No abstract available.
Preface
An Improvement in Apriori Algorithm Using Profit and Quantity
Association rule mining has been an area of active research in the field of knowledge discovery and numerous algorithms have been developed to this end. Of late, data mining researchers have improved upon the quality of association rule mining for ...
Performance Study on Location-Assisted and Bluetooth-Assisted Session Transfer for VoIP Application
With the increasing use of small, lightweight, powerful and multi-radio devices, and the omnipresence of wireless networks such as WiFi, the pave to ubiquitous computing is gradually emerged and realized. Ubiquitous computing allows users to access ...
Sensor Placement for Heterogenous Point Coverage
Sensor placement in a wireless sensor network, that consists of a number of target points, determines number and locations of sensors required to cover the points. In this paper, we define a sensor placement problem called HPC to cover a large number of ...
An Energy-Efficient Clustering Protocol for Wireless Sensor Networks
In recent years, wireless sensor networks become a new way to obtain information from an interesting area. There are many extensive applications of wireless sensor networks such as environment monitoring, surveillance, enemy tracking, etc. Since the ...
Analysis of ICT Penetration in Iran and Middle East
This paper will analyze the state of ICT in Iran. The major Iranian telecommunication companies and their products will be described. The ICT activities and penetration rates during last decade until recent time will be investigated. Penetration of ...
A Performance Study on REAchability Protocol in Large Scale IPv6 Networks
Shim6 is a host-centric multihoming solution for IPv6 networks which has been chosen by the IETF as a multihoming solution for the future Internet. Shim6 employs REAchability Protocol (REAP) for failure detection and recovery. REAP enables multi-...
Challenges in the Deployment of Visuo-Haptic Virtual Environments on the Internet
Haptic sensory feedback has been shown to complement the visual and auditory senses, improve user performance and provide a greater sense of togetherness in collaborative and interactive virtual environments. However, we are faced with numerous ...
Communication Service Provider's Choice between OSPF and IS-IS Dynamic Routing Protocols and Implementation Criteria Using OPNET
This paper presents th implementation criteria to be made when th choice is between OSPF and IS-IS protocols that ar link state protocols and use the same Dijkstra algorithm for computing the best path through the network. Here a comparison is made ...
A New Data-Conjugate Intercarrier (ICI) Self-Cancellation for ICI Reduction in Space Time Frequency Block Codes MIMO-OFDM System
The objective of this research is to propose a new data conjugate sub carrier mapping technique that combines ICI self cancellation method using data allocation in space-time-frequency block codes (STFBC) MIMO-OFDM system. It aims to achieve maximum ...
Dynamic Multiple Pattern Detection Algorithm
The multiple pattern matching has always been a significant principle for applying to a network security system. This principle is adapted to accommodate the target patterns to be detected in a pre-processing phase, and the objective text and the ...
Performance Analysis of Cross-Layer MAC and Routing Protocols in MANETs
As Mobile Ad hoc Networks (MANETs) gains popularity, the need for suitable ad hoc MAC and routing protocols will continue to grow. Cross-layer design is an emerging proposal to support flexible layer approaches in MANETs. Less remaining hop More ...
Packet Scheduling Scheme for Multiple Services in Mobile WiMAX System
In Mobile WiMAX system, it is important to allocate resources appropriately in order to the efficient utilization of resources among a variety of real-time and non real-time services. Although a lot of the real-time and non real-time packet scheduling ...
Providing Time Based Fairness in Multi Rate Ad Hoc Network
Generally, there appears to be a direct relationship between the data rate and the throughput in single rate network. However, under multi rate networks, the long term throughput of each station becomes largely independent of its own data rate, rather, ...
A Compact 8-Bit AES Crypto-processor
Advance Encryption Standard (AES), has received significant interest over the past decade due to its performance and security level. In this paper, we propose a compact 8-bit AES crypto-processor for area constrained and low power applications where ...
WIFI-Based Indoor Positioning System
The easy access and availability of wireless technologies and mobile computing and internet have lead to new opportunities in developing mobile applications which purpose is to make people’s life more easier. Nowadays, a person can possess more than one ...
A Framework for Performance Analysis of Client/Server Based SOA and P2P SOA
An analytical framework is developed to derive the response time and service availability of client/server based SOA and P2P based SOA. The impact on the response time and service availability for varying load conditions and connectivity for both client/...
Wireless Intrusion Detection System Using a Lightweight Agent
The exponential growth in wireless network faults, vulnerabilities, and attacks make the Wireless Local Area Network (WLAN) security management a challenging research area. Deficiencies of security methods like cryptography (e.g. WEP) and firewalls, ...
Towards Forecasting Low Network Traffic for Software Patch Downloads: An ARMA Model Forecast Using CRONOS
The usage of the Internet has become ubiquitous, even for desktop applications to assume that the computer system it is running on is connected to the Internet. Desktop applications rely on the Internet connectivity for software license authentication ...
PICCO: Protocol Independent Congestion Control Method Using Mobile Relays for Ad-Hoc Networks
The limited lifetime of batteries and the bandwidth limitation of channels are the major issues in Ad-hoc networks. The term Congestion is usually associated with the bandwidth issues. The bandwidth keeps varying and when there is insufficient bandwidth ...
Research on Virtual Network for Virtual Mobile Network
In recent years, Network Virtualization has become a big issue which is utility computing, grid computing and cloud computing. Network virtualization provides the feasibility of running multiple architectures also, it can diversify the future Internet ...
Performance Evaluation of Routing Protocols Based on Wormhole Attack in Wireless Mesh Networks
Wireless Mesh Network is a new networking paradigm. In the development of wireless mesh networks routing is the main issue. There are different security flaws and attacks on routing protocols in wireless mesh networks. These attacks can affect the ...
Advanced Networked Server Management and Operational Implementations
The model is focused on available server management in network environments. The remote backup servers are hooked up by Virtual Private Network (VPN) and replace broken main severs immediately. A VPN is a way to use a public network infrastructure and ...
Mobility Management in Heterogeneous Wireless Access Network with IEEE 802.21 Services
Roaming across different access technologies permit people to access Internet via heterogeneous wireless networks such as WLAN, WiMAX, GPRS, 3G and Beyond 3G networks. The convergence of heterogeneous wireless access networks with handoff support enable ...
Comparison of Attribute Selection Methods for Web Texts Categorization
This paper presents a study on the performance of attribute selection methods to be used with Ant-Miner algorithm for web text categorization. The new generated data set by each attribute selection method was classified with Ant-Miner to see the ...
Index Terms
- Proceedings of the 2010 Second International Conference on Computer and Network Technology