KIPS

Displaying 1-40 of 71 results

  • White Papers // Dec 2006

    Automatic Hardware/Software Interface Generation for Embedded System

    A large portion of the embedded system development process involves the integration of hardware and software. Unfortunately, communication across the hardware/software boundary is tedious and error-prone to create. This paper presents an automatic hardware/software interface generation system. As the front-end of hardware/software co-design frameworks, a system designer defines XML specifications...

    Provided By KIPS

  • White Papers // Jun 2012

    A Novel Approach for Deriving Test Scenarios and Test Cases From Events

    Safety critical systems, real time systems, and event-based systems have a complex set of events and their own interdependency, which makes them difficult to test ma Safety critic Safety critical systems, real time systems, and event-based systems have a complex set of events and their own interdependency, which makes them...

    Provided By KIPS

  • White Papers // Jun 2012

    Dynamic Replication Based on Availability and Popularity in the Presence of Failures

    The data grid provides geographically distributed resources for large-scale applications. It generates a large set of data. The replication of this data in several sites of the grid is an effective solution for achieving good performance. In this paper, the authors propose an approach of dynamic replication in a hierarchical...

    Provided By KIPS

  • White Papers // Jun 2012

    Expressive Exceptions for Safe Pervasive Spaces

    Uncertainty and dynamism surrounding pervasive systems require new and sophisticated approaches to defining, detecting, and handling complex exceptions. This is because the possible erroneous conditions in pervasive systems are more complicated than conditions found in traditional applications. The authors devised a novel exception description and detection mechanism based on "Situation"-...

    Provided By KIPS

  • White Papers // Jun 2012

    Visual Monitoring System of Multi-Hosts Behavior for Trustworthiness With Mobile Cloud

    Recently, security researches have been processed on the method to cover a broader range of hacking attacks at the low level in the perspective of hardware. This system security applies not only to individuals' computer systems but also to cloud environments. "Cloud" concerns operations on the web. Therefore it is...

    Provided By KIPS

  • White Papers // Mar 2012

    Optimal Software Release Using Time and Cost Benefits Via Fuzzy Multi-Criteria and Fault Tolerance

    As the people know every software development process is pretty large and consists of different modules. This raises the idea of prioritizing different software modules so that important modules can be tested by preference. In the software testing process, it is not possible to test each and every module regressively,...

    Provided By KIPS

  • White Papers // Mar 2012

    Using a Cellular Automaton to Extract Medical Information From Clinical Reports

    An important amount of clinical data concerning the medical history of a patient is in the form of clinical reports that are written by doctors. The authors describe patients, their pathologies, their personal and medical histories, findings made during interviews or during procedures, and so forth. They represent a source...

    Provided By KIPS

  • White Papers // Mar 2012

    Hartley Transform Based Fingerprint Matching

    The Hartley transform based feature extraction method is proposed for fingerprint matching. Hartley transform is applied on a smaller region that has been cropped around the core point. The performance of this proposed method is evaluated based on the standard database of Bologna University and the database of the FVC2002....

    Provided By KIPS

  • White Papers // Mar 2012

    Supporting Java Components in the SID Simulation System

    Embedded products are becoming richer in features. Simulation tools facilitate low-costs and the efficient development of embedded systems. SID is an open source simulation software that includes a library of components for modeling hardware and software components. SID components were originally written using C/C++ and Tcl/Tk. Tcl/Tk has mainly been...

    Provided By KIPS

  • White Papers // Mar 2012

    An Improved Fast and Secure Hash Algorithm

    Recently, a fast and secure hash function SFHA - 256 has been proposed and claimed as more secure and as having a better performance than the SHA - 256. In this paper an improved version of SFHA - 256 is proposed and analyzed using two parameters, namely the avalanche effect...

    Provided By KIPS

  • White Papers // Mar 2012

    Energy Efficient Architecture Using Hardware Acceleration for Software Defined Radio Components

    In order to make cognitive radio systems a practical technology to be deployed in real-world scenarios, the core Software Defined Radio (SDR) systems must meet the stringent requirements of the target application, especially in terms of performance and energy consumption for mobile platforms. In this paper, the authors present a...

    Provided By KIPS

  • White Papers // Mar 2012

    Performance Study of Genus 3 Hyperelliptic Curve Cryptosystem

    Hyper-Elliptic Curve Cryptosystem (HECC) is well suited for all kinds of embedded processor architectures, where resources such as storage, time, or power are constrained due to short operand sizes. The authors can construct genus 3 HECC on 54-bit finite fields in order to achieve the same security level as 160-bit...

    Provided By KIPS

  • White Papers // Mar 2012

    An Efficient Block Cipher Implementation on Many-Core Graphics Processing Units

    This paper presents a study on a high-performance design for a block cipher algorithm implemented on modern many-core Graphics Processing Units (GPUs). The recent emergence of VLSI technology makes it feasible to fabricate multiple processing cores on a single chip and enables General-Purpose computation on a GPU (GPGPU). The GPU...

    Provided By KIPS

  • White Papers // Mar 2012

    Attack and Correction: How to Design a Secure and Efficient Mix Network

    Shuffling is an effective method to build a publicly verifiable mix network to implement verifiable anonymous channels that can be used for important cryptographic applications like electronic voting and electronic cash. One shuffling scheme by Groth is claimed to be secure and efficient. However, its soundness has not been formally...

    Provided By KIPS

  • White Papers // Jun 2012

    An Adaptive Approach to Learning the Preferences of Users in a Social Network Using Weak Estimators

    Since a social network by definition is so diverse, the problem of estimating the preferences of its users is becoming increasingly essential for personalized applications, which range from service recommender systems to the targeted advertising of services. However, unlike traditional estimation problems where the underlying target distribution is stationary; estimating...

    Provided By KIPS

  • White Papers // Jun 2012

    Fault Prediction Using Statistical and Machine Learning Methods for Improving Software Quality

    An understanding of quality attributes is relevant for the software organization to deliver high software reliability. An empirical assessment of metrics to predict the quality attributes is essential in order to gain insight about the quality of software in the early phases of software development and to ensure corrective actions....

    Provided By KIPS

  • White Papers // Dec 2011

    Partial Bicasting With Buffering for Proxy Mobile IPv6 Handover in Wireless Networks

    This paper addresses the Proxy Mobile IPv6 (PMIP) handover using bicasting in mobile/wireless networks. The bicasting scheme can be used to support the PMIP handover, which tends to waste the network resources of wireless links and incurs data losses during handover. The authors propose an enhanced scheme of PMIP handover,...

    Provided By KIPS

  • White Papers // Dec 2011

    A Model Comparison for Spatiotemporal Data in Ubiquitous Environments: A Case Study

    In ubiquitous environments, many applications need to process data with time and space dimensions. Because of this, there is growing attention not only on gathering spatiotemporal data in ubiquitous environments, but also on processing such data in databases. In order to obtain the full benefits from spatiotemporal data, the authors...

    Provided By KIPS

  • White Papers // Dec 2011

    Performance Evaluation of the WiMAX Network Based on Combining the 2D Markov Chain and MMPP Traffic Model

    WiMAX is intended for fourth generation wireless mobile communications where a group of users are provided with a connection and a fixed length queue. In present literature traffic of such network is analyzed based on the generator matrix of the Markov Arrival Process (MAP). In this paper a simple analytical...

    Provided By KIPS

  • White Papers // Dec 2011

    Performance Evaluation of Finite Queue Switching Under Two-Dimensional M/G/1(m) Traffic

    In this paper, the authors consider a local area network (LAN) of dual mode service where one is a token bus and the other is a Carrier Sense Multiple Access with a Collision Detection (CSMA/CD) bus. The objective of the paper is to find the overall cell/packet dropping probability of...

    Provided By KIPS

  • White Papers // Dec 2011

    Grobner Basis Attacks on Lightweight RFID Authentication Protocols

    Recently, RFID systems have attracted much attention due to their wide applications including inventory control, logistics, supply chain management, etc. Since communications in RFID systems are executed on public RF channels and any reader can get the tag's information easily, the systems without proper protection are vulnerable to eavesdropping, tracking,...

    Provided By KIPS

  • White Papers // Dec 2011

    A Log Analysis System With REST Web Services for Desktop Grids and Its Application to Resource Group-Based Task Scheduling

    It is important that desktop grids should be able to aggressively deal with the dynamic properties that arise from the volatility and heterogeneity of resources. Therefore, it is required that task scheduling be able to positively consider the execution behavior that is characterized by an individual resource. In this paper,...

    Provided By KIPS

  • White Papers // Sep 2011

    The Principle of Justifiable Granularity and an Optimization of Information Granularity Allocation as Fundamentals of Granular Computing

    Granular Computing has emerged as a unified and coherent framework of designing, processing, and interpretation of information granules. Information granules are formalized within various frameworks such as sets (interval mathematics), fuzzy sets, rough sets, shadowed sets, probabilities (probability density functions), to name several the most visible approaches. In spite of...

    Provided By KIPS

  • White Papers // Sep 2011

    A Novel Similarity Measure for Sequence Data

    A variety of different metrics has been introduced to measure the similarity of two given sequences. These widely used metrics are ranging from spell correctors and categorizers to new sequence mining applications. Different metrics consider different aspects of sequences, but the essence of any sequence is extracted from the ordering...

    Provided By KIPS

  • White Papers // Sep 2011

    Wavelet-Based Feature Extraction Algorithm for an Iris Recognition System

    The success of iris recognition depends mainly on two factors: image acquisition and an iris recognition algorithm. In this paper, the authors present a system that considers both factors and focuses on the latter. The proposed algorithm aims to find out the most efficient wavelet family and its coefficients for...

    Provided By KIPS

  • White Papers // Sep 2011

    Probabilistic Soft Error Detection Based on Anomaly Speculation

    Microprocessors are becoming increasingly vulnerable to soft errors due to the current trends of semiconductor technology scaling. Traditional redundant multithreading architectures provide perfect fault tolerance by re-executing all the computations. However, such a full re-execution technique significantly increases the verification workload on the processor resources, resulting in severe performance degradation....

    Provided By KIPS

  • White Papers // Sep 2011

    Integrated Software Quality Evaluation: A Fuzzy Multi-Criteria Approach

    Software measurement is a key factor in managing, controlling, and improving the software development processes. Software quality is one of the most important factors for assessing the global competitive position of any software company. Thus, the quantification of quality parameters and integrating them into quality models is very essential. Software...

    Provided By KIPS

  • White Papers // Sep 2011

    A Fast Snake Algorithm for Tracking Multiple Objects

    A Snake is an active contour for representing object contours. Traditional snake algorithms are often used to represent the contour of a single object. However, if there is more than one object in the image, the snake model must be adaptive to determine the corresponding contour of each object. Also,...

    Provided By KIPS

  • White Papers // Sep 2011

    A Fair and Efficient Congestion Avoidance Scheme Based on the Minority Game

    In this paper, the authors propose a new congestion control scheme for high-speed networks. The basic idea of their proposed scheme is to adopt a game theory called, "Minority Game" (MG), to realize a selective reduction of the transmission speed of senders. More concretely, upon detecting any congestion, the scheme...

    Provided By KIPS

  • White Papers // Mar 2012

    Indoor Link Quality Comparison of IEEE 802.11a Channels in a Multi-Radio Mesh Network Testbed

    The most important criterion for achieving the maximum performance in a Wireless Mesh Network (WMN) is to limit the interference within the network. For this purpose, especially in a multi-radio network, the best option is to use non-overlapping channels among different radios within the same interference range. Previous works that...

    Provided By KIPS

  • White Papers // Mar 2011

    Dynamic Load Balancing and Network Adaptive Virtual Storage Service for Mobile Appliances

    With the steady growth of mobile technology and applications, demand for more storage in mobile devices has also increased. A lightweight block-level protocol, Internet Advanced Technology Attachment (iATA), has been developed to deliver a cost-effective storage network solution for mobile devices to obtain more storage. This paper seeks to contribute...

    Provided By KIPS

  • White Papers // Mar 2011

    Accelerating the Sweep3D for a Graphic Processor Unit

    As a powerful and flexible processor, the Graphic Processing Unit (GPU) can offer a great faculty in solving many high-performance computing applications. Sweep3D, which simulates a single group time-independent discrete ordinates (Sn) neutron transport deterministically on 3D Cartesian geometry space, represents the key part of a real ASCI application. The...

    Provided By KIPS

  • White Papers // Mar 2011

    Adaptive Motion Vector Smoothing for Improving Side Information in Distributed Video Coding

    In this paper, an adaptive motion vector smoothing scheme based on weighted vector median filtering is proposed in order to eliminate the motion outliers more effectively for improving the quality of side information in frame-based distributed video coding. The authors use a simple motion vector outlier reliability measure for each...

    Provided By KIPS

  • White Papers // Mar 2011

    Security Framework for RFID-Based Applications in Smart Home Environment

    The concept of Smart-Homes is becoming more and more popular. It is anticipated that Radio Frequency IDentification (RFID) technology will play a major role in such environments. The authors can find many previously proposed schemes that focus solely on: authentication between the RFID tags and readers, and user privacy protection...

    Provided By KIPS

  • White Papers // Mar 2011

    Ensuring Anonymity for LBSs in Smartphone Environment

    With the rapid growth of GPS-enable Smartphones, the interest on using Location Based Services (LBSs) has increased significantly. The evolution in the functionalities provided by those Smartphones has enabled them to accurately pinpoint the location of a user. Because location information is what all LBSs depend on to process user's...

    Provided By KIPS

  • White Papers // Mar 2011

    Handling Malicious Flooding Attacks Through Enhancement of Packet Processing Technique in Mobile Ad Hoc Networks

    Mobile ad hoc networks are expected to be widely used in the near future. However, they are susceptible to various security threats because of their inherent characteristics. Malicious flooding attacks are one of the fatal attacks on mobile ad hoc networks. These attacks can severely clog an entire network, as...

    Provided By KIPS

  • White Papers // Mar 2011

    Guess and Determine Attack on Bivium

    Bivium is a simplified version of Trivium, a hardware profile finalist of the eSTREAM project. Bivium has an internal state size of 177 bits and a key length of 80 bits. In this paper, a guess and determine attack on this cipher is introduced. In the proposed method, the best...

    Provided By KIPS

  • White Papers // Mar 2011

    Generic Constructions for Strong Designated Verifier Signature

    A designated verifier signature is a special type of digital signature, which convinces a designated verifier that she has signed a message in such a way that the designated verifier cannot transfer the signature to a third party. A strong designated verifier signature scheme enhances the privacy of the signer...

    Provided By KIPS

  • White Papers // Mar 2011

    Virus Detection Method based on Behavior Resource Tree

    Due to the disadvantages of signature-based computer virus detection techniques, behavior-based detection methods have developed rapidly in recent years. However, current popular behavior-based detection methods only take API call sequences as program behavior features and the difference between API calls in the detection is not taken into consideration. This paper...

    Provided By KIPS

  • White Papers // Mar 2011

    A Method of Risk Assessment for Multi-Factor Authentication

    User authentication refers to user identification based on something a user knows, something a user has, something a user is or something the user does; it can also take place based on a combination of two or more of such factors. With the increasingly diverse risks in online environments, user...

    Provided By KIPS