Volume 3, Issue 3, March 2013

A New Route Maintenance Approach for Dynamic Source Routing Protocol in Mobile Ad Hoc Networks [Full Text]

Ragb O. M. Saleh, Md Yazid Mohd Saman and Mohd Nordin Abdul Rahman

Abstract - The Dynamic Source Routing (DSR) is a routing protocol for Mobile Ad-hoc Networks (MANETs). DSR typically utilizes mechanisms for route discovery and route maintenance. It depends on the route maintenance mechanism to increase delivery ratio, reduce the routing overhead and route discovery latency. The mobility of nodes can cause routes to become unfeasible and data packets may be dropped. In this paper, we propose a new packet salvaging approach to route maintenance mechanism. This mechanism is invoked only when a failure link is detected during data transmission; at the same time, salvaging process starts by the node which cannot send a packet to next hop in the source route. As soon as first attempt has failed, intermediate nodes will attempt to salvage data packets rather than waiting for a new route discovery mechanism. Data salvaging process works by adding information into the route error packet, which aid upstream nodes to find alternative route for prevent data packets from drop. To evaluate our approach, we have added it to the DSR protocol and evaluated its impact on the performance using detailed simulations. The results show that the proposed salvaging approach significantly improves the performance of DSR in terms of packet delivery ratio, routing overhead and dropped packets. 


Effect of Synchronization on Uplink Capacity Enhancement of WCDMA [Full Text]

Mridula S. Korde and Abhay S.Gandhi

Abstract— Uplink synchronization can be a method to reduce the multiple access interference (MAI) by means of exploiting the uplink orthogonality and thereby increase the capacity of WCDMA systems. In this paper, the performance of uplink synchronous WCDMA has been assessed in terms of the capacity gain relative to an equivalent asynchronous system. The capacity gain has been evaluated theoretically and by means of MATLAB1 simulations for scenarios with different orthogonality factors. Synchronization plays an important role in enhancing the capacity gain of uplink WCDMA system. Orthogonality of codes is directly dependent on synchronization, which in turn increases the capacity gain. 


Kids’ Learn Station Interactive learning tool for kids [Full Text]

S.M.C Rupasinghe, T.S Rupasinghe, T.D.C.L Jayasuriya, D.M.A Reyhart, M.M.P.N. Walgampaya and N. Ranpatabandi

Abstract— In the modern world, due to long working hours and employment responsibilities the quality time spent by parents with their children have drastically decreased. Without supervised guidance and support children could spend their afternoons playing video games, watching TV and getting into mischief until their parents arrive. Hence a solution that helps children spend time more effectively and productively while learning essential skills and academic work would be seen as an investment by parents for the future of their children. The computerized learning tool was designed and developed to address this while making the experience an enjoyable one for the young users. This tool is targeted for school children between the ages six and eight. The system provides interactive audio and video guidance that would be used by a child to navigate the program without the guidance of an adult. The learning tool gradually guides a child in improving primary English language skills, Arithmetic skills and object identification skills. Learned kit is equipped with play cards with English alphabet letters, numbers and pictures. The application identifies the images on the cards through the use of image processing techniques. This interactive nature makes the application an attractive play tool for the child who enables seamless learning while having an entertaining time all the while helping the child acquire the necessary skills and familiarity to work on computers and operating systems. 


Providing Anonymity for RFID Systems [Full Text]

Wissam Razouk, Ferucio Laurentiu Tiplea, Abderrahim Sekkaki and Cosmin Varlan

Abstract—Radio Frequency Identification (RFID) is considered as the next generation technology, and is certainly playing an important role for several applications. Therefore, security is a pressing need for various cases. However, Low-cost RFID tags are very constrained devices and cannot apply the existing cryptographic algorithms due to computation and memory size restrictions. Consequently, RFID systems are vulnerable to numerous security attacks, which imply many privacy issues. In this paper, we propose a security protocol that fits low-cost RFID tags requirements, and provides data protection and location privacy for the consumer. Moreover, different from previous works, our protocol enables searching on encrypted data without leaking any information, and provides also protection based on the assumption that the server is not necesserally considered as a trusted third party. We present the formal proof of correctness of our scheme based on GNY Logic.