Academy Publisher

Displaying 1-40 of 2431 results

  • White Papers // Jul 2014

    A New Multi-Class WSVM Classification to Imbalanced Human Activity Dataset

    In this paper the authors concerned with the class imbalance problem in activity recognition field which has been known to hinder the learning performance of classification algorithms. To deal this problem, the authors propose a new version of the multi-class Weighted Support Vector Machines (WSVM) method to perform automatic recognition...

    Provided By Academy Publisher

  • White Papers // Jul 2014

    Evaluation of DGEMM Implementation on Intel Xeon Phi Coprocessor

    In this paper the authors will present a detailed study of implementing Double-precision GEneral Matrix Multiply (DGEMM) utilizing the Intel Xeon Phi Coprocessor. They discuss a DGEMM algorithm implementation running \"Natively\" on the coprocessor, minimizing communication with the host CPU. They will run DGEMM across a range of matrix sizes...

    Provided By Academy Publisher

  • White Papers // Jul 2014

    Image Segmentation with Fuzzy Clustering Based on Generalized Entropy

    Aimed at fuzzy clustering based on the generalized entropy, an image segmentation algorithm by joining space information of image is presented in this paper. For solving the optimization problem with generalized entropy's fuzzy clustering, both hopfield neural network and multi-synapse neural network are used in order to obtain cluster centers...

    Provided By Academy Publisher

  • White Papers // Jun 2014

    A Novel Resource Pricing Mechanism Based on Multi-Player Gaming Model in Cloud Environments

    Recently, cloud computing has become a promising network platform for non-trivial applications. The key feature of cloud computing is on-demand resource provision by utility paradigm. Therefore, resource pricing mechanism plays an important role for realizing on-demand resource provision. Unfortunately, existing resource pricing mechanism will result in many negative effects on...

    Provided By Academy Publisher

  • White Papers // Jun 2014

    Research on Cloud-Based Mass Log Data Management Mechanism

    In this paper, the authors study the file management mechanism of large-scale cloud-based log data. With the rise of big data, there are more and more the hadoop-based applications. Log analysis is an important part of network security management, but the existing network log analysis system can't deal with huge...

    Provided By Academy Publisher

  • White Papers // Jun 2014

    A Dynamic Load-balancing Scheme for XPath Queries Parallelization in Shared Memory Multi-core Systems

    Due to the rapid popularity of multi-core processors systems, the parallelization of XPath queries in shared memory multi-core systems has been studied gradually. Existing paper developed some parallelization methods based on cost estimation and static mapping, which could be seen as a logical optimization of parallel query plan. However, static...

    Provided By Academy Publisher

  • White Papers // May 2014

    Optimizing Data Distribution for Loops on Embedded Multicore with Scratch-Pad Memory

    Software-controlled Scratch-Pad Memory (SPM) is a desirable candidate for on-chip memory units in embedded multi-core systems due to its advantages of small die area and low power consumption. In particular, data placement on SPMs can be explicitly controlled by software. Therefore, the technique of data distribution on SPMs for multi-core...

    Provided By Academy Publisher

  • White Papers // May 2014

    GPU Implementation of Parallel Support Vector Machine Algorithm with Applications to Intruder Detection

    The network anomaly detection technology based on Support Vector Machine (SVM) can efficiently detect unknown attacks or variants of known attacks; however, it cannot be used for detection of large-scale intrusion scenarios due to the demand of computational time. The Graphics Processing Unit (GPU) has the characteristics of multi-threads and...

    Provided By Academy Publisher

  • White Papers // May 2014

    Proposed Design and Implementation for RESTful Web Server

    In this paper, the authors propose a framework to design and implement novel RESTful web server architecture. The proposed RESTful web server architecture is a lightweight server that will be less taxing on system resources and will therefore handle a greater volume of requests. Furthermore, in contrast to the usual...

    Provided By Academy Publisher

  • White Papers // May 2014

    An Architecture Independent Packing Method for LUT-based Commercial FPGA

    In this paper the authors propose an efficient architecture independent packing method for commercial FPGA. All specific logics of commercial FPGA such as carry chain arithmetic, x-LUT, are pre-designed into reference circuits according to its architecture. Due to complex architecture of contemporary FPGA, to enumerate all reference circuits in a...

    Provided By Academy Publisher

  • White Papers // May 2014

    Mining Frequent Closed Patterns using Sample-growth in Resource Effectiveness Data

    As the occurrence of failure of electronic resources is sudden, real-time record analysis on the effectiveness of all resources in the system can discover abnormal resources earlier and start using backup resources or restructure resources in time, thus managing abnormal situations and finally realizing health management of the system. This...

    Provided By Academy Publisher

  • White Papers // May 2014

    Implementation of Multi-channel FIFO in One BlockRAM with Parallel Access to One Port

    Because of flexibility of application and high cost performance, the low-and-middle-end FPGA has obtained an extensive market. As a fundamental memory structure, the FIFO memory is widely used in FPGA based paper in various manners. But limited by the resources in chip and imperfection of development tools, the problem that...

    Provided By Academy Publisher

  • White Papers // Apr 2014

    A Formal Transformation Approach for Embedded Software Modeling

    Formal specification can enhance the reliability of the embedded system and verify the system properties at the design stage. This paper presents a formal transformation approach for MARTE (Modeling and Analysis of Real Time and Embedded systems) model based on MDA (Model Driven Architecture), and defines the transformation rules of...

    Provided By Academy Publisher

  • White Papers // Apr 2014

    An Effective Clustering Algorithm for Transaction Databases Based on K-Mean

    Clustering is an important technique in machine learning, which has been successfully applied in many applications such as text and webpage classifications, but less in transaction database classification. A large organization usually has many branches and accumulates a huge amount of data in their branch databases called multi-databases. At present,...

    Provided By Academy Publisher

  • White Papers // Apr 2014

    Model-based Bayesian Reinforcement Learning in Factored Markov Decision Process

    Learning the enormous number of parameters is a challenging problem in model-based Bayesian reinforcement learning. In order to solve the problem, the authors propose a model-based Factored Bayesian Reinforcement Learning (F-BRL) approach. F-BRL exploits a factored representation to describe states to reduce the number of parameters. Representing the conditional independence...

    Provided By Academy Publisher

  • White Papers // Apr 2014

    The Workflow Task Scheduling Algorithm Based on the GA Model in the Cloud Computing Environment

    Taking advantage of the resource sharing, the cloud computing service mode save the investment cost efficiently. In a cloud computing environment, the workflow task scheduling algorithm is based on the task processing time and the execution cost factors and start point of the user demand for quality of service, in...

    Provided By Academy Publisher

  • White Papers // Apr 2014

    Resource Scheduling Optimization Algorithm of Energy Consumption for Cloud Computing Based on Task Tolerance

    In order to solve that the energy was seriously wasted in cloud computing, an algorithm of Energy Consumption optimization for Cloud computing based on the task Tolerance (ECCT) was proposed. The concept of the task tolerance was put forward in the algorithm. The resource utilization of cloud computing node was...

    Provided By Academy Publisher

  • White Papers // Apr 2014

    The Large-scale Dynamic Data Rapid Reduction Algorithm Based on Map-Reduce

    With the advent of the era of \"Big data\", the application of the large-scale data is becoming popular. Efficiently using and analyzing the data has become an interesting research topic. Traditional knowledge reduction algorithms read small data samples once into a computer main memory for reduction, but it is not...

    Provided By Academy Publisher

  • White Papers // Apr 2014

    Provable Dynamic Data Possession by Datalog Rules

    In recent years, the concept of data outsourcing has become quite popular. With the appearance of cloud computing, there is a new paradigm: cloud storage. Cloud storage means that the data owner moves its data to a cloud storage server that is supposed to faithfully store the data and make...

    Provided By Academy Publisher

  • White Papers // Apr 2014

    QoS Constraint Based Workflow Scheduling for Cloud Computing Services

    QoS constraint based workflow scheduling described by Directed Acyclic Graph (DAG) has been proved to be a NP-hard problem in cloud computing services, especially for cost minimization under deadline constraint. Due to Deadline Bottom Level (DBL) hasn't considered the concurrence during the real executing process that cause much more shatter...

    Provided By Academy Publisher

  • White Papers // Apr 2014

    An Greedy-Based Job Scheduling Algorithm in Cloud Computing

    Now-a-days/cloud computing has become a popular platform for scientific applications. Cloud computing intends to share a large number of resources such as equipments for storage and computation, and information and knowledge for scientific researches. Job scheduling algorithm is one of the most challenging theoretical issues in the cloud computing area....

    Provided By Academy Publisher

  • White Papers // Apr 2014

    Mitigating Cross-VM Side Channel Attack on Multiple Tenants Cloud Platform

    Virtualization is a key enabling technology in cloud computing. Multiple tenants can share computing resource of cloud provider on demand. While sharing can reduce the expenses of computing, it brings security vulnerability as well since the isolation between different VMs could be violated through side-channel attacks. Recent researches point out...

    Provided By Academy Publisher

  • White Papers // Mar 2014

    A SOM Based Incremental Clustering Algorithm

    Due to fast development of network technique, internet users have to face to massive textual data every day. Because of unsupervised merit of clustering, clustering is a good solution for users to analyze and organize texts into categories. However, most of recent clustering algorithms conduct in static situation. That indicates,...

    Provided By Academy Publisher

  • White Papers // Mar 2014

    On Data and Virtualization Security Risks and Solutions of Cloud Computing

    Data security and virtualization security issues are two key bottlenecks restricting the application of cloud computing promoting and applications, especially for the cloud-based media computing system. In this paper, states of the art of the techniques on cloud computing data security issues, such as data encryption, access control, integrity authentication...

    Provided By Academy Publisher

  • White Papers // Mar 2014

    A Parameterizable NoC Router for FPGAs

    The Network-on-Chip (NoC) approach for designing (System-on-Chip) SoCs is currently used for overcoming the scalability and efficiency problems of traditional on-chip interconnection schemes, such as shared buses and point-to-point links. NoC design draws on concepts from computer networks to interconnect Intellectual Property (IP) cores in a structured and scalable way,...

    Provided By Academy Publisher

  • White Papers // Mar 2014

    Towards Realization of Domain-Specific Scientific Data Cloud for Material Data Sharing

    Scientific data sharing has been an important area of research for several years. However, due to the sharp increase in scientific data, the existing scientific data sharing systems are becoming complicated and cannot meet the demands of current scientific domain communication. In this paper, the realization of material scientific data...

    Provided By Academy Publisher

  • White Papers // Mar 2014

    An Efficient Dimensionality Reduction Approach for Small-sample Size and High-dimensional Data Modeling

    As for massive multidimensional data are being generated in a wide range of emerging applications, this paper introduces two new methods of dimension reduction to conduct small-sample size and high-dimensional data processing and modeling. Through combining the Support Vector Machine (SVM) and Recursive Feature Elimination (RFE), SVM-RFE algorithm is proposed...

    Provided By Academy Publisher

  • White Papers // Mar 2014

    Research of the FP-Growth Algorithm Based on Cloud Environments

    The emergence of cloud computing solves the problems that traditional data mining algorithms encounter when dealing with large data. This paper studies the FP-growth algorithm and proposes a parallel linked list-based FPG algorithm based on MapReduce programming model, named as the PLFPG algorithm. And then it describes the main idea...

    Provided By Academy Publisher

  • White Papers // Mar 2014

    Optimal Virtual Machine Resources Scheduling Based on Improved Particle Swarm Optimization in Cloud Computing

    With the development of high performance computing, there are many computing paradigms including Peer-To-Peer (P2P) computing, cluster computing, services computing, grid computing and cloud computing. This paper presents virtual machines resources scheduling algorithm taking into computing capacity of processing elements and consideration their computational complexity. The authors apply the improved...

    Provided By Academy Publisher

  • White Papers // Mar 2014

    CUDAP: A Novel Clustering Algorithm for Uncertain Data Based on Approximate Backbone

    In recent years, data analysis and knowledge discovery in uncertain data become more and more important in many applications, such as, sensor network, biomedical measurement, financial market analysis and weather predictions, etc. Clustering for uncertain data is an interesting research topic in data mining. Researchers prefer to define uncertain data...

    Provided By Academy Publisher

  • White Papers // Mar 2014

    QoS-aware SaaS Services Selection with Interval Numbers for Group User

    The integration of SaaS service for group user in cloud is challenging, notably because the service's QoS and member's personalization QoS preference in group are uncertain. This is a timely and importance problem with the advent of the SaaS model of service delivery. Therefore, before the SaaS service been utilized,...

    Provided By Academy Publisher

  • White Papers // Mar 2014

    Research and Application of Data Integration in Aircraft Designing Based on SDO

    One of the fundamental problems in complicated system environment is the mechanism of data interaction and sharing between heterogeneous data sources. The known solutions, using middlewares to unify data formats, are not reliable due to the tightly coupled architecture, poor portability and reusability, large update latency, etc. To solve this...

    Provided By Academy Publisher

  • White Papers // Mar 2014

    An Empirical Study for Software Fault-Proneness Prediction with Ensemble Learning Models on Imbalanced Data Sets

    Software faults could cause serious system errors and failures, leading to huge economic losses. But currently none of inspection and verification technique is able to find and eliminate all software faults. Software testing is an important way to inspect these faults and raise software reliability, but obviously it is a...

    Provided By Academy Publisher

  • White Papers // Mar 2014

    A Query Driven Method of Mapping from Global Ontology to Local Ontology in Ontology-based Data Integration

    At present, the mediator/wrapper integration methods are widely used in ontology based data integration because they solve the data update problems of data warehouse method. The key of this method is building of mapping from the global ontology in mediator to the local ontology in wrapper. This paper analyzes the...

    Provided By Academy Publisher

  • White Papers // Mar 2014

    An Improved k-Exclusion Algorithm

    K-exclusion is a generalization of mutual exclusion that allows up to k processes to be in the critical section concurrently. Starvation freedom and First-In-First-Enabled (FIFE) are two desirable progress and fairness properties of k-exclusion algorithms. The authors present the first known bounded-space k-exclusion algorithm that uses only atomic reads and...

    Provided By Academy Publisher

  • White Papers // Mar 2014

    ChordMR: A P2P-based Job Management Scheme in Cloud

    MapReduce is a programming model and an associated implementation for processing parallel data, which is widely used in cloud computing environments. However, the traditional MapReduce system is based on a centralized master-slave structure. While, along with the increase of the number of MapReduce jobs submitted and system scale, the master...

    Provided By Academy Publisher

  • White Papers // Mar 2014

    True Value Estimation of Centrifugal Fan Vibration Data Based on Fusion Method

    Poor information means incomplete and insufficient information, such as unknown probability distributions and trends. In this case, many statistical methods may become ineffective. So a fusion method based on the information poor theory is proposed. The fusion method contains five methods, three concepts, and one rule. The five methods include...

    Provided By Academy Publisher

  • White Papers // Mar 2014

    A New Model of Data Protection on Cloud Storage

    Cloud computing is Internet-based computing, whereby shared resources, software, and information are provided to computers and other devices on demand, like the electricity grid. This paper focuses on studying cloud storage data protection model and implementing encrypted storage of user data in double-key form. User data are encrypted with symmetric...

    Provided By Academy Publisher

  • White Papers // Feb 2014

    The Advantages of Using CHECK Constraints in The Academic Database Tables

    Database plays important role on both web-based and desktop-based information system. Now-a-days web-based information systems dominate information system application. Relational database systems such as Oracle, MySQL, MS SQL Server or PostgreSQL are familiarly used as data base management system. In Indonesia almost all academic information systems at higher education institutions...

    Provided By Academy Publisher

  • White Papers // Feb 2014

    A New Data Mining Approach Combined with Extension Set and Rough Set

    Extension data mining is a product combining extenics with data mining. Establishing the extenics provides a new idea and method for data mining and opens up a new research direction for data mining. Using the extenics method of combining the data mining technology not only can access to static knowledge,...

    Provided By Academy Publisher

  • White Papers // Mar 2012

    Virtualization in Wireless Sensor Network: Challenges and Opportunities

    Wireless Sensor Networks (WSNs) are gaining importance for their broad range of commercial applications such as in home automation, health-care and industrial automation. In these applications multi-vendor and heterogeneous sensor nodes are deployed. Due to strict administrative control over the WSN domains, communication barrier, conflicting goal & economic interest of...

    Provided By Academy Publisher

  • White Papers // Mar 2012

    An Optimization Technique for Improved VoIP Performance over Wireless LAN

    The performance of wireless LANs is greatly affected by path-loss, RF interference and other sources of signal attenuation, in addition to network congestion. The primary factors involved in effective real-time communication, namely delay and loss, must be within certain controlled limits in such a scenario. In this paper, the authors...

    Provided By Academy Publisher

  • White Papers // Mar 2012

    Cluster Analysis Based Switching-off Scheme of Base Stations for Energy Saving

    Recent studies on green communications and networks indicate that most traffic loads could be served by a certain part of base stations during the low load period. In this paper, the authors present an energy saving approach which is based on the cluster analysis of traffic loads in urban space....

    Provided By Academy Publisher

  • White Papers // Mar 2012

    Efficient Routing Algorithm Based on Decision-making Sequence in Wireless Mesh Networks

    The ultimate goal of routing in Wireless Mesh Networks (WMNs) is to find the \"Good\" paths between the source and destination. Considering of the characteristics of this new networking paradigm, such as low mobility and less restriction from the energy effect, the focus is on the design and optimization of...

    Provided By Academy Publisher

  • White Papers // Mar 2012

    Cryptanalysis of Three Event Signature Protocols for Peer-to-peer Massively Multiplayer Online Games

    The researcher presented an event signature (EASES) protocol for Peer-To-Peer Massively Multiplayer Online Games (P2P MMOGs). The authors declare that the EASES protocol is efficient and secure, and could achieve non-repudiation, event commitment, save memory, bandwidth and reduce the complexity of the computations. However, the authors find that Chan et...

    Provided By Academy Publisher

  • White Papers // Mar 2012

    A Multiple-Policy supported Attribute-Based Access Control Architecture within Large-scale Device Collaboration Systems

    In order to collaborate large numbers of heterogeneous distributed devices over multiple domains within a modern large-scale device collaboration system, a fine-grained, flexible and secure approach is required for device authentication and authorization. This paper proposed a multiple-policy supported attribute-based access control model and its architecture to address these demands....

    Provided By Academy Publisher

  • White Papers // Mar 2012

    Clustering Model of P2P CDN Based on The Prediction of User Requirements

    with the increasing scale of the P2P (Peer-To-Peer) network, the contradictions among the scope expanding, the time expending reducing and the network loading of content search is growing more serious. As the required contents and replicas are distributed in the P2P network, the searching scope reduction will result in achieving...

    Provided By Academy Publisher

  • White Papers // Mar 2012

    Task Scheduling Optimization in Cloud Computing Based on Heuristic Algorithm

    Cloud computing is an emerging technology and it allows users to pay as you need and has the high performance. Cloud computing is a heterogeneous system as well and it holds large amount of application data. In the process of scheduling some intensive data or computing an intensive application, it...

    Provided By Academy Publisher

  • White Papers // Mar 2012

    Evolution Modeling of Complex Network Dynamics

    Real-world complex systems are composed of interacting entities with nontrivial dynamical behavior and complicated interaction topology. A class of models is examined whose primary goal is to explain network properties, especially model system with spatial information like human brain, and methods for modeling spatial system tend to get inconsistent results....

    Provided By Academy Publisher

  • White Papers // Mar 2012

    Efficient Resource Reservation Scheme in Service-Oriented Network Environment

    How to safeguard the Quality of Service (QoS) for users is an important issue in network computing task and resource reservation is one of the technologies. However, errors such as resource failure and reservation time overlap often result in reservation failure. To address these problems, this paper proposes a resource...

    Provided By Academy Publisher

  • White Papers // Feb 2012

    Adaptive Ant Colony Clustering Method Applied for Finding Closely Communicating Community

    The investigation of community structures in networks is an important issue in many domains and disciplines. Closely communicating community is different from the traditional community which emphasize particularly on structure or context. The authors' previous method played more emphasis on the feasibility that ant colony algorithm applied to community detection....

    Provided By Academy Publisher

  • White Papers // Feb 2012

    Vibration Data Processing Based on Petri Network in Wireless Sensor Networks

    There are many auxiliaries with high rotating speed in a power plant, such as pumps, fans, motors and so on. To warrant their safe and reliable operation, their state of vibration has to be monitored. But because of their scattered location, the traditional way of online monitoring with shielded cable...

    Provided By Academy Publisher

  • White Papers // Jun 2013

    A Dynamic Routing Based on Bayes Estimation for Wireless Sensor Networks

    The nodes awareness information efficiently distributed is one of the core features for wireless sensor networks. This paper systematically researched some key problems about the reliable data transmission, which is closely related with each other and may directly affect the transmission effectiveness and energy consumption. This paper is as follows:...

    Provided By Academy Publisher

  • White Papers // Jun 2013

    Formal Behavior Modeling: Business Processes Based on Cloud Platform

    From a macro level, cloud computing is gathering all the distributed resources originally, and then provided them as a service to the users. Current research focuses the cloud architecture and local small-scale grid computing mainly. The researchers are ignoring to provide a channel to help users to understand the business...

    Provided By Academy Publisher

  • White Papers // Jun 2013

    Compressed Sensing Precoding with Limited Feedback in Multi-carrier MIMO System

    Because of the large numbers of feedback in the Multiple Input & Multiple Output (MIMO) multi-carrier system, the pre-coding based on full channel state information is difficult to be applied in practical. In order to significantly reduce the overhead of the feedback link, a compressed sensing pre-coding method with limited...

    Provided By Academy Publisher

  • White Papers // May 2013

    A Routing Protocol Based on Temporal-Awareness Ordered-MPR for Dynamic Wireless Multi-hop Mobile Networks

    Dynamic mobile wireless network is one important infrastructure for special environment or special applications. High delay and low delivery ratio are its major challenges because of the absence of a complete end-to-end path between source nodes to destination nodes. Although some protocols have been proposed, they usually ignore the action...

    Provided By Academy Publisher

  • White Papers // May 2013

    Distribution Aware Collaborative Spread Replication for Rare Objects in Unstructured Peer-to-Peer Networks

    Existing unstructured peer-to-peer networks have low efficiency to locate the rare objects. Although various algorithms have been provided to address this problem, they do not distinguish whether the objects are rare or not and always incur unnecessary bandwidth consumption. In this paper, the authors presented a distribution aware replication method...

    Provided By Academy Publisher

  • White Papers // May 2013

    Research of Improved Network Malicious Information Filtering Model Based on SVM

    The network malicious information filtering is a binary classification problem. The SVM (Support Vector Machine) algorithm can be used in such information filtering model, but the negative samples were difficult to gain in such practical application, so the sample space is imbalance for SVM, the prediction result of classifier would...

    Provided By Academy Publisher

  • White Papers // May 2013

    TSBCC: Time Series-Based Congestion Control Algorithm for Wireless Network

    To tackle the major problem of traditional TCP in wireless network, an end-to-end congestion control algorithm Time Series-Based Congestion Control (TSBCC) is proposed based on time series. The algorithm creates time series consisting of the time interval of ACK, calculates the next ACK arrival time by the GARCH modal, analyzes...

    Provided By Academy Publisher

  • White Papers // May 2013

    Progressive Transmission of Vector Spatial Data

    Spatial Information has special format, diverse storage and large amount of data volume, together with the existing limitation of the network bandwidth; all those above caused some barriers to its transfer application. This paper focuses on a progressive transmission scheme for vector spatial data, it consists of three parts: hierarchical...

    Provided By Academy Publisher

  • White Papers // May 2013

    Data-Replicas Scheduler for Heterogeneous MapReduce Cluster

    Large scale data processing has rapidly increased in now-a-days. MapReduce programming model, which is firstly mentioned in functional languages, appeared in distributed system and perform excellently in large scale data processing since 2006. Hadoop, which is the most popular framework of open-sourced MapReduce runtime environment, supplies reliable, scalable and distributed...

    Provided By Academy Publisher

  • White Papers // May 2013

    A Fast Semantic Web Services Matchmaker for OWL-S Services

    Bringing semantics to web services description and matching remarkably improves the recall and precision ratios of service discovery. Though there are many effective semantic based web services matchmakers, they have poor time efficiency for consuming time in the semantic reasoning step. To shorten service matching time, this paper presents a...

    Provided By Academy Publisher

  • White Papers // May 2013

    Safety Data Fusion Algorithm in Wireless Sensor Network

    In this paper the authors present a wireless sensor network security data fusion algorithm which has data integrity and privacy protection. Firstly, using homomorphism encryption algorithm realizes the data privacy; using the key message authentication code based on hash function guarantees the freshness of data; using Tesla authentication technique ensures...

    Provided By Academy Publisher

  • White Papers // May 2013

    Data Flow Control Algorithm Based on Feature Matching in Mobile P2P Network

    In this paper the authors propose a characteristic matching based mobile P2P network data flow control algorithm, to detect the illegal data flow in the mobile P2P network, finally achieve the purpose of control the data flow. The algorithm is proposed based on the SVM feature matching algorithm, firstly on...

    Provided By Academy Publisher

  • White Papers // May 2013

    Parallel Processing for Large-scale Fault Tree in Wireless Sensor Networks

    Wireless Sensor Networks (WSN) covers many kinds of technologies, such as technology of sensor, embedded system, wireless communication, etc. WSN is different from the traditional networks in size, communication distance and energy-constrained so as to develop new topology, protocol, Quality of Service (QoS), and so on. In order to solve...

    Provided By Academy Publisher

  • White Papers // May 2013

    Research on RFID Applications in Construction Industry

    As its relatively large storage capacity and the ability of identifying and tracking materials and equipment in real-time without any direct contact or line-of-sight compared to traditional bar codes, Radio Frequency IDentification (RFID) technology has been more and more adopted in many sectors and identified as one of the ten...

    Provided By Academy Publisher

  • White Papers // Apr 2013

    Formal Verification of IEEE 802.11 Authentication Protocols

    IEEE 802.11 is the standard designed to provide secured communication in wireless LAN. The IEEE 802.11i specification contains both WPA-PSK, WPA-GPG authentication protocols. IEEE 802.11w authentication protocol enhances the IEEE802.11i security for selected management frames. These protocols allow a wireless station to gain access to a protected wireless network managed...

    Provided By Academy Publisher

  • White Papers // Apr 2013

    A Virtual Network Embedding Algorithm for Providing Stronger Connectivity in the Residual Networks

    How to efficiently map the nodes and links in a given Virtual Network (VN) to those in the Substrate Network (SN) so that the Residual Substrate Network (RSN) can host as many VN requests as possible is a major challenge in virtual network embedding. Most research has developed heuristic algorithms...

    Provided By Academy Publisher

  • White Papers // Apr 2013

    Signal Attenuation-aware Clustering in Wireless Mobile Ad Hoc Networks

    Due to the dynamic nature of wireless Mobile Ad hoc NETworks (MANETs), clustering is recognized as a promising solution for enhancing the scalability of MANETs against frequent topology changes. Numerous techniques have been proposed to achieve resistant-to-mobility and energy conservation of the network. Most of the existing clustering algorithms assume...

    Provided By Academy Publisher

  • White Papers // Apr 2013

    Conflict-Aware Relay Selection for Multicast in MUD based Wireless Networks

    MultiPoint Relays (MPR) selection is a good step toward building a very proficient routing scheme for multicast/broadcast communications. It considers the fact that data transmitted by a node is overheard by all the users in the sender's communication range, called the Wireless Broadcast Advantage (WBA). However, when a node elects...

    Provided By Academy Publisher

  • White Papers // Apr 2010

    Optimal Backup Interval for a Database System with Full and Periodic Incremental Backup

    In recent years, database in computer systems have become very important in the highly information-oriented society. The database is frequently updated by adding or deleting data files, and is stored in floppy disks or other secondary media. Even high reliable computers might sometimes break down eventually by several errors due...

    Provided By Academy Publisher

  • White Papers // Apr 2010

    A Novel Semi-supervised SVM Based on Tri-training for Intrusition Detection

    One of the main difficulties in machine learning is how to solve large-scale problems effectively, and the labeled data are limited and fairly expensive to obtain. In this paper a new semi-supervised SVM algorithm is proposed. It applies tri-training to improve SVM. The semi-supervised SVM makes use of the large...

    Provided By Academy Publisher

  • White Papers // May 2010

    A Hybrid Password Authentication Scheme Based on Shape and Text

    The textual-based password authentication scheme tends to be more vulnerable to attacks such as shoulder surfing and hidden camera. To overcome the vulnerabilities of traditional methods, visual or graphical password schemes have been developed as possible alternative solutions to text-based password schemes. Because simply adopting graphical password authentication also has...

    Provided By Academy Publisher

  • White Papers // Mar 2010

    Audio Watermarking Using Pseudorandom Sequences Based on Biometric Templates

    In this paper the authors propose an efficient watermark generation method for audio copyright protection and digital right management. It proposes a method of generating pseudorandom sequences based on iris image templates. These biometric generated sequences (bio-keys) are found to be unique for distinct identification purposes. These bio-keys are used...

    Provided By Academy Publisher

  • White Papers // Feb 2010

    The Research of Fuzzy Segment Query Under the Spatial Database

    Recently years, the Nearest Neighbor (N-N) query in the spatial database contracts much public attentions and is studied widely. Because of the kinds of the query objects, there are generally three types, point to point (p-p), point to segment (p-s) and segment to segment (s-s). Most of them are precise...

    Provided By Academy Publisher

  • White Papers // Jan 2010

    Anomaly Network Intrusion Detection Based on Improved Self Adaptive Bayesian Algorithm

    Recently, research on intrusion detection in computer systems has received much attention to the computational intelligence society. Many intelligence learning algorithms applied to the huge volume of complex and dynamic dataset for the construction of efficient Intrusion Detection Systems (IDSs). Despite of many advances that have been achieved in existing...

    Provided By Academy Publisher

  • White Papers // Dec 2009

    High Performance SQL Queries on Compressed Relational Database

    Loss-less data compression is potentially attractive in database application for storage cost reduction and performance improvement. The existing compression architectures work well for small to large database and provide good performance. But these systems can execute a limited number of queries executed on single table. The authors have developed disk-based...

    Provided By Academy Publisher

  • White Papers // Oct 2013

    Efficient Flow Control Scheme in Multimedia Cloud Computing

    As multimedia cloud computing involving a great deal of calculations about graphics, images, audio and video, which consume a lot of resources and is a key issue toward traffic control. The characteristics of traditional HTB serial determine the bottleneck of its processing speed. The author provides a kind of mechanism...

    Provided By Academy Publisher

  • White Papers // Oct 2013

    Greedy Forwarding Routing Strategy Based on Energy Efficiency in Wireless Sensor Network

    Greedy Forwarding (GF) is a kind of simple and efficient routing protocol in wireless sensor network, which is widely applied in the field of data monitoring. In order to prolong the network lifetime and decrease the probability of occurrence of routing void without adding the protocol complexity, the best way...

    Provided By Academy Publisher

  • White Papers // Oct 2013

    Security Analysis of PHP Encoder

    As an open source server-side scripts language, PHP is used more and more widely by web developers now. Protecting PHP code from being plagiarized is also a hot research issue especially with the rapid development of dynamic web industry and people's copyright protection consciousness. Usually the developers use PHP encoders...

    Provided By Academy Publisher