Academy Publisher

Displaying 1-40 of 2703 results

  • White Papers // Oct 2014

    Trusted Puzzle Solvers without Clock Support Against Spam and Denial-of-Service Attacks

    Spam and Denial-of-Service (DoS) attacks are growing threats on the internet. Cryptographic puzzles can be used to address the problem effectively. Additionally, the Trusted Puzzle Solver (TPS), which is similar to the Trusted Platform Module (TPM), is also proposed to help constructing crypto puzzles that may have some outstanding specialties...

    Provided By Academy Publisher

  • White Papers // Oct 2014

    Optimizing Test Case Execution Schedule Using Classifiers

    As software evolves, test suite continually grows larger. However running all the test cases in the test suite is prohibitive in most cases. To reduce the cost of regression testing, the authors can optimize test case execution schedule to maximize the early fault detection rate of the original test suite....

    Provided By Academy Publisher

  • White Papers // Oct 2014

    Distributed Storage and Processing Method for Big Data Sensing Information of Machine Operation Condition

    The traditional relational database cannot satisfy the requirements of the high speed and real-time storage and processing for the distributed big data sensing information in the wide area network environment. In this paper, the No-SQL database H-Base is used to store the big data sensing information of machine operation condition...

    Provided By Academy Publisher

  • White Papers // Oct 2014

    Reliability and Portability Assessment Tool Based on Hazard Rates for an Embedded Open Source Software

    An embedded OSS (Open Source Software) known as one of OSS has been gaining a lot of attention in the embedded system area, i.e., Android, BusyBox, TRON, etc. However, the poor handling of quality problem and customer support prohibit the progress of embedded OSS. Therefore, many companies have been hesitant...

    Provided By Academy Publisher

  • White Papers // Oct 2014

    A Proposal for a Method to Translate MAP Model Into BPMN Process Diagram

    In this paper, the authors present a method to bridge the gap between intentional process modeling and business process modeling. The first represent the business objectives of an enterprise and the strategies used in order to achieve these objectives, while the second concentrate on the business processes. The proposed method...

    Provided By Academy Publisher

  • White Papers // Oct 2014

    Hybrid Adaptive Software Development Capability: An Empirical Study

    Software intensive organizations require the integration of agility, people, process, product and tool elements for establishing a hybrid adaptive software development capability. This paper presents the results of the empirical study that has been conducted to identify the important underlying characteristics of the hybrid adaptive software development capability elements. Based...

    Provided By Academy Publisher

  • White Papers // Oct 2014

    Research on Real-Time Performance Testing Methods for Robot Operating System

    To test real-time performance of RGMP-ROS, a robot operating system, this paper takes an in-depth study of the basic functions of real-time operating system kernel. By analyzing the main factors that affect the real-time performance of an operating system, the authors propose a set of real-time performance testing methods based...

    Provided By Academy Publisher

  • White Papers // Oct 2014

    3D CAD Model Representation and Retrieval Based on Hierarchical Graph

    Due to 3D CAD models are often characterized with complicated geometry and topology, how to help the designers quickly and accurately find the object models from the database containing massive amount of models using the relatively rough query instance is still a big challenge. In this paper, a novel representation...

    Provided By Academy Publisher

  • White Papers // Sep 2014

    Knowledge Unit Relation Recognition Based on Markov Logic Networks

    Knowledge Unit (KU) is the smallest integral knowledge object in a given domain. Knowledge unit relation recognition is to discover implicit relations among KUs, which is a crucial problem in information extraction. This paper proposes a knowledge unit relation recognition framework based on Markov logic networks, which combines probabilistic graphical...

    Provided By Academy Publisher

  • White Papers // Sep 2014

    Clustering-based Routing Algorithm in Wireless Sensor Networks with Mobile Sink

    Most of the existing data gathering strategies are based on the structure of stationary sink in wireless sensor networks, which will lead to rapidly energy consumption of sensor nodes near the sink for the reason that these nodes burden the data transmission from the whole network. This paper proposes a...

    Provided By Academy Publisher

  • White Papers // Sep 2014

    Efficient Resource Allocation with QoS Guarantee on LTE-A Downlink Network Systems

    Effective radio resource management is a fundamental component in all wireless communication systems. From the user and service providers' point of view, the emerging LTE - A network is expected to deliver high performance sensitive applications like VOIP, videoconferencing, mobile video services, etc. These converged services have unique traffic-handling and...

    Provided By Academy Publisher

  • White Papers // Sep 2014

    A Robust Data Gathering Technique for Large Scaled Wireless Sensor Networks

    In this paper, the authors propose a data gathering scheme for large scaled wireless sensor networks using multiple Mobile Data Collectors (MDCs) and the Spatial Division Multiple Access (SDMA) technique. They focus on minimizing the data gathering time by employing the SDMA technique, and minimizing the length of touring paths...

    Provided By Academy Publisher

  • White Papers // Sep 2014

    Filtering Network Spam Message using Approximated Logistic Regression

    The development of telecom network and Internet provides effective ways for communication. As an important way in communication, Short Messaging Service (SMS) via both telecom network and Internet has played an increasing important role in daily life. However, it usually suffers from spam SMS that causes misunderstanding and cheat. The...

    Provided By Academy Publisher

  • White Papers // Sep 2014

    P2P Network Traffic Identification Based on Random Forest Algorithm

    With the rapid development of computer technique in the past decades, the emergence of P2P technique prompts the network computing model evolving from centralized network to distributed network. Although P2P technique has brought tremendous changes to the network technique, P2P technique also exposes a lot of problems during its implementation....

    Provided By Academy Publisher

  • White Papers // Sep 2014

    Stable AODV Routing Protocol with Energy-aware in Mobile Ad Hoc Network

    In Mobile Ad hoc NETwork (MANET), due to the mobility of the nodes it is difficult to find the route which can maintain the whole process of data transmission. Therefore, it is very critical to balance, maintain and repair the route within the mobility of nodes and the limited battery...

    Provided By Academy Publisher

  • White Papers // Sep 2014

    Node-Based Resource Optimization Algorithm of Wireless Network

    In order to improve the traditional wireless sensor network resources shortcomings of single, large power consumption, this paper puts forward the optimization algorithm of wireless sensor network resources. And analyzes the network design of wireless sensor network, optimize the algorithm in the rate and the node power consumption and energy...

    Provided By Academy Publisher

  • White Papers // Sep 2014

    A Physical Layer Key Negotiation Mechanism to Secure Wireless Networks

    The rapid technological developments in computing technology and the proliferation of wireless network nodes with light infrastructure, have emerged large quantities of security requirements of informational privacy in cyberspace. Due to the inherent nature of open medium, diversity and variability of network topology, wireless networks are greatly difficult to secure...

    Provided By Academy Publisher

  • White Papers // Sep 2014

    Social Relation Based Cache Distribution Policy in Wireless Mobile Networks

    Recent advances in intelligent mobile terminal result in the rapid development of wireless mobile networks, which has inherently properties of high access time, low bandwidth and other shortcoming that pull down the Quality of Service (QoS). Cache technologies are considered as the most favorable tools for dealing with the problems...

    Provided By Academy Publisher

  • White Papers // Sep 2014

    Automatic Generation of Meta Classifiers with Large Levels for Distributed Computing and Networking

    In this paper, the authors devoted to a case study of a new construction of classifiers. These classifiers are called automatically generated multi-level meta classifiers, AGMLMC. The construction combines diverse meta classifiers in a new way to create a unified system. This original construction can be generated automatically producing classifiers...

    Provided By Academy Publisher

  • White Papers // Sep 2014

    Service Adaptively Medium Access Control Algorithm Based on Fuzzy Logical for Energy Harvesting Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) possess diverse traffic due to different monitoring tasks carried out by sensor nodes. Meanwhile, in energy harvesting WSNs, the main goal is to match energy consumption with the energy harvesting rate which is different from minimizing energy consumption in battery-powered WSNs. The authors propose a dynamic...

    Provided By Academy Publisher

  • White Papers // Sep 2014

    A Blind Adaptive Kalman-PIC MUD Algorithm for the Multiple Access Communication Network

    In wireless communication network field, the multiple access systems as Code Division Multiple Access (CDMA), Frequency Division Multiple Access (FDMA) and Time Division Multiple Access (TDMA), have been widely studied and applied. In the parallel signal processing, the multi-user detection precision of Parallel Interference Cancellation (PIC) detector is always easily...

    Provided By Academy Publisher

  • White Papers // Sep 2014

    A Collaboration-based Distributed TDMA Scheduling Algorithm for Data Collection in Wireless Sensor Networks

    For data collection application in wireless sensor networks, it is a hard task to guarantee interference-aware slot assignment in distributed TDMA scheduling algorithm. This paper proposed a new scheduling algorithm based on the collaboration of nodes to resolve the slot collision when nodes try to assign slots to them. The...

    Provided By Academy Publisher

  • White Papers // Sep 2014

    Radar Detection Based on Fuzzy Hypotheses with Fuzzy Data

    A new approach for testing fuzzy hypotheses with fuzzy data based on fuzzy test statistic function is proposed. First, the authors present h-level (the end points are closed interval) for the fuzzy hypotheses parameter and the fuzzy data. Then, they construct the related fuzzy test statistic. Second, three different types...

    Provided By Academy Publisher

  • White Papers // Sep 2014

    Optimization Algorithm of Power Communication Network Based on the Equivalent Network

    Electric power communication requires two nodes in the network or cable period expires, the communication network as a whole is still can continue to run. Reliable power network can provide reliable operation of electric power for dispatching communication security. Due to many key network nodes external connectivity in the electric...

    Provided By Academy Publisher

  • White Papers // Sep 2014

    Research of RFID Tag Anti-collision Algorithm based on Binary Tree

    To solve the RFID tag collision problem, a new anti-collision algorithm is proposed by improving the binary tree search algorithm. Through improving the requesting establishment, this algorithm reduces the probability of collision bits and the number of tags requiring collision detection time by using the even number bits for impact...

    Provided By Academy Publisher

  • White Papers // Sep 2014

    Packet Delay Estimation Algorithm Against FIFO Waiting for Asymmetric IEEE 1588 System

    Performance in IEEE 1588 synchronization depends on several related factors. Among them, the symmetry of packet delay is the most basic one. But most existing networks could not provide symmetry packet delay between master and slave clocks. From research the authors found that, FIFO waiting during packet transmitting is one...

    Provided By Academy Publisher

  • White Papers // Sep 2014

    GPS Receiver Autonomous Integrity Monitoring Algorithm Based on Improved Particle Filter

    Reliability of a navigation system is one of great importance for navigation purposes. Therefore, an integrity monitoring system is an inseparable part of aviation navigation system. Failures or faults due to malfunctions in the systems should be detected and repaired to keep the integrity of the system intact. According to...

    Provided By Academy Publisher

  • White Papers // Sep 2014

    Empirical Measurement and Analysis of I2P Routers

    With the increased focus on Internet privacy, especially after the exposure of PRISM (an Internet surveillance program), anonymous communication have been getting more and more attentions. One of the most widely used anonymous communication systems is I2P (Invisible Internet Project). And as opposed to Tor's (another popular anonymous communication system)...

    Provided By Academy Publisher

  • White Papers // Sep 2014

    High-accuracy Optimization by Parallel Iterative Discrete Approximation and GPU Cluster Computing

    High-accuracy optimization is the key component of time-sensitive applications in computer sciences such as machine learning, and the authors develop single-GPU Iterative Discrete Approximation Monte Carlo Optimization (IDAMCS) and multi-GPU IDA-MCS in their previous paper. However, because of the memory capability constrain of GPUs in a workstation, single-GPU IDA-MCS and...

    Provided By Academy Publisher

  • White Papers // Sep 2014

    Warehousing Massive Mobile Datasets

    Now-a-days, scientists can collect and analyze massive mobile data generated by various sensors and applications of Smartphone's. Smartphone's have become an important platform for the understanding of social activities, such as community detection, social dynamics and influence. It is extremely important to store and retrieve mobile data efficiently for various...

    Provided By Academy Publisher

  • White Papers // Sep 2014

    A Novel Nonparallel Plane Proximal SVM for Imbalance Data Classification

    The research of imbalance data classification is the hot point in the field of data mining. Conventional classifiers are not suitable to the imbalanced learning tasks since they tend to classify the instances to the majority class which is the less important class. This paper pays close attention to the...

    Provided By Academy Publisher

  • White Papers // Sep 2014

    An Algorithm of Top-k High Utility Itemsets Mining over Data Stream

    Existing top-k High Utility Itemset (HUI) mining algorithms generate candidate itemsets in the mining process; their time & space performance might be severely affected when the dataset is large or contains many long transactions; and when applied to data streams, the performance of corresponding mining algorithm is especially crucial. To...

    Provided By Academy Publisher

  • White Papers // Sep 2014

    The Formal Verification and Improvement of Simplified SET Protocol

    Model checking has been successfully applied to verify the security properties of network protocols. In this paper, the authors propose a formal modeling method using the promela language based on simplified model of SET payment protocol proposed by the researchers, and use LTL to describe authentication property. Under the hypothesis...

    Provided By Academy Publisher

  • White Papers // Sep 2014

    The Mechanism of Software Trustworthiness Growth based on Evolution

    Based on the software evolution theory, this paper discusses the software trustworthiness growth process in which software trustworthiness gradually develops from low trustworthy state into high trustworthy state, presents the cycle model of software trustworthiness growth and summarizes the key factors of influencing trustworthiness growth. On this basis, the relative...

    Provided By Academy Publisher

  • White Papers // Sep 2014

    The Mechanism of Software Trustworthiness Growth based on Evolution

    Based on the software evolution theory, this paper discusses the software trustworthiness growth process in which software trustworthiness gradually develops from low trustworthy state into high trustworthy state, presents the cycle model of software trustworthiness growth and summarizes the key factors of influencing trustworthiness growth. On this basis, the relative...

    Provided By Academy Publisher

  • White Papers // Sep 2014

    An Algorithm for Mining Frequent Itemsets from Library Big Data

    Frequent itemset mining plays an important part in college library data analysis. Because there are a lot of redundant data in library database, the mining process may generate intra-property frequent itemsets, and this hinders its efficiency significantly. To address this issue, the authors propose an improved FP-growth algorithm they call...

    Provided By Academy Publisher

  • White Papers // Sep 2014

    A Nonlinear Dynamic Model for Software Aging in Service-Oriented Software

    Software aging results from runtime environment degradation, and is significantly correlated with available computing resources. A set of variables evolving with time can describe the running state of computer system. Consequently, software aging is analogous to evolution of a dynamic system in this paper. The authors construct a nonlinear dynamic...

    Provided By Academy Publisher

  • White Papers // Sep 2014

    CPU Frequency Scaling Algorithm for Energy-saving in Cloud Data Centers

    High energy consumption becomes an urgent problem in cloud datacenters. Based on virtualization technologies, the pay-as-the user-go resource provision paradigm has become a trend. Specifically, Virtual Machine (VM) is the basic resource unit in data center for resource migration and provisioning. Many research have been devoted to improve datacenter resource...

    Provided By Academy Publisher

  • White Papers // Sep 2014

    CPU Frequency Scaling Algorithm for Energy-saving in Cloud Data Centers

    High energy consumption becomes an urgent problem in cloud datacenters. Based on virtualization technologies, the pay-as-the user-go resource provision paradigm has become a trend. Specifically, Virtual Machine (VM) is the basic resource unit in data center for resource migration and provisioning. Many research have been devoted to improve datacenter resource...

    Provided By Academy Publisher

  • White Papers // Sep 2014

    The Formal Verification and Improvement of Simplified SET Protocol

    Model checking has been successfully applied to verify the security properties of network protocols. In this paper, the authors propose a formal modeling method using the promela language based on simplified model of SET payment protocol proposed by the researchers, and use LTL to describe authentication property. Under the hypothesis...

    Provided By Academy Publisher

  • White Papers // Apr 2010

    A Middleware-Based Approach for Mobile Service Delivery

    Service applications in mobile environment with large potential users become more and more popular. However, there are some limitations and obstacles for service delivery in mobile environment because of the particularity of mobile network and limiting ability of mobile terminals. In order to improve the efficiency and performance of service...

    Provided By Academy Publisher

  • White Papers // Sep 2009

    CARISMA - A Service-Oriented, Real-Time Organic Middleware Architecture

    To cope with the ever increasing complexity of today's computing systems, the Concepts of Autonomic and Organic Computing (AC/OC) have been devised. Organic or autonomic systems are characterized by so-called self-X properties such as self-configuration and self-optimization. This approach is particularly interesting in the domain of distributed, embedded, real-time systems....

    Provided By Academy Publisher

  • White Papers // Nov 2009

    Improving Pairing Mechanism in Bluetooth Security

    Bluetooth has been developed to provide mobile ad hoc connectivity between a wide range of portable and fixed devices. Bluetooth is a Wireless Personal Area Network (WPAN) Standard that is moderately secure but still has weaknesses in its security architecture. One such weakness has been identified in its pairing mechanism,...

    Provided By Academy Publisher

  • White Papers // Nov 2009

    Learning to Match XML Schemas - A Decision Tree based Approach

    Schema matching, finding semantic correspondences between elements of two schemas, is an essential activity in many application domains such as data mining, data warehousing, web data integration, and XML message mapping. In this paper, a decision tree based approach is presented to match the similarity between two XML schemas. Experimental...

    Provided By Academy Publisher

  • White Papers // Nov 2009

    Exploiting XML Dom for Restricted Access of Information

    Time Bound Access (TBA) has been a major challenge for online information distribution services. A secure and constrained information transmission over the public network is the key aspect of such services wherein a genuine user who is privileged should not be denied of service under any circumstances. As it is...

    Provided By Academy Publisher

  • White Papers // May 2009

    Source Routing in Mobile Ad Hoc NETworks (MANETs)

    Mobile ad hoc network is a reconfigurable network of mobile nodes connected by multi-hop wireless links and capable of operating without any fixed infrastructure support. In order to facilitate communication within such self-creating, self-organizing and self-administrating network, a dynamic routing protocol is needed. The primary goal of such an ad...

    Provided By Academy Publisher

  • White Papers // Feb 2009

    Multi-Model Music Content Description and Retrieval Using IEEE 1599 XML Standard

    The new format IEEE 1599 for music and audio content description defines a standard for the representation of retrieval models within music and music/audio formats that makes use of XML documents as content descriptors. This paper described how music/audio semantics can be actually represented within the Structural Layer of IEEE...

    Provided By Academy Publisher

  • White Papers // May 2009

    Research on Fast Implementation of RSA With Java

    This paper introduces the principles of RSA, then based on these principles the implementation of RSA is discussed. After that several classes are analyzed and designed with Object-Oriented methods, and these classes are implemented with Java language. In the third fourth part, the authors give the fast implementation of RSA...

    Provided By Academy Publisher

  • White Papers // Jun 2009

    Research on On-Card Bytecode Verifier for Java Cards

    The bytecode verification is a key point of the security chain of the Java Platform. This feature is optional in many embedded devices since the memory requirements of the verification process and the process capability of hardware are too high. This paper proposes a verifier that utilizes the logical flow...

    Provided By Academy Publisher

  • White Papers // Sep 2009

    Global Optimization of Multi Radio Mesh Access Point Location in Underground Area

    This paper shows that with a proper placement of Mesh multi radio devices in a confined area, it is possible to reduce the congestion in the WMN (Wireless Mesh Network) by 50 to 60 percent according to the loaded traffic. The best portal deployment is obtained by minimizing the maximum...

    Provided By Academy Publisher

  • White Papers // May 2009

    Peer to Peer Network for Mobile Communication

    This paper focuses on possibilities of implementation of peer to peer architecture of communication over mobile platform. There are many studies going on nowadays about Peer to Peer (P-to-P) and file-sharing. Some studies predict staggering 45% of total internet traffic is P-to-P. Mobile operators need to embrace Peer to Peer...

    Provided By Academy Publisher

  • White Papers // May 2009

    Network Survivability for a Regular WDM Optical Network From Double-Link Failures Using Greedy Algorithm

    Network survivability is an important requirement in high-speed optical networks. The survivability of these networks from the failure of a single component such as a link or a node needs some typical approaches. In this paper, one have considered double-link failures in a hypercube optical network and present three loopback...

    Provided By Academy Publisher

  • White Papers // Nov 2009

    Threats and Vulnerabilities in Wireless Mesh Networks

    Wireless Mesh Networks (WMN) encompass a new area of technology set to play an important role in the next generation wireless mobile networks. WMN is characterized by dynamic self-organization, self-configuration and self-healing to enable flexible integration, quick deployment, easy maintenance, low costs, high scalability, and reliable services. Security of such...

    Provided By Academy Publisher

  • White Papers // Aug 2010

    Security Research of VPN Technology Based on MPLS

    The VPN technology based on MPLS is the current mainstream VPN technology that uses isolations of routing and address or other information technologies to resist attacking and marking spoofing, in which the security of data transmission are guaranteed to a certain extent. In this paper, Securities of MPLS VPN are...

    Provided By Academy Publisher

  • White Papers // Nov 2009

    Performance of Routing Protocols for Mobile Adhoc and Wireless Sensor Networks: A Comparative Study

    Mobile Ad hoc Networks (MANETs) as well as Wireless Sensor Networks (WSNs) suffer from various challenges like low bandwidth, overhead and velocity of nodes. This research contribution is the characterization study between MANETs and WSNs environment with respect to various routing protocols. This study investigates the routing protocols corresponding to...

    Provided By Academy Publisher

  • White Papers // Jul 2010

    Research of Network Mass Storage Mode Based on SAN

    In the face of new needs of the current network storage, the traditional DAS, NAS and advanced SAN network storage technology are analyzed, and the technical differences between the three technologies are compared. The redundant technology and main performance indicator system are analyzed by using system reliability theory, and thus...

    Provided By Academy Publisher

  • White Papers // May 2009

    Operating Systems for Tiny Networked Sensors: A Survey

    Wireless Sensor Networks (WSNs) is an emerging area of research. WSNs face lot of problems that do not arise in other types of wireless networks and computing environments. Limited computational resources, power constraints, low reliability and higher density of sensor nodes (motes) are some basic problems that need to be...

    Provided By Academy Publisher

  • White Papers // May 2009

    A Survey on Hybrid Mobile Sensor Networks

    Sensor networks consist of small wireless sensor nodes deployed randomly over an area to monitor the environment or detect intrusion. The coverage provided by sensor networks is very crucial to their effectiveness. Many of the important applications of sensor networks demand autonomous mobility for the sensor nodes. Early failure of...

    Provided By Academy Publisher

  • White Papers // Dec 2008

    Cryptanalysis of Some RFID Authentication Protocols

    Two effective attacks, namely de-synchronization attack and impersonation attack, against Ha et al.'s LCSS RFID authentication protocol, Song and Mitchell's protocol are identified. The former attack can break the synchronization between the RFID reader and the tag in a single protocol run so that they can not authenticate each other...

    Provided By Academy Publisher

  • White Papers // Nov 2009

    Efficient Method for Identifying Location and Removal of Data Redundancy for RFID Data

    Radio Frequency IDentification (RFID) Technology has gained a significant momentum, in the past few years. This technology plays an essential role in object tracking in supply chain management applications and library management applications. RFID Technology holds the promise to simplify baggage handling, clinical laboratory procedures and other tasks by providing...

    Provided By Academy Publisher

  • White Papers // Apr 2009

    Realization of SCM and CRM by Using RFID-Captured Consumer Behavior Information

    Physical store retailers are facing a tougher situation than ever. In order to tackle this tough situation, they need not only to reduce cost by effectively executing SCM but also to introduce measures to increase profit like CRM. They are effective by themselves, but if they are combined the retailers...

    Provided By Academy Publisher

  • White Papers // Nov 2009

    Value Chain Model in Knowledge Management

    Knowledge is a complex and fluid concept to people, so knowledge management focuses on knowledge arrival; also it is considered as strategic activity help organizations to achieve sustainable competitive advantage. Value chain analysis is one of the analysis tools which satisfy continuous competitive advantage on organizations. This paper summarizes the...

    Provided By Academy Publisher

  • White Papers // Aug 2010

    Research of Campus Heterogeneous Database Middleware Based on SOA

    Along with the rapid development of campus information technology, many universities precipitate a great deal of information resources, how well make use of existing resources to build a centralized information resource management system is a serious problem. This paper designs a deep integration architecture of campus information based on SOA,...

    Provided By Academy Publisher

  • White Papers // Nov 2009

    The Requirements for Building an e-Commerce Infrastructure

    This paper will present all requirements to build a reliable e-commerce infrastructure in Jordan. Ecommerce is one of the main desired outcomes from a state internet readiness. Despite the fact that the requirements for e-commerce are very similar to those for an e-government or an internet readiness in general, however,...

    Provided By Academy Publisher

  • White Papers // Jul 2009

    Study on the Application Layer Security in e-Commerce Websites

    Most of studies about E-Commerce Security focus on the data confidentiality issue. Although security mechanisms, such as SSL (secure socket layer) or SET (secure electronic transaction), have been adopted in websites, catastrophic events that confidential data in ECommerce are revealed happened more than once. The essential reason for this is...

    Provided By Academy Publisher

  • White Papers // May 2009

    Distributed Cryptographic Key Management for Mobile Agent Security

    The problem of securing data section in a mobile agent from discovery and exploitation by a malicious host is a difficult task. A full scale adaptation of mobile agents becomes true once the security obstacles are overcome. A number of solutions are proposed based on cryptographic principles have their own...

    Provided By Academy Publisher

  • White Papers // Jun 2009

    Semantic Focused Crawling for Retrieving ECommerce Information

    Focused crawling is proposed to selectively seek out pages that are relevant to a predefined set of topics without downloading all pages of the Web. With the rapid growth of the E-commerce, how to discovery the specific information such as about buyer, seller and products etc. adapting for the online...

    Provided By Academy Publisher

  • White Papers // Nov 2010

    Mobile Payment Framework Based on 3G Network

    With the development of mobile network technology and mobile commerce application, mobile payment is becoming more and more important to assist mobile users to participate in the mobile commerce. Service reliability, security authtification, payment mobility is the core improblem, which should be solve with some flexible and secure measures. After...

    Provided By Academy Publisher

  • White Papers // Dec 2008

    Integrating e-Services With a Telecommunication e-Commerce Using Service-Oriented Architecture

    In the past, electronic commerce only focused on customer-to-business web interaction and on business-to-business web interaction. With the emergence of business process management and of service-oriented architecture, the focus has shifted to the development of e-services that integrate business processes and that diversify functionalities available to customers. The potential of...

    Provided By Academy Publisher

  • White Papers // May 2009

    A Router-Based Technique to Detect and Defend Against Low-Rate Denial of Service

    With the successful use of router technique, one consider to give routers additional function to defect and defend against LDOS. LDOS is a kind of miniature network attack which can affect TCP flows to zero or very low transmission bandwidth, just because it takes advantage of retransmission timeout of TCP....

    Provided By Academy Publisher

  • White Papers // Feb 2009

    An Innovative Pricing Method for Telecommunication Services Pricing Through American Options

    With the evolution of telecommunication networks and of their services the role of service provider is changed, so nowadays there is a coexistence of Network Operators and Virtual Operators. The difference between these players is not in the way they offer a service but primarily in their economic objectives and...

    Provided By Academy Publisher

  • White Papers // Aug 2009

    Cross-Layering in an Industrial Wireless Sensor Network: Case Study of OCARI

    Wireless sensor networks are adapted to monitoring applications. Specific solutions have to be developed for industrial environments in order to deal with the harsh radio conditions and the QoS (Quality Of Service) requirements of industrial applications. In this paper, they present the main protocols used in the OCARI project, and...

    Provided By Academy Publisher

  • White Papers // Dec 2009

    A Multi-Attribute Assessment Method for e-Commerce Risks

    Based on multi-attribute decision making theory, a multi-attribute assessment framework for E- commerce risks is presented. The paper applies an improved Evidential Reasoning (ER) approach to support evaluation decision, and uses a credit interval to figure scoring result and allow something absent. E-Commerce risks include environmental risks, management risks, technical...

    Provided By Academy Publisher

  • White Papers // May 2009

    Security Solution of Collaborative Commerce Chain System

    To improve the performance and network security of the collaborative commerce chain system and to deal with shortcomings of existing solution to the electronic commerce, the technology of the mobile agent was introduced into the modeling of the system. Based on the properties of mobile agent, problems of network security...

    Provided By Academy Publisher

  • White Papers // Nov 2009

    Mobile Agent Based Distributed System Computing in Network

    Mobile agents are emerging as a promising paradigm for the design and implementation of distributed applications. While mobile agents have generated considerable excitement in the research community, they have not translated into a significant number of real-world applications. One of the main reasons for this is lack of work that...

    Provided By Academy Publisher

  • White Papers // Feb 2010

    Special Issue: Delay Tolerant Networks, Architecture, and Applications

    Delay-Tolerant Networking (DTN) enables communication in sparse mobile ad-hoc networks and other challenged environments where traditional networking fails and new routing and application protocols are required. Past experience with DTN routing and application protocols has shown that their performance is highly dependent on the underlying mobility and node characteristics. Evaluating...

    Provided By Academy Publisher

  • White Papers // Apr 2010

    Research on Security Policy and Framework

    Policies are rules that govern the choices in behaviors of a system. Security policies define what actions are permitted or not permitted, for what or for whom, and under what conditions. In this paper, the present situation of research on policy is overviewed, including policy and security policy definition, policy...

    Provided By Academy Publisher

  • White Papers // May 2009

    High-Speed Signature Matching in Network Interface Device Using Bloom Filters

    Network intrusion detection systems play a critical role in protecting the information infrastructure of an organization. Due to the sophistication and complexity of techniques used for the analysis they are commonly based on general-purpose workstations. Although cost-efficient, these general-purpose systems are found to be inadequate as they fail to perform...

    Provided By Academy Publisher

  • White Papers // May 2009

    A Mobile Agent Based Architecture for Securing WLANs

    Wireless LANs are open and are vulnerable to various attacks. Techniques available to prevent Wireless LANs from these attacks are not comprehensive. In this paper the authors discuss the drawbacks of the existing security mechanisms and the authors provide a security architecture which uses Mobile agents as a security facilitator....

    Provided By Academy Publisher

  • White Papers // Apr 2010

    CNC System of MKS1632 External Cylindrical Grinding Machines Based on Embedded

    The traditional CNC system based on the IPC is complex structure, high cost, hardware redundancy and can not be cut, high power consumption and low reliability, this paper proposed and designed a CNC System of External Cylindrical Grinding Machines, and gives the software and hardware architecture design. The CNC system...

    Provided By Academy Publisher