Academy Publisher

Displaying 1-40 of 2508 results

  • White Papers // Sep 2014

    Knowledge Unit Relation Recognition Based on Markov Logic Networks

    Knowledge Unit (KU) is the smallest integral knowledge object in a given domain. Knowledge unit relation recognition is to discover implicit relations among KUs, which is a crucial problem in information extraction. This paper proposes a knowledge unit relation recognition framework based on Markov logic networks, which combines probabilistic graphical...

    Provided By Academy Publisher

  • White Papers // Sep 2014

    Clustering-based Routing Algorithm in Wireless Sensor Networks with Mobile Sink

    Most of the existing data gathering strategies are based on the structure of stationary sink in wireless sensor networks, which will lead to rapidly energy consumption of sensor nodes near the sink for the reason that these nodes burden the data transmission from the whole network. This paper proposes a...

    Provided By Academy Publisher

  • White Papers // Sep 2014

    Efficient Resource Allocation with QoS Guarantee on LTE-A Downlink Network Systems

    Effective radio resource management is a fundamental component in all wireless communication systems. From the user and service providers' point of view, the emerging LTE - A network is expected to deliver high performance sensitive applications like VOIP, videoconferencing, mobile video services, etc. These converged services have unique traffic-handling and...

    Provided By Academy Publisher

  • White Papers // Sep 2014

    A Robust Data Gathering Technique for Large Scaled Wireless Sensor Networks

    In this paper, the authors propose a data gathering scheme for large scaled wireless sensor networks using multiple Mobile Data Collectors (MDCs) and the Spatial Division Multiple Access (SDMA) technique. They focus on minimizing the data gathering time by employing the SDMA technique, and minimizing the length of touring paths...

    Provided By Academy Publisher

  • White Papers // Sep 2014

    Filtering Network Spam Message using Approximated Logistic Regression

    The development of telecom network and Internet provides effective ways for communication. As an important way in communication, Short Messaging Service (SMS) via both telecom network and Internet has played an increasing important role in daily life. However, it usually suffers from spam SMS that causes misunderstanding and cheat. The...

    Provided By Academy Publisher

  • White Papers // Sep 2014

    P2P Network Traffic Identification Based on Random Forest Algorithm

    With the rapid development of computer technique in the past decades, the emergence of P2P technique prompts the network computing model evolving from centralized network to distributed network. Although P2P technique has brought tremendous changes to the network technique, P2P technique also exposes a lot of problems during its implementation....

    Provided By Academy Publisher

  • White Papers // Sep 2014

    Stable AODV Routing Protocol with Energy-aware in Mobile Ad Hoc Network

    In Mobile Ad hoc NETwork (MANET), due to the mobility of the nodes it is difficult to find the route which can maintain the whole process of data transmission. Therefore, it is very critical to balance, maintain and repair the route within the mobility of nodes and the limited battery...

    Provided By Academy Publisher

  • White Papers // Sep 2014

    Node-Based Resource Optimization Algorithm of Wireless Network

    In order to improve the traditional wireless sensor network resources shortcomings of single, large power consumption, this paper puts forward the optimization algorithm of wireless sensor network resources. And analyzes the network design of wireless sensor network, optimize the algorithm in the rate and the node power consumption and energy...

    Provided By Academy Publisher

  • White Papers // Sep 2014

    A Physical Layer Key Negotiation Mechanism to Secure Wireless Networks

    The rapid technological developments in computing technology and the proliferation of wireless network nodes with light infrastructure, have emerged large quantities of security requirements of informational privacy in cyberspace. Due to the inherent nature of open medium, diversity and variability of network topology, wireless networks are greatly difficult to secure...

    Provided By Academy Publisher

  • White Papers // Sep 2014

    Social Relation Based Cache Distribution Policy in Wireless Mobile Networks

    Recent advances in intelligent mobile terminal result in the rapid development of wireless mobile networks, which has inherently properties of high access time, low bandwidth and other shortcoming that pull down the Quality of Service (QoS). Cache technologies are considered as the most favorable tools for dealing with the problems...

    Provided By Academy Publisher

  • White Papers // Sep 2014

    Automatic Generation of Meta Classifiers with Large Levels for Distributed Computing and Networking

    In this paper, the authors devoted to a case study of a new construction of classifiers. These classifiers are called automatically generated multi-level meta classifiers, AGMLMC. The construction combines diverse meta classifiers in a new way to create a unified system. This original construction can be generated automatically producing classifiers...

    Provided By Academy Publisher

  • White Papers // Sep 2014

    Service Adaptively Medium Access Control Algorithm Based on Fuzzy Logical for Energy Harvesting Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) possess diverse traffic due to different monitoring tasks carried out by sensor nodes. Meanwhile, in energy harvesting WSNs, the main goal is to match energy consumption with the energy harvesting rate which is different from minimizing energy consumption in battery-powered WSNs. The authors propose a dynamic...

    Provided By Academy Publisher

  • White Papers // Sep 2014

    A Blind Adaptive Kalman-PIC MUD Algorithm for the Multiple Access Communication Network

    In wireless communication network field, the multiple access systems as Code Division Multiple Access (CDMA), Frequency Division Multiple Access (FDMA) and Time Division Multiple Access (TDMA), have been widely studied and applied. In the parallel signal processing, the multi-user detection precision of Parallel Interference Cancellation (PIC) detector is always easily...

    Provided By Academy Publisher

  • White Papers // Sep 2014

    A Collaboration-based Distributed TDMA Scheduling Algorithm for Data Collection in Wireless Sensor Networks

    For data collection application in wireless sensor networks, it is a hard task to guarantee interference-aware slot assignment in distributed TDMA scheduling algorithm. This paper proposed a new scheduling algorithm based on the collaboration of nodes to resolve the slot collision when nodes try to assign slots to them. The...

    Provided By Academy Publisher

  • White Papers // Sep 2014

    Radar Detection Based on Fuzzy Hypotheses with Fuzzy Data

    A new approach for testing fuzzy hypotheses with fuzzy data based on fuzzy test statistic function is proposed. First, the authors present h-level (the end points are closed interval) for the fuzzy hypotheses parameter and the fuzzy data. Then, they construct the related fuzzy test statistic. Second, three different types...

    Provided By Academy Publisher

  • White Papers // Sep 2014

    Optimization Algorithm of Power Communication Network Based on the Equivalent Network

    Electric power communication requires two nodes in the network or cable period expires, the communication network as a whole is still can continue to run. Reliable power network can provide reliable operation of electric power for dispatching communication security. Due to many key network nodes external connectivity in the electric...

    Provided By Academy Publisher

  • White Papers // Sep 2014

    Research of RFID Tag Anti-collision Algorithm based on Binary Tree

    To solve the RFID tag collision problem, a new anti-collision algorithm is proposed by improving the binary tree search algorithm. Through improving the requesting establishment, this algorithm reduces the probability of collision bits and the number of tags requiring collision detection time by using the even number bits for impact...

    Provided By Academy Publisher

  • White Papers // Sep 2014

    Packet Delay Estimation Algorithm Against FIFO Waiting for Asymmetric IEEE 1588 System

    Performance in IEEE 1588 synchronization depends on several related factors. Among them, the symmetry of packet delay is the most basic one. But most existing networks could not provide symmetry packet delay between master and slave clocks. From research the authors found that, FIFO waiting during packet transmitting is one...

    Provided By Academy Publisher

  • White Papers // Sep 2014

    GPS Receiver Autonomous Integrity Monitoring Algorithm Based on Improved Particle Filter

    Reliability of a navigation system is one of great importance for navigation purposes. Therefore, an integrity monitoring system is an inseparable part of aviation navigation system. Failures or faults due to malfunctions in the systems should be detected and repaired to keep the integrity of the system intact. According to...

    Provided By Academy Publisher

  • White Papers // Aug 2014

    Data Intensive Dynamic Scheduling Model and Algorithm for Cloud Computing Security

    As cloud is growing immensely, different types of data are getting more and more dynamic in terms of security. Ensuring high level of security for all data in storages is highly expensive and time consuming. Unsecured services on data are also becoming vulnerable for malicious threats and data leakage. The...

    Provided By Academy Publisher

  • White Papers // Aug 2014

    Design and Implementation of Data Synchronization System Based on FPGA

    In this paper, the authors mainly aims at solving the problems of sampled data synchronization in digital substation based on Field Programmable Gate Array (FPGA). Compared with traditional substations, the design achieves data synchronization without connecting an external clock. Synchronization algorithm is based on Newton interpolation algorithm. The system consists...

    Provided By Academy Publisher

  • White Papers // Aug 2014

    The Influence of Inconsistent Data on Cost- Sensitive Classification Using Prism Algorithms: An Empirical Study

    Cost-sensitive classification is one of the hottest research topics in data mining and machine learning. It is prevalent in many applications, such as Automatic Target Recognition (ATR), medical diagnosis, etc. However, the data in practice may be inconsistent due to dimensional reduction operation or other pre-processing, yet it is not...

    Provided By Academy Publisher

  • White Papers // Aug 2014

    On P2P-Based Semantic Service Discovery with QoS Measurements for Pervasive Services in the Universal Network

    The universal network, which promises pervasive services, is well on the way. As the Quality of Service (QoS) grading is a significant feature of the universal network, various pervasive services can be distinguished not only by service types, but also by QoS. This characteristic makes service discovery of the universal...

    Provided By Academy Publisher

  • White Papers // Jul 2014

    Evaluation of DGEMM Implementation on Intel Xeon Phi Coprocessor

    In this paper the authors will present a detailed study of implementing Double-precision GEneral Matrix Multiply (DGEMM) utilizing the Intel Xeon Phi Coprocessor. They discuss a DGEMM algorithm implementation running \"Natively\" on the coprocessor, minimizing communication with the host CPU. They will run DGEMM across a range of matrix sizes...

    Provided By Academy Publisher

  • White Papers // Jul 2014

    A New Multi-Class WSVM Classification to Imbalanced Human Activity Dataset

    In this paper the authors concerned with the class imbalance problem in activity recognition field which has been known to hinder the learning performance of classification algorithms. To deal this problem, the authors propose a new version of the multi-class Weighted Support Vector Machines (WSVM) method to perform automatic recognition...

    Provided By Academy Publisher

  • White Papers // Jul 2014

    Image Segmentation with Fuzzy Clustering Based on Generalized Entropy

    Aimed at fuzzy clustering based on the generalized entropy, an image segmentation algorithm by joining space information of image is presented in this paper. For solving the optimization problem with generalized entropy's fuzzy clustering, both hopfield neural network and multi-synapse neural network are used in order to obtain cluster centers...

    Provided By Academy Publisher

  • White Papers // Jul 2014

    A Novel Efficient Design of Survivable WDM Mesh Networks

    The design of survivable WDM mesh networks based on p-cycles has been extensively studied. However, most of studies only deal with a single link failure rather than node failure. In this paper, the authors develop a new scalable and efficient design method for computing node-protecting p-cycles in order to ensure...

    Provided By Academy Publisher

  • White Papers // Jul 2014

    Study on Trusting Relationship in Complex Network

    In order to find the information dissemination rules in the social network, trusting relationship is proposed from a view of the influences of the members in a complex network. The basic metric, trusting value is defined to measure trusting degree between individuals in the network. A greedy algorithm with O...

    Provided By Academy Publisher

  • White Papers // Jul 2014

    Modified Mutual Information-based Feature Selection for Intrusion Detection Systems in Decision Tree Learning

    As network-based technologies become omnipresent, intrusion detection and prevention for these systems become increasingly important. This paper proposed a Modified Mutual Information-based Feature Selection algorithm (MMIFS) for intrusion detection on the KDD Cup 99 dataset. The C4.5 classification method was used with this feature selection method. In comparison with Dynamic...

    Provided By Academy Publisher

  • White Papers // Jul 2014

    Detecting Falls Using Accelerometers by Adaptive Thresholds in Mobile Devices

    In this paper, the authors presented an effective and efficient algorithm on adaptive thresholds to automatically recognize falls from acceleration signals collected by a single tri-axial accelerometer in a mobile phone. Initial thresholds depend mainly on their carrying position of mobile phones, and then are adjusted automatically by a self-learning...

    Provided By Academy Publisher

  • White Papers // Jul 2014

    Enhancing Efficiency of Intrusion Detection Based on Intelligent Immune Method in MANET

    In order to enhance efficiency of intrusion detection in the Mobile Ad hoc NETwork (MANET), an intrusion prediction method based on intelligent immune threshold matching algorithm was presented. Using a dynamic load-balancing algorithm, wireless network data packet was distributed to a set of analysis subsystem by the balance subsystem; it...

    Provided By Academy Publisher

  • White Papers // Jun 2014

    A Novel Resource Pricing Mechanism Based on Multi-Player Gaming Model in Cloud Environments

    Recently, cloud computing has become a promising network platform for non-trivial applications. The key feature of cloud computing is on-demand resource provision by utility paradigm. Therefore, resource pricing mechanism plays an important role for realizing on-demand resource provision. Unfortunately, existing resource pricing mechanism will result in many negative effects on...

    Provided By Academy Publisher

  • White Papers // Jun 2014

    Research on Cloud-Based Mass Log Data Management Mechanism

    In this paper, the authors study the file management mechanism of large-scale cloud-based log data. With the rise of big data, there are more and more the hadoop-based applications. Log analysis is an important part of network security management, but the existing network log analysis system can't deal with huge...

    Provided By Academy Publisher

  • White Papers // Jun 2014

    A Dynamic Load-balancing Scheme for XPath Queries Parallelization in Shared Memory Multi-core Systems

    Due to the rapid popularity of multi-core processors systems, the parallelization of XPath queries in shared memory multi-core systems has been studied gradually. Existing paper developed some parallelization methods based on cost estimation and static mapping, which could be seen as a logical optimization of parallel query plan. However, static...

    Provided By Academy Publisher

  • White Papers // Jun 2014

    DDoS: Flood vs. Shrew

    Distributed Denial of Service (DDoS) attack is one of the greatest threats to connectivity, continuity, and availability of the Internet. In this paper, two typical types of DDoS attacks, high-rate (flood) and low-rate (shrew) are studied on their generation principles, mechanism utilizations, behaviors, signatures, and attack performances. Experiment results show...

    Provided By Academy Publisher

  • White Papers // Jun 2014

    A Novel Sink Mobility Off-line Algorithm for Avoiding Energy Hole in Wireless Sensor Network

    In multi-hop data collection sensor network, nodes near the sink need to relay remote data, thus, have much faster energy dissipation rate and suffer from premature death. This phenomenon cause energy hole near the sink, seriously damaging the network performance. In this paper, the authors propose sink mobility with adjustable...

    Provided By Academy Publisher

  • White Papers // Jun 2014

    Hardware/Software Partitioning Algorithm Based on Genetic Algorithm

    To solve the HardWare/SoftWare (HW/SW) partitioning problem on the system that contains only one CPU, a new algorithm based on GA is studied. Firstly, the concept of hardware orientation is put forward, and then used to create the initial colony of GA and in mutation process, which reduces the randomicity...

    Provided By Academy Publisher

  • White Papers // Jun 2014

    Adaptive Control based Particle Swarm Optimization and Chebyshev Neural Network for Chaotic Systems

    The control approach for chaotic systems is one of the hottest research topics in nonlinear area. This paper is concerned with the controller design problem for chaotic systems. The Particle Swarm Optimization (PSO) algorithm is firstly proposed to search for the weights of the Chebyshev Neural Networks (CNNs), and then...

    Provided By Academy Publisher

  • White Papers // May 2014

    Implementation of Multi-channel FIFO in One BlockRAM with Parallel Access to One Port

    Because of flexibility of application and high cost performance, the low-and-middle-end FPGA has obtained an extensive market. As a fundamental memory structure, the FIFO memory is widely used in FPGA based paper in various manners. But limited by the resources in chip and imperfection of development tools, the problem that...

    Provided By Academy Publisher

  • White Papers // May 2014

    Mining Frequent Closed Patterns using Sample-growth in Resource Effectiveness Data

    As the occurrence of failure of electronic resources is sudden, real-time record analysis on the effectiveness of all resources in the system can discover abnormal resources earlier and start using backup resources or restructure resources in time, thus managing abnormal situations and finally realizing health management of the system. This...

    Provided By Academy Publisher

  • White Papers // Apr 2010

    A Middleware-Based Approach for Mobile Service Delivery

    Service applications in mobile environment with large potential users become more and more popular. However, there are some limitations and obstacles for service delivery in mobile environment because of the particularity of mobile network and limiting ability of mobile terminals. In order to improve the efficiency and performance of service...

    Provided By Academy Publisher

  • White Papers // Sep 2009

    CARISMA - A Service-Oriented, Real-Time Organic Middleware Architecture

    To cope with the ever increasing complexity of today's computing systems, the Concepts of Autonomic and Organic Computing (AC/OC) have been devised. Organic or autonomic systems are characterized by so-called self-X properties such as self-configuration and self-optimization. This approach is particularly interesting in the domain of distributed, embedded, real-time systems....

    Provided By Academy Publisher

  • White Papers // Nov 2009

    Improving Pairing Mechanism in Bluetooth Security

    Bluetooth has been developed to provide mobile ad hoc connectivity between a wide range of portable and fixed devices. Bluetooth is a Wireless Personal Area Network (WPAN) Standard that is moderately secure but still has weaknesses in its security architecture. One such weakness has been identified in its pairing mechanism,...

    Provided By Academy Publisher

  • White Papers // Nov 2009

    Learning to Match XML Schemas - A Decision Tree based Approach

    Schema matching, finding semantic correspondences between elements of two schemas, is an essential activity in many application domains such as data mining, data warehousing, web data integration, and XML message mapping. In this paper, a decision tree based approach is presented to match the similarity between two XML schemas. Experimental...

    Provided By Academy Publisher

  • White Papers // Nov 2009

    Exploiting XML Dom for Restricted Access of Information

    Time Bound Access (TBA) has been a major challenge for online information distribution services. A secure and constrained information transmission over the public network is the key aspect of such services wherein a genuine user who is privileged should not be denied of service under any circumstances. As it is...

    Provided By Academy Publisher

  • White Papers // May 2009

    Source Routing in Mobile Ad Hoc NETworks (MANETs)

    Mobile ad hoc network is a reconfigurable network of mobile nodes connected by multi-hop wireless links and capable of operating without any fixed infrastructure support. In order to facilitate communication within such self-creating, self-organizing and self-administrating network, a dynamic routing protocol is needed. The primary goal of such an ad...

    Provided By Academy Publisher

  • White Papers // Feb 2009

    Multi-Model Music Content Description and Retrieval Using IEEE 1599 XML Standard

    The new format IEEE 1599 for music and audio content description defines a standard for the representation of retrieval models within music and music/audio formats that makes use of XML documents as content descriptors. This paper described how music/audio semantics can be actually represented within the Structural Layer of IEEE...

    Provided By Academy Publisher

  • White Papers // May 2009

    Research on Fast Implementation of RSA With Java

    This paper introduces the principles of RSA, then based on these principles the implementation of RSA is discussed. After that several classes are analyzed and designed with Object-Oriented methods, and these classes are implemented with Java language. In the third fourth part, the authors give the fast implementation of RSA...

    Provided By Academy Publisher

  • White Papers // Jun 2009

    Research on On-Card Bytecode Verifier for Java Cards

    The bytecode verification is a key point of the security chain of the Java Platform. This feature is optional in many embedded devices since the memory requirements of the verification process and the process capability of hardware are too high. This paper proposes a verifier that utilizes the logical flow...

    Provided By Academy Publisher

  • White Papers // Sep 2009

    Global Optimization of Multi Radio Mesh Access Point Location in Underground Area

    This paper shows that with a proper placement of Mesh multi radio devices in a confined area, it is possible to reduce the congestion in the WMN (Wireless Mesh Network) by 50 to 60 percent according to the loaded traffic. The best portal deployment is obtained by minimizing the maximum...

    Provided By Academy Publisher

  • White Papers // May 2009

    Peer to Peer Network for Mobile Communication

    This paper focuses on possibilities of implementation of peer to peer architecture of communication over mobile platform. There are many studies going on nowadays about Peer to Peer (P-to-P) and file-sharing. Some studies predict staggering 45% of total internet traffic is P-to-P. Mobile operators need to embrace Peer to Peer...

    Provided By Academy Publisher

  • White Papers // May 2009

    Network Survivability for a Regular WDM Optical Network From Double-Link Failures Using Greedy Algorithm

    Network survivability is an important requirement in high-speed optical networks. The survivability of these networks from the failure of a single component such as a link or a node needs some typical approaches. In this paper, one have considered double-link failures in a hypercube optical network and present three loopback...

    Provided By Academy Publisher

  • White Papers // Nov 2009

    Threats and Vulnerabilities in Wireless Mesh Networks

    Wireless Mesh Networks (WMN) encompass a new area of technology set to play an important role in the next generation wireless mobile networks. WMN is characterized by dynamic self-organization, self-configuration and self-healing to enable flexible integration, quick deployment, easy maintenance, low costs, high scalability, and reliable services. Security of such...

    Provided By Academy Publisher

  • White Papers // Aug 2010

    Security Research of VPN Technology Based on MPLS

    The VPN technology based on MPLS is the current mainstream VPN technology that uses isolations of routing and address or other information technologies to resist attacking and marking spoofing, in which the security of data transmission are guaranteed to a certain extent. In this paper, Securities of MPLS VPN are...

    Provided By Academy Publisher

  • White Papers // Nov 2009

    Performance of Routing Protocols for Mobile Adhoc and Wireless Sensor Networks: A Comparative Study

    Mobile Ad hoc Networks (MANETs) as well as Wireless Sensor Networks (WSNs) suffer from various challenges like low bandwidth, overhead and velocity of nodes. This research contribution is the characterization study between MANETs and WSNs environment with respect to various routing protocols. This study investigates the routing protocols corresponding to...

    Provided By Academy Publisher

  • White Papers // Jul 2010

    Research of Network Mass Storage Mode Based on SAN

    In the face of new needs of the current network storage, the traditional DAS, NAS and advanced SAN network storage technology are analyzed, and the technical differences between the three technologies are compared. The redundant technology and main performance indicator system are analyzed by using system reliability theory, and thus...

    Provided By Academy Publisher

  • White Papers // May 2009

    Operating Systems for Tiny Networked Sensors: A Survey

    Wireless Sensor Networks (WSNs) is an emerging area of research. WSNs face lot of problems that do not arise in other types of wireless networks and computing environments. Limited computational resources, power constraints, low reliability and higher density of sensor nodes (motes) are some basic problems that need to be...

    Provided By Academy Publisher

  • White Papers // May 2009

    A Survey on Hybrid Mobile Sensor Networks

    Sensor networks consist of small wireless sensor nodes deployed randomly over an area to monitor the environment or detect intrusion. The coverage provided by sensor networks is very crucial to their effectiveness. Many of the important applications of sensor networks demand autonomous mobility for the sensor nodes. Early failure of...

    Provided By Academy Publisher

  • White Papers // Dec 2008

    Cryptanalysis of Some RFID Authentication Protocols

    Two effective attacks, namely de-synchronization attack and impersonation attack, against Ha et al.'s LCSS RFID authentication protocol, Song and Mitchell's protocol are identified. The former attack can break the synchronization between the RFID reader and the tag in a single protocol run so that they can not authenticate each other...

    Provided By Academy Publisher

  • White Papers // Nov 2009

    Efficient Method for Identifying Location and Removal of Data Redundancy for RFID Data

    Radio Frequency IDentification (RFID) Technology has gained a significant momentum, in the past few years. This technology plays an essential role in object tracking in supply chain management applications and library management applications. RFID Technology holds the promise to simplify baggage handling, clinical laboratory procedures and other tasks by providing...

    Provided By Academy Publisher

  • White Papers // Apr 2009

    Realization of SCM and CRM by Using RFID-Captured Consumer Behavior Information

    Physical store retailers are facing a tougher situation than ever. In order to tackle this tough situation, they need not only to reduce cost by effectively executing SCM but also to introduce measures to increase profit like CRM. They are effective by themselves, but if they are combined the retailers...

    Provided By Academy Publisher

  • White Papers // Nov 2009

    Value Chain Model in Knowledge Management

    Knowledge is a complex and fluid concept to people, so knowledge management focuses on knowledge arrival; also it is considered as strategic activity help organizations to achieve sustainable competitive advantage. Value chain analysis is one of the analysis tools which satisfy continuous competitive advantage on organizations. This paper summarizes the...

    Provided By Academy Publisher

  • White Papers // Aug 2010

    Research of Campus Heterogeneous Database Middleware Based on SOA

    Along with the rapid development of campus information technology, many universities precipitate a great deal of information resources, how well make use of existing resources to build a centralized information resource management system is a serious problem. This paper designs a deep integration architecture of campus information based on SOA,...

    Provided By Academy Publisher

  • White Papers // Nov 2009

    The Requirements for Building an e-Commerce Infrastructure

    This paper will present all requirements to build a reliable e-commerce infrastructure in Jordan. Ecommerce is one of the main desired outcomes from a state internet readiness. Despite the fact that the requirements for e-commerce are very similar to those for an e-government or an internet readiness in general, however,...

    Provided By Academy Publisher

  • White Papers // Jul 2009

    Study on the Application Layer Security in e-Commerce Websites

    Most of studies about E-Commerce Security focus on the data confidentiality issue. Although security mechanisms, such as SSL (secure socket layer) or SET (secure electronic transaction), have been adopted in websites, catastrophic events that confidential data in ECommerce are revealed happened more than once. The essential reason for this is...

    Provided By Academy Publisher

  • White Papers // May 2009

    Distributed Cryptographic Key Management for Mobile Agent Security

    The problem of securing data section in a mobile agent from discovery and exploitation by a malicious host is a difficult task. A full scale adaptation of mobile agents becomes true once the security obstacles are overcome. A number of solutions are proposed based on cryptographic principles have their own...

    Provided By Academy Publisher

  • White Papers // Jun 2009

    Semantic Focused Crawling for Retrieving ECommerce Information

    Focused crawling is proposed to selectively seek out pages that are relevant to a predefined set of topics without downloading all pages of the Web. With the rapid growth of the E-commerce, how to discovery the specific information such as about buyer, seller and products etc. adapting for the online...

    Provided By Academy Publisher

  • White Papers // Nov 2010

    Mobile Payment Framework Based on 3G Network

    With the development of mobile network technology and mobile commerce application, mobile payment is becoming more and more important to assist mobile users to participate in the mobile commerce. Service reliability, security authtification, payment mobility is the core improblem, which should be solve with some flexible and secure measures. After...

    Provided By Academy Publisher

  • White Papers // Dec 2008

    Integrating e-Services With a Telecommunication e-Commerce Using Service-Oriented Architecture

    In the past, electronic commerce only focused on customer-to-business web interaction and on business-to-business web interaction. With the emergence of business process management and of service-oriented architecture, the focus has shifted to the development of e-services that integrate business processes and that diversify functionalities available to customers. The potential of...

    Provided By Academy Publisher

  • White Papers // May 2009

    A Router-Based Technique to Detect and Defend Against Low-Rate Denial of Service

    With the successful use of router technique, one consider to give routers additional function to defect and defend against LDOS. LDOS is a kind of miniature network attack which can affect TCP flows to zero or very low transmission bandwidth, just because it takes advantage of retransmission timeout of TCP....

    Provided By Academy Publisher

  • White Papers // Feb 2009

    An Innovative Pricing Method for Telecommunication Services Pricing Through American Options

    With the evolution of telecommunication networks and of their services the role of service provider is changed, so nowadays there is a coexistence of Network Operators and Virtual Operators. The difference between these players is not in the way they offer a service but primarily in their economic objectives and...

    Provided By Academy Publisher

  • White Papers // Nov 2008

    Quality-Aware Cooperative Proxy Caching for Video Streaming Services

    By applying a proxy mechanism widely used in WWW systems to video streaming systems, low-delay and high-quality video distribution can be accomplished without imposing extra load on the system. The video streaming system proposed in this paper consists of a video server and multiple proxy servers. In authors mechanism, proxies...

    Provided By Academy Publisher

  • White Papers // Aug 2009

    Cross-Layering in an Industrial Wireless Sensor Network: Case Study of OCARI

    Wireless sensor networks are adapted to monitoring applications. Specific solutions have to be developed for industrial environments in order to deal with the harsh radio conditions and the QoS (Quality Of Service) requirements of industrial applications. In this paper, they present the main protocols used in the OCARI project, and...

    Provided By Academy Publisher

  • White Papers // Dec 2009

    A Multi-Attribute Assessment Method for e-Commerce Risks

    Based on multi-attribute decision making theory, a multi-attribute assessment framework for E- commerce risks is presented. The paper applies an improved Evidential Reasoning (ER) approach to support evaluation decision, and uses a credit interval to figure scoring result and allow something absent. E-Commerce risks include environmental risks, management risks, technical...

    Provided By Academy Publisher

  • White Papers // May 2009

    Security Solution of Collaborative Commerce Chain System

    To improve the performance and network security of the collaborative commerce chain system and to deal with shortcomings of existing solution to the electronic commerce, the technology of the mobile agent was introduced into the modeling of the system. Based on the properties of mobile agent, problems of network security...

    Provided By Academy Publisher

  • White Papers // Nov 2009

    Mobile Agent Based Distributed System Computing in Network

    Mobile agents are emerging as a promising paradigm for the design and implementation of distributed applications. While mobile agents have generated considerable excitement in the research community, they have not translated into a significant number of real-world applications. One of the main reasons for this is lack of work that...

    Provided By Academy Publisher

  • White Papers // Feb 2010

    Special Issue: Delay Tolerant Networks, Architecture, and Applications

    Delay-Tolerant Networking (DTN) enables communication in sparse mobile ad-hoc networks and other challenged environments where traditional networking fails and new routing and application protocols are required. Past experience with DTN routing and application protocols has shown that their performance is highly dependent on the underlying mobility and node characteristics. Evaluating...

    Provided By Academy Publisher

  • White Papers // Apr 2010

    Research on Security Policy and Framework

    Policies are rules that govern the choices in behaviors of a system. Security policies define what actions are permitted or not permitted, for what or for whom, and under what conditions. In this paper, the present situation of research on policy is overviewed, including policy and security policy definition, policy...

    Provided By Academy Publisher

  • White Papers // May 2009

    High-Speed Signature Matching in Network Interface Device Using Bloom Filters

    Network intrusion detection systems play a critical role in protecting the information infrastructure of an organization. Due to the sophistication and complexity of techniques used for the analysis they are commonly based on general-purpose workstations. Although cost-efficient, these general-purpose systems are found to be inadequate as they fail to perform...

    Provided By Academy Publisher

  • White Papers // May 2009

    A Mobile Agent Based Architecture for Securing WLANs

    Wireless LANs are open and are vulnerable to various attacks. Techniques available to prevent Wireless LANs from these attacks are not comprehensive. In this paper the authors discuss the drawbacks of the existing security mechanisms and the authors provide a security architecture which uses Mobile agents as a security facilitator....

    Provided By Academy Publisher