Science & Engineering Research Support soCiety (SERSC)

Displaying 1-40 of 1266 results

  • White Papers // May 2015

    Study on Architecture and Implementation of Port Logistics Information Service Platform Based on Cloud Computing1

    The large-scale comprehensive port which comprises inland port, airport and harbor plays an important role in leading regional economy and participating international division. This paper analyses service objects and functional positioning of port logistics information service platform firstly. The architecture of port logistics information service platform upon cloud computing is...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // May 2015

    A Spatio-Temporal Simulation Model for Incremental Clustering in Massive Moving Objects Data Set

    The real-world data process of large spatio-temporal data collection presents a very difficult technical problem. Firstly, the given process is very expensive, requiring a lot of various high-technology software instruments and modern hardware infrastructure (sensors, servers, GPS infrastructure, etc.) installations; secondly, this process sometimes cannot show special traffic patterns, which...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // May 2015

    MRG-DBSCAN: An Improved DBSCAN Clustering Method Based on Map Reduce and Grid

    DBSCAN (Density - Based Spatial Clustering of Application with Noise) is a density-based clustering algorithm. This algorithm clusters data of high density. The traditional DBSCAN clustering algorithm in finding the core object, will use this object as the center core, extends outwards continuously. At this point, the core objects growing,...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // May 2015

    Improvements in Data Mining Association Rules Algorithm

    Mining association rules in data mining as an important species, has now got very extensive application in many fields, is a hot research topic in data mining. Because of the traditional Apriori algorithm in data mining in the process of operation for a long time and produce a large number...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // May 2015

    An Efficient Portable Navigation Device with GPS and BDS Positioning Capabilities

    A portable navigation device is a portable electronic product, which has an important function in terms of positioning capability. In order to improve the positioning performance, an efficient portable navigation device is proposed in this paper. The proposed portable navigation device integrates the GPS (Global Positioning System) receiver module and...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // May 2015

    Wind Data Preprocessing Algorithm Based on Extracting Isolated Points

    In this paper, against the deficiency of existing wind data processing, proposed a data processing method based on special points extraction S-time algorithm, combining the thought of clustering-based on density with preprocessing, preliminary filtering the special points then determine isolated points via the method of outlier determination that this paper...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Apr 2015

    Utility-based Virtual Cloud Resource Allocation Model and Algorithm in Cloud Computing

    How to satisfy the users' QoS (Quality-of-Service) requirements while improving the resource utilization is one of the key technologies in cloud computing environment. In the authors' paper, a virtual cloud resource allocation model VCRAM-U (Utility-based Virtual Cloud Resource Allocation Model) is proposed. In their model, the problem of virtual cloud...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Apr 2015

    Study on Cloud Security Risk and Remedy

    Recently, cloud computing is most powerful research area because of its flexibility and cost efficiency. The environment provides dynamic, easily scalable services. Although cloud computing promises to the organization as well as consumers to make life much easier, still it has considerable level of security issues. When data is transferred...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Apr 2015

    The String Similarity Query Processing in Cloud Computing System

    In this paper, the authors target at string similarity search in cloud systems. Existing papers focus on query processing within a single server and it incurs main memory overflow and external memory overflow while dealing with big data. For the above problems, the paper proposes a distributed index to support...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Apr 2015

    A Data Transmission Method for Resource Monitoring under Cloud Computing Environment

    Currently, the combined push-pull model is usually applied in the resource monitoring under cloud computing environment. However, the quantity of data gathered by the producers is much less than those received by the monitor so that a lot of resource is wasted. In order to maintain the data consistency of...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Apr 2015

    Requirements Capture and Comparative Analysis of Cloud Security Techniques

    Convergence and ubiquity are the key characteristics of tomorrow's service provision infrastructures. Today, cloud architectures offer cost-efficient backbones that support transmission, storage and computing of applications contents. These architectures can be used for business, scientific and other computing purposes. However, the diversity of these services, delivered through cloud infrastructures, increases...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Apr 2015

    Applying Dependency of Attributes for Business Data Mining in Information Systems: A Theoretical Framework

    In this paper, the authors present the applications of dependency of attributes in information systems for data mining from business datasets. Firstly, they present the theoretical framework for data clustering on small business dataset. It is based on a construction of a hierarchical rough set approximation in an information system...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Apr 2015

    Erasure Codes-based Storage-aware Protocol for Preserving Cloud Data under Correlation Failures

    Distributed storage of cloud data imposes a great challenge for assuring data availability and reliability in the face of stochastic failures and attacks. Although redundancy scheme such as erasure codes or network coding schemes can be used to improve storage efficiency, they do not consider the scenario that the network...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Apr 2015

    A Mixed-Prediction based Method for Allocating Cloud Computing Resources

    Due to lacking valid prediction for resource requirement, the existing application approaches for cloud computing resource could hardly achieve a high efficiency. According to this point, the authors propose a mixed-prediction based resource allocation approach in this paper, which is abbreviated as MPRA. This proposed MPRA employs FFT (Fast Fourier...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Apr 2015

    Research on Switching Strategy of Mobile Cloud Computing based on Fusion of Threshold Judgment and Network Selection

    In order to improve the service performance of mobile cloud computing, the paper strategy launched a study about switching strategy of mobile cloud computing, the authors propose a fused mobile cloud computing switching method based on threshold judgment and network selection. This method divided the switching strategy of mobile cloud...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Apr 2015

    Efficient and Enhanced Load Balancing Algorithms in Cloud Computing

    A cloud computing is a new paradigm that enables users to access applications, infrastructures and service resources by using thin clients at anytime and anywhere. Through, these paradigm users can set up the required resources and they have to pay only for the required resources. Due to rapid growth of...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Apr 2015

    P2PCloud-W: A Novel P2PCloud Workflow Management Architecture Based on Petri Net

    IaaS model in the cloud computing provides infrastructure services to users. However, the provider of such centralized cloud requires notable investments to maintain the infrastructures. P2P cloud, whose infrastructures are provided by multiple volunteer nodes in the P2P network, gives a low cost option to the provision of cloud computing....

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Apr 2015

    Design of a High-Speed Serial Programming Interface Compatible with Bluetooth Embedded Systems

    In this paper, the authors designed a Serial Programming Interface (SPI) suitable for embedded systems, especially for Bluetooth baseband. Proposed architecture is compatible for the APB bus in AMBA bus architecture. The 8-bit design of the SPI module is in charge of transferring the data and the instructions between the...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Apr 2015

    An Agent-based Simulation System for Evolution of Interplay between E-Commerce Vendor and Consumers

    Computational experiment methods which integrated agent, GA and complex network are used to study the co-evolution of e-commerce service vendors and consumers via a virtually reality system. The decision making process of e-commerce service vendors and consumers is described against the backdrop of collaborative e-commerce. Key algorithms such as consumer...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Apr 2015

    A Real-time Shape Recognition Scheme for Hardware Implementation

    In this paper, the authors present a shape recognition scheme for real-time embedded systems. It was hard to achieve real-time processing on the typical embedded systems. After analyzing the overall image processing and shape recognition process, they introduced massively parallel processing schemes, and finally implemented special purpose FPGA (Field-Programmable Gate...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Apr 2015

    Cloud-Brain: A Knowledge-Based Development System for End-User in Cloud Computing

    With the development of the cloud computing, increasing application and service based on cloud can be used by end-users. However, for these applications, the end-users can only use them passively. Without the programming experience, the end-users hardly involve their knowledge and awareness into the logic of applications. Cloud computing can...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Apr 2015

    Developing and Evaluating Mobile Sensing for Smart Home Control

    Many of researches in controlling smart home system have been proposed. Most of previous approaches in controlling smart home system requires interventions and commands from user. This paper propose a system about smart home based on mobile sensing that does not requires interventions and commands from the user. Mobile sensing...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Apr 2015

    A New Trust Model in Cloud Computing Environments

    Trust management is fundamental to identify malicious, selfish and compromised nodes which have been authenticated. It has been widely studied in many network environments such as peer-to-peer networks, grid and pervasive computing and so on. In the paper, the authors propose a Trust Model (TM) based on fuzzy logic inferences,...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Apr 2015

    Challenges and Issues in DATA Stream: A Review

    Data stream is a continuous, time varying, massive and infinitely ordered sequence of data elements. The streaming data are fast changing with time, it is impossible to acquire all the elements in a data stream. Therefore, each data element should be examined at most once in data streams. Memory usage...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Apr 2015

    A Common Data Storage Solution for SE-based Membership Card Applications

    In order to encourage customers to return, more and more retailers issue membership cards that offer certain exclusive benefits to the customers who own them. As it is not convenient for the customers to bring many plastic membership cards with them, electronic membership cards emerge. However, traditional electronic membership cards...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Apr 2015

    Remotely Controlled Management on a Small Firewall Server Using a Virtual Server

    In this paper, the authors suggest a firewall management method using a virtual server in order to allow a manager equipped with a smart phone not only to detect and prevent security threats but also to control firewalls anytime, anywhere. Recently, hackers' threatening over security is constantly increasing, but companies...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Apr 2015

    Trend Towards the Use of Complex Networks in Cloud Computing Environment

    As a result of stochasticity of the spreading process and topological complexity of the cloud computing, it is an arduous task to characterize the nodes which are far more influential than others. The entire objective of this paper is to examine complex networking based cloud computing. Complex networks are those...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Apr 2015

    Studying Security Weaknesses of Android System

    As smartphones are generalized, various technologies and services have been introduced and are in wide use. From simply using calling or texting services, Internet banking and transaction system that require sensitive personal information emerged. Google's android, one of the representative OS of smartphones, was developed based on an open source,...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Apr 2015

    Data Outsourcing based on Secure Association Rule Mining Processes

    Data mining is the process of extracting information from data warehousing applications. Data outsourcing is the major task in present days, for accessing services and other features of the database processing. But sometimes this process may achieve to split among various parties with recommended data items in analyzing of the...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Apr 2015

    Securing Cloud Emails Using Two Factor Authentication Based on Password/Apps in Cloud Computing

    Cloud computing has been extending extensively, involving multiple users on the service it provides. Cloud based email is one of services provided by cloud computing with number of users expanding on yearly basis. Cloud computing faces concerning problem of security and privacy mainly based on its working environment. Identity authentication...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Apr 2015

    ASTAW: Auto-Scaling Threshold-based Approach for Web Application in Cloud Computing Environment

    In recent years, the number of users and service providers are increasing in using cloud services so the accessibility and the effective management of the required resources, irrespective of the time and place, seem to be of great importance for both sides. Improving the performance and utilization of the cloud...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Apr 2015

    Formal Description of the Virtual Machines System Framework

    Virtual resources have the duality of hardware and software, which brings new challenges to virtual resources management and manipulation. There is urgent need for formally describing virtual resources in order to effectively reason about virtual resources allocation, scheduling and management. This paper describes the virtual resources and their dynamic behavior....

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Apr 2015

    The Research of Data Security Mechanism Based on Cloud Computing

    With the wide use of cloud computing services, users require higher and higher security. So, the safety of cloud computing is the first consideration of users to choose. In the development of cloud computing, the application proportion of virtualization gradually increase, the scope and depth of the safety gradually expand....

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Apr 2015

    Research on Privacy Protection Approach for Cloud Computing Environments

    Cloud computing is a convenient and cost efficient way that refers to the running of software over a network, as on a local computer. But, what is cheap and easy isn't always safe. Storing important data on cloud means that the users give up a certain control of privacy. Privacy...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Apr 2015

    A Cross-Domain Authentication Method for Cloud Computing

    The use of security certificates under the cloud environment is the foundation to establish mutual trust between the cloud and the user. In this paper, the authors propose an authentication method-based on zero-knowledge proof and the mind of key escrow. With the method, authentication will not only satisfy the requirement...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Apr 2015

    An Enhanced Cloud Network Load Balancing Approach Using Hierarchical Search Optimization Technique

    As one of the driving forces changing the way research and industry uses virtualization, distributed computing, internet, software and web services today and cloud computing stands tall. A cloud is an ecosystem of data centers, distributed servers, and clients all interconnected to each other. The unique selling point of a...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Apr 2015

    Research on FPGA-Based Controller for Nonlinear System

    Many of linear control applications require real-time operation; higher density programmable logic devices such as Field Programmable Gate Array (FPGA) can be used to integrate large amounts of logic in a single IC. This paper, proposes a developed method to design PD Controller (PDC) with optimal-gains using FPGA. The method...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Apr 2015

    Monoecism Algorithm in the Application of E-Commerce Information Security

    With the development of e-commerce industry, the security of business information has attracted a lot of attention. The paper puts forward the monoecism watermarking algorithm. The algorithm divides image into two parts: ROI (Region Of Interest) and RONI (Region Of Non-Interest) and respectively deal with the two parts. Female watermark...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Mar 2015

    Ontology-Based Function Optimization of S2B E-Commerce Network Platform for College Students' Creative Works

    Student To Business (S2B) e-commerce network platform is designed to display the college students' creative works, and build joint channel for the creative talents of college and small and medium-sized enterprises requiring innovative resources. Firstly, this paper analyses the targets and features of S2B e-commerce platform. Secondly, the user requirements-oriented...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Mar 2015

    Experimental Comparison of Hybrid and Native Applications for Mobile Systems

    Currently, mobile applications can be developed with two ways, native or hybrid applications. In this paper, the authors develop representative mobile application, social network service application, in both of native method and hybrid method to evaluate with the application at the aspect of development cost and performance cost. There are...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Feb 2010

    A New Global Consistent Checkpoint Based on OS Virtualization

    Checkpoint can store and recovery applications when faults happen and is becoming critical to large information systems. Unfortunately, existing checkpoint tools have some limitations such as: not transparent to applications, ignoring file system states, cluster checkpoint is not well supported, and so on. The authors present a light weight OS...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Jun 2014

    Improved Multi Threshold Birch Clustering Algorithm

    The BIRCH algorithm is a clustering algorithm suitable for very large data sets. In the algorithm, a CF-tree is built whose all entries in each leaf node must satisfy a uniform threshold T, and the CF-tree is rebuilt at each stage by different threshold. But using a single threshold cause...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Jun 2014

    Spectral Clustering Using Optimized Gaussian Kernel Function

    Data clustering techniques are an important aspect used in many fields such as data mining, pattern recognition and pattern classification, data compression, machine learning, image analysis, and bioinformatics. The purpose of clustering is to group data points into clusters in which the similar data points are grouped in the same...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Dec 2013

    Visualising Data Using Reservoir with Clustering

    Identifying structure in high dimensional data spaces is a difficult problem. In this paper the authors illustrate a new method of visualizing and projecting time series data using reservoir computing with clustering algorithms. They show the advantages of using clustering with reservoir to visualize data. Then they extend the clustering...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Apr 2014

    A Testing Technique of Microgrid EMS using the Hardware-in-the Loop Simulation (HILS) System

    A microgrid is composed of distributed power generation systems, distributed energy storage systems, loads as a small scale power system. Generally, the microgrid is operated by an Energy Management System (EMS). In this paper, a testing technique for a microgrid EMS using the Hardware-In-The-Loop simulation (HILS) technique is introduced. Especially,...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Apr 2014

    Energy based Efficient Resource Scheduling: A Step Towards Green Computing

    Cloud computing is an evolving area of efficient utilization of computing resources. Data centers accommodating cloud applications ingest massive quantities of energy, contributing to high functioning expenditures and carbon footprints to the atmosphere. Hence, green cloud computing resolutions are required not only to save energy for the environment but also...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Jun 2014

    Location Recommendation System Using Big Data

    Active SNS and the amount of data which increases very fast these days, at WEF, the first remarkable technology of arising 10th technology of 2012 is called big data. Big data extracts the value of collected, saved, analyzed, and processed large data by using database management tool. In this paper,...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Oct 2012

    Detecting Active Devices in Intranets Using Existing Network Management Information

    Global warming is now a major social concern. Stemming the growth of CO2 in the atmosphere is imperative. Fossil fuel is a major source of CO2. The Great East Japan Earthquake has shown that over-dependence on nuclear energy carries a heavy risk. Thus, power consumption must be reduced. Considering the...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // May 2014

    A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster

    In order to solve the problems of ill-balanced task allocation, long response time, low throughput rate and poor performance, which appeared in cluster system, this paper proposes a new load balancing algorithm of homogeneous cluster based on the variation trend of entropy. In this paper, the authors introduces the thermodynamic...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // May 2014

    A QoS Constraints Location-based Services Selection Model and Algorithm under Mobile Internet Environment

    With the rapid development of communication technology and mobile Internet, selecting from mass location-based services to meet the needs for different users becomes the research hot spot under mobile Internet environment. First of all, it starts from QoS constraints as well as user preferences in this paper, and then describes...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // May 2014

    Research and Application of Data Mining and NARX Neural Networks in Load Forecasting

    The relationship between med-long term load forecasting and socio-economic indicators is very difficult to describe with an accurate mathematical model. The paper introduce data mining technology into the association analysis of China's electricity consumption growth, select many socio-economic indicators since 2000, constitute the relevant factors database, complement of a few...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // May 2014

    Weighted Least Square Twin Support Vector Machine for Imbalanced Dataset

    In this paper the authors propose a Weighted Least Square Twin Support Vector Machine (WLSTSVM) for imbalanced dataset. Real world data are imbalanced in nature due to which most of the classification techniques do not work well. In imbalanced data, there is a huge difference between the numbers of data...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // May 2014

    Mining a New Movement Pattern in RFID Database on Internet of Things

    In the last few years, RFID is commonly used in many related fields of new service application and new study as one of the significant technological advancements, such as science manufacturing, logistics transportation, traffic management, medical information, and so on. Those intelligent and automatic innovative products gradually take the place...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // May 2014

    An Efficient Hybrid Intrusion Detection System based on C5.0 and SVM

    Now-a-days, much attention has been paid to Intrusion Detection System (IDS) which is closely linked to the safe use of network services. Several machine-learning paradigms including neural networks, Linear Genetic Programming (LGP), Support Vector Machines (SVM), Bayesian networks, Multivariate Adaptive Regression Splines (MARS) Fuzzy Inference Systems (FISs), etc. have been...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // May 2014

    A Construction Method of Gene Expression Data Based on Information Gain and Extreme Learning Machine Classifier on Cloud Platform

    With the large-scale application of high dimensional gene expression data which exists lots of redundant information, it may waste a lot of time in feature selection and classification. By analyzing the process of MapReduce computing paradigms on cloud platform, it is found that the feature selection which through parallel and...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // May 2014

    The Evolution of Information Resource Allocation Research based on Knowledge Mapping

    Information resource allocation is one of the most important research areas of information resource management and information economics. Based on the bibliography references included in ISI Web of knowledge, and by use of visualization network analysis tool - Citespace to conduct co-citation and cluster analysis of collected data, this paper...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Jun 2014

    Query Processing on OLAP System with Cloud Computing Environment

    The conventional researches on a distributed On-Line Analytical Processing (OLAP) system have been in hardship to be adapted to real business environment. However, the recent spread of cloud PaaS (Platform-as-a-Services) provides new chances in the field of a distributed OLAP. OLAP query execution costs many minutes by its enormous data...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Jun 2014

    Raw Data Recovery from Pulse Code Modulation Pieces in the BitTorrent Environment

    BitTorrent is an issue for copyright protection and infringements should be punished based on evidence of invasion of the rights of others. In the BitTorrent system, seeders possess the complete content and leechers have partial content, and the content is shared among peers. Copyrighted content is easily distinguished with complete...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Jun 2014

    Enhancing User-friendliness of the User Taste Prediction Service Using MapReduce Framework

    In the authors' previous paper, a user similarity-based contents recommendation service using NFC was proposed for the same goal. This service used a small sample because it used only information of the user who had watched a museum. However, it has been shown that there are some limitations resulting from...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Jun 2014

    Study on a Classification Model of Data Stream based on Concept Drift

    In the data stream classification process, in addition to the solution of massive and real-time data stream, the dynamic changes of the need to focus and study. From the angle of detecting concept drift, according to the dynamic characteristics of the data stream. This paper proposes a new classification method...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Apr 2014

    Social Network Visualization Method using Inherence Relationship of User Based on Cloud

    Most of social network visualization methods have been only focusing on presentation of social network relationship. However, the methods do not consider an efficient processing speed and computational complexity for increasing at the ratio of arithmetical of a big data regarding social network. This paper proposes a cloud based on...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // May 2014

    An Extension of Virtual Computing Laboratories: Scalable Virtual Desktop Infrastructure on Cloud Computing

    Virtual Desktop Infrastructure (VDI) based on Virtual Computing Laboratories (VCL) model has been implemented in a small or medium scale on cloud computing in universities. Conventional physical computing laboratories with thousands of PCs are still widely used and co-exist with the VCL; however, the conventional PCs are not fully utilized...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // May 2014

    Implementation of GP-GPU with SIMT Architecture in the Embedded Environment

    Recent embedded processors become to be multi-cored, due to the increased power consumption by higher operating frequencies. Multi-core processors stimulate applications to be parallelized. Since general purpose CPU has small number of core, which is optimized for serial processing, it has a limitation of parallel processing. To overcome this limitation,...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // May 2014

    An Approach of Risk Management for Multimedia Streaming Service in Cloud Computing

    Along with internet broadcasting technology, cloud broadcasting is gradually becoming the development tendency to audience view. But the problems which existed in cloud environment also may affect in cloud based multimedia streaming service area. In this paper, the authors proposes an approach of risk management for multimedia streaming service in...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Mar 2014

    Dynamic Scheduling Algorithms for Streaming Media Based on Proxy Caching in Education system

    With development of digital multimedia, many applications, such as VoD, remote education, and so on, becomes a reality. Multimedia resource in education system becomes very rich. With the increasing number of multimedia files in school server, how terminal computers in classrooms fetch multimedia at fast speed and low cost is...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Mar 2014

    Metastability-based Feedback Method for Enhancing FPGA-based TRNG

    In this paper the authors present a novel and efficient method to enhance the randomness of a Programmable Delay Line (PDL)-based True Random Number Generator (TRNG) by introducing metastability-based feedback scheme. As a principal tool for the security of sensor network, random number generator is one of important security primitives....

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Mar 2014

    High Performance Computing for Large Graphs of Internet Applications using GPU

    The high speed CPU based routers currently in use could not handle the massive data required for real-time multimedia communication. Graphics Processing Units (GPUs) offer an appreciable alternative due to high computation power which results from their parallel execution units. This paper presents the implementation of the Dijkstra's link state...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Mar 2014

    Multimedia Service using Equi-loaded Distributed web-cache in Wire/Wireless LAN

    In this paper the authors propose multimedia service system using equi-loaded distributed web-caching mechanism in the wire/wireless network environment. This proposed multimedia service system is composed of Integrated Switching Agent (ISA), several proxies and Access Points (APs) with buffer in wire/wireless LAN. The ISA is the core of this system...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Feb 2014

    Research of Proxy Cache Algorithm in Multi-media Education System

    Multi-media education system is more and more widely used in all levels of education. In order to decrease cost of multi-media system and keep efficiency with increasing multi-media materials, proxy cache algorithm has been widely studied. Based on analysis of existing research of proxy cache results, an improved proxy coaching...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Feb 2014

    A Simple Model for Estimating Power Consumption of a Multicore Server System

    Balancing the performance and the energy consumption of the servers is one of the important issues in large-scale computing infrastructure such as data centers. Measuring or accurately estimating power consumption of a server is one of the most fundamental and enabling technologies for enhancing energy efficiency of a server because...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Nov 2012

    An FPGA Based High Performance IEEE - 754 Digit Recurrence Floating Point Double Precision Divisor Using Verilog

    Current, floating-point divisor architectures have low frequency, larger area and high latency in nature. With advent of more graphic, scientific and medical applications, floating point dividers have become indispensable and increasingly important. However, most of these modern applications need higher frequency or low latency of operations with minimal area occupancy....

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // May 2014

    The Method of Predicting Average Response Time of Cloud Service Based on MGM (1, N) - BP Neural Network

    In a time interval, the average response time is the mean value of virtual machine service response time. In the cloud computing environment, according to the predicting average response time of service, it can adjust to the follow-up system, so that the response time of the system is acceptable. The...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // May 2014

    Admission Control for Aggregate Flow in Cloud Computing

    With the development of cloud computing, the number and types of cloud services experience an explosive increase. Towards improving the quality of service provided in cloud computing, the authors model cloud computing's admission control in this paper. Based on the observation that cloud service requests are typically concurrent, they propose...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // May 2014

    Toward Fine-grained Data-level Access Control Model for Multi-tenant Applications

    Cloud computing present's new security and privacy challenges to control access to multi-tenant applications in the cloud. However, this solution has more challenges once the number of Access Control List (ACL) increases in the cloud, such as efficiency of policy resolution, multi-tenancy and data isolation. To address these limitations, this...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // May 2014

    Security and Privacy Issues in Cloud Computing Environment: A Survey Paper

    Cloud computing is emerging as a powerful architecture to perform large-scale and complex computing. It extends the Information Technology (IT) capability by providing on-demand access to computer resources for dedicated use. The information security and privacy are the major concerns over the cloud from user perspective. This paper surveys and...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // May 2014

    MulCNeT: Network Management Cloud

    Cloud computing is evolving as a key computing platform for sharing infrastructures and applications with flexible scalable computing processing power. Virtualization is a core technology for enabling cloud sharing ability. The management of cloud core infrastructure is essential to provide cloud computing environments. And the management, monitoring, and configuring of...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // May 2014

    A Light-Weighted Data Trust Model in WSN

    WSN is often deployed in unattended or even hostile environments. Therefore, providing security in WSN is a major requirement for acceptance and deployment of WSN. Furthermore, establishing trust in a clustered environment can provide numerous advantages. The authors proposed a light-weighted trust model which consider data aggregation and detailed the...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Mar 2014

    A Small-time Scale Netflow-based Anomaly Traffic Detecting Method Using MapReduce

    Anomaly traffic detecting using Netflow data is one of important problems in the field of network security. In this paper, the authors proposed an approach using MapReduce model, which was realized by means of the entropy observation and DFN (Distinct Feature Number) distribution deviations of traffic features under anomalies at...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Mar 2014

    Implementation of ARIA Cryptographic Modules based on ARM9 Devices

    Information over Internet needs to be communicated secure and prompt. But every cryptographic algorithm of the information requires extra time and memory space for execution in the systems such as PC or smart device. In this paper, an actual cost of speed and memory for a popular smart device environment...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Mar 2014

    Based on WDM of Disk Immunity Systems

    Along with the computer virus and rogue malware become more and more rampant increasingly. It is a tough problem to protect computer data in the public environment. In order to prevent hard disk data from virus infection, malice destroy and deleting by mistake, this paper illustrates the design and implementation...

    Provided By Science & Engineering Research Support soCiety (SERSC)