Academy Publisher

Displaying 1-40 of 2630 results

  • White Papers // Dec 2014

    Efficient Scheme for Channel Estimation in OFDM System

    The choice of channel estimation is of fundamental importance in OFDM receiver designs, which further involves a trade-off between complexity and estimation accuracy. In pilot-symbol-aided OFDM system, the Least Square (LS) estimator suffers from inherent additive Gaussian noise and Inter Carrier Interference (ICI), although the estimator exhibits lower complexity and...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Performance of Decode and Forward MIMO Relaying Using STBC for Wireless Uplink

    In this paper, the authors compare the performance of a decode and forward relay assisted wireless uplink with direct wireless uplink in the presence of rayleigh fading where source is equipped with single Transmit antenna (Tx), relay is equipped with multiple transmit and Receive antennas (Rx), and destination has multiple...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    On Efficient Design of LDPC Decoders for Wireless Sensor Networks

    Low Density Parity Check (LDPC) codes are error-correcting codes that offer huge advantages in terms of coding gain, throughput and power dissipation in digital communication systems. Error correction algorithms are often implemented in hardware for fast processing to meet the real-time needs of communication systems. However, traditional hardware implementation of...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Performance Comparison of RFID Tag at UHF Band and Millimeter-Wave Band

    The Ultra High Frequency (UHF) band spectrum will likely be congested in near future since the next generation wireless as well as Radio Frequency IDentification (RFID) system users will witness the use of UHF band technology with increased demand of bandwidth, bit rate, frequency spectrum and power consumption. The alternate...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Keeping Desired QoS by a Partial Coverage Algorithm for Cluster-Based Wireless Sensor Networks

    Many studies were done on design algorithms to completely cover an area. The authors can call the issue as a complete coverage problem. Although there were many researches about proposing a partial coverage issue; almost all of the studies only focus on lengthening the lifespan of Wireless Sensor Networks (WSNs)...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Achieving VoIP Guarantee in Wireless Local Area Networks

    Recently, Voice over Internet Protocol (VoIP) has gained much attention in Wireless Local Area Networks (WLANs). Although IEEE 802.11e Enhanced Distributed Channel Access (EDCA) has been standardized to provide voice traffic with Quality of Service (QoS) support, the voice quality could still be severely degraded by the traffic transmitted from...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    DOA Estimation for Coherent Sources in Impulsive Noise Environments

    Direction-of-Arrival (DOA) estimation of coherent sources is a significant problem in impulsive noise environments. In this paper, a robust estimation algorithm which combines the ideas of Spatial Smoothing (SS) and INFinity-norm normalization (INF) is presented referred to as INF-SSR. The proposed algorithm exploits the Root - MUSIC technique to computer...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Source-Directed Path Diversity in the Interdomain Routing

    The Internet has abundant path redundancy, especially in the inter-domain routing. However, current routing system cannot exploit the Internet path diversity and utilize the disjoint end-to-end paths efficiently. The unawareness of sources to the path selection and the best paths advertisement mechanism in the inter-domain routing make it difficult to...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Markov Chain Based Trust Management Scheme for Wireless Sensor Networks

    As the effective supplement to traditional cryptography security, trust management plays a key role for detecting malicious behaviors in wireless sensor networks. In this paper, the authors consider a sensor network wherein nodes have fixed number of states and probabilities of state transitions can be specified. They introduce Markov chain...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    A Hybrid Classifier Using Reduced Signatures for Automated Soft-Failure Diagnosis in Network End-User Devices

    The authors present an automated system for the diagnosis of both known and unknown soft-failures in end-User Devices (UDs). Known faults that cause network performance degradation are used to train the classifier-based system in a supervised manner while unknown faults are automatically detected and clustered to identify the existence of...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    e-ONE:Enhanced ONE for Simulating Challenged Network Scenarios

    Delay Tolerant Network (DTN) empowers sparse mobile ad-hoc networks and other challenged network environments, such as interplanetary communication network or deep sea communication network, where traditional networking protocols either fail to work completely or do not work well. The Opportunistic Networking Environment (ONE) Simulator has gained considerable popularity as an...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    A Load-Balanced On-Demand Routing for LEO Satellite Networks

    Due to population distribution and economic flourish diversity, the Low Earth Orbit (LEO) satellite network carries unbalanced traffic load, which leads that parts of satellite links are congested while others are underutilized. Furthermore, the congested inter-satellite links result in high queuing delay and packet dropping ratio. To ensure an intelligent...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    The Faults of Data Security and Privacy in the Cloud Computing

    According to Winkler, public cloud is based on the standard cloud computing model, in which a service provider makes resources, such as applications and storage, available to the general public over the Internet. Public cloud services may be free or offered on a pay-per-usage model. The main benefits of using...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    TTAF: TCP Timeout Adaptivity Based on Fast Retransmit over MANET

    Transmission Control Protocol (TCP) is one of the most widely deployed transport layer protocols. It responds to all packet losses, either due to congestion or link breakages, by invoking various congestion control mechanisms. All these mechanisms imply a reduction in the amount of transmitted data. Computing a proper value of...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    On-Line Data Retrieval Algorithm with Restart Strategy in Wireless Networks

    With rapid development of technologies in mobile environment, data dissemination has become an important role for obtaining their requested information of clients in many applications. There are three major approaches to disseminate information between server and clients: unicast, multicast and broadcast. Data retrieval is an efficient scheme for data dissemination...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Trail Coverage : A Coverage Model for Efficient Intruder Detection Near Geographical Obstacles in WSNs

    In Wireless Sensor Network (WSNs), the coverage strategy for achieving higher performance in intruder detection probability near irregular geographical obstacles inside a military terrain, is studied in this paper. The real life problem of the of intruder detection near irregular geographical obstacles has not been focused so far, in which...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Verifying Online User Identity Using Stylometric Analysis for Short Messages

    Stylometry consists of the analysis of linguistic styles and writing characteristics of the authors for identification, characterization, or verification purposes. In this paper, the authors investigate authorship verification for the purpose of user authentication process. In this setting, authentication consists of comparing sample writing of an individual against the model...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Topology Control Mechanism Based on Link Available Probability in Aeronautical Ad Hoc Network

    In this paper, the authors consider traffic network with high-speed mobility nodes scenario; and give a new network topology control mechanism to rise the routing path duration in Aeronautical ad hoc network. The mechanism can use different methods to construct topology according to the node densities. For network regions having...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    An Energy-Efficient Routing Mechanism Based On Genetic Ant Colony Algorithm for Wireless Body Area Networks

    As an important branch of Wireless Sensor Network (WSN), Wireless Body Area Network (WBAN) has received extensive attention of various fields as it is portable and removable. However, energy consumption is highlighting increasingly as nodes are hard to be recharged or replaced. Up to now, many energy efficient routing algorithms...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    An Improved Mix Transmission Algorithm for Privacy-Preserving

    With the rapid development of the Internet Of Things (IOT), personal privacy has been realized as the most important security issue in wireless sensor networks, especially in the Body Area Network (BAN) used in the medical field. Traditional encryption methods cannot defense against the attacks in which the communication signal...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Study of Downlink Scheduling Algorithms in LTE Networks

    Long Term Evolution (LTE) is one of the fastest growing technologies which supports variety of applications like video conferencing, video streaming, VoIP, file transfer, web browsing etc. In order to support multiple applications, Radio Resource Management (RRM) procedure is one of the key design roles for improving the system performance....

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Delay and Jitter in Networks with IPP Traffic: Theoretical Model

    In this paper, the authors analyze delay and jitter in networks with traffic modeled as Interrupted Poisson Process (IPP), and relatively small traffic loads. In one-node analysis, they estimate the probability for delay bounds violation, and they obtain expression for the jitter, with respect to phase probabilities, traffic load, and...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    An Adaptative Energy Efficient Routing Protocol for MANET

    The dynamic nature of Mobile Ad hoc NETwork (MANET) has several constraints like scalability, robust connectivity and limited power constraints. So an efficient routing protocol is required. It should be adaptable and able to maintain stable routes in spite of the dynamic network connectivity. This paper proposes a hybrid protocol,...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    A Novel Method to Improve the Accuracy of the RSSI Techniques Based on RSSI-D

    In this paper, a novel method is proposed to estimate the distance between sensor nodes based on a statistical model of GMM, which is established with the offline RSSI values, called RSSI-D. In order to estimate the arguments of RSSI-D with unobserved latent variables, EM is used to calculate the...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    SIP-Based QoS in IP Telephony

    In this paper, the authors analyze the factors resulting to the degradation of the quality of service in Voice over IP (VoIP) telephony. SIP protocol is used to explore the QoS characteristics of different Codec. The system is designed for an IP telephony service provider with other GSM operator network...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    A Resource-Efficient System for Detection and Verification of Anomalies Using Mobile Agents in Wireless Sensor Networks

    Sensor readings are vulnerable to in situ and in transit anomalies. A well designed anomaly detection system should be able to identify the source of anomalies through in situ verification of suspicious behavior of sensor nodes. One approach for in situ verification is physical diagnosis of sensor nodes, which is...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Simulation and Performance Analysis of the IEEE1588 PTP With Kalman Filtering in Multi-Hop Wireless Sensor Networks

    As the Wireless Sensor Networks (WSNs) find wider and wider applications, time synchronization has emerged as a key technology to improve network performance and enable WSNs in time-sensitive applications. The recently proposed IEEE 1588 Precision Time synchronization Protocol (PTP) has shown its capability for the wired Ethernet, but its performance...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Enhancing Channel Coordination Scheme Caused by Corrupted Nakagami Signal and Mobility Models on the IEEE 1609.4 Standard

    Ensuring high saturated throughput of SCHs and reducing the transmission delay of service packets on CCHs are one of the most challenging issues in multichannel operations IEEE 1609.4 standard. Moreover, multiple issues due to its highly dynamic topology, the high mobility, the change trajectory, and Nakagami propagation channel caused by...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Detecting Access Point Spoofing Attacks Using Partitioning-Based Clustering

    The impersonation of wireless Access Point (AP) poses an unprecedented number of threats that can compromise a wireless client's identity, personal data, and network integrity. The AP impersonation attack is conducted by establishing rogue AP with spoofed Service Set IDentifier (SSID) and MAC address same as the target legitimate AP....

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Error Performance Analysis of Multiuser CDMA Systems with Space-time Coding in Rician Fading Channel

    In this paper, the error performance of multiuser CDMA system with space-time coding is studied in Rician fading channel, and the corresponding Bit Error Rate (BER) and Symbol Error Rate (SER) analysis are presented. Based on the performance analysis, a simple and effective multiuser receiver scheme is developed. The scheme...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    A Hybrid Optimization Algorithm for Bayesian Network Structure Learning Based on Database

    The process of learning Bayesian networks includes structure learning and parameters learning. During the process, learning the structure of Bayesian networks based on a large database is a NP hard problem. The paper presents a new hybrid algorithm by integrating the algorithms of MMPC (Max-Min Parents and Children), PSO (Particle...

    Provided By Academy Publisher

  • White Papers // Nov 2014

    Pollution-Free Regenerating Codes with Fast Reconstruction Verification for Verifiable Cloud Storage

    In this paper, the authors present an efficient mechanism to guarantee the integrity of cloud storage systems using network-coding-based regenerating codes. Regenerating codes are a special type of erasure codes with the property that regenerating a failed encoded server, can be done using significantly less information than the size of...

    Provided By Academy Publisher

  • White Papers // Nov 2014

    A Peer-To-Peer Membership Management Protocol for Wireless Mesh Networks

    There are a wide variety of terminal devices in wireless mesh networks. In order to manage the heterogeneous networks efficiently and to solve the mismatching problem between the physical network and its P2P overlay, a membership management protocol for the P2P overlay in wireless mesh networks is proposed - BA-gossip...

    Provided By Academy Publisher

  • White Papers // Nov 2014

    Study on the Improvement of ELGamal Cryptosystem Based on Elliptic Curve

    Since proposed, ELGamal cryptosystem occupies very important position in network security and it has wide application. Compared with RSA algorithm, elliptic curve encryption algorithm has significant advantages, and it is suitable for application in the environment with limited resources. In this paper, the principle of ELGamal cryptosystem based on elliptic...

    Provided By Academy Publisher

  • White Papers // Nov 2014

    An Optimized Frequent Item Query Algorithm for Uncertain Streaming Data

    Recently, sensors are used in many fields, and the data generated are uncertain streaming data. Frequent item query is one of the most query primitives in this kind of data. In this paper, the authors study frequent item query for uncertain streaming data. First, they propose a basic frequent item...

    Provided By Academy Publisher

  • White Papers // Nov 2014

    Research on Service Controlling Algorithm of Electric Power Communication Network Based on QoS Traffic Recognition and Routing Optimization

    With rapid progress in power communication networking, the present power communication network has become an integrated transmission network that supports various services (e.g., control data, service data, voices, and images). Compared with traditional network services, real-time services in the present power communication network have stricter requirements on delays, delay jitters,...

    Provided By Academy Publisher

  • White Papers // Nov 2014

    Dynamic Effective Resource Allocation Based on Cloud Computing Learning Model

    In cloud computing field, a service-provider offers large number of resources for customers with a relatively low cost. However, any resource allocation model has to consider computational resources as well as network resources to accurately reflect practical demands. In order to rationally allocate the limited resources to users and improve...

    Provided By Academy Publisher

  • White Papers // Nov 2014

    Broadcast Encryption Based on Bidirectional Remote Authentication Scheme

    In order to ensure the established mobile ad hoc networks against unauthorized user access, the authors need the identity authentication of the nodes in the network. Using the password for remote authentication in network is more and more attractive. This paper analyzes the remote password authentication scheme based on threshold...

    Provided By Academy Publisher

  • White Papers // Nov 2014

    Data Migration Model and Algorithm Between Heterogeneous Databases Based on Web Service

    To solve the problems of data conversion between heterogeneous databases that arising from the progress of data migration, the paper presents an improved model of data migration and a data conversion algorithm based on the research on data synchronization via web service. The data migration model is divided into legacy...

    Provided By Academy Publisher

  • White Papers // Nov 2014

    Research and Implementation of the Localization Algorithm Based on RSSI Technology

    The efficiency of sensor localization is a key issue in the Internet of things. There are possibilities for improvements in existing sensor localization systems, such as design complexity, cost. To address these issues, a location algorithm based on Distributed Range-Free Localization (DRFL) is proposed. In this positioning system can be...

    Provided By Academy Publisher

  • White Papers // Aug 2009

    Design and Development of a Open Frame RFID System Unite Test Platform

    RFID (Radio Frequency Identification) System Test Platform has attracted considerable attention in recent years because it has a great impact on many kinds of trade applications. However, there is dearth of available open frame test platform for RFID system. This paper proposes a new design and implementation of an open...

    Provided By Academy Publisher

  • White Papers // Sep 2009

    Data Management of Mobile Object Tracking Applications in Wireless Sensor Networks

    This paper focuses on the data management problem of object tracking applications in wireless sensor networks. The paper proposes link-segment storage and query protocol to track mobile object in wireless sensor network dynamically. The main idea of the protocol is to combine advantages of local storage with data centric storage...

    Provided By Academy Publisher

  • White Papers // Jul 2009

    E-Business Model Design And Implementation In Supply-Chain Integration

    Supply chain integration methodologies have been increasing as a consequence of the globalization of production and sales, and the advancement of enabling information technologies. In this paper, the authors explore concepts like business-to-business cooperation, e-service aggregation, and dynamic re-configuration of business roles. The framework of e-business impact on supply chain...

    Provided By Academy Publisher

  • White Papers // Jul 2009

    Application Study Of E-commerce Model On Chinese SMEs

    Chinese current economic restructuring and rapid development provide a good opportunity for SMEs. Evolution of information technology in the last decade promotes Chinese SMEs adapt to various changes in the external technological environment. So SMEs are actively introducing e-commerce. Just based on this background, this paper firstly reviews basic process...

    Provided By Academy Publisher

  • White Papers // Jul 2009

    Study On Balanced Scorecard Of Commercial Bank In Performance Management System

    Performance management of commercial banks is an important aspect of banking business management. This paper makes study about how to use the Balanced Scorecard as a tool, which is applied to commercial banks performance management system, and points out that it breakthrough the defects in the traditional single application of...

    Provided By Academy Publisher

  • White Papers // Jul 2009

    Analysis On The Successful Strategies Of Taobao's E-Commerce

    The improvement and the development of internet technologies have triggered the rapid development of E-commerce applications since 21st century. A number of E-commerce sites have been rising in China. But with the bursting of the bubble economy, most sites have been eliminated. As a new site with holding the idea...

    Provided By Academy Publisher

  • White Papers // Jul 2009

    Study On Niches Of Enterprises And Strategy In E-business Ecosystem

    The internet revolution is sweeping every aspect of business, and E-business development needs sound ecological environment. The competition in the e-business was not among enterprises but among the ecosystems. This paper focuses on problems of E-business construction for enterprises in different niches in the perspective of business ecosystem, introduces the...

    Provided By Academy Publisher

  • White Papers // Aug 2009

    Web Service-Security Specification Based on Usability Criteria and Pattern Approach

    A specification is provided in this paper to assist in the design of usable and secure web-services. In particular, this specification helps design an adequate security information feedback based on User Interface Patterns, the resulting visual feedback is then evaluated against a set of design/evaluation criteria called Human-Computer Interaction for...

    Provided By Academy Publisher

  • White Papers // Aug 2009

    A Policy-Based Autonomic Model Suitable for Quality of Service Management

    The increased complexity resulting from computer networks technologies, devices and application diversity combined with the continuously growing service demands from users, requires a computer network that offers adequate treatment and support to multiservice (Voice, Video, Web Applications) and Quality of Service (QoS) requirements. This management scenario adds complexity to human...

    Provided By Academy Publisher

  • White Papers // Nov 2009

    Mobile Commerce: Standards & Design Technologies

    This paper presents the various standards and technologies with respect to various applications in the field of mobile commerce. It also compares J2ME with other technologies and standards are also compared so that more understanding of the various issues can be had while designing the mobile commerce applications. This paper...

    Provided By Academy Publisher

  • White Papers // Dec 2009

    Research on Layout Algorithms for Better Data Visualization

    Based on the theory and technology of data visualization, this paper improves some layout algorithms regarding its own natures and characteristics. It also discusses the problem of how to choose proper layout algorithm for specific data to make the visualization better. Using the improved algorithms, one can simply convert a...

    Provided By Academy Publisher

  • White Papers // Oct 2009

    A Self-Optimized Multipath Routing Protocol for Wireless Sensor Networks

    Wireless sensor networks (WSNs) are becoming a progressively important and a challenging research area. Advancements in WSN enable a wide range of environmental monitoring and object tracking applications. Moreover, multihop routing in WSN is affected by new nodes constantly entering or leaving the network. Therefore, the self-optimized and self-aware mechanism...

    Provided By Academy Publisher

  • Case Studies // Oct 2009

    Always Best Packet Switching: The Mobile VoIP Case Study

    Currently, a mobile device equipped with multiple heterogeneous wireless Network Interface Cards (NICs) cannot take advantage of its capabilities as the conventional mobility management approach allows it to select and use only one of its NICs at a time. In contrast to this approach, this case study proposes the so-called...

    Provided By Academy Publisher

  • White Papers // Aug 2009

    Point-to-Point DWDM System Design and Simulation

    As for the problems of complexity and long cycle in the DWDM design, part of problems needed to be considered in DWDM system design were analyzed. An optimized point-to-point DWDM transmission system was designed. Optical fiber communication system with 40Gbit / s and 32 channel was designed and simulated by...

    Provided By Academy Publisher

  • White Papers // Nov 2009

    Network Reconfiguration for Loss Minimization by Optimal Switching Operation in Distribution System

    There are three functional areas of electrical utility namely Generation, Transmission and Distribution. Out of three functional areas of Electrical utility, the distribution sector needs more attentions and difficult to standardize due to its complexity. Aggregated Technical & Commercial (AT&C) Loss i.e. T&D loss in India has been consistently on...

    Provided By Academy Publisher

  • White Papers // Nov 2009

    Research of Data Visualization in Near-Infrared Spectroscopy

    The spectroscopy data visualization software is developed to display the blood glucose data collected by near-infrared spectroscopy spectrometer using object-oriented programming techniques. The test results show the software can reach the pre-set functions and its intuitive interface and convenient access to all operations can assist users to do data analysis...

    Provided By Academy Publisher

  • White Papers // Dec 2009

    An Analysis of the Robustness and Stability of the Network Stack in Symbian-Based Smartphones

    Smartphones are widely used today and their popularity will certainly not slow down in the near future due to improved functionality and new technology improvements. Becoming more and more similar to PCs and laptops, they will also begin to face the same security problems especially in terms of network security....

    Provided By Academy Publisher

  • White Papers // Nov 2009

    LAN Machine: A Virtualized Network for Developing & Testing Network & Cloud Applications on a Single Machine

    This paper proposes a platform that aims at creating a virtualized network on a single machine. It mainly focuses on network level virtualization. It aims at the consolidation of network level components virtually on a single machine: Wherein user can launch any network-based applications (e.g. - App server's, Web servers,...

    Provided By Academy Publisher

  • White Papers // Feb 2010

    A Identity Authentication Based on Fingerprint Identification

    Security of communication is guaranteed by the security of cipher code system. But to remember the password is difficult, and to steal the password is easy. The fingerprint is the personal biometric feature. It is different from others'. To pick up the fingerprint is convenient for people. Counterfeiting it is...

    Provided By Academy Publisher

  • White Papers // Dec 2009

    Heterogeneous Information System Integration Based on HUB-SOA Model

    Considering the problems of heterogeneous information system integration, service-oriented component of HUB-SOA model is proposed based on investigating E-HUB integration model and SOA integrated structure. Further, the key technical of the basic working principle, interface model, web service, system component and schema mapping are researched. What's more, WEB service and...

    Provided By Academy Publisher

  • White Papers // Nov 2009

    Implementation of Hardware Stack TCP/IP Using Virtex-2 Pro FPGA

    There is a general consensus that in years to come more and more Internet devices will be embedded and not PC oriented. Just one such prediction is that by 2010, 95% of Internet-connected devices will not be computers. So if they are not computers, what will they be? Embedded Internet...

    Provided By Academy Publisher

  • White Papers // Jul 2009

    Real Estate Decision Support System of Market Comparison Approach Based on GIS

    Market comparison approach is one of the commonest appraise approach. This paper studied real estate decision support system of market comparison approach based on GIS. Firstly, the paper designs the system logic structure in this paper, secondly, the paper establishes the database and model database for appraise, and then, the...

    Provided By Academy Publisher

  • White Papers // Nov 2009

    Learning to Match XML Schemas - A Decision Tree based Approach

    Schema matching, finding semantic correspondences between elements of two schemas, is an essential activity in many application domains such as data mining, data warehousing, web data integration, and XML message mapping. In this paper, a decision tree based approach is presented to match the similarity between two XML schemas. Experimental...

    Provided By Academy Publisher

  • White Papers // Apr 2010

    Power Aware Job Scheduling With Quality of Service Guarantees: A Preliminary Study

    In large scale server systems, Quality of Service (QoS) performance cannot be guaranteed if only the objective is to minimize the total power consumptions separately. In this paper a power aware feedback control based power aware job scheduling algorithm (PFM) is proposed to minimize power consumption in computing system and...

    Provided By Academy Publisher

  • White Papers // Dec 2009

    Advanced Dynamic Source Routing With QoS Guarantee

    With a great deal of different applications increasing, it needs to provide effect communication for mobile Ad Hoc network. In this paper, authors present an Advanced Dynamic Source Routing (ADSR) algorithm for such network. ADSR can select routes according to link state and dynamic delay detection. In the route discovery...

    Provided By Academy Publisher

  • White Papers // Apr 2010

    A Middleware-Based Approach for Mobile Service Delivery

    Service applications in mobile environment with large potential users become more and more popular. However, there are some limitations and obstacles for service delivery in mobile environment because of the particularity of mobile network and limiting ability of mobile terminals. In order to improve the efficiency and performance of service...

    Provided By Academy Publisher

  • White Papers // Sep 2009

    CARISMA - A Service-Oriented, Real-Time Organic Middleware Architecture

    To cope with the ever increasing complexity of today's computing systems, the Concepts of Autonomic and Organic Computing (AC/OC) have been devised. Organic or autonomic systems are characterized by so-called self-X properties such as self-configuration and self-optimization. This approach is particularly interesting in the domain of distributed, embedded, real-time systems....

    Provided By Academy Publisher

  • White Papers // Nov 2009

    Improving Pairing Mechanism in Bluetooth Security

    Bluetooth has been developed to provide mobile ad hoc connectivity between a wide range of portable and fixed devices. Bluetooth is a Wireless Personal Area Network (WPAN) Standard that is moderately secure but still has weaknesses in its security architecture. One such weakness has been identified in its pairing mechanism,...

    Provided By Academy Publisher

  • White Papers // Nov 2009

    Exploiting XML Dom for Restricted Access of Information

    Time Bound Access (TBA) has been a major challenge for online information distribution services. A secure and constrained information transmission over the public network is the key aspect of such services wherein a genuine user who is privileged should not be denied of service under any circumstances. As it is...

    Provided By Academy Publisher

  • White Papers // Nov 2009

    The Implementation of Speaker Recognition on VoIP Auditing in Gigabit High-Speed Environment

    VoIP(Voice over Internet Protocol) is low-cost, flexible and brings great convenience to people's life, but it also brings security problems such as cyber-crime issues. This paper aims to solve security problem by using speech recognition technology to identify the speaker automatically. The system uses zero-copy module to capture packets in...

    Provided By Academy Publisher

  • White Papers // Apr 2010

    Security Research on WEP of WLAN

    Wires Equivalent Privacy (WEP) is used to improve the security of wireless LAN (WLAN). By analyzing the weaknesses of WEP and RC4, the author designs a simulative platform including software and hardware to crack WEP keys. The results show that the WLAN based on WEP is insecure. At last they...

    Provided By Academy Publisher

  • White Papers // Aug 2009

    An Entropy Constrained Stability QoS Multicast Routing Algorithm in MANET

    In mobile ad hoc networks (MANETs), the provision of Quality of service (QoS) guarantees is much more challenging than in wireline networks, mainly due to node mobility, multihop communications, contention for channel access, and a lack of central coordination. This paper introduces an Entropy constrained stability QoS Multicast Routing algorithm...

    Provided By Academy Publisher

  • White Papers // Nov 2009

    Comparative Analysis of QoS Metrics in Mobile Ad Hoc Network Environment

    A Mobile Ad-Hoc Network (MANET) is a collection of wireless mobile nodes that communicate with each other without any centralized access points, infrastructure, or centralized administration. This paper presents an analysis of various quality of service metrics (QoS) of mobile ad hoc network nodes like Throughput, Delay, Packet Delivery Ratio...

    Provided By Academy Publisher

  • White Papers // Aug 2010

    Reviewing Some Cloud Computing Platforms

    Cloud Computing is an emerging technology in which the research community and industries have recently embarked. However, the infrastructures of most cloud computing systems today are invisible to the research community, or are not explicitly designed to the researchers interested in cloud computing systems. This paper depicts the Cloud computing...

    Provided By Academy Publisher

  • White Papers // Nov 2009

    Data Security Model for Cloud Computing

    With the development of cloud computing, Data security becomes more and more important in cloud computing. This paper analyses the basic problem of cloud computing data security. With the analysis of HDFS architecture, the authors' get the data security requirement of cloud computing and set up a mathematical data model...

    Provided By Academy Publisher

  • White Papers // Aug 2009

    A Planar Group-Based Architecture to Scale Ad-Hoc and Sensor Networks

    It is known that grouping nodes gives better performance to the group and to the whole system, thereby avoiding unnecessary message forwarding and additional overheads while allows to scale the network considerably. Many routing protocols for ad-hoc networks and sensor networks have been designed, but none of them is based...

    Provided By Academy Publisher

  • White Papers // Nov 2009

    A Real-Time Intrusion Detection System Based on PSO-SVM

    The success of any Intrusion Detection System (IDS) is a complicated problem due to its nonlinearity and the quantitative or qualitative network traffic data stream with irrelevant and redundant features. How to choose the effective and key features to IDS is very important topic in information security. Support Vector Machine...

    Provided By Academy Publisher

  • White Papers // Aug 2009

    Sources Selection Methodology for Hidden Web Data Integration

    In the internet-scale hidden web data integration, the problem of sources (web databases) selection has been a primary challenge. This paper proposes a novel approach for web databases selection of internet-scale hidden web data integration. This approach is based on a benefit function that evaluates how much benefit the web...

    Provided By Academy Publisher

  • White Papers // Nov 2009

    Security Border Gateway for Securing Mobile IP Networks

    Security support is a key feature for mobile computing environments. But to construct a secure mobile environment is a daunting task because of some contradictions between the nature of mobile environment and its associated applications. This paper proposes a solution on secure data transfer among different networks using Mobile IP....

    Provided By Academy Publisher

  • White Papers // Dec 2009

    Model Based Security Policy Assessment for e-Business Environment

    The key to profitability for e-business is ensuring data integrity, service availability, and user information confidentiality along the entire e-services chain. Both staffs and IT system components need to compare secure policy with performance in an e-business environment. Currently, most efforts set focus on e-business process analysis and value-chain analysis,...

    Provided By Academy Publisher