Academy Publisher

Displaying 1-40 of 2374 results

  • White Papers // Mar 2014

    On Data and Virtualization Security Risks and Solutions of Cloud Computing

    Data security and virtualization security issues are two key bottlenecks restricting the application of cloud computing promoting and applications, especially for the cloud-based media computing system. In this paper, states of the art of the techniques on cloud computing data security issues, such as data encryption, access control, integrity authentication...

    Provided By Academy Publisher

  • White Papers // Mar 2014

    A Parameterizable NoC Router for FPGAs

    The Network-on-Chip (NoC) approach for designing (System-on-Chip) SoCs is currently used for overcoming the scalability and efficiency problems of traditional on-chip interconnection schemes, such as shared buses and point-to-point links. NoC design draws on concepts from computer networks to interconnect Intellectual Property (IP) cores in a structured and scalable way,...

    Provided By Academy Publisher

  • White Papers // Mar 2014

    An Efficient Dimensionality Reduction Approach for Small-sample Size and High-dimensional Data Modeling

    As for massive multidimensional data are being generated in a wide range of emerging applications, this paper introduces two new methods of dimension reduction to conduct small-sample size and high-dimensional data processing and modeling. Through combining the Support Vector Machine (SVM) and Recursive Feature Elimination (RFE), SVM-RFE algorithm is proposed...

    Provided By Academy Publisher

  • White Papers // Mar 2014

    Towards Realization of Domain-Specific Scientific Data Cloud for Material Data Sharing

    Scientific data sharing has been an important area of research for several years. However, due to the sharp increase in scientific data, the existing scientific data sharing systems are becoming complicated and cannot meet the demands of current scientific domain communication. In this paper, the realization of material scientific data...

    Provided By Academy Publisher

  • White Papers // Jan 2014

    Access Authentication Scheme Based on Authorized Certificate in Wireless Mesh Networks

    The main benefits of the access authentication in IEEE 802.11s are both easy administration of the subscribers and compatibility with IEEE 802.11i. However, there still exist some shortcomings, such as worse authentication delay, suffering from intermediate attack, lower expansibility and the inequality among users. In order to overcome these shortcomings,...

    Provided By Academy Publisher

  • White Papers // Jan 2014

    The PeerBehavior Model Based on Continuous Behavioral Observation P2P Network Neighbors

    Honor-based trust mechanism is an important means to evaluate the behavior of the P2P network node, and it is used to ensure the health of the P2P network application. Trust mechanisms need to evaluate a node to other node local trust value and local trust value because they do not...

    Provided By Academy Publisher

  • White Papers // Jan 2014

    Global Trust Value Grading Calculation Method in P2P Network

    The paper has proposed that the global situation trust value doesn't depend on any set of high trust nodes in a P2P network environment of grading calculating model. It has given its distributed implementation. This paper introduces subtraction clustering method to a large-scale network is logically divided into a number...

    Provided By Academy Publisher

  • White Papers // Jan 2014

    Improvement Priority Handoff Scheme for Multi- Service Wireless Mobile Networks

    In this paper, a new handoff strategy to improve the performance of wireless mobile networks is presented. It has been found form this study that the dropping probability of handoff calls is drastically reduced compared to the existing method of channel reservation strategy of handoff calls and the performance of...

    Provided By Academy Publisher

  • White Papers // Jan 2014

    Wireless Sensor Networks Target Localization Based on Least Square Method and DV-Hop Algorithm

    Wireless sensor node localization is one of the most crucial techniques on wireless sensor network. For reducing localization cost and improving localization accuracy, the authors propose an improved wireless sensor network DV-Hop localization algorithm. The mobile beacon node is introduced into DV-Hop and allows a moving beacon node to move...

    Provided By Academy Publisher

  • White Papers // Jan 2014

    Localization Algorithm Based on Improved Weighted Centroid in Wireless Sensor Networks

    Location technology is becoming more and more important in wireless sensor networks. The weighted centroid localization offers a fast and simple algorithm for the location equipment in wireless sensor networks. The algorithm derives from the centroid measurement and calculation device of the adjacent anchor in the average coordinate. After the...

    Provided By Academy Publisher

  • White Papers // Jan 2014

    Target Localization Based on Improved DV-Hop Algorithm in Wireless Sensor Networks

    The node localization technology of wireless sensor networks is essential and prerequisite to many applications, which it is one of the important support technologies for wireless sensor networks. The node localization is to get the position information of blind node by using location information of few known nodes and some...

    Provided By Academy Publisher

  • White Papers // Jan 2014

    An Improved K-Means Clustering Algorithm

    An improved k-means clustering algorithm based on K-means algorithm is proposed. This paper gives an improved traditional algorithm by analyzing the statistical data. After a comparison between the actual data and the simulation data, this paper safely shows that the improved algorithm significantly reduce classification error on the simulation data...

    Provided By Academy Publisher

  • White Papers // Jan 2014

    A Data-aggregation Scheme for WSN Based on Optimal Weight Allocation

    Since the measuring accuracy and environment of each sensor are different, there must exist difference in the correctness of measurement. If the testing data is not processed and utilized with distinction, it will cause impreciseness to the testing results and lead to errors of the system. It is necessary to...

    Provided By Academy Publisher

  • White Papers // Jan 2014

    Modified Particle Swarm Optimization for Hybrid Wireless Sensor Networks Coverage

    Efficient network coverage and connectivity are the requisites for most wireless sensor network deployments, particularly those concerned with area monitoring. The coverage control technology is one of the basic technologies of wireless sensor network, and is mainly concerned about how to prolong the network lifetime on the basis of meeting...

    Provided By Academy Publisher

  • White Papers // Jan 2014

    The Improvement of RFID Authentication Protocols Based on R-RAPSE

    Numerous RFID authentication protocols proposed often have some security vulnerabilities, since they lack systematic theory support. The authors had proposed a series of rules called R-RAPSE (RFID Authentication Protocol Security Enhanced Rules) for RFID authentication protocol design and verification. By three examples, this paper justifies why the protocols do not...

    Provided By Academy Publisher

  • White Papers // Jan 2014

    IDDTL: A Novel Identified Internet Data Transport Layer Mechanism

    In this paper the authors propose an IDentified Data Transport Layer (IDDTL) mechanism, which is implemented based on the authors' present concepts of Connection IDentifier (CID) and CID additional information (CID-info). Since the fast evolved internet scale and largely emerging various applications, especially with the new Internet architectures developed such...

    Provided By Academy Publisher

  • White Papers // Jan 2014

    DAIM: a Mechanism to Distribute Control Functions within OpenFlow Switches

    Telecommunication networks need to support a wide range of services and functionalities with capability of autonomy, scalability and adaptability for managing applications to meet business needs. Networking devices are increasing in complexity among various services and platforms, from different vendors. The network complexity is required experts' operators. This paper explores...

    Provided By Academy Publisher

  • White Papers // Jan 2014

    Security Analysis and Improvement of User Authentication Framework for Cloud Computing

    Cloud Computing, as an emerging, virtual, large-scale distributed computing model, has gained increasing attention these years. Meanwhile it also faces many secure challenges, one of which is authentication. In this paper, the authors firstly analyze a user authentication framework for cloud computing proposed by the researcher and point out the...

    Provided By Academy Publisher

  • White Papers // Jan 2014

    Research on Channel-Multiplexed Home Intercom System Based on VoIP

    In this paper, the authors propose an intelligent channel multiplexed home intercom system based on Voice over IP (VoIP), which is different from traditional home intercom system. The transmissions of audio and video signal are both supported in the system. According to different functions, the system is mainly divided into...

    Provided By Academy Publisher

  • White Papers // Jan 2014

    Attribute-Based Certificateless Cryptographic System

    As an extension of identity-based encryption scheme, attribute-based encryption scheme also has the key escrow problem. Multi-authority attribute-based encryption schemes are principal solution, but it is at the cost of the introducing extra infrastructure and communication. This paper introduces the concept of Attribute-Based Certificatless Encryption system (ABCE), which is a...

    Provided By Academy Publisher

  • White Papers // Jan 2014

    ECDH-based Scalable Distributed Key Management Scheme for Secure Group Communication

    With the popularity of group-oriented applications, secure and efficient communication among all group members has become a major issue. An efficient key management mechanism is the base and critical technology of secure group communications. A distributed group-oriented key management scheme without the participation of third parties is proposed in the...

    Provided By Academy Publisher

  • White Papers // Jan 2014

    A List Simulated Annealing Algorithm for Task Scheduling on Network-on-Chip

    In this paper, a List Simulated Anneal (LSA) algorithm is proposed for the DAG tasks scheduling on the network-on-chip to simultaneously optimize makespan, load balance and average link load. A task list is first created for the DAG tasks, and the task-to-processor assignment is performed using best fit rule. Then...

    Provided By Academy Publisher

  • White Papers // Jan 2014

    Efficient Cryptographic Access Control Protocol for Sensitive Data Management

    In view of sensitive data management, an efficient cryptographic access control scheme is proposed. Based on attribute-based encryption, the proposed scheme not only inherits flexibility and fine-grained access control for users, but also realizes cryptographic management for servers. In additional, the scheme alleviates the administering burdens on the server, and...

    Provided By Academy Publisher

  • White Papers // Jan 2014

    UDS-FIM: An Efficient Algorithm of Frequent Itemsets Mining over Uncertain Transaction Data Streams

    In this paper, the authors study the problem of finding frequent itemsets from uncertain data streams. To the best of their knowledge, the existing algorithms cannot compress transaction itemsets to a tree as compact as the classical FP-tree, thus they need much time and memory space to process the tree....

    Provided By Academy Publisher

  • White Papers // Jan 2014

    Research on Multi-Tenant Distributed Indexing for SaaS Application

    Multi-tenant is the key feature for SaaS application, however, the traditional indexing mechanism has failed in multi-tenant shared scheme database. This paper proposed a multi-tenant distributed indexing mechanism. The authors create a global index first and then create the local index by MapReduce framework based on hadoop. They also proposed...

    Provided By Academy Publisher

  • White Papers // Jan 2014

    Distributed Service Discovery Algorithm Based on Ant Colony Algorithm

    UDDI is a Universal Description, Discovery and Integration protocol. As a public registry of web service, it is designed to store information about each company and its service. Traditional centralized service discovery structure of UDDI service registration center does not apply to large-scale service discovery. When all the services register...

    Provided By Academy Publisher

  • White Papers // Jan 2014

    A Public-Key Cryptosystem Based On Stochastic Petri Net

    In this paper, the authors present a new method to build public-key cryptosystem. The method is based on the state explosion problem occurred in the computing of average number of tokens in the places of Stochastic Petri Net (SPN). The reachable markings in the coverability tree of SPN are used...

    Provided By Academy Publisher

  • White Papers // Jan 2014

    Survey of Community Structure Segmentation in Complex Networks

    Social network is to reflect the relationship between the nodes which are in the intra-group or in the intergroup. It uses nodes to represent individuals in the network, and attachment between nodes to represent the relationship among individuals, the community to represent groups which share the same characteristic. Community structure...

    Provided By Academy Publisher

  • White Papers // Jan 2014

    A Secure Dynamic Identity Based Single Sign-On Authentication Protocol

    In the current internet world, most of the internet services are based on the single server model and use the password identity authentication to provide application service for the users?, this means that the user must enter the identity and password, before their wants to login in the application service...

    Provided By Academy Publisher

  • White Papers // Jan 2014

    Research and Implementation of an RFID Simulation System Supporting Trajectory Analysis

    Radio Frequency IDentification (RFID) has been playing more and more important roles in domains such as supply chain management, commodity retail and health custody. RFID data can support functions such as object location, object tracking and trajectory analysis. However, at some point, to deploy many RFID devices into a real...

    Provided By Academy Publisher

  • White Papers // Jan 2014

    An Ad Hoc Network Load Balancing Energy- Efficient Multipath Routing Protocol

    Multipath routing protocol establishes multiple transmission paths between source node and destination node, which can not only transmit data in parallel, but also one as main path and others as backup paths. The paper proposed a multipath routing protocol PL-AOMDV with power controlling and load balancing based on AOMDV. In...

    Provided By Academy Publisher

  • White Papers // Dec 2013

    Artificial Immunity-based Security Response Model for the Internet of Things

    Rapid expansion of the Internet of Things (IoT) caused more and more security problems and attacks in particular. Secure IoT needs reasonable disposition after or when being attacked. To meet the above requirements of IoT security, a security response model for IoT based on artificial immune system is proposed in...

    Provided By Academy Publisher

  • White Papers // Dec 2013

    The Future Internet: Towards Convergence of Cognition, Cooperation, Cross-layer, Virtualization and Cloud-computing

    In order to deal with the situation that current Internet cannot meet application requirements, the authors analyze the three features - pervasiveness, heterogeneity and intelligence that the future Internet possesses firstly. Secondly, they syncretize the technologies of cognition, cooperation, cross-layer, virtualization and cloud computing, and present a new architecture and...

    Provided By Academy Publisher

  • White Papers // Dec 2013

    Quantum Public-Key Cryptosystem Based on Super Dense Coding Technology

    In this paper the authors provide a quantum public-key cryptosystem based on super dense coding technology. A user Alice shares a set of Einstein-Podolsky-Rosen (EPR) pairs with a Key Management Center (KMC) in which the particles hold by Alice are the private key and the particle hold by KMC are...

    Provided By Academy Publisher

  • White Papers // Dec 2013

    User-Online Load Movement Forecasting for Social Network Site Based on BP Artificial Neural Network

    A social network site is one social structure made up of a set of users including individuals or organizations, which plays a very import pole in the digital age. It has been one type of fashion online platform at providing services on facilitating the establishment of social networks or social...

    Provided By Academy Publisher

  • White Papers // Dec 2013

    Efficient Two-Factor Authentication Protocol Using Password and Smart Card

    Two-factor authentication using password and smart card could reduce the risk than the use of a password alone. Recently, the researcher proposed a two-factor remote user authentication protocol using password and smart card and provides the criteria of authentication protocols. They claimed their protocol is secure against certain known attacks....

    Provided By Academy Publisher

  • White Papers // Dec 2013

    (WHASG) Automatic SNORT Signatures Generation by Using Honeypot

    An Intrusion Detection System (IDS) is an important network security component that is used to monitor network traffic and detect attack attempts. A signature based intrusion detection system relies on a set of predefined signatures to detect an attack. Due to \"Zero-day\" attacks (i.e. new unknown attacks) conventional IDS will...

    Provided By Academy Publisher

  • White Papers // Dec 2013

    Attribute Based DRM Scheme with Efficient Revocation in Cloud Computing

    The existing Digital Rights Management (DRM) schemes in cloud computing introduce a heavy computation overhead on the content provider for key distribution. In this paper, the authors propose an attribute-based DRM scheme in cloud computing by combining the techniques of Ciphertext-Policy Attribute-Based Encryption (CP-ABE) and Proxy REencryption (PRE). They first...

    Provided By Academy Publisher

  • White Papers // Dec 2013

    Proxy Re-encryption Scheme Based on New Multivariate Quadratic Assumptions

    In PKC 2012, a public key encryption based on new multivariate quadratic assumptions is proposed. The compactness and security of the algorithm illumined the authors in applying it in proxy re-encryption scheme. In this paper, a novel unidirectional PRE scheme (NMQ-PRE) is constructed based on new multivariate quadratic assumptions. The...

    Provided By Academy Publisher

  • White Papers // Dec 2013

    Available Bandwidth Estimation Strategy Based on the Network Allocation Vector

    Available bandwidth is of great importance to network quality of service assurance, network load balancing, streaming media rate control, routing, and congestion control, etc. In this paper, the available bandwidth estimation strategy based on the network allocation vector for wireless sensor networks is proposed. According to the size of the...

    Provided By Academy Publisher

  • White Papers // Mar 2014

    On Data and Virtualization Security Risks and Solutions of Cloud Computing

    Data security and virtualization security issues are two key bottlenecks restricting the application of cloud computing promoting and applications, especially for the cloud-based media computing system. In this paper, states of the art of the techniques on cloud computing data security issues, such as data encryption, access control, integrity authentication...

    Provided By Academy Publisher

  • White Papers // Mar 2014

    A Parameterizable NoC Router for FPGAs

    The Network-on-Chip (NoC) approach for designing (System-on-Chip) SoCs is currently used for overcoming the scalability and efficiency problems of traditional on-chip interconnection schemes, such as shared buses and point-to-point links. NoC design draws on concepts from computer networks to interconnect Intellectual Property (IP) cores in a structured and scalable way,...

    Provided By Academy Publisher

  • White Papers // Mar 2014

    An Efficient Dimensionality Reduction Approach for Small-sample Size and High-dimensional Data Modeling

    As for massive multidimensional data are being generated in a wide range of emerging applications, this paper introduces two new methods of dimension reduction to conduct small-sample size and high-dimensional data processing and modeling. Through combining the Support Vector Machine (SVM) and Recursive Feature Elimination (RFE), SVM-RFE algorithm is proposed...

    Provided By Academy Publisher

  • White Papers // Mar 2014

    Towards Realization of Domain-Specific Scientific Data Cloud for Material Data Sharing

    Scientific data sharing has been an important area of research for several years. However, due to the sharp increase in scientific data, the existing scientific data sharing systems are becoming complicated and cannot meet the demands of current scientific domain communication. In this paper, the realization of material scientific data...

    Provided By Academy Publisher

  • White Papers // Sep 2009

    An Efficient Data Aggregation Algorithm for Cluster-Based Sensor Network

    Data aggregation in wireless sensor networks eliminates redundancy to improve bandwidth utilization and energy-efficiency of sensor nodes. One node, called the cluster leader, collects data from surrounding nodes and then sends the summarized information to upstream nodes. In this paper, the authors propose an algorithm to select a cluster leader...

    Provided By Academy Publisher

  • White Papers // Aug 2009

    Target-Oriented Routing Algorithm Based on Sequential Coordinates for Autonomous Wireless Sensor Network

    Wireless sensors implementation in process automation applications is a forwarding step for wireless sensor network. Autonomous network structure is considered as an option for such implementation. Autonomous wireless sensor/actuator networks require a target-oriented routing algorithm. In the first section the perception of autonomous network with an example is explained. It...

    Provided By Academy Publisher

  • White Papers // Aug 2009

    Design and Implementation of Automatic Fire Alarm System Based on Wireless Sensor Networks

    Fire disaster is a great threat to lives and property. Automatic fire alarm system provides real-time surveillance, monitoring and automatic alarm. It sends early alarm when the fire occurs and helps to reduce the fire damage. Wireless sensor network has become the most important technology in environmental monitoring and home...

    Provided By Academy Publisher

  • White Papers // Feb 2009

    Effective Location Management of Mobile Actors in Wireless Sensor and Actor Networks

    Recent years have witnessed an increasing availability of heterogeneous sensor networks that consist of a large number of resource constrained nodes (sensors) and a small number of powerful resource rich nodes (actors). Such heterogeneous Wireless Sensor Actor Network (WSANs) offer improvement of sensor networks' capacity/coverage, energy conservation and network lifetime....

    Provided By Academy Publisher

  • White Papers // Nov 2009

    Accurate Localization Technique Using Virtual Coordinate System in Wireless Sensor Networks

    The problem of localization, i.e., to physically locate the nodes in Wireless Sensor Network (WSN) is a challenging one. In spite of this, it plays an extremely crucial role in many next generation pervasive and sensor network functionalities. Considerations while practically implementing a network, such as the small size, cost...

    Provided By Academy Publisher

  • White Papers // Nov 2009

    The Effects of Spreading Factor on the Data Gathering Performance of Low Energy Adaptive Clustering Hierarchy (LEACH)

    Low Energy Adaptive Clustering Hierarchy (LEACH) guided a considerable portion of the research, and is used as benchmark, in energy efficient data gathering schemes in wireless sensor networks. In it, the probabilistic and randomized selection strategy of clusterhead selection results in their variable number, during different rounds of data gathering....

    Provided By Academy Publisher

  • White Papers // May 2009

    Power Saving Method for Target Tracking Sensor Networks to Improve the Lifetime

    Target tracking sensor networks monitor and track the movement of a target object. Power management in these sensor networks is crucial to prolong the network lifetime. The authors propose a new protocol PMM (Power Management Method for tracking sensor networks) that provides a dynamic sleep schedule for the radios such...

    Provided By Academy Publisher

  • White Papers // Nov 2008

    Link Quality Estimated TCP for Wireless Sensor Networks

    In a large-scale sensor network individual sensors can be compromised to inject bogus sensing reports. While SEF can filter out the outfield false reports, it is incapable of detecting the in-field compromised nodes, which may collect sufficient number of keyed Message Authentication Codes (MAC). An in-field attack proof mechanism is...

    Provided By Academy Publisher

  • White Papers // May 2009

    An Adaptive Energy Efficient MAC Protocol: S-MAC, Its Performance Analysis and Improvements

    In wireless sensor networks and ad hoc networks, energy uses are in many cases the most important constraint since it corresponds directly to operational lifetime. It's due to their remoteness; it makes inability to resupply power to these energy-constrained devices. Therefore to extend a wireless sensor network's effectiveness, the lifetime...

    Provided By Academy Publisher

  • White Papers // Nov 2009

    Energy Minimization Scheme for Cluster Based Sensor Networks

    Wireless sensor networks consist of spatially distributed sensor devices with sensing, computation capabilities and wireless communication. A critical issue in wireless sensor networks is the limited availability of energy and hence optimizing energy is very important. In any sensor node, transitions from idle to busy state and vice versa consume...

    Provided By Academy Publisher

  • White Papers // Aug 2009

    A Power Aware Minimum Connected Dominating Set for Wireless Sensor Networks

    Connected Dominating Set (CDS) problem in unit disk graph has a significant impact on an efficient design of routing protocols in wireless sensor networks. In this paper, an algorithm is proposed for finding Minimum Connected Dominating Set (MCDS) using Dominating Set. Dominating Sets are connected by using Steiner tree. The...

    Provided By Academy Publisher

  • White Papers // Sep 2008

    Impacts of Radio Access Protocols on Cooperative Vehicle Collision Avoidance in Urban Traffic Intersections

    The Intelligent Transportation System (ITS) architecture is currently being developed for enhancing vehicle safety using Vehicle-To-Vehicle (V2V) and Vehicleto-Roadside (V2R) communications. Dedicated Short Range Communication (DSRC), an emerging communication standard for ITS, was developed for 75 Mhz spectrum at the 5.9 Ghz band. Although IEEE 802.11p is recommended as the...

    Provided By Academy Publisher

  • White Papers // Nov 2009

    Cover-Free Family Based Efficient Group Key Management Strategy in Wireless Sensor Network

    An algorithm of Localization is proposed to solve problems of DV-Hop overlapping and localization inaccuracy by adopting RSSI ranging technology to do subsidiary localization. A reasonable RSSI model is set up and introduced. The ratio of different distance can be gained from the measured value of RSSI ratio. Compared the...

    Provided By Academy Publisher

  • White Papers // Nov 2009

    Research and Application in the Key Technology of Wireless Sensor Network Location System

    An algorithm of Localization is proposed to solve problems of DV-Hop overlapping and localization inaccuracy by adopting RSSI ranging technology to do subsidiary localization. A reasonable RSSI model is set up and introduced. The ratio of different distance can be gained from the measured value of RSSI ratio. Compared the...

    Provided By Academy Publisher

  • White Papers // Nov 2008

    Multi-Target Tracking Using Wireless Sensor Networks Based on Higher-Order Voronoi Diagrams

    In a large-scale sensor network individual sensors can be compromised to inject bogus sensing reports. While SEF can filter out the outfield false reports, it is incapable of detecting the in-field compromised nodes, which may collect sufficient number of keyed Message Authentication Codes (MAC). An in-field attack proof mechanism is...

    Provided By Academy Publisher

  • White Papers // Nov 2008

    In-Field Attack Proof of Injected False Data in Sensor Networks

    In a large-scale sensor network individual sensors can be compromised to inject bogus sensing reports. While SEF can filter out the outfield false reports, it is incapable of detecting the in-field compromised nodes, which may collect sufficient number of keyed Message Authentication Codes (MAC). An in-field attack proof mechanism is...

    Provided By Academy Publisher

  • White Papers // May 2009

    Key Management Schemes for Secure Communication in Heterogeneous Sensor Networks

    Hierarchical Sensor Network organization is widely used to achieve energy efficiency in Wireless Sensor Networks (WSN). To achieve security in hierarchical WSN, it is important to be able to encrypt the messages sent between sensor nodes and its cluster head. The key management task is challenging due to resource constrained...

    Provided By Academy Publisher

  • White Papers // Sep 2009

    Multi-Hop Multi-Path Cooperative Connectivity Guided by Mobility, Throughput, and Energy Awareness: A Middleware Approach

    The widespread diffusion of portable devices with multiple wireless interfaces, e.g., UMTS/GPRS, IEEE 802.11, and/or Bluetooth, is enabling multi-homing and multi-channel scenarios, possibly made up by multi-hop cooperative paths towards the traditional Internet. The authors claim that there is the need for novel middleware, aware of innovative context information, to...

    Provided By Academy Publisher

  • White Papers // May 2009

    A New Approach to Improve the Efficiency of Distributed Scheduling in IEEE 802.16 Mesh Networks

    The recent standard for broadband wireless access networks, IEEE 802.16, which resulted in the development of metropolitan area wireless networks, includes two network organization modes: Point to Multi Point and Mesh. The mesh mode provides distributed channel access operations of peering nodes and uses TDMA technique for channel access modulation....

    Provided By Academy Publisher

  • White Papers // May 2009

    Efficient Algorithms for Verification of UML Statechart Models

    In this paper, the authors present algorithms devised for the automatic verification of UML(Unified Modeling Language) statechart models. The basic algorithm checks the safety property violation during the construction (on-the-fly) of the state space graph and if any property violation is found, it generates a counter example. The second algorithm...

    Provided By Academy Publisher

  • White Papers // Aug 2009

    Content-Based Video Quality Prediction for MPEG4 Video Streaming Over Wireless Networks

    There are many parameters that affect video quality but their combined effect is not well identified and understood when video is transmitted over mobile/ wireless networks. In addition, video content has an impact on video quality under same network conditions. The main aim of this paper is the prediction of...

    Provided By Academy Publisher

  • White Papers // Nov 2009

    Handoff in Heterogeneous Wireless Networks by Adjusting the Transmission Power [RSS]/Rate

    The main objective of this paper is to evaluate the conditions and restrictions under which seamless multimedia Quality of Service (QoS) provision across 4G is possible. One vital component for the provision of seamless multimedia session continuity is the QoS consistency across these heterogeneous networks. This is vital indeed because...

    Provided By Academy Publisher

  • White Papers // Oct 2009

    A Personalized Stock Investors Alert System

    Stock investors all agree that one of the hardest things they have to do is keep up with the rapid changes in the markets. The Internet carries a huge amount of up-to-the minute information for investors such as current stock prices, exchange rates, sales volumes, latest deals, trading averages, organizations'...

    Provided By Academy Publisher

  • White Papers // May 2008

    Testing Software Assets of Framework-Based Product Families During Application Engineering Stage

    An application framework provides reusable design and implementation for a family of software systems. At the application engineering stage, application developers extend framework assets to build their particular framework instantiations. Typically, framework software assets are tested before being used. However, achieving complete coverage of a system under test is impossible...

    Provided By Academy Publisher

  • White Papers // Jul 2010

    Research on Optimistic Fair Protocol for Cascading P2P Exchange

    In simple electronic commerce transaction, some parties serve as vendors, and the others act as buyers. Usually vendors receive the payment instrument, and subsequently cash it from the bank, instead of using it for buying goods from other vendors. However, in P2P payment environment, some peers serve as both vendors...

    Provided By Academy Publisher

  • White Papers // Feb 2009

    A Method for Analyzing and Predicting Reliability of BPEL Process

    As an important means to compose independent services together to fulfill a function, service composition is widely applied in different applications. However, the process of composition is complex and error-prone, which makes a formal modeling and analysis method highly desirable. A BPEL process based on Petri net (BPEL-Net) model is...

    Provided By Academy Publisher

  • White Papers // Aug 2009

    A New Method to Detect Abnormal IP Address on DHCP

    Dynamic Host Configuration Protocol (DHCP) provides a means of allocating and managing IP addresses dynamically over a network. An important characteristic of the DHCP server is that different hosts or network cards are not allowed to simultaneously use the same IP address in the DHCP mechanism. However, anyone can guest...

    Provided By Academy Publisher

  • White Papers // Nov 2008

    An Intelligent Home Environment Based on Service Planning Over Peer-to-Peer Overlay Network

    With the population of network usage, it is possible to connect home appliances with each other. The basic demand is to connect home appliances easily with fewer users intervening and home network is a complex environment which comprises several network architecture including ethernet, wireless network, or power-line etc.. Therefore, integrating...

    Provided By Academy Publisher

  • White Papers // Jun 2011

    Analytical Design of PID Decoupling Control for TITO Processes With Time Delays

    Based on unit feedback closed-loop control structure, a simple analytical design method of decoupling controller matrix is proposed in terms of idea of coupling matrix for Two-Input-Two-Output (TITO) processes with time delays in chemical and industrial practice. By means of powerful robustness of two degree-of-freedom PID Desired Dynamic Equation (DDE)...

    Provided By Academy Publisher

  • White Papers // May 2009

    Key Issues for Implementing Configuration Management

    Effective, reliable and flexible IT services are more and more critical to the success of business initiatives today. Enterprises are increasingly seeking to transform IT from a traditional technology provider to a reliable, low-cost IT service provider. How can an enterprise safely transform its IT organization. Many IT organizations are...

    Provided By Academy Publisher

  • White Papers // Jun 2009

    Lossless Data Hiding Scheme Using Adjacent Pixel Difference Based on Scan Path

    This paper presents a reversible data hiding scheme. The proposed scheme is based on the difference histogram shifting to spare space for data hiding. Nine basic scan paths are defined, and this means all-directional adjacent pixel differences can be obtained. Due to the fact that the grayscale values of adjacent...

    Provided By Academy Publisher

  • White Papers // Aug 2009

    Research on Development Process Methods of Management Information System

    While introducing briefly the development process of Management Information System (MIS), the paper depicts three kinds of development methods which in common use, such as the Structured Development, Prototyping Development and Object-Oriented Development. On the base of this, it puts forward the problem of oneness about them by comparing three...

    Provided By Academy Publisher

  • White Papers // May 2009

    Choosing Credit Risk Index for Listed Companies Based on Grey Clustering Method

    The credit standing of listed companies is a key index that investors usually place high importance on, and thus many methods are developed for analyzing it. However, no matter what method is used, the authors have to face the problem of choosing proper indexes before analyzing and forecasting. This paper...

    Provided By Academy Publisher

  • White Papers // Aug 2009

    Cooperative Inter-Vehicle Communication Protocol With Low Cost Differential GPS

    This paper describes a cooperative MANET protocol dedicated to intelligent transport systems, named CIVIC (Communication Inter V?hicule Intelligente et Coop?rative). The CIVIC protocol is an auto-configuration inter-vehicle communication protocol, which supports adhoc and infrastructure networks, contains reactive and proactive routing components, and adapts different wireless standards. It is a context-aware...

    Provided By Academy Publisher

  • White Papers // Nov 2009

    Energy Efficient Ad Hoc on Demand Multipath Distance Vector Routing Protocol

    Mobile Ad Hoc NETwork (MANET) routing is challenged by power and bandwidth constraints as well as frequent topology changes to which it must adapt to and converge quickly. Energy efficient routing protocols play an important role in MANET. This paper presents an innovative energy aware routing protocol for wireless ad...

    Provided By Academy Publisher

  • White Papers // May 2009

    A Novel Trajectory Clustering Technique for Selecting Cluster Heads in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) suffers from the hot spot problem where the sensor nodes closest to the base station are need to relay more packet than the nodes farther away from the base station. Thus, lifetime of sensory network depends on these closest nodes. Clustering methods are used to extend...

    Provided By Academy Publisher