Academy Publisher

Displaying 1-40 of 2749 results

  • White Papers // Dec 2014

    Detecting Access Point Spoofing Attacks Using Partitioning-Based Clustering

    The impersonation of wireless Access Point (AP) poses an unprecedented number of threats that can compromise a wireless client's identity, personal data, and network integrity. The AP impersonation attack is conducted by establishing rogue AP with spoofed Service Set IDentifier (SSID) and MAC address same as the target legitimate AP....

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Error Performance Analysis of Multiuser CDMA Systems with Space-time Coding in Rician Fading Channel

    In this paper, the error performance of multiuser CDMA system with space-time coding is studied in Rician fading channel, and the corresponding Bit Error Rate (BER) and Symbol Error Rate (SER) analysis are presented. Based on the performance analysis, a simple and effective multiuser receiver scheme is developed. The scheme...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Verifying Online User Identity Using Stylometric Analysis for Short Messages

    Stylometry consists of the analysis of linguistic styles and writing characteristics of the authors for identification, characterization, or verification purposes. In this paper, the authors investigate authorship verification for the purpose of user authentication process. In this setting, authentication consists of comparing sample writing of an individual against the model...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Topology Control Mechanism Based on Link Available Probability in Aeronautical Ad Hoc Network

    In this paper, the authors consider traffic network with high-speed mobility nodes scenario; and give a new network topology control mechanism to rise the routing path duration in Aeronautical ad hoc network. The mechanism can use different methods to construct topology according to the node densities. For network regions having...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    An Energy-Efficient Routing Mechanism Based On Genetic Ant Colony Algorithm for Wireless Body Area Networks

    As an important branch of Wireless Sensor Network (WSN), Wireless Body Area Network (WBAN) has received extensive attention of various fields as it is portable and removable. However, energy consumption is highlighting increasingly as nodes are hard to be recharged or replaced. Up to now, many energy efficient routing algorithms...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    An Improved Mix Transmission Algorithm for Privacy-Preserving

    With the rapid development of the Internet Of Things (IOT), personal privacy has been realized as the most important security issue in wireless sensor networks, especially in the Body Area Network (BAN) used in the medical field. Traditional encryption methods cannot defense against the attacks in which the communication signal...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Study of Downlink Scheduling Algorithms in LTE Networks

    Long Term Evolution (LTE) is one of the fastest growing technologies which supports variety of applications like video conferencing, video streaming, VoIP, file transfer, web browsing etc. In order to support multiple applications, Radio Resource Management (RRM) procedure is one of the key design roles for improving the system performance....

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Delay and Jitter in Networks with IPP Traffic: Theoretical Model

    In this paper, the authors analyze delay and jitter in networks with traffic modeled as Interrupted Poisson Process (IPP), and relatively small traffic loads. In one-node analysis, they estimate the probability for delay bounds violation, and they obtain expression for the jitter, with respect to phase probabilities, traffic load, and...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    An Adaptative Energy Efficient Routing Protocol for MANET

    The dynamic nature of Mobile Ad hoc NETwork (MANET) has several constraints like scalability, robust connectivity and limited power constraints. So an efficient routing protocol is required. It should be adaptable and able to maintain stable routes in spite of the dynamic network connectivity. This paper proposes a hybrid protocol,...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    A Novel Method to Improve the Accuracy of the RSSI Techniques Based on RSSI-D

    In this paper, a novel method is proposed to estimate the distance between sensor nodes based on a statistical model of GMM, which is established with the offline RSSI values, called RSSI-D. In order to estimate the arguments of RSSI-D with unobserved latent variables, EM is used to calculate the...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    SIP-Based QoS in IP Telephony

    In this paper, the authors analyze the factors resulting to the degradation of the quality of service in Voice over IP (VoIP) telephony. SIP protocol is used to explore the QoS characteristics of different Codec. The system is designed for an IP telephony service provider with other GSM operator network...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    A Resource-Efficient System for Detection and Verification of Anomalies Using Mobile Agents in Wireless Sensor Networks

    Sensor readings are vulnerable to in situ and in transit anomalies. A well designed anomaly detection system should be able to identify the source of anomalies through in situ verification of suspicious behavior of sensor nodes. One approach for in situ verification is physical diagnosis of sensor nodes, which is...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Simulation and Performance Analysis of the IEEE1588 PTP With Kalman Filtering in Multi-Hop Wireless Sensor Networks

    As the Wireless Sensor Networks (WSNs) find wider and wider applications, time synchronization has emerged as a key technology to improve network performance and enable WSNs in time-sensitive applications. The recently proposed IEEE 1588 Precision Time synchronization Protocol (PTP) has shown its capability for the wired Ethernet, but its performance...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Enhancing Channel Coordination Scheme Caused by Corrupted Nakagami Signal and Mobility Models on the IEEE 1609.4 Standard

    Ensuring high saturated throughput of SCHs and reducing the transmission delay of service packets on CCHs are one of the most challenging issues in multichannel operations IEEE 1609.4 standard. Moreover, multiple issues due to its highly dynamic topology, the high mobility, the change trajectory, and Nakagami propagation channel caused by...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Keeping Desired QoS by a Partial Coverage Algorithm for Cluster-Based Wireless Sensor Networks

    Many studies were done on design algorithms to completely cover an area. The authors can call the issue as a complete coverage problem. Although there were many researches about proposing a partial coverage issue; almost all of the studies only focus on lengthening the lifespan of Wireless Sensor Networks (WSNs)...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Achieving VoIP Guarantee in Wireless Local Area Networks

    Recently, Voice over Internet Protocol (VoIP) has gained much attention in Wireless Local Area Networks (WLANs). Although IEEE 802.11e Enhanced Distributed Channel Access (EDCA) has been standardized to provide voice traffic with Quality of Service (QoS) support, the voice quality could still be severely degraded by the traffic transmitted from...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    DOA Estimation for Coherent Sources in Impulsive Noise Environments

    Direction-of-Arrival (DOA) estimation of coherent sources is a significant problem in impulsive noise environments. In this paper, a robust estimation algorithm which combines the ideas of Spatial Smoothing (SS) and INFinity-norm normalization (INF) is presented referred to as INF-SSR. The proposed algorithm exploits the Root - MUSIC technique to computer...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Source-Directed Path Diversity in the Interdomain Routing

    The Internet has abundant path redundancy, especially in the inter-domain routing. However, current routing system cannot exploit the Internet path diversity and utilize the disjoint end-to-end paths efficiently. The unawareness of sources to the path selection and the best paths advertisement mechanism in the inter-domain routing make it difficult to...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Markov Chain Based Trust Management Scheme for Wireless Sensor Networks

    As the effective supplement to traditional cryptography security, trust management plays a key role for detecting malicious behaviors in wireless sensor networks. In this paper, the authors consider a sensor network wherein nodes have fixed number of states and probabilities of state transitions can be specified. They introduce Markov chain...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    A Hybrid Classifier Using Reduced Signatures for Automated Soft-Failure Diagnosis in Network End-User Devices

    The authors present an automated system for the diagnosis of both known and unknown soft-failures in end-User Devices (UDs). Known faults that cause network performance degradation are used to train the classifier-based system in a supervised manner while unknown faults are automatically detected and clustered to identify the existence of...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    e-ONE:Enhanced ONE for Simulating Challenged Network Scenarios

    Delay Tolerant Network (DTN) empowers sparse mobile ad-hoc networks and other challenged network environments, such as interplanetary communication network or deep sea communication network, where traditional networking protocols either fail to work completely or do not work well. The Opportunistic Networking Environment (ONE) Simulator has gained considerable popularity as an...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    A Load-Balanced On-Demand Routing for LEO Satellite Networks

    Due to population distribution and economic flourish diversity, the Low Earth Orbit (LEO) satellite network carries unbalanced traffic load, which leads that parts of satellite links are congested while others are underutilized. Furthermore, the congested inter-satellite links result in high queuing delay and packet dropping ratio. To ensure an intelligent...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    The Faults of Data Security and Privacy in the Cloud Computing

    According to Winkler, public cloud is based on the standard cloud computing model, in which a service provider makes resources, such as applications and storage, available to the general public over the Internet. Public cloud services may be free or offered on a pay-per-usage model. The main benefits of using...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    TTAF: TCP Timeout Adaptivity Based on Fast Retransmit over MANET

    Transmission Control Protocol (TCP) is one of the most widely deployed transport layer protocols. It responds to all packet losses, either due to congestion or link breakages, by invoking various congestion control mechanisms. All these mechanisms imply a reduction in the amount of transmitted data. Computing a proper value of...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    On-Line Data Retrieval Algorithm with Restart Strategy in Wireless Networks

    With rapid development of technologies in mobile environment, data dissemination has become an important role for obtaining their requested information of clients in many applications. There are three major approaches to disseminate information between server and clients: unicast, multicast and broadcast. Data retrieval is an efficient scheme for data dissemination...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Trail Coverage : A Coverage Model for Efficient Intruder Detection Near Geographical Obstacles in WSNs

    In Wireless Sensor Network (WSNs), the coverage strategy for achieving higher performance in intruder detection probability near irregular geographical obstacles inside a military terrain, is studied in this paper. The real life problem of the of intruder detection near irregular geographical obstacles has not been focused so far, in which...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Efficient Scheme for Channel Estimation in OFDM System

    The choice of channel estimation is of fundamental importance in OFDM receiver designs, which further involves a trade-off between complexity and estimation accuracy. In pilot-symbol-aided OFDM system, the Least Square (LS) estimator suffers from inherent additive Gaussian noise and Inter Carrier Interference (ICI), although the estimator exhibits lower complexity and...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Performance of Decode and Forward MIMO Relaying Using STBC for Wireless Uplink

    In this paper, the authors compare the performance of a decode and forward relay assisted wireless uplink with direct wireless uplink in the presence of rayleigh fading where source is equipped with single Transmit antenna (Tx), relay is equipped with multiple transmit and Receive antennas (Rx), and destination has multiple...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    On Efficient Design of LDPC Decoders for Wireless Sensor Networks

    Low Density Parity Check (LDPC) codes are error-correcting codes that offer huge advantages in terms of coding gain, throughput and power dissipation in digital communication systems. Error correction algorithms are often implemented in hardware for fast processing to meet the real-time needs of communication systems. However, traditional hardware implementation of...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Performance Comparison of RFID Tag at UHF Band and Millimeter-Wave Band

    The Ultra High Frequency (UHF) band spectrum will likely be congested in near future since the next generation wireless as well as Radio Frequency IDentification (RFID) system users will witness the use of UHF band technology with increased demand of bandwidth, bit rate, frequency spectrum and power consumption. The alternate...

    Provided By Academy Publisher

  • White Papers // Nov 2014

    Pollution-Free Regenerating Codes with Fast Reconstruction Verification for Verifiable Cloud Storage

    In this paper, the authors present an efficient mechanism to guarantee the integrity of cloud storage systems using network-coding-based regenerating codes. Regenerating codes are a special type of erasure codes with the property that regenerating a failed encoded server, can be done using significantly less information than the size of...

    Provided By Academy Publisher

  • White Papers // Nov 2014

    A Hybrid Wrapper-Filter Approach for Malware Detection

    In this paper, the authors present an efficient and novel approach for malware detection. The proposed approach uses a hybrid wrapper-filter model for malware feature selection, which combines Maximum Relevance (MR) filter heuristics and Artificial Neural Net Input Gain Measurement Approximation (ANNIGMA) wrapper heuristic for sub-set selection by capitalizing on...

    Provided By Academy Publisher

  • White Papers // Nov 2014

    Securing a Smart Anti-Counterfeit Web Application

    The use of RFID (Radio Frequency IDentification) technology can be employed for automating and streamlining safe and accurate brand IDentification (ID) uniquely in real-time to protect consumers from counterfeited products. The authors outline a Web-based Anti-counterfeit RFID System (WARS) to combat counterfeit branding. By placing brand tags (RFID tags) on...

    Provided By Academy Publisher

  • White Papers // Nov 2014

    Elliptic Curve Cryptography for WSN and SPA Attacks Method for Energy Evaluation

    In this paper, the authors provide a comprehensive study of Elliptic Curve Cryptography (ECC) for Wireless Sensor Networks (WSNs) security provisioning, mainly for key management and authentication modules. On the other hand, they present and evaluate a Side-Channel Attacks (SCAs) experimental bench solution for energy evaluation, especially Simple Power Analysis...

    Provided By Academy Publisher

  • White Papers // Nov 2014

    Anomaly Detection in Wireless Sensor Network

    Wireless Sensor Networks (WSNs) are prone to vulnerabilities due to their resource constraints and deployment in remote and unattended areas. A sensor node exhibits anomaly in behavior due to its dying energy level or being compromised by the intruders. The node showing anomalous behaviors being a Leader Node (LN) of...

    Provided By Academy Publisher

  • White Papers // Nov 2014

    Detection of Privacy Sensitive Information Retrieval Using API Call Logging Mechanism Within Android Framework

    In recent years, Android based Smartphone's have become popular. As a feature of a smart phone, much information for identifying a user and information linked to user's privacy is saved in a terminal. For this feature, many malwares targeting privacy information are developed. Many security mechanisms are provided in Android...

    Provided By Academy Publisher

  • White Papers // Nov 2014

    Dynamic Cluster-Based Routing for Wireless Sensor Networks

    In this paper, the authors propose a new clustering scheme for wireless sensor networks, which efficiently balances the energy usage inter- and intra-clusters, by using the k-medoids method and the intra-cluster head update policy. Particularly, they propose a simple-but-effective routing tree algorithm to maintain a dynamic energy-efficient tree structure over...

    Provided By Academy Publisher

  • White Papers // Nov 2014

    EA-COR: An Environment Adaptive Clustering Opportunistic Routing Protocol of WSN

    Generally, the radio channel quality of a Wireless Sensor Network (WSN) is unstable in harsh environment. For instance, in maritime search and rescue, the nodes of WSN move dynamically, the topology changes with respect to the time and the communication link changes frequently as well. What is more, the given...

    Provided By Academy Publisher

  • White Papers // Nov 2014

    A Newton Iteration Based WSN Localization System in Underground Tunnels

    One of the main concerns in under construction tunnels is ensuring the safety of the workers and their equipment. Being aware of the real-time position of personnel in such harsh environment is challenging and usually requires a sophisticated localization system. With traditional Received Signal Strength Indicator (RSSI) failing to accurately...

    Provided By Academy Publisher

  • White Papers // Nov 2014

    A New Detection Method Based on AEWMA Algorithm for LDoS Attacks

    The Low-rate Denial of Service (LDoS) attack is a new type of DoS (Denial of Service) attack, which produces the similar harmful effect as the DoS attack. It is more difficult for existing DoS detection methods to detect the LDoS attacks because of their distinct characteristics, at the same time...

    Provided By Academy Publisher

  • White Papers // May 2009

    DDoS: Survey of Traceback Methods

    The problem of identifying Distributed Denial of Service (DDoS) is one of the hardest threats in the internet security. It is important to protect the resource and trace from the Denial of Service (DoS) attack, but it is difficult to distinguish normal traffic and DoS attack traffic because the DoS...

    Provided By Academy Publisher

  • White Papers // May 2009

    Semantic Firewall: An Approach Towards Autonomous Web Security in Service Oriented Environments

    As the technical infrastructure to support Grid environments matures, attention must be focused on integrating such technical infrastructure with technologies to support more dynamic access to services, and ensuring that such access is appropriately monitored and secured. The move towards supporting more autonomous systems, where decisions are made without direct...

    Provided By Academy Publisher

  • White Papers // May 2009

    A CP Intrusion Detection Strategy on Cloud Computing

    Cloud Computing is a general concept of the computing service which is reliance on the Internet for satisfying the computing needs of the users. The providers and the users of the service will be benefit for the new organization pattern. This paper proposes a framework for the construction of a...

    Provided By Academy Publisher

  • White Papers // May 2009

    Study on Energy Saving and Security of Bluetooth Sensor Network

    The paper discusses an available method for design and analysis of information security and energy saving of wireless sensor network, which is based on Bluetooth technology. In this method, a low power SCM and a special mode are used to save the power of each sensor node as well as...

    Provided By Academy Publisher

  • White Papers // Aug 2009

    Design and Development of a Open Frame RFID System Unite Test Platform

    RFID (Radio Frequency Identification) System Test Platform has attracted considerable attention in recent years because it has a great impact on many kinds of trade applications. However, there is dearth of available open frame test platform for RFID system. This paper proposes a new design and implementation of an open...

    Provided By Academy Publisher

  • White Papers // May 2009

    The Study and Application of Tree-Based RFID Complex Event Detection Algorithm

    With the extension of RFID application, RFID data processing techniques become one of the core techniques. Recently, researchers adopt the event-centric methods to process RFID data and obtain rich semantic information. Complex event processing is a typical data processing technique which becomes the new spotlight of researches. In order to...

    Provided By Academy Publisher

  • White Papers // Sep 2009

    Data Management of Mobile Object Tracking Applications in Wireless Sensor Networks

    This paper focuses on the data management problem of object tracking applications in wireless sensor networks. The paper proposes link-segment storage and query protocol to track mobile object in wireless sensor network dynamically. The main idea of the protocol is to combine advantages of local storage with data centric storage...

    Provided By Academy Publisher

  • White Papers // Jun 2009

    Statistical Analysis of Broadband Wireless Links in Rural Areas

    Third-Generation (3G) cellular systems are often considered as a promising strategy for high-speed internet deployment in rural areas. However, bandwidth in 3G systems is a limited resource and can be quite different from the advertised bandwidth. In addition, in wireless applications such as voice over IP, video-conference, remote monitoring and...

    Provided By Academy Publisher

  • White Papers // May 2009

    Fringe Area Path Loss Correction Factor for Wireless Communication

    Efficiency of present path loss models suffers when they are used in the environment other than for which they have been designed. The aim of this paper is to propose the predicting the path loss with the field measurement models Present path loss model suffers when they are used in...

    Provided By Academy Publisher

  • White Papers // May 2009

    Clustering of Virtual Disk Design of Clustered Servers for Storage Management

    Storage technologies were getting very expensive to place a large number of high capacity hard drives in the servers. A large number of low cost hard drives could be linked together to form a single large capacity storage device that offered superior performance, storage capacity and reliability over older storage...

    Provided By Academy Publisher

  • White Papers // Nov 2009

    LAN Machine: A Virtualized Network for Developing & Testing Network & Cloud Applications on a Single Machine

    This paper proposes a platform that aims at creating a virtualized network on a single machine. It mainly focuses on network level virtualization. It aims at the consolidation of network level components virtually on a single machine: Wherein user can launch any network-based applications (e.g. - App server's, Web servers,...

    Provided By Academy Publisher

  • White Papers // Dec 2009

    An Analysis of the Robustness and Stability of the Network Stack in Symbian-Based Smartphones

    Smartphones are widely used today and their popularity will certainly not slow down in the near future due to improved functionality and new technology improvements. Becoming more and more similar to PCs and laptops, they will also begin to face the same security problems especially in terms of network security....

    Provided By Academy Publisher

  • White Papers // Nov 2009

    Research of Data Visualization in Near-Infrared Spectroscopy

    The spectroscopy data visualization software is developed to display the blood glucose data collected by near-infrared spectroscopy spectrometer using object-oriented programming techniques. The test results show the software can reach the pre-set functions and its intuitive interface and convenient access to all operations can assist users to do data analysis...

    Provided By Academy Publisher

  • White Papers // May 2009

    Detection of Anomalous Data Using Data Visualization Techniques

    One of the most pressing problems in enforcing security in a network is the identification of suspicious nodes and messages in a network. A node's suspicion factor cannot be measured based on the information that is being sent through the network alone. Anomalous nodes are nodes in a network that...

    Provided By Academy Publisher

  • White Papers // Dec 2009

    Research on Layout Algorithms for Better Data Visualization

    Based on the theory and technology of data visualization, this paper improves some layout algorithms regarding its own natures and characteristics. It also discusses the problem of how to choose proper layout algorithm for specific data to make the visualization better. Using the improved algorithms, one can simply convert a...

    Provided By Academy Publisher

  • White Papers // Nov 2009

    Network Reconfiguration for Loss Minimization by Optimal Switching Operation in Distribution System

    There are three functional areas of electrical utility namely Generation, Transmission and Distribution. Out of three functional areas of Electrical utility, the distribution sector needs more attentions and difficult to standardize due to its complexity. Aggregated Technical & Commercial (AT&C) Loss i.e. T&D loss in India has been consistently on...

    Provided By Academy Publisher

  • White Papers // May 2009

    Neural Network Based Switching Models for VLSI Design of ATM Networks

    This paper presents a framework for designing neural network solutions using extensions of the competitive learning Artificial Neural Network(ANN) model for ATM networks in VLSI design. Unlike conventional LANs, ATM LANs utilize a mesh topology comprising a number of interconnected switching exchanges similar in principle to that used in conventional...

    Provided By Academy Publisher

  • White Papers // Dec 2009

    Heterogeneous Information System Integration Based on HUB-SOA Model

    Considering the problems of heterogeneous information system integration, service-oriented component of HUB-SOA model is proposed based on investigating E-HUB integration model and SOA integrated structure. Further, the key technical of the basic working principle, interface model, web service, system component and schema mapping are researched. What's more, WEB service and...

    Provided By Academy Publisher

  • White Papers // Nov 2009

    Implementation of Hardware Stack TCP/IP Using Virtex-2 Pro FPGA

    There is a general consensus that in years to come more and more Internet devices will be embedded and not PC oriented. Just one such prediction is that by 2010, 95% of Internet-connected devices will not be computers. So if they are not computers, what will they be? Embedded Internet...

    Provided By Academy Publisher

  • White Papers // Jul 2009

    Real Estate Decision Support System of Market Comparison Approach Based on GIS

    Market comparison approach is one of the commonest appraise approach. This paper studied real estate decision support system of market comparison approach based on GIS. Firstly, the paper designs the system logic structure in this paper, secondly, the paper establishes the database and model database for appraise, and then, the...

    Provided By Academy Publisher

  • White Papers // Aug 2009

    Point-to-Point DWDM System Design and Simulation

    As for the problems of complexity and long cycle in the DWDM design, part of problems needed to be considered in DWDM system design were analyzed. An optimized point-to-point DWDM transmission system was designed. Optical fiber communication system with 40Gbit / s and 32 channel was designed and simulated by...

    Provided By Academy Publisher

  • Case Studies // Oct 2009

    Always Best Packet Switching: The Mobile VoIP Case Study

    Currently, a mobile device equipped with multiple heterogeneous wireless Network Interface Cards (NICs) cannot take advantage of its capabilities as the conventional mobility management approach allows it to select and use only one of its NICs at a time. In contrast to this approach, this case study proposes the so-called...

    Provided By Academy Publisher

  • White Papers // Feb 2010

    A Identity Authentication Based on Fingerprint Identification

    Security of communication is guaranteed by the security of cipher code system. But to remember the password is difficult, and to steal the password is easy. The fingerprint is the personal biometric feature. It is different from others'. To pick up the fingerprint is convenient for people. Counterfeiting it is...

    Provided By Academy Publisher

  • White Papers // Jun 2011

    Enterprise Knowledge Management Application Evaluation Based on Cloud Gravity Center Model and Fuzzy Extended AHP

    Enterprise knowledge management has important influence on an enterprise core competency, and enterprise knowledge management application evaluation plays an important role for the enterprise economic benefits, innovation ability and culture. The evaluation of the enterprise knowledge management application can guide the enterprise knowledge management implement better. In this paper, an...

    Provided By Academy Publisher

  • White Papers // Jun 2011

    A New Method to Determine BPA in Evidence Theory

    Dempster Shafer theory of evidence has been widely used in many data fusion application systems. However, how to determine basic probability assignment, which is the main and the first step in evidence theory, is still an open issue. In this paper, based on the distance measure between the sample data...

    Provided By Academy Publisher

  • White Papers // Jun 2011

    ORPSW: A New Classifier for Gene Expression Data Based on Optimal Risk and Preventive Patterns

    Optimal risk and preventive patterns are itemsets which can identify characteristics of cohorts of individuals who have significantly disproportionate representation in the abnormal and normal groups. In this paper, the authors propose a new classifier namely ORPSW (Optimal Risk and Preventive Sets with Weights) to classify gene expression data based...

    Provided By Academy Publisher

  • White Papers // Jun 2011

    Performance Analysis of Some New CFAR Detectors Under Clutter

    In order to improve the radar's detection performance under Pearson distributed background clutter, the problem of designing CFAR detectors is studied in this paper. Three kinds of distributed fuzzy CA scheme and two kinds of OS scheme are proposed. The numerical simulations prove that CA CFAR detector based on algebraic...

    Provided By Academy Publisher

  • White Papers // Jun 2011

    Image Optimization Algorithm Based on Salient Region and Layout Adjustment

    The purpose of image optimization is that the salient region of image is stand out, and is layout an image met the demand. The existed image optimization method is summarized, and their advantages and disadvantages respectively analyzed. The improved visual attention model is described, and is used to detect the...

    Provided By Academy Publisher

  • White Papers // Oct 2009

    Network Coding and Media Streaming

    Network coding has recently emerged as an alternative to traditional routing algorithms in communication systems. In network coding, the network nodes combine the packets they receive before forwarding them to the neighboring nodes. Intensive research efforts have demonstrated that such a processing in the network nodes can provide advantages in...

    Provided By Academy Publisher

  • White Papers // Apr 2011

    Emerging Technologies and Applications on Interactive Entertainments

    With the substantial development of digital technologies in multimedia, network communication and user interfaces, the authors are seeing an increasing number of applications of these technologies, in particular in the entertainment domain. They include computer gaming, e-learning, high-definition and interactive TVs, and virtual environments. The development of these applications typically...

    Provided By Academy Publisher

  • White Papers // Apr 2011

    OXML: An Object XML Database Supporting Rich Media Indexing and Retrieval

    There are countless animation movies available nowadays throughout the Internet. Rich media (including Flash and PowerPoint) presentations are increasingly gaining widespread usage, particularly in the domains of e-learning and digital entertainment. In order to allow these animation movies to be queried efficiently, in this paper the authors present OXML -...

    Provided By Academy Publisher

  • White Papers // Apr 2011

    ATPM: An Energy Efficient MAC Protocol With Adaptive Transmit Power Scheme for Wireless Sensor Networks

    The MAC protocol for wireless sensor networks is different from traditional wireless MACs such as IEEE 802.11. Energy conservation is one of the most important goals, while per-node fairness and latency are less important. This paper proposes an energy efficient MAC protocol with adaptive transmit power scheme based on SMAC/AL...

    Provided By Academy Publisher

  • White Papers // Apr 2011

    Adaptive Object Re-Ranking Mechanism for Ubiquitous Learning Environment

    Ubiquitous Learning (U-Learning), as an emerging learning paradigm, makes it possible for learners to carry out the learning activities at any places and at anytime. With the advantages of the devices, learners can obtain a variety of supplementary materials from the Internet. In the scope of distance learning, LOR (Learning...

    Provided By Academy Publisher

  • White Papers // Apr 2011

    Automatic Detection and Correction for Glossy Reflections in Digital Photograph

    The popularization of digital technology has made shooting digital photos and using related applications a part of daily life. However, the use of flash, to compensate for low atmospheric lighting, often leads to overexposure or glossy reflections. This paper proposes an auto-detection and inpainting technique to correct overexposed faces in...

    Provided By Academy Publisher

  • White Papers // Nov 2009

    Handoff in Heterogeneous Wireless Networks by Adjusting the Transmission Power [RSS]/Rate

    The main objective of this paper is to evaluate the conditions and restrictions under which seamless multimedia Quality of Service (QoS) provision across 4G is possible. One vital component for the provision of seamless multimedia session continuity is the QoS consistency across these heterogeneous networks. This is vital indeed because...

    Provided By Academy Publisher

  • White Papers // Oct 2009

    A Personalized Stock Investors Alert System

    Stock investors all agree that one of the hardest things they have to do is keep up with the rapid changes in the markets. The Internet carries a huge amount of up-to-the minute information for investors such as current stock prices, exchange rates, sales volumes, latest deals, trading averages, organizations'...

    Provided By Academy Publisher

  • White Papers // Jul 2010

    Research on Optimistic Fair Protocol for Cascading P2P Exchange

    In simple electronic commerce transaction, some parties serve as vendors, and the others act as buyers. Usually vendors receive the payment instrument, and subsequently cash it from the bank, instead of using it for buying goods from other vendors. However, in P2P payment environment, some peers serve as both vendors...

    Provided By Academy Publisher

  • White Papers // Aug 2009

    A New Method to Detect Abnormal IP Address on DHCP

    Dynamic Host Configuration Protocol (DHCP) provides a means of allocating and managing IP addresses dynamically over a network. An important characteristic of the DHCP server is that different hosts or network cards are not allowed to simultaneously use the same IP address in the DHCP mechanism. However, anyone can guest...

    Provided By Academy Publisher

  • White Papers // Jun 2011

    Analytical Design of PID Decoupling Control for TITO Processes With Time Delays

    Based on unit feedback closed-loop control structure, a simple analytical design method of decoupling controller matrix is proposed in terms of idea of coupling matrix for Two-Input-Two-Output (TITO) processes with time delays in chemical and industrial practice. By means of powerful robustness of two degree-of-freedom PID Desired Dynamic Equation (DDE)...

    Provided By Academy Publisher

  • White Papers // Jun 2011

    Human Activity Clustering for Online Anomaly Detection

    This paper aims to address the problem of profiling human activities captured in surveillance videos for the applications of online normal human activity recognition and anomaly detection. A novel framework is developed for automatic human activity modeling and online anomaly detection without any manual labeling of the training dataset. The...

    Provided By Academy Publisher