Skip to main content
    • by  and +1
    •   11  
      Computer ScienceArtificial IntelligenceSurgeryImage Analysis
Over the last few years, IEEE 802.16 has been established as one of the most promising solutions for broadband wireless metropolitan area networks. In 2007, the standard was included as one of the radio access technologies for IMT-2000.... more
    • by 
    •   7  
      Distributed ComputingNumerical AnalysisComputer CommunicationsBroadband Wireless Access
X-ray image might be corrupted by noise or blurring because of signal transmission or the bad Xray lens. This paper presents a two-stage shock filter based on Partial Differential Equations (PDE) to restore noisy blurred X-ray image.... more
    • by 
    •   3  
      Computer ScienceComputational ChemistryComputer Communications
• to make continuing use of the work in teaching and project work and, consequently, to propagate knowledge of this relatively new field.
    • by 
    •   4  
      Distributed ComputingDistributed SystemComputer CommunicationsElectrical And Electronic Engineering
    • by 
    •   3  
      Distributed ComputingComputer CommunicationsElectrical And Electronic Engineering
Electronic banking has provision networks that replaces and replicated various activities currently executing by the bank. Hence e-banking now plays a vital role to carry out the individual as well as corporate financial activities... more
    • by 
    • Computer Communications
In a today's internet end system, the congestion and flow control of every TCP connection is done separately. This means that every TCP sender of the TCP connections of an end system has to determine current information about the network... more
    • by 
    •   9  
      Distributed ComputingCongestion ControlFlow ControlComputer Communications
Monitoring and understanding the changes in mangrove ecosystems and their surroundings are required to determine how mangrove ecosystems are constantly changing while influenced by anthropogenic, and natural drivers. Consistency in high... more
    • by 
    •   9  
      GeographyChemistryComputational ChemistryMangrove
This paper provides an overview of cellular networks and wireless Internet. It focuses on the problems of providing multimedia services over these networks, and highlights the latest developments in the area. This is done by providing... more
    • by 
    •   20  
      Distributed ComputingHandoverMobile IPMobile Application
The emergence of Voice over IP (VoIP) has offered numerous advantages for end users and providers alike, but simultaneously has introduced security threats, vulnerabilities and attacks not previously encountered in networks with a closed... more
    • by 
    •   10  
      Distributed ComputingVoice over IPComputer CommunicationsSession Initiation Protocol
The power consumption of wireless access networks will become an important issue in the coming years. In this paper, the power consumption of base stations for mobile WiMAX, fixed WiMAX, UMTS, HSPA, and LTE is modelled and related to the... more
    • by 
    •   14  
      Distributed ComputingAccess NetworksMIMOComputer Communications
    • by  and +1
    •   3  
      Distributed ComputingComputer CommunicationsElectrical And Electronic Engineering
The AS-level topology of the Internet has been quite a hot research topic in the last few years. However, only a small number of studies have been developed that give a structural interpretation of this graph. Such an interpretation is... more
    • by 
    •   12  
      Distributed ComputingModelingRoutingTopology
Communication between institutions, or domains, residing in the Internet requires a route to be created between the routing domains. Each of these domains is controlled by a single administrative authority, and is referred to as an... more
    • by 
    •   10  
      Distributed ComputingComputer CommunicationsInternet Service ProviderAutonomic System
Providing seamless mobility support is one of the most challenging problems towards the system integration of fourth generation (4G) wireless networks. Because of the transparency to the lower layer characteristics, application-layer... more
    • by 
    •   13  
      Distributed ComputingWireless Sensor NetworksSystem IntegrationMobility Management
The bene ts of using caches for reducing tra c in backbone trunk links and for improving web access times are well-known. However, there are some known problems with traditional web caching, namely, maintaining freshness of web objects,... more
    • by 
    •   3  
      Distributed ComputingComputer CommunicationsElectrical And Electronic Engineering
    • by 
    •   20  
      Computer ScienceDistributed ComputingGenetic AlgorithmsModeling
The Internet as the whole is a network of multiple computer networks and their massive infrastructure. The web is made up of accessible websites through search engines such as Google, Firefox, etc. and it is known as the Surface Web. The... more
    • by 
    •   5  
      Information Security and PrivacyComputer CommunicationsDark WebDeep Web Accessibility Resources
    • by 
    •   3  
      Distributed ComputingComputer CommunicationsElectrical And Electronic Engineering
In modern textile industry, Tissue online Automatic Inspection (TAI) is becoming an attractive alternative to Human Vision Inspection (HVI). HVI needs a high level of attention nevertheless leading to low performance in terms of tissue... more
    • by 
    • Computer Communications
The dramatic development of radio solutions for wireless communications tends to blur the wider use that can be made of infrared transmissions in a room, a workshop or even a building. For some local applications for which a wireless part... more
    • by 
    •   10  
      Distributed ComputingSimulationProtocolsComputer Communications
This paper proposes the Mobility-Aware Resource Reservation Protocol (MARSVP) in which mobility and QoS signaling are performed as a single functional block. The key concept of MARSVP is to convey mobility-specific information (binding... more
    • by 
    •   13  
      Distributed ComputingVoice over IPMobile IPWireless Network
Mobile Agents (MA) have been proposed as a solution for distributed Network Management (NM). However, most MA-based infrastructures exhibit scalability limitations when data intensive management applications are considered. Therefore, we... more
    • by 
    •   20  
      Distributed ComputingKnowledge ManagementDistributed SystemNetwork Management
Underwater Wireless Sensor Networks (UWSNs) are different in many aspects as compared to terrestrial sensor networks. Other than long propagation delays and high error probability, continuous node movement makes it hard to manage the... more
    • by 
    •   4  
      Computer ScienceDistributed ComputingComputer CommunicationsElectrical And Electronic Engineering
In the last few years, we have witnessed an explosion in demand for security measures motivated by the proliferation of mobile/wireless networks, the fixed-mobile network convergence, and the emergence of new services, such as e-commerce.... more
    • by 
    •   6  
      Distributed ComputingVirtual Private NetworkSecurity RequirementsComputer Communications
Since its inception almost 40 years ago, the Internet has evolved and changed immensely. New technology solutions are desired to keep up with this unprecedented growth. Besides the traditional computing devices, different types of mobile... more
    • by 
    •   3  
      Distributed ComputingComputer CommunicationsElectrical And Electronic Engineering
Network planning for realtime services in traditional systems is normally performed based on a fixed traffic demand. Realtime services such as voice and video are currently being widely deployed over packet-based IP networks. Due to the... more
    • by 
    •   13  
      Distributed ComputingComputer CommunicationsQuality of ServiceCapacity Planning
The paper deals with a model of collaboration between academia and industry in the area of information and communication technology. It shows the collaboration in the field of Telecommunications and Informatics at the University of... more
    • by 
    •   7  
      Distributed ComputingInformaticsTelecommunicationsInformation and Communication technology
Technology has become inevitable in human life, especially the growth of Internet of Things (IoT), which enables communication and interaction with various devices. However, IoT has been proven to be vulnerable to security breaches.... more
    • by 
    •   3  
      Distributed ComputingComputer CommunicationsElectrical And Electronic Engineering
In recent years, there has been a growing interest in wireless sensor networks. One of the major issues in wireless sensor network is developing an energy-efficient clustering protocol. Hierarchical clustering algorithms are very... more
    • by 
    •   21  
      Distributed ComputingData MiningDistributed SystemRouting protocols
The exploding Internet has brought many novel network applications. These include teleconferencing, interactive games, the voice/video phone, real-time multimedia playing, distributed computing, web casting, and so on. One of the specific... more
    • by 
    •   9  
      Distributed ComputingInternet Routing ProtocolInterest GroupsComputer Communications
To overcome vendor lock-in obstacles in public cloud computing, the capability to define transferable cloud-based services is crucial but has not yet been solved satisfactorily. This is especially true for small and medium sized... more
    • by 
    •   2  
      Computer Mediated CommunicationComputer Communications
Advances in low power VLSI design, along with the potentially low duty cycle of wireless sensor nodes open up the possibility of powering small wireless computing devices from scavenged ambient power. A broad review of potential power... more
    • by 
    •   10  
      Vlsi DesignDistributed ComputingComputer CommunicationsLow Power
In the last few years, cloud computing (CC) has grown from being a promising business concept to one of the fastest growing segments of the IT industry. Many businesses including small, medium (SMEs) and large enterprises are migrating to... more
    • by 
    • Computer Communications
This paper presents Java Fast Sockets (JFS), an optimized Java socket implementation on clusters for high performance computing. Current socket libraries do not efficiently support high-speed cluster interconnects and impose substantial... more
    • by 
    •   11  
      Distributed ComputingPerformance EvaluationComputer CommunicationsShared memory
Packet buffers in a smart network interface card are managed in a way to reduce any packet losses from high-speed burst incoming data. Currently, two types of packet buffer management techniques are used. They are static buffer management... more
    • by 
    •   8  
      Packet SwitchingComputer CommunicationsBuffer ManagementHigh Speed
Networking research funding agencies in the USA, Europe, Japan, and other countries are encouraging research on revolutionary networking architectures that may or may not be bound by the restrictions of the current TCP/IP based Internet.... more
    • by 
    •   20  
      Distributed ComputingRoutingContent ManagementRouting protocols
The rapid evolution in mobile devices and communication technology has increased the number of mobile device users dramatically. The mobile device has replaced many other devices and is used to perform many tasks ranging from establishing... more
    • by 
    • Computer Communications
Vulnerabilities are extremely important for network security. IT management must identify and assess vulnerabilities across many disparate hardware and software platforms to prioritize these vulnerabilities and remediate those that pose... more
    • by 
    •   8  
      Distributed ComputingNetwork SecurityIT ManagementComputer Communications
Internet of Things, which will transform the real world objects into intelligent virtual objects. The IoT aims to unify everything in our world under a common infrastructure, giving us not only control of things around us, but also... more
    • by 
    •   8  
      RFIDInternet of ThingsSensorsActuators
The increasing computing and communication power of new terminals in mobile networks has converted these smart phones into Internet hosts. They can be used for traditional services, such as browsing or e-mailing, but also as platforms for... more
    • by 
    •   11  
      Distributed ComputingPerformance AnalysisVideo StreamingComputer Communications
The use of personal protective equipment (PPEs) in the construction industry is necessary to guarantee the safety of the workers. However, this equipment is not usually worn properly. Nowadays, the only control performed over the use of... more
    • by 
    •   6  
      Distributed ComputingRFIDWearable ComputingComputer Communications
Location and environment awareness are two prominent features of cognitive radios and networks enabling them to interact with and learn the operating environment. A cognitive radio architecture with location and environment awareness... more
    • by 
    •   10  
      Distributed ComputingLocation Based ServicesModelingLocalization
The Internet as the whole is a network of multiple computer networks and their massive infrastructure. The web is made up of accessible websites through search engines such as Google, Firefox, etc. and it is known as the Surface Web. The... more
    • by 
    •   5  
      Information Security and PrivacyComputer CommunicationsDark WebDeep Web Accessibility Resources
ABSTRACT
    • by 
    •   3  
      Distributed ComputingComputer CommunicationsElectrical And Electronic Engineering
Distributed multimedia applications will be an important part of tomorrow's application mix and require appropriate operating system (OS) support. Neither hard real-time solutions nor best-effort solutions are directly well suited for... more
    • by 
    •   14  
      Distributed ComputingMemory ManagementOPERATING SYSTEMComputer Communications
Evolved Universal Terrestrial Radio Access (EUTRA), known as the Long Term Evolution (LTE) technology, brings cellular communication to the fourth generation (4G) era. In this article, we discuss the most important characteristics of LTE;... more
    • by 
    •   19  
      Distributed ComputingRadio Resource ManagementResource AllocationPacket Switching
In recent years, web security has been viewed in the context of securing the web application layer from attacks by unauthorized users. The vulnerabilities existing in the web application layer have been attributed either to using an... more
    • by 
    •   3  
      Cognitive ScienceArtificial IntelligenceComputer Communications
Last decade observed a significant research effort directed towards indoor localization utilizing location fingerprinting techniques. Fingerprinting solutions generally require a pre-deployment site survey proce-27 dure during which a... more
    • by 
    •   3  
      Distributed ComputingComputer CommunicationsElectrical And Electronic Engineering