Quantcast
Channel: Research Library - White Papers, Webcasts and Case Studies - TechRepublic
Browsing latest articles
Browse All 62 View Live

An Density-based Energy-efficient Routing Algorithm in Wireless Sensor...

Clustering is an efficient technique that is widely adopted in wireless sensor networks. It divides network into clusters and let cluster heads be responsible for forwarding aggregated data to the...

View Article



An Algorithm for Data Aggregation Scheduling with Long-lifetime and...

In scenarios of real-time data collection in long-term deployed Wireless Sensor Networks (WSNs), low-latency data collection and long network lifetime become key issue. The authors propose a...

View Article

Distributed Key Management in Wireless Mesh Networks based on Verifiable...

Wireless Mesh Networks (WMNs) are wireless access networks based on IP technologies, which combine the advantages of WLANs and ad hoc networks and have thus become broadband access networks with...

View Article

A Fuzzy Control Method of Traffic Light with Countdown Ability

Based on intelligent traffic system idea and fuzzy logical, a fuzzy control method of the traffic light signal with full countdown function is proposed which can effectively solve the randomness...

View Article

FMIPv6 Handover Procedure Management for Efficient Packet Transmission over...

Recently, wireless network user increased drastically due to the fast development and evolution of various mobile devices such as Smart Phone, Tablet PC, and etc. Provider provides good quality of...

View Article


An Energy-efficient Clustering Algorithm in Wireless Sensor Networks with...

In wireless sensor networks with single sink node, the energy consumption of sensors near the sink or on the critical paths is too fast besides other disadvantages. Therefore, the authors propose...

View Article

The Study of Genetic Algorithm-based Task Scheduling for Cloud Computing

Task scheduling is an important and challenging issue of Cloud computing. Existing solutions to task scheduling problems are unsuitable for Cloud computing because they only focus on a specific...

View Article

The Study on the Transmission Structure for High Transmission Rate Based on...

Recently, cooperative communications have been proposed that allows single antenna system in a multi user environment to share their antennas. And cooperative communications make a virtual...

View Article


A Novel Fall Activity Recognition Method for Wireless Sensor Networks

Health care targeted for home activity is playing an important role in daily lives as the number of elderly person is increasing sharply. Researches pointed out that one third of 65-and-over aged...

View Article


A Novel Cross-Layer Management Mechanism for Ad hoc Network

In this paper, the authors present a novel Ad hoc network management mechanism UANM to provide unified management functionalities for nodes in an Ad hoc network. UANM adopts a cross layer...

View Article

PDCML: A Model for Enhancing Software Reusability

Software reusability is an important aspect of software development process. Reusable components can be used to build high quality and reliable software with reduced cost. These reusable...

View Article

Extraction Method of Handwritten Digit Recognition Tested on the MNIST Database

The neural networks are widely used for the recognition of characters. In this paper, the authors train and test a neural network classifier using MNIST database, the important step in the...

View Article

A Unique Document Security Technique Using Face Biometric Template

In this paper, the authors propose a unique security architecture where face features and subsequently the generated templates are used as the key for document security. A framework needs users to...

View Article


BER Analysis of Semi-Blind Channel Estimation in MIMO Systems

The huge increase of the MIMO (Multiple-Input Multiple-Output) capacity required perfect channel knowledge at the receiver. In this paper, the authors analyze the effect of imperfect channel...

View Article

An Intelligent Efficient Secure Routing Protocol for MANET

The security issues are more complex and challenging in Mobile Ad hoc NETworks (MANETs) than other conventional wireless networks due to peer to peer behavior of the participating nodes, absence...

View Article


Developed Algorithm for Supervising Identification of Non Linear Systems...

In this paper, the authors use the formulas of statistic techniques for developing an algorithm based on third order moments and autocorrelation function. This algorithm permits to identify non...

View Article

Improving 3D Shape Retrieval Methods based on Bag-of-Feature Approach by...

Recent investigations illustrate that view-based methods, with pose normalization pre-processing get better performances in retrieving rigid models than other approaches and still the most popular...

View Article


Implementation of Smartcard Personalization Software

In this paper, the authors treat the implementation of a graphic tool which allows to personalize smart card (JavaCard cards), which use the RSA (Rivest Shamir Adleman) algorithm and ECDSA...

View Article

Design of Interoperable Module Between Two Home Network Middlewares

In order to guarantee interoperability among home network appliances and devices using heterogeneous network technologies and different applications, alliances of worldwide major companies...

View Article

Hierarchical Role Graph Model for UNIX Access Control

The access control system is a very important step in the implementation of the security policy of an information system. Access control checks what a user can do directly, as well as what...

View Article

Improving Chaos Image Encryption Speed

Chaotic systems are extremely sensitive to control parameters and initial conditions. This feature is effective in the field of cryptography. In this paper, the authors propose image encryption...

View Article


An Approach for Determining Conditions for Monitoring of Critical Nodes for...

In modern generation, the applications of MANET are increasing in use. But MANET are more vulnerable to many attacks because of their adhoc nature. The security issue is the main concern in the...

View Article


Folded Architecture of Scheduler for Area Optimization in On-Chip Switch Fabric

As the feature sizes of the manufacturing processes are constantly shrinking, the possibility and demand for more functionality on a single chip goes up. This can lead to many problems e.g. as the...

View Article

The Specificity Property for the Exchange-Interaction

The proposed paper deals with highly complex, multi-dimensional systems/processes that cannot be described using low-level details. This is due to the complexity and uncertainty inherent in their...

View Article

Transport Layer Security (TLS) Implementation for Secured MN-HA Communication...

Mobile IPv6 usually use the IPsec/IKEv2 to secure Mobile Node (MN) and Home Agent (HA) communication. The implementation of IPsec/IKEv2 with MIPv6 is complex because it requires a tight coupling...

View Article


Semantic Multi-granular Lock Model in Object Oriented Database Systems

In this paper, a semantic based multi-granular lock model for object-oriented database systems is proposed. It addresses the concurrency control issues related to all types of transactions to an...

View Article

Design of Standard VoIP Spam Report Format Supporting Various Spam Report...

VoIP (Voice over Internet Protocol) services can be abused by spammers who send out commercial messages in bulk due to their cost saving effects. However, an effort to prevent spam has hardly been...

View Article

A Study for Evaluation Models of CC(Common Criteria) based on Information...

In these days, many organizations try to manage their information system in safe way (i.e., evaluation, assurance and certification of information security) due to more rapidly change in...

View Article

An Analysis for the Mediating Effect of Organizational Justice on the...

Recently, new work practices such as virtual work system, have been introduced in various fields. These contracts for new work practices have changed from the existing face-to-face management...

View Article



TCLOUD: A Multi - Factor Access Control Framework for Cloud Computing

The countless advantages of cloud computing has brought a massive change to the lifestyle and the way to cope with the world today, yet the cloud has to reach maturity. However, the main barrier...

View Article

A Multi-hop Uneven Hierarchical Routing Protocol for Wireless Sensor Networks...

Use of mobile devices for data collection in Wireless Sensor Networks (WSNs) has recently drawn much attention. Controlled sink mobility has been shown to be beneficial in energy conservation and...

View Article

Comparative Study of Path Loss Models of WiMAX at 2.5 GHz Frequency Band

Correct prediction of path loss is a pivotal step of WiMAX network planning to estimate external interference level and cell radius accurately. In this paper, different path loss models are...

View Article

A Similarity Based Trust and Reputation Management Framework for VANETs

A trust and reputation management framework for VANETs (Vehicular Ad Hoc NETworks) is proposed. In the framework, a similarity mining technique is used for identifying similar messages or similar...

View Article


Wider Bandwidth of non-Contiguous Component Carriers in LTE-Advanced

The 3GPP Long Term Evolution-Advanced (LTE-A) system extends the capabilities of 3rd Generation Partnership Project (3GPP) LTE Rel-8 with the support of carrier aggregation, where two or more...

View Article

A Scheme of Optimal Channel Selection with Channel Evaluation for WSNs

With the rapid development of wireless communication technology, the application of Wireless Sensor Networks becomes more and more widely. However, there may be many wireless devices working...

View Article

Two New Ways of Source Node Lookup in DHT Network

In this paper, through analyzing the process of publishing resource files in DHT network and from the viewpoint of making full use of the information stored in values nodes, the authors propose...

View Article


Simulative Research on the Function of Internet of Things Basing on the...

As for the next generation of Internet, the Internet of things impacts people's lives profoundly, its application will be more broadly. There are many kinds of things network terminal, network...

View Article


A New Ecology Model for Internet Worm Security Threat Evaluation

Welchia worms were launched to terminate the Blaster worms and patch the vulnerable hosts. They created complex worm interactions as well as detrimental impact on infrastructure. Worm propagation...

View Article

Analysis of Semi-Blind Channel Estimation based on Second Order Statistics in...

Although MIMO (Multiple-Input Multiple-Output) represent a solution to increase the capacity and the reliability of wireless channels, it is particularly challenging from a channel estimation...

View Article

Trust Network and Small World Trust Community Clustering for ECommerce

Trust in e-commerce has become one of the most important issues in online applications. Constantly, a user will only search for the most credible of goods and service providers and then take on...

View Article
Browsing latest articles
Browse All 62 View Live




Latest Images