Northwestern Polytechnical University

Displaying 1-20 of 20 results

  • White Papers // Aug 2013

    CCA Secure Publicly Verifiable Public Key Encryption Without Pairings Nor Random Oracle and Its Applications

    Hosen ciphertext security (CCA security) hosen ciphertext security (CCA security) C is now a widely accepted necessary security notion for public key encryption. CCA secure public verifiable public key encryption has many applications such as threshold public key encryption and proxy re-encryption etc. Furthermore, these years \"Random oracle model\" has...

    Provided By Northwestern Polytechnical University

  • White Papers // Feb 2013

    Study on the Inter-Organizational Information System Adaptation Mechanism Based on Organizaitonal Identification

    The adaptation mechanism of inter-organizational information system based on organizational identification remains under explored questions in the area of information system. In order to overcome the inadequacy of previous research, this paper firstly seeks to elaborate on the previous literatures of inter-organizational information system adaptation and organizational identification. Then the...

    Provided By Northwestern Polytechnical University

  • White Papers // Jan 2013

    Review in Power Consumption of Disk Based Storage Systems

    The power of disk based storage systems has been becoming an increasingly problem in commercial domains. The work in this paper proposed several hardware based approaches and software based approaches for saving disk power consumption by making use of a lot of techniques. In this paper, such technology is described...

    Provided By Northwestern Polytechnical University

  • White Papers // Jan 2013

    A Kind of Memory Database Engine Based on Column-Storage Techniques

    Big data query requests higher performance in cloud computing environment, but traditional relational DBMS cannot achieve high query speed when processing large volume data, so it is a trend to apply column-storage techniques to process big data query in the field of data management. But deploying row-storage and column-storage databases...

    Provided By Northwestern Polytechnical University

  • White Papers // Dec 2012

    Performance Evaluation of Online Backup Cloud Storage

    Cloud storage provides storage service to user through inter-net. There are many different access interfaces for different applications. Online backup is the most developed application. Most comparison of online backup service focus on functional characters. There is not too much consider about performance evaluation. In this paper, the authors present...

    Provided By Northwestern Polytechnical University

  • White Papers // Sep 2012

    System-Level Calibration for Fusion-Based Wireless Sensor Networks

    Wireless sensor networks are typically composed of low-cost sensors that are deeply integrated in physical environments. As a result, the sensing performance of a wireless sensor network is inevitably undermined by biases in imperfect sensor hardware and the noises in data measurements. Although a variety of calibration methods have been...

    Provided By Northwestern Polytechnical University

  • White Papers // Sep 2012

    Study on the Construction of Enterprise Quality Culture for Brand Strategy

    Brand competition has become the domestic and international market competition mainstream. To survive and develop, enterprise must implement the brand strategy. Enterprise quality culture is an important part of corporate culture, but it is often overlooked by enterprise, thus restricting quality level and quality image improvement to a large extent....

    Provided By Northwestern Polytechnical University

  • White Papers // May 2012

    The Research of NN-KNN Hybrid Location Algorithm Based on Background Cloud Computing

    In this paper, a hybrid location algorithm for fingerprint-based indoor position systems is proposed based on background cloud computing. A novel computing method is applied to the hybrid algorithm for reducing computational complexity. The performance of the hybrid algorithm is simulated with both the example of Nearest Neighbors (NN) and...

    Provided By Northwestern Polytechnical University

  • White Papers // May 2012

    Implementation and Analysis of AES Encryption on GPU

    As internet becomes more and more important in commercial, government, finance and other key areas, there is an increasing demand of efficient data encryption solution. GPU is continuing its trend of vastly outperforming CPU while becoming more general purpose. In order to improve the efficiency of AES algorithm, this paper...

    Provided By Northwestern Polytechnical University

  • White Papers // May 2011

    Semantic Integration for Cross-Organizational Manufacturing Business Process

    Enhanced the Business-To-Business process integration capabilities is a key success factor in manufacturing industry. However, challenges such as changing markets and heterogeneous manufacturing resources counteract business process interactions. This paper proposes an integration framework for cross-organizational processes, in which two technologies, namely ontology and web service composition, are applied throughout...

    Provided By Northwestern Polytechnical University

  • White Papers // Apr 2011

    Autonomic Computing Capacity Management Approach With Cloud for Building e-Business

    Web Cluster is able to combine a set of backend capacities to function as a powerful Web Server for handling massive workloads towards successful e-business. However traditional Web Cluster has shortcomings with pre-deployed and pre-configured capacities upon traditional rigid infrastructure, which will lead more cost into redundancy and wasteness because...

    Provided By Northwestern Polytechnical University

  • White Papers // Mar 2011

    A Secure Method for Network Coding-Based Reprogramming Protocols in Wireless Sensor Networks

    Reprogramming protocols provide a convenient way to update program images via wireless communication. In hostile environments where there may be malicious attacks against wireless sensor networks, the process of reprogramming faces threats from potentially compromised nodes. While existing solutions can provide authentication services, they are insufficient for a new generation...

    Provided By Northwestern Polytechnical University

  • White Papers // Jan 2011

    Self-Localization in Wireless Sensor Networks Using Particle Filtering With Progressive Correction

    A centralized self-localization algorithm is used to estimate sensor locations. From the known positions of at least 3 anchor nodes the remaining sensor positions are estimated using an efficient Particle Filter (PF) with progressive correction. The measurement model is a simple two-parameter log-normal shadowing model, where the parameters are estimated...

    Provided By Northwestern Polytechnical University

  • White Papers // Dec 2010

    Efficient Homomorphic Hashing Approach for Secure Reprogramming in Wireless Sensor Networks

    While existing solutions can provide authentication services, they are insufficient for a new generation of network coding-based reprogramming protocols in wireless sensor networks. The authors present an security approach that is able to defend pollution attack against reprogramming protocols based on network coding. It employs a homomorphic hashing function and...

    Provided By Northwestern Polytechnical University

  • White Papers // Aug 2010

    Research and Design of Mine Electromechanical Equipment Closed-Loop Inspection System Based on Wireless Sensor Network

    This paper has analyzed the Significance of applying point-Inspection-system in Coal mining enterprises and proposed a solution of electromechanical equipment closed-loop inspection system. Handheld network terminal embedded by WinCE has been adopt to collect inspection information and manage Maintenance Workers. Wireless-LAN technology has been used here to establish the connection...

    Provided By Northwestern Polytechnical University

  • White Papers // Aug 2010

    Design of a Digital Preprocessor System Based on Software Radios Conception

    The paper designs and implements a six-channel digital preprocessor system. The preprocessor system is designed as much digital structure as possible, by calling the corresponding software packages, the basic hardware parameters of preprocessor system can be adjust to meet different needs in specific applications. Compared with the conventional preprocessor circuits,...

    Provided By Northwestern Polytechnical University

  • White Papers // Apr 2010

    Group Behavior Impact on an Opportunistic Localization Scheme

    In this paper, the authors tackled the localization problem from an opportunistic perspective, according to which a node can infer its own spatial position by exchanging data with passing by nodes, called peers. They consider an opportunistic localization algorithm based on the Linear Matrix Inequality (LMI) method coupled with a...

    Provided By Northwestern Polytechnical University

  • White Papers // Jul 2009

    Efficient Data Collection for Wireless Networks: Delay and Energy Tradeoffs

    This paper studies efficient data collection for wireless sensor networks. The paper presents efficient distributed algorithms with approximately the minimum delay, or the minimum messages to be sent by all nodes, or the minimum total energy costs by all nodes. The paper analytically proved that all the methods are either...

    Provided By Northwestern Polytechnical University

  • White Papers // Apr 2009

    A Scheduling Algorithm for Hybrid Distributed Real-Time Systems

    Real-time systems that support only a finite set of discrete configurations can be referred to as hybrid systems. However, recent Feedback Control Scheduling (FCS) algorithms for hybrid real-time systems are only applicable to single-processor systems. And existing FCS algorithms for distributed systems often assume that the systems have continuous control...

    Provided By Northwestern Polytechnical University

  • White Papers // Nov 2008

    Automatic Test Case Generation for BPEL Using Stream X-Machine

    To generate test cases for the unit testing of business process written in BPEL, developers have to prepare input data for the BPEL Process Under Test (PUT) and verification conditions for output data from the PUT. It could be a tedious task due to the complexity of the PUT which...

    Provided By Northwestern Polytechnical University

  • White Papers // May 2012

    Implementation and Analysis of AES Encryption on GPU

    As internet becomes more and more important in commercial, government, finance and other key areas, there is an increasing demand of efficient data encryption solution. GPU is continuing its trend of vastly outperforming CPU while becoming more general purpose. In order to improve the efficiency of AES algorithm, this paper...

    Provided By Northwestern Polytechnical University

  • White Papers // Jan 2011

    Self-Localization in Wireless Sensor Networks Using Particle Filtering With Progressive Correction

    A centralized self-localization algorithm is used to estimate sensor locations. From the known positions of at least 3 anchor nodes the remaining sensor positions are estimated using an efficient Particle Filter (PF) with progressive correction. The measurement model is a simple two-parameter log-normal shadowing model, where the parameters are estimated...

    Provided By Northwestern Polytechnical University

  • White Papers // Dec 2010

    Efficient Homomorphic Hashing Approach for Secure Reprogramming in Wireless Sensor Networks

    While existing solutions can provide authentication services, they are insufficient for a new generation of network coding-based reprogramming protocols in wireless sensor networks. The authors present an security approach that is able to defend pollution attack against reprogramming protocols based on network coding. It employs a homomorphic hashing function and...

    Provided By Northwestern Polytechnical University

  • White Papers // Jul 2009

    Efficient Data Collection for Wireless Networks: Delay and Energy Tradeoffs

    This paper studies efficient data collection for wireless sensor networks. The paper presents efficient distributed algorithms with approximately the minimum delay, or the minimum messages to be sent by all nodes, or the minimum total energy costs by all nodes. The paper analytically proved that all the methods are either...

    Provided By Northwestern Polytechnical University

  • White Papers // Aug 2010

    Research and Design of Mine Electromechanical Equipment Closed-Loop Inspection System Based on Wireless Sensor Network

    This paper has analyzed the Significance of applying point-Inspection-system in Coal mining enterprises and proposed a solution of electromechanical equipment closed-loop inspection system. Handheld network terminal embedded by WinCE has been adopt to collect inspection information and manage Maintenance Workers. Wireless-LAN technology has been used here to establish the connection...

    Provided By Northwestern Polytechnical University

  • White Papers // Aug 2010

    Design of a Digital Preprocessor System Based on Software Radios Conception

    The paper designs and implements a six-channel digital preprocessor system. The preprocessor system is designed as much digital structure as possible, by calling the corresponding software packages, the basic hardware parameters of preprocessor system can be adjust to meet different needs in specific applications. Compared with the conventional preprocessor circuits,...

    Provided By Northwestern Polytechnical University

  • White Papers // Mar 2011

    A Secure Method for Network Coding-Based Reprogramming Protocols in Wireless Sensor Networks

    Reprogramming protocols provide a convenient way to update program images via wireless communication. In hostile environments where there may be malicious attacks against wireless sensor networks, the process of reprogramming faces threats from potentially compromised nodes. While existing solutions can provide authentication services, they are insufficient for a new generation...

    Provided By Northwestern Polytechnical University

  • White Papers // Apr 2011

    Autonomic Computing Capacity Management Approach With Cloud for Building e-Business

    Web Cluster is able to combine a set of backend capacities to function as a powerful Web Server for handling massive workloads towards successful e-business. However traditional Web Cluster has shortcomings with pre-deployed and pre-configured capacities upon traditional rigid infrastructure, which will lead more cost into redundancy and wasteness because...

    Provided By Northwestern Polytechnical University

  • White Papers // Apr 2010

    Group Behavior Impact on an Opportunistic Localization Scheme

    In this paper, the authors tackled the localization problem from an opportunistic perspective, according to which a node can infer its own spatial position by exchanging data with passing by nodes, called peers. They consider an opportunistic localization algorithm based on the Linear Matrix Inequality (LMI) method coupled with a...

    Provided By Northwestern Polytechnical University

  • White Papers // Apr 2009

    A Scheduling Algorithm for Hybrid Distributed Real-Time Systems

    Real-time systems that support only a finite set of discrete configurations can be referred to as hybrid systems. However, recent Feedback Control Scheduling (FCS) algorithms for hybrid real-time systems are only applicable to single-processor systems. And existing FCS algorithms for distributed systems often assume that the systems have continuous control...

    Provided By Northwestern Polytechnical University

  • White Papers // Sep 2012

    System-Level Calibration for Fusion-Based Wireless Sensor Networks

    Wireless sensor networks are typically composed of low-cost sensors that are deeply integrated in physical environments. As a result, the sensing performance of a wireless sensor network is inevitably undermined by biases in imperfect sensor hardware and the noises in data measurements. Although a variety of calibration methods have been...

    Provided By Northwestern Polytechnical University

  • White Papers // Sep 2012

    Study on the Construction of Enterprise Quality Culture for Brand Strategy

    Brand competition has become the domestic and international market competition mainstream. To survive and develop, enterprise must implement the brand strategy. Enterprise quality culture is an important part of corporate culture, but it is often overlooked by enterprise, thus restricting quality level and quality image improvement to a large extent....

    Provided By Northwestern Polytechnical University

  • White Papers // May 2011

    Semantic Integration for Cross-Organizational Manufacturing Business Process

    Enhanced the Business-To-Business process integration capabilities is a key success factor in manufacturing industry. However, challenges such as changing markets and heterogeneous manufacturing resources counteract business process interactions. This paper proposes an integration framework for cross-organizational processes, in which two technologies, namely ontology and web service composition, are applied throughout...

    Provided By Northwestern Polytechnical University

  • White Papers // Feb 2013

    Study on the Inter-Organizational Information System Adaptation Mechanism Based on Organizaitonal Identification

    The adaptation mechanism of inter-organizational information system based on organizational identification remains under explored questions in the area of information system. In order to overcome the inadequacy of previous research, this paper firstly seeks to elaborate on the previous literatures of inter-organizational information system adaptation and organizational identification. Then the...

    Provided By Northwestern Polytechnical University

  • White Papers // Nov 2008

    Automatic Test Case Generation for BPEL Using Stream X-Machine

    To generate test cases for the unit testing of business process written in BPEL, developers have to prepare input data for the BPEL Process Under Test (PUT) and verification conditions for output data from the PUT. It could be a tedious task due to the complexity of the PUT which...

    Provided By Northwestern Polytechnical University

  • White Papers // Aug 2013

    CCA Secure Publicly Verifiable Public Key Encryption Without Pairings Nor Random Oracle and Its Applications

    Hosen ciphertext security (CCA security) hosen ciphertext security (CCA security) C is now a widely accepted necessary security notion for public key encryption. CCA secure public verifiable public key encryption has many applications such as threshold public key encryption and proxy re-encryption etc. Furthermore, these years \"Random oracle model\" has...

    Provided By Northwestern Polytechnical University

  • White Papers // May 2012

    The Research of NN-KNN Hybrid Location Algorithm Based on Background Cloud Computing

    In this paper, a hybrid location algorithm for fingerprint-based indoor position systems is proposed based on background cloud computing. A novel computing method is applied to the hybrid algorithm for reducing computational complexity. The performance of the hybrid algorithm is simulated with both the example of Nearest Neighbors (NN) and...

    Provided By Northwestern Polytechnical University

  • White Papers // Dec 2012

    Performance Evaluation of Online Backup Cloud Storage

    Cloud storage provides storage service to user through inter-net. There are many different access interfaces for different applications. Online backup is the most developed application. Most comparison of online backup service focus on functional characters. There is not too much consider about performance evaluation. In this paper, the authors present...

    Provided By Northwestern Polytechnical University

  • White Papers // Jan 2013

    Review in Power Consumption of Disk Based Storage Systems

    The power of disk based storage systems has been becoming an increasingly problem in commercial domains. The work in this paper proposed several hardware based approaches and software based approaches for saving disk power consumption by making use of a lot of techniques. In this paper, such technology is described...

    Provided By Northwestern Polytechnical University

  • White Papers // Jan 2013

    A Kind of Memory Database Engine Based on Column-Storage Techniques

    Big data query requests higher performance in cloud computing environment, but traditional relational DBMS cannot achieve high query speed when processing large volume data, so it is a trend to apply column-storage techniques to process big data query in the field of data management. But deploying row-storage and column-storage databases...

    Provided By Northwestern Polytechnical University