Hannam university

Displaying 1-40 of 44 results

  • White Papers // Jul 2013

    P2P Link Buffering Control with Fault-recovery on Digital Yarn

    A wearable computing has been proposed as an alternative of the best mobile computing interfaces and devices. A digital garment acts as a key element of wearable computing. The authors will apply digital yarn link as material of data communications on purpose to take advantage of a digital garment. This...

    Provided By Hannam university

  • White Papers // Mar 2013

    A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services

    The emergence of cloud computing brought a significant change for the delivery of how Information Technology to educational and business enterprises. In this paper, the authors discuss the different qualities of cloud computing frameworks together with the expectations and promises of cloud computing and associated benefits. The design of a...

    Provided By Hannam university

  • White Papers // Nov 2012

    Security Framework Design Intended for Networked Devices

    As more organizations and businesses are using computer networks and the Internet, the need for a secure computing environment must also be increased. The need for a secure computing environment must be tightened as more and more organizations and businesses are using computer networks and the Internet. A secure computing...

    Provided By Hannam university

  • White Papers // Oct 2012

    A Design Methodology of Advanced-PEPs Architecture for TCP Satellite Connection and Bandwidth Management

    In the network environment of the Internet and Intranet, Transmission Control Protocol (TCP) is Representative application of transport layer protocols. TCP based network specific environment and other upper-layer protocol performance should be limited according to link feature. To solve these problems for typical techniques is Enhanced-TCP based which use PEP....

    Provided By Hannam university

  • White Papers // Oct 2012

    Various Factor Comparison of DRAM-SSD and HDD Using TPC-H Benchmark

    Recently, Users needed storage for processing high-capacity data. Meanwhile, the HDD was used primarily as storage device, but SSD was developed as a fast access device. So, the use of SSD increased a lot of capacity-process. Using a SAN Switch, the authors tested in order to resolve data process faster....

    Provided By Hannam university

  • White Papers // Oct 2012

    An Enhanced Packet Buffering Transmission (EPBT) Architecture Design for Performance Enhancing Proxies (PEPs)

    Transmission Control Protocol (TCP) is widely used for the transport layer protocol in most Internet and Intranet applications. The link characteristics of a specific link environment such as satellite has been limited and degraded by its link characteristics. To address such limitations Performance Enhancing Proxies (PEPs) have been designed and...

    Provided By Hannam university

  • White Papers // Apr 2012

    Multimodal Interface for Mobile Cloud Computing

    Mobile Cloud Computing has become as a new IT paradigm because of the growth of mobile device like Smartphone and appearance of Cloud Computing environment. This mobile cloud environment provides various services and IT resources according to users' requests, so an effective providing of service and IT resources is required....

    Provided By Hannam university

  • White Papers // Jan 2012

    Reducing Packet Loss for Mobile IPv6 Fast Handover (FMIPv6)

    Mobile IPv6 enables a mobile node to maintain its connectivity to the Internet when moving from one Access Router to another, a process referred to as handover. Handover involves link switching, which may not be exactly coordinated with fast handover signaling. The arrival pattern of packets is dependent on many...

    Provided By Hannam university

  • White Papers // Jan 2012

    Implementation of Cipher Block Chaining in Wireless Sensor Networks for Security Enhancement

    Wireless Sensor Networks have been a great effect in the people real life. With its various types of applications WSN is also a matter of concern for its existing vulnerabilities. To prevent those loopholes, the authors need to provide some effective mechanism for providing better security and authentication issues. Wireless...

    Provided By Hannam university

  • White Papers // Oct 2011

    Devising an Optimal Scheme for Wireless Sensors for Patient Report Tracking and Monitoring in Ubiquitous Healthcare

    Distributed wireless sensor network technologies have become one of the major research areas in healthcare industries due to rapid maturity in improving the quality of life. The implementation of ubiquitous healthcare systems provides rich contextual information and warning mechanisms against abnormal conditions with continual and remote monitoring of patients. This...

    Provided By Hannam university

  • White Papers // Sep 2011

    Profile for Effective Service Management on Mobile Cloud Computing

    Mobile Cloud Computing has become as a new IT paradigm because of the growth of mobile device like smartphone and appearance of Cloud Computing environment. This mobile cloud environment provides various services and IT resources according to users' requests, so an effective management of service and IT resources is required....

    Provided By Hannam university

  • White Papers // Sep 2011

    Context Model Based on Ontology in Mobile Cloud Computing

    Mobile Cloud Computing has become as a new IT paradigm because of the growth of mobile device like smartphone and appearance of Cloud Computing environment. This mobile cloud environment provides various services and IT resources according to users' requests, so an effective management of service and IT resources is required....

    Provided By Hannam university

  • White Papers // Jun 2011

    Scheme to Secure Communication of SCADA Master Station and Remote HMI's Through Smart Phones

    SCADA is a concept that is used to refer to the management and procurement of data that can be used in developing process management criteria. The use of the term SCADA varies, depending on location. Conventionally, SCADA is connected only in a limited private network. Later on, SCADA was connected...

    Provided By Hannam university

  • White Papers // May 2011

    A Study on Crowd Simulation Effects Through Marker-Based Multi-Object Augmentation

    The authors have carried out research on high-speed crowd simulation effects through marker-based multi-object augmentation as the basis for a crowd scene processing system that can produce natural movement of a crowd with less resources and operation. When applied to 3D AR images, this method is expected to achieve high...

    Provided By Hannam university

  • White Papers // Dec 2010

    Securing Communication of SCADA Components in Smart Grid Environment

    SCADA is a process control systems, designed to automate systems such as traffic control, power grid management, waste processing etc. Conventionally, SCADA is connected only in a limited private network because SCADA is considered a critical infrastructure, and connecting to the internet may put the society on jeopardy, SCADA operators...

    Provided By Hannam university

  • White Papers // Nov 2010

    Challenges and Security in Cloud Computing

    People who live in this world want to solve any problems as they happen then. An IT technology called Ubiquitous computing should help the situations easier and the authors call a technology which makes it even better and powerful cloud computing. Cloud computing, however, is at the stage of the...

    Provided By Hannam university

  • White Papers // Nov 2010

    Research on a Denial of Service (DoS) Detection System Based on Global Interdependent Behaviors in a Sensor Network Environment

    In this paper, the authors suggest a Denial of Service (DoS) detection method based on the collection of interdependent behavior data in a sensor network environment. In order to collect the interdependent behavior data, they use a base station to analyze traffic and behaviors among nodes and introduce methods of...

    Provided By Hannam university

  • White Papers // Nov 2010

    An Empirical Study of Spam and Spam Vulnerable Email Accounts

    Spam messages muddle up users inbox, consume network resources, and build up DDoS attacks, spread malware. The goal is to present a definite figure about the characteristics of spam and spam vulnerable email accounts. These evaluations help one to enhance the existing technology to combat spam effectively. The authors collected...

    Provided By Hannam university

  • White Papers // Oct 2010

    Multi Layer Approach to Defend DDoS Attacks Caused by Spam

    Corporate mail services are designed to perform better than public mail services. Fast mail delivery, large size file transfer as an attachments, high level spam and virus protection, commercial advertisement free environment are some of the advantages worth to mention. But these mail services are frequent target of hackers and...

    Provided By Hannam university

  • White Papers // Oct 2010

    Bayesian Based Comment Spam Defending Tool

    Spam messes up user's inbox, consumes network resources and spread worms and viruses. Spam is flooding of unsolicited, unwanted e mail. Spam in blogs is called blog spam or comment spam. It is done by posting comments or flooding spams to the services such as blogs, forums, news, email archives...

    Provided By Hannam university

  • White Papers // Aug 2010

    Dissolving Active Networks Privacy Threats and Vulnerabilities

    In current generation information society has been governed by a collection of huge amounts of information and services that provides convenience to people. However, IMS (Identity Management Systems) have been crucial as the information society is getting bigger. IMS provides a description of the infrastructure within one or between several...

    Provided By Hannam university

  • White Papers // Aug 2010

    Research Trend on Secure SCADA Network Technology and Methods

    SCADA controls critical infrastructure. Aside from SCADA's internal vulnerabilities, the fact that it controls Critical Infrastructure makes it more vulnerable and gains many threats. SCADA refers to the combination of telemetry and data acquisition. SCADA includes the collecting of the information via a RTU (Remote Terminal Unit), PLC's (Programmable Logic...

    Provided By Hannam university

  • White Papers // Jun 2010

    Security on Fragile and Semi-Fragile Watermarks Authentication

    Digital image manipulation software is now readily available on personal computers. It is therefore very simple to tamper with any image and make it available to others. Ensuring digital image security has therefore become a major issue. Watermarking has become a popular technique for copyright enforcement and image authentication. The...

    Provided By Hannam university

  • White Papers // Apr 2010

    Use of Artificial Neural Network in Pattern Recognition

    Among the various traditional approaches of pattern recognition the statistical approach has been most intensively studied and used in practice. More recently, the addition of artificial neural network techniques theory have been receiving significant attention. The design of a recognition system requires careful attention to the following issues: definition of...

    Provided By Hannam university

  • White Papers // Jan 2010

    Design and Implementation of a Distributed Early Warning System Combined with Intrusion Detection System and Honeypot

    Network attack and defense is a never-ending war. Along with the rapid development of the Internet, network attacks have increased and diversified. Use of traditional firewall and intrusion detection technologies cannot match to this rapid change. In response to this trend, the authors designed and implemented a distributed early warning...

    Provided By Hannam university

  • White Papers // Jan 2010

    Review: Distributed System Network Architecture for Securing SCADA System

    Intentional and unintentional cyber threats are an ever-present risk for such critical infrastructures and for businesses that rely on 100 percent uptime of their operational facilities. The need for remote monitoring, control, maintenance, and data access have resulted in many Supervisory Control and Data Acquisition (SCADA) systems and Distributed Control...

    Provided By Hannam university

  • White Papers // Jan 2010

    Review: Security Threats for RFID-Sensor Network Anti-Collision Protocol

    The limitless possibilities and low cost are the reasons Radio Frequency IDentification (RFID) systems are used in a variety of applications to uniquely identify physical objects. The operation of RFID systems often involves a situation in which numerous tags are present in the interrogation zone of a single reader at...

    Provided By Hannam university

  • White Papers // Nov 2009

    Wi Fi Protected Access-Pre-Shared Key Hybrid Algorithm

    Potentially large number of cryptography solutions to attain security is widely known and recognized. Looking for a stronger scheme is the aim of most researchers to hide valuable information from each other. In this information age, many encryption algorithms exist to help keep information secure and these algorithms vary in...

    Provided By Hannam university

  • White Papers // Oct 2009

    A Strategy of the Electronic Business as a Way to a Successful Competition

    This paper is devoted to discussion of development of the electronic business. The features of the electronic business are described. Some advantages of the electronic business in enterprises are shown. The modern business is characterized by constant growing of global competition and increasing level requirements of customers. The role of...

    Provided By Hannam university

  • White Papers // Oct 2009

    Application of Genetic Algorithm in Software Testing

    This paper presents a method for optimizing software testing efficiency by identifying the most critical path clusters in a program. The authors do this by developing variable length Genetic Algorithms that optimize and select the software path clusters which are weighted in accordance with the criticality of the path. Exhaustive...

    Provided By Hannam university

  • White Papers // Sep 2009

    A Study on the Connectivity of IPv6 to IPv4 Domains and Its Security Issues

    The Current Internet Protocol, Version 4, Known as IPv4, Poses Several Problems Such as Impending Exhaustion of Its Address Space, Configuration and Complexities Due to Rapid Growth of the Internet and Emerging New Technologies. As a Result, IETF Developed the Next Generation IP, Called IPv6, to Not Only Eliminate the...

    Provided By Hannam university

  • White Papers // Sep 2009

    Biometric Authentication: A Review

    Advances in the field of Information Technology also make Information Security an inseparable part of it. In order to deal with security, Authentication plays an important role. This paper presents a review on the biometric authentication techniques and some future possibilities in this field. In biometrics, a human being needs...

    Provided By Hannam university

  • White Papers // Sep 2009

    A Heuristic Approach for Mobile Phone Bases Information Management System in Wireless Sensor Network

    Mobile Phone based Information Management in Wireless Sensor Network is a heuristic approach where mobile phone will be the main access point of information in Wireless Sensor Network. The system will be as simple as possible providing all the facilities those are available in internet while managing information regarding this....

    Provided By Hannam university

  • White Papers // Aug 2009

    Model of Business Service Management With Security Approach

    Information is an essential resource for all businesses today and is the key to growth and success. However, it needs to ensure that the information held on IT systems is secure. The impact of a security breach may be far greater than it would expect. The loss of sensitive or...

    Provided By Hannam university

  • White Papers // Jul 2009

    EVGATOR - An Enhanced Visualization Simulator for Multimedia Networking Protocol Analysis

    When developing or analyzing communication network protocols, it is often necessary to study pathological scenarios that may cause protocol performance problems. In this regard, it is well known that detailed protocol simulations are indispensable complements to formal protocol analysis and a number of powerful simulation environments are now available to...

    Provided By Hannam university

  • White Papers // Jun 2009

    Face Recognition Using Radial Basis Function Network Based on LDA

    This paper describes a method to improve the robustness of a face recognition system based on the combination of two compensating classifiers. The face images are preprocessed by the appearance-based statistical approaches such as Principal Component Analysis (PCA) and Linear Discriminant Analysis (LDA). LDA features of the face image are...

    Provided By Hannam university

  • White Papers // Jun 2009

    A Quality of Service Strategy to Select Coding Schemes in General Packet Radio Service System

    The internet is used for wide variety of applications in wired, fixed wireless and mobile wireless environment. The requirements of one application / environment will vary from another application / environment. The challenge for the service provider is Quality of Service (QoS). The wired network has less complexity compared to...

    Provided By Hannam university

  • White Papers // Jun 2009

    ES-FHMIPv6: An Efficient Scheme for Fast Handover Over HMIPv6 Networks

    The Hierarchical Mobile IPv6 (HMIPv6) has been proposed by IETF to reduce registration control signaling. It separates micro-mobility from macro-mobility with the help of an intermediate mobility agent, called the Mobility Anchor Point (MAP), and exploits a Mobile Node's (MN's) spatial locality. However, in HMIPv6, the handover process reveals numerous...

    Provided By Hannam university

  • White Papers // Feb 2009

    Text Steganography: A Novel Approach

    In this paper, a security model is proposed which imposes the concept of secrecy over privacy for text messages. In the recent years, they have plenty of security tools which are developed to protect the transmission of multimedia objects. But approaches for the security of text messages are comparatively less....

    Provided By Hannam university

  • White Papers // Jan 2009

    SOX and Its Effects on IT Security Governance

    The Sarbanes-Oxley (SOX) Act is a United States federal law enacted on July 30, 2002 in response to a number of major corporate and accounting scandals including those affecting Enron, Tyco International, Adelphia, Peregrine Systems and WorldCom. This paper discusses the effects of Sarbanes-Oxley (SOX) Act on corporate information security...

    Provided By Hannam university

  • White Papers // Sep 2009

    A Study on the Connectivity of IPv6 to IPv4 Domains and Its Security Issues

    The Current Internet Protocol, Version 4, Known as IPv4, Poses Several Problems Such as Impending Exhaustion of Its Address Space, Configuration and Complexities Due to Rapid Growth of the Internet and Emerging New Technologies. As a Result, IETF Developed the Next Generation IP, Called IPv6, to Not Only Eliminate the...

    Provided By Hannam university

  • White Papers // Oct 2012

    A Design Methodology of Advanced-PEPs Architecture for TCP Satellite Connection and Bandwidth Management

    In the network environment of the Internet and Intranet, Transmission Control Protocol (TCP) is Representative application of transport layer protocols. TCP based network specific environment and other upper-layer protocol performance should be limited according to link feature. To solve these problems for typical techniques is Enhanced-TCP based which use PEP....

    Provided By Hannam university

  • White Papers // Oct 2012

    Various Factor Comparison of DRAM-SSD and HDD Using TPC-H Benchmark

    Recently, Users needed storage for processing high-capacity data. Meanwhile, the HDD was used primarily as storage device, but SSD was developed as a fast access device. So, the use of SSD increased a lot of capacity-process. Using a SAN Switch, the authors tested in order to resolve data process faster....

    Provided By Hannam university

  • White Papers // Nov 2012

    Security Framework Design Intended for Networked Devices

    As more organizations and businesses are using computer networks and the Internet, the need for a secure computing environment must also be increased. The need for a secure computing environment must be tightened as more and more organizations and businesses are using computer networks and the Internet. A secure computing...

    Provided By Hannam university

  • White Papers // Aug 2010

    Dissolving Active Networks Privacy Threats and Vulnerabilities

    In current generation information society has been governed by a collection of huge amounts of information and services that provides convenience to people. However, IMS (Identity Management Systems) have been crucial as the information society is getting bigger. IMS provides a description of the infrastructure within one or between several...

    Provided By Hannam university

  • White Papers // Dec 2008

    Vulnerabilities in SCADA and Critical Infrastructure Systems

    Critical Infrastructures are so vital that a damage or breakage of it will greatly affect the society and economy. SCADA systems play a big role on Critical Infrastructure since most of these infrastructures are controlled systems. Presented in this paper are the vulnerabilities of a SCADA system, its effect to...

    Provided By Hannam university

  • White Papers // Sep 2011

    Profile for Effective Service Management on Mobile Cloud Computing

    Mobile Cloud Computing has become as a new IT paradigm because of the growth of mobile device like smartphone and appearance of Cloud Computing environment. This mobile cloud environment provides various services and IT resources according to users' requests, so an effective management of service and IT resources is required....

    Provided By Hannam university

  • White Papers // Sep 2011

    Context Model Based on Ontology in Mobile Cloud Computing

    Mobile Cloud Computing has become as a new IT paradigm because of the growth of mobile device like smartphone and appearance of Cloud Computing environment. This mobile cloud environment provides various services and IT resources according to users' requests, so an effective management of service and IT resources is required....

    Provided By Hannam university

  • White Papers // Mar 2013

    A Study on Analysis and Implementation of a Cloud Computing Framework for Multimedia Convergence Services

    The emergence of cloud computing brought a significant change for the delivery of how Information Technology to educational and business enterprises. In this paper, the authors discuss the different qualities of cloud computing frameworks together with the expectations and promises of cloud computing and associated benefits. The design of a...

    Provided By Hannam university

  • White Papers // Jul 2008

    Wireless Network Security: Vulnerabilities, Threats and Countermeasures

    Wireless networking provides many advantages, but it also coupled with new security threats and alters the organization's overall information security risk profile. Although implementation of technological solutions is the usual respond to wireless security threats and vulnerabilities, wireless security is primarily a management issue. Effective management of the threats associated...

    Provided By Hannam university

  • White Papers // Nov 2008

    IRIS Texture Analysis and Feature Extraction for Biometric Pattern Recognition

    This paper proposes a new biometric-based Iris feature extraction system. The system automatically acquires the biometric data in numerical format (Iris Images) by using a set of properly located sensors. It is considering camera as a high quality sensor. Iris Images are typically color images that are processed to gray...

    Provided By Hannam university

  • White Papers // Aug 2009

    Model of Business Service Management With Security Approach

    Information is an essential resource for all businesses today and is the key to growth and success. However, it needs to ensure that the information held on IT systems is secure. The impact of a security breach may be far greater than it would expect. The loss of sensitive or...

    Provided By Hannam university

  • White Papers // Jan 2009

    SOX and Its Effects on IT Security Governance

    The Sarbanes-Oxley (SOX) Act is a United States federal law enacted on July 30, 2002 in response to a number of major corporate and accounting scandals including those affecting Enron, Tyco International, Adelphia, Peregrine Systems and WorldCom. This paper discusses the effects of Sarbanes-Oxley (SOX) Act on corporate information security...

    Provided By Hannam university

  • White Papers // Nov 2009

    Wi Fi Protected Access-Pre-Shared Key Hybrid Algorithm

    Potentially large number of cryptography solutions to attain security is widely known and recognized. Looking for a stronger scheme is the aim of most researchers to hide valuable information from each other. In this information age, many encryption algorithms exist to help keep information secure and these algorithms vary in...

    Provided By Hannam university

  • White Papers // Sep 2009

    Biometric Authentication: A Review

    Advances in the field of Information Technology also make Information Security an inseparable part of it. In order to deal with security, Authentication plays an important role. This paper presents a review on the biometric authentication techniques and some future possibilities in this field. In biometrics, a human being needs...

    Provided By Hannam university

  • White Papers // Jan 2010

    Review: Distributed System Network Architecture for Securing SCADA System

    Intentional and unintentional cyber threats are an ever-present risk for such critical infrastructures and for businesses that rely on 100 percent uptime of their operational facilities. The need for remote monitoring, control, maintenance, and data access have resulted in many Supervisory Control and Data Acquisition (SCADA) systems and Distributed Control...

    Provided By Hannam university

  • White Papers // Jun 2009

    Face Recognition Using Radial Basis Function Network Based on LDA

    This paper describes a method to improve the robustness of a face recognition system based on the combination of two compensating classifiers. The face images are preprocessed by the appearance-based statistical approaches such as Principal Component Analysis (PCA) and Linear Discriminant Analysis (LDA). LDA features of the face image are...

    Provided By Hannam university

  • White Papers // Oct 2009

    A Strategy of the Electronic Business as a Way to a Successful Competition

    This paper is devoted to discussion of development of the electronic business. The features of the electronic business are described. Some advantages of the electronic business in enterprises are shown. The modern business is characterized by constant growing of global competition and increasing level requirements of customers. The role of...

    Provided By Hannam university

  • White Papers // Feb 2009

    Text Steganography: A Novel Approach

    In this paper, a security model is proposed which imposes the concept of secrecy over privacy for text messages. In the recent years, they have plenty of security tools which are developed to protect the transmission of multimedia objects. But approaches for the security of text messages are comparatively less....

    Provided By Hannam university

  • White Papers // Nov 2010

    An Empirical Study of Spam and Spam Vulnerable Email Accounts

    Spam messages muddle up users inbox, consume network resources, and build up DDoS attacks, spread malware. The goal is to present a definite figure about the characteristics of spam and spam vulnerable email accounts. These evaluations help one to enhance the existing technology to combat spam effectively. The authors collected...

    Provided By Hannam university

  • White Papers // Oct 2010

    Multi Layer Approach to Defend DDoS Attacks Caused by Spam

    Corporate mail services are designed to perform better than public mail services. Fast mail delivery, large size file transfer as an attachments, high level spam and virus protection, commercial advertisement free environment are some of the advantages worth to mention. But these mail services are frequent target of hackers and...

    Provided By Hannam university

  • White Papers // Oct 2010

    Bayesian Based Comment Spam Defending Tool

    Spam messes up user's inbox, consumes network resources and spread worms and viruses. Spam is flooding of unsolicited, unwanted e mail. Spam in blogs is called blog spam or comment spam. It is done by posting comments or flooding spams to the services such as blogs, forums, news, email archives...

    Provided By Hannam university

  • White Papers // Dec 2008

    Common Threats and Vulnerabilities of Critical Infrastructures

    Critical Infrastructure (CI) is used by governments as a term to describe infrastructures, systems and assets that are essential for the society and economy. Critical Infrastructures are so vital that an incapacity or destruction of such infrastructure, system or assets would have a debilitating impact on security, national economic security,...

    Provided By Hannam university

  • White Papers // Jun 2009

    A Quality of Service Strategy to Select Coding Schemes in General Packet Radio Service System

    The internet is used for wide variety of applications in wired, fixed wireless and mobile wireless environment. The requirements of one application / environment will vary from another application / environment. The challenge for the service provider is Quality of Service (QoS). The wired network has less complexity compared to...

    Provided By Hannam university

  • White Papers // May 2011

    A Study on Crowd Simulation Effects Through Marker-Based Multi-Object Augmentation

    The authors have carried out research on high-speed crowd simulation effects through marker-based multi-object augmentation as the basis for a crowd scene processing system that can produce natural movement of a crowd with less resources and operation. When applied to 3D AR images, this method is expected to achieve high...

    Provided By Hannam university

  • White Papers // Jul 2009

    EVGATOR - An Enhanced Visualization Simulator for Multimedia Networking Protocol Analysis

    When developing or analyzing communication network protocols, it is often necessary to study pathological scenarios that may cause protocol performance problems. In this regard, it is well known that detailed protocol simulations are indispensable complements to formal protocol analysis and a number of powerful simulation environments are now available to...

    Provided By Hannam university

  • White Papers // Oct 2009

    Application of Genetic Algorithm in Software Testing

    This paper presents a method for optimizing software testing efficiency by identifying the most critical path clusters in a program. The authors do this by developing variable length Genetic Algorithms that optimize and select the software path clusters which are weighted in accordance with the criticality of the path. Exhaustive...

    Provided By Hannam university

  • White Papers // Jan 2010

    Review: Security Threats for RFID-Sensor Network Anti-Collision Protocol

    The limitless possibilities and low cost are the reasons Radio Frequency IDentification (RFID) systems are used in a variety of applications to uniquely identify physical objects. The operation of RFID systems often involves a situation in which numerous tags are present in the interrogation zone of a single reader at...

    Provided By Hannam university

  • White Papers // Jun 2009

    ES-FHMIPv6: An Efficient Scheme for Fast Handover Over HMIPv6 Networks

    The Hierarchical Mobile IPv6 (HMIPv6) has been proposed by IETF to reduce registration control signaling. It separates micro-mobility from macro-mobility with the help of an intermediate mobility agent, called the Mobility Anchor Point (MAP), and exploits a Mobile Node's (MN's) spatial locality. However, in HMIPv6, the handover process reveals numerous...

    Provided By Hannam university

  • White Papers // Sep 2009

    A Heuristic Approach for Mobile Phone Bases Information Management System in Wireless Sensor Network

    Mobile Phone based Information Management in Wireless Sensor Network is a heuristic approach where mobile phone will be the main access point of information in Wireless Sensor Network. The system will be as simple as possible providing all the facilities those are available in internet while managing information regarding this....

    Provided By Hannam university

  • White Papers // Jun 2011

    Scheme to Secure Communication of SCADA Master Station and Remote HMI's Through Smart Phones

    SCADA is a concept that is used to refer to the management and procurement of data that can be used in developing process management criteria. The use of the term SCADA varies, depending on location. Conventionally, SCADA is connected only in a limited private network. Later on, SCADA was connected...

    Provided By Hannam university

  • White Papers // Oct 2011

    Devising an Optimal Scheme for Wireless Sensors for Patient Report Tracking and Monitoring in Ubiquitous Healthcare

    Distributed wireless sensor network technologies have become one of the major research areas in healthcare industries due to rapid maturity in improving the quality of life. The implementation of ubiquitous healthcare systems provides rich contextual information and warning mechanisms against abnormal conditions with continual and remote monitoring of patients. This...

    Provided By Hannam university

  • White Papers // Jan 2012

    Reducing Packet Loss for Mobile IPv6 Fast Handover (FMIPv6)

    Mobile IPv6 enables a mobile node to maintain its connectivity to the Internet when moving from one Access Router to another, a process referred to as handover. Handover involves link switching, which may not be exactly coordinated with fast handover signaling. The arrival pattern of packets is dependent on many...

    Provided By Hannam university

  • White Papers // Apr 2010

    Use of Artificial Neural Network in Pattern Recognition

    Among the various traditional approaches of pattern recognition the statistical approach has been most intensively studied and used in practice. More recently, the addition of artificial neural network techniques theory have been receiving significant attention. The design of a recognition system requires careful attention to the following issues: definition of...

    Provided By Hannam university

  • White Papers // Jan 2012

    Implementation of Cipher Block Chaining in Wireless Sensor Networks for Security Enhancement

    Wireless Sensor Networks have been a great effect in the people real life. With its various types of applications WSN is also a matter of concern for its existing vulnerabilities. To prevent those loopholes, the authors need to provide some effective mechanism for providing better security and authentication issues. Wireless...

    Provided By Hannam university

  • White Papers // Oct 2012

    An Enhanced Packet Buffering Transmission (EPBT) Architecture Design for Performance Enhancing Proxies (PEPs)

    Transmission Control Protocol (TCP) is widely used for the transport layer protocol in most Internet and Intranet applications. The link characteristics of a specific link environment such as satellite has been limited and degraded by its link characteristics. To address such limitations Performance Enhancing Proxies (PEPs) have been designed and...

    Provided By Hannam university

  • White Papers // Jun 2010

    Security on Fragile and Semi-Fragile Watermarks Authentication

    Digital image manipulation software is now readily available on personal computers. It is therefore very simple to tamper with any image and make it available to others. Ensuring digital image security has therefore become a major issue. Watermarking has become a popular technique for copyright enforcement and image authentication. The...

    Provided By Hannam university

  • White Papers // Nov 2010

    Research on a Denial of Service (DoS) Detection System Based on Global Interdependent Behaviors in a Sensor Network Environment

    In this paper, the authors suggest a Denial of Service (DoS) detection method based on the collection of interdependent behavior data in a sensor network environment. In order to collect the interdependent behavior data, they use a base station to analyze traffic and behaviors among nodes and introduce methods of...

    Provided By Hannam university

  • White Papers // Jan 2010

    Design and Implementation of a Distributed Early Warning System Combined with Intrusion Detection System and Honeypot

    Network attack and defense is a never-ending war. Along with the rapid development of the Internet, network attacks have increased and diversified. Use of traditional firewall and intrusion detection technologies cannot match to this rapid change. In response to this trend, the authors designed and implemented a distributed early warning...

    Provided By Hannam university

  • White Papers // Dec 2010

    Securing Communication of SCADA Components in Smart Grid Environment

    SCADA is a process control systems, designed to automate systems such as traffic control, power grid management, waste processing etc. Conventionally, SCADA is connected only in a limited private network because SCADA is considered a critical infrastructure, and connecting to the internet may put the society on jeopardy, SCADA operators...

    Provided By Hannam university