Skip to main content
Forward: The Public Safety Wireless Network (PSWN) Program is conducting an ongoing assessment of advancements in the wireless communications industry. The scope of this assessment is to identify emerging wireless services and... more
    • by 
    •   2  
      Wireless CommunicationIcwn
This paper presents the overview of school library status in India.  How ICWN can be treat in school library.
    • by 
    •   4  
      Library ScienceAssistive TechnologySchool LibraryIcwn
The modern information and communication technologies (ICT) help every organisation to improve their productivity in terms of quality and quantity. The libraries, especially school libraries also fell in line with others to become not... more
    • by 
    •   4  
      Library ScienceAssistive TechnologySchoolsIcwn
This article puts forward an examination of using OFDMA method like WiMax for future cellular systems. The main goal of investigation and simulation is Doppler Effect influence on orthogonality disturbance in critical but real situations.... more
    • by 
    •   2  
      Doppler effectIcwn
This work presents an efficient data service scheme for location dependent data/objects in a cellular mobile network. It is developed around the hardware structure of cellular automata (¦ §). The ¦ § hardware acts as a search engine and... more
    • by 
    •   2  
      IcwnCellular mobile network
This paper presents an effective and simple solution to the problem of Layer 3 (L3) handover in IEEE 802.11 wireless LANs (WLANs), so as to extend the IP mobility area of 802.11 wireless Stations (STAs). The IEEE 802.11f Inter-Access... more
    • by 
    •   10  
      Computer ScienceMobile IPMobility ManagementConference
Recently, group-oriented services have become one of the primary application classes targeted by MANETs. As a result, several MANET-specific multicast routing protocols have been proposed. Several studies compared the performance of... more
    • by 
    •   2  
      Performance ComparisonIcwn
    • by 
    •   20  
      Computer ScienceDistributed ComputingSecurityRouting
We present a new Bluetooth authentication model using some game theory concepts. Bluetooth is a wireless communication protocol designed for WPAN (Wireless Personal Area Nework) use. Game theory is a branch of mathematics and logic which... more
    • by 
    •   4  
      Computer ScienceGame TheoryWireless CommunicationIcwn
This paper presents the experimental evaluation of a Bluetooth-based positioning system. The method has been implemented in a Bluetooth-capable handheld device. Empirical tests of the developed considered positioning system have been... more
    • by 
    •   3  
      Experimental EvaluationPositioning SystemIcwn
In this paper we consider MIMO system with M t transmitting and M r receiving antennas, when channel state information (CSI) is known on the transmitter side. The Reyleigh fading channel propagation condition is assumed. In this case, the... more
    • by 
    •   3  
      Fading ChannelIcwnChannel State Information
Sequential decoders are convolutional channel decoders that are characterized by having variable decoding complexity in changing channel conditions. They are widely used in wireless packet-switching networks and mobile communications. The... more
    • by 
    •   15  
      Mobile CommunicationPerformance EvaluationVideo StreamingMultimedia Networking
Call admission protocols play a central role in determining both the performance of any network, and the revenue of the network. The call admission protocol must decide either to accept the call or reject it, Thus having an impact on both... more
    • by 
    •   5  
      Performance EvaluationBandwidth AllocationCellular NetworkCall Admission Control
This paper presents a multi-layered Integrated Technical Reference Model (I-TRM). The I-TRM is based on a classical closed-loop control system and combines an Information-Centric Technical Reference Model (IC-TRM), a Control Technical... more
    • by 
    • Icwn
Recently, group-oriented services have become one of the primary application classes targeted by MANETs. As a result, several MANET-specific multicast routing protocols have been proposed. Several studies compared the performance of... more
    • by 
    •   2  
      Performance ComparisonIcwn
Geographic location of nodes is very useful for a sensor network. A novel and practical Radio Frequency (RF)-based localization algorithm called Kcdlocation has been presented for some specific sensor network topologies, such as the grid... more
    • by 
    •   20  
      Iterative MethodsWireless Sensor NetworksLocalizationGlobal Positioning System
Mobility of users, transmission of signals through open-air, the requirement of low power consumption by mobile users and smaller data storage area limitation in mobile equipment make mobile wireless networks more vulnerable to security... more
    • by 
    •   6  
      Data SecurityData storageMobile NetworkElliptic Curve Cryptography
, they showed that the permutation routing of n items pretitled on a mobile ad hoc network (MANET for short) of p stations (p known) and k channels (MANET(n, p, k)) with k < p, can be carried out in 2n k + k − 1 broadcast rounds if k ≤ √... more
    • by  and +1
    •   6  
      Distributed ComputingMobile Ad Hoc NetworksWireless networksMobile Ad Hoc Network
An often heard critique on the use of ICT in a heritage context is the individualized nature of the experience. Group communication is an important aspect within a cultural experience, because it can encourage participants to interact... more
    • by 
    •   3  
      Cultural HeritageLocation Based ServiceIcwn
A novel key-update scheme is proposed for wireless sensor networks. The center server in a wireless sensor network first broadcasts a series of randomly generated code slices to sensor nodes. Upon receiving all the code slices, the sensor... more
    • by 
    •   5  
      Elliptic Curve CryptographyWireless Sensor NetworkProcess CapabilityAuthentication Protocol
Knowledge of nodes' locations is an essential requirement for many applications. This paper surveys the current state of the art for localization schemes in sensor networks. We present a taxonomy of the localization schemes for sensor... more
    • by 
    •   2  
      Wireless Sensor NetworkIcwn
Object of the invention are new diisatoic acid and triisatoic acid derivatives of the general formula I (I) wherein n represents 2 or 3, X stands for oxygen or sulfur and R for a group of the general formula II Y-Z-B]m, (II) in which m... more
    • by 
    •   2  
      Computer ScienceIcwn
This paper presents a description and performance evaluation of a threshold secret sharing (TSS) authentication scheme for selfsecuring mobile ad hoc networks (MANETs) suffering from high packet-loss and node mobility. In order to... more
    • by 
    •   10  
      Computer ScienceNetwork ManagementAnomaly DetectionPerformance Evaluation
General Packet Radio Service (GPRS) has become the most popular system for data communication in mobile phones. Recently, it enables a wide range of engineering applications to be implemented such as remote patient status monitoring. In... more
    • by 
    •   2  
      Computer ScienceIcwn
Google, Inc. (search). ...
    • by 
    •   15  
      EngineeringComputer ScienceSoftware EngineeringMachine Learning
In this paper, we investigate the performance of wireless ad hoc networks with traffic loads beyond saturation. While it is desirable to operate a network below saturation, an ad hoc network should be designed to degrade its performance... more
    • by 
    •   5  
      Computer ScienceAd hoc networkGraceful DegradationWireless Ad Hoc Network
The tracking of objects and humans has recently received a lot of attention as a tool to improve business processes, occupational and public safety. In industrial environments wireless sensor networks can facilitate deployment of tracking... more
    • by 
    •   2  
      Sensor NetworkIcwn
    • by 
    •   3  
      Mobile Ad Hoc NetworkComputer ApplicationsIcwn
Knowledge of nodes&#x27; locations is an essential requirement for many applications. This paper surveys the current state of the art for localization schemes in sensor networks. We present a taxonomy of the localization schemes for... more
    • by 
    •   2  
      Wireless Sensor NetworkIcwn
The complexity of some real-time applications demands high performance computer architectures. Multicomputer architectures have a potential for high performance and reliability because of their expressive number of processors and... more
    • by 
    •   20  
      Energy HarvestingLarge Hadron ColliderColumn GenerationCommunication Channels
In cellular mobile communications the subcarriers are repeatedly used for best utilizing the assigned frequency spectrum. The assignment of channels for users is complex and involves high computation time. Wong et al [15] proposed a... more
    • by 
    • Icwn
The advantage of using cognitive radio technology is its ability to adapt and behave to the needs of the application. The adaptability to the application leads cognitive radios with the potential for creating next generation cognitive... more
    • by 
    •   3  
      MiddlewareTracking systemIcwn
A sinkhole attack is one of the severe attacks in wireless sensor networks. This attack compromises nodes of a particular are, and diverts the traffic from the base station into the sinkhole. To determine a sinkhole, we first derive the... more
    • by 
    •   2  
      Wireless Sensor NetworkIcwn
    • by 
    •   14  
      Energy HarvestingPerformance EvaluationReal Time SchedulingEnergy Storage
Nowadays it is growing the interest on designing services/applications that can be performed efficiently in mobile computing environments. However, testing these new applications becomes sometimes a difficult task due to the distributed... more
    • by 
    •   12  
      Wireless SystemsIT ManagementWireless NetworkMobile Device
The intrinsic characteristics of ad hoc networks, such as the frequent connectivity changes and the strict bandwidth and power constraints, impose further challenges, especially for routing tasks. Establishing and maintaining routes are... more
    • by 
    •   2  
      Network PerformanceIcwn
In this paper, we present a novel approach for tracking a dynamic phenomenon. One of the central issues in sensor networks is energy efficient target tracking, where the goal is to monitor the path of a moving target using a minimum... more
    • by 
    •   2  
      Energy efficientIcwn
Today there are many proposals of middlewares for sensor and actuator networks (SAN). Each of them introduces programming paradigms for creating distributed applications. There are middlewares with different philosophies in terms of... more
    • by 
    •   4  
      MiddlewareSensors and ActuatorsObject OrientedIcwn
Authentic program modification is very important for a multi-application smart card system since ap- plications in the system are realized after the is- suance of the smart card. In this paper, we propose a framework for such authentic... more
    • by 
    •   4  
      Pseudo-Random Number GeneratorSmart CardHash FunctionIcwn
This paper presents a generalized software architecture used in a real sensor network application to provide the necessary communications infrastructure between remote sensor units and centralized server. The architecture utilizes... more
    • by 
    •   4  
      Remote MonitoringWind SpeedWireless Sensor NetworkIcwn