KIPS

Displaying 1-40 of 71 results

  • White Papers // Mar 2011

    A Cultural Dimensions Model Based on Smart Phone Applications

    One of the major factors influencing the phenomenal growth of the smart phone market is the active development applications based on open environments. Despite difficulties in finding and downloading applications due to the small screens and inconvenient interfaces of smart phones, users download applications nearly every day. Such user behavior...

    Provided By KIPS

  • White Papers // Mar 2012

    Indoor Link Quality Comparison of IEEE 802.11a Channels in a Multi-Radio Mesh Network Testbed

    The most important criterion for achieving the maximum performance in a Wireless Mesh Network (WMN) is to limit the interference within the network. For this purpose, especially in a multi-radio network, the best option is to use non-overlapping channels among different radios within the same interference range. Previous works that...

    Provided By KIPS

  • White Papers // Jun 2012

    An Adaptive Approach to Learning the Preferences of Users in a Social Network Using Weak Estimators

    Since a social network by definition is so diverse, the problem of estimating the preferences of its users is becoming increasingly essential for personalized applications, which range from service recommender systems to the targeted advertising of services. However, unlike traditional estimation problems where the underlying target distribution is stationary; estimating...

    Provided By KIPS

  • White Papers // Jun 2012

    Fault Prediction Using Statistical and Machine Learning Methods for Improving Software Quality

    An understanding of quality attributes is relevant for the software organization to deliver high software reliability. An empirical assessment of metrics to predict the quality attributes is essential in order to gain insight about the quality of software in the early phases of software development and to ensure corrective actions....

    Provided By KIPS

  • White Papers // Jun 2012

    A Novel Approach for Deriving Test Scenarios and Test Cases From Events

    Safety critical systems, real time systems, and event-based systems have a complex set of events and their own interdependency, which makes them difficult to test ma Safety critic Safety critical systems, real time systems, and event-based systems have a complex set of events and their own interdependency, which makes them...

    Provided By KIPS

  • White Papers // Jun 2012

    Dynamic Replication Based on Availability and Popularity in the Presence of Failures

    The data grid provides geographically distributed resources for large-scale applications. It generates a large set of data. The replication of this data in several sites of the grid is an effective solution for achieving good performance. In this paper, the authors propose an approach of dynamic replication in a hierarchical...

    Provided By KIPS

  • White Papers // Jun 2012

    Expressive Exceptions for Safe Pervasive Spaces

    Uncertainty and dynamism surrounding pervasive systems require new and sophisticated approaches to defining, detecting, and handling complex exceptions. This is because the possible erroneous conditions in pervasive systems are more complicated than conditions found in traditional applications. The authors devised a novel exception description and detection mechanism based on "Situation"-...

    Provided By KIPS

  • White Papers // Jun 2012

    Visual Monitoring System of Multi-Hosts Behavior for Trustworthiness With Mobile Cloud

    Recently, security researches have been processed on the method to cover a broader range of hacking attacks at the low level in the perspective of hardware. This system security applies not only to individuals' computer systems but also to cloud environments. "Cloud" concerns operations on the web. Therefore it is...

    Provided By KIPS

  • White Papers // Mar 2012

    Optimal Software Release Using Time and Cost Benefits Via Fuzzy Multi-Criteria and Fault Tolerance

    As the people know every software development process is pretty large and consists of different modules. This raises the idea of prioritizing different software modules so that important modules can be tested by preference. In the software testing process, it is not possible to test each and every module regressively,...

    Provided By KIPS

  • White Papers // Mar 2012

    Using a Cellular Automaton to Extract Medical Information From Clinical Reports

    An important amount of clinical data concerning the medical history of a patient is in the form of clinical reports that are written by doctors. The authors describe patients, their pathologies, their personal and medical histories, findings made during interviews or during procedures, and so forth. They represent a source...

    Provided By KIPS

  • White Papers // Mar 2012

    Hartley Transform Based Fingerprint Matching

    The Hartley transform based feature extraction method is proposed for fingerprint matching. Hartley transform is applied on a smaller region that has been cropped around the core point. The performance of this proposed method is evaluated based on the standard database of Bologna University and the database of the FVC2002....

    Provided By KIPS

  • White Papers // Mar 2012

    Supporting Java Components in the SID Simulation System

    Embedded products are becoming richer in features. Simulation tools facilitate low-costs and the efficient development of embedded systems. SID is an open source simulation software that includes a library of components for modeling hardware and software components. SID components were originally written using C/C++ and Tcl/Tk. Tcl/Tk has mainly been...

    Provided By KIPS

  • White Papers // Mar 2012

    An Improved Fast and Secure Hash Algorithm

    Recently, a fast and secure hash function SFHA - 256 has been proposed and claimed as more secure and as having a better performance than the SHA - 256. In this paper an improved version of SFHA - 256 is proposed and analyzed using two parameters, namely the avalanche effect...

    Provided By KIPS

  • White Papers // Mar 2012

    Energy Efficient Architecture Using Hardware Acceleration for Software Defined Radio Components

    In order to make cognitive radio systems a practical technology to be deployed in real-world scenarios, the core Software Defined Radio (SDR) systems must meet the stringent requirements of the target application, especially in terms of performance and energy consumption for mobile platforms. In this paper, the authors present a...

    Provided By KIPS

  • White Papers // Mar 2012

    Performance Study of Genus 3 Hyperelliptic Curve Cryptosystem

    Hyper-Elliptic Curve Cryptosystem (HECC) is well suited for all kinds of embedded processor architectures, where resources such as storage, time, or power are constrained due to short operand sizes. The authors can construct genus 3 HECC on 54-bit finite fields in order to achieve the same security level as 160-bit...

    Provided By KIPS

  • White Papers // Mar 2012

    An Efficient Block Cipher Implementation on Many-Core Graphics Processing Units

    This paper presents a study on a high-performance design for a block cipher algorithm implemented on modern many-core Graphics Processing Units (GPUs). The recent emergence of VLSI technology makes it feasible to fabricate multiple processing cores on a single chip and enables General-Purpose computation on a GPU (GPGPU). The GPU...

    Provided By KIPS

  • White Papers // Mar 2012

    Attack and Correction: How to Design a Secure and Efficient Mix Network

    Shuffling is an effective method to build a publicly verifiable mix network to implement verifiable anonymous channels that can be used for important cryptographic applications like electronic voting and electronic cash. One shuffling scheme by Groth is claimed to be secure and efficient. However, its soundness has not been formally...

    Provided By KIPS

  • White Papers // Dec 2011

    A Survey of RFID Deployment and Security Issues

    This paper describes different aspects of a typical RFID implementation. Section 1 provides a brief overview of the concept of Automatic Identification and compares the use of different technologies while Section 2 describes the basic components of a typical RFID system. Section 3 and Section 4 deal with the detailed...

    Provided By KIPS

  • White Papers // Dec 2011

    A Multi-Application Controller for SAGE-Enabled Tiled Display Wall in Wide-Area Distributed Computing Environments

    Due to the recent advancement of networking and high-performance computing technologies, scientists can easily access large-scale data captured by scientific measurement devices through a network, and use huge computational power harnessed on the Internet for their analyses of scientific data. However, visualization technology, which plays a role of great importance...

    Provided By KIPS

  • White Papers // Dec 2011

    An Efficient DVS Algorithm for Pinwheel Task Schedules

    In the last decade, energy-aware computing has become widespread not only for portable and mobile devices powered by batteries, but also for large systems in which the cost of energy consumption and cooling is substantial. With Dynamic Voltage Scaling (DVS) techniques, processors are capable of performing at a range of...

    Provided By KIPS

  • White Papers // Dec 2011

    Partial Bicasting With Buffering for Proxy Mobile IPv6 Handover in Wireless Networks

    This paper addresses the Proxy Mobile IPv6 (PMIP) handover using bicasting in mobile/wireless networks. The bicasting scheme can be used to support the PMIP handover, which tends to waste the network resources of wireless links and incurs data losses during handover. The authors propose an enhanced scheme of PMIP handover,...

    Provided By KIPS

  • White Papers // Dec 2011

    A Model Comparison for Spatiotemporal Data in Ubiquitous Environments: A Case Study

    In ubiquitous environments, many applications need to process data with time and space dimensions. Because of this, there is growing attention not only on gathering spatiotemporal data in ubiquitous environments, but also on processing such data in databases. In order to obtain the full benefits from spatiotemporal data, the authors...

    Provided By KIPS

  • White Papers // Dec 2011

    Performance Evaluation of the WiMAX Network Based on Combining the 2D Markov Chain and MMPP Traffic Model

    WiMAX is intended for fourth generation wireless mobile communications where a group of users are provided with a connection and a fixed length queue. In present literature traffic of such network is analyzed based on the generator matrix of the Markov Arrival Process (MAP). In this paper a simple analytical...

    Provided By KIPS

  • White Papers // Dec 2011

    Performance Evaluation of Finite Queue Switching Under Two-Dimensional M/G/1(m) Traffic

    In this paper, the authors consider a local area network (LAN) of dual mode service where one is a token bus and the other is a Carrier Sense Multiple Access with a Collision Detection (CSMA/CD) bus. The objective of the paper is to find the overall cell/packet dropping probability of...

    Provided By KIPS

  • White Papers // Dec 2011

    Grobner Basis Attacks on Lightweight RFID Authentication Protocols

    Recently, RFID systems have attracted much attention due to their wide applications including inventory control, logistics, supply chain management, etc. Since communications in RFID systems are executed on public RF channels and any reader can get the tag's information easily, the systems without proper protection are vulnerable to eavesdropping, tracking,...

    Provided By KIPS

  • White Papers // Dec 2011

    A Log Analysis System With REST Web Services for Desktop Grids and Its Application to Resource Group-Based Task Scheduling

    It is important that desktop grids should be able to aggressively deal with the dynamic properties that arise from the volatility and heterogeneity of resources. Therefore, it is required that task scheduling be able to positively consider the execution behavior that is characterized by an individual resource. In this paper,...

    Provided By KIPS

  • White Papers // Sep 2011

    The Principle of Justifiable Granularity and an Optimization of Information Granularity Allocation as Fundamentals of Granular Computing

    Granular Computing has emerged as a unified and coherent framework of designing, processing, and interpretation of information granules. Information granules are formalized within various frameworks such as sets (interval mathematics), fuzzy sets, rough sets, shadowed sets, probabilities (probability density functions), to name several the most visible approaches. In spite of...

    Provided By KIPS

  • White Papers // Sep 2011

    A Novel Similarity Measure for Sequence Data

    A variety of different metrics has been introduced to measure the similarity of two given sequences. These widely used metrics are ranging from spell correctors and categorizers to new sequence mining applications. Different metrics consider different aspects of sequences, but the essence of any sequence is extracted from the ordering...

    Provided By KIPS

  • White Papers // Sep 2011

    Wavelet-Based Feature Extraction Algorithm for an Iris Recognition System

    The success of iris recognition depends mainly on two factors: image acquisition and an iris recognition algorithm. In this paper, the authors present a system that considers both factors and focuses on the latter. The proposed algorithm aims to find out the most efficient wavelet family and its coefficients for...

    Provided By KIPS

  • White Papers // Sep 2011

    Probabilistic Soft Error Detection Based on Anomaly Speculation

    Microprocessors are becoming increasingly vulnerable to soft errors due to the current trends of semiconductor technology scaling. Traditional redundant multithreading architectures provide perfect fault tolerance by re-executing all the computations. However, such a full re-execution technique significantly increases the verification workload on the processor resources, resulting in severe performance degradation....

    Provided By KIPS

  • White Papers // Sep 2011

    Integrated Software Quality Evaluation: A Fuzzy Multi-Criteria Approach

    Software measurement is a key factor in managing, controlling, and improving the software development processes. Software quality is one of the most important factors for assessing the global competitive position of any software company. Thus, the quantification of quality parameters and integrating them into quality models is very essential. Software...

    Provided By KIPS

  • White Papers // Sep 2011

    A Fast Snake Algorithm for Tracking Multiple Objects

    A Snake is an active contour for representing object contours. Traditional snake algorithms are often used to represent the contour of a single object. However, if there is more than one object in the image, the snake model must be adaptive to determine the corresponding contour of each object. Also,...

    Provided By KIPS

  • White Papers // Sep 2011

    A Fair and Efficient Congestion Avoidance Scheme Based on the Minority Game

    In this paper, the authors propose a new congestion control scheme for high-speed networks. The basic idea of their proposed scheme is to adopt a game theory called, "Minority Game" (MG), to realize a selective reduction of the transmission speed of senders. More concretely, upon detecting any congestion, the scheme...

    Provided By KIPS

  • White Papers // Sep 2011

    A Study on the Business Strategy of Smart Devices for Multimedia Contents

    Information technology is changing the business value chain and business systems. This situation is due to the business value chain and the value creation factors in business. Technology companies and researchers are developing new businesses, but many companies and researchers cannot find successful ways to analyze and develop a business...

    Provided By KIPS

  • White Papers // Jun 2011

    An Efficient Broadcast Technique for Vehicular Networks

    Vehicular networks are a promising application of mobile ad hoc networks. In this paper, the authors introduce an efficient broadcast technique, called CB-S (Cell Broadcast for Streets), for vehicular networks with occlusions such as skyscrapers. In this environment, the road network is fragmented into cells such that nodes in a...

    Provided By KIPS

  • White Papers // Jun 2011

    CASPER: Congestion Aware Selection of Path With Efficient Routing in Multimedia Networks

    In earlier days, most of the data carried on communication networks was textual data requiring limited bandwidth. With the rise of multimedia and network technologies, the bandwidth requirements of data have increased considerably. If a network link at any time is not able to meet the minimum bandwidth requirement of...

    Provided By KIPS

  • White Papers // Jun 2011

    Packet Scheduling With QoS and Fairness for Downlink Traffic in WiMAX Networks

    The IEEE 802.16 standard is supposed to provide a wide-range broadband wireless service, but it leaves the implementation of the wireless resource scheduler as an open issue. The authors have studied the scheduling problem and propose a Two Level Scheduling (TLS) scheme with support for quality of service and fairness...

    Provided By KIPS

  • White Papers // Jun 2011

    Parallel Prefix Computation and Sorting on a Recursive Dual-Net

    The purpose of the Interconnection Networks (INs) is to connect processor/memory boards together to form a parallel or distributed system. In massively parallel computer systems, the interconnection networks play a crucial role in issues such as communication performance, hardware cost, computational complexity, and fault-tolerance. Much research has been reported in...

    Provided By KIPS

  • White Papers // Jun 2011

    Evaluating Service Description to Guarantee Quality of U-Service Ontology

    Efficient service description and modeling methodologies are essential for dynamic service composition to provide autonomous services for users in ubiquitous computing environments. In the authors' previous research, they proposed a 'U-service' ontology which is an abstract and structured concept for device operations in ubiquitous environments. One of the problems that...

    Provided By KIPS

  • White Papers // Jun 2011

    Development of an OPC Client-Server Framework for Monitoring and Control Systems

    In this paper, the current technological state of OPC (Openness, Productivity, and Collaboration; formerly "OLE for Process Control") standards and the problem statement of these OPC standards are discussed. The development of an OPC client-server framework for monitoring and control systems is introduced by using the new OPC Unified Architecture...

    Provided By KIPS