Academy Publisher

Displaying 1-40 of 2431 results

  • White Papers // Jul 2014

    A New Multi-Class WSVM Classification to Imbalanced Human Activity Dataset

    In this paper the authors concerned with the class imbalance problem in activity recognition field which has been known to hinder the learning performance of classification algorithms. To deal this problem, the authors propose a new version of the multi-class Weighted Support Vector Machines (WSVM) method to perform automatic recognition...

    Provided By Academy Publisher

  • White Papers // Jul 2014

    Evaluation of DGEMM Implementation on Intel Xeon Phi Coprocessor

    In this paper the authors will present a detailed study of implementing Double-precision GEneral Matrix Multiply (DGEMM) utilizing the Intel Xeon Phi Coprocessor. They discuss a DGEMM algorithm implementation running \"Natively\" on the coprocessor, minimizing communication with the host CPU. They will run DGEMM across a range of matrix sizes...

    Provided By Academy Publisher

  • White Papers // Jul 2014

    Image Segmentation with Fuzzy Clustering Based on Generalized Entropy

    Aimed at fuzzy clustering based on the generalized entropy, an image segmentation algorithm by joining space information of image is presented in this paper. For solving the optimization problem with generalized entropy's fuzzy clustering, both hopfield neural network and multi-synapse neural network are used in order to obtain cluster centers...

    Provided By Academy Publisher

  • White Papers // Jun 2014

    A Novel Resource Pricing Mechanism Based on Multi-Player Gaming Model in Cloud Environments

    Recently, cloud computing has become a promising network platform for non-trivial applications. The key feature of cloud computing is on-demand resource provision by utility paradigm. Therefore, resource pricing mechanism plays an important role for realizing on-demand resource provision. Unfortunately, existing resource pricing mechanism will result in many negative effects on...

    Provided By Academy Publisher

  • White Papers // Jun 2014

    Research on Cloud-Based Mass Log Data Management Mechanism

    In this paper, the authors study the file management mechanism of large-scale cloud-based log data. With the rise of big data, there are more and more the hadoop-based applications. Log analysis is an important part of network security management, but the existing network log analysis system can't deal with huge...

    Provided By Academy Publisher

  • White Papers // Jun 2014

    A Dynamic Load-balancing Scheme for XPath Queries Parallelization in Shared Memory Multi-core Systems

    Due to the rapid popularity of multi-core processors systems, the parallelization of XPath queries in shared memory multi-core systems has been studied gradually. Existing paper developed some parallelization methods based on cost estimation and static mapping, which could be seen as a logical optimization of parallel query plan. However, static...

    Provided By Academy Publisher

  • White Papers // May 2014

    Optimizing Data Distribution for Loops on Embedded Multicore with Scratch-Pad Memory

    Software-controlled Scratch-Pad Memory (SPM) is a desirable candidate for on-chip memory units in embedded multi-core systems due to its advantages of small die area and low power consumption. In particular, data placement on SPMs can be explicitly controlled by software. Therefore, the technique of data distribution on SPMs for multi-core...

    Provided By Academy Publisher

  • White Papers // May 2014

    GPU Implementation of Parallel Support Vector Machine Algorithm with Applications to Intruder Detection

    The network anomaly detection technology based on Support Vector Machine (SVM) can efficiently detect unknown attacks or variants of known attacks; however, it cannot be used for detection of large-scale intrusion scenarios due to the demand of computational time. The Graphics Processing Unit (GPU) has the characteristics of multi-threads and...

    Provided By Academy Publisher

  • White Papers // May 2014

    Proposed Design and Implementation for RESTful Web Server

    In this paper, the authors propose a framework to design and implement novel RESTful web server architecture. The proposed RESTful web server architecture is a lightweight server that will be less taxing on system resources and will therefore handle a greater volume of requests. Furthermore, in contrast to the usual...

    Provided By Academy Publisher

  • White Papers // May 2014

    An Architecture Independent Packing Method for LUT-based Commercial FPGA

    In this paper the authors propose an efficient architecture independent packing method for commercial FPGA. All specific logics of commercial FPGA such as carry chain arithmetic, x-LUT, are pre-designed into reference circuits according to its architecture. Due to complex architecture of contemporary FPGA, to enumerate all reference circuits in a...

    Provided By Academy Publisher

  • White Papers // May 2014

    Mining Frequent Closed Patterns using Sample-growth in Resource Effectiveness Data

    As the occurrence of failure of electronic resources is sudden, real-time record analysis on the effectiveness of all resources in the system can discover abnormal resources earlier and start using backup resources or restructure resources in time, thus managing abnormal situations and finally realizing health management of the system. This...

    Provided By Academy Publisher

  • White Papers // May 2014

    Implementation of Multi-channel FIFO in One BlockRAM with Parallel Access to One Port

    Because of flexibility of application and high cost performance, the low-and-middle-end FPGA has obtained an extensive market. As a fundamental memory structure, the FIFO memory is widely used in FPGA based paper in various manners. But limited by the resources in chip and imperfection of development tools, the problem that...

    Provided By Academy Publisher

  • White Papers // Apr 2014

    A Formal Transformation Approach for Embedded Software Modeling

    Formal specification can enhance the reliability of the embedded system and verify the system properties at the design stage. This paper presents a formal transformation approach for MARTE (Modeling and Analysis of Real Time and Embedded systems) model based on MDA (Model Driven Architecture), and defines the transformation rules of...

    Provided By Academy Publisher

  • White Papers // Apr 2014

    An Effective Clustering Algorithm for Transaction Databases Based on K-Mean

    Clustering is an important technique in machine learning, which has been successfully applied in many applications such as text and webpage classifications, but less in transaction database classification. A large organization usually has many branches and accumulates a huge amount of data in their branch databases called multi-databases. At present,...

    Provided By Academy Publisher

  • White Papers // Apr 2014

    Model-based Bayesian Reinforcement Learning in Factored Markov Decision Process

    Learning the enormous number of parameters is a challenging problem in model-based Bayesian reinforcement learning. In order to solve the problem, the authors propose a model-based Factored Bayesian Reinforcement Learning (F-BRL) approach. F-BRL exploits a factored representation to describe states to reduce the number of parameters. Representing the conditional independence...

    Provided By Academy Publisher

  • White Papers // Apr 2014

    The Workflow Task Scheduling Algorithm Based on the GA Model in the Cloud Computing Environment

    Taking advantage of the resource sharing, the cloud computing service mode save the investment cost efficiently. In a cloud computing environment, the workflow task scheduling algorithm is based on the task processing time and the execution cost factors and start point of the user demand for quality of service, in...

    Provided By Academy Publisher

  • White Papers // Apr 2014

    Resource Scheduling Optimization Algorithm of Energy Consumption for Cloud Computing Based on Task Tolerance

    In order to solve that the energy was seriously wasted in cloud computing, an algorithm of Energy Consumption optimization for Cloud computing based on the task Tolerance (ECCT) was proposed. The concept of the task tolerance was put forward in the algorithm. The resource utilization of cloud computing node was...

    Provided By Academy Publisher

  • White Papers // Apr 2014

    The Large-scale Dynamic Data Rapid Reduction Algorithm Based on Map-Reduce

    With the advent of the era of \"Big data\", the application of the large-scale data is becoming popular. Efficiently using and analyzing the data has become an interesting research topic. Traditional knowledge reduction algorithms read small data samples once into a computer main memory for reduction, but it is not...

    Provided By Academy Publisher

  • White Papers // Apr 2014

    Provable Dynamic Data Possession by Datalog Rules

    In recent years, the concept of data outsourcing has become quite popular. With the appearance of cloud computing, there is a new paradigm: cloud storage. Cloud storage means that the data owner moves its data to a cloud storage server that is supposed to faithfully store the data and make...

    Provided By Academy Publisher

  • White Papers // Apr 2014

    QoS Constraint Based Workflow Scheduling for Cloud Computing Services

    QoS constraint based workflow scheduling described by Directed Acyclic Graph (DAG) has been proved to be a NP-hard problem in cloud computing services, especially for cost minimization under deadline constraint. Due to Deadline Bottom Level (DBL) hasn't considered the concurrence during the real executing process that cause much more shatter...

    Provided By Academy Publisher

  • White Papers // Apr 2014

    An Greedy-Based Job Scheduling Algorithm in Cloud Computing

    Now-a-days/cloud computing has become a popular platform for scientific applications. Cloud computing intends to share a large number of resources such as equipments for storage and computation, and information and knowledge for scientific researches. Job scheduling algorithm is one of the most challenging theoretical issues in the cloud computing area....

    Provided By Academy Publisher

  • White Papers // Apr 2014

    Mitigating Cross-VM Side Channel Attack on Multiple Tenants Cloud Platform

    Virtualization is a key enabling technology in cloud computing. Multiple tenants can share computing resource of cloud provider on demand. While sharing can reduce the expenses of computing, it brings security vulnerability as well since the isolation between different VMs could be violated through side-channel attacks. Recent researches point out...

    Provided By Academy Publisher

  • White Papers // Mar 2014

    A SOM Based Incremental Clustering Algorithm

    Due to fast development of network technique, internet users have to face to massive textual data every day. Because of unsupervised merit of clustering, clustering is a good solution for users to analyze and organize texts into categories. However, most of recent clustering algorithms conduct in static situation. That indicates,...

    Provided By Academy Publisher

  • White Papers // Mar 2014

    On Data and Virtualization Security Risks and Solutions of Cloud Computing

    Data security and virtualization security issues are two key bottlenecks restricting the application of cloud computing promoting and applications, especially for the cloud-based media computing system. In this paper, states of the art of the techniques on cloud computing data security issues, such as data encryption, access control, integrity authentication...

    Provided By Academy Publisher

  • White Papers // Mar 2014

    A Parameterizable NoC Router for FPGAs

    The Network-on-Chip (NoC) approach for designing (System-on-Chip) SoCs is currently used for overcoming the scalability and efficiency problems of traditional on-chip interconnection schemes, such as shared buses and point-to-point links. NoC design draws on concepts from computer networks to interconnect Intellectual Property (IP) cores in a structured and scalable way,...

    Provided By Academy Publisher

  • White Papers // Mar 2014

    Towards Realization of Domain-Specific Scientific Data Cloud for Material Data Sharing

    Scientific data sharing has been an important area of research for several years. However, due to the sharp increase in scientific data, the existing scientific data sharing systems are becoming complicated and cannot meet the demands of current scientific domain communication. In this paper, the realization of material scientific data...

    Provided By Academy Publisher

  • White Papers // Mar 2014

    An Efficient Dimensionality Reduction Approach for Small-sample Size and High-dimensional Data Modeling

    As for massive multidimensional data are being generated in a wide range of emerging applications, this paper introduces two new methods of dimension reduction to conduct small-sample size and high-dimensional data processing and modeling. Through combining the Support Vector Machine (SVM) and Recursive Feature Elimination (RFE), SVM-RFE algorithm is proposed...

    Provided By Academy Publisher

  • White Papers // Mar 2014

    Research of the FP-Growth Algorithm Based on Cloud Environments

    The emergence of cloud computing solves the problems that traditional data mining algorithms encounter when dealing with large data. This paper studies the FP-growth algorithm and proposes a parallel linked list-based FPG algorithm based on MapReduce programming model, named as the PLFPG algorithm. And then it describes the main idea...

    Provided By Academy Publisher

  • White Papers // Mar 2014

    Optimal Virtual Machine Resources Scheduling Based on Improved Particle Swarm Optimization in Cloud Computing

    With the development of high performance computing, there are many computing paradigms including Peer-To-Peer (P2P) computing, cluster computing, services computing, grid computing and cloud computing. This paper presents virtual machines resources scheduling algorithm taking into computing capacity of processing elements and consideration their computational complexity. The authors apply the improved...

    Provided By Academy Publisher

  • White Papers // Mar 2014

    CUDAP: A Novel Clustering Algorithm for Uncertain Data Based on Approximate Backbone

    In recent years, data analysis and knowledge discovery in uncertain data become more and more important in many applications, such as, sensor network, biomedical measurement, financial market analysis and weather predictions, etc. Clustering for uncertain data is an interesting research topic in data mining. Researchers prefer to define uncertain data...

    Provided By Academy Publisher

  • White Papers // Mar 2014

    QoS-aware SaaS Services Selection with Interval Numbers for Group User

    The integration of SaaS service for group user in cloud is challenging, notably because the service's QoS and member's personalization QoS preference in group are uncertain. This is a timely and importance problem with the advent of the SaaS model of service delivery. Therefore, before the SaaS service been utilized,...

    Provided By Academy Publisher

  • White Papers // Mar 2014

    Research and Application of Data Integration in Aircraft Designing Based on SDO

    One of the fundamental problems in complicated system environment is the mechanism of data interaction and sharing between heterogeneous data sources. The known solutions, using middlewares to unify data formats, are not reliable due to the tightly coupled architecture, poor portability and reusability, large update latency, etc. To solve this...

    Provided By Academy Publisher

  • White Papers // Mar 2014

    An Empirical Study for Software Fault-Proneness Prediction with Ensemble Learning Models on Imbalanced Data Sets

    Software faults could cause serious system errors and failures, leading to huge economic losses. But currently none of inspection and verification technique is able to find and eliminate all software faults. Software testing is an important way to inspect these faults and raise software reliability, but obviously it is a...

    Provided By Academy Publisher

  • White Papers // Mar 2014

    A Query Driven Method of Mapping from Global Ontology to Local Ontology in Ontology-based Data Integration

    At present, the mediator/wrapper integration methods are widely used in ontology based data integration because they solve the data update problems of data warehouse method. The key of this method is building of mapping from the global ontology in mediator to the local ontology in wrapper. This paper analyzes the...

    Provided By Academy Publisher

  • White Papers // Mar 2014

    An Improved k-Exclusion Algorithm

    K-exclusion is a generalization of mutual exclusion that allows up to k processes to be in the critical section concurrently. Starvation freedom and First-In-First-Enabled (FIFE) are two desirable progress and fairness properties of k-exclusion algorithms. The authors present the first known bounded-space k-exclusion algorithm that uses only atomic reads and...

    Provided By Academy Publisher

  • White Papers // Mar 2014

    ChordMR: A P2P-based Job Management Scheme in Cloud

    MapReduce is a programming model and an associated implementation for processing parallel data, which is widely used in cloud computing environments. However, the traditional MapReduce system is based on a centralized master-slave structure. While, along with the increase of the number of MapReduce jobs submitted and system scale, the master...

    Provided By Academy Publisher

  • White Papers // Mar 2014

    True Value Estimation of Centrifugal Fan Vibration Data Based on Fusion Method

    Poor information means incomplete and insufficient information, such as unknown probability distributions and trends. In this case, many statistical methods may become ineffective. So a fusion method based on the information poor theory is proposed. The fusion method contains five methods, three concepts, and one rule. The five methods include...

    Provided By Academy Publisher

  • White Papers // Mar 2014

    A New Model of Data Protection on Cloud Storage

    Cloud computing is Internet-based computing, whereby shared resources, software, and information are provided to computers and other devices on demand, like the electricity grid. This paper focuses on studying cloud storage data protection model and implementing encrypted storage of user data in double-key form. User data are encrypted with symmetric...

    Provided By Academy Publisher

  • White Papers // Feb 2014

    The Advantages of Using CHECK Constraints in The Academic Database Tables

    Database plays important role on both web-based and desktop-based information system. Now-a-days web-based information systems dominate information system application. Relational database systems such as Oracle, MySQL, MS SQL Server or PostgreSQL are familiarly used as data base management system. In Indonesia almost all academic information systems at higher education institutions...

    Provided By Academy Publisher

  • White Papers // Feb 2014

    A New Data Mining Approach Combined with Extension Set and Rough Set

    Extension data mining is a product combining extenics with data mining. Establishing the extenics provides a new idea and method for data mining and opens up a new research direction for data mining. Using the extenics method of combining the data mining technology not only can access to static knowledge,...

    Provided By Academy Publisher

  • White Papers // Oct 2013

    MCHITS: Monte Carlo Based Method for Hyperlink Induced Topic Search on Networks

    Hyperlink Induced Topic Search (HITS) is the most authoritative and most widely used personalized ranking algorithm on networks. The HITS algorithm ranks nodes on networks according to power iteration, and has high complexity of computation. This paper models the HITS algorithm with the monte carlo method, and proposes monte carlo...

    Provided By Academy Publisher

  • White Papers // Oct 2013

    Research of Collaborative Filtering Recommendation Algorithm Based on Network Structure

    In this paper the authors combine the classic collaborative filtering algorithm with personalized recommendation algorithm based on network structure. For the data sparsity and malicious behavior problems of traditional collaborative filtering algorithm, the paper introduces a new kind of social network-based collaborative filtering algorithm. In order to improve the accuracy...

    Provided By Academy Publisher

  • White Papers // Oct 2013

    QAODV: Improved Security Routing Protocol of AODV

    Network Control System (NCS) has higher requirements on QoS index of the network, but MANET can hardly meet the demands of control systems because of its own characteristics. The paper improves AODV and proposes AODV routing protocol QAODV with certain QoS security in combination with NCS and MANET, and expounds...

    Provided By Academy Publisher

  • White Papers // Oct 2013

    Routing Protocol Design and Performance Optimization in Cognitive Radio Networks

    Routing protocol is an important issue in cognitive radio networks. This paper explored the issues and challenges of routing protocol in cognitive radio network from five aspects: hidden terminal, exposed terminal, deafness, cross-layer design, and topology. The existed protocols are classified by the metrics: the establishment of active routing, cross-layer...

    Provided By Academy Publisher

  • White Papers // Oct 2013

    PNCRM: A Novel Real-time Multicast Scheme in MANETs Based on Partial Network Coding

    To reduce delay and network congestions caused by traditional network coding techniques, in this paper, the authors propose a Partial Network Coding based Real-time Multicast (PNCRM) scheme for supporting real-time multicast services in mobile ad-hoc networks. This scheme combines the idea of partial network coding with the mesh-based real-time multicast...

    Provided By Academy Publisher

  • White Papers // Sep 2013

    Distributed Data Integration in Content-centric Networks

    The integration of fragmented data seriously impedes the distributed data exploitation in content-centric networks. It requires dealing with the dynamics, semantics and efficiency problems in the data integration. In this paper, a novel scheme is proposed to integrate the fragmented named data into semantic data sequences which can quickly response...

    Provided By Academy Publisher

  • White Papers // Sep 2013

    An Advanced Data Mining Strategy for Multi- Target Tracking in Adverse Environments

    For real-time tracking, simple and accurate data mining is required. The detection process produces a number of clutter measurements in addition to the target measurements and the data mining are important to stochastically distinguish between the target and the clutter measurements. In this paper the authors propose a computationally efficient...

    Provided By Academy Publisher

  • White Papers // Sep 2013

    A High Throughput MAC Protocol for Wireless Sensor Networks in Surveillance Applications

    Monitoring a given environment is a kind of major applications in wireless sensor networks. These WSNs should often meet special requirements, such as high throughput support, service differentiation support and energy efficiency. However, related papers always emphasis on one or two of them, and hardly consider comprehensively. In this paper,...

    Provided By Academy Publisher

  • White Papers // Sep 2013

    Trust Model Based on P2P Network

    In order to change the defect of traditional trust model, the research on trust model based on P2P network is proposed in this paper. It is based on the theoretical characteristic of P2P network and analyzes the trust mechanism and application model and set up a kind of new trust...

    Provided By Academy Publisher

  • White Papers // Sep 2013

    Composite Taste Recognition Method Based on Fuzzy Neural Network

    In order to make recognition for the composite taste, the paper puts forward the research on the composite taste recognition method based on fuzzy neural network based on the wavelet transform. According to the wavelet transformation and the compression and extraction of the data of the taste signals that are...

    Provided By Academy Publisher

  • White Papers // Sep 2013

    A Data-reversible Hiding Algorithm in WSNs

    In view of the phenomenon that data-hiding algorithm is easy to be detected by inspecting tool spam when carrying information, random insertion and histogram modification are adapted in the data hiding. A data-reversible hiding algorithm in WSNs is put forward. By collecting and referring sub-graph, calculating data fusion algorithm that...

    Provided By Academy Publisher

  • White Papers // Sep 2013

    Decentralized Distribution Update Algorithm Based on Compressibility-Controlled Wireless Sensor Network

    Sensor network adopts the lossy compression techniques to collect long-term data, analyze the data tendency and the interested specific data model. In these applications, the sensor is established to collect large numbers of continuous data, and allow the access to the lossy and untimely data. In addition, the neighbor sensor...

    Provided By Academy Publisher

  • White Papers // Sep 2013

    Improved MDS-based Sensor Localization Algorithm in Wireless Sensor Networks

    Sensor localization technology is the principle problem for configuration and operation of wireless sensor network. Since existing multidimensional scaling localization algorithm has its limitation in localization accuracy, a novel method based on node distance correction (DCMDS) is put forward. The improved multidimensional scaling-based sensor localization algorithm partly divides the location...

    Provided By Academy Publisher

  • White Papers // Sep 2013

    Model of Information Security Risk Assessment Based on Improved Wavelet Neural Network

    In this paper the authors concentrate on the information security risk assessment model utilizing the improved wavelet neural network. The structure of the wavelet neural network is similar to the multi-layer neural network, which is a feed-forward neural network with one or more inputs. Afterwards, the authors point out that...

    Provided By Academy Publisher

  • White Papers // Sep 2013

    Traffic Prediction Scheme Based on Chaotic Models in Wireless Networks

    Based on the local support vector algorithm of chaotic time series analysis, the hannan-quinn information criterion and SAX symbolization are introduced. Then a novel prediction algorithm is proposed, which is successfully applied to the prediction of wireless network traffic. For the correct prediction problems of short-term flow with smaller data...

    Provided By Academy Publisher

  • White Papers // Aug 2013

    Practical Security Against Differential and Linear Cryptanalysis for SMS4-like Cipher

    SMS4, a block cipher which employs a special kind of unbalanced feistel structure, has been accepted as the Chinese national standard for securing wireless LANs. This paper investigates the upper bounds of the maximum differential and linear characteristic probabilities of SMS4-like cipher, in order to evaluate the practical security against...

    Provided By Academy Publisher

  • White Papers // Aug 2013

    Performance Analysis of MapReduce Program in Heterogeneous Cloud Computing

    The research of hadoop is an important part of cloud computing industry, and hadoop performance research is a key research direction. The hadoop performance analysis as a basic work can provide important reference for other performance optimization researches. In this paper, based on previous papers of server performance analysis, the...

    Provided By Academy Publisher

  • White Papers // Aug 2013

    Optimal Resource Allocation for Cross-layer Utility Maximization in Ad Hoc Networks

    In this paper the authors adopt the Generalized Network Utility Maximization (GNUM) approach and propose a cross-layer optimized congestion, contention and power control algorithm for ad hoc networks. The goal is to find optimal end-to-end source rates at the transport layer, per-link persistence probabilities at the medium access control layer...

    Provided By Academy Publisher

  • White Papers // Aug 2013

    Context-aware Greedy Scheduling Algorithm in Wireless Network

    In order to measure the link's interference in static heterogeneous wireless networks, the authors need to know its context information, but the context information cannot be informed before the link allocates the time slot. Because of the highly inadequate collection and the use of traditional scheduling algorithms for link interference...

    Provided By Academy Publisher

  • White Papers // Aug 2013

    Data Storage Algorithms Based on Clustering in Wireless Sensor Networks

    Wireless sensor's traditional data storage algorithms exist many problems, such as lack of adaptability and load balancing, great energy consumption, long network cycle lifetime, high delay access rate and so on. This paper proposes an adaptive Clustering Based on Data Storage (CBDS) algorithm to deal with these problems. Through analysis...

    Provided By Academy Publisher

  • White Papers // Aug 2013

    Distributed Combat System of Systems Network Modeling

    How to generate the topology model of distributed combat system of systems network is an important issue in combat analysis. A combat network construction algorithm was proposed to solve the problem. The improved hierarchy network evolving method was used to construct the command and control network, and the combat network...

    Provided By Academy Publisher

  • White Papers // Aug 2013

    A Trust-based Information Propagation Model in Online Social Networks

    As a new media, social network gains a wide range of social influence, and the social network based e-commerce becomes more and more popular, therefore, the study of information propagation is great of significance. In this paper, the authors will presents a trust based information propagation model, just as the...

    Provided By Academy Publisher

  • White Papers // Aug 2013

    A New Load-balancing Algorithm in Wireless Networks

    Since traditional soft load balancing algorithm in the heterogeneous wireless networks exists the problem of high load deviation and low system throughput, this paper proposes grid-based load-balancing algorithm to improve the integration of heterogeneous wireless throughput and reduce business delay and load deviation, while ensuring network quality of service basis....

    Provided By Academy Publisher

  • White Papers // Aug 2013

    The System Design of a Node of P2P Networks for Intrusion Detection

    To improve the measuring accuracy of intrusion detection, a system design of a node for intrusion detection is proposed in this paper. First, the technology that applies the traditional intrusion detection method, such as anomaly detection and misuse detection, into P2P networks is presented. Next, to build the trust relationship...

    Provided By Academy Publisher

  • White Papers // Jul 2013

    A Soft Fault-concept Diagnosis Method of Analog Circuits Based on Cloud Model Theory

    As the component parameters of analog circuits are influenced by tolerance, a soft fault-concept diagnosis model in this paper, which is based on the qualitative concepts of cloud model theory, is proposed to achieve the complete description of fault states and the fast diagnosis. The diagnosis model uses the cloud...

    Provided By Academy Publisher

  • White Papers // Jul 2013

    Organization and Correction of Spatial Data in Mobile GIS

    With the development of wireless communication technology and web GIS, the technology and applications of mobile GIS are also developed. Based on lightweight mobile equipment, mobile GIS has the feature of flexibility and convenience, and is suitable for field operations, but it is also low memory, low CPU, has limited...

    Provided By Academy Publisher

  • White Papers // Jul 2013

    A Sketch-Based Clustering Algorithm for Uncertain Data Streams

    Due to the inaccuracy and noisy, uncertainty is inherent in time series streams, and increases the complexity of streams clustering. For the continuous arriving and massive data size, efficient data storage is a crucial task for clustering uncertain data streams. With hash-compressed structure, an extended uncertain sketch and update strategy...

    Provided By Academy Publisher

  • White Papers // Jul 2013

    Web Entities Extraction Based on Semi- Structured Semantic Database

    With the explosive growth of WWW information, more and more Web information needs to be extracted and reasonably effective managed. Web is the biggest source of information and contains many entities and relationships between them, extracting these data from massive web pages and integrating to a semi-structured data with rich...

    Provided By Academy Publisher

  • White Papers // Jul 2013

    Energy-Efficient Data Processing Scheme in Sensor Networks

    Data processing is an important issue in Wireless Sensor Networks (WSNs). However, constrained energy will lead to the network life deeply affected by the power consumption of data processing. Hence, reducing the power consumption becomes an important objective to improve the performance of WSNs. In this paper, an Energy-Efficient Data...

    Provided By Academy Publisher

  • White Papers // Jun 2013

    A Key Management Algorithm Based on Two-tier Architecture in Wireless Ad Hoc Network

    In this paper, a novel key management model and algorithm for two-tier architecture network are proposed based on Elliptic Curve Cryptosystem (ECC) Combined with Public Key (CPK) technology, verifiable secret sharing technology, and two-tier architecture network technology. This novel key management algorithm is composed of several sub-algorithms, such as key...

    Provided By Academy Publisher

  • White Papers // Mar 2012

    Virtualization in Wireless Sensor Network: Challenges and Opportunities

    Wireless Sensor Networks (WSNs) are gaining importance for their broad range of commercial applications such as in home automation, health-care and industrial automation. In these applications multi-vendor and heterogeneous sensor nodes are deployed. Due to strict administrative control over the WSN domains, communication barrier, conflicting goal & economic interest of...

    Provided By Academy Publisher

  • White Papers // Mar 2012

    An Optimization Technique for Improved VoIP Performance over Wireless LAN

    The performance of wireless LANs is greatly affected by path-loss, RF interference and other sources of signal attenuation, in addition to network congestion. The primary factors involved in effective real-time communication, namely delay and loss, must be within certain controlled limits in such a scenario. In this paper, the authors...

    Provided By Academy Publisher

  • White Papers // Mar 2012

    Cluster Analysis Based Switching-off Scheme of Base Stations for Energy Saving

    Recent studies on green communications and networks indicate that most traffic loads could be served by a certain part of base stations during the low load period. In this paper, the authors present an energy saving approach which is based on the cluster analysis of traffic loads in urban space....

    Provided By Academy Publisher

  • White Papers // Mar 2012

    Efficient Routing Algorithm Based on Decision-making Sequence in Wireless Mesh Networks

    The ultimate goal of routing in Wireless Mesh Networks (WMNs) is to find the \"Good\" paths between the source and destination. Considering of the characteristics of this new networking paradigm, such as low mobility and less restriction from the energy effect, the focus is on the design and optimization of...

    Provided By Academy Publisher

  • White Papers // Mar 2012

    Cryptanalysis of Three Event Signature Protocols for Peer-to-peer Massively Multiplayer Online Games

    The researcher presented an event signature (EASES) protocol for Peer-To-Peer Massively Multiplayer Online Games (P2P MMOGs). The authors declare that the EASES protocol is efficient and secure, and could achieve non-repudiation, event commitment, save memory, bandwidth and reduce the complexity of the computations. However, the authors find that Chan et...

    Provided By Academy Publisher

  • White Papers // Mar 2012

    A Multiple-Policy supported Attribute-Based Access Control Architecture within Large-scale Device Collaboration Systems

    In order to collaborate large numbers of heterogeneous distributed devices over multiple domains within a modern large-scale device collaboration system, a fine-grained, flexible and secure approach is required for device authentication and authorization. This paper proposed a multiple-policy supported attribute-based access control model and its architecture to address these demands....

    Provided By Academy Publisher

  • White Papers // Mar 2012

    Clustering Model of P2P CDN Based on The Prediction of User Requirements

    with the increasing scale of the P2P (Peer-To-Peer) network, the contradictions among the scope expanding, the time expending reducing and the network loading of content search is growing more serious. As the required contents and replicas are distributed in the P2P network, the searching scope reduction will result in achieving...

    Provided By Academy Publisher

  • White Papers // Mar 2012

    Task Scheduling Optimization in Cloud Computing Based on Heuristic Algorithm

    Cloud computing is an emerging technology and it allows users to pay as you need and has the high performance. Cloud computing is a heterogeneous system as well and it holds large amount of application data. In the process of scheduling some intensive data or computing an intensive application, it...

    Provided By Academy Publisher

  • White Papers // Mar 2012

    Evolution Modeling of Complex Network Dynamics

    Real-world complex systems are composed of interacting entities with nontrivial dynamical behavior and complicated interaction topology. A class of models is examined whose primary goal is to explain network properties, especially model system with spatial information like human brain, and methods for modeling spatial system tend to get inconsistent results....

    Provided By Academy Publisher

  • White Papers // Mar 2012

    Efficient Resource Reservation Scheme in Service-Oriented Network Environment

    How to safeguard the Quality of Service (QoS) for users is an important issue in network computing task and resource reservation is one of the technologies. However, errors such as resource failure and reservation time overlap often result in reservation failure. To address these problems, this paper proposes a resource...

    Provided By Academy Publisher