The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The following topics are dealt with: wireless mobile networks; computer networks; network security; information technology; information management; image processing; signal processing; nanotechnology; and embedded systems.
Transmission characteristics of free-space optical (FSO) data transmission systems are characterized. Issues of optical directionality, being related to the optical modulation depth, are investigated for a variety of retroreflecting structures. A composite solid retroreflector is introduced as a novel element for such optical wireless systems, and it is shown that this device has an omni-directional...
Previously, a state-space similarity transform was proposed to reduce the feedback loop complexity of a parallel Cyclic Redundancy Check architecture and enable retiming. This paper investigates the open research question concerning the impact of varying the vector used to construct the transformation matrix. We perform exhaustive searches of the vector space for frequently referenced generator polynomials...
In this paper, we study the effect of signal-to-noise ratio (SNR) mismatch on the bit-error rate (BER) performance of two types of turbo decoding schemes over Rayleigh fading channels with imperfect channel estimation.
Inserting redundancy to arithmetic codes is a common strategy to add error detection capability to this well-known family of source codes. By using this strategy error correction is possible through some decoding algorithms such as Viterbi decoder. In this paper a system has proposed that uses finite state integer arithmetic codes (FSAC) as a joint source-channel code in combination with a cyclic...
In recent years, improved wireless technologies have enabled the low-cost deployment of large numbers of sensors for a variety of applications across different engineering disciplines. Because of the computational resources (processing capability, storage capacity, etc.) distributed throughout these sensing networks, it is often possible to perform advanced data analysis tasks autonomously and in-network,...
Wireless sensor networks (WSN) have the potential to be widely used in many areas for unattended event monitoring. Mainly due to lack of a protected physical boundary, wireless communications are vulnerable to unauthorized interception and detection. Privacy is becoming one of the major issues that jeopardize the successful deployment of wireless sensor networks. While confidentiality of the message...
This paper presents an architectural model for wireless peer-to-peer (WP2P) file sharing system for ubiquitous mobile devices. File sharing is one of the rationales for computer networks with increasing demand for file sharing applications and technologies in small and large enterprise networks and on the Internet. With the popularity of mobile phones in day-to-day activities, P2P file sharing in...
Call admission control schemes play more important role in wireless cellular networks. They are used for achieving some desired quality of service parameters. An important challenge in these schemes is defining some realistic assumptions such as different channel holding times for new and handoff calls. In this paper we will introduce a new call admission control scheme based on the concepts of new...
With a wide spread of malicious software attacks, run-time stack has been drawing attention because it is one of the most vulnerable points in computer architecture. Conventional stack layout, in which local variables for user input and control flow data such as return address are saved close to each other, is often the root of the attack vulnerability. This paper proposes a simple finite state machine...
The advanced encryption standard (AES) is a newly accepted secret key cryptographic standard for secure transfer of blocks of data. Among different transformations, the SubBytes transformation is the most expensive one in terms of the chip area and the power consumption in the hardware implementation of the AES. It consists of 16 S-boxes and hence the hardware optimization of the S-box is critical...
Chiamwongpaet and Piromsopa introduced secure canary word, an extension of secure bit, as an architectural approach to the protection against buffer-overflow attacks on non-control data (variables and arguments). Secure canary word is based on two existing schemes, secure bit and canary word. The objective of this paper is to propose a new hardware implementation in order to improve the efficiency...
Today E-tendering is increasingly being adopted through the world. An electronic environment presents obvious opportunities for collusion between principal and certain tenderers, fraud by tenderers and attempt of intruders to illegally access the system. In this paper, security requirements of an e-tendering system are described. Then the existing architecture of popular-tendering system are introduced...
Data mining leads to the discovery of large number of patterns, all of these patterns can not be of interest to user. So mining of interesting patterns from the set of mined patterns is an issue. According to the user's interest at particular time, set of interesting patterns can be mined; the interest of user can vary with the time. In this paper we proposed that using goal programming we can find...
As organizations consider themselves to be exposed to intense global competition, knowledge has become more and more important. A successful Knowledge Management strategy is essential for organizations in the modern business world. For this task knowledge oftentimes should be gained out of data amounts, which are not human manageable. Therefore in conjunction with Knowledge Management Data Mining...
As a quality management society transforms into a more knowledge and learned based society, it requires enhancement and improvement of strategies, systems and techniques towards meeting new expectations and demands. The importance of knowledge continues to grow to the spread of global networks, accelerated product cycles and changing market conditions. In this era; a progressive enterprise should...
In his classic book ldquoHow to Solve Itrdquo, first published in 1945, Polya covers the methods of problem solving that apply to a wide variety of problems in many disciplines. In particular, Polya discusses problem to find and problem to prove that distinguish the types of problems to be solved. Chang proposed three elements of methods of problem solving and the rule and scope that complement the...
Probing technology has been used as a fault detection and identification method in computer networks and successful applications have been reported. One of the most appealing features of probing-based schemes is that it is an active approach. A set of probes can be sent on a periodic basis. If a network failure is detected, the outcomes of these probes are further analyzed to determine the root cause...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.