KIPS

Displaying 1-40 of 71 results

  • White Papers // Dec 2011

    A Model Comparison for Spatiotemporal Data in Ubiquitous Environments: A Case Study

    In ubiquitous environments, many applications need to process data with time and space dimensions. Because of this, there is growing attention not only on gathering spatiotemporal data in ubiquitous environments, but also on processing such data in databases. In order to obtain the full benefits from spatiotemporal data, the authors...

    Provided By KIPS

  • White Papers // Dec 2011

    Performance Evaluation of the WiMAX Network Based on Combining the 2D Markov Chain and MMPP Traffic Model

    WiMAX is intended for fourth generation wireless mobile communications where a group of users are provided with a connection and a fixed length queue. In present literature traffic of such network is analyzed based on the generator matrix of the Markov Arrival Process (MAP). In this paper a simple analytical...

    Provided By KIPS

  • White Papers // Dec 2011

    Performance Evaluation of Finite Queue Switching Under Two-Dimensional M/G/1(m) Traffic

    In this paper, the authors consider a local area network (LAN) of dual mode service where one is a token bus and the other is a Carrier Sense Multiple Access with a Collision Detection (CSMA/CD) bus. The objective of the paper is to find the overall cell/packet dropping probability of...

    Provided By KIPS

  • White Papers // Dec 2011

    Grobner Basis Attacks on Lightweight RFID Authentication Protocols

    Recently, RFID systems have attracted much attention due to their wide applications including inventory control, logistics, supply chain management, etc. Since communications in RFID systems are executed on public RF channels and any reader can get the tag's information easily, the systems without proper protection are vulnerable to eavesdropping, tracking,...

    Provided By KIPS

  • White Papers // Dec 2011

    A Log Analysis System With REST Web Services for Desktop Grids and Its Application to Resource Group-Based Task Scheduling

    It is important that desktop grids should be able to aggressively deal with the dynamic properties that arise from the volatility and heterogeneity of resources. Therefore, it is required that task scheduling be able to positively consider the execution behavior that is characterized by an individual resource. In this paper,...

    Provided By KIPS

  • White Papers // Sep 2011

    The Principle of Justifiable Granularity and an Optimization of Information Granularity Allocation as Fundamentals of Granular Computing

    Granular Computing has emerged as a unified and coherent framework of designing, processing, and interpretation of information granules. Information granules are formalized within various frameworks such as sets (interval mathematics), fuzzy sets, rough sets, shadowed sets, probabilities (probability density functions), to name several the most visible approaches. In spite of...

    Provided By KIPS

  • White Papers // Sep 2011

    A Novel Similarity Measure for Sequence Data

    A variety of different metrics has been introduced to measure the similarity of two given sequences. These widely used metrics are ranging from spell correctors and categorizers to new sequence mining applications. Different metrics consider different aspects of sequences, but the essence of any sequence is extracted from the ordering...

    Provided By KIPS

  • White Papers // Sep 2011

    Wavelet-Based Feature Extraction Algorithm for an Iris Recognition System

    The success of iris recognition depends mainly on two factors: image acquisition and an iris recognition algorithm. In this paper, the authors present a system that considers both factors and focuses on the latter. The proposed algorithm aims to find out the most efficient wavelet family and its coefficients for...

    Provided By KIPS

  • White Papers // Sep 2011

    Probabilistic Soft Error Detection Based on Anomaly Speculation

    Microprocessors are becoming increasingly vulnerable to soft errors due to the current trends of semiconductor technology scaling. Traditional redundant multithreading architectures provide perfect fault tolerance by re-executing all the computations. However, such a full re-execution technique significantly increases the verification workload on the processor resources, resulting in severe performance degradation....

    Provided By KIPS

  • White Papers // Sep 2011

    Integrated Software Quality Evaluation: A Fuzzy Multi-Criteria Approach

    Software measurement is a key factor in managing, controlling, and improving the software development processes. Software quality is one of the most important factors for assessing the global competitive position of any software company. Thus, the quantification of quality parameters and integrating them into quality models is very essential. Software...

    Provided By KIPS

  • White Papers // Jun 2013

    A Secure Network for Mobile Wireless Service

    The mobile wireless network is becoming more and more popular now-a-days. The authors are especially interested in a special kind of wireless network-an ad hoc network. As demonstrated in, an ad hoc network has its advantages and they will demonstrate that it is suitable for network applications with security requirements...

    Provided By KIPS

  • White Papers // Jun 2009

    A Scalable Wireless Body Area Network for Bio-Telemetry

    In this paper, authors propose a framework for the real-time monitoring of wireless biosensors. This is a scalable platform that requires minimum human interaction during set-up and monitoring. Its main components include a biosensor, a smart gateway to automatically set up the body area network, a mechanism for delivering data...

    Provided By KIPS

  • White Papers // Sep 2009

    Topological Boundary Detection in Wireless Sensor Networks

    The awareness of boundaries in wireless sensor networks has many benefits. The identification of boundaries is especially challenging since typical wireless sensor networks consist of low-capability nodes that are unaware of their geographic location. In this paper, the authors propose a simple, efficient algorithm to detect nodes that are near...

    Provided By KIPS

  • White Papers // Jun 2008

    MMMP: A MAC Protocol to Ensure QoS for Multimedia Traffic Over Multi-Hop Ad Hoc Networks

    In this paper, the authors discuss a novel reservation-based, asynchronous MAC protocol called 'Multi-rate Multi-hop MAC Protocol' (MMMP) for multi-hop ad hoc networks that provides QoS guarantees for multimedia traffic. MMMP achieves this by providing service differentiation for multi-rate real-time traffic (both constant and variable bit rate traffic) and guaranteeing...

    Provided By KIPS

  • White Papers // Dec 2011

    A Survey of RFID Deployment and Security Issues

    This paper describes different aspects of a typical RFID implementation. Section 1 provides a brief overview of the concept of Automatic Identification and compares the use of different technologies while Section 2 describes the basic components of a typical RFID system. Section 3 and Section 4 deal with the detailed...

    Provided By KIPS

  • White Papers // Dec 2011

    A Multi-Application Controller for SAGE-Enabled Tiled Display Wall in Wide-Area Distributed Computing Environments

    Due to the recent advancement of networking and high-performance computing technologies, scientists can easily access large-scale data captured by scientific measurement devices through a network, and use huge computational power harnessed on the Internet for their analyses of scientific data. However, visualization technology, which plays a role of great importance...

    Provided By KIPS

  • White Papers // Dec 2011

    An Efficient DVS Algorithm for Pinwheel Task Schedules

    In the last decade, energy-aware computing has become widespread not only for portable and mobile devices powered by batteries, but also for large systems in which the cost of energy consumption and cooling is substantial. With Dynamic Voltage Scaling (DVS) techniques, processors are capable of performing at a range of...

    Provided By KIPS

  • White Papers // Dec 2011

    Partial Bicasting With Buffering for Proxy Mobile IPv6 Handover in Wireless Networks

    This paper addresses the Proxy Mobile IPv6 (PMIP) handover using bicasting in mobile/wireless networks. The bicasting scheme can be used to support the PMIP handover, which tends to waste the network resources of wireless links and incurs data losses during handover. The authors propose an enhanced scheme of PMIP handover,...

    Provided By KIPS

  • White Papers // Mar 2012

    Performance Study of Genus 3 Hyperelliptic Curve Cryptosystem

    Hyper-Elliptic Curve Cryptosystem (HECC) is well suited for all kinds of embedded processor architectures, where resources such as storage, time, or power are constrained due to short operand sizes. The authors can construct genus 3 HECC on 54-bit finite fields in order to achieve the same security level as 160-bit...

    Provided By KIPS

  • White Papers // Mar 2012

    An Efficient Block Cipher Implementation on Many-Core Graphics Processing Units

    This paper presents a study on a high-performance design for a block cipher algorithm implemented on modern many-core Graphics Processing Units (GPUs). The recent emergence of VLSI technology makes it feasible to fabricate multiple processing cores on a single chip and enables General-Purpose computation on a GPU (GPGPU). The GPU...

    Provided By KIPS

  • White Papers // Mar 2012

    Attack and Correction: How to Design a Secure and Efficient Mix Network

    Shuffling is an effective method to build a publicly verifiable mix network to implement verifiable anonymous channels that can be used for important cryptographic applications like electronic voting and electronic cash. One shuffling scheme by Groth is claimed to be secure and efficient. However, its soundness has not been formally...

    Provided By KIPS

  • White Papers // Sep 2011

    A Fast Snake Algorithm for Tracking Multiple Objects

    A Snake is an active contour for representing object contours. Traditional snake algorithms are often used to represent the contour of a single object. However, if there is more than one object in the image, the snake model must be adaptive to determine the corresponding contour of each object. Also,...

    Provided By KIPS

  • White Papers // Sep 2011

    A Fair and Efficient Congestion Avoidance Scheme Based on the Minority Game

    In this paper, the authors propose a new congestion control scheme for high-speed networks. The basic idea of their proposed scheme is to adopt a game theory called, "Minority Game" (MG), to realize a selective reduction of the transmission speed of senders. More concretely, upon detecting any congestion, the scheme...

    Provided By KIPS

  • White Papers // Sep 2011

    A Study on the Business Strategy of Smart Devices for Multimedia Contents

    Information technology is changing the business value chain and business systems. This situation is due to the business value chain and the value creation factors in business. Technology companies and researchers are developing new businesses, but many companies and researchers cannot find successful ways to analyze and develop a business...

    Provided By KIPS

  • White Papers // Jun 2011

    An Efficient Broadcast Technique for Vehicular Networks

    Vehicular networks are a promising application of mobile ad hoc networks. In this paper, the authors introduce an efficient broadcast technique, called CB-S (Cell Broadcast for Streets), for vehicular networks with occlusions such as skyscrapers. In this environment, the road network is fragmented into cells such that nodes in a...

    Provided By KIPS

  • White Papers // Jun 2011

    CASPER: Congestion Aware Selection of Path With Efficient Routing in Multimedia Networks

    In earlier days, most of the data carried on communication networks was textual data requiring limited bandwidth. With the rise of multimedia and network technologies, the bandwidth requirements of data have increased considerably. If a network link at any time is not able to meet the minimum bandwidth requirement of...

    Provided By KIPS

  • White Papers // Jun 2011

    Packet Scheduling With QoS and Fairness for Downlink Traffic in WiMAX Networks

    The IEEE 802.16 standard is supposed to provide a wide-range broadband wireless service, but it leaves the implementation of the wireless resource scheduler as an open issue. The authors have studied the scheduling problem and propose a Two Level Scheduling (TLS) scheme with support for quality of service and fairness...

    Provided By KIPS

  • White Papers // Jun 2011

    Parallel Prefix Computation and Sorting on a Recursive Dual-Net

    The purpose of the Interconnection Networks (INs) is to connect processor/memory boards together to form a parallel or distributed system. In massively parallel computer systems, the interconnection networks play a crucial role in issues such as communication performance, hardware cost, computational complexity, and fault-tolerance. Much research has been reported in...

    Provided By KIPS

  • White Papers // Jun 2011

    Evaluating Service Description to Guarantee Quality of U-Service Ontology

    Efficient service description and modeling methodologies are essential for dynamic service composition to provide autonomous services for users in ubiquitous computing environments. In the authors' previous research, they proposed a 'U-service' ontology which is an abstract and structured concept for device operations in ubiquitous environments. One of the problems that...

    Provided By KIPS

  • White Papers // Jun 2011

    Development of an OPC Client-Server Framework for Monitoring and Control Systems

    In this paper, the current technological state of OPC (Openness, Productivity, and Collaboration; formerly "OLE for Process Control") standards and the problem statement of these OPC standards are discussed. The development of an OPC client-server framework for monitoring and control systems is introduced by using the new OPC Unified Architecture...

    Provided By KIPS

  • White Papers // Jun 2011

    Design of Multi-Dimensional Contents Retrieval UI for Mobile IPTV

    Since, two-way interactive broadcasting service began, remote controls have been fitted with 4 color buttons, which enables interaction and convenience to increase between users and content. Currently, diverse studies on IPTV are in progress. Particularly, as the mobile market rapidly grows, studies on mobile IPTV and on linkage with other...

    Provided By KIPS

  • White Papers // Jun 2011

    An Adequacy Based Test Data Generation Technique Using Genetic Algorithms

    As the complexity of software is increasing, generating an effective test data has become a necessity. This necessity has increased the demand for techniques that can generate test data effectively. This paper proposes a test data generation technique based on adequacy based testing criteria. Adequacy based testing criteria uses the...

    Provided By KIPS

  • White Papers // Jun 2011

    Analysis of Business Attributes in Information Technology Environments

    Information technology is changing the business value chain and business systems. This situation is due to the business value chain and the value creation factors in business. Technology companies and researchers are developing new businesses, but many companies and researchers cannot find successful ways to analyze and develop a business...

    Provided By KIPS

  • White Papers // Mar 2011

    A Single Mobile Target Tracking in Voronoi-Based Clustered Wireless Sensor Network

    Despite the fact that the deployment of sensor networks and target tracking could both be managed by taking full advantage of Voronoi diagrams, very little few have been made in this regard. In this paper, the authors designed an optimized barrier coverage and an energy-efficient clustering algorithm for forming Vonoroi-based...

    Provided By KIPS

  • White Papers // Mar 2011

    A Clustering Protocol With Mode Selection for Wireless Sensor Network

    Wireless sensor networks are composed of a large number of sensor nodes with limited energy resources. One critical issue in wireless sensor networks is how to gather sensed information in an energy efficient way, since their energy is limited. The clustering algorithm is a technique used to reduce energy consumption....

    Provided By KIPS

  • White Papers // Mar 2011

    Analytical Coexistence Benchmark for Assessing the Utmost Interference Tolerated by IEEE 802.20

    Whether it is crosstalk, harmonics, or in-band operation of wireless technologies, interference between a reference system and a host of offenders is virtually unavoidable. In past contributions, a benchmark has been established and considered for coexistence analysis with a number of technologies including FWA, UMTS, and WiMAX. However, the previously...

    Provided By KIPS

  • White Papers // Mar 2011

    Dynamic Load Balancing and Network Adaptive Virtual Storage Service for Mobile Appliances

    With the steady growth of mobile technology and applications, demand for more storage in mobile devices has also increased. A lightweight block-level protocol, Internet Advanced Technology Attachment (iATA), has been developed to deliver a cost-effective storage network solution for mobile devices to obtain more storage. This paper seeks to contribute...

    Provided By KIPS

  • White Papers // Mar 2011

    Accelerating the Sweep3D for a Graphic Processor Unit

    As a powerful and flexible processor, the Graphic Processing Unit (GPU) can offer a great faculty in solving many high-performance computing applications. Sweep3D, which simulates a single group time-independent discrete ordinates (Sn) neutron transport deterministically on 3D Cartesian geometry space, represents the key part of a real ASCI application. The...

    Provided By KIPS

  • White Papers // Mar 2011

    Adaptive Motion Vector Smoothing for Improving Side Information in Distributed Video Coding

    In this paper, an adaptive motion vector smoothing scheme based on weighted vector median filtering is proposed in order to eliminate the motion outliers more effectively for improving the quality of side information in frame-based distributed video coding. The authors use a simple motion vector outlier reliability measure for each...

    Provided By KIPS

  • White Papers // Mar 2011

    Security Framework for RFID-Based Applications in Smart Home Environment

    The concept of Smart-Homes is becoming more and more popular. It is anticipated that Radio Frequency IDentification (RFID) technology will play a major role in such environments. The authors can find many previously proposed schemes that focus solely on: authentication between the RFID tags and readers, and user privacy protection...

    Provided By KIPS