Academy Publisher

Displaying 1-40 of 2727 results

  • White Papers // Oct 2014

    Trusted Puzzle Solvers without Clock Support Against Spam and Denial-of-Service Attacks

    Spam and Denial-of-Service (DoS) attacks are growing threats on the internet. Cryptographic puzzles can be used to address the problem effectively. Additionally, the Trusted Puzzle Solver (TPS), which is similar to the Trusted Platform Module (TPM), is also proposed to help constructing crypto puzzles that may have some outstanding specialties...

    Provided By Academy Publisher

  • White Papers // Oct 2014

    Optimizing Test Case Execution Schedule Using Classifiers

    As software evolves, test suite continually grows larger. However running all the test cases in the test suite is prohibitive in most cases. To reduce the cost of regression testing, the authors can optimize test case execution schedule to maximize the early fault detection rate of the original test suite....

    Provided By Academy Publisher

  • White Papers // Oct 2014

    Distributed Storage and Processing Method for Big Data Sensing Information of Machine Operation Condition

    The traditional relational database cannot satisfy the requirements of the high speed and real-time storage and processing for the distributed big data sensing information in the wide area network environment. In this paper, the No-SQL database H-Base is used to store the big data sensing information of machine operation condition...

    Provided By Academy Publisher

  • White Papers // Oct 2014

    Reliability and Portability Assessment Tool Based on Hazard Rates for an Embedded Open Source Software

    An embedded OSS (Open Source Software) known as one of OSS has been gaining a lot of attention in the embedded system area, i.e., Android, BusyBox, TRON, etc. However, the poor handling of quality problem and customer support prohibit the progress of embedded OSS. Therefore, many companies have been hesitant...

    Provided By Academy Publisher

  • White Papers // Oct 2014

    A Proposal for a Method to Translate MAP Model Into BPMN Process Diagram

    In this paper, the authors present a method to bridge the gap between intentional process modeling and business process modeling. The first represent the business objectives of an enterprise and the strategies used in order to achieve these objectives, while the second concentrate on the business processes. The proposed method...

    Provided By Academy Publisher

  • White Papers // Oct 2014

    Hybrid Adaptive Software Development Capability: An Empirical Study

    Software intensive organizations require the integration of agility, people, process, product and tool elements for establishing a hybrid adaptive software development capability. This paper presents the results of the empirical study that has been conducted to identify the important underlying characteristics of the hybrid adaptive software development capability elements. Based...

    Provided By Academy Publisher

  • White Papers // Oct 2014

    Research on Real-Time Performance Testing Methods for Robot Operating System

    To test real-time performance of RGMP-ROS, a robot operating system, this paper takes an in-depth study of the basic functions of real-time operating system kernel. By analyzing the main factors that affect the real-time performance of an operating system, the authors propose a set of real-time performance testing methods based...

    Provided By Academy Publisher

  • White Papers // Oct 2014

    3D CAD Model Representation and Retrieval Based on Hierarchical Graph

    Due to 3D CAD models are often characterized with complicated geometry and topology, how to help the designers quickly and accurately find the object models from the database containing massive amount of models using the relatively rough query instance is still a big challenge. In this paper, a novel representation...

    Provided By Academy Publisher

  • White Papers // Oct 2014

    Dynamic Routing in Distributed File System

    Mobile devices, such as smart phones, tablets, and netbooks, are now becoming increasingly popular. Effective access to remote files on servers in the network should be granted to the user. Today's common distributed file systems, such as OpenAFS, Coda, and others, are not suitable for use on mobile devices. The...

    Provided By Academy Publisher

  • White Papers // Oct 2014

    An Enhanced Hill Cipher and Its Application in Software Copy Protection

    To protect software from unauthorized use, registration key is frequently used in the field of permission control. For the security of such a system, the key issue is to design a robust algorithm. The authors propose an enhanced scheme of hill cipher based on variable modulus and algebraic alphabet to...

    Provided By Academy Publisher

  • White Papers // Oct 2014

    Simulation and Implementation of Adaptive Fuzzy PID

    With the exponential growth of the Internet traffic, congestion problems become severe. To solve these severe problems, the Internet Engineering Task Force (IETF) recommends implementing the Active Queue Management (AQM) mechanism on the internet routers. This paper introduces a robust AQM algorithm, called Adaptive Fuzzy Proportional Integral Derivative (AF-PID), which...

    Provided By Academy Publisher

  • White Papers // Oct 2014

    Data Aggregation in Wireless Sensor Networks Based on Environmental Similarity: A Learning Automata Approach

    Sensor networks are established of many inexpensive sensors with limited energy and computational resources and memory. Each node can sense special information, such as the temperature, humidity, pressure and so on and then send them to the central station. One of the major challenges in these networks, is limit energy...

    Provided By Academy Publisher

  • White Papers // Oct 2014

    Weighing Technology for High-Speed Moving Vehicle Based on Wireless Sensor Networks

    In this paper, the authors focuses on the weakening or eliminating low frequency dynamic load of vehicle dynamic weighing, improve the efficiency and accuracy of dynamic weighing system, weighing the purpose of. Wireless Sensor Network (WSN) is deployed in the monitoring region of sensor nodes; the nodes achieve interconnectivity through...

    Provided By Academy Publisher

  • White Papers // Oct 2014

    Unified Identity Authentication Between Heterogeneous Systems Based on LDAP and RBAC

    To solve the problems of unified identity authentication between heterogeneous application systems that emerged in the procedure of informatization construction. The paper presents a 3-tier architecture solution that contains user tier, unified authentication tier and application system tier to realize unified identity authentication between legacy system and new application system....

    Provided By Academy Publisher

  • White Papers // Oct 2014

    Fault Detection of Remote Multimedia in Wireless Network Based on Fuzzy Neural Network

    With the development of computer technology, the architecture of computer system has been evolved into a highly complex nonlinear system structure. According to the theory of artificial intelligence, computer system can quickly reflect the basic features of the function in human beings' brain by simulation. Based on the control principles...

    Provided By Academy Publisher

  • White Papers // Oct 2014

    A Forward Error-Tolerant Reassembly Method for Receiving Network Data

    Reassembly is an important operation for receiving network data. A fragment with errors is discarded by the conventional reassembly, which renders the information content of the whole fragment lost. The paper claims that the underlying associated relationships among the network data may bring the gain of Forward Error Correction (FEC)....

    Provided By Academy Publisher

  • White Papers // Oct 2014

    A System-Level Protocol-Based Methodology for Noise Analysis of Digital Networked Systems

    Reliability and noise tolerance represent important requirements for electronic systems and in particular for networked systems, especially in critical working conditions. Reliability and noise tolerance mostly concern the communication tasks between the network nodes, which are implemented complying with formal protocol rules. The challenging target for a reliability analysis is...

    Provided By Academy Publisher

  • White Papers // Oct 2014

    An Improved Tone Reservation Scheme Based Nearly Optimal Peak Reduction for Adaptive Amplitude Clipping

    Orthogonal Frequency Division Multiplexing (OFDM) suffers from a high Peak to Average Power Ratio (PAPR). Tone Reservation (TR) technology is considered as one of the most promising methods because of no additional distortion, no side information, and low implementation cost. However, in all PAPR reduction schemes, determining the optimal target...

    Provided By Academy Publisher

  • White Papers // Oct 2014

    Research on the Function Consistency of the Network Element based on Atomic Capability Architecture

    When the functions of a network element (such as router, switch, etc.) based on ATomic Capability (ATC) architecture is reconstructed dynamically, the topology of ATC will be changed. The process of this reconstruction usually results in the fact that the ATCs being reconfigured cannot process data, and large parts of...

    Provided By Academy Publisher

  • White Papers // Oct 2014

    Hybrid TDMA/CDMA MAC Protocol for Wireless Sensor Networks

    A hybrid TDMA/CDMA MAC protocol for WSN is proposed that combines the strengths of TDMA and CDMA while offsetting their weaknesses. The proposed scheme allows the network to operate in a collision-free manner, and takes advantage of broadband property provided by CDMA. The main features of this hybrid protocol are...

    Provided By Academy Publisher

  • White Papers // Oct 2014

    Collaborative Outsourced Data Mining for Secure Cloud Computing

    Data mining is becoming an increasingly important technology for the information society. Due to limited computational resources of data owners and the prevalence of cloud computing, outsourced data mining is becoming more and more attractive. The privacy and security issues are becoming outstanding recently. Though the existing model of cloud...

    Provided By Academy Publisher

  • White Papers // Oct 2014

    Research on Wireless MIL-STD-1553B Bus Based on Infrared Technology

    Infrared technology has the benefits of low mass, size, power and cost, minimum ElectroMagnetic Interference (EMI), efficient and reliable data transfer, which is suitable for the communications in small spacecrafts. A wireless data bus system based on infrared technology for intraspacecraft communication is proposed in this paper. The bus protocol...

    Provided By Academy Publisher

  • White Papers // Oct 2014

    Multi-Attribute Join Query Processing in Sensor Networks

    Wireless Sensor Networks (WSNs) can be viewed as energy constrained database systems, and join query processing is a very important topic in the field of sensor based systems. Join query for WSNs in a multi-dimensional and continuous way has not been widely explored, as well as is not energy efficient...

    Provided By Academy Publisher

  • White Papers // Oct 2014

    Research on the Spread Control of Unconfirmed Information after the Emergency Occurs based on the Topic Model

    People are hungry for information about the emergency event, and are also inadvertently become unconfirmed information disseminator. To solve this problem, this paper proposes an Un-Confirmed Information Diffusion control strategy (UCID). Firstly, it filters the unconfirmed information propagate users sequence by the topic model, and then combines the node position...

    Provided By Academy Publisher

  • White Papers // Oct 2014

    MSK-BCS Modulation for GNSS Radio Frequency Compatibility in C Band

    Due to insufficient Radio Navigation Satellite Service (RNSS) portion of Radio Frequency (RF) spectrum for many services that are being planned for the future on L band where has come up a frequency overlapping situation, C band as an alternative spectral allocation has already been proposed in the previous years....

    Provided By Academy Publisher

  • White Papers // Oct 2014

    The Analysis of Information Architecture in Mobile Web Design

    The development and design of mobile web should lucubrate mobile users' psychological perception, thinking patterns, and behavior habits, etc, namely, to look at the mobile web from the users' points of view. In order to help users to save time and energy in the mission operation and reduce their cognitive...

    Provided By Academy Publisher

  • White Papers // Oct 2014

    Reliability Evaluation based on the AADL Architecture Model

    The structure of the embedded system gets much more complicated. Current basic Architecture Analysis and Design Language (AADL) reliability model cannot meet the requirements of software reliability being evaluated while being designed. For the present, reliability evaluated needs abundant fault analysis which cannot be realized in the early of software...

    Provided By Academy Publisher

  • White Papers // Oct 2014

    Distributed Community Detection Optimization Algorithm for Complex Networks

    To investigate coupled oscillator model and community detection algorithm, an improvement method about the phase synchronization oscillator model and an optimized method (community detection via model modification) was proposed. By using the kuramoto oscillator model as a basis, after joining the negative coupling strength, the nodes can be divided into...

    Provided By Academy Publisher

  • White Papers // Oct 2014

    A Correctness Verification Approach of the BPEL Exception Handling CPN Model Based on Temporal Property

    BPEL is becoming the mainstream of service oriented software, there are many exception handling models of BPEL. Toward the problem that how to guarantee the correctness of these models, this paper presents a model checking correctness approach of Colored Petri Nets (CPN) model based on temporal property, describes the temporal...

    Provided By Academy Publisher

  • White Papers // Oct 2014

    Android-based Vehicular Distributed Intelligent Video Collection System

    In order to overcome disadvantages of traditional single machine mobile video surveillance and intelligence gathering system, such as higher technical complexity, more expensive, and more slowly, a new android-based vehicular distributed intelligent video collection system is integrated by GPS, photograph, camera, network communication, 3G, IPC, H.264 encoder/decoder, wireless communication and...

    Provided By Academy Publisher

  • White Papers // Oct 2014

    A Fair Data Transmission Strategy in Underwater Acoustic Sensor Networks

    When Underwater Acoustic Sensor Networks (UASNs) transmit large amounts of data, the collisions of link layer increase, and it causes that the traffic load of link is heavier. These situations could easily lead to network data loss, unfair channel competition and unfair data transmission. In order to reduce collisions and...

    Provided By Academy Publisher

  • White Papers // Oct 2014

    Pedestrian Motion Tracking and Crowd Abnormal Behavior Detection Based on Intelligent Video Surveillance

    Pedestrian tracking and detection of crowd abnormal activity under dynamic and complex background using Intelligent Video Surveillance (IVS) system are beneficial for security in public places. This paper presents a pedestrian tracking method combing Histogram of Oriented Gradients (HOG) detection and particle filter. This method regards the particle filter as...

    Provided By Academy Publisher

  • White Papers // Oct 2014

    A New Collaborative Detection Method for LDoS Attacks

    The Low-rate Denial of Service (LDoS) attacks reduce network services capabilities by periodically sending high intensity pulse data flows. For the hidden performance of LDoS attacks, it is more difficult for traditional DoS detection methods to detect. At the same time the accuracy of the current detection methods for the...

    Provided By Academy Publisher

  • White Papers // Oct 2014

    A Near-Infrared Face Detection and Recognition System Using ASM and PCA+LDA

    Near-InfraRed (NIR) images have a lot of advantages, which can make up the shortages of Visible Light (VL) images. A novel NIR detection and recognition system is presented in this paper. First, a NIR imaging system is developed to provide good illumination conditions for subsequent face detection and recognition. Then,...

    Provided By Academy Publisher

  • White Papers // Oct 2014

    An Improvement Crypton Protocol with Higher Security Margin

    In this paper, the authors reconsider the block cipher of CRYPTON. They analyze weaknesses of the structure and components in CRYPTON, which cause many threatening attacks on it. By revising the non-linear layer, the linear layer, the key addition layer, as well as the key schedule, they construct a new...

    Provided By Academy Publisher

  • White Papers // Oct 2014

    A User Authentication Protocol Based on Multiple Factors

    In this paper, the authors propose a novel user authentication protocol which is based on multiple factors. The main idea is to improve the security of the authentication protocol by combining multiple authentication factors including biological characteristics, smart card and password together. On one hand, the protocol can provide a...

    Provided By Academy Publisher

  • White Papers // Oct 2014

    Construction Research of Computer Network System Security based on Distributed Intrusion Detection Technology

    A classified computer network is vulnerable to external and internal attacks in the internet environment. It is difficult to get a lot of training sample of the security computer network system at the actual situation. This paper aimed to analyze the security of the computer network under the distributed intrusion...

    Provided By Academy Publisher

  • White Papers // Oct 2014

    Personalized Recommendation for Digital Library using Gaussian Mixture Model

    Motivated by the rapid development of information technique, digital resources have become one of the main sources for obtaining information data. Digital library, as the most popular way for obtaining information resources in the network and so on, provides a steady flow of information resources for people on the internet....

    Provided By Academy Publisher

  • White Papers // Oct 2014

    Network Topology Algorithm Based on Energy-consumption Optimization of Multi-hop Wireless Networks

    A balanced topology intervention algorithm based on energy-consumption optimization is presented in this paper. Multilayer sequence planning algorithm is firstly adopted to convert the nonlinear optimization problem into edge-stirring mechanism and node-stirring mechanism so as to independently optimize these sub-problems, and then the solutions of these problems are adopted to...

    Provided By Academy Publisher

  • White Papers // Sep 2014

    Knowledge Unit Relation Recognition Based on Markov Logic Networks

    Knowledge Unit (KU) is the smallest integral knowledge object in a given domain. Knowledge unit relation recognition is to discover implicit relations among KUs, which is a crucial problem in information extraction. This paper proposes a knowledge unit relation recognition framework based on Markov logic networks, which combines probabilistic graphical...

    Provided By Academy Publisher

  • White Papers // Apr 2010

    A Middleware-Based Approach for Mobile Service Delivery

    Service applications in mobile environment with large potential users become more and more popular. However, there are some limitations and obstacles for service delivery in mobile environment because of the particularity of mobile network and limiting ability of mobile terminals. In order to improve the efficiency and performance of service...

    Provided By Academy Publisher

  • White Papers // Sep 2009

    CARISMA - A Service-Oriented, Real-Time Organic Middleware Architecture

    To cope with the ever increasing complexity of today's computing systems, the Concepts of Autonomic and Organic Computing (AC/OC) have been devised. Organic or autonomic systems are characterized by so-called self-X properties such as self-configuration and self-optimization. This approach is particularly interesting in the domain of distributed, embedded, real-time systems....

    Provided By Academy Publisher

  • White Papers // Nov 2009

    Improving Pairing Mechanism in Bluetooth Security

    Bluetooth has been developed to provide mobile ad hoc connectivity between a wide range of portable and fixed devices. Bluetooth is a Wireless Personal Area Network (WPAN) Standard that is moderately secure but still has weaknesses in its security architecture. One such weakness has been identified in its pairing mechanism,...

    Provided By Academy Publisher

  • White Papers // Nov 2009

    Learning to Match XML Schemas - A Decision Tree based Approach

    Schema matching, finding semantic correspondences between elements of two schemas, is an essential activity in many application domains such as data mining, data warehousing, web data integration, and XML message mapping. In this paper, a decision tree based approach is presented to match the similarity between two XML schemas. Experimental...

    Provided By Academy Publisher

  • White Papers // Nov 2009

    Exploiting XML Dom for Restricted Access of Information

    Time Bound Access (TBA) has been a major challenge for online information distribution services. A secure and constrained information transmission over the public network is the key aspect of such services wherein a genuine user who is privileged should not be denied of service under any circumstances. As it is...

    Provided By Academy Publisher

  • White Papers // May 2009

    Source Routing in Mobile Ad Hoc NETworks (MANETs)

    Mobile ad hoc network is a reconfigurable network of mobile nodes connected by multi-hop wireless links and capable of operating without any fixed infrastructure support. In order to facilitate communication within such self-creating, self-organizing and self-administrating network, a dynamic routing protocol is needed. The primary goal of such an ad...

    Provided By Academy Publisher

  • White Papers // Feb 2009

    Multi-Model Music Content Description and Retrieval Using IEEE 1599 XML Standard

    The new format IEEE 1599 for music and audio content description defines a standard for the representation of retrieval models within music and music/audio formats that makes use of XML documents as content descriptors. This paper described how music/audio semantics can be actually represented within the Structural Layer of IEEE...

    Provided By Academy Publisher

  • White Papers // May 2009

    Research on Fast Implementation of RSA With Java

    This paper introduces the principles of RSA, then based on these principles the implementation of RSA is discussed. After that several classes are analyzed and designed with Object-Oriented methods, and these classes are implemented with Java language. In the third fourth part, the authors give the fast implementation of RSA...

    Provided By Academy Publisher

  • White Papers // Jun 2009

    Research on On-Card Bytecode Verifier for Java Cards

    The bytecode verification is a key point of the security chain of the Java Platform. This feature is optional in many embedded devices since the memory requirements of the verification process and the process capability of hardware are too high. This paper proposes a verifier that utilizes the logical flow...

    Provided By Academy Publisher

  • White Papers // Sep 2009

    Global Optimization of Multi Radio Mesh Access Point Location in Underground Area

    This paper shows that with a proper placement of Mesh multi radio devices in a confined area, it is possible to reduce the congestion in the WMN (Wireless Mesh Network) by 50 to 60 percent according to the loaded traffic. The best portal deployment is obtained by minimizing the maximum...

    Provided By Academy Publisher

  • White Papers // May 2009

    Peer to Peer Network for Mobile Communication

    This paper focuses on possibilities of implementation of peer to peer architecture of communication over mobile platform. There are many studies going on nowadays about Peer to Peer (P-to-P) and file-sharing. Some studies predict staggering 45% of total internet traffic is P-to-P. Mobile operators need to embrace Peer to Peer...

    Provided By Academy Publisher

  • White Papers // May 2009

    Network Survivability for a Regular WDM Optical Network From Double-Link Failures Using Greedy Algorithm

    Network survivability is an important requirement in high-speed optical networks. The survivability of these networks from the failure of a single component such as a link or a node needs some typical approaches. In this paper, one have considered double-link failures in a hypercube optical network and present three loopback...

    Provided By Academy Publisher

  • White Papers // Nov 2009

    Threats and Vulnerabilities in Wireless Mesh Networks

    Wireless Mesh Networks (WMN) encompass a new area of technology set to play an important role in the next generation wireless mobile networks. WMN is characterized by dynamic self-organization, self-configuration and self-healing to enable flexible integration, quick deployment, easy maintenance, low costs, high scalability, and reliable services. Security of such...

    Provided By Academy Publisher

  • White Papers // Aug 2010

    Security Research of VPN Technology Based on MPLS

    The VPN technology based on MPLS is the current mainstream VPN technology that uses isolations of routing and address or other information technologies to resist attacking and marking spoofing, in which the security of data transmission are guaranteed to a certain extent. In this paper, Securities of MPLS VPN are...

    Provided By Academy Publisher

  • White Papers // Nov 2009

    Performance of Routing Protocols for Mobile Adhoc and Wireless Sensor Networks: A Comparative Study

    Mobile Ad hoc Networks (MANETs) as well as Wireless Sensor Networks (WSNs) suffer from various challenges like low bandwidth, overhead and velocity of nodes. This research contribution is the characterization study between MANETs and WSNs environment with respect to various routing protocols. This study investigates the routing protocols corresponding to...

    Provided By Academy Publisher

  • White Papers // Jul 2010

    Research of Network Mass Storage Mode Based on SAN

    In the face of new needs of the current network storage, the traditional DAS, NAS and advanced SAN network storage technology are analyzed, and the technical differences between the three technologies are compared. The redundant technology and main performance indicator system are analyzed by using system reliability theory, and thus...

    Provided By Academy Publisher

  • White Papers // May 2009

    Operating Systems for Tiny Networked Sensors: A Survey

    Wireless Sensor Networks (WSNs) is an emerging area of research. WSNs face lot of problems that do not arise in other types of wireless networks and computing environments. Limited computational resources, power constraints, low reliability and higher density of sensor nodes (motes) are some basic problems that need to be...

    Provided By Academy Publisher

  • White Papers // May 2009

    A Survey on Hybrid Mobile Sensor Networks

    Sensor networks consist of small wireless sensor nodes deployed randomly over an area to monitor the environment or detect intrusion. The coverage provided by sensor networks is very crucial to their effectiveness. Many of the important applications of sensor networks demand autonomous mobility for the sensor nodes. Early failure of...

    Provided By Academy Publisher

  • White Papers // Nov 2009

    Efficient Method for Identifying Location and Removal of Data Redundancy for RFID Data

    Radio Frequency IDentification (RFID) Technology has gained a significant momentum, in the past few years. This technology plays an essential role in object tracking in supply chain management applications and library management applications. RFID Technology holds the promise to simplify baggage handling, clinical laboratory procedures and other tasks by providing...

    Provided By Academy Publisher

  • White Papers // Apr 2009

    Realization of SCM and CRM by Using RFID-Captured Consumer Behavior Information

    Physical store retailers are facing a tougher situation than ever. In order to tackle this tough situation, they need not only to reduce cost by effectively executing SCM but also to introduce measures to increase profit like CRM. They are effective by themselves, but if they are combined the retailers...

    Provided By Academy Publisher

  • White Papers // Nov 2009

    Value Chain Model in Knowledge Management

    Knowledge is a complex and fluid concept to people, so knowledge management focuses on knowledge arrival; also it is considered as strategic activity help organizations to achieve sustainable competitive advantage. Value chain analysis is one of the analysis tools which satisfy continuous competitive advantage on organizations. This paper summarizes the...

    Provided By Academy Publisher

  • White Papers // Aug 2010

    Research of Campus Heterogeneous Database Middleware Based on SOA

    Along with the rapid development of campus information technology, many universities precipitate a great deal of information resources, how well make use of existing resources to build a centralized information resource management system is a serious problem. This paper designs a deep integration architecture of campus information based on SOA,...

    Provided By Academy Publisher

  • White Papers // Nov 2009

    The Requirements for Building an e-Commerce Infrastructure

    This paper will present all requirements to build a reliable e-commerce infrastructure in Jordan. Ecommerce is one of the main desired outcomes from a state internet readiness. Despite the fact that the requirements for e-commerce are very similar to those for an e-government or an internet readiness in general, however,...

    Provided By Academy Publisher

  • White Papers // Jul 2009

    Study on the Application Layer Security in e-Commerce Websites

    Most of studies about E-Commerce Security focus on the data confidentiality issue. Although security mechanisms, such as SSL (secure socket layer) or SET (secure electronic transaction), have been adopted in websites, catastrophic events that confidential data in ECommerce are revealed happened more than once. The essential reason for this is...

    Provided By Academy Publisher

  • White Papers // May 2009

    Distributed Cryptographic Key Management for Mobile Agent Security

    The problem of securing data section in a mobile agent from discovery and exploitation by a malicious host is a difficult task. A full scale adaptation of mobile agents becomes true once the security obstacles are overcome. A number of solutions are proposed based on cryptographic principles have their own...

    Provided By Academy Publisher

  • White Papers // Jun 2009

    Semantic Focused Crawling for Retrieving ECommerce Information

    Focused crawling is proposed to selectively seek out pages that are relevant to a predefined set of topics without downloading all pages of the Web. With the rapid growth of the E-commerce, how to discovery the specific information such as about buyer, seller and products etc. adapting for the online...

    Provided By Academy Publisher

  • White Papers // Nov 2010

    Mobile Payment Framework Based on 3G Network

    With the development of mobile network technology and mobile commerce application, mobile payment is becoming more and more important to assist mobile users to participate in the mobile commerce. Service reliability, security authtification, payment mobility is the core improblem, which should be solve with some flexible and secure measures. After...

    Provided By Academy Publisher

  • White Papers // May 2009

    A Router-Based Technique to Detect and Defend Against Low-Rate Denial of Service

    With the successful use of router technique, one consider to give routers additional function to defect and defend against LDOS. LDOS is a kind of miniature network attack which can affect TCP flows to zero or very low transmission bandwidth, just because it takes advantage of retransmission timeout of TCP....

    Provided By Academy Publisher

  • White Papers // Feb 2009

    An Innovative Pricing Method for Telecommunication Services Pricing Through American Options

    With the evolution of telecommunication networks and of their services the role of service provider is changed, so nowadays there is a coexistence of Network Operators and Virtual Operators. The difference between these players is not in the way they offer a service but primarily in their economic objectives and...

    Provided By Academy Publisher

  • White Papers // Aug 2009

    Cross-Layering in an Industrial Wireless Sensor Network: Case Study of OCARI

    Wireless sensor networks are adapted to monitoring applications. Specific solutions have to be developed for industrial environments in order to deal with the harsh radio conditions and the QoS (Quality Of Service) requirements of industrial applications. In this paper, they present the main protocols used in the OCARI project, and...

    Provided By Academy Publisher

  • White Papers // Dec 2009

    A Multi-Attribute Assessment Method for e-Commerce Risks

    Based on multi-attribute decision making theory, a multi-attribute assessment framework for E- commerce risks is presented. The paper applies an improved Evidential Reasoning (ER) approach to support evaluation decision, and uses a credit interval to figure scoring result and allow something absent. E-Commerce risks include environmental risks, management risks, technical...

    Provided By Academy Publisher

  • White Papers // May 2009

    Security Solution of Collaborative Commerce Chain System

    To improve the performance and network security of the collaborative commerce chain system and to deal with shortcomings of existing solution to the electronic commerce, the technology of the mobile agent was introduced into the modeling of the system. Based on the properties of mobile agent, problems of network security...

    Provided By Academy Publisher

  • White Papers // Nov 2009

    Mobile Agent Based Distributed System Computing in Network

    Mobile agents are emerging as a promising paradigm for the design and implementation of distributed applications. While mobile agents have generated considerable excitement in the research community, they have not translated into a significant number of real-world applications. One of the main reasons for this is lack of work that...

    Provided By Academy Publisher

  • White Papers // Feb 2010

    Special Issue: Delay Tolerant Networks, Architecture, and Applications

    Delay-Tolerant Networking (DTN) enables communication in sparse mobile ad-hoc networks and other challenged environments where traditional networking fails and new routing and application protocols are required. Past experience with DTN routing and application protocols has shown that their performance is highly dependent on the underlying mobility and node characteristics. Evaluating...

    Provided By Academy Publisher

  • White Papers // Apr 2010

    Research on Security Policy and Framework

    Policies are rules that govern the choices in behaviors of a system. Security policies define what actions are permitted or not permitted, for what or for whom, and under what conditions. In this paper, the present situation of research on policy is overviewed, including policy and security policy definition, policy...

    Provided By Academy Publisher

  • White Papers // May 2009

    High-Speed Signature Matching in Network Interface Device Using Bloom Filters

    Network intrusion detection systems play a critical role in protecting the information infrastructure of an organization. Due to the sophistication and complexity of techniques used for the analysis they are commonly based on general-purpose workstations. Although cost-efficient, these general-purpose systems are found to be inadequate as they fail to perform...

    Provided By Academy Publisher

  • White Papers // May 2009

    A Mobile Agent Based Architecture for Securing WLANs

    Wireless LANs are open and are vulnerable to various attacks. Techniques available to prevent Wireless LANs from these attacks are not comprehensive. In this paper the authors discuss the drawbacks of the existing security mechanisms and the authors provide a security architecture which uses Mobile agents as a security facilitator....

    Provided By Academy Publisher

  • White Papers // Apr 2010

    CNC System of MKS1632 External Cylindrical Grinding Machines Based on Embedded

    The traditional CNC system based on the IPC is complex structure, high cost, hardware redundancy and can not be cut, high power consumption and low reliability, this paper proposed and designed a CNC System of External Cylindrical Grinding Machines, and gives the software and hardware architecture design. The CNC system...

    Provided By Academy Publisher

  • White Papers // Dec 2008

    Research on e-Learning System and Its Supporting Products: A Review Base on Knowledge Management

    Knowledge Management(KM) is supported by many strategies such as business intelligence, collaboration, document management and e-learning (E-L). E-L has played more and more important role of all the technologies in the supporting KM. The review of basic technologies that support E-L will be in favor of further study on E-L....

    Provided By Academy Publisher

  • White Papers // Aug 2009

    A High Performance Computing Method of Linux Cluster's

    High performance computing more and more is used in all kinds of fields. But, for the common user, there are several questions on implementing the process of competing on the specialized cluster: such as expense high, management difficulty and operation complex and so on. To these problems, this paper designs...

    Provided By Academy Publisher