AICIT

Displaying 1-40 of 227 results

  • White Papers // Apr 2012

    A Study of MAC Protocols for WBANs Based on Markov Chain

    The IEEE 802.15.4 standard is specifically devised to support low power, low data rate in relation to Wireless Body Area Network (WBAN). A WBAN provides long-term health monitoring of a patient without any constraint on his/her normal daily life activities. This monitoring requires the low-power operation medical sensor body area...

    Provided By AICIT

  • White Papers // Apr 2012

    Cooperative Jamming for Security of Two-Way Relay Wiretap Channel With Analog Network Coding

    This paper describes how eavesdropping can potentially be restrained by introducing cooperative jamming. A wiretap channel of two-way relay with Analog Network Coding (ANC) is considered, in which a transmitter sends message to its intended receiver in the presence of a passive eavesdropper and with the help of an active...

    Provided By AICIT

  • White Papers // Apr 2012

    Privacy-Preserving Top-K Query in Two-Tiered Wireless Sensor Networks

    In a two-tiered wireless sensor network, storage nodes act as an intermediate tier between sensors and the sink for storing data and processing queries. This architecture has been widely adopted because of the benefits of power and storage saving for sensors as well as the efficiency of query processing. On...

    Provided By AICIT

  • White Papers // Apr 2012

    An Innovate Dynamic Load Balancing Algorithm Based on Task Classification

    In a distributed system, the key factor affecting performance is between many nodes and nodes dynamic task allocation and scheduling, that is dynamic load balancing, so the technology of load balancing has higher value in theory study and practical applications. This paper considers users' task requests type is difference and...

    Provided By AICIT

  • White Papers // Apr 2012

    An Improved Anomaly Detection Method Based on Entropy Analysis for Large Scale Network Using Data Stream Technique

    Entropy-based approaches for anomaly detection are appealing since they provide more fine-grained insights than traditional traffic volume analysis. While previous work has demonstrated the benefits of entropy-based anomaly detection, there has been little effort to make entropy analysis more efficient on a large scale and high speed network. With the...

    Provided By AICIT

  • White Papers // Apr 2012

    A Novel Key Predistribution Scheme Using One-way Hash Function for Wireless Sensor Networks

    To achieve secure communication between sensor nodes in Wireless Sensor Networks (WSNs), it is important to be able to establish efficient key pre-distribution mechanism. In this paper, a novel key establishment scheme has been proposed to achieve both efficiency and security goal. The novelty of this approach lies in that,...

    Provided By AICIT

  • White Papers // Apr 2012

    Performance Comparison of Spatial Reused Bandwidth Reservation in Satellite Networks

    In this paper, the authors present a spatial reused bandwidth reservation scheme in Time Division Multiple Accesses (TDMA)-based uplink channel of satellite networks by using directional antennas. Directional antennas technology in wireless network provides the capability for considerable increase in spatial reuse, which can improve bandwidth utilization and satisfy the...

    Provided By AICIT

  • White Papers // Mar 2012

    A New Hybrid Ant Colony Algorithm for Solving Vehicle Scheduling Problem

    Because of the shortcomings of the general ant colony algorithm in the vehicle scheduling problem such as being slow convergence in the early stages, proposes a new hybrid algorithm combining genetic algorithm with implicit parallel function. The encoding and mutation operation basing on the ant colony algorithm improves the efficiency...

    Provided By AICIT

  • White Papers // Mar 2012

    Multi-Dimensional Visualization for Network Forensic Analysis

    In an age of communication via the internet, limitations are borderless. The communication over computers is beneficial but can also cause damage to the public and other agencies. The crimes have no physical restrictions, such as victims of credit card fraud or personal information stolen while connecting to a network....

    Provided By AICIT

  • White Papers // Mar 2012

    Relative Weight Decision of Quality Attributes in Cloud Computing Service Using ANP

    The authors constructed quality evaluation matrix on the basis of web service quality evaluation model and calculated relative weights between each quality cluster and attribute using Analytic Network Process. The results indicate that the proposed quality matrix and evaluation method provide a mechanism for analyzing and comparing the qualities of...

    Provided By AICIT

  • White Papers // Mar 2012

    The End-to-End IPv6 Network Available Bandwidth Measurement and Analysis

    In light of the particularities of Internet Protocol version 6 (IPv6) and based on the principles of network bandwidth measurement, an available bandwidth measuring algorithm is proposed with the characteristics of IPv6 being protocol-based, end-to-end, one-way, relative time delay, different-length packet pairs and subtraction model. With the application of the...

    Provided By AICIT

  • White Papers // Mar 2012

    Study of Performance and Mechanism of Sandwich Protection Devices for Bridges

    In the paper, the rectangular column sandwich plate protective device is developed to resist the impact loading without the bridge's damage. And its behavior is studied. The ANSYS/LS-DYNA, which is non-linear dynamics finite element software, is applied to simulate the crashworthiness performance of the rectangular column steel sandwich plate. The...

    Provided By AICIT

  • White Papers // Mar 2012

    A Novel Relay Selection Scheme in Multi-Relay Cooperative Transmission Network

    In this paper, an improved relay selection scheme is proposed for multi-relay cooperative transmission network. For the proposed scheme, based on the decoding results, the relays that decode correctly will be included in the Decode-Forward (DF) group. The rest of relays will be included in the Amplify-Forward (AF) group. The...

    Provided By AICIT

  • White Papers // Dec 2011

    A New Quantum Clone Genetic Algorithm Based Multi-User Detection for CDMA System

    Quantum intelligent computation has been widely drawing the attention of many researchers. Quantum clone genetic algorithm, which is based on quantum genetic algorithm and clone algorithm, is a new quantum intelligent algorithm with good performance. In order to overcome the shortcomings such as low efficiency, poor population diversity, slow convergence...

    Provided By AICIT

  • White Papers // Dec 2011

    Three-Party Strong Password Authenticated Key Exchange Protocols

    Three-party Password-based Authenticated Key Exchange protocols (3PAKE) is the protocol in which two communication entities, who do not share a password between themselves but only with a server, can authenticate each other and establish a session key through the assistance of an authentication server. All existing 3PAKE need certain encryption...

    Provided By AICIT

  • White Papers // Dec 2011

    Design and Verification of Hybrid Dynamic Worm Detection System

    This paper proposes a new design scheme for hybrid dynamic worm detection system. In the proposed scheme, the features of matching detection method based on protocol analysis, Bayesian detection method based on probability, and honeypot-based detection method are integrated for a relative complemented function to develop the advantages and avoid...

    Provided By AICIT

  • White Papers // Dec 2011

    A BRS-based Approach for Modeling RFID Untraceability

    Untraceability is an important aspect of RFID security. A BRS-based approach for modeling RFID untraceability is provided in this paper. Elements in a RFID protocol can be represented as bigraphs, communications between elements can be represented as reaction rules. RFID untraceability can be represented as behavioral congruences. The authors take...

    Provided By AICIT

  • White Papers // Dec 2011

    An Analysis of Ant Colony Clustering Methods: Models, Algorithms and Applications

    In recent years the ant colony clustering methods have emerged as a new kind of data mining schemes. The research of ant colony clustering methods is also an important direction for swarm intelligence. Today these methods have been deeply investigated and most of them show good performance. This paper will...

    Provided By AICIT

  • White Papers // Dec 2011

    Distributed Data Fusion Algorithm With Low Energy Consumption and High Accuracy in WSN

    Aiming at the unavoidable factors of random noise interference, sensor node perception vulnerability, network transmission instability, uncertainty actual application environment in WSN, the problem of large amount of data transmission and the transmission energy consumption in centralized data fusion, distributed data fusion algorithm based on Kernel Density Estimation and Nonparametric...

    Provided By AICIT

  • White Papers // Dec 2011

    Verifying Timed Routing Protocols of Web Service Interoperability

    Web services have been widely regarded as the next-generation distributed computing model. Their interoperability involves complex routing protocols. The routing protocol between interoperability, reflected the loose nature of contracts between services, will be stuck due to deadlock occurred in interaction channels when a routing protocol is executed. This may cause...

    Provided By AICIT

  • White Papers // May 2012

    The Characteristics Analysis of Hybrid Bridge Function Sequence in Multiuser UWB Communication System

    Basing on bridge function sequence and Walsh sequence, a special sequence called hybrid bridge function sequence is obtained. The paper focuses on the analysis of its orthogonal property and cross correlation property. Moreover, a formula of Bit Error Rate (BER) is derived and hybrid bridge function sequence's performance in a...

    Provided By AICIT

  • White Papers // May 2012

    Energy-Efficient Rate Adaptation for Long-Distance Wireless Mesh Networks

    LDmesh (Long-Distance wireless mesh) networks with links as long as tens of kilometers have been broadly deployed to bring low-cost IT revolution to developing regions. However, external WiFi/non-WiFi interferences have been aggravating network performance severely in such networks. Besides, over-provisioning the transmission power without considering the channel dynamics and interferences...

    Provided By AICIT

  • White Papers // May 2012

    A Novel Cooperation Strategy Based on Rateless Coding in Cognitive Radio Network

    To overcome the problem of the under-utilization of the licensed spectrum in Cognitive Radio Networks (CRN), the Secondary Users (SU) can share the licensed spectrum with the Primary Users (PU). It is reasonable to perform the cooperation among the Secondary Users and the Primary Users (PUs). The utilization of rateless...

    Provided By AICIT

  • White Papers // Apr 2012

    A Novel Orthogonal Superimposed Training-Based Channel Estimation Method for MIMO Channels

    The authors propose a novel superimposed training-based channel estimator for frequency-flat block-fading Multiple-Input Multiple-Output (MIMO) systems. The superimposed training sequence is designed to be orthogonal to the information-bearing data and the orthogonal property is obtained by exploiting the random space-time symbol interleaver at transmitter. As a result, the interference from...

    Provided By AICIT

  • White Papers // Apr 2012

    Mobile RFID Mutual Authentication and Ownership Transfer

    In this paper, the authors propose an ownership transfer scheme of mobile RFID networks. The scheme includes a mutual authentication protocol and a role-based ownership transfer protocol. A tag will decide what operations are allowed for an authenticated reader according to the reader's role, and the back-end server will send...

    Provided By AICIT

  • White Papers // Apr 2012

    Zigbee-Based Intelligent Classroom Network Simulator That Controls With Smart Phone

    In this paper, variety of ways for the teachers to have easy access to various multimedia contents for teaching by setting up multimedia devices that could replay educational contents as a network in the classroom were researched. In order to achieve this kind of short distance communication, ZigBee based sensor...

    Provided By AICIT

  • White Papers // Apr 2012

    Trusted Dynamic Self-Confidence Migration of Cloud Service

    Cloud computing is a hot topic with the virtual technology as the key one for the cloud. This paper focuses on virtual machine migration in the cloud computing environment. According to a comprehensive requirements analysis, the authors provide a Trusted Dynamic self-confidence Migration (TDAM) algorithm which is based on the...

    Provided By AICIT

  • White Papers // Apr 2012

    An Approach to Evaluating the Computer Practice Course Reform Based on Computer Multimedia Network Technique with 2-Tuple Linguistic Information

    In this paper, the authors investigate the multiple attribute decision making problems to deal with evaluation model of computer practice course reform based on computer multi-media network technique with 2-tuple linguistic information. They extended the TOPSIS model to solve the evaluation problems of computer practice course reform based on computer...

    Provided By AICIT

  • White Papers // Apr 2012

    A Push-Pull Data Scheduling Algorithm for P2P Streaming Media

    The lack of good enough media data scheduling algorithm, result in long startup delay and poor continuous playback problems in the P2P streaming live system. This paper presents a push-pull data scheduling algorithm, in which the use of nodes' upload capacity is maximized. With the real-time characteristic of the live...

    Provided By AICIT

  • White Papers // Apr 2012

    A Novel Block-Cipher Operation Mode for Multi Core Message Authentication

    In this paper, a novel parallel block cipher operation mode for Multi-core Message Authentication Code (MMAC) is proposed to improve the speed of generating authentication code by each processing core to handle a part of blocks. Then the Multi-core MAC Generation Algorithm (GMMAC) is presented in which the message of...

    Provided By AICIT

  • White Papers // Feb 2012

    A Group-Based Mobile MPLS Protocol for Fast Handover and Low Power Consumption

    As the smart phone and the portable tabular PC have accelerates deployment of real time streaming services, mass retrieval services, and multimedia web services over the mobile IP networks, QoS guaranteeing and traffic engineering has become more important issue and MultiProtocol Label Switching (MPLS) technologies are likely to be deployed...

    Provided By AICIT

  • White Papers // Nov 2011

    Cooperative Approaches to Spectrum Sensing and Sharing for Cognitive Radio Networks: A Comparative Study

    Cognitive Radio Networks (CRNs) consist of Primary Users (PUs) and Secondary Users (SUs), in which SUs sense the licensed spectrum bands and opportunistically access them without interfering operations of PUs. PUs in a primary network are usually licensed to access a spectrum band. SUs in a secondary networks sense available...

    Provided By AICIT

  • White Papers // Nov 2011

    Integrated Disaster Alert Network Gateway

    According to complexity of society, disaster has been complicated. Also a variety of disasters including natural, man-made, and social disasters has been happened frequently due to climate changes by industrialization, carelessness and misuse of human, terror, and war. Although, rapid integrated issue by disaster manager is very important for expeditious...

    Provided By AICIT

  • White Papers // Apr 2012

    Interactive Virtual 3D Gallery Using Motion Detection of Mobile Device

    Normally, all digital images are displayed in a flat Two-Dimensional (2D) image space. However, Three Dimensional (3D) techniques exist that allow users to interact and walk through a virtual environment in a mobile device using OpenGL ES. Thus, in this paper, an interactive virtual Three Dimensional (3D) photo gallery on...

    Provided By AICIT

  • White Papers // Apr 2012

    Investigation of Color Constancy for Ubiquitous Wireless LAN/Camera Positioning: An Initial Outcome

    This paper present the color constancy investigation in the hybridization of Wireless LAN and Camera positioning in the mobile phone. Five typical color constancy schemes are analyzed in different location environment. The results can be used to combine with RF signals from Wireless LAN positioning by using model fitting approach...

    Provided By AICIT

  • White Papers // Apr 2012

    Applying Rough Sets and BP Neural Networks to Detect Network Intrusions

    Instruction detection technology, which makes up for the shortages of firewall and data security protection, is an important part in Policy Protection Detection Response model. However, network intrusions detection involves many influencing factors and is an online process which requires quick and accurate technologies. The paper combines rough sets theory...

    Provided By AICIT

  • White Papers // Apr 2012

    A New Security Mechanism for BGP Path Verification

    As the Internet's de-facto inter-domain routing protocol, the Border Gateway Protocol (BGP) possesses many security vulnerabilities. Although many security solutions have been proposed, none has been widely accepted because of heavy Public Key Infrastructure (PKI) management and too many signing and verifying operations. This paper proposes a new security mechanism...

    Provided By AICIT

  • White Papers // Apr 2012

    Provable Security Efficient Clustering-Based Group Key Agreement for Ad Hoc Networks

    Secure communication in Ad Hoc Network is crucial problem especially in battle fields or collaborative applications. An effective way securing communication is to encrypt all the messages exchanged among network users with a common key established by group key agreement protocols. Group key agreement protocols designed for wire networks are...

    Provided By AICIT

  • White Papers // Apr 2012

    Cognitive Networks Congestion Prediction Method Based on Bayesian Networks

    With the rapid expanding of network scale and complexity, the occurrence of network congestion has been increased as well. To avoid network congestion, the authors proposed a cognitive networks congestion prediction method based on Bayesian Networks. With the help of Bayesian Networks the authors can predict the network parameters, decide...

    Provided By AICIT

  • White Papers // Apr 2012

    A Semantic SOA Platform for Smart Home

    SOA is a well adopted architecture for Web Service organization, home services could also be organized by SOA through which the services could be accessed platform-independently. However, SOA does not describe the semantic of the service, so that the service retrieval would encounter ambiguous problems due to polysemy or synonym....

    Provided By AICIT