Science & Engineering Research Support soCiety (SERSC)

Displaying 1-40 of 961 results

  • White Papers // Dec 2014

    Analysis of Typical Secure Routing Protocols in WSN

    In many application fields of WSN, such as security guarding and battlefield environment monitoring, data collected and transmitted by the sensor nodes is very sensitive, so it is important to ensure the security of data during the collection and transmission process. This paper will first sum up the typical attacks...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Dec 2014

    P_PAKA: Privacy Preserving Authenticated Key Agreement Protocol in Smart Grid

    The current power grid is changing into a network of interoperating intelligent devices to form a smart grid. One of the technologies enabled by the bi-directional communication of the grid is Demand Response (DR), which allows regulation of energy loads by efficiently shifting consumer power demand of non-critical appliances from...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Dec 2014

    Privacy-preserving Multi-keyword Ranked Search over Encrypted Cloud Data Supporting Dynamic Update

    With the development of cloud computing, the sensitive information of outsourced data is at risk of unauthorized accesses. To protect data privacy, the sensitive data should be encrypted by the data owner before outsourcing, which makes the traditional and efficient plaintext keyword search technique useless. Hence, it is an especially...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Dec 2014

    Research on Intrusion Event Sequence Correlation Method for Privacy Protection

    For the shortcomings of traditional network security alarm correlation method, combined with the original alarm information privacy protection needs. On the basis of analyzing the characteristics of multi-step attack, proposed the use of sequential pattern mining techniques associated with rapid multi-step attack methods QSPM. And on this basis, proposed privacy...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Dec 2014

    A New Factor State Space Model for SCADA Network Attack and Defense

    To solve the security problem in the Supervisor Control And Data Acquisition (SCADA), a new factor network model of SCADA network attack and defense based on factor state space is presented. Combining with factor space theory, formal descriptions of factor neurons based on factor state space are developed. On the...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Dec 2014

    A Secret Sharing Scheme Based on AES

    In order to solve the key setting difficulty and the key security problem in the file encryption, key distributed storage technology may be a proper choice to help improve the safety of the key. In the paper, a novel secret sharing scheme is proposed by AES encryption algorithm for file...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Dec 2014

    A Recent Review of MP3 Based Steganography Methods

    Steganography, the idea of hiding messages and data within other pieces of data, can be useful in many real world applications alongside encryption and other code-writing methods. Data hiding methods are a new kind of technology in secret communication. Multimedia objects like audio are the most used in today's information...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Dec 2014

    OOAP: A Novel Authorization Protocol for Access to Sensitive Data in Trusted Cloud Computing Platforms

    Cloud computing platforms are usually constructed as trusted virtual platforms based on trusted computing technologies. This is one of the most effective approaches to resolve cloud computing security problems. However, the protection of sensitive data in trusted virtual platforms is an important problem needed to be resolved. In this paper,...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Dec 2014

    An Access Authentication Scheme Based on 2-HIBS in Proxy Mobile IPv6 Network

    Proxy mobile IPv6 is a network-based mobility management protocol. The access authentication security plays the primary role in maintaining network security of proxy mobile IPv6. In this paper, the authors constructed an authentication framework, which is suitable for proxy mobile IPv6 and has eliminated the interaction between the access network...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Dec 2014

    A Security Assessment Framework and Selection Method for Outsourcing Cloud Service

    Cloud services have become state of the art of resource sharing and interoperability among different service providers. The federated cloud seek to reduce costs and maximize efficiency, provide flexible and reliable services composed of various external cloud service and internal services, but this would introduce a risk of security due...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Dec 2014

    A Biologically-Inspired Algorithm for Mission-Critical Applications in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) connect devices and enable collaboration on sensing and monitoring various physical phenomena for applications such as target tracking, infrastructure security, battlefield surveillance, health monitoring, and traffic control. WSNs are generally comprised of a large number of tiny sensor nodes that are battery powered. Therefore, existing Medium...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Dec 2014

    Design of Abnormal Data Analysis and Processing System Based on RFID Supply Chain

    With the deep application of RFID, the deployment of the RFID system is gradually to have the large-scale, networked, distributed development trend. The previous abnormal data analysis and processing way cannot meet with the need of data processing. According to the survey of international famous consulting company for the \"Information...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Dec 2014

    Implementation of Biometric Techniques in Social Networking Sites

    With the advancement of technology privacy threats arise while establishing communication in social networking sites. For the developers of authentication systems user's privacy and authentication have evolved as a major problem and area of concern. This paper is based on an attempt to discuss the implementation of different biometric verification...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Dec 2014

    Building e-Learning Apps with Multimedia Contents for Learning Language Variations

    In language education, little attention has been paid to the importance of variations of a language. It is focused only on acquiring standard forms. However, knowing standard forms is not sufficient for understanding the target language in real situations. That is why when the users learn a target language; they...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Dec 2014

    Software Cost Estimation on e-Learning Technique Using a Classical Fuzzy Approach

    Software cost estimation with resonating dependability, gainfulness and advancement exertion is a testing and cumbersome undertaking. This has actuated the product group to give much required push and dig into broad research in programming exertion estimation for developing complex strategies. Estimation by similarity is one of the convenient methods in...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Dec 2014

    The Construction Research of Security Computer Network System Based on the Distributed Intrusion Detection Technology

    In this paper, the authors aimed at the actual situation of the difficulty of getting a lot of the training sample of the security computer network system in the distributed intrusion detection. They studied how to increase the intrusion detection accuracy in the case of small samples, so that processing,...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Dec 2014

    Batch Auditing for Multi-client Dynamic Data in Multi-cloud Storage

    Cloud storage introduces many challenges due to the security and integrity threats toward user's outsourced data. Many auditing protocols have been proposed, but the majority of them could only serve in single cloud environment. This paper proposes an efficient auditing protocol, which supports batch auditing for multiple data files in...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Dec 2014

    A Strong Lightweight Authentication Protocol for Low-cost RFID Systems

    RFID is an important technology that can be used to create the ubiquitous society. But an RFID system uses open radio frequency signal to transfer information and this leads to pose many serious threats to its privacy and security. In general, the computing and storage resources in an RFID tag...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Dec 2014

    Shilling Attack Detection Algorithm based on Non-random-missing Mechanism

    Besides unsupervised feature, universality serves as another important factor determining the practical value of attack detection technology. Considering the difficulty of possessing both features for the existing attack detection techniques, this paper reveals the latent factors invoking missing ratings under the non-random-missing mechanism and further combines these latent factors with...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Dec 2014

    An Improved Bilateral Remote User Authentication Scheme that Preserves User Anonymity using Symmetric Cryptology

    Smart card authentication schemes have been widely deployed to verify the legitimacy of remote user's login request. Also, smart card is due to their low computation cost and convenient for the authentication purpose. However, most of these schemes are based on static ID and have some flaws such as stolen,...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Dec 2014

    Study on Financial-sector Information Security Level Assessment and Improvement Anticipation Model

    Infringement threats to the financial sector have become more sophisticated and intelligent. In order to more effectively respond to such threats, the financial sector faces the need to perform the assessment of information security maturity level on a voluntary basis in order to better understand organizational information security situation and...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Dec 2014

    The Network Attack Model Based on Hierarchical Expanded Stochastic Petri Net

    In the paper, a global network attack model based on Hierarchical Expanded Stochastic Petri Net (HESPN) is presented. The model is suitable for the cooperative attack simulation and can describe both macroscopic network attack and microcosmic host attack synthetically. The dissertation represents model generation algorithm and digs for potential attack...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Dec 2014

    A Novel Image Encryption Scheme based on the LSM Chaotic System

    The Logistic-Sine Map (LSM) chaotic system is introduced by combing the Logistic Map (LM) and Sin Map (SM). The bifurcation diagrams show that the chaotic range of LSM is much larger than these of the logistic or tent maps. Complexity characteristics of Logistic Map (LM), Sin Map (SM) and Logistic-Sine...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Dec 2014

    The Design of Robust Authentication Mechanism using User's Biometrics Signals

    In this paper, the authors proposed robust authentication mechanism using user's biometrics signals for complementing traditional authentication's weak points. Now-a-days, authentication system are developed using biometric. Biometrics are a unique, measurable a trait of a human being for verifying the users identity. The types of biometric used in authentication system...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Dec 2014

    A Novel Approach towards Detection of Spoofed Manufacturer Identity under the Collaborative Frameworks of Mobile Computing and Product Specific QR Codes

    Today's advanced machineries have immensely contributed to an open, worldwide market for fake products which include not only electronic goods and other everyday commodities, but adulteration has pawed into highly sensitive industries which manufacture medicines, baby-food, beverages; and adulteration in medicines and beverages often turns out to be fatal. The...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Dec 2014

    Quantum Cryptanalysis of Multivariate Permutation Problem

    Quantum computation is a new computing model based on quantum physics principle. The researcher observed that exponential slowdown occurs when quantum physical phenomenon is simulated by a classical computer; the researcher speculated that perhaps computation in general could be done more efficiently if it made use of these quantum physical...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Dec 2014

    Improved Life of Watchdog Nodes in Ad hoc Networks

    Clustering or cluster formation of nodes in wireless networks facilitates resource reuse and increases the performance capacity of the system. This paper presents a cluster-based solution to improve life of watchdog nodes that are designed to monitor intrusions in ad hoc network. The proposed approach ensures load sharing, increased robustness,...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Dec 2014

    A Network Intrusion Detection Model Based on K-means Algorithm and Information Entropy

    Many factors could influence the clustering performance of K-means algorithm, selection of initial cluster centers was an important one, traditional method had a certain degree of randomness in dealing with this problem, for this purpose, information entropy was introduced into the process of cluster centers selection, and a fusion algorithm...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Dec 2014

    A Difference Expansion Based Reversible Data Hiding Algorithm Using Edge-Oriented Prediction

    In this paper, the authors propose a difference expansion based reversible data hiding approach which achieves the low distortion requirement under the same embedding capacity. An edge-oriented prediction method and a modified overflow/underflow prevention method are proposed to achieve the requirement. For each pixel, the prediction method uses edge information...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Dec 2014

    A Hierarchical Information System Risk Evaluation Method Based on Asset Dependence Chain

    The current information security risk evaluation methods are only concerned with the risk of system components, rarely based on business risk perspective. Thus, it is difficult to meet different levels of information security risk comprehension such as the operational staff and the organization's manager. This paper proposes a hierarchical risk...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Dec 2014

    Honeypot-Based Signature Generation for Polymorphic Worms

    With the growing sophistication of computer worms, information security has become a prime concern for individuals, community and organizations. Traditional signature based IDS, though effective for known attacks but failed to handle the unknown attack promptly. This paper describes a novel honey pot system which isolates the suspicious traffic from...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Dec 2014

    Improved Fully Homomorphic Encryption over the Integers with Shorter Public Keys

    Fully Homomorphic Encryption (FHE) is a \"Holy grail\" of cryptography. However, it is not yet adopted in practice because no known scheme is efficient. In this paper, the authors mainly focus on how to reduce the public key sizes in FHE. Based on Dijk et al.'s FHE scheme (DGHV) and...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Nov 2014

    What Makes Smartphone Users Satisfied with the Mobile Instant Messenger?: Social Presence, Flow, and Self-Disclosure

    Users of Smartphone-based instant messenger such as Whatsapp, wechet, LINE and KAKAO TALK are rapidly increasing. LINE acquired more than 50 million members just 1 year after its release, and the number of LINE mobile instant messenger users was 400 million users. Given the rarity of research on the use...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Nov 2014

    Study on Cluster Based Routing Method in a Wireless Sensor Networks

    In a wireless sensor network, energy efficiency is critical issue on several topics. For sending sensed data to the sink node, many upstream sensor nodes are role as relaying node. Direct transmission is not proper in a wireless sensor network. The authors propose hop-based cluster head selection method. This method...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Nov 2014

    Research and Implementation of Android Embedded Code Generation Method based on Rule Model

    Based on the in-depth study of the Android embedded application program frame and project file, this paper proposes a code generation method based on model rule, the method discusses the problem of the layout of the Android embedded application interface, defines the constraint rules between the components and component object...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Nov 2014

    Methods of MP2P Network Task Co-allocationBased on IV-Vicsek Model

    The present task allocation methods exists some problems, such as lower execution efficiency and poor consideration on mobility and security. Therefore, on the basis of MP2P network, the paper proposed a task allocation method based on modified Vicsek model in the view of cooperatives, security and mobility. From the contrast...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Nov 2014

    Top Priority of Software Success Factors for Six Sigma Execution by a Fuzzy Hierarchical Process

    Six-sigma quality enhancement methodology has received important attention in various software development and service organizations. There have been some researches recognizing serious software success factors for six-sigma execution. Within available resource compulsions, an immediate adoption of all serious software success factors may not be possible. In order to be able...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Nov 2014

    Design of an Efficient Method for Identifying Virtual Machines Compatible with Service Chain in a Virtual Network Environment

    With advancements in network technologies, network virtualization has been proposed to efficiently provide a large number of services and flexible management by utilizing limited resources over existing networks as much as possible. Network virtualization has been proposed as a new paradigm for networks, as it simplifies complicated network configurations for...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Nov 2014

    An Intelligent Learning Agent Using Learner's Information in Mobile Environment

    Recently, since people always carry mobile devices and can learn whenever and wherever by using not only phone, text, SNS, and TV, but also using learning device, recorder, e-book, e-dictionary, and internet surfing due to rapid distribution of Smartphone, the interest in intelligent learning agent related to situated learning is...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Nov 2014

    The Multi-Target Localization Algorithm Via Compressed Sensing

    A multi-target localization algorithm based on compressed sensing was proposed in this paper. The issue of multi-target localization was transformed into compressed sensing. The algorithm greatly reduced the amount of wireless network's communication data by transferring most of the computing work to the central server. This method made full uses...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // May 2014

    MulCNeT: Network Management Cloud

    Cloud computing is evolving as a key computing platform for sharing infrastructures and applications with flexible scalable computing processing power. Virtualization is a core technology for enabling cloud sharing ability. The management of cloud core infrastructure is essential to provide cloud computing environments. And the management, monitoring, and configuring of...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // May 2014

    Security and Privacy Issues in Cloud Computing Environment: A Survey Paper

    Cloud computing is emerging as a powerful architecture to perform large-scale and complex computing. It extends the Information Technology (IT) capability by providing on-demand access to computer resources for dedicated use. The information security and privacy are the major concerns over the cloud from user perspective. This paper surveys and...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // May 2014

    Toward Fine-grained Data-level Access Control Model for Multi-tenant Applications

    Cloud computing present's new security and privacy challenges to control access to multi-tenant applications in the cloud. However, this solution has more challenges once the number of Access Control List (ACL) increases in the cloud, such as efficiency of policy resolution, multi-tenancy and data isolation. To address these limitations, this...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // May 2014

    Admission Control for Aggregate Flow in Cloud Computing

    With the development of cloud computing, the number and types of cloud services experience an explosive increase. Towards improving the quality of service provided in cloud computing, the authors model cloud computing's admission control in this paper. Based on the observation that cloud service requests are typically concurrent, they propose...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // May 2014

    The Method of Predicting Average Response Time of Cloud Service Based on MGM (1, N) - BP Neural Network

    In a time interval, the average response time is the mean value of virtual machine service response time. In the cloud computing environment, according to the predicting average response time of service, it can adjust to the follow-up system, so that the response time of the system is acceptable. The...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // May 2014

    A Light-Weighted Data Trust Model in WSN

    WSN is often deployed in unattended or even hostile environments. Therefore, providing security in WSN is a major requirement for acceptance and deployment of WSN. Furthermore, establishing trust in a clustered environment can provide numerous advantages. The authors proposed a light-weighted trust model which consider data aggregation and detailed the...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Dec 2013

    Visualising Data Using Reservoir with Clustering

    Identifying structure in high dimensional data spaces is a difficult problem. In this paper the authors illustrate a new method of visualizing and projecting time series data using reservoir computing with clustering algorithms. They show the advantages of using clustering with reservoir to visualize data. Then they extend the clustering...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Apr 2014

    A Testing Technique of Microgrid EMS using the Hardware-in-the Loop Simulation (HILS) System

    A microgrid is composed of distributed power generation systems, distributed energy storage systems, loads as a small scale power system. Generally, the microgrid is operated by an Energy Management System (EMS). In this paper, a testing technique for a microgrid EMS using the Hardware-In-The-Loop simulation (HILS) technique is introduced. Especially,...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Jun 2014

    Improved Multi Threshold Birch Clustering Algorithm

    The BIRCH algorithm is a clustering algorithm suitable for very large data sets. In the algorithm, a CF-tree is built whose all entries in each leaf node must satisfy a uniform threshold T, and the CF-tree is rebuilt at each stage by different threshold. But using a single threshold cause...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Jun 2014

    Spectral Clustering Using Optimized Gaussian Kernel Function

    Data clustering techniques are an important aspect used in many fields such as data mining, pattern recognition and pattern classification, data compression, machine learning, image analysis, and bioinformatics. The purpose of clustering is to group data points into clusters in which the similar data points are grouped in the same...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Feb 2010

    A New Global Consistent Checkpoint Based on OS Virtualization

    Checkpoint can store and recovery applications when faults happen and is becoming critical to large information systems. Unfortunately, existing checkpoint tools have some limitations such as: not transparent to applications, ignoring file system states, cluster checkpoint is not well supported, and so on. The authors present a light weight OS...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // May 2014

    Weighted Least Square Twin Support Vector Machine for Imbalanced Dataset

    In this paper the authors propose a Weighted Least Square Twin Support Vector Machine (WLSTSVM) for imbalanced dataset. Real world data are imbalanced in nature due to which most of the classification techniques do not work well. In imbalanced data, there is a huge difference between the numbers of data...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // May 2014

    Research and Application of Data Mining and NARX Neural Networks in Load Forecasting

    The relationship between med-long term load forecasting and socio-economic indicators is very difficult to describe with an accurate mathematical model. The paper introduce data mining technology into the association analysis of China's electricity consumption growth, select many socio-economic indicators since 2000, constitute the relevant factors database, complement of a few...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // May 2014

    An Efficient Hybrid Intrusion Detection System based on C5.0 and SVM

    Now-a-days, much attention has been paid to Intrusion Detection System (IDS) which is closely linked to the safe use of network services. Several machine-learning paradigms including neural networks, Linear Genetic Programming (LGP), Support Vector Machines (SVM), Bayesian networks, Multivariate Adaptive Regression Splines (MARS) Fuzzy Inference Systems (FISs), etc. have been...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Oct 2012

    Detecting Active Devices in Intranets Using Existing Network Management Information

    Global warming is now a major social concern. Stemming the growth of CO2 in the atmosphere is imperative. Fossil fuel is a major source of CO2. The Great East Japan Earthquake has shown that over-dependence on nuclear energy carries a heavy risk. Thus, power consumption must be reduced. Considering the...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Apr 2014

    Energy based Efficient Resource Scheduling: A Step Towards Green Computing

    Cloud computing is an evolving area of efficient utilization of computing resources. Data centers accommodating cloud applications ingest massive quantities of energy, contributing to high functioning expenditures and carbon footprints to the atmosphere. Hence, green cloud computing resolutions are required not only to save energy for the environment but also...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // May 2014

    A QoS Constraints Location-based Services Selection Model and Algorithm under Mobile Internet Environment

    With the rapid development of communication technology and mobile Internet, selecting from mass location-based services to meet the needs for different users becomes the research hot spot under mobile Internet environment. First of all, it starts from QoS constraints as well as user preferences in this paper, and then describes...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // May 2014

    A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster

    In order to solve the problems of ill-balanced task allocation, long response time, low throughput rate and poor performance, which appeared in cluster system, this paper proposes a new load balancing algorithm of homogeneous cluster based on the variation trend of entropy. In this paper, the authors introduces the thermodynamic...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Jun 2014

    Location Recommendation System Using Big Data

    Active SNS and the amount of data which increases very fast these days, at WEF, the first remarkable technology of arising 10th technology of 2012 is called big data. Big data extracts the value of collected, saved, analyzed, and processed large data by using database management tool. In this paper,...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Jun 2014

    Enhancing User-friendliness of the User Taste Prediction Service Using MapReduce Framework

    In the authors' previous paper, a user similarity-based contents recommendation service using NFC was proposed for the same goal. This service used a small sample because it used only information of the user who had watched a museum. However, it has been shown that there are some limitations resulting from...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // May 2014

    The Evolution of Information Resource Allocation Research based on Knowledge Mapping

    Information resource allocation is one of the most important research areas of information resource management and information economics. Based on the bibliography references included in ISI Web of knowledge, and by use of visualization network analysis tool - Citespace to conduct co-citation and cluster analysis of collected data, this paper...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // May 2014

    A Construction Method of Gene Expression Data Based on Information Gain and Extreme Learning Machine Classifier on Cloud Platform

    With the large-scale application of high dimensional gene expression data which exists lots of redundant information, it may waste a lot of time in feature selection and classification. By analyzing the process of MapReduce computing paradigms on cloud platform, it is found that the feature selection which through parallel and...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Jun 2014

    Raw Data Recovery from Pulse Code Modulation Pieces in the BitTorrent Environment

    BitTorrent is an issue for copyright protection and infringements should be punished based on evidence of invasion of the rights of others. In the BitTorrent system, seeders possess the complete content and leechers have partial content, and the content is shared among peers. Copyrighted content is easily distinguished with complete...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Jun 2014

    Query Processing on OLAP System with Cloud Computing Environment

    The conventional researches on a distributed On-Line Analytical Processing (OLAP) system have been in hardship to be adapted to real business environment. However, the recent spread of cloud PaaS (Platform-as-a-Services) provides new chances in the field of a distributed OLAP. OLAP query execution costs many minutes by its enormous data...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Apr 2014

    Social Network Visualization Method using Inherence Relationship of User Based on Cloud

    Most of social network visualization methods have been only focusing on presentation of social network relationship. However, the methods do not consider an efficient processing speed and computational complexity for increasing at the ratio of arithmetical of a big data regarding social network. This paper proposes a cloud based on...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // May 2014

    An Extension of Virtual Computing Laboratories: Scalable Virtual Desktop Infrastructure on Cloud Computing

    Virtual Desktop Infrastructure (VDI) based on Virtual Computing Laboratories (VCL) model has been implemented in a small or medium scale on cloud computing in universities. Conventional physical computing laboratories with thousands of PCs are still widely used and co-exist with the VCL; however, the conventional PCs are not fully utilized...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // May 2014

    Implementation of GP-GPU with SIMT Architecture in the Embedded Environment

    Recent embedded processors become to be multi-cored, due to the increased power consumption by higher operating frequencies. Multi-core processors stimulate applications to be parallelized. Since general purpose CPU has small number of core, which is optimized for serial processing, it has a limitation of parallel processing. To overcome this limitation,...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // May 2014

    An Approach of Risk Management for Multimedia Streaming Service in Cloud Computing

    Along with internet broadcasting technology, cloud broadcasting is gradually becoming the development tendency to audience view. But the problems which existed in cloud environment also may affect in cloud based multimedia streaming service area. In this paper, the authors proposes an approach of risk management for multimedia streaming service in...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Jun 2014

    Study on a Classification Model of Data Stream based on Concept Drift

    In the data stream classification process, in addition to the solution of massive and real-time data stream, the dynamic changes of the need to focus and study. From the angle of detecting concept drift, according to the dynamic characteristics of the data stream. This paper proposes a new classification method...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Mar 2014

    Multimedia Service using Equi-loaded Distributed web-cache in Wire/Wireless LAN

    In this paper the authors propose multimedia service system using equi-loaded distributed web-caching mechanism in the wire/wireless network environment. This proposed multimedia service system is composed of Integrated Switching Agent (ISA), several proxies and Access Points (APs) with buffer in wire/wireless LAN. The ISA is the core of this system...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Mar 2014

    High Performance Computing for Large Graphs of Internet Applications using GPU

    The high speed CPU based routers currently in use could not handle the massive data required for real-time multimedia communication. Graphics Processing Units (GPUs) offer an appreciable alternative due to high computation power which results from their parallel execution units. This paper presents the implementation of the Dijkstra's link state...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Mar 2014

    Metastability-based Feedback Method for Enhancing FPGA-based TRNG

    In this paper the authors present a novel and efficient method to enhance the randomness of a Programmable Delay Line (PDL)-based True Random Number Generator (TRNG) by introducing metastability-based feedback scheme. As a principal tool for the security of sensor network, random number generator is one of important security primitives....

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Mar 2014

    Dynamic Scheduling Algorithms for Streaming Media Based on Proxy Caching in Education system

    With development of digital multimedia, many applications, such as VoD, remote education, and so on, becomes a reality. Multimedia resource in education system becomes very rich. With the increasing number of multimedia files in school server, how terminal computers in classrooms fetch multimedia at fast speed and low cost is...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Feb 2014

    A Simple Model for Estimating Power Consumption of a Multicore Server System

    Balancing the performance and the energy consumption of the servers is one of the important issues in large-scale computing infrastructure such as data centers. Measuring or accurately estimating power consumption of a server is one of the most fundamental and enabling technologies for enhancing energy efficiency of a server because...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Feb 2014

    Research of Proxy Cache Algorithm in Multi-media Education System

    Multi-media education system is more and more widely used in all levels of education. In order to decrease cost of multi-media system and keep efficiency with increasing multi-media materials, proxy cache algorithm has been widely studied. Based on analysis of existing research of proxy cache results, an improved proxy coaching...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Feb 2014

    An Improved Dominant Point Feature for Online Signature Verification

    Among the biometric characteristic, signature forgery is the easiest way to do. Possibility of signature forgery similarity might be reached perfectly. This paper introduced a new technique to improve dominant point feature system based on its location for online signature verification. Dynamic time warping is used to match two signature...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Feb 2011

    Acceleration of Correlation Matrix on Heterogeneous Multi-Core CELL-BE Platform

    A parallel implementation of the highly useful and computational intensive cor-relation matrix arithmetic is presented here. A heterogeneous multi-core CELL-BE processor platform has been used for the purpose of accelerating the performance of the kernel. An extensive measures of the performance reflects the massive capability of the CELL-BE processor architecture....

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Nov 2008

    Unstructured Document Categorization: A Study

    The main purpose of communication is to transfer information from one corner to another of the world. The information is basically stored in forms of documents or files created on the basis of requirements. So, the randomness of creation and storage makes them unstructured in nature. As a consequence, data...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Apr 2009

    Gaining Flexibility and Performance of Computing Using Application-Specific Instructions and Reconfigurable Architecture

    As data transfer rates become higher, general processor is not competent for works with high computing intensity in wireless communication area. The other hand, existing baseband processors lack adaptive ability to support new applications and newer versions of existing application. Thus the paper puts forward a novel architecture of reconfigurable...

    Provided By Science & Engineering Research Support soCiety (SERSC)

  • White Papers // Apr 2009

    Ubiquitous Multicore (UM) Methodology for Multimedia

    For more than a decade now, multimedia developers have usually \"Ride the waves\", so to speak, with the coming of each generation of microprocessors, which allows their applications, designs and programs to usually running more proficiently, efficiently and effectively. This so-called 'Free' ride seems to be coming to an end,...

    Provided By Science & Engineering Research Support soCiety (SERSC)