KIPS

Displaying 1-40 of 70 results

  • White Papers // Mar 2011

    Accelerating the Sweep3D for a Graphic Processor Unit

    As a powerful and flexible processor, the Graphic Processing Unit (GPU) can offer a great faculty in solving many high-performance computing applications. Sweep3D, which simulates a single group time-independent discrete ordinates (Sn) neutron transport deterministically on 3D Cartesian geometry space, represents the key part of a real ASCI application. The...

    Provided By KIPS

  • White Papers // Mar 2011

    Adaptive Motion Vector Smoothing for Improving Side Information in Distributed Video Coding

    In this paper, an adaptive motion vector smoothing scheme based on weighted vector median filtering is proposed in order to eliminate the motion outliers more effectively for improving the quality of side information in frame-based distributed video coding. The authors use a simple motion vector outlier reliability measure for each...

    Provided By KIPS

  • White Papers // Mar 2011

    Security Framework for RFID-Based Applications in Smart Home Environment

    The concept of Smart-Homes is becoming more and more popular. It is anticipated that Radio Frequency IDentification (RFID) technology will play a major role in such environments. The authors can find many previously proposed schemes that focus solely on: authentication between the RFID tags and readers, and user privacy protection...

    Provided By KIPS

  • White Papers // Mar 2011

    Ensuring Anonymity for LBSs in Smartphone Environment

    With the rapid growth of GPS-enable Smartphones, the interest on using Location Based Services (LBSs) has increased significantly. The evolution in the functionalities provided by those Smartphones has enabled them to accurately pinpoint the location of a user. Because location information is what all LBSs depend on to process user's...

    Provided By KIPS

  • White Papers // Mar 2011

    Handling Malicious Flooding Attacks Through Enhancement of Packet Processing Technique in Mobile Ad Hoc Networks

    Mobile ad hoc networks are expected to be widely used in the near future. However, they are susceptible to various security threats because of their inherent characteristics. Malicious flooding attacks are one of the fatal attacks on mobile ad hoc networks. These attacks can severely clog an entire network, as...

    Provided By KIPS

  • White Papers // Mar 2011

    Guess and Determine Attack on Bivium

    Bivium is a simplified version of Trivium, a hardware profile finalist of the eSTREAM project. Bivium has an internal state size of 177 bits and a key length of 80 bits. In this paper, a guess and determine attack on this cipher is introduced. In the proposed method, the best...

    Provided By KIPS

  • White Papers // Mar 2011

    Generic Constructions for Strong Designated Verifier Signature

    A designated verifier signature is a special type of digital signature, which convinces a designated verifier that she has signed a message in such a way that the designated verifier cannot transfer the signature to a third party. A strong designated verifier signature scheme enhances the privacy of the signer...

    Provided By KIPS

  • White Papers // Mar 2011

    Virus Detection Method based on Behavior Resource Tree

    Due to the disadvantages of signature-based computer virus detection techniques, behavior-based detection methods have developed rapidly in recent years. However, current popular behavior-based detection methods only take API call sequences as program behavior features and the difference between API calls in the detection is not taken into consideration. This paper...

    Provided By KIPS

  • White Papers // Mar 2011

    A Method of Risk Assessment for Multi-Factor Authentication

    User authentication refers to user identification based on something a user knows, something a user has, something a user is or something the user does; it can also take place based on a combination of two or more of such factors. With the increasingly diverse risks in online environments, user...

    Provided By KIPS

  • White Papers // Mar 2011

    Lifting a Metadata Model to the Semantic Multimedia World

    This paper describes best-practices in lifting an image metadata standard to the Semantic Web. The authors provide guidelines on how an XML-based metadata format can be converted into an OWL ontology. Additionally, they discuss how this ontology can be mapped to the W3C's Media Ontology. This ontology is a standardization...

    Provided By KIPS

  • White Papers // Mar 2011

    A Cultural Dimensions Model Based on Smart Phone Applications

    One of the major factors influencing the phenomenal growth of the smart phone market is the active development applications based on open environments. Despite difficulties in finding and downloading applications due to the small screens and inconvenient interfaces of smart phones, users download applications nearly every day. Such user behavior...

    Provided By KIPS

  • White Papers // Mar 2012

    Indoor Link Quality Comparison of IEEE 802.11a Channels in a Multi-Radio Mesh Network Testbed

    The most important criterion for achieving the maximum performance in a Wireless Mesh Network (WMN) is to limit the interference within the network. For this purpose, especially in a multi-radio network, the best option is to use non-overlapping channels among different radios within the same interference range. Previous works that...

    Provided By KIPS

  • White Papers // Jun 2012

    An Adaptive Approach to Learning the Preferences of Users in a Social Network Using Weak Estimators

    Since a social network by definition is so diverse, the problem of estimating the preferences of its users is becoming increasingly essential for personalized applications, which range from service recommender systems to the targeted advertising of services. However, unlike traditional estimation problems where the underlying target distribution is stationary; estimating...

    Provided By KIPS

  • White Papers // Jun 2012

    Fault Prediction Using Statistical and Machine Learning Methods for Improving Software Quality

    An understanding of quality attributes is relevant for the software organization to deliver high software reliability. An empirical assessment of metrics to predict the quality attributes is essential in order to gain insight about the quality of software in the early phases of software development and to ensure corrective actions....

    Provided By KIPS

  • White Papers // Jun 2012

    A Novel Approach for Deriving Test Scenarios and Test Cases From Events

    Safety critical systems, real time systems, and event-based systems have a complex set of events and their own interdependency, which makes them difficult to test ma Safety critic Safety critical systems, real time systems, and event-based systems have a complex set of events and their own interdependency, which makes them...

    Provided By KIPS

  • White Papers // Jun 2012

    Dynamic Replication Based on Availability and Popularity in the Presence of Failures

    The data grid provides geographically distributed resources for large-scale applications. It generates a large set of data. The replication of this data in several sites of the grid is an effective solution for achieving good performance. In this paper, the authors propose an approach of dynamic replication in a hierarchical...

    Provided By KIPS

  • White Papers // Jun 2012

    Expressive Exceptions for Safe Pervasive Spaces

    Uncertainty and dynamism surrounding pervasive systems require new and sophisticated approaches to defining, detecting, and handling complex exceptions. This is because the possible erroneous conditions in pervasive systems are more complicated than conditions found in traditional applications. The authors devised a novel exception description and detection mechanism based on "Situation"-...

    Provided By KIPS

  • White Papers // Jun 2012

    Visual Monitoring System of Multi-Hosts Behavior for Trustworthiness With Mobile Cloud

    Recently, security researches have been processed on the method to cover a broader range of hacking attacks at the low level in the perspective of hardware. This system security applies not only to individuals' computer systems but also to cloud environments. "Cloud" concerns operations on the web. Therefore it is...

    Provided By KIPS

  • White Papers // Mar 2012

    Optimal Software Release Using Time and Cost Benefits Via Fuzzy Multi-Criteria and Fault Tolerance

    As the people know every software development process is pretty large and consists of different modules. This raises the idea of prioritizing different software modules so that important modules can be tested by preference. In the software testing process, it is not possible to test each and every module regressively,...

    Provided By KIPS

  • White Papers // Mar 2012

    Using a Cellular Automaton to Extract Medical Information From Clinical Reports

    An important amount of clinical data concerning the medical history of a patient is in the form of clinical reports that are written by doctors. The authors describe patients, their pathologies, their personal and medical histories, findings made during interviews or during procedures, and so forth. They represent a source...

    Provided By KIPS

  • White Papers // Mar 2012

    Hartley Transform Based Fingerprint Matching

    The Hartley transform based feature extraction method is proposed for fingerprint matching. Hartley transform is applied on a smaller region that has been cropped around the core point. The performance of this proposed method is evaluated based on the standard database of Bologna University and the database of the FVC2002....

    Provided By KIPS

  • White Papers // Mar 2012

    Supporting Java Components in the SID Simulation System

    Embedded products are becoming richer in features. Simulation tools facilitate low-costs and the efficient development of embedded systems. SID is an open source simulation software that includes a library of components for modeling hardware and software components. SID components were originally written using C/C++ and Tcl/Tk. Tcl/Tk has mainly been...

    Provided By KIPS

  • White Papers // Mar 2012

    An Improved Fast and Secure Hash Algorithm

    Recently, a fast and secure hash function SFHA - 256 has been proposed and claimed as more secure and as having a better performance than the SHA - 256. In this paper an improved version of SFHA - 256 is proposed and analyzed using two parameters, namely the avalanche effect...

    Provided By KIPS

  • White Papers // Mar 2012

    Energy Efficient Architecture Using Hardware Acceleration for Software Defined Radio Components

    In order to make cognitive radio systems a practical technology to be deployed in real-world scenarios, the core Software Defined Radio (SDR) systems must meet the stringent requirements of the target application, especially in terms of performance and energy consumption for mobile platforms. In this paper, the authors present a...

    Provided By KIPS

  • White Papers // Mar 2012

    Performance Study of Genus 3 Hyperelliptic Curve Cryptosystem

    Hyper-Elliptic Curve Cryptosystem (HECC) is well suited for all kinds of embedded processor architectures, where resources such as storage, time, or power are constrained due to short operand sizes. The authors can construct genus 3 HECC on 54-bit finite fields in order to achieve the same security level as 160-bit...

    Provided By KIPS

  • White Papers // Mar 2012

    An Efficient Block Cipher Implementation on Many-Core Graphics Processing Units

    This paper presents a study on a high-performance design for a block cipher algorithm implemented on modern many-core Graphics Processing Units (GPUs). The recent emergence of VLSI technology makes it feasible to fabricate multiple processing cores on a single chip and enables General-Purpose computation on a GPU (GPGPU). The GPU...

    Provided By KIPS

  • White Papers // Mar 2012

    Attack and Correction: How to Design a Secure and Efficient Mix Network

    Shuffling is an effective method to build a publicly verifiable mix network to implement verifiable anonymous channels that can be used for important cryptographic applications like electronic voting and electronic cash. One shuffling scheme by Groth is claimed to be secure and efficient. However, its soundness has not been formally...

    Provided By KIPS

  • White Papers // Jun 2013

    A Secure Network for Mobile Wireless Service

    The mobile wireless network is becoming more and more popular now-a-days. The authors are especially interested in a special kind of wireless network-an ad hoc network. As demonstrated in, an ad hoc network has its advantages and they will demonstrate that it is suitable for network applications with security requirements...

    Provided By KIPS

  • White Papers // Mar 2014

    Cooperation-Aware VANET Clouds: Providing Secure Cloud Services to Vehicular Ad Hoc Networks

    Over the last couple of years, traditional VANET (Vehicular Ad-hoc NETwork) evolved into VANET-based clouds. From the VANET standpoint, applications became richer by virtue of the boom in automotive telematics and infotainment technologies. Nevertheless, the research community and industries are concerned about the under-utilization of rich computation, communication, and storage...

    Provided By KIPS

  • White Papers // Mar 2014

    How to Manage Cloud Risks Based on the BMIS Model

    Information always comes with security and risk problems. There is the saying that, \"The tall tree catches much wind,\" and the risks from cloud services will absolutely be more varied and more severe. Now-a-days, handling these risks is no longer just a technology problem. So far, a good deal of...

    Provided By KIPS

  • White Papers // Dec 2011

    A Survey of RFID Deployment and Security Issues

    This paper describes different aspects of a typical RFID implementation. Section 1 provides a brief overview of the concept of Automatic Identification and compares the use of different technologies while Section 2 describes the basic components of a typical RFID system. Section 3 and Section 4 deal with the detailed...

    Provided By KIPS

  • White Papers // Dec 2011

    A Multi-Application Controller for SAGE-Enabled Tiled Display Wall in Wide-Area Distributed Computing Environments

    Due to the recent advancement of networking and high-performance computing technologies, scientists can easily access large-scale data captured by scientific measurement devices through a network, and use huge computational power harnessed on the Internet for their analyses of scientific data. However, visualization technology, which plays a role of great importance...

    Provided By KIPS

  • White Papers // Dec 2011

    An Efficient DVS Algorithm for Pinwheel Task Schedules

    In the last decade, energy-aware computing has become widespread not only for portable and mobile devices powered by batteries, but also for large systems in which the cost of energy consumption and cooling is substantial. With Dynamic Voltage Scaling (DVS) techniques, processors are capable of performing at a range of...

    Provided By KIPS

  • White Papers // Dec 2011

    Partial Bicasting With Buffering for Proxy Mobile IPv6 Handover in Wireless Networks

    This paper addresses the Proxy Mobile IPv6 (PMIP) handover using bicasting in mobile/wireless networks. The bicasting scheme can be used to support the PMIP handover, which tends to waste the network resources of wireless links and incurs data losses during handover. The authors propose an enhanced scheme of PMIP handover,...

    Provided By KIPS

  • White Papers // Dec 2011

    A Model Comparison for Spatiotemporal Data in Ubiquitous Environments: A Case Study

    In ubiquitous environments, many applications need to process data with time and space dimensions. Because of this, there is growing attention not only on gathering spatiotemporal data in ubiquitous environments, but also on processing such data in databases. In order to obtain the full benefits from spatiotemporal data, the authors...

    Provided By KIPS

  • White Papers // Dec 2011

    Performance Evaluation of the WiMAX Network Based on Combining the 2D Markov Chain and MMPP Traffic Model

    WiMAX is intended for fourth generation wireless mobile communications where a group of users are provided with a connection and a fixed length queue. In present literature traffic of such network is analyzed based on the generator matrix of the Markov Arrival Process (MAP). In this paper a simple analytical...

    Provided By KIPS

  • White Papers // Dec 2011

    Performance Evaluation of Finite Queue Switching Under Two-Dimensional M/G/1(m) Traffic

    In this paper, the authors consider a local area network (LAN) of dual mode service where one is a token bus and the other is a Carrier Sense Multiple Access with a Collision Detection (CSMA/CD) bus. The objective of the paper is to find the overall cell/packet dropping probability of...

    Provided By KIPS

  • White Papers // Dec 2011

    Grobner Basis Attacks on Lightweight RFID Authentication Protocols

    Recently, RFID systems have attracted much attention due to their wide applications including inventory control, logistics, supply chain management, etc. Since communications in RFID systems are executed on public RF channels and any reader can get the tag's information easily, the systems without proper protection are vulnerable to eavesdropping, tracking,...

    Provided By KIPS

  • White Papers // Dec 2011

    A Log Analysis System With REST Web Services for Desktop Grids and Its Application to Resource Group-Based Task Scheduling

    It is important that desktop grids should be able to aggressively deal with the dynamic properties that arise from the volatility and heterogeneity of resources. Therefore, it is required that task scheduling be able to positively consider the execution behavior that is characterized by an individual resource. In this paper,...

    Provided By KIPS

  • White Papers // Sep 2011

    The Principle of Justifiable Granularity and an Optimization of Information Granularity Allocation as Fundamentals of Granular Computing

    Granular Computing has emerged as a unified and coherent framework of designing, processing, and interpretation of information granules. Information granules are formalized within various frameworks such as sets (interval mathematics), fuzzy sets, rough sets, shadowed sets, probabilities (probability density functions), to name several the most visible approaches. In spite of...

    Provided By KIPS