively save energy to prolong the sensor and network...
Provided By Fujian University of Technology
-
Mobile Phones and Economic Development in Africa
The authors examine the growth of mobile phone technology over the past decade and consider its potential impacts upon quality of life in low-income countries, with a particular focus on sub-Saharan Africa. They first provide an overview of the patterns and determinants of mobile phone coverage in sub-Saharan Africa before...
Provided By Center for Global Development
-
Extending the UbiMDR Supporting Situation-Aware Access Control
Ubiquitous computing environment requirement needs information sharing of sensors based on sensor network technology, situation-aware and determination functions and other related technologies ranging to appropriate and effective action processing. The sensor field independent information access is most important issues everywhere under the ubiquitous computing environment. The authors already proposed UbiMDR...
Provided By Kunsan National University
-
An Evolutionary Time Spread Multiple Access Protocol for Ad Hoc Networks
In this paper, the authors propose an Evolutionary Time Spread Multiple Access (E-TSMA) protocol which is independent of topology changes for ad hoc networks. Their proposed protocol is based on protocol threading technique and a novel contention schedule with reservation and carrier sense. According to the topology density of the...
Provided By National University of Defense Technology
-
Novel Symbol-Wise ML Decodable STBC for IEEE 802.16e/m Standard
This paper is novel real symbol-wise ML decodable STBCs with balanced information distribution per codeword are constructed systemically for arbitrary number of transmit antennas. Compared with the existing real symbol-wise ML decodable STBCs in IEEE 802.16e standard, the proposed STBCs also have lower Peak-to-Average Power Ratio (PAPR) and better performance...
Provided By National University of Defense Technology
-
Design and Implementation of Hybrid Broadcast Authentication Protocols in Wireless Sensor Networks
A Wireless Sensor Network (WSN) is a wireless network consisting of spatially distributed resource constrained sensor nodes which can cooperatively monitor physical or environmental conditions. The wide applications of WSN and the challenges in them have attracted many researchers to develop protocols and algorithms. Broadcasts are important network functions in...
Provided By National University of Defense Technology
-
Jammer Localization for Wireless Sensor Networks
Jamming attack can severely affect the performance of Wireless Sensor Networks (WSNs) due to the broadcast nature of wireless medium. In order to localize the source of the attacker, they in this paper propose a jammer localization algorithm named as Minimum-circle-covering based localization (MCCL). Comparing with the existing solutions that...
Provided By National University of Defense Technology
-
Exploiting Spatial Reuse in Multi-Hop MIMO Networks: Models, Algorithms, and Evaluation
MIMO has great potential for enhancing the throughput of multi-hop wireless networks via spatial multiplexing or spatial reuse techniques. Spatial reuse outperforms spatial multiplexing in terms of potential network throughput and is effective in a wider range of wireless contexts than spatial multiplexing. The network throughput when previous approaches of...
Provided By National University of Defense Technology
-
Topological Detection on Wormholes in Wireless Ad Hoc and Sensor Networks
Wormhole attack is a severe threat to wireless ad hoc and sensor networks. Most existing countermeasures either require specialized hardware devices or make strong assumptions on the network in order to capture the specific (partial) symptom induced by wormholes. Those requirements and assumptions limit the applicability of previous approaches. In...
Provided By National University of Defense Technology
-
Fine-Grained Location-Free Planarization in Wireless Sensor Networks
Extracting planar graph from network topologies is of great importance for efficient protocol design in wireless ad hoc and sensor networks. Previous techniques of planar topology extraction are often based on ideal assumptions, such as UDG communication model and accurate node location measurements. To make these protocols work effectively in...
Provided By National University of Defense Technology
-
Multi-Channel-Multi-MAC Model Architecture for Multi-Net-Multi-Link Tactical Data Link in NS-2
Because of the coexistence of multiplex Tactical Data Links (TDLs) it is urgent to study the cooperation of Multi-Net-Multi-Link (MNML) TDL. This paper proposes a Multi-Channel-Multi-MAC (MCMM) model architecture to support MNML TDL simulation. The MCMM model adds several copies of data link layer, network interface and channel which are...
Provided By National University of Defense Technology
-
Space-Time Codes With Block-Orthogonal Structure and Their Simplified ML and Near-ML Decoding
Existing high-rate full diversity Space-Time Codes (STC) always have high decoding complexity with traditional ML (maximum-likelihood) or near-ML decoding. Hence the decoding scheme with reduced complexity is required. In this paper, block-orthogonal structure is introduced for the first time, and most of the existing STC do have such structure. A...
Provided By National University of Defense Technology
-
The Export Promoting Effect Of Emigration: Evidence From Denmark
The theoretical claim that ethnic networks encourage trade has found broad empirical support in the literature on migration, business networks and international trade. Ethnic networks matter for the exporting firm, as they exhibit the potential to lower fixed and variable cost of exporting. This paper provides a first attempt to...
Provided By University of Gottingen
-
An Optimal Guard-Intervals Based Mechanism for Key Generation From Multipath Wireless Channels
Recently, multipath in wireless channels has shown an interesting aspect. It has been found that wireless channels may provide a common reciprocal source of randomness for any two communicating nodes. This seems particularly interesting for secret key generation in wireless networks. In this paper, the authors consider the randomness property...
Provided By University of Gottingen