Academy Publisher

Displaying 1-40 of 2720 results

  • White Papers // Dec 2014

    Error Performance Analysis of Multiuser CDMA Systems with Space-time Coding in Rician Fading Channel

    In this paper, the error performance of multiuser CDMA system with space-time coding is studied in Rician fading channel, and the corresponding Bit Error Rate (BER) and Symbol Error Rate (SER) analysis are presented. Based on the performance analysis, a simple and effective multiuser receiver scheme is developed. The scheme...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Delay and Jitter in Networks with IPP Traffic: Theoretical Model

    In this paper, the authors analyze delay and jitter in networks with traffic modeled as Interrupted Poisson Process (IPP), and relatively small traffic loads. In one-node analysis, they estimate the probability for delay bounds violation, and they obtain expression for the jitter, with respect to phase probabilities, traffic load, and...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    An Adaptative Energy Efficient Routing Protocol for MANET

    The dynamic nature of Mobile Ad hoc NETwork (MANET) has several constraints like scalability, robust connectivity and limited power constraints. So an efficient routing protocol is required. It should be adaptable and able to maintain stable routes in spite of the dynamic network connectivity. This paper proposes a hybrid protocol,...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    A Novel Method to Improve the Accuracy of the RSSI Techniques Based on RSSI-D

    In this paper, a novel method is proposed to estimate the distance between sensor nodes based on a statistical model of GMM, which is established with the offline RSSI values, called RSSI-D. In order to estimate the arguments of RSSI-D with unobserved latent variables, EM is used to calculate the...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    SIP-Based QoS in IP Telephony

    In this paper, the authors analyze the factors resulting to the degradation of the quality of service in Voice over IP (VoIP) telephony. SIP protocol is used to explore the QoS characteristics of different Codec. The system is designed for an IP telephony service provider with other GSM operator network...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    A Resource-Efficient System for Detection and Verification of Anomalies Using Mobile Agents in Wireless Sensor Networks

    Sensor readings are vulnerable to in situ and in transit anomalies. A well designed anomaly detection system should be able to identify the source of anomalies through in situ verification of suspicious behavior of sensor nodes. One approach for in situ verification is physical diagnosis of sensor nodes, which is...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Simulation and Performance Analysis of the IEEE1588 PTP With Kalman Filtering in Multi-Hop Wireless Sensor Networks

    As the Wireless Sensor Networks (WSNs) find wider and wider applications, time synchronization has emerged as a key technology to improve network performance and enable WSNs in time-sensitive applications. The recently proposed IEEE 1588 Precision Time synchronization Protocol (PTP) has shown its capability for the wired Ethernet, but its performance...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Enhancing Channel Coordination Scheme Caused by Corrupted Nakagami Signal and Mobility Models on the IEEE 1609.4 Standard

    Ensuring high saturated throughput of SCHs and reducing the transmission delay of service packets on CCHs are one of the most challenging issues in multichannel operations IEEE 1609.4 standard. Moreover, multiple issues due to its highly dynamic topology, the high mobility, the change trajectory, and Nakagami propagation channel caused by...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Detecting Access Point Spoofing Attacks Using Partitioning-Based Clustering

    The impersonation of wireless Access Point (AP) poses an unprecedented number of threats that can compromise a wireless client's identity, personal data, and network integrity. The AP impersonation attack is conducted by establishing rogue AP with spoofed Service Set IDentifier (SSID) and MAC address same as the target legitimate AP....

    Provided By Academy Publisher

  • White Papers // Dec 2014

    The Faults of Data Security and Privacy in the Cloud Computing

    According to Winkler, public cloud is based on the standard cloud computing model, in which a service provider makes resources, such as applications and storage, available to the general public over the Internet. Public cloud services may be free or offered on a pay-per-usage model. The main benefits of using...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    TTAF: TCP Timeout Adaptivity Based on Fast Retransmit over MANET

    Transmission Control Protocol (TCP) is one of the most widely deployed transport layer protocols. It responds to all packet losses, either due to congestion or link breakages, by invoking various congestion control mechanisms. All these mechanisms imply a reduction in the amount of transmitted data. Computing a proper value of...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    On-Line Data Retrieval Algorithm with Restart Strategy in Wireless Networks

    With rapid development of technologies in mobile environment, data dissemination has become an important role for obtaining their requested information of clients in many applications. There are three major approaches to disseminate information between server and clients: unicast, multicast and broadcast. Data retrieval is an efficient scheme for data dissemination...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Trail Coverage : A Coverage Model for Efficient Intruder Detection Near Geographical Obstacles in WSNs

    In Wireless Sensor Network (WSNs), the coverage strategy for achieving higher performance in intruder detection probability near irregular geographical obstacles inside a military terrain, is studied in this paper. The real life problem of the of intruder detection near irregular geographical obstacles has not been focused so far, in which...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Verifying Online User Identity Using Stylometric Analysis for Short Messages

    Stylometry consists of the analysis of linguistic styles and writing characteristics of the authors for identification, characterization, or verification purposes. In this paper, the authors investigate authorship verification for the purpose of user authentication process. In this setting, authentication consists of comparing sample writing of an individual against the model...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Topology Control Mechanism Based on Link Available Probability in Aeronautical Ad Hoc Network

    In this paper, the authors consider traffic network with high-speed mobility nodes scenario; and give a new network topology control mechanism to rise the routing path duration in Aeronautical ad hoc network. The mechanism can use different methods to construct topology according to the node densities. For network regions having...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    An Energy-Efficient Routing Mechanism Based On Genetic Ant Colony Algorithm for Wireless Body Area Networks

    As an important branch of Wireless Sensor Network (WSN), Wireless Body Area Network (WBAN) has received extensive attention of various fields as it is portable and removable. However, energy consumption is highlighting increasingly as nodes are hard to be recharged or replaced. Up to now, many energy efficient routing algorithms...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    An Improved Mix Transmission Algorithm for Privacy-Preserving

    With the rapid development of the Internet Of Things (IOT), personal privacy has been realized as the most important security issue in wireless sensor networks, especially in the Body Area Network (BAN) used in the medical field. Traditional encryption methods cannot defense against the attacks in which the communication signal...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Study of Downlink Scheduling Algorithms in LTE Networks

    Long Term Evolution (LTE) is one of the fastest growing technologies which supports variety of applications like video conferencing, video streaming, VoIP, file transfer, web browsing etc. In order to support multiple applications, Radio Resource Management (RRM) procedure is one of the key design roles for improving the system performance....

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Efficient Scheme for Channel Estimation in OFDM System

    The choice of channel estimation is of fundamental importance in OFDM receiver designs, which further involves a trade-off between complexity and estimation accuracy. In pilot-symbol-aided OFDM system, the Least Square (LS) estimator suffers from inherent additive Gaussian noise and Inter Carrier Interference (ICI), although the estimator exhibits lower complexity and...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Performance of Decode and Forward MIMO Relaying Using STBC for Wireless Uplink

    In this paper, the authors compare the performance of a decode and forward relay assisted wireless uplink with direct wireless uplink in the presence of rayleigh fading where source is equipped with single Transmit antenna (Tx), relay is equipped with multiple transmit and Receive antennas (Rx), and destination has multiple...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    On Efficient Design of LDPC Decoders for Wireless Sensor Networks

    Low Density Parity Check (LDPC) codes are error-correcting codes that offer huge advantages in terms of coding gain, throughput and power dissipation in digital communication systems. Error correction algorithms are often implemented in hardware for fast processing to meet the real-time needs of communication systems. However, traditional hardware implementation of...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Performance Comparison of RFID Tag at UHF Band and Millimeter-Wave Band

    The Ultra High Frequency (UHF) band spectrum will likely be congested in near future since the next generation wireless as well as Radio Frequency IDentification (RFID) system users will witness the use of UHF band technology with increased demand of bandwidth, bit rate, frequency spectrum and power consumption. The alternate...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Keeping Desired QoS by a Partial Coverage Algorithm for Cluster-Based Wireless Sensor Networks

    Many studies were done on design algorithms to completely cover an area. The authors can call the issue as a complete coverage problem. Although there were many researches about proposing a partial coverage issue; almost all of the studies only focus on lengthening the lifespan of Wireless Sensor Networks (WSNs)...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Achieving VoIP Guarantee in Wireless Local Area Networks

    Recently, Voice over Internet Protocol (VoIP) has gained much attention in Wireless Local Area Networks (WLANs). Although IEEE 802.11e Enhanced Distributed Channel Access (EDCA) has been standardized to provide voice traffic with Quality of Service (QoS) support, the voice quality could still be severely degraded by the traffic transmitted from...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    DOA Estimation for Coherent Sources in Impulsive Noise Environments

    Direction-of-Arrival (DOA) estimation of coherent sources is a significant problem in impulsive noise environments. In this paper, a robust estimation algorithm which combines the ideas of Spatial Smoothing (SS) and INFinity-norm normalization (INF) is presented referred to as INF-SSR. The proposed algorithm exploits the Root - MUSIC technique to computer...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Source-Directed Path Diversity in the Interdomain Routing

    The Internet has abundant path redundancy, especially in the inter-domain routing. However, current routing system cannot exploit the Internet path diversity and utilize the disjoint end-to-end paths efficiently. The unawareness of sources to the path selection and the best paths advertisement mechanism in the inter-domain routing make it difficult to...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    Markov Chain Based Trust Management Scheme for Wireless Sensor Networks

    As the effective supplement to traditional cryptography security, trust management plays a key role for detecting malicious behaviors in wireless sensor networks. In this paper, the authors consider a sensor network wherein nodes have fixed number of states and probabilities of state transitions can be specified. They introduce Markov chain...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    A Hybrid Classifier Using Reduced Signatures for Automated Soft-Failure Diagnosis in Network End-User Devices

    The authors present an automated system for the diagnosis of both known and unknown soft-failures in end-User Devices (UDs). Known faults that cause network performance degradation are used to train the classifier-based system in a supervised manner while unknown faults are automatically detected and clustered to identify the existence of...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    e-ONE:Enhanced ONE for Simulating Challenged Network Scenarios

    Delay Tolerant Network (DTN) empowers sparse mobile ad-hoc networks and other challenged network environments, such as interplanetary communication network or deep sea communication network, where traditional networking protocols either fail to work completely or do not work well. The Opportunistic Networking Environment (ONE) Simulator has gained considerable popularity as an...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    A Load-Balanced On-Demand Routing for LEO Satellite Networks

    Due to population distribution and economic flourish diversity, the Low Earth Orbit (LEO) satellite network carries unbalanced traffic load, which leads that parts of satellite links are congested while others are underutilized. Furthermore, the congested inter-satellite links result in high queuing delay and packet dropping ratio. To ensure an intelligent...

    Provided By Academy Publisher

  • White Papers // Dec 2014

    A Hybrid Optimization Algorithm for Bayesian Network Structure Learning Based on Database

    The process of learning Bayesian networks includes structure learning and parameters learning. During the process, learning the structure of Bayesian networks based on a large database is a NP hard problem. The paper presents a new hybrid algorithm by integrating the algorithms of MMPC (Max-Min Parents and Children), PSO (Particle...

    Provided By Academy Publisher

  • White Papers // Nov 2014

    Incremental Subspace Data-Mining Algorithm Based on Data-Flow Density of Complex Network

    In order to improve the accuracy of data-mining in large-scale complex networks, an incremental subspace data-mining algorithm based on data-flow density of complex network is proposed in this paper. In order to accommodate this goal, a latent variable model is first introduced and incorporated into data-flow density model so that...

    Provided By Academy Publisher

  • White Papers // Nov 2014

    An Improved DV-Hop Localization Algorithm Based on Energy-Saving Non-Ranging Optimization

    In order to reduce energy-consumption and hardware investment in wireless sensor networks, an improved DV-Hop localization algorithm based on energy-saving non-ranging optimization is proposed. In this algorithm, only one anchor node broadcasts its position coordinate information to other node, thus greatly reducing the energy consumption of the node. Non-ranging energy-saving...

    Provided By Academy Publisher

  • White Papers // Nov 2014

    Pollution-Free Regenerating Codes with Fast Reconstruction Verification for Verifiable Cloud Storage

    In this paper, the authors present an efficient mechanism to guarantee the integrity of cloud storage systems using network-coding-based regenerating codes. Regenerating codes are a special type of erasure codes with the property that regenerating a failed encoded server, can be done using significantly less information than the size of...

    Provided By Academy Publisher

  • White Papers // Nov 2014

    A Hybrid Wrapper-Filter Approach for Malware Detection

    In this paper, the authors present an efficient and novel approach for malware detection. The proposed approach uses a hybrid wrapper-filter model for malware feature selection, which combines Maximum Relevance (MR) filter heuristics and Artificial Neural Net Input Gain Measurement Approximation (ANNIGMA) wrapper heuristic for sub-set selection by capitalizing on...

    Provided By Academy Publisher

  • White Papers // Nov 2014

    Securing a Smart Anti-Counterfeit Web Application

    The use of RFID (Radio Frequency IDentification) technology can be employed for automating and streamlining safe and accurate brand IDentification (ID) uniquely in real-time to protect consumers from counterfeited products. The authors outline a Web-based Anti-counterfeit RFID System (WARS) to combat counterfeit branding. By placing brand tags (RFID tags) on...

    Provided By Academy Publisher

  • White Papers // Nov 2014

    Elliptic Curve Cryptography for WSN and SPA Attacks Method for Energy Evaluation

    In this paper, the authors provide a comprehensive study of Elliptic Curve Cryptography (ECC) for Wireless Sensor Networks (WSNs) security provisioning, mainly for key management and authentication modules. On the other hand, they present and evaluate a Side-Channel Attacks (SCAs) experimental bench solution for energy evaluation, especially Simple Power Analysis...

    Provided By Academy Publisher

  • White Papers // Nov 2014

    Anomaly Detection in Wireless Sensor Network

    Wireless Sensor Networks (WSNs) are prone to vulnerabilities due to their resource constraints and deployment in remote and unattended areas. A sensor node exhibits anomaly in behavior due to its dying energy level or being compromised by the intruders. The node showing anomalous behaviors being a Leader Node (LN) of...

    Provided By Academy Publisher

  • White Papers // Nov 2014

    Detection of Privacy Sensitive Information Retrieval Using API Call Logging Mechanism Within Android Framework

    In recent years, Android based Smartphone's have become popular. As a feature of a smart phone, much information for identifying a user and information linked to user's privacy is saved in a terminal. For this feature, many malwares targeting privacy information are developed. Many security mechanisms are provided in Android...

    Provided By Academy Publisher

  • White Papers // Nov 2014

    Dynamic Cluster-Based Routing for Wireless Sensor Networks

    In this paper, the authors propose a new clustering scheme for wireless sensor networks, which efficiently balances the energy usage inter- and intra-clusters, by using the k-medoids method and the intra-cluster head update policy. Particularly, they propose a simple-but-effective routing tree algorithm to maintain a dynamic energy-efficient tree structure over...

    Provided By Academy Publisher

  • White Papers // Feb 2008

    Towards Design Space Exploration for Biological Systems

    For both embedded systems and biological cell systems, design is a feature that defines their identity. The assembly of different components in designs of both systems can vary widely. Given the similarities between computers and cellular systems, methods and models of computation from the domain of computer systems engineering could...

    Provided By Academy Publisher

  • White Papers // Jul 2014

    A New Multi-Class WSVM Classification to Imbalanced Human Activity Dataset

    In this paper the authors concerned with the class imbalance problem in activity recognition field which has been known to hinder the learning performance of classification algorithms. To deal this problem, the authors propose a new version of the multi-class Weighted Support Vector Machines (WSVM) method to perform automatic recognition...

    Provided By Academy Publisher

  • White Papers // Jul 2014

    Evaluation of DGEMM Implementation on Intel Xeon Phi Coprocessor

    In this paper the authors will present a detailed study of implementing Double-precision GEneral Matrix Multiply (DGEMM) utilizing the Intel Xeon Phi Coprocessor. They discuss a DGEMM algorithm implementation running \"Natively\" on the coprocessor, minimizing communication with the host CPU. They will run DGEMM across a range of matrix sizes...

    Provided By Academy Publisher

  • White Papers // Jul 2014

    Image Segmentation with Fuzzy Clustering Based on Generalized Entropy

    Aimed at fuzzy clustering based on the generalized entropy, an image segmentation algorithm by joining space information of image is presented in this paper. For solving the optimization problem with generalized entropy's fuzzy clustering, both hopfield neural network and multi-synapse neural network are used in order to obtain cluster centers...

    Provided By Academy Publisher

  • White Papers // Jun 2007

    Efficient Multicast Support in High-Speed Packet Switches

    The tremendous growth of the Internet coupled with newly emerging applications has created a vital need for multicast traffic support by backbone routers and ATM switches. Considerable paper has been done on Input Queued (IQ) switches to handle multicast traffic flows. Unfortunately, all previously proposed solutions were of no practical...

    Provided By Academy Publisher

  • White Papers // Feb 2014

    Modeling RDF Data for MetOcean Information Systems

    In this paper the authors suggest a Resource Description Framework (RDF) model for effective handling of distributed data relating to the semantic web. RDF is a data model that integrates aptly structured data. The World Wide Web is facing great challenges in data retrieval as a result of increase and...

    Provided By Academy Publisher

  • White Papers // Jan 2014

    Development and Realization of Real-time Data Exchange between OPC Client and Multiple Remote Servers

    The submitting of OPC (OLE for Process Control) has promoted the progress of the data collection in process control and industrial automation, and formulated the industry standard for the process real-time data exchange. Aiming at the key problem of ensuring the use of application program as OPC client to link...

    Provided By Academy Publisher

  • White Papers // Mar 2014

    ChordMR: A P2P-based Job Management Scheme in Cloud

    MapReduce is a programming model and an associated implementation for processing parallel data, which is widely used in cloud computing environments. However, the traditional MapReduce system is based on a centralized master-slave structure. While, along with the increase of the number of MapReduce jobs submitted and system scale, the master...

    Provided By Academy Publisher

  • White Papers // Mar 2014

    True Value Estimation of Centrifugal Fan Vibration Data Based on Fusion Method

    Poor information means incomplete and insufficient information, such as unknown probability distributions and trends. In this case, many statistical methods may become ineffective. So a fusion method based on the information poor theory is proposed. The fusion method contains five methods, three concepts, and one rule. The five methods include...

    Provided By Academy Publisher

  • White Papers // Mar 2014

    A New Model of Data Protection on Cloud Storage

    Cloud computing is Internet-based computing, whereby shared resources, software, and information are provided to computers and other devices on demand, like the electricity grid. This paper focuses on studying cloud storage data protection model and implementing encrypted storage of user data in double-key form. User data are encrypted with symmetric...

    Provided By Academy Publisher

  • White Papers // Feb 2014

    Sequential Pattern Mining for Uncertain Data Streams using Sequential Sketch

    Uncertainty is inherent in data streams, and present new challenges to data streams mining. For continuous arriving and large size of data streams, modeling sequences of uncertain time series data streams require significantly more space. Therefore, it is important to construct compressed representation for storing uncertain time series data. Based...

    Provided By Academy Publisher

  • White Papers // Feb 2014

    Network Security Situation Evaluation Strategy Based on Cloud Gravity Center Judgment

    Aiming at the problems of subjectivity and complexity in network security situation assessment process, the cloud model is introduced to the network security situation assessment, and a network security evaluation method based on cloud model is proposed. Firstly, the level of network security situation is judged by cloud gravity center...

    Provided By Academy Publisher

  • White Papers // Feb 2014

    Prediction-based Dynamic Resource Scheduling for Virtualized Cloud Systems

    Virtualization and cloud computing technologies now make it possible to consolidate multiple online services, which are packed in Virtual Machines (VMs), into a smaller number of physical servers. However, it is still a challenging scheduling problem for cloud provider to dynamically manage the resource for VMs in order to handle...

    Provided By Academy Publisher

  • White Papers // Feb 2014

    Multiple Computing Task Scheduling Method Based on Dynamic Data Replication and Hierarchical Strategy

    As for the problem of how to carry out task scheduling and data replication effectively in the grid and to reduce task's execution time, this paper proposes the task scheduling algorithm and the optimum dynamic data replication algorithm and builds a scheme to effectively combine these two algorithms. First of...

    Provided By Academy Publisher

  • White Papers // Feb 2014

    Emotional Tendency Contrast Recommendation Algorithm Based on Cloud Model

    Users' emotional needs can be well expressed by emotional attitude and preference in online reviews, so in this paper, the authors extracted emotional words from users' reviews through establishing emotional tendency corpus for online reviews, and computed emotional scores in fuzzy algorithm. The vector for emotional tendency in online reviews...

    Provided By Academy Publisher

  • White Papers // Feb 2014

    Clustering Analysis on E-commerce Transaction Based on K-means Clustering

    Based on the density, increment and grid etc, shortcomings like the bad elasticity, weak handling ability of high-dimensional data, sensitive to time sequence of data, bad independence of parameters and weak handling ability of noise are usually existed in clustering algorithm when facing a large number of high-dimensional transaction data....

    Provided By Academy Publisher

  • White Papers // Feb 2014

    Clustering Model Based on Improved LEACH Algorithm in Sensor Network

    For the deficiencies of LEACH algorithm includes the lack of consideration to the consumption of energy and the problem of sensor's topological structure, an improved clustering algorithm with energy efficient is proposed in LEACH sensor networks. Based on the classic clustering algorithm LEACH, it increases the chances for those nodes...

    Provided By Academy Publisher

  • White Papers // Feb 2014

    Compressible Data Fusion Based on Minimum Energy Consumption in Wireless Sensor Network

    Data fusion problem is one of the research hotspots in wireless sensor network. Aiming at the shortage of excessive energy consumption in existing fusion method, a data fusion program is proposed based on minimum energy consumption according to the theory of compressive sensing. This paper first analyzes the impact of...

    Provided By Academy Publisher

  • White Papers // Feb 2014

    Semantic Technologies Applying to Data Warehouses Federation

    Business intelligence is based on the existence of main components including: data warehouses. The data warehouse is a specialized database which main task is to provide quick access to data in analysis objective. But in some cases it is necessary to use a set of data warehouses to provide complete...

    Provided By Academy Publisher

  • White Papers // Feb 2014

    DWDE-IR: An Efficient Deep Web Data Extraction for Information Retrieval on Web Mining

    Deep web is a widely unexplored data source, is becoming an important research topic. Retrieving structured data from deep web pages is the challenging problem due to their complex structure. In this paper, Information extRacts on the deep web pages based on the Deep Web Data extRaction technique (DWDR-IR). Search...

    Provided By Academy Publisher

  • White Papers // May 2009

    A Hash-based Hierarchical Algorithm for Massive Text Clustering

    Text clustering is the process of segmenting a particular collection of texts into subgroups including content based similar ones. The purpose of text clustering is to meet human interests in information searching and understanding. This paper proposes a new fast hierarchical text clustering algorithm HBSH (Hash-Based Structure Hierarchical clustering), which...

    Provided By Academy Publisher

  • White Papers // May 2009

    MDESB: Model-driven Enterprise Service Bus

    Traditional Enterprise Service Bus (ESB) does not consider the impact of objects of different granularity on Enterprise Application Integration (EAI), lacks service description means of semantic level, and only uses manual methods to implement the coordination of message format conflict, which results in the traditional ESB application in EAI very...

    Provided By Academy Publisher

  • White Papers // May 2009

    GPU-based Morphing Terrain Real-time Shadow Algorithm

    In the large-scale terrain scene rendering, because of the complexity of the shadow algorithm, the algorithm of the real-time shadow have not been able to achieve satisfactory rate. In this situation, this paper proposed a GPU-based real-time shadow algorithm. It can be used for generating real-time shadow effect in morphing...

    Provided By Academy Publisher

  • White Papers // Jul 2010

    An Improved Forward-Secure Multi-Proxy Signature Scheme

    In this paper the authors proposed a forward multi-proxy signature scheme, but there is some insecurity in Xu's scheme: if the attacker knows a valid signature, anyone can forge some certain messages and cannot detect by the signature verifier. If the attacker is one of the signers, who can forget...

    Provided By Academy Publisher

  • White Papers // Jul 2010

    A Design of Smart Battery Charger Based on AVR Single Chip

    Traditional simple charger can't charge for batteries that manufactured by different techniques and that with different capacity and voltage. With regard to incompatible and low efficiency of lithium-ion batteries, nickel metal hydride batteries and nickel-chrome charger, a generalized smart charger is designed in this paper, which adopts single chip control...

    Provided By Academy Publisher

  • White Papers // Jul 2010

    Design of Multi-channel Digital Video Optical Transmitter Based on FPGA

    A design proposal of multiplex digital optical transmitter based on FPGA is given in this paper, which is constructed by chipset EP2C35F6728C of cyclone II series of Altera company as the core digital processor. The system includes A/D converter, TDM, high-speed series to parallel converter and so on. 8B10B of...

    Provided By Academy Publisher

  • White Papers // Apr 2010

    A Framework for Credibility Evaluation of Web- Based Competitive Intelligence

    With the rapid increasing of Web data volume, it has been a hot issue to find competitive intelligence from Web. However, previous papers in this direction focused on the extracting algorithms for Web-based competitive intelligence, and little work has been done in the credibility evaluation of Web-based competitive intelligence. The...

    Provided By Academy Publisher

  • White Papers // Dec 2009

    A Practical GPU Based KNN Algorithm

    The KNN algorithm is a widely applied method for classification in machine learning and pattern recognition. However, the authors can't be able to get a satisfactory performance in many applications, as the KNN algorithm has a high computational complexity. Recent developments in programmable, highly paralleled Graphics Processing Units (GPU) have...

    Provided By Academy Publisher

  • White Papers // Nov 2009

    Building of Cluster Algorithm of Variable Based on Mass Data

    With the rapid development of the technology of computers database as well as the wide application of the management system of database, people are accumulating more and more data. In the background of the rapid development of information technology, aimed at insufficiency of storage and analysis of hardware and software...

    Provided By Academy Publisher

  • White Papers // Jan 2014

    Recent Frequent Item Mining Algorithm in a Data Stream Based on Flexible Counter Windows

    In the paper the author introduces FCW-MRFI, which is a streaming data frequent item mining algorithm based on variable window. The FCW-MRFI algorithm can mine frequent item in any window of recent streaming data, whose given length is L. Meanwhile, it divides recent streaming data into several windows of variable...

    Provided By Academy Publisher

  • White Papers // Apr 2014

    Mitigating Cross-VM Side Channel Attack on Multiple Tenants Cloud Platform

    Virtualization is a key enabling technology in cloud computing. Multiple tenants can share computing resource of cloud provider on demand. While sharing can reduce the expenses of computing, it brings security vulnerability as well since the isolation between different VMs could be violated through side-channel attacks. Recent researches point out...

    Provided By Academy Publisher

  • White Papers // Mar 2014

    An Improved k-Exclusion Algorithm

    K-exclusion is a generalization of mutual exclusion that allows up to k processes to be in the critical section concurrently. Starvation freedom and First-In-First-Enabled (FIFE) are two desirable progress and fairness properties of k-exclusion algorithms. The authors present the first known bounded-space k-exclusion algorithm that uses only atomic reads and...

    Provided By Academy Publisher

  • White Papers // Feb 2014

    A Systematic Approach to Adaptive Dimensioning of Data Centers

    Cloud Data Centers (CDCs) provide key infrastructure for cloud computing. Accurately allocating computing resources is very important for the CDCs to function efficiently. Current allocation of resources in CDCs is mostly dedicated and static. However, workloads for cloud applications are highly variable which cause poor application performance, poor resource utilization...

    Provided By Academy Publisher

  • White Papers // Apr 2014

    An Greedy-Based Job Scheduling Algorithm in Cloud Computing

    Now-a-days/cloud computing has become a popular platform for scientific applications. Cloud computing intends to share a large number of resources such as equipments for storage and computation, and information and knowledge for scientific researches. Job scheduling algorithm is one of the most challenging theoretical issues in the cloud computing area....

    Provided By Academy Publisher

  • White Papers // Mar 2014

    QoS-aware SaaS Services Selection with Interval Numbers for Group User

    The integration of SaaS service for group user in cloud is challenging, notably because the service's QoS and member's personalization QoS preference in group are uncertain. This is a timely and importance problem with the advent of the SaaS model of service delivery. Therefore, before the SaaS service been utilized,...

    Provided By Academy Publisher

  • White Papers // Mar 2014

    Research and Application of Data Integration in Aircraft Designing Based on SDO

    One of the fundamental problems in complicated system environment is the mechanism of data interaction and sharing between heterogeneous data sources. The known solutions, using middlewares to unify data formats, are not reliable due to the tightly coupled architecture, poor portability and reusability, large update latency, etc. To solve this...

    Provided By Academy Publisher

  • White Papers // Mar 2014

    An Empirical Study for Software Fault-Proneness Prediction with Ensemble Learning Models on Imbalanced Data Sets

    Software faults could cause serious system errors and failures, leading to huge economic losses. But currently none of inspection and verification technique is able to find and eliminate all software faults. Software testing is an important way to inspect these faults and raise software reliability, but obviously it is a...

    Provided By Academy Publisher

  • White Papers // Mar 2014

    A Query Driven Method of Mapping from Global Ontology to Local Ontology in Ontology-based Data Integration

    At present, the mediator/wrapper integration methods are widely used in ontology based data integration because they solve the data update problems of data warehouse method. The key of this method is building of mapping from the global ontology in mediator to the local ontology in wrapper. This paper analyzes the...

    Provided By Academy Publisher

  • White Papers // Jun 2014

    Research on Cloud-Based Mass Log Data Management Mechanism

    In this paper, the authors study the file management mechanism of large-scale cloud-based log data. With the rise of big data, there are more and more the hadoop-based applications. Log analysis is an important part of network security management, but the existing network log analysis system can't deal with huge...

    Provided By Academy Publisher

  • White Papers // Jun 2014

    A Dynamic Load-balancing Scheme for XPath Queries Parallelization in Shared Memory Multi-core Systems

    Due to the rapid popularity of multi-core processors systems, the parallelization of XPath queries in shared memory multi-core systems has been studied gradually. Existing paper developed some parallelization methods based on cost estimation and static mapping, which could be seen as a logical optimization of parallel query plan. However, static...

    Provided By Academy Publisher