- Filter by:
-
Content Type
-
Topic
-
Contemporary development of information systems for service delivery is at the present a matter of bringing together use of Web and mobile applications. However, this advancement in the field of computing is happening at the expense of increased security risks to the system users and owners. This is due to...
Download Now -
A Network Traffic Representation Model for Detecting Application Layer Attacks
Intrusion Detection System (IDS) play an important role in network security, protecting systems and infrastructures from malicious attacks. With the emerging of novel threats and offensive mechanisms, IDS require updates in order to efficiently detect new menaces. In this paper, they propose an anomaly-based detection model designed for particular application...
Download Now -
Mobilizing Digital Museums with 3D Photography
In order to achieve a higher level of knowledge dissemination, many museums have been digitizing their collections and disseminated the users' to the world through the Internet. On the other hand, cloud computing and mobile communication technologies will further enhance the penetration capability of digital information, enabling mobile users surfing...
Download Now -
Interference Estimation and Mitigation in Wireless Networks
To improve the resource utilization, the world of wireless communication network has seen suggestion and developing of new frameworks targeting an improved model of resource usage in wireless space by enabling cooperation and collaboration among possibly interfering wireless technologies in a dynamic and adaptive fashion. An important element of the...
Download Now -
Load Prediction in Smart Grid Networks
Efficient forecasting and load prediction for maintaining the accurate DR (Demand Response) ratio is a key factor in implementing and deploying the smart-grid networks. There are a plethora of techniques and models suggested by forecasters over the decades, the most accurate and feasible being-artificial neural networks, linear regression technique and...
Download Now -
OFDM for Cognitive Radios: An Overview Present Solutions and Future Directions
Spectrum efficiency, high speed data transmission and security are the major requirements for new generation wireless communications. By integrating OFDM into physical layer of cognitive radio, they can achieve high speed data transmission with high spectrum utilization. In this paper, they investigate the impediments for use of OFDM (Orthogonal Frequency...
Download Now -
Comparative Performanceof Subcarrier Schedulers in Uplink LTE-A under High Users' Mobility
In this paper, evaluates the effects of high mobility of Users Equipment (UE) on the performances of different data rate services using four scheduling algorithms in the uplink of LTE system using the uplink Vienna simulator. The uplink reports Channel Quality Indicator (CQI), Precoding Matrix Indicator (PMI) and Rank Indicator...
Download Now -
Implementation of SlowDroid: Slow DoS Attack Performed by a Smartphone
In terms of capabilities, today's Smartphones are comparable to desktop computers. Last generation cellphones are indeed able to execute almost all the operation a common computer is able to accomplish. In this paper, the authors focus on the use of mobile devices for perpetrating cyber-attacks. With the purpose of proving...
Download Now -
Reliability Modeling of a Cluster Based Distributed Mobile Ad-hoc Network
Modelling of a Mobile Ad-hoc NETwork is a simplest way to represent real life networks for reliability and performance analysis. In this paper, an effort is made to develop a model of ad-hoc network cluster for evaluation of reliability. This model is based on Continuous-Time Markov Chain (CTMC). A Mobile...
Download Now -
Cross-Platform Mobile Applications with Web Technologies
The extended use of smart mobile devices has become an integral part of daily life leading to the expansion of mobile application development. Currently, the majority of mobile applications are native applications that need an initial installation prior to being utilized. In addition, for a given application, a separate software...
Download Now