Academy Publisher

Displaying 1-40 of 2788 results

  • White Papers // Dec 2014

    Error Performance Analysis of Multiuser CDMA Systems with Space-time Coding in Rician Fading Channel

    In this paper, the error performance of multiuser CDMA system with space-time coding is studied in Rician fading channel, and the corresponding Bit Error Rate (BER) and Symbol Error Rate (SER) analysis are presented. Based on the performance analysis, a simple and effective multiuser receiver scheme is developed. The scheme...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Delay and Jitter in Networks with IPP Traffic: Theoretical Model

    In this paper, the authors analyze delay and jitter in networks with traffic modeled as Interrupted Poisson Process (IPP), and relatively small traffic loads. In one-node analysis, they estimate the probability for delay bounds violation, and they obtain expression for the jitter, with respect to phase probabilities, traffic load, and...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    An Adaptative Energy Efficient Routing Protocol for MANET

    The dynamic nature of Mobile Ad hoc NETwork (MANET) has several constraints like scalability, robust connectivity and limited power constraints. So an efficient routing protocol is required. It should be adaptable and able to maintain stable routes in spite of the dynamic network connectivity. This paper proposes a hybrid protocol,...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    A Novel Method to Improve the Accuracy of the RSSI Techniques Based on RSSI-D

    In this paper, a novel method is proposed to estimate the distance between sensor nodes based on a statistical model of GMM, which is established with the offline RSSI values, called RSSI-D. In order to estimate the arguments of RSSI-D with unobserved latent variables, EM is used to calculate the...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    SIP-Based QoS in IP Telephony

    In this paper, the authors analyze the factors resulting to the degradation of the quality of service in Voice over IP (VoIP) telephony. SIP protocol is used to explore the QoS characteristics of different Codec. The system is designed for an IP telephony service provider with other GSM operator network...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    A Resource-Efficient System for Detection and Verification of Anomalies Using Mobile Agents in Wireless Sensor Networks

    Sensor readings are vulnerable to in situ and in transit anomalies. A well designed anomaly detection system should be able to identify the source of anomalies through in situ verification of suspicious behavior of sensor nodes. One approach for in situ verification is physical diagnosis of sensor nodes, which is...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Simulation and Performance Analysis of the IEEE1588 PTP With Kalman Filtering in Multi-Hop Wireless Sensor Networks

    As the Wireless Sensor Networks (WSNs) find wider and wider applications, time synchronization has emerged as a key technology to improve network performance and enable WSNs in time-sensitive applications. The recently proposed IEEE 1588 Precision Time synchronization Protocol (PTP) has shown its capability for the wired Ethernet, but its performance...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Enhancing Channel Coordination Scheme Caused by Corrupted Nakagami Signal and Mobility Models on the IEEE 1609.4 Standard

    Ensuring high saturated throughput of SCHs and reducing the transmission delay of service packets on CCHs are one of the most challenging issues in multichannel operations IEEE 1609.4 standard. Moreover, multiple issues due to its highly dynamic topology, the high mobility, the change trajectory, and Nakagami propagation channel caused by...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Detecting Access Point Spoofing Attacks Using Partitioning-Based Clustering

    The impersonation of wireless Access Point (AP) poses an unprecedented number of threats that can compromise a wireless client's identity, personal data, and network integrity. The AP impersonation attack is conducted by establishing rogue AP with spoofed Service Set IDentifier (SSID) and MAC address same as the target legitimate AP....

    Provided By Academy Publisher

  • White Papers // Dec 2014

    The Faults of Data Security and Privacy in the Cloud Computing

    According to Winkler, public cloud is based on the standard cloud computing model, in which a service provider makes resources, such as applications and storage, available to the general public over the Internet. Public cloud services may be free or offered on a pay-per-usage model. The main benefits of using...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    TTAF: TCP Timeout Adaptivity Based on Fast Retransmit over MANET

    Transmission Control Protocol (TCP) is one of the most widely deployed transport layer protocols. It responds to all packet losses, either due to congestion or link breakages, by invoking various congestion control mechanisms. All these mechanisms imply a reduction in the amount of transmitted data. Computing a proper value of...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    On-Line Data Retrieval Algorithm with Restart Strategy in Wireless Networks

    With rapid development of technologies in mobile environment, data dissemination has become an important role for obtaining their requested information of clients in many applications. There are three major approaches to disseminate information between server and clients: unicast, multicast and broadcast. Data retrieval is an efficient scheme for data dissemination...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Trail Coverage : A Coverage Model for Efficient Intruder Detection Near Geographical Obstacles in WSNs

    In Wireless Sensor Network (WSNs), the coverage strategy for achieving higher performance in intruder detection probability near irregular geographical obstacles inside a military terrain, is studied in this paper. The real life problem of the of intruder detection near irregular geographical obstacles has not been focused so far, in which...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Verifying Online User Identity Using Stylometric Analysis for Short Messages

    Stylometry consists of the analysis of linguistic styles and writing characteristics of the authors for identification, characterization, or verification purposes. In this paper, the authors investigate authorship verification for the purpose of user authentication process. In this setting, authentication consists of comparing sample writing of an individual against the model...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Topology Control Mechanism Based on Link Available Probability in Aeronautical Ad Hoc Network

    In this paper, the authors consider traffic network with high-speed mobility nodes scenario; and give a new network topology control mechanism to rise the routing path duration in Aeronautical ad hoc network. The mechanism can use different methods to construct topology according to the node densities. For network regions having...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    An Energy-Efficient Routing Mechanism Based On Genetic Ant Colony Algorithm for Wireless Body Area Networks

    As an important branch of Wireless Sensor Network (WSN), Wireless Body Area Network (WBAN) has received extensive attention of various fields as it is portable and removable. However, energy consumption is highlighting increasingly as nodes are hard to be recharged or replaced. Up to now, many energy efficient routing algorithms...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    An Improved Mix Transmission Algorithm for Privacy-Preserving

    With the rapid development of the Internet Of Things (IOT), personal privacy has been realized as the most important security issue in wireless sensor networks, especially in the Body Area Network (BAN) used in the medical field. Traditional encryption methods cannot defense against the attacks in which the communication signal...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Study of Downlink Scheduling Algorithms in LTE Networks

    Long Term Evolution (LTE) is one of the fastest growing technologies which supports variety of applications like video conferencing, video streaming, VoIP, file transfer, web browsing etc. In order to support multiple applications, Radio Resource Management (RRM) procedure is one of the key design roles for improving the system performance....

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Efficient Scheme for Channel Estimation in OFDM System

    The choice of channel estimation is of fundamental importance in OFDM receiver designs, which further involves a trade-off between complexity and estimation accuracy. In pilot-symbol-aided OFDM system, the Least Square (LS) estimator suffers from inherent additive Gaussian noise and Inter Carrier Interference (ICI), although the estimator exhibits lower complexity and...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Performance of Decode and Forward MIMO Relaying Using STBC for Wireless Uplink

    In this paper, the authors compare the performance of a decode and forward relay assisted wireless uplink with direct wireless uplink in the presence of rayleigh fading where source is equipped with single Transmit antenna (Tx), relay is equipped with multiple transmit and Receive antennas (Rx), and destination has multiple...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    On Efficient Design of LDPC Decoders for Wireless Sensor Networks

    Low Density Parity Check (LDPC) codes are error-correcting codes that offer huge advantages in terms of coding gain, throughput and power dissipation in digital communication systems. Error correction algorithms are often implemented in hardware for fast processing to meet the real-time needs of communication systems. However, traditional hardware implementation of...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Performance Comparison of RFID Tag at UHF Band and Millimeter-Wave Band

    The Ultra High Frequency (UHF) band spectrum will likely be congested in near future since the next generation wireless as well as Radio Frequency IDentification (RFID) system users will witness the use of UHF band technology with increased demand of bandwidth, bit rate, frequency spectrum and power consumption. The alternate...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Keeping Desired QoS by a Partial Coverage Algorithm for Cluster-Based Wireless Sensor Networks

    Many studies were done on design algorithms to completely cover an area. The authors can call the issue as a complete coverage problem. Although there were many researches about proposing a partial coverage issue; almost all of the studies only focus on lengthening the lifespan of Wireless Sensor Networks (WSNs)...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Achieving VoIP Guarantee in Wireless Local Area Networks

    Recently, Voice over Internet Protocol (VoIP) has gained much attention in Wireless Local Area Networks (WLANs). Although IEEE 802.11e Enhanced Distributed Channel Access (EDCA) has been standardized to provide voice traffic with Quality of Service (QoS) support, the voice quality could still be severely degraded by the traffic transmitted from...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    DOA Estimation for Coherent Sources in Impulsive Noise Environments

    Direction-of-Arrival (DOA) estimation of coherent sources is a significant problem in impulsive noise environments. In this paper, a robust estimation algorithm which combines the ideas of Spatial Smoothing (SS) and INFinity-norm normalization (INF) is presented referred to as INF-SSR. The proposed algorithm exploits the Root - MUSIC technique to computer...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Source-Directed Path Diversity in the Interdomain Routing

    The Internet has abundant path redundancy, especially in the inter-domain routing. However, current routing system cannot exploit the Internet path diversity and utilize the disjoint end-to-end paths efficiently. The unawareness of sources to the path selection and the best paths advertisement mechanism in the inter-domain routing make it difficult to...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Markov Chain Based Trust Management Scheme for Wireless Sensor Networks

    As the effective supplement to traditional cryptography security, trust management plays a key role for detecting malicious behaviors in wireless sensor networks. In this paper, the authors consider a sensor network wherein nodes have fixed number of states and probabilities of state transitions can be specified. They introduce Markov chain...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    A Hybrid Classifier Using Reduced Signatures for Automated Soft-Failure Diagnosis in Network End-User Devices

    The authors present an automated system for the diagnosis of both known and unknown soft-failures in end-User Devices (UDs). Known faults that cause network performance degradation are used to train the classifier-based system in a supervised manner while unknown faults are automatically detected and clustered to identify the existence of...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    e-ONE:Enhanced ONE for Simulating Challenged Network Scenarios

    Delay Tolerant Network (DTN) empowers sparse mobile ad-hoc networks and other challenged network environments, such as interplanetary communication network or deep sea communication network, where traditional networking protocols either fail to work completely or do not work well. The Opportunistic Networking Environment (ONE) Simulator has gained considerable popularity as an...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    A Load-Balanced On-Demand Routing for LEO Satellite Networks

    Due to population distribution and economic flourish diversity, the Low Earth Orbit (LEO) satellite network carries unbalanced traffic load, which leads that parts of satellite links are congested while others are underutilized. Furthermore, the congested inter-satellite links result in high queuing delay and packet dropping ratio. To ensure an intelligent...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    A Hybrid Optimization Algorithm for Bayesian Network Structure Learning Based on Database

    The process of learning Bayesian networks includes structure learning and parameters learning. During the process, learning the structure of Bayesian networks based on a large database is a NP hard problem. The paper presents a new hybrid algorithm by integrating the algorithms of MMPC (Max-Min Parents and Children), PSO (Particle...

    Provided By Academy Publisher

  • White Papers // Nov 2014

    Incremental Subspace Data-Mining Algorithm Based on Data-Flow Density of Complex Network

    In order to improve the accuracy of data-mining in large-scale complex networks, an incremental subspace data-mining algorithm based on data-flow density of complex network is proposed in this paper. In order to accommodate this goal, a latent variable model is first introduced and incorporated into data-flow density model so that...

    Provided By Academy Publisher

  • White Papers // Nov 2014

    An Improved DV-Hop Localization Algorithm Based on Energy-Saving Non-Ranging Optimization

    In order to reduce energy-consumption and hardware investment in wireless sensor networks, an improved DV-Hop localization algorithm based on energy-saving non-ranging optimization is proposed. In this algorithm, only one anchor node broadcasts its position coordinate information to other node, thus greatly reducing the energy consumption of the node. Non-ranging energy-saving...

    Provided By Academy Publisher

  • White Papers // Nov 2014

    Pollution-Free Regenerating Codes with Fast Reconstruction Verification for Verifiable Cloud Storage

    In this paper, the authors present an efficient mechanism to guarantee the integrity of cloud storage systems using network-coding-based regenerating codes. Regenerating codes are a special type of erasure codes with the property that regenerating a failed encoded server, can be done using significantly less information than the size of...

    Provided By Academy Publisher

  • White Papers // Nov 2014

    A Hybrid Wrapper-Filter Approach for Malware Detection

    In this paper, the authors present an efficient and novel approach for malware detection. The proposed approach uses a hybrid wrapper-filter model for malware feature selection, which combines Maximum Relevance (MR) filter heuristics and Artificial Neural Net Input Gain Measurement Approximation (ANNIGMA) wrapper heuristic for sub-set selection by capitalizing on...

    Provided By Academy Publisher

  • White Papers // Nov 2014

    Securing a Smart Anti-Counterfeit Web Application

    The use of RFID (Radio Frequency IDentification) technology can be employed for automating and streamlining safe and accurate brand IDentification (ID) uniquely in real-time to protect consumers from counterfeited products. The authors outline a Web-based Anti-counterfeit RFID System (WARS) to combat counterfeit branding. By placing brand tags (RFID tags) on...

    Provided By Academy Publisher

  • White Papers // Nov 2014

    Elliptic Curve Cryptography for WSN and SPA Attacks Method for Energy Evaluation

    In this paper, the authors provide a comprehensive study of Elliptic Curve Cryptography (ECC) for Wireless Sensor Networks (WSNs) security provisioning, mainly for key management and authentication modules. On the other hand, they present and evaluate a Side-Channel Attacks (SCAs) experimental bench solution for energy evaluation, especially Simple Power Analysis...

    Provided By Academy Publisher

  • White Papers // Nov 2014

    Anomaly Detection in Wireless Sensor Network

    Wireless Sensor Networks (WSNs) are prone to vulnerabilities due to their resource constraints and deployment in remote and unattended areas. A sensor node exhibits anomaly in behavior due to its dying energy level or being compromised by the intruders. The node showing anomalous behaviors being a Leader Node (LN) of...

    Provided By Academy Publisher

  • White Papers // Nov 2014

    Detection of Privacy Sensitive Information Retrieval Using API Call Logging Mechanism Within Android Framework

    In recent years, Android based Smartphone's have become popular. As a feature of a smart phone, much information for identifying a user and information linked to user's privacy is saved in a terminal. For this feature, many malwares targeting privacy information are developed. Many security mechanisms are provided in Android...

    Provided By Academy Publisher

  • White Papers // Nov 2014

    Dynamic Cluster-Based Routing for Wireless Sensor Networks

    In this paper, the authors propose a new clustering scheme for wireless sensor networks, which efficiently balances the energy usage inter- and intra-clusters, by using the k-medoids method and the intra-cluster head update policy. Particularly, they propose a simple-but-effective routing tree algorithm to maintain a dynamic energy-efficient tree structure over...

    Provided By Academy Publisher

  • White Papers // May 2009

    Security and Results of a Large-Scale High-Interaction Honeypot

    This paper presents the design and discusses the results of a secured high-interaction honeypot. The challenge is to have a honeypot that welcomes attackers, allows userland malicious activities but prevents system corruption. The honeypot must authorize real malicious activities. It must ease the analysis of those activities. A clustered honeypot...

    Provided By Academy Publisher

  • White Papers // May 2009

    Research on the Enterprise Crisis Management System Basic on Knowledge Demand

    Crisis management is a comprehensive inspection of enterprise management ability in special situation. his paper researches on how to deal with enterprise crisis from the perspective of knowledge management. According to the life cycle theory, enterprise crisis is divided into six periods, then the knowledge which is required in each...

    Provided By Academy Publisher

  • White Papers // May 2009

    A Secure Chameleon Hash Function Without Key Exposure From Pairings

    Chameleon signatures are based on well established hash-and-sign paradigm, where a chameleon hash function is used to compute the cryptographic message digest, and becomes an important building block. The chameleon hash function is a trapdoor one-way hash function with some special properties, and plays an important role in constructing chameleon...

    Provided By Academy Publisher

  • White Papers // May 2009

    Research on the Construction Method of Emergency Plan Ontology Based-On OWL

    How to solve the emergency properly has been an important aspect to test the administrative ability of governments. Emergency plans describe the domain knowledge of emergency handling, which is the basis of high-efficient response, and it's necessary to share knowledge in emergency plans among participating organizations. Presently, knowledge representation and...

    Provided By Academy Publisher

  • White Papers // May 2009

    Improved Memory-Based Collaborative Filtering Using Entropy-Based Similarity Measures

    Accuracy of predicting the user preference score is the most important element of collaborative filtering. This paper proposes novel similarity measures using difference score entropy of common rating items between two users. The proposed similarity measures can apply various weights according to the score difference, to evaluate the similarity. The...

    Provided By Academy Publisher

  • White Papers // May 2009

    Research on Implementation Path and Strategies of Enterprise's Mobile Informatization

    Mobile informatization as its real-time, mobility, personal characteristics is changing the operating mode of enterprise, and enterprises are gradually moving into the mobile informatization. This paper introduces an analysis method (IEB) based on focused three-layer structure. Through analysis of industry characteristics and sensitivity to mobile informatization, enterprise itself and specific...

    Provided By Academy Publisher

  • White Papers // May 2009

    Using Niche Genetic Algorithm to Find Fuzzy Rules

    The genetic algorithm has been widely used in many fields as an easy robust global search and optimization method. This paper introduces a new approach to find fuzzy rules using niche genetic algorithms with elitist migrating operator. It uses binary coding scheme. In order to make search results stable, elitist...

    Provided By Academy Publisher

  • White Papers // May 2009

    Highly Accurate Distributed Classification of Web Documents

    With the rapid growth of internet, it is a scientific challenge and a massive economic need to discover an efficient and accurate text classifier for handling tons of online documents. This paper presents a distributed model for efficient web document classifications. In the model, the distributed text classifiers are trained...

    Provided By Academy Publisher

  • White Papers // May 2009

    An Effective Approach for Remote Attestation in Trusted Computing

    The e-commerce demands end-user systems that adhere to well-defined security policies. In this paper Trusted Computing is a new security solution proposed by the Trusted Computing Group Trusted Computing (TC). It aims at providing a framework and effective mechanisms that allow computing platforms and a distributed system to gain assurance...

    Provided By Academy Publisher

  • White Papers // Oct 2009

    A Threshold Authenticated Encryption Scheme Based on Elliptic Curve Cryptosystem

    A (t, n) threshold authenticated encryption scheme allows more than t signers to generate an authenticated cipher-text for a message and only the designated verifier can verify the message. Recently, Chung et al. proposed a (t, n) threshold authenticated encryption scheme by applying a division-of-labor signature technique. However, the authors...

    Provided By Academy Publisher

  • White Papers // Oct 2009

    Service-Based Geometry Modeling Framework for Large-Scale Information Visualization

    Web-based Information visualization is one of the key technologies for product development and cooperative work in the enterprises. But existence of heterogeneous systems make geometry modeling a heavy task especially in the narrow-band network condition. Thus, a geometry modeling framework is built based on service-based architecture. Based on the X3D...

    Provided By Academy Publisher

  • White Papers // Oct 2009

    A Simple Model for Virtual Ring Routing

    In this paper, the authors present a theoretical model of virtual ring routing to describe the routing mechanism and the impact on the routing performance. The identifier is a flat label to identify the node without any network location information. By routing directly on nodes' identifiers, any node in the...

    Provided By Academy Publisher

  • White Papers // Oct 2009

    Unexpected Public Crisis Information Communication Model Simulation in Network Environment

    In order to research on the communication characteristic of unexpected public crisis in network environment, this paper, chooses netizens as the research object, uses complex adaptive system theory and multi-agent theory to establish a crisis communication process simulation model. Through observing the evolutionary process operation in the Repast platform, it...

    Provided By Academy Publisher

  • White Papers // Oct 2009

    The Research of Localization Protocol for Wireless Sensor Networks

    In this paper, the authors present a localization protocol for wireless sensor networks. The protocol provides three types of localization algorithms, namely, the localization algorithm during the phase of initialization, the localization algorithm for new wireless sensor node, and the localization algorithm for moved beacon node. In the first localization...

    Provided By Academy Publisher

  • White Papers // Oct 2009

    Design Method of AES Encryption Chip for Mobile and Portable Applications

    A kind of design method of encryption chip for mobile and portable applications is proposed in this paper. The encryption chip implements the AES (Advanced Encryption Standard) algorithm, which is the most advanced symmetric cipher algorithm at present. The external pins and internal circuit structure of the AES encryption chip...

    Provided By Academy Publisher

  • White Papers // Oct 2009

    A Routing Protocol Based on Clusters for Large-Scale Wireless Sensor Networks

    Aiming at the insufficiency of Low Energy Adaptive Clustering Hierarchy (LEACH) routing protocol that cluster-head nodes distribution is uneven in the space and cluster-head nodes consume excessive energy in the process of long-distance data transmission, this paper proposes a routing protocol improvement based on clusters for large-scale wireless sensor networks,...

    Provided By Academy Publisher

  • White Papers // Oct 2009

    Cryptanalysis of a User Authentication Protocol

    Recently, Peyravin and Jeffries proposed a password-based practical authentication scheme using one-way collision-resistant hash functions. However, Shim and Munilla independently showed that the scheme is vulnerable to off-line guessing attacks. Holbl, Welzer and Brumenn presented an improved password-based protocols. In the paper, the authors showed that the improved scheme still...

    Provided By Academy Publisher

  • White Papers // Oct 2009

    Structured Database Integration Over the Web

    With the rapid development of Web, there are more and more structured web database available for users to access. At the same time, domain searchers often have difficulties in finding the right web database. In this paper, the authors study how they can build an effective web database integration system...

    Provided By Academy Publisher

  • White Papers // Oct 2009

    Geospatial Services Chaining With Web Processing Service

    Web processing service is aimed to define a standardized interface that facilitates the publishing of geospatial processes, and also acts as middleware service for data, by obtaining data from an external resource in order to run a process on the local implementation. Owing to the generic nature of web processing...

    Provided By Academy Publisher

  • White Papers // Oct 2009

    Semantic Completely Preprocessing for Deep Web Queries Translation

    Local schemas embedded in query interfaces of deep web are partial of database schemas. However, local schemas are extracted incompletely form query interfaces coded by semi-structure programming language. Some key attributes missed lead to form incompletely semantic queries. To tackle the problem, a semantic completely preprocessing for queries is presented...

    Provided By Academy Publisher

  • White Papers // Oct 2009

    Specifying Dynamic Software Architectures for Distributed Systems

    Open and dynamic characteristics of distributed software systems make user requirements and hardware resources change more rapidly, which makes their evolution or reconfiguration inevitable, especially during their execution. A critical issue for those distributed systems is the specifying and analysis dynamic reconfiguration process of their architectures. In this paper, the...

    Provided By Academy Publisher

  • White Papers // Oct 2009

    Energy Control Based Routing for Mobile Ad Hoc Network

    Mobile Ad hoc network can operate in a self-organized and do not have any predefined infrastructure. However, the problem of limit energy often affects the communication in such network. In this paper, the authors present an energy management model which can effectively reduce energy consumption. Mobile nodes in such model...

    Provided By Academy Publisher

  • White Papers // Oct 2009

    Exploiting Spatial Reuse in Resource Allocation for WiMAX Mesh Networks

    Due to the scarceness of communication resource, therefore, resource allocation in wireless networks is an important issue. In this paper, the authors introduce a time slot allocation problem for multi-user wireless networks to achieve fairness at the node level and high network throughput in WiMAX mesh networks. They first propose...

    Provided By Academy Publisher

  • White Papers // Oct 2009

    A Framework for Assessing E-Commerce Adoption at Firm Level

    Many organizations lack a framework to assist managers in assessing e-commerce adoption. There has been limited literature to guide the development of a framework. The purpose of this exploratory study is to build a framework with less computation and easy application in e-commerce assessment by analyzing the actual state of...

    Provided By Academy Publisher

  • White Papers // Oct 2009

    A Novel Approach for Process Mediation of Web Services

    Although several efforts were made to support the standardization of Web Services, they are not always perfectly compatible to each other due to the distributed nature. In this paper, a novel approach for process mediation of web services is proposed to adjust the partially compatible messages interchange behaviors to suit...

    Provided By Academy Publisher

  • White Papers // Jul 2009

    An Algorithm of Constructing Certificates Chain Based on the FriendshipPoint Group for P2P Network

    The authentication and authorization based on CA is not suitable for P2P network because of its centralized control. DHT is efficient to search a required certificate in P2P network, but it is not fit for constructing the certificate chains including many certificates. This paper proposes an algorithm of constructing the...

    Provided By Academy Publisher

  • White Papers // May 2009

    The Application and Research of IDS Model Based on Multi-Technique Fusion

    According to the different analysis methods, the intrusion detection is divided into anomaly detection and misuse detection. In this paper, the authors analyze the advantages and drawbacks of detection technology, Due to that, this paper proposes a IDS model based on multi-technique with misuse detection and anomaly detection which can...

    Provided By Academy Publisher

  • White Papers // May 2009

    Study on Supply Chain Workflow Based on Grid

    As society enters the Interner era, it affects models and competitive environment of companies. under the global environment of E-commerce, the traditional supply chain management has not fully adapted to business activities in the era of grid which is coming, and new model of supply chain management emerges. In this...

    Provided By Academy Publisher

  • White Papers // May 2009

    Achieving Robustness Objectives Within a Supply Chain by Means of Reliability Allocation

    Supply chain is regarded as a complex system that consists of suppliers, manufacturers, vendors and logistics service providers. Robustness is the main target in supply chain management. In recent years, robust optimization has emerged as a methodology for managing supply chain risks. In this paper, the authors develop a method...

    Provided By Academy Publisher

  • White Papers // May 2009

    A Gray Programming Model for Bi-Level Distribution Network Designing in the Supply Chain

    In this paper, a gray programming model for bi-level distribution network design in the supply chain is presented by means of uncertain-system theory, in which both customers' demands for products and production capacity of branch plants are treated as gray parameters. Combine concrete example, that the reasonableness and in accord...

    Provided By Academy Publisher

  • White Papers // Oct 2009

    The Design of Parallel Queue Processing Strategy in Reflective NetGAP

    The Reflective GAP is hardware-based and its purpose is to rapidly mirror buffers between the non-trusted memory and the trusted memory. Its activities are achieved using store & forward of memory blocks. Its software system comprises with seven main basic modules. Between these modules the authors adopt a concept of...

    Provided By Academy Publisher

  • White Papers // Oct 2009

    Data Mining Technique and Application Based on Association Rules

    Data mining algorithm based on association rules have become hot point of research in the field of artificial intelligence and database. Aiming at the problems that current data mining algorithms need too long execution time in case of large scale database, improved association rules algorithm based on data structure is...

    Provided By Academy Publisher

  • White Papers // Oct 2009

    Personalized Privacy-Preserving Granular Computing Model

    As a new computing model, Granular computing provides a new efficient way for solving complicated problems, massive data mining, and fuzzy information processing. Privacy is becoming an increasingly important issue in many data mining applications. In this paper, the authors combined the existing model of granular computing with personalized privacy-preserving...

    Provided By Academy Publisher

  • White Papers // Oct 2009

    The Research of Time Synchronization Protocol for Wireless Sensor Networks

    In this paper, the authors present a time synchronization protocol for wireless sensor networks. The aim of the time synchronization protocol is to improve the precision of time synchronization and to upgrade the efficiency on energy for wireless sensor networks. The work pattern of periodical awakening and sleeping for redundancy...

    Provided By Academy Publisher

  • White Papers // Oct 2009

    Visualization Methods on Linux Software Packages Dependency Relations

    A Linux operating system is composed of a large number of software packages. Among packages there exist a variety of complex dependency relations, and their management is the foundation of building and maintaining Linux operating system. And unified modeling and visualization of dependency relations can greatly simplify the Linux package...

    Provided By Academy Publisher

  • White Papers // Oct 2009

    Secure Remote Authentication Using Fingerprint and Fuzzy Private Matching

    A remote authentication scheme is proposed, which enables the use of fingerprint and fuzzy private matching protocol to achieve mutual authentication over an insecure channel. The private fingerprint template in the scheme is in the form of polynomial and is cancelable. Better performance and efficiency of the scheme than the...

    Provided By Academy Publisher

  • White Papers // Oct 2009

    Research on Wireless Transmission Technology for Roving Spindle Test

    A new type detection device for the suspended flyer was developed to test the press finger and performance parameters of the flyer. The device was made up of mechanical transmission, control and signal processing part, which realized full automation of measurement by wireless transmission technology. Hybrid driven differential adjustable framework...

    Provided By Academy Publisher

  • White Papers // Jun 2011

    Enterprise Knowledge Management Application Evaluation Based on Cloud Gravity Center Model and Fuzzy Extended AHP

    Enterprise knowledge management has important influence on an enterprise core competency, and enterprise knowledge management application evaluation plays an important role for the enterprise economic benefits, innovation ability and culture. The evaluation of the enterprise knowledge management application can guide the enterprise knowledge management implement better. In this paper, an...

    Provided By Academy Publisher

  • White Papers // Jun 2011

    A New Method to Determine BPA in Evidence Theory

    Dempster Shafer theory of evidence has been widely used in many data fusion application systems. However, how to determine basic probability assignment, which is the main and the first step in evidence theory, is still an open issue. In this paper, based on the distance measure between the sample data...

    Provided By Academy Publisher

  • White Papers // Jun 2011

    ORPSW: A New Classifier for Gene Expression Data Based on Optimal Risk and Preventive Patterns

    Optimal risk and preventive patterns are itemsets which can identify characteristics of cohorts of individuals who have significantly disproportionate representation in the abnormal and normal groups. In this paper, the authors propose a new classifier namely ORPSW (Optimal Risk and Preventive Sets with Weights) to classify gene expression data based...

    Provided By Academy Publisher