Academy Publisher

Displaying 1-40 of 2434 results

  • White Papers // Jul 2014

    Evaluation of DGEMM Implementation on Intel Xeon Phi Coprocessor

    In this paper the authors will present a detailed study of implementing Double-precision GEneral Matrix Multiply (DGEMM) utilizing the Intel Xeon Phi Coprocessor. They discuss a DGEMM algorithm implementation running \"Natively\" on the coprocessor, minimizing communication with the host CPU. They will run DGEMM across a range of matrix sizes...

    Provided By Academy Publisher

  • White Papers // Jul 2014

    A New Multi-Class WSVM Classification to Imbalanced Human Activity Dataset

    In this paper the authors concerned with the class imbalance problem in activity recognition field which has been known to hinder the learning performance of classification algorithms. To deal this problem, the authors propose a new version of the multi-class Weighted Support Vector Machines (WSVM) method to perform automatic recognition...

    Provided By Academy Publisher

  • White Papers // Jul 2014

    Image Segmentation with Fuzzy Clustering Based on Generalized Entropy

    Aimed at fuzzy clustering based on the generalized entropy, an image segmentation algorithm by joining space information of image is presented in this paper. For solving the optimization problem with generalized entropy's fuzzy clustering, both hopfield neural network and multi-synapse neural network are used in order to obtain cluster centers...

    Provided By Academy Publisher

  • White Papers // Jun 2014

    A Novel Resource Pricing Mechanism Based on Multi-Player Gaming Model in Cloud Environments

    Recently, cloud computing has become a promising network platform for non-trivial applications. The key feature of cloud computing is on-demand resource provision by utility paradigm. Therefore, resource pricing mechanism plays an important role for realizing on-demand resource provision. Unfortunately, existing resource pricing mechanism will result in many negative effects on...

    Provided By Academy Publisher

  • White Papers // Jun 2014

    Research on Cloud-Based Mass Log Data Management Mechanism

    In this paper, the authors study the file management mechanism of large-scale cloud-based log data. With the rise of big data, there are more and more the hadoop-based applications. Log analysis is an important part of network security management, but the existing network log analysis system can't deal with huge...

    Provided By Academy Publisher

  • White Papers // Jun 2014

    A Dynamic Load-balancing Scheme for XPath Queries Parallelization in Shared Memory Multi-core Systems

    Due to the rapid popularity of multi-core processors systems, the parallelization of XPath queries in shared memory multi-core systems has been studied gradually. Existing paper developed some parallelization methods based on cost estimation and static mapping, which could be seen as a logical optimization of parallel query plan. However, static...

    Provided By Academy Publisher

  • White Papers // May 2014

    GPU Implementation of Parallel Support Vector Machine Algorithm with Applications to Intruder Detection

    The network anomaly detection technology based on Support Vector Machine (SVM) can efficiently detect unknown attacks or variants of known attacks; however, it cannot be used for detection of large-scale intrusion scenarios due to the demand of computational time. The Graphics Processing Unit (GPU) has the characteristics of multi-threads and...

    Provided By Academy Publisher

  • White Papers // May 2014

    Optimizing Data Distribution for Loops on Embedded Multicore with Scratch-Pad Memory

    Software-controlled Scratch-Pad Memory (SPM) is a desirable candidate for on-chip memory units in embedded multi-core systems due to its advantages of small die area and low power consumption. In particular, data placement on SPMs can be explicitly controlled by software. Therefore, the technique of data distribution on SPMs for multi-core...

    Provided By Academy Publisher

  • White Papers // May 2014

    Proposed Design and Implementation for RESTful Web Server

    In this paper, the authors propose a framework to design and implement novel RESTful web server architecture. The proposed RESTful web server architecture is a lightweight server that will be less taxing on system resources and will therefore handle a greater volume of requests. Furthermore, in contrast to the usual...

    Provided By Academy Publisher

  • White Papers // May 2014

    Implementation of Multi-channel FIFO in One BlockRAM with Parallel Access to One Port

    Because of flexibility of application and high cost performance, the low-and-middle-end FPGA has obtained an extensive market. As a fundamental memory structure, the FIFO memory is widely used in FPGA based paper in various manners. But limited by the resources in chip and imperfection of development tools, the problem that...

    Provided By Academy Publisher

  • White Papers // May 2014

    Mining Frequent Closed Patterns using Sample-growth in Resource Effectiveness Data

    As the occurrence of failure of electronic resources is sudden, real-time record analysis on the effectiveness of all resources in the system can discover abnormal resources earlier and start using backup resources or restructure resources in time, thus managing abnormal situations and finally realizing health management of the system. This...

    Provided By Academy Publisher

  • White Papers // May 2014

    An Architecture Independent Packing Method for LUT-based Commercial FPGA

    In this paper the authors propose an efficient architecture independent packing method for commercial FPGA. All specific logics of commercial FPGA such as carry chain arithmetic, x-LUT, are pre-designed into reference circuits according to its architecture. Due to complex architecture of contemporary FPGA, to enumerate all reference circuits in a...

    Provided By Academy Publisher

  • White Papers // Apr 2014

    An Effective Clustering Algorithm for Transaction Databases Based on K-Mean

    Clustering is an important technique in machine learning, which has been successfully applied in many applications such as text and webpage classifications, but less in transaction database classification. A large organization usually has many branches and accumulates a huge amount of data in their branch databases called multi-databases. At present,...

    Provided By Academy Publisher

  • White Papers // Apr 2014

    Model-based Bayesian Reinforcement Learning in Factored Markov Decision Process

    Learning the enormous number of parameters is a challenging problem in model-based Bayesian reinforcement learning. In order to solve the problem, the authors propose a model-based Factored Bayesian Reinforcement Learning (F-BRL) approach. F-BRL exploits a factored representation to describe states to reduce the number of parameters. Representing the conditional independence...

    Provided By Academy Publisher

  • White Papers // Apr 2014

    The Workflow Task Scheduling Algorithm Based on the GA Model in the Cloud Computing Environment

    Taking advantage of the resource sharing, the cloud computing service mode save the investment cost efficiently. In a cloud computing environment, the workflow task scheduling algorithm is based on the task processing time and the execution cost factors and start point of the user demand for quality of service, in...

    Provided By Academy Publisher

  • White Papers // Apr 2014

    Resource Scheduling Optimization Algorithm of Energy Consumption for Cloud Computing Based on Task Tolerance

    In order to solve that the energy was seriously wasted in cloud computing, an algorithm of Energy Consumption optimization for Cloud computing based on the task Tolerance (ECCT) was proposed. The concept of the task tolerance was put forward in the algorithm. The resource utilization of cloud computing node was...

    Provided By Academy Publisher

  • White Papers // Apr 2014

    The Large-scale Dynamic Data Rapid Reduction Algorithm Based on Map-Reduce

    With the advent of the era of \"Big data\", the application of the large-scale data is becoming popular. Efficiently using and analyzing the data has become an interesting research topic. Traditional knowledge reduction algorithms read small data samples once into a computer main memory for reduction, but it is not...

    Provided By Academy Publisher

  • White Papers // Apr 2014

    Provable Dynamic Data Possession by Datalog Rules

    In recent years, the concept of data outsourcing has become quite popular. With the appearance of cloud computing, there is a new paradigm: cloud storage. Cloud storage means that the data owner moves its data to a cloud storage server that is supposed to faithfully store the data and make...

    Provided By Academy Publisher

  • White Papers // Apr 2014

    QoS Constraint Based Workflow Scheduling for Cloud Computing Services

    QoS constraint based workflow scheduling described by Directed Acyclic Graph (DAG) has been proved to be a NP-hard problem in cloud computing services, especially for cost minimization under deadline constraint. Due to Deadline Bottom Level (DBL) hasn't considered the concurrence during the real executing process that cause much more shatter...

    Provided By Academy Publisher

  • White Papers // Apr 2014

    An Greedy-Based Job Scheduling Algorithm in Cloud Computing

    Now-a-days/cloud computing has become a popular platform for scientific applications. Cloud computing intends to share a large number of resources such as equipments for storage and computation, and information and knowledge for scientific researches. Job scheduling algorithm is one of the most challenging theoretical issues in the cloud computing area....

    Provided By Academy Publisher

  • White Papers // Apr 2014

    Mitigating Cross-VM Side Channel Attack on Multiple Tenants Cloud Platform

    Virtualization is a key enabling technology in cloud computing. Multiple tenants can share computing resource of cloud provider on demand. While sharing can reduce the expenses of computing, it brings security vulnerability as well since the isolation between different VMs could be violated through side-channel attacks. Recent researches point out...

    Provided By Academy Publisher

  • White Papers // Apr 2014

    A Formal Transformation Approach for Embedded Software Modeling

    Formal specification can enhance the reliability of the embedded system and verify the system properties at the design stage. This paper presents a formal transformation approach for MARTE (Modeling and Analysis of Real Time and Embedded systems) model based on MDA (Model Driven Architecture), and defines the transformation rules of...

    Provided By Academy Publisher

  • White Papers // Mar 2014

    On Data and Virtualization Security Risks and Solutions of Cloud Computing

    Data security and virtualization security issues are two key bottlenecks restricting the application of cloud computing promoting and applications, especially for the cloud-based media computing system. In this paper, states of the art of the techniques on cloud computing data security issues, such as data encryption, access control, integrity authentication...

    Provided By Academy Publisher

  • White Papers // Mar 2014

    A Parameterizable NoC Router for FPGAs

    The Network-on-Chip (NoC) approach for designing (System-on-Chip) SoCs is currently used for overcoming the scalability and efficiency problems of traditional on-chip interconnection schemes, such as shared buses and point-to-point links. NoC design draws on concepts from computer networks to interconnect Intellectual Property (IP) cores in a structured and scalable way,...

    Provided By Academy Publisher

  • White Papers // Mar 2014

    Towards Realization of Domain-Specific Scientific Data Cloud for Material Data Sharing

    Scientific data sharing has been an important area of research for several years. However, due to the sharp increase in scientific data, the existing scientific data sharing systems are becoming complicated and cannot meet the demands of current scientific domain communication. In this paper, the realization of material scientific data...

    Provided By Academy Publisher

  • White Papers // Mar 2014

    An Efficient Dimensionality Reduction Approach for Small-sample Size and High-dimensional Data Modeling

    As for massive multidimensional data are being generated in a wide range of emerging applications, this paper introduces two new methods of dimension reduction to conduct small-sample size and high-dimensional data processing and modeling. Through combining the Support Vector Machine (SVM) and Recursive Feature Elimination (RFE), SVM-RFE algorithm is proposed...

    Provided By Academy Publisher

  • White Papers // Mar 2014

    Research of the FP-Growth Algorithm Based on Cloud Environments

    The emergence of cloud computing solves the problems that traditional data mining algorithms encounter when dealing with large data. This paper studies the FP-growth algorithm and proposes a parallel linked list-based FPG algorithm based on MapReduce programming model, named as the PLFPG algorithm. And then it describes the main idea...

    Provided By Academy Publisher

  • White Papers // Mar 2014

    Optimal Virtual Machine Resources Scheduling Based on Improved Particle Swarm Optimization in Cloud Computing

    With the development of high performance computing, there are many computing paradigms including Peer-To-Peer (P2P) computing, cluster computing, services computing, grid computing and cloud computing. This paper presents virtual machines resources scheduling algorithm taking into computing capacity of processing elements and consideration their computational complexity. The authors apply the improved...

    Provided By Academy Publisher

  • White Papers // Mar 2014

    CUDAP: A Novel Clustering Algorithm for Uncertain Data Based on Approximate Backbone

    In recent years, data analysis and knowledge discovery in uncertain data become more and more important in many applications, such as, sensor network, biomedical measurement, financial market analysis and weather predictions, etc. Clustering for uncertain data is an interesting research topic in data mining. Researchers prefer to define uncertain data...

    Provided By Academy Publisher

  • White Papers // Mar 2014

    QoS-aware SaaS Services Selection with Interval Numbers for Group User

    The integration of SaaS service for group user in cloud is challenging, notably because the service's QoS and member's personalization QoS preference in group are uncertain. This is a timely and importance problem with the advent of the SaaS model of service delivery. Therefore, before the SaaS service been utilized,...

    Provided By Academy Publisher

  • White Papers // Mar 2014

    Research and Application of Data Integration in Aircraft Designing Based on SDO

    One of the fundamental problems in complicated system environment is the mechanism of data interaction and sharing between heterogeneous data sources. The known solutions, using middlewares to unify data formats, are not reliable due to the tightly coupled architecture, poor portability and reusability, large update latency, etc. To solve this...

    Provided By Academy Publisher

  • White Papers // Mar 2014

    An Empirical Study for Software Fault-Proneness Prediction with Ensemble Learning Models on Imbalanced Data Sets

    Software faults could cause serious system errors and failures, leading to huge economic losses. But currently none of inspection and verification technique is able to find and eliminate all software faults. Software testing is an important way to inspect these faults and raise software reliability, but obviously it is a...

    Provided By Academy Publisher

  • White Papers // Mar 2014

    A Query Driven Method of Mapping from Global Ontology to Local Ontology in Ontology-based Data Integration

    At present, the mediator/wrapper integration methods are widely used in ontology based data integration because they solve the data update problems of data warehouse method. The key of this method is building of mapping from the global ontology in mediator to the local ontology in wrapper. This paper analyzes the...

    Provided By Academy Publisher

  • White Papers // Mar 2014

    An Improved k-Exclusion Algorithm

    K-exclusion is a generalization of mutual exclusion that allows up to k processes to be in the critical section concurrently. Starvation freedom and First-In-First-Enabled (FIFE) are two desirable progress and fairness properties of k-exclusion algorithms. The authors present the first known bounded-space k-exclusion algorithm that uses only atomic reads and...

    Provided By Academy Publisher

  • White Papers // Mar 2014

    ChordMR: A P2P-based Job Management Scheme in Cloud

    MapReduce is a programming model and an associated implementation for processing parallel data, which is widely used in cloud computing environments. However, the traditional MapReduce system is based on a centralized master-slave structure. While, along with the increase of the number of MapReduce jobs submitted and system scale, the master...

    Provided By Academy Publisher

  • White Papers // Mar 2014

    True Value Estimation of Centrifugal Fan Vibration Data Based on Fusion Method

    Poor information means incomplete and insufficient information, such as unknown probability distributions and trends. In this case, many statistical methods may become ineffective. So a fusion method based on the information poor theory is proposed. The fusion method contains five methods, three concepts, and one rule. The five methods include...

    Provided By Academy Publisher

  • White Papers // Mar 2014

    A New Model of Data Protection on Cloud Storage

    Cloud computing is Internet-based computing, whereby shared resources, software, and information are provided to computers and other devices on demand, like the electricity grid. This paper focuses on studying cloud storage data protection model and implementing encrypted storage of user data in double-key form. User data are encrypted with symmetric...

    Provided By Academy Publisher

  • White Papers // Mar 2014

    A SOM Based Incremental Clustering Algorithm

    Due to fast development of network technique, internet users have to face to massive textual data every day. Because of unsupervised merit of clustering, clustering is a good solution for users to analyze and organize texts into categories. However, most of recent clustering algorithms conduct in static situation. That indicates,...

    Provided By Academy Publisher

  • White Papers // Feb 2014

    The Advantages of Using CHECK Constraints in The Academic Database Tables

    Database plays important role on both web-based and desktop-based information system. Now-a-days web-based information systems dominate information system application. Relational database systems such as Oracle, MySQL, MS SQL Server or PostgreSQL are familiarly used as data base management system. In Indonesia almost all academic information systems at higher education institutions...

    Provided By Academy Publisher

  • White Papers // Feb 2014

    A New Data Mining Approach Combined with Extension Set and Rough Set

    Extension data mining is a product combining extenics with data mining. Establishing the extenics provides a new idea and method for data mining and opens up a new research direction for data mining. Using the extenics method of combining the data mining technology not only can access to static knowledge,...

    Provided By Academy Publisher

  • White Papers // Jun 2012

    A SIP-based Real-time Traffic Mobility Support Scheme in Named Data Networking

    With the development of hardware and software technologies, mobile computing has become popular and pervasive. As a result, user-created mobile contents overwhelmingly increase, and cont sharing becomes the most popular application in communication networks. In order to accommodate this technical trend, a new networking architecture - Named Data Networking (NDN)...

    Provided By Academy Publisher

  • White Papers // Jun 2012

    Using Physical-level Context Awareness to Improve Service Ranking in Wireless Sensor Network

    With the fast-pacing deployment of Wireless Sensor Network (WSN) services, service ranking becomes more and more important. However, current service ranking methods mostly ignore the physical-level quality variation, making service ranking inaccurate. To address this problem, in this paper the authors propose a novel QoS-based ranking approach for WSN services,...

    Provided By Academy Publisher

  • White Papers // Jun 2012

    Application of Rank Correlation, Clustering and Classification in Information Security

    In this paper the authors devoted to experimental investigation of a novel application of a clustering technique introduced by the authors recently in order to use robust and stable consensus functions in information security, where it is often necessary to process large data sets and monitor outcomes in real time,...

    Provided By Academy Publisher

  • White Papers // Jun 2012

    A Comparison of the Classification of Disparate Malware Collected in Different Time Periods

    It has been argued that an anti-virus strategy based on malware collected at a certain date, will not work at a later date because malware evolves rapidly and an antivirus engine is then faced with a completely new type of executable not as amenable to detection as the first was....

    Provided By Academy Publisher

  • White Papers // Jun 2012

    Pivot Routing Improves Wireless Sensor Networks Performance

    Now-a-days, Wireless Sensor Networks (WSNs) are used in several applications such as environmental monitoring. When network size and data rate increase, congestion becomes as an important issue, especially when an emergency situation generates alarm messages in a specific area of the network. In this paper, the authors describe the Pivot...

    Provided By Academy Publisher

  • White Papers // Jun 2012

    On the Validity of Fluid-dynamic Models for Data Networks

    Simulators have been acknowledged as one of the most flexible tool in studying and evaluating network performance. Various approaches have been followed in data networks modeling. In this paper, the authors explore the range of applicability of a fluid-dynamic model, proposed in, able to describe the load evolution of a...

    Provided By Academy Publisher

  • White Papers // May 2012

    Adaptive Data Rates for Flexible Transceivers in Optical Networks

    Efforts towards commercializing higher-speed optical transmission have demonstrated the need for advanced modulation formats, several of which require similar transceiver hardware architecture. Adaptive transceivers can be built to have a number of possible operational configurations selected by software. Such software-defined transceiver configurations can create specific modulation formats to support sets...

    Provided By Academy Publisher

  • White Papers // May 2012

    Energy Efficient Optical Networks with Minimized Non-Renewable Power Consumption

    Recent studies have shown that the Information and Communication Technology (ICT) industry is responsible for about 2% of the global emission of CO2 and this percentage is expected to increase as the internet expands in bandwidth and reach. In this paper the authors propose a hybrid-power IP over WDM network...

    Provided By Academy Publisher

  • White Papers // May 2012

    Design of Wireless Sensor Network-Based Greenhouse Environment Monitoring and Automatic Control System

    In view of the characteristics of greenhouse environment monitoring system, a system scheme based on Wireless Sensor Network (WSN) is presented, which adopts Atmega128L chip and CC2530 that is a low power RF chip from TI to design the sink node and sensor nodes in the WSN. The monitoring and...

    Provided By Academy Publisher

  • White Papers // Apr 2012

    A Clustering-Based K-Coverage Algorithm for Mobile Wireless Sensor Networks

    To obtain more accurate and comprehensive information from target monitoring area in mobile Wireless Sensor Networks (mWSN), multiple area coverage is often considered. However, it may cause coverage holes and inefficiencies in a mWSN due to sensor nodes' moving, energy loss, physical damage, errors, failures or other factors. To address...

    Provided By Academy Publisher

  • White Papers // Apr 2012

    A Graphical User Interface in WLAN Monitoring and Management System

    In this paper the authors aim at providing a graphical user interface for WLAN monitoring and management system \"WLAN Inspector\", which gives network operators the software and performance management tools necessary to monitor and manage network availability, achieve real-time monitoring (7

    Provided By Academy Publisher

  • White Papers // Apr 2012

    Study on Secret Key Management Project of WSN Based on ECC

    In order to solve the symmetrical encryption method of key management project for Wireless Sensor Network (WSN) existing the deficiencies problem, the problem as follows: the WSN is not secure enough; there is no authentication mechanism among nodes. According to this circumstance, firstly Elliptic Curve Cryptosystem (ECC) is used in...

    Provided By Academy Publisher

  • White Papers // Nov 2013

    Reviewing Soft Computing Approaches for Edge Detection: Hybrid and Non-hybrid

    Soft computing is a multifaceted technique comprising of fuzzy logic, neural network, genetic algorithms and other evolutionary computation. These paradigms have found wide variety of applications in the field of image processing. One of the most vital applications of image segmentation is edge detection where edge refers to the boundary...

    Provided By Academy Publisher

  • White Papers // Aug 2013

    DBSoft: A Toolkit for Testing Database Transactions

    DataBases (DBs) are used in all enterprise transactions, which require attention not only to the consistency of DB, but also to existence, accuracy and correctness of data required by the transactions. While the Atomicity, Consistency, Isolation, and Durability (ACID) properties of a transaction ensure that DB is consistent after the...

    Provided By Academy Publisher

  • White Papers // Aug 2013

    Priority Recommendation System in an Affiliate Network

    Affiliate networks are the main source of communication between publishers and advertisers where publishers normally subscribe as a service provider and advertisers as an employer. These networks are helping both the publishers and advertisers in terms of providing them with a platform where they can build an automated affiliate connection...

    Provided By Academy Publisher

  • White Papers // Aug 2013

    Adaptive Search and Selection of Domain Ontologies for Reuse on the Semantic Web

    Ontology plays an important role in semantic web applications. However, building ontology remains challenging due to the time, cost an effort required. Several studies have proposed the reuse of existing ontologies when building new ones. However, some challenges remain: locating relevant domain ontologies for reuse, determining appropriate concepts for searching...

    Provided By Academy Publisher

  • White Papers // Aug 2013

    Web Usage Mining: An Analysis

    Web usage mining is research area in web mining. Web mining is an activity that focuses to discover new, relevant and reliable information and knowledge by examining the structure, content and usage of web. The major focus is on learning about web users and their interaction with websites. Web log...

    Provided By Academy Publisher

  • White Papers // Aug 2013

    Prevention of Losing User Account by Enhancing Security Module: A Facebook Case

    The blooming development of internet technologies, lead to the growth of Online Social Networks (OSNs) day-by-day. There are many Online Social Networks (OSNs) came on internet but still very few could get the attraction of the users forever. The most attracted and world level leading Online Social Networks (OSNs) is...

    Provided By Academy Publisher

  • White Papers // Aug 2013

    Proposing a New Structure for Web Mining and Personalizing Web Pages

    During users visiting a web server access, data is stored. This information can be used broadly. Using this information the authors can obtain users' preferences and use them to personalize web pages. Web mining is a new discussion that has been proposed to manage the web pages. In fact web...

    Provided By Academy Publisher

  • White Papers // May 2013

    Intrinsic Dimensionality Estimation for High-Dimensional Data Sets: New Approaches for the Computation of Correlation Dimension

    The analysis of high - dimensional data is usually challenging since many standard modeling approaches tend to break down due to the so - called \"Curse of dimensionality\". Dimension reduction techniques, which reduce the data set (explicitly or implicitly) to a smaller number of variables, make the data analysis more...

    Provided By Academy Publisher

  • White Papers // Dec 2012

    Design and Analysis for Reliability of Wireless Sensor Network

    Reliability is an important performance indicator of wireless sensor network, to some application fields, which have high demands in terms of reliability, it is particularly important to ensure reliability of network. At present, the reliability research findings of wireless sensor network are much more at home and abroad, but they...

    Provided By Academy Publisher

  • White Papers // Dec 2012

    Analysis of Energy Consumption of Virtual MIMO Wireless Sensor Network

    In order to solve the problem that the existing Virtual Multiple-Input Multiple-Output (Virtual MIMO) routing algorithm isn't suitable to isomorphism wireless sensor network, Virtual MIMO Clustering (VMC) algorithm which is applicable to small and medium scale isomorphism WSN is proposed. By combining the energy-efficient virtual MIMO communication technology with the...

    Provided By Academy Publisher

  • White Papers // Dec 2012

    False Data Injection-Resilient Security Routing Protocol for Wireless Sensor Networks

    False data injection attack and PDoS (Path-based Denial of Service) attack are serious threats in wireless sensor networks. The existing schemes can effectively resist false data injection and PDoS attacks, but most of them cannot find out the compromised node when the base station or sink node detect the report...

    Provided By Academy Publisher

  • White Papers // Dec 2012

    A Novel Swarm Intelligence Algorithm and Its Application in Solving Wireless Sensor Networks Coverage Problems

    Wireless Sensor Networks (WSNs) have attracted a great deal of research due to their wide-range of potential applications. Sensor deployment and coverage problems are their important issues. This paper briefly introduces the principle of Swarm Intelligence (SI). A novel SI algorithm based on information sharing of Particle Swarm Optimization (PSO)...

    Provided By Academy Publisher

  • White Papers // Dec 2013

    Available Bandwidth Estimation Strategy Based on the Network Allocation Vector

    Available bandwidth is of great importance to network quality of service assurance, network load balancing, streaming media rate control, routing, and congestion control, etc. In this paper, the available bandwidth estimation strategy based on the network allocation vector for wireless sensor networks is proposed. According to the size of the...

    Provided By Academy Publisher

  • White Papers // Nov 2012

    Multicast Gain for IPTV Transmission in WiMAX Multi-hop Relay Networks

    Due to characteristics such as: multicast support, wide coverage range, high bandwidth and mobility support, WiMAX could be a leading solution to deliver bandwidth-hungry IPTV services to mobile users. Mobile Multi-hop Relay (MMR) was proposed as an amendment of the current mobile WiMAX standard to provide relaying capabilities. Relays are...

    Provided By Academy Publisher

  • White Papers // Nov 2012

    Research on Emergence Mechanism of College Instant Messaging Community Network

    In order to comprehend the mechanism and topology of college IM network, the authors extract the attribute value of the real network in this paper, and improve the emergence mechanism of the classical model. Thus the research obtains the emergence mechanism of the instant messaging community network and then generates...

    Provided By Academy Publisher

  • White Papers // Nov 2012

    Provably Secure Certificate-Based Signature Scheme for Ad Hoc Networks

    Certificate-based cryptography proposed by researcher in Eurocrypt 2003 combines the advantages of traditional Public Key Infrastructure (PKI) and identity-based cryptography, and removes the certificate management problem and the private key escrow security concern. Based on computational diffie-hellman assumption, a certificate-based signature scheme is constructed to insure the security of communication...

    Provided By Academy Publisher

  • White Papers // Nov 2012

    Unequal Density-Based Node Deployment and Clustering Routing Protocol in Wireless Sensor Networks

    In order to solve the problem of the hot spots in clustering routing protocols, this paper proposes an Unequal Density-based Node Deployment and Clustering routing protocol (UDNDC). It has following characteristics. In clusters, member nodes transmit data directly to cluster head, and cluster head can fuse all signals into a...

    Provided By Academy Publisher

  • White Papers // Oct 2012

    Rule-Based Network Service Provisioning

    Due to the unprecedented development of networks, manual network service provisioning is becoming increasingly risky, error-prone, expensive, and time-consuming. To solve this problem, rule-based methods can provide adequate leverage for automating various network management tasks. This paper presents a rule-based solution for automated network service provisioning. The proposed approach captures...

    Provided By Academy Publisher

  • White Papers // Oct 2012

    Novel Covert Data Channel in Wireless Sensor Networks Using Compressive Sensing

    Wireless Sensor Networks (WSN) is a novel data centered self-organizing network that can be used in acquiring and processing information. With the limited energy of sensor nodes and the increasing requirement of secure data transmission, how to save nodes energy as well as realize a transmission of sensitive information in...

    Provided By Academy Publisher

  • White Papers // Oct 2012

    A Novel Polymorphic Ant Colony Based Clustering Mechanism for Wireless Sensor Networks

    In wireless sensor networks, sensor nodes are extremely power constrained, so energy efficient clustering mechanism is mainly considered in the network topology management. A new clustering mechanism based on the Polymorphic Ant Colony (PAC) is designed for dynamically controlling the networks clustering structure. According to different functions, the nodes of...

    Provided By Academy Publisher

  • White Papers // Oct 2012

    An Algorithm for Detecting Group in Mobile Social Network

    Mobile phone is one of the most prevalent communication tools today with the popularity of mobile devices and wireless technologies. Mobile social network systems are increasingly available. A mobile social network plays an essential role as the spread of information and relationship. This paper propose a new algorithm called group...

    Provided By Academy Publisher

  • White Papers // Oct 2012

    Provably Secure Self-certified Multi-proxy Signature with Message Recovery

    Signature schemes with message recovery based on self-certified public keys can reduce the amount of communications and computations, since the signature verification, the public key authentication and the message recovery are simultaneously carried out in a single logical step. Integrating self-certified public-key systems and the message recovery signature schemes, in...

    Provided By Academy Publisher

  • White Papers // Feb 2013

    An Efficient Proof of Retrievability Scheme for Fully Homomorphic Encrypted Data

    Proof Of Retrievability (POR) is an interactive knowledge proof technique for a storage server to prove the integrity and ownership of clients' data without downloading them. In this paper the authors consider efficiency of the POR scheme, when the data stored in cloud is encrypted under fully homomorphic encryption schemes....

    Provided By Academy Publisher

  • White Papers // Feb 2013

    Managing and Deploying Pervasive Wireless Internet Access Through Attractive Connection Sharing and Reselling Mechanisms

    Now-a-days internet has become a critical part of the people daily lives and an affordable internet access is a leading engine of economic, cultural, social and political growth. In the authors' opinion, cooperation among customers could give a boost to Internet availability and affordability; therefore, they propose an attractive and...

    Provided By Academy Publisher

  • White Papers // Feb 2013

    Public Data Integrity Verification for Secure Cloud Storage

    Cloud storage can provide a flexible on-demand data storage service to users anywhere and anytime. However, users' data is owned by cloud service providers physically, and the physical boundary between two users' data is fuzzy. In this environment not controlled by users, a method to ensure users' data integrity must...

    Provided By Academy Publisher

  • White Papers // Feb 2013

    A Smartphone Malware Detection Framework Based on Artificial Immunology

    With the sharp increase in the number of smartphones, the android platform pose to becoming a market leader that makes the need for malware analysis on this platform an urgent issue. The current artificial immune-based malware detection systems research focus on traditional computers that uses information from OS or network,...

    Provided By Academy Publisher

  • White Papers // Jan 2013

    QoS-Aware Multipath Communications Over MANETs

    To enhance the Quality of Service (QoS) communications over Mobile Ad hoc NETworks (MANETs), this paper proposes QoS-aware Multipath Routing Protocol (QMRP). Delay is the most crucial factor for multimedia applications which can be minimized by providing more than one path between source-destination pair as well as choosing the path...

    Provided By Academy Publisher

  • White Papers // Jan 2013

    Localization Method for Low-Power Wireless Sensor Networks

    Context awareness is an important issue in ambient intelligence to anticipate the desire of the user and, in consequence, to adapt the system. In context awareness, localization is very important to enable a responsive environment for the users. Focusing on this issue, this paper presents a localization system based on...

    Provided By Academy Publisher