KIPS

Displaying 41-71 of 71 results

  • White Papers // Sep 2011

    A Fast Snake Algorithm for Tracking Multiple Objects

    A Snake is an active contour for representing object contours. Traditional snake algorithms are often used to represent the contour of a single object. However, if there is more than one object in the image, the snake model must be adaptive to determine the corresponding contour of each object. Also,...

    Provided By KIPS

  • White Papers // Sep 2011

    A Fair and Efficient Congestion Avoidance Scheme Based on the Minority Game

    In this paper, the authors propose a new congestion control scheme for high-speed networks. The basic idea of their proposed scheme is to adopt a game theory called, "Minority Game" (MG), to realize a selective reduction of the transmission speed of senders. More concretely, upon detecting any congestion, the scheme...

    Provided By KIPS

  • White Papers // Sep 2011

    A Study on the Business Strategy of Smart Devices for Multimedia Contents

    Information technology is changing the business value chain and business systems. This situation is due to the business value chain and the value creation factors in business. Technology companies and researchers are developing new businesses, but many companies and researchers cannot find successful ways to analyze and develop a business...

    Provided By KIPS

  • White Papers // Jun 2011

    An Efficient Broadcast Technique for Vehicular Networks

    Vehicular networks are a promising application of mobile ad hoc networks. In this paper, the authors introduce an efficient broadcast technique, called CB-S (Cell Broadcast for Streets), for vehicular networks with occlusions such as skyscrapers. In this environment, the road network is fragmented into cells such that nodes in a...

    Provided By KIPS

  • White Papers // Jun 2011

    CASPER: Congestion Aware Selection of Path With Efficient Routing in Multimedia Networks

    In earlier days, most of the data carried on communication networks was textual data requiring limited bandwidth. With the rise of multimedia and network technologies, the bandwidth requirements of data have increased considerably. If a network link at any time is not able to meet the minimum bandwidth requirement of...

    Provided By KIPS

  • White Papers // Jun 2011

    Packet Scheduling With QoS and Fairness for Downlink Traffic in WiMAX Networks

    The IEEE 802.16 standard is supposed to provide a wide-range broadband wireless service, but it leaves the implementation of the wireless resource scheduler as an open issue. The authors have studied the scheduling problem and propose a Two Level Scheduling (TLS) scheme with support for quality of service and fairness...

    Provided By KIPS

  • White Papers // Jun 2011

    Parallel Prefix Computation and Sorting on a Recursive Dual-Net

    The purpose of the Interconnection Networks (INs) is to connect processor/memory boards together to form a parallel or distributed system. In massively parallel computer systems, the interconnection networks play a crucial role in issues such as communication performance, hardware cost, computational complexity, and fault-tolerance. Much research has been reported in...

    Provided By KIPS

  • White Papers // Jun 2011

    Evaluating Service Description to Guarantee Quality of U-Service Ontology

    Efficient service description and modeling methodologies are essential for dynamic service composition to provide autonomous services for users in ubiquitous computing environments. In the authors' previous research, they proposed a 'U-service' ontology which is an abstract and structured concept for device operations in ubiquitous environments. One of the problems that...

    Provided By KIPS

  • White Papers // Jun 2011

    Development of an OPC Client-Server Framework for Monitoring and Control Systems

    In this paper, the current technological state of OPC (Openness, Productivity, and Collaboration; formerly "OLE for Process Control") standards and the problem statement of these OPC standards are discussed. The development of an OPC client-server framework for monitoring and control systems is introduced by using the new OPC Unified Architecture...

    Provided By KIPS

  • White Papers // Jun 2011

    Design of Multi-Dimensional Contents Retrieval UI for Mobile IPTV

    Since, two-way interactive broadcasting service began, remote controls have been fitted with 4 color buttons, which enables interaction and convenience to increase between users and content. Currently, diverse studies on IPTV are in progress. Particularly, as the mobile market rapidly grows, studies on mobile IPTV and on linkage with other...

    Provided By KIPS

  • White Papers // Jun 2011

    An Adequacy Based Test Data Generation Technique Using Genetic Algorithms

    As the complexity of software is increasing, generating an effective test data has become a necessity. This necessity has increased the demand for techniques that can generate test data effectively. This paper proposes a test data generation technique based on adequacy based testing criteria. Adequacy based testing criteria uses the...

    Provided By KIPS

  • White Papers // Jun 2011

    Analysis of Business Attributes in Information Technology Environments

    Information technology is changing the business value chain and business systems. This situation is due to the business value chain and the value creation factors in business. Technology companies and researchers are developing new businesses, but many companies and researchers cannot find successful ways to analyze and develop a business...

    Provided By KIPS

  • White Papers // Mar 2011

    Generic Constructions for Strong Designated Verifier Signature

    A designated verifier signature is a special type of digital signature, which convinces a designated verifier that she has signed a message in such a way that the designated verifier cannot transfer the signature to a third party. A strong designated verifier signature scheme enhances the privacy of the signer...

    Provided By KIPS

  • White Papers // Mar 2011

    Dynamic Load Balancing and Network Adaptive Virtual Storage Service for Mobile Appliances

    With the steady growth of mobile technology and applications, demand for more storage in mobile devices has also increased. A lightweight block-level protocol, Internet Advanced Technology Attachment (iATA), has been developed to deliver a cost-effective storage network solution for mobile devices to obtain more storage. This paper seeks to contribute...

    Provided By KIPS

  • White Papers // Mar 2011

    Accelerating the Sweep3D for a Graphic Processor Unit

    As a powerful and flexible processor, the Graphic Processing Unit (GPU) can offer a great faculty in solving many high-performance computing applications. Sweep3D, which simulates a single group time-independent discrete ordinates (Sn) neutron transport deterministically on 3D Cartesian geometry space, represents the key part of a real ASCI application. The...

    Provided By KIPS

  • White Papers // Mar 2011

    Adaptive Motion Vector Smoothing for Improving Side Information in Distributed Video Coding

    In this paper, an adaptive motion vector smoothing scheme based on weighted vector median filtering is proposed in order to eliminate the motion outliers more effectively for improving the quality of side information in frame-based distributed video coding. The authors use a simple motion vector outlier reliability measure for each...

    Provided By KIPS

  • White Papers // Mar 2011

    Security Framework for RFID-Based Applications in Smart Home Environment

    The concept of Smart-Homes is becoming more and more popular. It is anticipated that Radio Frequency IDentification (RFID) technology will play a major role in such environments. The authors can find many previously proposed schemes that focus solely on: authentication between the RFID tags and readers, and user privacy protection...

    Provided By KIPS

  • White Papers // Mar 2011

    Ensuring Anonymity for LBSs in Smartphone Environment

    With the rapid growth of GPS-enable Smartphones, the interest on using Location Based Services (LBSs) has increased significantly. The evolution in the functionalities provided by those Smartphones has enabled them to accurately pinpoint the location of a user. Because location information is what all LBSs depend on to process user's...

    Provided By KIPS

  • White Papers // Mar 2011

    Handling Malicious Flooding Attacks Through Enhancement of Packet Processing Technique in Mobile Ad Hoc Networks

    Mobile ad hoc networks are expected to be widely used in the near future. However, they are susceptible to various security threats because of their inherent characteristics. Malicious flooding attacks are one of the fatal attacks on mobile ad hoc networks. These attacks can severely clog an entire network, as...

    Provided By KIPS

  • White Papers // Mar 2011

    Guess and Determine Attack on Bivium

    Bivium is a simplified version of Trivium, a hardware profile finalist of the eSTREAM project. Bivium has an internal state size of 177 bits and a key length of 80 bits. In this paper, a guess and determine attack on this cipher is introduced. In the proposed method, the best...

    Provided By KIPS

  • White Papers // Mar 2011

    Virus Detection Method based on Behavior Resource Tree

    Due to the disadvantages of signature-based computer virus detection techniques, behavior-based detection methods have developed rapidly in recent years. However, current popular behavior-based detection methods only take API call sequences as program behavior features and the difference between API calls in the detection is not taken into consideration. This paper...

    Provided By KIPS

  • White Papers // Mar 2011

    A Method of Risk Assessment for Multi-Factor Authentication

    User authentication refers to user identification based on something a user knows, something a user has, something a user is or something the user does; it can also take place based on a combination of two or more of such factors. With the increasingly diverse risks in online environments, user...

    Provided By KIPS

  • White Papers // Mar 2011

    Lifting a Metadata Model to the Semantic Multimedia World

    This paper describes best-practices in lifting an image metadata standard to the Semantic Web. The authors provide guidelines on how an XML-based metadata format can be converted into an OWL ontology. Additionally, they discuss how this ontology can be mapped to the W3C's Media Ontology. This ontology is a standardization...

    Provided By KIPS

  • White Papers // Mar 2011

    A Cultural Dimensions Model Based on Smart Phone Applications

    One of the major factors influencing the phenomenal growth of the smart phone market is the active development applications based on open environments. Despite difficulties in finding and downloading applications due to the small screens and inconvenient interfaces of smart phones, users download applications nearly every day. Such user behavior...

    Provided By KIPS

  • White Papers // Mar 2011

    A Single Mobile Target Tracking in Voronoi-Based Clustered Wireless Sensor Network

    Despite the fact that the deployment of sensor networks and target tracking could both be managed by taking full advantage of Voronoi diagrams, very little few have been made in this regard. In this paper, the authors designed an optimized barrier coverage and an energy-efficient clustering algorithm for forming Vonoroi-based...

    Provided By KIPS

  • White Papers // Mar 2011

    A Clustering Protocol With Mode Selection for Wireless Sensor Network

    Wireless sensor networks are composed of a large number of sensor nodes with limited energy resources. One critical issue in wireless sensor networks is how to gather sensed information in an energy efficient way, since their energy is limited. The clustering algorithm is a technique used to reduce energy consumption....

    Provided By KIPS

  • White Papers // Mar 2011

    Analytical Coexistence Benchmark for Assessing the Utmost Interference Tolerated by IEEE 802.20

    Whether it is crosstalk, harmonics, or in-band operation of wireless technologies, interference between a reference system and a host of offenders is virtually unavoidable. In past contributions, a benchmark has been established and considered for coexistence analysis with a number of technologies including FWA, UMTS, and WiMAX. However, the previously...

    Provided By KIPS

  • White Papers // Mar 2011

    Effective Partitioning of Static Global Buses for Small Processor Arrays

    The mesh-connected processor array (\"Mesh\", for short) is one of fundamental parallel computational models. Its architecture is suitable for VLSI implementation and allows for a high degree of integration. However, the mesh has a crucial drawback in that its communication diameter is quite large due to the lack of a...

    Provided By KIPS

  • White Papers // Sep 2009

    Topological Boundary Detection in Wireless Sensor Networks

    The awareness of boundaries in wireless sensor networks has many benefits. The identification of boundaries is especially challenging since typical wireless sensor networks consist of low-capability nodes that are unaware of their geographic location. In this paper, the authors propose a simple, efficient algorithm to detect nodes that are near...

    Provided By KIPS

  • White Papers // Jun 2009

    A Scalable Wireless Body Area Network for Bio-Telemetry

    In this paper, authors propose a framework for the real-time monitoring of wireless biosensors. This is a scalable platform that requires minimum human interaction during set-up and monitoring. Its main components include a biosensor, a smart gateway to automatically set up the body area network, a mechanism for delivering data...

    Provided By KIPS

  • White Papers // Dec 2006

    Automatic Hardware/Software Interface Generation for Embedded System

    A large portion of the embedded system development process involves the integration of hardware and software. Unfortunately, communication across the hardware/software boundary is tedious and error-prone to create. This paper presents an automatic hardware/software interface generation system. As the front-end of hardware/software co-design frameworks, a system designer defines XML specifications...

    Provided By KIPS

  • White Papers // Mar 2011

    Lifting a Metadata Model to the Semantic Multimedia World

    This paper describes best-practices in lifting an image metadata standard to the Semantic Web. The authors provide guidelines on how an XML-based metadata format can be converted into an OWL ontology. Additionally, they discuss how this ontology can be mapped to the W3C's Media Ontology. This ontology is a standardization...

    Provided By KIPS

  • White Papers // Mar 2011

    A Cultural Dimensions Model Based on Smart Phone Applications

    One of the major factors influencing the phenomenal growth of the smart phone market is the active development applications based on open environments. Despite difficulties in finding and downloading applications due to the small screens and inconvenient interfaces of smart phones, users download applications nearly every day. Such user behavior...

    Provided By KIPS

  • White Papers // Sep 2011

    A Study on the Business Strategy of Smart Devices for Multimedia Contents

    Information technology is changing the business value chain and business systems. This situation is due to the business value chain and the value creation factors in business. Technology companies and researchers are developing new businesses, but many companies and researchers cannot find successful ways to analyze and develop a business...

    Provided By KIPS

  • White Papers // Jun 2011

    An Efficient Broadcast Technique for Vehicular Networks

    Vehicular networks are a promising application of mobile ad hoc networks. In this paper, the authors introduce an efficient broadcast technique, called CB-S (Cell Broadcast for Streets), for vehicular networks with occlusions such as skyscrapers. In this environment, the road network is fragmented into cells such that nodes in a...

    Provided By KIPS

  • White Papers // Jun 2011

    CASPER: Congestion Aware Selection of Path With Efficient Routing in Multimedia Networks

    In earlier days, most of the data carried on communication networks was textual data requiring limited bandwidth. With the rise of multimedia and network technologies, the bandwidth requirements of data have increased considerably. If a network link at any time is not able to meet the minimum bandwidth requirement of...

    Provided By KIPS

  • White Papers // Jun 2011

    Packet Scheduling With QoS and Fairness for Downlink Traffic in WiMAX Networks

    The IEEE 802.16 standard is supposed to provide a wide-range broadband wireless service, but it leaves the implementation of the wireless resource scheduler as an open issue. The authors have studied the scheduling problem and propose a Two Level Scheduling (TLS) scheme with support for quality of service and fairness...

    Provided By KIPS

  • White Papers // Jun 2011

    Parallel Prefix Computation and Sorting on a Recursive Dual-Net

    The purpose of the Interconnection Networks (INs) is to connect processor/memory boards together to form a parallel or distributed system. In massively parallel computer systems, the interconnection networks play a crucial role in issues such as communication performance, hardware cost, computational complexity, and fault-tolerance. Much research has been reported in...

    Provided By KIPS

  • White Papers // Jun 2011

    Evaluating Service Description to Guarantee Quality of U-Service Ontology

    Efficient service description and modeling methodologies are essential for dynamic service composition to provide autonomous services for users in ubiquitous computing environments. In the authors' previous research, they proposed a 'U-service' ontology which is an abstract and structured concept for device operations in ubiquitous environments. One of the problems that...

    Provided By KIPS

  • White Papers // Jun 2011

    Development of an OPC Client-Server Framework for Monitoring and Control Systems

    In this paper, the current technological state of OPC (Openness, Productivity, and Collaboration; formerly "OLE for Process Control") standards and the problem statement of these OPC standards are discussed. The development of an OPC client-server framework for monitoring and control systems is introduced by using the new OPC Unified Architecture...

    Provided By KIPS

  • White Papers // Jun 2011

    Design of Multi-Dimensional Contents Retrieval UI for Mobile IPTV

    Since, two-way interactive broadcasting service began, remote controls have been fitted with 4 color buttons, which enables interaction and convenience to increase between users and content. Currently, diverse studies on IPTV are in progress. Particularly, as the mobile market rapidly grows, studies on mobile IPTV and on linkage with other...

    Provided By KIPS

  • White Papers // Jun 2011

    An Adequacy Based Test Data Generation Technique Using Genetic Algorithms

    As the complexity of software is increasing, generating an effective test data has become a necessity. This necessity has increased the demand for techniques that can generate test data effectively. This paper proposes a test data generation technique based on adequacy based testing criteria. Adequacy based testing criteria uses the...

    Provided By KIPS

  • White Papers // Jun 2011

    Analysis of Business Attributes in Information Technology Environments

    Information technology is changing the business value chain and business systems. This situation is due to the business value chain and the value creation factors in business. Technology companies and researchers are developing new businesses, but many companies and researchers cannot find successful ways to analyze and develop a business...

    Provided By KIPS

  • White Papers // Mar 2011

    A Single Mobile Target Tracking in Voronoi-Based Clustered Wireless Sensor Network

    Despite the fact that the deployment of sensor networks and target tracking could both be managed by taking full advantage of Voronoi diagrams, very little few have been made in this regard. In this paper, the authors designed an optimized barrier coverage and an energy-efficient clustering algorithm for forming Vonoroi-based...

    Provided By KIPS

  • White Papers // Mar 2011

    A Clustering Protocol With Mode Selection for Wireless Sensor Network

    Wireless sensor networks are composed of a large number of sensor nodes with limited energy resources. One critical issue in wireless sensor networks is how to gather sensed information in an energy efficient way, since their energy is limited. The clustering algorithm is a technique used to reduce energy consumption....

    Provided By KIPS

  • White Papers // Mar 2011

    Analytical Coexistence Benchmark for Assessing the Utmost Interference Tolerated by IEEE 802.20

    Whether it is crosstalk, harmonics, or in-band operation of wireless technologies, interference between a reference system and a host of offenders is virtually unavoidable. In past contributions, a benchmark has been established and considered for coexistence analysis with a number of technologies including FWA, UMTS, and WiMAX. However, the previously...

    Provided By KIPS

  • White Papers // Dec 2011

    A Survey of RFID Deployment and Security Issues

    This paper describes different aspects of a typical RFID implementation. Section 1 provides a brief overview of the concept of Automatic Identification and compares the use of different technologies while Section 2 describes the basic components of a typical RFID system. Section 3 and Section 4 deal with the detailed...

    Provided By KIPS

  • White Papers // Dec 2011

    A Multi-Application Controller for SAGE-Enabled Tiled Display Wall in Wide-Area Distributed Computing Environments

    Due to the recent advancement of networking and high-performance computing technologies, scientists can easily access large-scale data captured by scientific measurement devices through a network, and use huge computational power harnessed on the Internet for their analyses of scientific data. However, visualization technology, which plays a role of great importance...

    Provided By KIPS

  • White Papers // Dec 2011

    An Efficient DVS Algorithm for Pinwheel Task Schedules

    In the last decade, energy-aware computing has become widespread not only for portable and mobile devices powered by batteries, but also for large systems in which the cost of energy consumption and cooling is substantial. With Dynamic Voltage Scaling (DVS) techniques, processors are capable of performing at a range of...

    Provided By KIPS

  • White Papers // Jun 2013

    A Secure Network for Mobile Wireless Service

    The mobile wireless network is becoming more and more popular now-a-days. The authors are especially interested in a special kind of wireless network-an ad hoc network. As demonstrated in, an ad hoc network has its advantages and they will demonstrate that it is suitable for network applications with security requirements...

    Provided By KIPS

  • White Papers // Jun 2009

    A Scalable Wireless Body Area Network for Bio-Telemetry

    In this paper, authors propose a framework for the real-time monitoring of wireless biosensors. This is a scalable platform that requires minimum human interaction during set-up and monitoring. Its main components include a biosensor, a smart gateway to automatically set up the body area network, a mechanism for delivering data...

    Provided By KIPS

  • White Papers // Sep 2009

    Topological Boundary Detection in Wireless Sensor Networks

    The awareness of boundaries in wireless sensor networks has many benefits. The identification of boundaries is especially challenging since typical wireless sensor networks consist of low-capability nodes that are unaware of their geographic location. In this paper, the authors propose a simple, efficient algorithm to detect nodes that are near...

    Provided By KIPS

  • White Papers // Mar 2014

    Cooperation-Aware VANET Clouds: Providing Secure Cloud Services to Vehicular Ad Hoc Networks

    Over the last couple of years, traditional VANET (Vehicular Ad-hoc NETwork) evolved into VANET-based clouds. From the VANET standpoint, applications became richer by virtue of the boom in automotive telematics and infotainment technologies. Nevertheless, the research community and industries are concerned about the under-utilization of rich computation, communication, and storage...

    Provided By KIPS

  • White Papers // Mar 2014

    How to Manage Cloud Risks Based on the BMIS Model

    Information always comes with security and risk problems. There is the saying that, \"The tall tree catches much wind,\" and the risks from cloud services will absolutely be more varied and more severe. Now-a-days, handling these risks is no longer just a technology problem. So far, a good deal of...

    Provided By KIPS

  • White Papers // Dec 2013

    Developing a Dynamic Materialized View Index for Efficiently Discovering Usable Views for Progressive Queries

    The rapid growth of numerous data intensive applications (e.g., astronomy, biology, and social media) has led to significant research being focused the problem of analyzing a large amount of data in databases. In such data intensive applications, a new type of query, which is called a Progressive Query (PQ), is...

    Provided By KIPS

  • White Papers // Dec 2013

    The Architectural Pattern of a Highly Extensible System for the Asynchronous Processing of a Large Amount of Data

    These days the amount of information required by human hands is constantly increasing. In turn, results in an increase of a demand on software applications that allow representing, analyzing, and modifying this information in a more convenient way. The sources of this amount of information could be a local database,...

    Provided By KIPS

  • White Papers // Sep 2013

    Round Robin with Server Affinity: A VM Load Balancing Algorithm for Cloud Based Infrastructure

    Cloud computing is an evolving computing paradigm that has influenced every other entity in the globalized industry, whether it is in the public sector or the private sector. Considering the growing importance of cloud, finding new ways to improve cloud services is an area of concern and research focus. The...

    Provided By KIPS

  • White Papers // Jun 2013

    An Analysis of Replication Enhancement for a High Availability Cluster

    Various proposals have sought to increase data reliability and availability on cluster networks. Database systems have their own protection schemes for failover conditions so that they can continue to serve their applications and user processes. However, HA (High-Availability) requires a high cost in that it uses a complex code in...

    Provided By KIPS

  • White Papers // Dec 2012

    An Adaptive Workflow Scheduling Scheme Based on an Estimated Data Processing Rate for Next Generation Sequencing in Cloud Computing

    The cloud environment makes it possible to analyze large data sets in a scalable computing infrastructure. In the bioinformatics field, the applications are composed of the complex workflow tasks, which require huge data storage as well as a computing-intensive parallel workload. Many approaches have been introduced in distributed solutions. However,...

    Provided By KIPS

  • White Papers // Dec 2012

    A Comparative Study of Estimation by Analogy using Data Mining Techniques

    Software estimations provide an inclusive set of directives for software project developers, project managers, and the management in order to produce more realistic estimates based on deficient, uncertain, and noisy data. A range of estimation models are being explored in the industry, as well as in academia, for research purposes...

    Provided By KIPS

  • White Papers // Sep 2012

    Texture Comparison with an Orientation Matching Scheme

    Texture is an important visual feature for image analysis. Many approaches have been proposed to model and analyze texture features. Although these approaches significantly contribute to various image-based applications, most of these methods are sensitive to the changes in the scale and orientation of the texture pattern. Because textures vary...

    Provided By KIPS

  • White Papers // Mar 2011

    Effective Partitioning of Static Global Buses for Small Processor Arrays

    The mesh-connected processor array (\"Mesh\", for short) is one of fundamental parallel computational models. Its architecture is suitable for VLSI implementation and allows for a high degree of integration. However, the mesh has a crucial drawback in that its communication diameter is quite large due to the lack of a...

    Provided By KIPS