An Density-based Energy-efficient Routing Algorithm in Wireless Sensor...
Clustering is an efficient technique that is widely adopted in wireless sensor networks. It divides network into clusters and let cluster heads be responsible for forwarding aggregated data to the...
View ArticleAn Algorithm for Data Aggregation Scheduling with Long-lifetime and...
In scenarios of real-time data collection in long-term deployed Wireless Sensor Networks (WSNs), low-latency data collection and long network lifetime become key issue. The authors propose a...
View ArticleDistributed Key Management in Wireless Mesh Networks based on Verifiable...
Wireless Mesh Networks (WMNs) are wireless access networks based on IP technologies, which combine the advantages of WLANs and ad hoc networks and have thus become broadband access networks with...
View ArticleA Fuzzy Control Method of Traffic Light with Countdown Ability
Based on intelligent traffic system idea and fuzzy logical, a fuzzy control method of the traffic light signal with full countdown function is proposed which can effectively solve the randomness...
View ArticleFMIPv6 Handover Procedure Management for Efficient Packet Transmission over...
Recently, wireless network user increased drastically due to the fast development and evolution of various mobile devices such as Smart Phone, Tablet PC, and etc. Provider provides good quality of...
View ArticleAn Energy-efficient Clustering Algorithm in Wireless Sensor Networks with...
In wireless sensor networks with single sink node, the energy consumption of sensors near the sink or on the critical paths is too fast besides other disadvantages. Therefore, the authors propose...
View ArticleThe Study of Genetic Algorithm-based Task Scheduling for Cloud Computing
Task scheduling is an important and challenging issue of Cloud computing. Existing solutions to task scheduling problems are unsuitable for Cloud computing because they only focus on a specific...
View ArticleThe Study on the Transmission Structure for High Transmission Rate Based on...
Recently, cooperative communications have been proposed that allows single antenna system in a multi user environment to share their antennas. And cooperative communications make a virtual...
View ArticleA Novel Fall Activity Recognition Method for Wireless Sensor Networks
Health care targeted for home activity is playing an important role in daily lives as the number of elderly person is increasing sharply. Researches pointed out that one third of 65-and-over aged...
View ArticleA Novel Cross-Layer Management Mechanism for Ad hoc Network
In this paper, the authors present a novel Ad hoc network management mechanism UANM to provide unified management functionalities for nodes in an Ad hoc network. UANM adopts a cross layer...
View ArticlePDCML: A Model for Enhancing Software Reusability
Software reusability is an important aspect of software development process. Reusable components can be used to build high quality and reliable software with reduced cost. These reusable...
View ArticleExtraction Method of Handwritten Digit Recognition Tested on the MNIST Database
The neural networks are widely used for the recognition of characters. In this paper, the authors train and test a neural network classifier using MNIST database, the important step in the...
View ArticleA Unique Document Security Technique Using Face Biometric Template
In this paper, the authors propose a unique security architecture where face features and subsequently the generated templates are used as the key for document security. A framework needs users to...
View ArticleBER Analysis of Semi-Blind Channel Estimation in MIMO Systems
The huge increase of the MIMO (Multiple-Input Multiple-Output) capacity required perfect channel knowledge at the receiver. In this paper, the authors analyze the effect of imperfect channel...
View ArticleAn Intelligent Efficient Secure Routing Protocol for MANET
The security issues are more complex and challenging in Mobile Ad hoc NETworks (MANETs) than other conventional wireless networks due to peer to peer behavior of the participating nodes, absence...
View ArticleDeveloped Algorithm for Supervising Identification of Non Linear Systems...
In this paper, the authors use the formulas of statistic techniques for developing an algorithm based on third order moments and autocorrelation function. This algorithm permits to identify non...
View ArticleImproving 3D Shape Retrieval Methods based on Bag-of-Feature Approach by...
Recent investigations illustrate that view-based methods, with pose normalization pre-processing get better performances in retrieving rigid models than other approaches and still the most popular...
View ArticleImplementation of Smartcard Personalization Software
In this paper, the authors treat the implementation of a graphic tool which allows to personalize smart card (JavaCard cards), which use the RSA (Rivest Shamir Adleman) algorithm and ECDSA...
View ArticleDesign of Interoperable Module Between Two Home Network Middlewares
In order to guarantee interoperability among home network appliances and devices using heterogeneous network technologies and different applications, alliances of worldwide major companies...
View ArticleHierarchical Role Graph Model for UNIX Access Control
The access control system is a very important step in the implementation of the security policy of an information system. Access control checks what a user can do directly, as well as what...
View ArticleImproving Chaos Image Encryption Speed
Chaotic systems are extremely sensitive to control parameters and initial conditions. This feature is effective in the field of cryptography. In this paper, the authors propose image encryption...
View ArticleAn Approach for Determining Conditions for Monitoring of Critical Nodes for...
In modern generation, the applications of MANET are increasing in use. But MANET are more vulnerable to many attacks because of their adhoc nature. The security issue is the main concern in the...
View ArticleFolded Architecture of Scheduler for Area Optimization in On-Chip Switch Fabric
As the feature sizes of the manufacturing processes are constantly shrinking, the possibility and demand for more functionality on a single chip goes up. This can lead to many problems e.g. as the...
View ArticleThe Specificity Property for the Exchange-Interaction
The proposed paper deals with highly complex, multi-dimensional systems/processes that cannot be described using low-level details. This is due to the complexity and uncertainty inherent in their...
View ArticleTransport Layer Security (TLS) Implementation for Secured MN-HA Communication...
Mobile IPv6 usually use the IPsec/IKEv2 to secure Mobile Node (MN) and Home Agent (HA) communication. The implementation of IPsec/IKEv2 with MIPv6 is complex because it requires a tight coupling...
View ArticleSemantic Multi-granular Lock Model in Object Oriented Database Systems
In this paper, a semantic based multi-granular lock model for object-oriented database systems is proposed. It addresses the concurrency control issues related to all types of transactions to an...
View ArticleDesign of Standard VoIP Spam Report Format Supporting Various Spam Report...
VoIP (Voice over Internet Protocol) services can be abused by spammers who send out commercial messages in bulk due to their cost saving effects. However, an effort to prevent spam has hardly been...
View ArticleA Study for Evaluation Models of CC(Common Criteria) based on Information...
In these days, many organizations try to manage their information system in safe way (i.e., evaluation, assurance and certification of information security) due to more rapidly change in...
View ArticleAn Analysis for the Mediating Effect of Organizational Justice on the...
Recently, new work practices such as virtual work system, have been introduced in various fields. These contracts for new work practices have changed from the existing face-to-face management...
View ArticleTCLOUD: A Multi - Factor Access Control Framework for Cloud Computing
The countless advantages of cloud computing has brought a massive change to the lifestyle and the way to cope with the world today, yet the cloud has to reach maturity. However, the main barrier...
View ArticleA Multi-hop Uneven Hierarchical Routing Protocol for Wireless Sensor Networks...
Use of mobile devices for data collection in Wireless Sensor Networks (WSNs) has recently drawn much attention. Controlled sink mobility has been shown to be beneficial in energy conservation and...
View ArticleComparative Study of Path Loss Models of WiMAX at 2.5 GHz Frequency Band
Correct prediction of path loss is a pivotal step of WiMAX network planning to estimate external interference level and cell radius accurately. In this paper, different path loss models are...
View ArticleA Similarity Based Trust and Reputation Management Framework for VANETs
A trust and reputation management framework for VANETs (Vehicular Ad Hoc NETworks) is proposed. In the framework, a similarity mining technique is used for identifying similar messages or similar...
View ArticleWider Bandwidth of non-Contiguous Component Carriers in LTE-Advanced
The 3GPP Long Term Evolution-Advanced (LTE-A) system extends the capabilities of 3rd Generation Partnership Project (3GPP) LTE Rel-8 with the support of carrier aggregation, where two or more...
View ArticleA Scheme of Optimal Channel Selection with Channel Evaluation for WSNs
With the rapid development of wireless communication technology, the application of Wireless Sensor Networks becomes more and more widely. However, there may be many wireless devices working...
View ArticleTwo New Ways of Source Node Lookup in DHT Network
In this paper, through analyzing the process of publishing resource files in DHT network and from the viewpoint of making full use of the information stored in values nodes, the authors propose...
View ArticleSimulative Research on the Function of Internet of Things Basing on the...
As for the next generation of Internet, the Internet of things impacts people's lives profoundly, its application will be more broadly. There are many kinds of things network terminal, network...
View ArticleA New Ecology Model for Internet Worm Security Threat Evaluation
Welchia worms were launched to terminate the Blaster worms and patch the vulnerable hosts. They created complex worm interactions as well as detrimental impact on infrastructure. Worm propagation...
View ArticleAnalysis of Semi-Blind Channel Estimation based on Second Order Statistics in...
Although MIMO (Multiple-Input Multiple-Output) represent a solution to increase the capacity and the reliability of wireless channels, it is particularly challenging from a channel estimation...
View ArticleTrust Network and Small World Trust Community Clustering for ECommerce
Trust in e-commerce has become one of the most important issues in online applications. Constantly, a user will only search for the most credible of goods and service providers and then take on...
View Article
More Pages to Explore .....