Harbin Institute of Technology

Displaying 1-30 of 30 results

  • White Papers // Jan 2014

    Design of Data Archive in Virtual Test Architecture

    Combined with the new demands in test and training field, the authors proposed a new architecture HIT-TENA according to HLA and TENA architecture. In order to manage all kinds of test data in HIT-TENA, they designed a four-tiered hierarchical HIT-TENA data archive. This paper introduces the construction of data archive...

    Provided By Harbin Institute of Technology

  • White Papers // Dec 2013

    A Survey on Tree Edit Distance Lower Bound Estimation Techniques for Similarity Join on XML Data

    When integrating tree-structured data from autonomous and heterogeneous sources, exact joins often fail for the same object may be represented differently. Approximate join techniques are often used, in which similar trees are considered describing the same real-world object. A commonly accepted metric to evaluate tree similarity is the tree edits...

    Provided By Harbin Institute of Technology

  • White Papers // Jun 2013

    Hybrid Group Decoding for Scalable Video over MIMO-OFDM Downlink Systems

    The authors propose a scalable video broadcasting scheme over MIMO-OFDM systems. The scalable video source layers are channel encoded and modulated into independent signal streams, which are then transmitted from the allocated antennas in certain time-frequency blocks. Each receiver employs the successive group decoder to decode the signal streams of...

    Provided By Harbin Institute of Technology

  • White Papers // May 2013

    Hash-Based RFID Mutual Authentication Protocol

    With the development and application of RFID technology in Internet Of Things (IOT), RFID system plays a more and more important role on privacy protection and information security of users. For the safety need of RFID system and the existing shortage of secure authentication protocols, the authors offer RFID mutual...

    Provided By Harbin Institute of Technology

  • White Papers // May 2013

    A Method of Threat Evaluation for Mobile Network

    Along with the development of the computer technology and the prevalence of Internet, computer has become more important in the people's life. At the same time, the threat for the mobile network is increasing steadily. Mobile network is just like the sword with two blades. It benefits the scientific researcher,...

    Provided By Harbin Institute of Technology

  • White Papers // May 2013

    Fault Localization Method of Software Defects based on Dependencies Analysis of Program Structure

    Software defects are the major risks of system stable operation. Its error localization technology of automation is one of the key research content for trust computing and software assurance. In this paper, the authors have proposed a new model, which integrates the current methods by analyzing the program structure. They...

    Provided By Harbin Institute of Technology

  • White Papers // May 2013

    Design and Implementation of a Network Attack Platform Based on Plug-in Technology

    In recent years, a large number of network security tools appear constantly. However, they all in the cohabitation of the state. This paper designed a network attack platform based on plug-in technology; the prototype system has good interactivity and scalability. The system can guide the platform operator to complete a...

    Provided By Harbin Institute of Technology

  • White Papers // Apr 2013

    A Fault Detection Technique Based on Numerical Taxonomy in WSNs

    Failures are inevitable in wireless sensor networks due to the fragile features and unattended deployment. To explore an effectual technique for node's fault detection caused by energy consumption, a new algorithm, Fault Detection Technique based on Numerical Taxonomy (FDNT) is proposed in this paper. The algorithm is deployed on the...

    Provided By Harbin Institute of Technology

  • White Papers // Apr 2013

    Congestion-assessment and Hybrid Routing Protocol for Vehicular Ad Hoc Network

    In Vehicular Ad hoc NETwork (VANET), nodes have to cooperate to forward each other's packets through the networks. Every node, including source and intermediate nodes, has a fair opportunity to transmit a packet. Consequence, the hot spot may incur traffic congestion. The packet loss rate and the transmission delay are...

    Provided By Harbin Institute of Technology

  • White Papers // Apr 2013

    A Two-level Application Transparent Checkpointing Scheme in Cloud Computing Environment

    Cloud computing has been widely applied to a wide variety of computing environments, with the traditional distributed computing environment, cloud computing using virtual machines to achieve dynamic resource partitioning. Checkpoint recovery technology is a low-cost method to improve the system availability. This paper analyzes the characteristics of cloud computing, virtualization...

    Provided By Harbin Institute of Technology

  • White Papers // Apr 2013

    IOT Secure Transmission Based on Integration of IBE and PKI/CA

    With the rapid development in internet of thing technology, the security issues have become increasingly prominent. There are many problems and shortcomings in applying current security mechanisms to the internet of thing. In this paper the authors build network security architecture by presenting combination of IBE and PKI/CA in the...

    Provided By Harbin Institute of Technology

  • White Papers // Jan 2013

    An Empirical Study on Improving Shared Understanding of Requirements in GSD

    To investigate the role of clear organizational structure with communicating responsibilities, a practice of Knowledge Management, in developing shared understanding of requirements in GSD-an area that is very important but has, to date, not been addressed adequately. Design/methodology/approach - a controlled experiment was performed in an academic setting with two...

    Provided By Harbin Institute of Technology

  • White Papers // Nov 2012

    Soft Network Coding Design in Two-Way Relay Channel

    In this paper a low complexity network coding scheme in TWRC is proposed. This scheme is based on soft information and employs Soft-Input Hard-Output (SIHO) channel decoding and designs detailed structures in source node, relay node and destination node. In design of SIHO decoder, Lloyd-Max quantizer and equal probability quantizer...

    Provided By Harbin Institute of Technology

  • White Papers // Jul 2012

    Survey and Comparison for Open and Closed Sources in Cloud Computing

    Cloud computing is a new technology widely studied in recent years. Now there are many cloud platforms both in industry and in academic circle. How to understand and use these platforms is a big issue. A detailed comparison has been presented in this paper focused on the aspects such as...

    Provided By Harbin Institute of Technology

  • White Papers // May 2012

    A Novel Collaborative Navigation Architecture Based on Decentralized and Distributed Ad-Hoc Networks

    To provide services for other applications, promoting the availability of Global Positioning System (GPS) is very important. While in the urban environments or with the high power malicious interference, GPS signal is shaded by buildings or overwhelmed by interference. Hence the receivers may not acquire correct Pseudo Random Noise (PRN)...

    Provided By Harbin Institute of Technology

  • White Papers // Mar 2012

    Signal Perturbation Based Support Vector Regression for Wi-Fi Positioning

    Location estimation using Received Signal Strength (RSS) in pervasively available Wi-Fi infrastructures has been considered as a popular indoor positioning solution. However, accuracy deterioration due to uncertainty of RSS and offline manual calibration cost limit the deployment of Wi-Fi positioning systems. This paper proposes a signal perturbation technique to enhance...

    Provided By Harbin Institute of Technology

  • White Papers // Feb 2012

    A Multimedia Digital Fingerprinting Scheme for Resisting Average Attack

    Digital fingerprinting achieves piracy tracing through embedding a unique serial number called fingerprint into each distributed digital copy secretly. Once an unauthorized content copy is discovered somewhere, the embedded fingerprint can uniquely identify the source of the pirated copy. How to defense collusive attack is one of the key problems...

    Provided By Harbin Institute of Technology

  • White Papers // Aug 2011

    Making Aggregation Scheduling Usable in Wireless Sensor Networks: An Opportunistic Approach

    The problem of aggregation scheduling in wireless sensor networks is widely studied in order to minimize aggregation latency and prevent collisions. Many aggregation scheduling algorithms have been designed for time-critical applications. However, all of the existing work on aggregation scheduling suffers from packet losses due to the lossy links in...

    Provided By Harbin Institute of Technology

  • White Papers // Jun 2011

    Encrypting More Information in Visual Cryptography Scheme

    The Visual Cryptography Scheme (VCS) is a scheme which encodes a secret image into several shares, and only qualified sets of shares can recover the secret image visually, other sets of shares cannot get any information about the content of the secret image. From the point of view of encrypting...

    Provided By Harbin Institute of Technology

  • White Papers // Apr 2011

    Minimum-Time Aggregation Scheduling in Multi-Sink Sensor Networks

    Wireless sensor networks have been deployed in various applications such as battlefield surveillance and traffic monitoring. Data aggregation is an essential operation in sensor networks and has been well studied in recent years. Data aggregation means that each sensor node sends a packet up to the sink (also called base...

    Provided By Harbin Institute of Technology

  • White Papers // Dec 2010

    Topological Queries on Graph-Structured XML Data: Models and Implementations

    In many applications, data is in graph structure, which can be naturally represented as graph-structured XML. Existing queries defined on tree-structured and graph-structured XML data mainly focus on subgraph matching, which can not cover all the requirements of querying on graph. In this paper, a new kind of queries, topological...

    Provided By Harbin Institute of Technology

  • White Papers // Dec 2010

    Directed Factor Graph Based Fault Diagnosis Model Construction for Mode Switching Satellite Power System

    Satellite power system is a complex, highly interconnected hybrid system that exhibit nonlinear and mode switching behaviors. Directed factor graph is an inference model for fault diagnosis using probabilistic reasoning techniques. A novel approach for constructing the directed factor graph structure based on hybrid bond graph model is proposed. The...

    Provided By Harbin Institute of Technology

  • White Papers // Aug 2010

    XML Data Management in Compressed Relational Database

    XML is an important standard of data exchange and representation. As a mature database system, using relational database to support XML data may bring some advantages. But storing XML in relational database has obvious redundancy that wastes disk space, bandwidth and disk I/O when querying XML data. For the efficiency...

    Provided By Harbin Institute of Technology

  • White Papers // Mar 2010

    A Fast Timing-Accurate MPSoC HW/SW Co-Simulation Platform Based on a Novel Synchronization Scheme

    Fast and accurate full-system simulation is needed for MPSoC design space exploration to achieve tight time-to-market design goals. In the field of full-system simulation, transaction level modeling with SystemC and traditional instruction set simulators (e.g., M5) based on C/C++ has their own advantages, separately. In this paper, a novel method...

    Provided By Harbin Institute of Technology

  • White Papers // Jan 2010

    Randomness Testing of Compressed Data

    Random Number Generators play a critical role in a number of important applications. In practice, statistical testing is employed to gather evidence that a generator indeed produces numbers that appear to be random. In this paper, the authors reports on the studies that were conducted on the compressed data using...

    Provided By Harbin Institute of Technology

  • White Papers // Oct 2009

    The Block Lossless Data Compression Algorithm

    The mainstream lossless data compression algorithms have been extensively studied in recent years. However, rather less attention has been paid to the block algorithm of those algorithms. The aim of this study was therefore to investigate the block performance of those methods. The main idea of this paper is to...

    Provided By Harbin Institute of Technology

  • White Papers // Jun 2009

    An Efficient Algorithm for Reliability Lower Bound of Distributed Systems

    The reliability of distributed systems and computer networks have been modeled by a probabilistic network or a graph G. Computing the Residual Connectedness Reliability (RCR), denoted by R (G), under the node fault model is very useful, but is an NP-hard problem. Since it may need exponential time of the...

    Provided By Harbin Institute of Technology

  • White Papers // Jan 2009

    Language Based Information Routing Security: Policy Enforcement

    Languages-based security promises to be a powerful tool with which provably secure routing applications may be developed. Programs written in these languages enforce a strong policy of non-interference, which ensures that high-security data will not be observable on low-security channels. The information routing security proposed aims to fill the gap...

    Provided By Harbin Institute of Technology

  • White Papers // Nov 2008

    3D Cardiac MRI Data Visualization Based on Volume Data Preprocessing and Transfer Function Design

    The diversity and complexity of cardiac tissues makes it very challenging to visualize 3D cardiac Magnetic Resonance Image (MRI) data. This paper proposed an adaptive volume data preprocessing approach, and used a semi-automated transfer function for volume rendering of the pre-processed cardiac MRI data. To improve the quality of 3D...

    Provided By Harbin Institute of Technology

  • White Papers // Mar 2006

    A Log-based and Traceability-Oriented Business Object Association Model for Code Generation

    Modern enterprises are in a rapidly and violently changing business environment, which leads to frequent changes on management patterns and business processes of enterprises. Building well-designed business models is a key step to implement agilely reconfigurable Enterprise Software and Applications (ESA) to adapt to rapid changes in business environments. Traditional...

    Provided By Harbin Institute of Technology

  • White Papers // Jan 2013

    An Empirical Study on Improving Shared Understanding of Requirements in GSD

    To investigate the role of clear organizational structure with communicating responsibilities, a practice of Knowledge Management, in developing shared understanding of requirements in GSD-an area that is very important but has, to date, not been addressed adequately. Design/methodology/approach - a controlled experiment was performed in an academic setting with two...

    Provided By Harbin Institute of Technology

  • White Papers // Apr 2013

    A Fault Detection Technique Based on Numerical Taxonomy in WSNs

    Failures are inevitable in wireless sensor networks due to the fragile features and unattended deployment. To explore an effectual technique for node's fault detection caused by energy consumption, a new algorithm, Fault Detection Technique based on Numerical Taxonomy (FDNT) is proposed in this paper. The algorithm is deployed on the...

    Provided By Harbin Institute of Technology

  • White Papers // Apr 2013

    Congestion-assessment and Hybrid Routing Protocol for Vehicular Ad Hoc Network

    In Vehicular Ad hoc NETwork (VANET), nodes have to cooperate to forward each other's packets through the networks. Every node, including source and intermediate nodes, has a fair opportunity to transmit a packet. Consequence, the hot spot may incur traffic congestion. The packet loss rate and the transmission delay are...

    Provided By Harbin Institute of Technology

  • White Papers // Apr 2013

    A Two-level Application Transparent Checkpointing Scheme in Cloud Computing Environment

    Cloud computing has been widely applied to a wide variety of computing environments, with the traditional distributed computing environment, cloud computing using virtual machines to achieve dynamic resource partitioning. Checkpoint recovery technology is a low-cost method to improve the system availability. This paper analyzes the characteristics of cloud computing, virtualization...

    Provided By Harbin Institute of Technology

  • White Papers // Jun 2013

    Hybrid Group Decoding for Scalable Video over MIMO-OFDM Downlink Systems

    The authors propose a scalable video broadcasting scheme over MIMO-OFDM systems. The scalable video source layers are channel encoded and modulated into independent signal streams, which are then transmitted from the allocated antennas in certain time-frequency blocks. Each receiver employs the successive group decoder to decode the signal streams of...

    Provided By Harbin Institute of Technology

  • White Papers // Oct 2009

    The Block Lossless Data Compression Algorithm

    The mainstream lossless data compression algorithms have been extensively studied in recent years. However, rather less attention has been paid to the block algorithm of those algorithms. The aim of this study was therefore to investigate the block performance of those methods. The main idea of this paper is to...

    Provided By Harbin Institute of Technology

  • White Papers // Nov 2008

    3D Cardiac MRI Data Visualization Based on Volume Data Preprocessing and Transfer Function Design

    The diversity and complexity of cardiac tissues makes it very challenging to visualize 3D cardiac Magnetic Resonance Image (MRI) data. This paper proposed an adaptive volume data preprocessing approach, and used a semi-automated transfer function for volume rendering of the pre-processed cardiac MRI data. To improve the quality of 3D...

    Provided By Harbin Institute of Technology

  • White Papers // Aug 2010

    XML Data Management in Compressed Relational Database

    XML is an important standard of data exchange and representation. As a mature database system, using relational database to support XML data may bring some advantages. But storing XML in relational database has obvious redundancy that wastes disk space, bandwidth and disk I/O when querying XML data. For the efficiency...

    Provided By Harbin Institute of Technology

  • White Papers // Jan 2010

    Randomness Testing of Compressed Data

    Random Number Generators play a critical role in a number of important applications. In practice, statistical testing is employed to gather evidence that a generator indeed produces numbers that appear to be random. In this paper, the authors reports on the studies that were conducted on the compressed data using...

    Provided By Harbin Institute of Technology

  • White Papers // Dec 2010

    Directed Factor Graph Based Fault Diagnosis Model Construction for Mode Switching Satellite Power System

    Satellite power system is a complex, highly interconnected hybrid system that exhibit nonlinear and mode switching behaviors. Directed factor graph is an inference model for fault diagnosis using probabilistic reasoning techniques. A novel approach for constructing the directed factor graph structure based on hybrid bond graph model is proposed. The...

    Provided By Harbin Institute of Technology

  • White Papers // Jan 2009

    Language Based Information Routing Security: Policy Enforcement

    Languages-based security promises to be a powerful tool with which provably secure routing applications may be developed. Programs written in these languages enforce a strong policy of non-interference, which ensures that high-security data will not be observable on low-security channels. The information routing security proposed aims to fill the gap...

    Provided By Harbin Institute of Technology

  • White Papers // Dec 2010

    Topological Queries on Graph-Structured XML Data: Models and Implementations

    In many applications, data is in graph structure, which can be naturally represented as graph-structured XML. Existing queries defined on tree-structured and graph-structured XML data mainly focus on subgraph matching, which can not cover all the requirements of querying on graph. In this paper, a new kind of queries, topological...

    Provided By Harbin Institute of Technology

  • White Papers // Jun 2009

    An Efficient Algorithm for Reliability Lower Bound of Distributed Systems

    The reliability of distributed systems and computer networks have been modeled by a probabilistic network or a graph G. Computing the Residual Connectedness Reliability (RCR), denoted by R (G), under the node fault model is very useful, but is an NP-hard problem. Since it may need exponential time of the...

    Provided By Harbin Institute of Technology

  • White Papers // Jun 2011

    Encrypting More Information in Visual Cryptography Scheme

    The Visual Cryptography Scheme (VCS) is a scheme which encodes a secret image into several shares, and only qualified sets of shares can recover the secret image visually, other sets of shares cannot get any information about the content of the secret image. From the point of view of encrypting...

    Provided By Harbin Institute of Technology

  • White Papers // Feb 2012

    A Multimedia Digital Fingerprinting Scheme for Resisting Average Attack

    Digital fingerprinting achieves piracy tracing through embedding a unique serial number called fingerprint into each distributed digital copy secretly. Once an unauthorized content copy is discovered somewhere, the embedded fingerprint can uniquely identify the source of the pirated copy. How to defense collusive attack is one of the key problems...

    Provided By Harbin Institute of Technology

  • White Papers // Mar 2010

    A Fast Timing-Accurate MPSoC HW/SW Co-Simulation Platform Based on a Novel Synchronization Scheme

    Fast and accurate full-system simulation is needed for MPSoC design space exploration to achieve tight time-to-market design goals. In the field of full-system simulation, transaction level modeling with SystemC and traditional instruction set simulators (e.g., M5) based on C/C++ has their own advantages, separately. In this paper, a novel method...

    Provided By Harbin Institute of Technology

  • White Papers // Aug 2011

    Making Aggregation Scheduling Usable in Wireless Sensor Networks: An Opportunistic Approach

    The problem of aggregation scheduling in wireless sensor networks is widely studied in order to minimize aggregation latency and prevent collisions. Many aggregation scheduling algorithms have been designed for time-critical applications. However, all of the existing work on aggregation scheduling suffers from packet losses due to the lossy links in...

    Provided By Harbin Institute of Technology

  • White Papers // Apr 2011

    Minimum-Time Aggregation Scheduling in Multi-Sink Sensor Networks

    Wireless sensor networks have been deployed in various applications such as battlefield surveillance and traffic monitoring. Data aggregation is an essential operation in sensor networks and has been well studied in recent years. Data aggregation means that each sensor node sends a packet up to the sink (also called base...

    Provided By Harbin Institute of Technology

  • White Papers // May 2012

    A Novel Collaborative Navigation Architecture Based on Decentralized and Distributed Ad-Hoc Networks

    To provide services for other applications, promoting the availability of Global Positioning System (GPS) is very important. While in the urban environments or with the high power malicious interference, GPS signal is shaded by buildings or overwhelmed by interference. Hence the receivers may not acquire correct Pseudo Random Noise (PRN)...

    Provided By Harbin Institute of Technology

  • White Papers // Mar 2012

    Signal Perturbation Based Support Vector Regression for Wi-Fi Positioning

    Location estimation using Received Signal Strength (RSS) in pervasively available Wi-Fi infrastructures has been considered as a popular indoor positioning solution. However, accuracy deterioration due to uncertainty of RSS and offline manual calibration cost limit the deployment of Wi-Fi positioning systems. This paper proposes a signal perturbation technique to enhance...

    Provided By Harbin Institute of Technology

  • White Papers // Jul 2012

    Survey and Comparison for Open and Closed Sources in Cloud Computing

    Cloud computing is a new technology widely studied in recent years. Now there are many cloud platforms both in industry and in academic circle. How to understand and use these platforms is a big issue. A detailed comparison has been presented in this paper focused on the aspects such as...

    Provided By Harbin Institute of Technology

  • White Papers // Nov 2012

    Soft Network Coding Design in Two-Way Relay Channel

    In this paper a low complexity network coding scheme in TWRC is proposed. This scheme is based on soft information and employs Soft-Input Hard-Output (SIHO) channel decoding and designs detailed structures in source node, relay node and destination node. In design of SIHO decoder, Lloyd-Max quantizer and equal probability quantizer...

    Provided By Harbin Institute of Technology

  • White Papers // May 2013

    Hash-Based RFID Mutual Authentication Protocol

    With the development and application of RFID technology in Internet Of Things (IOT), RFID system plays a more and more important role on privacy protection and information security of users. For the safety need of RFID system and the existing shortage of secure authentication protocols, the authors offer RFID mutual...

    Provided By Harbin Institute of Technology

  • White Papers // May 2013

    A Method of Threat Evaluation for Mobile Network

    Along with the development of the computer technology and the prevalence of Internet, computer has become more important in the people's life. At the same time, the threat for the mobile network is increasing steadily. Mobile network is just like the sword with two blades. It benefits the scientific researcher,...

    Provided By Harbin Institute of Technology

  • White Papers // May 2013

    Fault Localization Method of Software Defects based on Dependencies Analysis of Program Structure

    Software defects are the major risks of system stable operation. Its error localization technology of automation is one of the key research content for trust computing and software assurance. In this paper, the authors have proposed a new model, which integrates the current methods by analyzing the program structure. They...

    Provided By Harbin Institute of Technology

  • White Papers // Jan 2014

    Design of Data Archive in Virtual Test Architecture

    Combined with the new demands in test and training field, the authors proposed a new architecture HIT-TENA according to HLA and TENA architecture. In order to manage all kinds of test data in HIT-TENA, they designed a four-tiered hierarchical HIT-TENA data archive. This paper introduces the construction of data archive...

    Provided By Harbin Institute of Technology

  • White Papers // Mar 2006

    A Log-based and Traceability-Oriented Business Object Association Model for Code Generation

    Modern enterprises are in a rapidly and violently changing business environment, which leads to frequent changes on management patterns and business processes of enterprises. Building well-designed business models is a key step to implement agilely reconfigurable Enterprise Software and Applications (ESA) to adapt to rapid changes in business environments. Traditional...

    Provided By Harbin Institute of Technology

  • White Papers // Dec 2013

    A Survey on Tree Edit Distance Lower Bound Estimation Techniques for Similarity Join on XML Data

    When integrating tree-structured data from autonomous and heterogeneous sources, exact joins often fail for the same object may be represented differently. Approximate join techniques are often used, in which similar trees are considered describing the same real-world object. A commonly accepted metric to evaluate tree similarity is the tree edits...

    Provided By Harbin Institute of Technology

  • White Papers // Apr 2013

    IOT Secure Transmission Based on Integration of IBE and PKI/CA

    With the rapid development in internet of thing technology, the security issues have become increasingly prominent. There are many problems and shortcomings in applying current security mechanisms to the internet of thing. In this paper the authors build network security architecture by presenting combination of IBE and PKI/CA in the...

    Provided By Harbin Institute of Technology

  • White Papers // May 2013

    Design and Implementation of a Network Attack Platform Based on Plug-in Technology

    In recent years, a large number of network security tools appear constantly. However, they all in the cohabitation of the state. This paper designed a network attack platform based on plug-in technology; the prototype system has good interactivity and scalability. The system can guide the platform operator to complete a...

    Provided By Harbin Institute of Technology