Academy Publisher

Displaying 1-40 of 2670 results

  • White Papers // Dec 2014

    A Resource-Efficient System for Detection and Verification of Anomalies Using Mobile Agents in Wireless Sensor Networks

    Sensor readings are vulnerable to in situ and in transit anomalies. A well designed anomaly detection system should be able to identify the source of anomalies through in situ verification of suspicious behavior of sensor nodes. One approach for in situ verification is physical diagnosis of sensor nodes, which is...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Simulation and Performance Analysis of the IEEE1588 PTP With Kalman Filtering in Multi-Hop Wireless Sensor Networks

    As the Wireless Sensor Networks (WSNs) find wider and wider applications, time synchronization has emerged as a key technology to improve network performance and enable WSNs in time-sensitive applications. The recently proposed IEEE 1588 Precision Time synchronization Protocol (PTP) has shown its capability for the wired Ethernet, but its performance...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Enhancing Channel Coordination Scheme Caused by Corrupted Nakagami Signal and Mobility Models on the IEEE 1609.4 Standard

    Ensuring high saturated throughput of SCHs and reducing the transmission delay of service packets on CCHs are one of the most challenging issues in multichannel operations IEEE 1609.4 standard. Moreover, multiple issues due to its highly dynamic topology, the high mobility, the change trajectory, and Nakagami propagation channel caused by...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Detecting Access Point Spoofing Attacks Using Partitioning-Based Clustering

    The impersonation of wireless Access Point (AP) poses an unprecedented number of threats that can compromise a wireless client's identity, personal data, and network integrity. The AP impersonation attack is conducted by establishing rogue AP with spoofed Service Set IDentifier (SSID) and MAC address same as the target legitimate AP....

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Error Performance Analysis of Multiuser CDMA Systems with Space-time Coding in Rician Fading Channel

    In this paper, the error performance of multiuser CDMA system with space-time coding is studied in Rician fading channel, and the corresponding Bit Error Rate (BER) and Symbol Error Rate (SER) analysis are presented. Based on the performance analysis, a simple and effective multiuser receiver scheme is developed. The scheme...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Efficient Scheme for Channel Estimation in OFDM System

    The choice of channel estimation is of fundamental importance in OFDM receiver designs, which further involves a trade-off between complexity and estimation accuracy. In pilot-symbol-aided OFDM system, the Least Square (LS) estimator suffers from inherent additive Gaussian noise and Inter Carrier Interference (ICI), although the estimator exhibits lower complexity and...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Performance of Decode and Forward MIMO Relaying Using STBC for Wireless Uplink

    In this paper, the authors compare the performance of a decode and forward relay assisted wireless uplink with direct wireless uplink in the presence of rayleigh fading where source is equipped with single Transmit antenna (Tx), relay is equipped with multiple transmit and Receive antennas (Rx), and destination has multiple...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    On Efficient Design of LDPC Decoders for Wireless Sensor Networks

    Low Density Parity Check (LDPC) codes are error-correcting codes that offer huge advantages in terms of coding gain, throughput and power dissipation in digital communication systems. Error correction algorithms are often implemented in hardware for fast processing to meet the real-time needs of communication systems. However, traditional hardware implementation of...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Performance Comparison of RFID Tag at UHF Band and Millimeter-Wave Band

    The Ultra High Frequency (UHF) band spectrum will likely be congested in near future since the next generation wireless as well as Radio Frequency IDentification (RFID) system users will witness the use of UHF band technology with increased demand of bandwidth, bit rate, frequency spectrum and power consumption. The alternate...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Keeping Desired QoS by a Partial Coverage Algorithm for Cluster-Based Wireless Sensor Networks

    Many studies were done on design algorithms to completely cover an area. The authors can call the issue as a complete coverage problem. Although there were many researches about proposing a partial coverage issue; almost all of the studies only focus on lengthening the lifespan of Wireless Sensor Networks (WSNs)...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Achieving VoIP Guarantee in Wireless Local Area Networks

    Recently, Voice over Internet Protocol (VoIP) has gained much attention in Wireless Local Area Networks (WLANs). Although IEEE 802.11e Enhanced Distributed Channel Access (EDCA) has been standardized to provide voice traffic with Quality of Service (QoS) support, the voice quality could still be severely degraded by the traffic transmitted from...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    DOA Estimation for Coherent Sources in Impulsive Noise Environments

    Direction-of-Arrival (DOA) estimation of coherent sources is a significant problem in impulsive noise environments. In this paper, a robust estimation algorithm which combines the ideas of Spatial Smoothing (SS) and INFinity-norm normalization (INF) is presented referred to as INF-SSR. The proposed algorithm exploits the Root - MUSIC technique to computer...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Source-Directed Path Diversity in the Interdomain Routing

    The Internet has abundant path redundancy, especially in the inter-domain routing. However, current routing system cannot exploit the Internet path diversity and utilize the disjoint end-to-end paths efficiently. The unawareness of sources to the path selection and the best paths advertisement mechanism in the inter-domain routing make it difficult to...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Markov Chain Based Trust Management Scheme for Wireless Sensor Networks

    As the effective supplement to traditional cryptography security, trust management plays a key role for detecting malicious behaviors in wireless sensor networks. In this paper, the authors consider a sensor network wherein nodes have fixed number of states and probabilities of state transitions can be specified. They introduce Markov chain...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    A Hybrid Classifier Using Reduced Signatures for Automated Soft-Failure Diagnosis in Network End-User Devices

    The authors present an automated system for the diagnosis of both known and unknown soft-failures in end-User Devices (UDs). Known faults that cause network performance degradation are used to train the classifier-based system in a supervised manner while unknown faults are automatically detected and clustered to identify the existence of...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    e-ONE:Enhanced ONE for Simulating Challenged Network Scenarios

    Delay Tolerant Network (DTN) empowers sparse mobile ad-hoc networks and other challenged network environments, such as interplanetary communication network or deep sea communication network, where traditional networking protocols either fail to work completely or do not work well. The Opportunistic Networking Environment (ONE) Simulator has gained considerable popularity as an...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    A Load-Balanced On-Demand Routing for LEO Satellite Networks

    Due to population distribution and economic flourish diversity, the Low Earth Orbit (LEO) satellite network carries unbalanced traffic load, which leads that parts of satellite links are congested while others are underutilized. Furthermore, the congested inter-satellite links result in high queuing delay and packet dropping ratio. To ensure an intelligent...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    The Faults of Data Security and Privacy in the Cloud Computing

    According to Winkler, public cloud is based on the standard cloud computing model, in which a service provider makes resources, such as applications and storage, available to the general public over the Internet. Public cloud services may be free or offered on a pay-per-usage model. The main benefits of using...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    TTAF: TCP Timeout Adaptivity Based on Fast Retransmit over MANET

    Transmission Control Protocol (TCP) is one of the most widely deployed transport layer protocols. It responds to all packet losses, either due to congestion or link breakages, by invoking various congestion control mechanisms. All these mechanisms imply a reduction in the amount of transmitted data. Computing a proper value of...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    On-Line Data Retrieval Algorithm with Restart Strategy in Wireless Networks

    With rapid development of technologies in mobile environment, data dissemination has become an important role for obtaining their requested information of clients in many applications. There are three major approaches to disseminate information between server and clients: unicast, multicast and broadcast. Data retrieval is an efficient scheme for data dissemination...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Trail Coverage : A Coverage Model for Efficient Intruder Detection Near Geographical Obstacles in WSNs

    In Wireless Sensor Network (WSNs), the coverage strategy for achieving higher performance in intruder detection probability near irregular geographical obstacles inside a military terrain, is studied in this paper. The real life problem of the of intruder detection near irregular geographical obstacles has not been focused so far, in which...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Verifying Online User Identity Using Stylometric Analysis for Short Messages

    Stylometry consists of the analysis of linguistic styles and writing characteristics of the authors for identification, characterization, or verification purposes. In this paper, the authors investigate authorship verification for the purpose of user authentication process. In this setting, authentication consists of comparing sample writing of an individual against the model...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Topology Control Mechanism Based on Link Available Probability in Aeronautical Ad Hoc Network

    In this paper, the authors consider traffic network with high-speed mobility nodes scenario; and give a new network topology control mechanism to rise the routing path duration in Aeronautical ad hoc network. The mechanism can use different methods to construct topology according to the node densities. For network regions having...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    An Energy-Efficient Routing Mechanism Based On Genetic Ant Colony Algorithm for Wireless Body Area Networks

    As an important branch of Wireless Sensor Network (WSN), Wireless Body Area Network (WBAN) has received extensive attention of various fields as it is portable and removable. However, energy consumption is highlighting increasingly as nodes are hard to be recharged or replaced. Up to now, many energy efficient routing algorithms...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    An Improved Mix Transmission Algorithm for Privacy-Preserving

    With the rapid development of the Internet Of Things (IOT), personal privacy has been realized as the most important security issue in wireless sensor networks, especially in the Body Area Network (BAN) used in the medical field. Traditional encryption methods cannot defense against the attacks in which the communication signal...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Study of Downlink Scheduling Algorithms in LTE Networks

    Long Term Evolution (LTE) is one of the fastest growing technologies which supports variety of applications like video conferencing, video streaming, VoIP, file transfer, web browsing etc. In order to support multiple applications, Radio Resource Management (RRM) procedure is one of the key design roles for improving the system performance....

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Delay and Jitter in Networks with IPP Traffic: Theoretical Model

    In this paper, the authors analyze delay and jitter in networks with traffic modeled as Interrupted Poisson Process (IPP), and relatively small traffic loads. In one-node analysis, they estimate the probability for delay bounds violation, and they obtain expression for the jitter, with respect to phase probabilities, traffic load, and...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    An Adaptative Energy Efficient Routing Protocol for MANET

    The dynamic nature of Mobile Ad hoc NETwork (MANET) has several constraints like scalability, robust connectivity and limited power constraints. So an efficient routing protocol is required. It should be adaptable and able to maintain stable routes in spite of the dynamic network connectivity. This paper proposes a hybrid protocol,...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    A Novel Method to Improve the Accuracy of the RSSI Techniques Based on RSSI-D

    In this paper, a novel method is proposed to estimate the distance between sensor nodes based on a statistical model of GMM, which is established with the offline RSSI values, called RSSI-D. In order to estimate the arguments of RSSI-D with unobserved latent variables, EM is used to calculate the...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    SIP-Based QoS in IP Telephony

    In this paper, the authors analyze the factors resulting to the degradation of the quality of service in Voice over IP (VoIP) telephony. SIP protocol is used to explore the QoS characteristics of different Codec. The system is designed for an IP telephony service provider with other GSM operator network...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    A Hybrid Optimization Algorithm for Bayesian Network Structure Learning Based on Database

    The process of learning Bayesian networks includes structure learning and parameters learning. During the process, learning the structure of Bayesian networks based on a large database is a NP hard problem. The paper presents a new hybrid algorithm by integrating the algorithms of MMPC (Max-Min Parents and Children), PSO (Particle...

    Provided By Academy Publisher

  • White Papers // Nov 2014

    Pollution-Free Regenerating Codes with Fast Reconstruction Verification for Verifiable Cloud Storage

    In this paper, the authors present an efficient mechanism to guarantee the integrity of cloud storage systems using network-coding-based regenerating codes. Regenerating codes are a special type of erasure codes with the property that regenerating a failed encoded server, can be done using significantly less information than the size of...

    Provided By Academy Publisher

  • White Papers // Nov 2014

    A Peer-To-Peer Membership Management Protocol for Wireless Mesh Networks

    There are a wide variety of terminal devices in wireless mesh networks. In order to manage the heterogeneous networks efficiently and to solve the mismatching problem between the physical network and its P2P overlay, a membership management protocol for the P2P overlay in wireless mesh networks is proposed - BA-gossip...

    Provided By Academy Publisher

  • White Papers // Nov 2014

    Study on the Improvement of ELGamal Cryptosystem Based on Elliptic Curve

    Since proposed, ELGamal cryptosystem occupies very important position in network security and it has wide application. Compared with RSA algorithm, elliptic curve encryption algorithm has significant advantages, and it is suitable for application in the environment with limited resources. In this paper, the principle of ELGamal cryptosystem based on elliptic...

    Provided By Academy Publisher

  • White Papers // Nov 2014

    An Optimized Frequent Item Query Algorithm for Uncertain Streaming Data

    Recently, sensors are used in many fields, and the data generated are uncertain streaming data. Frequent item query is one of the most query primitives in this kind of data. In this paper, the authors study frequent item query for uncertain streaming data. First, they propose a basic frequent item...

    Provided By Academy Publisher

  • White Papers // Nov 2014

    Research on Service Controlling Algorithm of Electric Power Communication Network Based on QoS Traffic Recognition and Routing Optimization

    With rapid progress in power communication networking, the present power communication network has become an integrated transmission network that supports various services (e.g., control data, service data, voices, and images). Compared with traditional network services, real-time services in the present power communication network have stricter requirements on delays, delay jitters,...

    Provided By Academy Publisher

  • White Papers // Nov 2014

    Dynamic Effective Resource Allocation Based on Cloud Computing Learning Model

    In cloud computing field, a service-provider offers large number of resources for customers with a relatively low cost. However, any resource allocation model has to consider computational resources as well as network resources to accurately reflect practical demands. In order to rationally allocate the limited resources to users and improve...

    Provided By Academy Publisher

  • White Papers // Nov 2014

    Broadcast Encryption Based on Bidirectional Remote Authentication Scheme

    In order to ensure the established mobile ad hoc networks against unauthorized user access, the authors need the identity authentication of the nodes in the network. Using the password for remote authentication in network is more and more attractive. This paper analyzes the remote password authentication scheme based on threshold...

    Provided By Academy Publisher

  • White Papers // Nov 2014

    Data Migration Model and Algorithm Between Heterogeneous Databases Based on Web Service

    To solve the problems of data conversion between heterogeneous databases that arising from the progress of data migration, the paper presents an improved model of data migration and a data conversion algorithm based on the research on data synchronization via web service. The data migration model is divided into legacy...

    Provided By Academy Publisher

  • White Papers // Nov 2014

    Research and Implementation of the Localization Algorithm Based on RSSI Technology

    The efficiency of sensor localization is a key issue in the Internet of things. There are possibilities for improvements in existing sensor localization systems, such as design complexity, cost. To address these issues, a location algorithm based on Distributed Range-Free Localization (DRFL) is proposed. In this positioning system can be...

    Provided By Academy Publisher

  • White Papers // Jun 2009

    Statistical Analysis of Broadband Wireless Links in Rural Areas

    Third-Generation (3G) cellular systems are often considered as a promising strategy for high-speed internet deployment in rural areas. However, bandwidth in 3G systems is a limited resource and can be quite different from the advertised bandwidth. In addition, in wireless applications such as voice over IP, video-conference, remote monitoring and...

    Provided By Academy Publisher

  • White Papers // Nov 2009

    Research of Data Visualization in Near-Infrared Spectroscopy

    The spectroscopy data visualization software is developed to display the blood glucose data collected by near-infrared spectroscopy spectrometer using object-oriented programming techniques. The test results show the software can reach the pre-set functions and its intuitive interface and convenient access to all operations can assist users to do data analysis...

    Provided By Academy Publisher

  • White Papers // Dec 2009

    An Analysis of the Robustness and Stability of the Network Stack in Symbian-Based Smartphones

    Smartphones are widely used today and their popularity will certainly not slow down in the near future due to improved functionality and new technology improvements. Becoming more and more similar to PCs and laptops, they will also begin to face the same security problems especially in terms of network security....

    Provided By Academy Publisher

  • White Papers // Nov 2009

    LAN Machine: A Virtualized Network for Developing & Testing Network & Cloud Applications on a Single Machine

    This paper proposes a platform that aims at creating a virtualized network on a single machine. It mainly focuses on network level virtualization. It aims at the consolidation of network level components virtually on a single machine: Wherein user can launch any network-based applications (e.g. - App server's, Web servers,...

    Provided By Academy Publisher

  • White Papers // Sep 2009

    Data Management of Mobile Object Tracking Applications in Wireless Sensor Networks

    This paper focuses on the data management problem of object tracking applications in wireless sensor networks. The paper proposes link-segment storage and query protocol to track mobile object in wireless sensor network dynamically. The main idea of the protocol is to combine advantages of local storage with data centric storage...

    Provided By Academy Publisher

  • White Papers // Aug 2009

    Design and Development of a Open Frame RFID System Unite Test Platform

    RFID (Radio Frequency Identification) System Test Platform has attracted considerable attention in recent years because it has a great impact on many kinds of trade applications. However, there is dearth of available open frame test platform for RFID system. This paper proposes a new design and implementation of an open...

    Provided By Academy Publisher

  • White Papers // Nov 2009

    Data Security Model for Cloud Computing

    With the development of cloud computing, Data security becomes more and more important in cloud computing. This paper analyses the basic problem of cloud computing data security. With the analysis of HDFS architecture, the authors' get the data security requirement of cloud computing and set up a mathematical data model...

    Provided By Academy Publisher

  • White Papers // Jun 2009

    BER and Outage Probability of DPSK Subcarrier Intensity Modulated Free Space Optics in Fully Developed Speckle

    In this paper Differential Phase Shift Keying (DPSK) subcarrier intensity modulated (SIM) Free Space Optical (FSO) link is considered in negative exponential atmospheric turbulence environment. To mitigate the scintillation effect, the selection combining spatial diversity scheme (SelC) is employed at the receiver. Bit Error Rate (BER) and outage probability (Pout)...

    Provided By Academy Publisher

  • White Papers // Aug 2009

    Point-to-Point DWDM System Design and Simulation

    As for the problems of complexity and long cycle in the DWDM design, part of problems needed to be considered in DWDM system design were analyzed. An optimized point-to-point DWDM transmission system was designed. Optical fiber communication system with 40Gbit / s and 32 channel was designed and simulated by...

    Provided By Academy Publisher

  • Case Studies // Oct 2009

    Always Best Packet Switching: The Mobile VoIP Case Study

    Currently, a mobile device equipped with multiple heterogeneous wireless Network Interface Cards (NICs) cannot take advantage of its capabilities as the conventional mobility management approach allows it to select and use only one of its NICs at a time. In contrast to this approach, this case study proposes the so-called...

    Provided By Academy Publisher

  • White Papers // Dec 2009

    Heterogeneous Information System Integration Based on HUB-SOA Model

    Considering the problems of heterogeneous information system integration, service-oriented component of HUB-SOA model is proposed based on investigating E-HUB integration model and SOA integrated structure. Further, the key technical of the basic working principle, interface model, web service, system component and schema mapping are researched. What's more, WEB service and...

    Provided By Academy Publisher

  • White Papers // Nov 2009

    Implementation of Hardware Stack TCP/IP Using Virtex-2 Pro FPGA

    There is a general consensus that in years to come more and more Internet devices will be embedded and not PC oriented. Just one such prediction is that by 2010, 95% of Internet-connected devices will not be computers. So if they are not computers, what will they be? Embedded Internet...

    Provided By Academy Publisher

  • White Papers // Jul 2009

    Real Estate Decision Support System of Market Comparison Approach Based on GIS

    Market comparison approach is one of the commonest appraise approach. This paper studied real estate decision support system of market comparison approach based on GIS. Firstly, the paper designs the system logic structure in this paper, secondly, the paper establishes the database and model database for appraise, and then, the...

    Provided By Academy Publisher

  • White Papers // Nov 2009

    Network Reconfiguration for Loss Minimization by Optimal Switching Operation in Distribution System

    There are three functional areas of electrical utility namely Generation, Transmission and Distribution. Out of three functional areas of Electrical utility, the distribution sector needs more attentions and difficult to standardize due to its complexity. Aggregated Technical & Commercial (AT&C) Loss i.e. T&D loss in India has been consistently on...

    Provided By Academy Publisher

  • White Papers // Feb 2010

    A Identity Authentication Based on Fingerprint Identification

    Security of communication is guaranteed by the security of cipher code system. But to remember the password is difficult, and to steal the password is easy. The fingerprint is the personal biometric feature. It is different from others'. To pick up the fingerprint is convenient for people. Counterfeiting it is...

    Provided By Academy Publisher

  • White Papers // Aug 2009

    Web Service-Security Specification Based on Usability Criteria and Pattern Approach

    A specification is provided in this paper to assist in the design of usable and secure web-services. In particular, this specification helps design an adequate security information feedback based on User Interface Patterns, the resulting visual feedback is then evaluated against a set of design/evaluation criteria called Human-Computer Interaction for...

    Provided By Academy Publisher

  • White Papers // Aug 2009

    A Policy-Based Autonomic Model Suitable for Quality of Service Management

    The increased complexity resulting from computer networks technologies, devices and application diversity combined with the continuously growing service demands from users, requires a computer network that offers adequate treatment and support to multiservice (Voice, Video, Web Applications) and Quality of Service (QoS) requirements. This management scenario adds complexity to human...

    Provided By Academy Publisher

  • White Papers // Nov 2009

    The Implementation of Speaker Recognition on VoIP Auditing in Gigabit High-Speed Environment

    VoIP(Voice over Internet Protocol) is low-cost, flexible and brings great convenience to people's life, but it also brings security problems such as cyber-crime issues. This paper aims to solve security problem by using speech recognition technology to identify the speaker automatically. The system uses zero-copy module to capture packets in...

    Provided By Academy Publisher

  • White Papers // Dec 2009

    Research on Layout Algorithms for Better Data Visualization

    Based on the theory and technology of data visualization, this paper improves some layout algorithms regarding its own natures and characteristics. It also discusses the problem of how to choose proper layout algorithm for specific data to make the visualization better. Using the improved algorithms, one can simply convert a...

    Provided By Academy Publisher

  • White Papers // Oct 2009

    A Self-Optimized Multipath Routing Protocol for Wireless Sensor Networks

    Wireless sensor networks (WSNs) are becoming a progressively important and a challenging research area. Advancements in WSN enable a wide range of environmental monitoring and object tracking applications. Moreover, multihop routing in WSN is affected by new nodes constantly entering or leaving the network. Therefore, the self-optimized and self-aware mechanism...

    Provided By Academy Publisher

  • White Papers // Nov 2009

    Comparative Analysis of QoS Metrics in Mobile Ad Hoc Network Environment

    A Mobile Ad-Hoc Network (MANET) is a collection of wireless mobile nodes that communicate with each other without any centralized access points, infrastructure, or centralized administration. This paper presents an analysis of various quality of service metrics (QoS) of mobile ad hoc network nodes like Throughput, Delay, Packet Delivery Ratio...

    Provided By Academy Publisher

  • White Papers // Aug 2009

    An Entropy Constrained Stability QoS Multicast Routing Algorithm in MANET

    In mobile ad hoc networks (MANETs), the provision of Quality of service (QoS) guarantees is much more challenging than in wireline networks, mainly due to node mobility, multihop communications, contention for channel access, and a lack of central coordination. This paper introduces an Entropy constrained stability QoS Multicast Routing algorithm...

    Provided By Academy Publisher

  • White Papers // Nov 2009

    Exploiting XML Dom for Restricted Access of Information

    Time Bound Access (TBA) has been a major challenge for online information distribution services. A secure and constrained information transmission over the public network is the key aspect of such services wherein a genuine user who is privileged should not be denied of service under any circumstances. As it is...

    Provided By Academy Publisher

  • White Papers // Apr 2010

    A Middleware-Based Approach for Mobile Service Delivery

    Service applications in mobile environment with large potential users become more and more popular. However, there are some limitations and obstacles for service delivery in mobile environment because of the particularity of mobile network and limiting ability of mobile terminals. In order to improve the efficiency and performance of service...

    Provided By Academy Publisher

  • White Papers // Sep 2009

    CARISMA - A Service-Oriented, Real-Time Organic Middleware Architecture

    To cope with the ever increasing complexity of today's computing systems, the Concepts of Autonomic and Organic Computing (AC/OC) have been devised. Organic or autonomic systems are characterized by so-called self-X properties such as self-configuration and self-optimization. This approach is particularly interesting in the domain of distributed, embedded, real-time systems....

    Provided By Academy Publisher

  • White Papers // Nov 2009

    Improving Pairing Mechanism in Bluetooth Security

    Bluetooth has been developed to provide mobile ad hoc connectivity between a wide range of portable and fixed devices. Bluetooth is a Wireless Personal Area Network (WPAN) Standard that is moderately secure but still has weaknesses in its security architecture. One such weakness has been identified in its pairing mechanism,...

    Provided By Academy Publisher

  • White Papers // Apr 2010

    Power Aware Job Scheduling With Quality of Service Guarantees: A Preliminary Study

    In large scale server systems, Quality of Service (QoS) performance cannot be guaranteed if only the objective is to minimize the total power consumptions separately. In this paper a power aware feedback control based power aware job scheduling algorithm (PFM) is proposed to minimize power consumption in computing system and...

    Provided By Academy Publisher

  • White Papers // Nov 2009

    Learning to Match XML Schemas - A Decision Tree based Approach

    Schema matching, finding semantic correspondences between elements of two schemas, is an essential activity in many application domains such as data mining, data warehousing, web data integration, and XML message mapping. In this paper, a decision tree based approach is presented to match the similarity between two XML schemas. Experimental...

    Provided By Academy Publisher

  • White Papers // Dec 2009

    Advanced Dynamic Source Routing With QoS Guarantee

    With a great deal of different applications increasing, it needs to provide effect communication for mobile Ad Hoc network. In this paper, authors present an Advanced Dynamic Source Routing (ADSR) algorithm for such network. ADSR can select routes according to link state and dynamic delay detection. In the route discovery...

    Provided By Academy Publisher

  • White Papers // Jun 2009

    Research on On-Card Bytecode Verifier for Java Cards

    The bytecode verification is a key point of the security chain of the Java Platform. This feature is optional in many embedded devices since the memory requirements of the verification process and the process capability of hardware are too high. This paper proposes a verifier that utilizes the logical flow...

    Provided By Academy Publisher

  • White Papers // Oct 2009

    A Personalized Stock Investors Alert System

    Stock investors all agree that one of the hardest things they have to do is keep up with the rapid changes in the markets. The Internet carries a huge amount of up-to-the minute information for investors such as current stock prices, exchange rates, sales volumes, latest deals, trading averages, organizations'...

    Provided By Academy Publisher

  • White Papers // Jul 2010

    Research on Optimistic Fair Protocol for Cascading P2P Exchange

    In simple electronic commerce transaction, some parties serve as vendors, and the others act as buyers. Usually vendors receive the payment instrument, and subsequently cash it from the bank, instead of using it for buying goods from other vendors. However, in P2P payment environment, some peers serve as both vendors...

    Provided By Academy Publisher

  • White Papers // Aug 2009

    A New Method to Detect Abnormal IP Address on DHCP

    Dynamic Host Configuration Protocol (DHCP) provides a means of allocating and managing IP addresses dynamically over a network. An important characteristic of the DHCP server is that different hosts or network cards are not allowed to simultaneously use the same IP address in the DHCP mechanism. However, anyone can guest...

    Provided By Academy Publisher

  • White Papers // Oct 2009

    Unexpected Public Crisis Information Communication Model Simulation in Network Environment

    In order to research on the communication characteristic of unexpected public crisis in network environment, this paper, chooses netizens as the research object, uses complex adaptive system theory and multi-agent theory to establish a crisis communication process simulation model. Through observing the evolutionary process operation in the Repast platform, it...

    Provided By Academy Publisher

  • White Papers // Oct 2009

    The Research of Localization Protocol for Wireless Sensor Networks

    In this paper, the authors present a localization protocol for wireless sensor networks. The protocol provides three types of localization algorithms, namely, the localization algorithm during the phase of initialization, the localization algorithm for new wireless sensor node, and the localization algorithm for moved beacon node. In the first localization...

    Provided By Academy Publisher

  • White Papers // Oct 2009

    Design Method of AES Encryption Chip for Mobile and Portable Applications

    A kind of design method of encryption chip for mobile and portable applications is proposed in this paper. The encryption chip implements the AES (Advanced Encryption Standard) algorithm, which is the most advanced symmetric cipher algorithm at present. The external pins and internal circuit structure of the AES encryption chip...

    Provided By Academy Publisher

  • White Papers // Oct 2009

    A Routing Protocol Based on Clusters for Large-Scale Wireless Sensor Networks

    Aiming at the insufficiency of Low Energy Adaptive Clustering Hierarchy (LEACH) routing protocol that cluster-head nodes distribution is uneven in the space and cluster-head nodes consume excessive energy in the process of long-distance data transmission, this paper proposes a routing protocol improvement based on clusters for large-scale wireless sensor networks,...

    Provided By Academy Publisher

  • White Papers // Oct 2009

    The Design of Parallel Queue Processing Strategy in Reflective NetGAP

    The Reflective GAP is hardware-based and its purpose is to rapidly mirror buffers between the non-trusted memory and the trusted memory. Its activities are achieved using store & forward of memory blocks. Its software system comprises with seven main basic modules. Between these modules the authors adopt a concept of...

    Provided By Academy Publisher

  • White Papers // Oct 2009

    Data Mining Technique and Application Based on Association Rules

    Data mining algorithm based on association rules have become hot point of research in the field of artificial intelligence and database. Aiming at the problems that current data mining algorithms need too long execution time in case of large scale database, improved association rules algorithm based on data structure is...

    Provided By Academy Publisher

  • White Papers // Oct 2009

    Personalized Privacy-Preserving Granular Computing Model

    As a new computing model, Granular computing provides a new efficient way for solving complicated problems, massive data mining, and fuzzy information processing. Privacy is becoming an increasingly important issue in many data mining applications. In this paper, the authors combined the existing model of granular computing with personalized privacy-preserving...

    Provided By Academy Publisher