Hunan University

Displaying 1-26 of 26 results

  • White Papers // Dec 2013

    The Research on CEP Based on Query Rewriting for CPS

    The authors are entering the era of \"Big data\", and the important data source of which is Cyber Physical System (CPS) data, those data can hardly be processed by present data processing technology. Complex Event Processing (CEP) is the key part of middleware of CPS, which can process the big...

    Provided By Hunan University

  • White Papers // Feb 2013

    A Novel Iterative Clipping and Filtering Technique for PAPR Reduction of OFDM Signals: System Using DCT/IDCT Transform

    Orthogonal Frequency Division Multiplexing (OFDM) is the promising technology for future broadband wireless communication system especially based on multicarrier modulation which make good use of available bandwidth by allocation sub-carriers. The recent interest advances in this technique is mainly due to the recent advances in digital signal processing technology. The...

    Provided By Hunan University

  • White Papers // Dec 2012

    A Visible Obstacle Mobility Model based on Activity Area

    In this paper, the authors present a Visible Obstacle Mobility model Based on Activity Area (VOMBAA) for ad hoc network. Typical examples where the nodes of mobile ad hoc network are human-operated are natural or man-made disasters, military activities and so on. In these scenarios, people don't move random and...

    Provided By Hunan University

  • White Papers // Jul 2012

    SDM: A Stripe-based Data Migration Scheme to Improve the Scalability of RAID-6

    In large scale data storage systems, RAID-6 has received more attention due to its capability to tolerate concurrent failures of any two disks, providing a higher level of reliability. However, a challenging issue is its scalability, or how to efficiently expand the disks. The main reason causing this problem is...

    Provided By Hunan University

  • White Papers // Apr 2012

    Comparison and Analysis of GPGPU and Parallel Computing on Multi-Core CPU

    There are two ways to improve the performance of the algorithm computing, which are general purpose of computation and parallel computation of multi-core CPU. By comparison and analysis, contrast the main difference between them, the authors reach a conclusion that GPU is suitable for processing large-scale data-parallel load of high-density...

    Provided By Hunan University

  • White Papers // Jan 2012

    Handover Necessity Estimation for 4G Heterogeneous Networks

    One of the most challenges of 4G network is to have a unified network of heterogeneous wireless networks. To achieve seamless mobility in such a diverse environment, vertical hand off is still a challenging problem. In many situations handover failures and unnecessary handoffs are triggered causing degradation of services, reduction...

    Provided By Hunan University

  • White Papers // Dec 2011

    Robust Speech Feature Extraction Using the Hilbert Transform Spectrum Estimation Method

    The performance of traditional Mel-Frequency Cepstral Coefficients (MFCC) speech feature extraction method decreases drastically in the complex noisy environment. To improve the performance and robustness of speech recognition system, which is based on spectral envelope estimation method, the minimum distortionless response spectrum MVDR-MFCC (Minimum Variance Distortionless Response-MFCC) feature extraction method...

    Provided By Hunan University

  • White Papers // Nov 2011

    Combined Watermarking Solution for XML Documents

    There is a rapid increase in exchange of data over the internet via XML documents. Due to this immense growth in use of XML format, there are certain issues that need to be addressed. Among them two important are copyrights protection and integrity verification of data, exchanged through XML documents....

    Provided By Hunan University

  • White Papers // Nov 2011

    Multi-Version Two-Phase Locking Protocol Based on Commit-Locking in Real-Time Database

    In order to improve the security of the Real-Time DataBase (RTDB), this paper proposes a Multiversion Two-Phase Locking protocol (M2PL) based on Commit-locking. While guaranteeing the serialization of transactions, through expanding the compatibility of locking, it effectively solves the problems of conflicts in traditional read-write or write-read, and also gives...

    Provided By Hunan University

  • White Papers // Nov 2011

    Special Publicly Verifiable Secret Sharing Scheme for LEO Satellite Networks

    Security and privacy in satellite networks are an important and active research area. A number of challenges are arisen due to the limited computational, storage and communication abilities of typical satellite networks. This paper describes a simple and inexpensive a special Publicly Verifiable Secret Sharing scheme (PVSS) for LEO satellite...

    Provided By Hunan University

  • White Papers // Nov 2011

    An Efficient Approach to Manage IDS Alerts

    Intrusion Detection Systems (IDSs) often appear problematic because of triggering huge number of non interesting alerts which diminish the value and urgency of interesting alerts. An average commercial IDS reports tens of thousands alerts per day. Indentifying the interesting alerts from overwhelming number of alerts is laborious and challenging task....

    Provided By Hunan University

  • White Papers // Nov 2011

    A Tactic Agent Middleware in Wireless Sensor Networks Based on Associative Monitoring Scheme

    The management of Wireless Sensor Networks (WSN) is to maintain the communication resources and effectively control sensing data, considering the energy of nodes and dynamic topology. A tactic-oriented initiative management system based on Mobile Agent was proposed, which can use the tactic agent to control layered networking and realize the...

    Provided By Hunan University

  • White Papers // Nov 2011

    Management of Mobility in the Mobile Wimax

    The main goal of this paper is to improve the QoS in mobile WiMAX, and reduce service interruption in case of delay sensitive traffic during the handover of level 2 of a mobile moving at high speed. To make this realistic assumption, the authors place their selves in a rural...

    Provided By Hunan University

  • White Papers // Oct 2011

    A Novell Security Framework for Web Application and Database

    The internet became one of the most important things in the people world. It's used for everything from communicating, shopping, banking, entertainment, news, getting information and the list goes on and on. For this reason, the developers of the Internet and databases are worrying about web security from malicious users...

    Provided By Hunan University

  • White Papers // Sep 2011

    Energy-Aware Interleaving for Robust Image Transmission Over Visual Sensor Networks

    In wireless visual sensor networks, the effect of transmission losses on the visual quality of images is always varying and depends on the burst loss length. Among the existing transmission error control techniques, interleaving can improve the visual quality of images without redundant data incurred. Conventionally a larger interleaving data...

    Provided By Hunan University

  • White Papers // Aug 2011

    SWP2P: P2P Anonymous Trace System Based on Superposition Watermarking

    A lot of attention has been paid to anonymity due to the users' privacy protection. While Peer-To-Peer (P2P) networks need anonymity capacity, the authority also requires partner traceability to prevent anonymous abuse. So there is a challenge to harmonize the dilemma between the anonymity and authentication in P2P networks. Few...

    Provided By Hunan University

  • White Papers // Jul 2011

    Power Allocation for a Mobile Secondary User in OFDM Based Cognitive Radio

    One of the main challenges in cognitive networks is how to make the Secondary User (SU) obtain maximum capacity and simultaneously ensure that the Primary User (PU) bears the minimum interference during power allocation. In this paper, the authors first presented a general mutual interference case between PUs and SUs...

    Provided By Hunan University

  • White Papers // May 2011

    A Fragile Zero-Watermarking Technique for Authentication of Relational Databases

    The protection of databases integrity is currently a very active research field in digital watermarking. Most of the existing watermarking techniques designed for securing relational databases introduce some distortions to the underlying data during the watermark insertion process. Although these errors are claimed to be minuscule, they inevitably degrade the...

    Provided By Hunan University

  • White Papers // May 2011

    The Design and Evaluation of a Hybrid Compression Technique (HCT) for Wireless Sensor Network

    WSN counted as most important technologies of the century, it is consist of a collection of nodes called Sensor nodes, these nodes are responsible for monitoring and collecting information about different physical phenomena such as heat, humidity, and vibration, light. Certainly that any viable solutions to handle the deficiencies of...

    Provided By Hunan University

  • White Papers // May 2011

    Steganalysis of Syntactic Transformation Based Steganography

    Syntactic Transformation based(ST) steganography performs embedding operations of secret information by meaning-preserving syntactic transformations into sentences of a text. The syntactic transformations caused the difference of the occurrence frequency among different semantically equivalent syntactic structures vary between the cover texts and stego texts. A steganalysis method is therefore proposed using...

    Provided By Hunan University

  • White Papers // May 2011

    A Privacy-Preserving Digital Rights Management Protocol Based on Oblivious Transfer Scheme

    In this paper, the authors propose a privacy-preserving digital rights management protocol based on oblivious transfer theory. Users obtain digital content from the content server freely, and acquire and renew their needed digital licenses by using oblivious transfer manner after charging. The license server can make sure the quantity of...

    Provided By Hunan University

  • White Papers // Feb 2011

    An Automatic Test Database Generation Algorithm Based on RQP

    Software testing is one of key technologies to guarantee quality and reliability of software. Most computer applications are related to database application systems. Test database generation is an important research topic of database application testing. There are a number of commercial tools to automatically generate test databases. These tools take...

    Provided By Hunan University

  • White Papers // Jan 2011

    DWT-PCA (EVD) Based Copy-Move Image Forgery Detection

    In a copy-move image forgery, a part of an image is copied and then pasted on a different location within the same image. Usually, such an image tampering is done with the aim of either hiding some image details, in which case a background is duplicated, or adding more details...

    Provided By Hunan University

  • White Papers // Jan 2011

    A Scheme of PE Virus Detection Using Fragile Software Watermarking Technique

    It is a difficult issue in the anti-virus field about how to detect unknown and packed PE (Portable Executable) viruses effectively, and existing schemes for anti-virus detection are dis-satisfactory. Based on an analysis of the logical structures of Windows PE file and PE virus, a new method of PE virus...

    Provided By Hunan University

  • White Papers // Sep 2010

    Syntax and Semantics for Business Rules

    Business processes are increasingly being expressed in declarative terms, as business rules which express obligations concerning conduct, action, practice or procedure regarding a particular business activity or sphere of operation. However, the leading standard for business rules, Semantics for Business Vocabulary and Business Rules (SBVR), leaves certain decisions concerning the...

    Provided By Hunan University

  • White Papers // Oct 2009

    User Density Sensitive P2P Streaming in Wireless Mesh Networks

    Link rate allocation is very important for supporting high video playback rate in Peer-To-Peer video streaming. Although many studies can be found on resource allocation in P2P streaming in wired networks, very few studies have studied the problem in wireless networks, especially in Wireless Mesh Networks(WMNs), which is still challenging....

    Provided By Hunan University

  • White Papers // Feb 2013

    A Novel Iterative Clipping and Filtering Technique for PAPR Reduction of OFDM Signals: System Using DCT/IDCT Transform

    Orthogonal Frequency Division Multiplexing (OFDM) is the promising technology for future broadband wireless communication system especially based on multicarrier modulation which make good use of available bandwidth by allocation sub-carriers. The recent interest advances in this technique is mainly due to the recent advances in digital signal processing technology. The...

    Provided By Hunan University

  • White Papers // Dec 2012

    A Visible Obstacle Mobility Model based on Activity Area

    In this paper, the authors present a Visible Obstacle Mobility model Based on Activity Area (VOMBAA) for ad hoc network. Typical examples where the nodes of mobile ad hoc network are human-operated are natural or man-made disasters, military activities and so on. In these scenarios, people don't move random and...

    Provided By Hunan University

  • White Papers // Oct 2009

    User Density Sensitive P2P Streaming in Wireless Mesh Networks

    Link rate allocation is very important for supporting high video playback rate in Peer-To-Peer video streaming. Although many studies can be found on resource allocation in P2P streaming in wired networks, very few studies have studied the problem in wireless networks, especially in Wireless Mesh Networks(WMNs), which is still challenging....

    Provided By Hunan University

  • White Papers // Jan 2012

    Handover Necessity Estimation for 4G Heterogeneous Networks

    One of the most challenges of 4G network is to have a unified network of heterogeneous wireless networks. To achieve seamless mobility in such a diverse environment, vertical hand off is still a challenging problem. In many situations handover failures and unnecessary handoffs are triggered causing degradation of services, reduction...

    Provided By Hunan University

  • White Papers // Sep 2011

    Energy-Aware Interleaving for Robust Image Transmission Over Visual Sensor Networks

    In wireless visual sensor networks, the effect of transmission losses on the visual quality of images is always varying and depends on the burst loss length. Among the existing transmission error control techniques, interleaving can improve the visual quality of images without redundant data incurred. Conventionally a larger interleaving data...

    Provided By Hunan University

  • White Papers // Jan 2011

    DWT-PCA (EVD) Based Copy-Move Image Forgery Detection

    In a copy-move image forgery, a part of an image is copied and then pasted on a different location within the same image. Usually, such an image tampering is done with the aim of either hiding some image details, in which case a background is duplicated, or adding more details...

    Provided By Hunan University

  • White Papers // Jan 2011

    A Scheme of PE Virus Detection Using Fragile Software Watermarking Technique

    It is a difficult issue in the anti-virus field about how to detect unknown and packed PE (Portable Executable) viruses effectively, and existing schemes for anti-virus detection are dis-satisfactory. Based on an analysis of the logical structures of Windows PE file and PE virus, a new method of PE virus...

    Provided By Hunan University

  • White Papers // Feb 2011

    An Automatic Test Database Generation Algorithm Based on RQP

    Software testing is one of key technologies to guarantee quality and reliability of software. Most computer applications are related to database application systems. Test database generation is an important research topic of database application testing. There are a number of commercial tools to automatically generate test databases. These tools take...

    Provided By Hunan University

  • White Papers // May 2011

    A Fragile Zero-Watermarking Technique for Authentication of Relational Databases

    The protection of databases integrity is currently a very active research field in digital watermarking. Most of the existing watermarking techniques designed for securing relational databases introduce some distortions to the underlying data during the watermark insertion process. Although these errors are claimed to be minuscule, they inevitably degrade the...

    Provided By Hunan University

  • White Papers // May 2011

    The Design and Evaluation of a Hybrid Compression Technique (HCT) for Wireless Sensor Network

    WSN counted as most important technologies of the century, it is consist of a collection of nodes called Sensor nodes, these nodes are responsible for monitoring and collecting information about different physical phenomena such as heat, humidity, and vibration, light. Certainly that any viable solutions to handle the deficiencies of...

    Provided By Hunan University

  • White Papers // May 2011

    Steganalysis of Syntactic Transformation Based Steganography

    Syntactic Transformation based(ST) steganography performs embedding operations of secret information by meaning-preserving syntactic transformations into sentences of a text. The syntactic transformations caused the difference of the occurrence frequency among different semantically equivalent syntactic structures vary between the cover texts and stego texts. A steganalysis method is therefore proposed using...

    Provided By Hunan University

  • White Papers // May 2011

    A Privacy-Preserving Digital Rights Management Protocol Based on Oblivious Transfer Scheme

    In this paper, the authors propose a privacy-preserving digital rights management protocol based on oblivious transfer theory. Users obtain digital content from the content server freely, and acquire and renew their needed digital licenses by using oblivious transfer manner after charging. The license server can make sure the quantity of...

    Provided By Hunan University

  • White Papers // Jul 2011

    Power Allocation for a Mobile Secondary User in OFDM Based Cognitive Radio

    One of the main challenges in cognitive networks is how to make the Secondary User (SU) obtain maximum capacity and simultaneously ensure that the Primary User (PU) bears the minimum interference during power allocation. In this paper, the authors first presented a general mutual interference case between PUs and SUs...

    Provided By Hunan University

  • White Papers // Aug 2011

    SWP2P: P2P Anonymous Trace System Based on Superposition Watermarking

    A lot of attention has been paid to anonymity due to the users' privacy protection. While Peer-To-Peer (P2P) networks need anonymity capacity, the authority also requires partner traceability to prevent anonymous abuse. So there is a challenge to harmonize the dilemma between the anonymity and authentication in P2P networks. Few...

    Provided By Hunan University

  • White Papers // Oct 2011

    A Novell Security Framework for Web Application and Database

    The internet became one of the most important things in the people world. It's used for everything from communicating, shopping, banking, entertainment, news, getting information and the list goes on and on. For this reason, the developers of the Internet and databases are worrying about web security from malicious users...

    Provided By Hunan University

  • White Papers // Nov 2011

    An Efficient Approach to Manage IDS Alerts

    Intrusion Detection Systems (IDSs) often appear problematic because of triggering huge number of non interesting alerts which diminish the value and urgency of interesting alerts. An average commercial IDS reports tens of thousands alerts per day. Indentifying the interesting alerts from overwhelming number of alerts is laborious and challenging task....

    Provided By Hunan University

  • White Papers // Nov 2011

    Combined Watermarking Solution for XML Documents

    There is a rapid increase in exchange of data over the internet via XML documents. Due to this immense growth in use of XML format, there are certain issues that need to be addressed. Among them two important are copyrights protection and integrity verification of data, exchanged through XML documents....

    Provided By Hunan University

  • White Papers // Nov 2011

    A Tactic Agent Middleware in Wireless Sensor Networks Based on Associative Monitoring Scheme

    The management of Wireless Sensor Networks (WSN) is to maintain the communication resources and effectively control sensing data, considering the energy of nodes and dynamic topology. A tactic-oriented initiative management system based on Mobile Agent was proposed, which can use the tactic agent to control layered networking and realize the...

    Provided By Hunan University

  • White Papers // Nov 2011

    Management of Mobility in the Mobile Wimax

    The main goal of this paper is to improve the QoS in mobile WiMAX, and reduce service interruption in case of delay sensitive traffic during the handover of level 2 of a mobile moving at high speed. To make this realistic assumption, the authors place their selves in a rural...

    Provided By Hunan University

  • White Papers // Nov 2011

    Multi-Version Two-Phase Locking Protocol Based on Commit-Locking in Real-Time Database

    In order to improve the security of the Real-Time DataBase (RTDB), this paper proposes a Multiversion Two-Phase Locking protocol (M2PL) based on Commit-locking. While guaranteeing the serialization of transactions, through expanding the compatibility of locking, it effectively solves the problems of conflicts in traditional read-write or write-read, and also gives...

    Provided By Hunan University

  • White Papers // Nov 2011

    Special Publicly Verifiable Secret Sharing Scheme for LEO Satellite Networks

    Security and privacy in satellite networks are an important and active research area. A number of challenges are arisen due to the limited computational, storage and communication abilities of typical satellite networks. This paper describes a simple and inexpensive a special Publicly Verifiable Secret Sharing scheme (PVSS) for LEO satellite...

    Provided By Hunan University

  • White Papers // Dec 2011

    Robust Speech Feature Extraction Using the Hilbert Transform Spectrum Estimation Method

    The performance of traditional Mel-Frequency Cepstral Coefficients (MFCC) speech feature extraction method decreases drastically in the complex noisy environment. To improve the performance and robustness of speech recognition system, which is based on spectral envelope estimation method, the minimum distortionless response spectrum MVDR-MFCC (Minimum Variance Distortionless Response-MFCC) feature extraction method...

    Provided By Hunan University

  • White Papers // Jul 2012

    SDM: A Stripe-based Data Migration Scheme to Improve the Scalability of RAID-6

    In large scale data storage systems, RAID-6 has received more attention due to its capability to tolerate concurrent failures of any two disks, providing a higher level of reliability. However, a challenging issue is its scalability, or how to efficiently expand the disks. The main reason causing this problem is...

    Provided By Hunan University

  • White Papers // Dec 2013

    The Research on CEP Based on Query Rewriting for CPS

    The authors are entering the era of \"Big data\", and the important data source of which is Cyber Physical System (CPS) data, those data can hardly be processed by present data processing technology. Complex Event Processing (CEP) is the key part of middleware of CPS, which can process the big...

    Provided By Hunan University

  • White Papers // Apr 2012

    Comparison and Analysis of GPGPU and Parallel Computing on Multi-Core CPU

    There are two ways to improve the performance of the algorithm computing, which are general purpose of computation and parallel computation of multi-core CPU. By comparison and analysis, contrast the main difference between them, the authors reach a conclusion that GPU is suitable for processing large-scale data-parallel load of high-density...

    Provided By Hunan University

  • White Papers // Sep 2010

    Syntax and Semantics for Business Rules

    Business processes are increasingly being expressed in declarative terms, as business rules which express obligations concerning conduct, action, practice or procedure regarding a particular business activity or sphere of operation. However, the leading standard for business rules, Semantics for Business Vocabulary and Business Rules (SBVR), leaves certain decisions concerning the...

    Provided By Hunan University