WSDOT

Displaying 1-40 of 325 results

  • White Papers // Apr 2009

    Latent Knowledge Structures of Traversal Behavior in Hypertext Environment

    The grand majority of software development projects are known to be late and over the budget. Several surveys performed during the last 15 years expose a relatively poor performance in delivering successful software projects. Most of the projects hit schedule and budget overruns of 25% to 100% and sometimes even...

    Provided By WSDOT

  • White Papers // May 2009

    Encrypting Messages with Visual Key

    This paper presents a method for encrypting messages, which uses for this operation an image or a part of an image as an encryption/decryption key. The need to encrypt messages for protecting their content knew an increase from the apparition of Internet and electronic transactions. The great number of messages...

    Provided By WSDOT

  • White Papers // May 2009

    An RDF-Based Distributed Expert System

    An expert system or knowledge-based system comprises of a knowledge base and an inference engine in which their expertise knowledge is represented. The knowledge can be called upon when needed to solve a problem by the inference engine. In a large expert system, the knowledge base can be represented using...

    Provided By WSDOT

  • White Papers // Jun 2009

    Neural Network Based Attack Detection Algorithm

    The influence of computer technology on the human activities has greatly increased during the last three decades, due to major developments in the VLSI technology. However this widespread use of computer equipments has generated computer a considerable increase of computer crimes. To reduce this problem it is necessary to carried...

    Provided By WSDOT

  • White Papers // Sep 2009

    An Environment for Describing Software Systems

    Describing the architecture of complex software systems need a comprehensive models and complete tools. The description of software systems can be achieved by using an Architecture Description Language (ADL) or an object oriented modeling language. In this paper, the authors show how they can build a hybrid model to describe...

    Provided By WSDOT

  • White Papers // Dec 2009

    Rotary-Code: Efficient MDS Array Codes for RAID-6 Disk Arrays

    Low encoding/decoding complexity is essential for practical RAID-6 storage systems. In this paper, the authors describe a new coding scheme, which they call Rotary-code, for RAID-6 disk arrays. They construct Rotary-code based on a bit matrix-vector product similar to the Reed-Solomon coding, and provide the geometry encoding method and detailed...

    Provided By WSDOT

  • White Papers // Feb 2010

    Relation Between Successfulness of Birthday Attack on Digital Signature and Hash Function Irregularity

    In many network communications it is crucial to be able to authenticate both the contents and the origin of a message. Digital signatures based on public key schemas are used for such authentication. In order to provide message authentication the signature must depend on the contents of the message being...

    Provided By WSDOT

  • White Papers // Feb 2010

    The Detailed Evaluation Criteria for Designation of Critical Information Infrastructure in the Field of Broadcasting and Communication

    Increasing to dependency on information infrastructures involves various threats to cyber incidents. Most of nations or organizations work on protect to not only infrastructure but also information infrastructure. Korea established Critical Information Infrastructure Protection Act in 2001 that include 5 evaluation criteria for designation of National CII. This research makes...

    Provided By WSDOT

  • White Papers // Feb 2010

    RAMEPS: A Goal-Ontology Approach to Analyse the Requirements for Data Warehouse Systems

    The Data Warehouse (DW) systems design involves several tasks such as defining the DW schemas and the ETL processes specifications, and these have been extensively studied and practiced for many years. However, the problems in heterogeneous data integration are still far from being resolved due to the complexity of ETL...

    Provided By WSDOT

  • White Papers // Mar 2010

    Business Activity Monitoring System Design Framework Integrated With Process-Based Performance Measurement Model

    Recently, strong interests in the real-time performance management are increasing to gain competitive advantages in the rapidly changing business environment. For better business performance or continuous process improvement of an enterprise, real-time measurement and analysis of the performance of managerial activities is essential. Business Activity Monitoring (BAM) which provides real-time...

    Provided By WSDOT

  • White Papers // Apr 2010

    Vitality Detection in Fingerprint Identification

    The fingerprint liveness detection refers to the inspection of the finger characteristics to ensure whether the input finger is live or artificial. A number of fingerprint identification systems are used widely and implemented at various important places such as border and immigration services. However, it is not declared by the...

    Provided By WSDOT

  • White Papers // Apr 2010

    Towards a Possibilistic Processing of Missing Values Under Complex Conditions

    To estimate the missing values of an attribute in the records of a dataset, all the information provided by the other attributes and the knowledge databases must be considered. However, the information elements could be imperfect (imprecise, possibilistic, probabilistic, etc.) and could have different measuring scales (quantitative, qualitative, ordinal, etc.)...

    Provided By WSDOT

  • White Papers // May 2010

    New Outlier Detection Method Based on Fuzzy Clustering

    In this paper, a new efficient method for outlier detection is proposed. The proposed method is based on fuzzy clustering techniques. The c-means algorithm is first performed, then small clusters are determined and considered as outlier clusters. Other outliers are then determined based on computing differences between objective function values...

    Provided By WSDOT

  • White Papers // May 2010

    A Parallel Algorithm to Compute Data Synopsis

    Business Intelligence systems are based on traditional OLAP, data mining, and approximate query processing. Generally, these activities allow to extract information and knowledge from large volumes of data and to support decisional makers as concerns strategic choices to be taken in order to improve the business processes of the Information...

    Provided By WSDOT

  • White Papers // Jun 2010

    A Multi Purpose Web-Based Contractual Management System

    A web-based multi-purpose contractual management system can provide support to contractual process workflows for different types of contractual process of unilateral, bilateral or multilateral contracts. These processes can be done on-line i.e. Web-based without the need for all actors to be synchronously present with respect to both time and space....

    Provided By WSDOT

  • White Papers // Jun 2010

    Secure Multi Party Computation Algorithm Based on Infinite Product Series

    Now-a-days, data mining has been extremely interested; because of its ability to give the companies a better view for strategic decisions. In case of, contribution of several companies for a shared data mining, there is a big problem: confidentially of data. Here, the companies are avoided passing their data to...

    Provided By WSDOT

  • White Papers // Jan 2010

    Visualization of the Packet Flows using Self Organizing Maps

    Recently, the spread of the Internet makes familiar to the incident concerning the Internet, such as a DoS attack and a DDoS attack. Some methods which detect the abnormal traffics in the network using the information from headers and payloads of IP-packets transmitted in the networks are proposed. In this...

    Provided By WSDOT

  • White Papers // Mar 2008

    Mining Strong Positive and Negative Sequential Patterns

    In data mining field, sequential pattern mining can be applied in divers applications such as basket analysis, web access patterns analysis, and quality control in manufactory engineering, etc. Many methods have been proposed for mining sequential patterns. However, conventional methods only consider the occurrences of itemsets in customer sequences. The...

    Provided By WSDOT

  • White Papers // Mar 2008

    Fast Mining of Closed Sequential Patterns

    This paper propose a novel algorithm for mining closed frequent sequences, a scalable, condensed and lossless structure of complete frequent sequences that can be mined from a sequence database. This algorithm, FMCSP, has applied several optimization methods, such as equivalence class, to alleviate the needs of searching space and run...

    Provided By WSDOT

  • White Papers // Mar 2008

    A Data Centered Approach for Cache Partitioning in Embedded Real-Time Database System

    Embedded real-time databases become a basic part of the embedded systems in many using environments. Caches are used for reducing the gap between processor and off-chip memory. But caches introduce unpredictability in general real-time systems. Although several cache partitioning approaches have been purposed to tackle this problem, there is no...

    Provided By WSDOT

  • White Papers // Apr 2008

    Preventing Conflict Situations During Authorization

    Access control to information systems is a fundamental management responsibility. Access control determines which resource in a system a legitimate user can access. A sophisticated and complex control implies structured authorizations. The complexity of security administration appears to be among most challenging problems in managing large networks. Role-Based Access Control...

    Provided By WSDOT

  • White Papers // Apr 2008

    A Comprehensive Taxonomy of DDoS Attacks and Defense Mechanism Applying in a Smart Classification

    A Distributed Denial of Service (DDoS) attack uses multiple machines operating in concern to attack a network or site. It is the most important security problem for IT managers. These attacks are very simple organized for intruders and hence so disruptive. The detection and defense of this attack has specific...

    Provided By WSDOT

  • White Papers // May 2008

    Incorporating the Biometric Voice Technology Into the e-Government Systems to Enhance the User Verification

    Many courtiers around the world have started their e-government programs. E-government portals will be increasingly used by the citizens of many countries to access a set of services. Currently, the use of the e-government portals arises many challenges; one of these challenges is the security issues. E-government portals security is...

    Provided By WSDOT

  • White Papers // May 2008

    Smart Card Based Solution for Non-Repudiation in GSM WAP Applications

    In this paper, the authors present security issues and architectures for mobile applications and GSM infrastructure. They also introduces the solution for avoiding denial of service from WAP applications using WIM features. The first section contains the structure of GSM network from voice and data point of view. The security...

    Provided By WSDOT

  • White Papers // Jun 2008

    The Strategy Based on Game Theory for Cross-Organizational Business Process Reengineering in Supply Chain

    Many enterprises with their own benefits are involved in cross-organizational business process reengineering in supply chain, which is different from BPR within one enterprise. The enterprises have rights to take part in the cross-organizational BPR project or not, in this way, their activities under the benefits will affect the progress...

    Provided By WSDOT

  • White Papers // Jun 2008

    The Investigation of the Elliptic Curve Cryptology Applies to the New Generation Protocol

    The users face threats from virus, hacker, electronic eavesdropper, and electronic deceiver in the network environment. The safety issue is truly important. The growth of the computer and network system make the organizations and personal users to depend on the information that circulate in these systems more and more. For...

    Provided By WSDOT

  • White Papers // Dec 2008

    A New Approach of Secret Key Management Lifecycle for Military Applications

    In this paper a new approach is presented for key management access and sharing secret keys between certified users of a group. Such schemes are referred to as symmetric key management Systems. The concept of information lifecycle management is first presented and analyzed in the context of data storage efficiency....

    Provided By WSDOT

  • White Papers // Dec 2008

    Enhancement of Data Aggregation Using A Novel Point Access Method

    As the price of memory continuously becomes cheaper, many of database tables and indices are easily placed in main memory. Traditional bottleneck of disk access is replaced by memory access. It has been revealed that commercial DBMSs spend half the execution time on memory access when a whole database fits...

    Provided By WSDOT

  • White Papers // Dec 2008

    Identifying Appropriate Methodologies and Strategies for Vertical Mining with Incomplete Data

    Many data mining methods are dependent on recognizing frequent patterns. Frequent patterns lead to the discovery of association rules, strong rules, sequential episodes, and multi-dimensional patterns. All can play a critical role in helping corporate and scientific institutions to understand and analyze their data. Patterns should be discovered in time...

    Provided By WSDOT

  • White Papers // Nov 2008

    Power-Aware Hybrid Intrusion Detection System (PHIDS) Using Cellular Automata in Wireless Ad Hoc Networks

    Ad hoc wireless network with their changing topology and distributed nature are more prone to intruders. The network monitoring functionality should be in operation as long as the network exists with nil constraints. The efficiency of an Intrusion detection system in the case of an ad hoc network is not...

    Provided By WSDOT

  • White Papers // Oct 2008

    A Complete Analyze of Using Shift Registers in Cryptosystems for Grade 4, 8 and 16 Irreducible Polynomials

    A Linear Feedback Shift Register (LFSR) is always the kernel of any digital system based on pseudorandom bits sequences and is frequently used in cryptosystems, in codes for errors detecting, in wireless system communication. The Advanced Encryption System (Rijndael) is based on using a grade 8 irreducible polynomials in a...

    Provided By WSDOT

  • White Papers // Oct 2008

    An Arbitration Web Service for e-Learning Based on XML Security Standards

    E-learning already provides a mature model for educational processes. However, the separation of parties in time and space is bound to communication gaps causing situations where an arbitration system should provide trust mechanisms between the student and the teacher. The proposed application model is an evolutionary step of the XML-driven...

    Provided By WSDOT

  • White Papers // Oct 2008

    A General Approach to Off-Line Signature Verification

    Although automatic off-line signature verification has been extensively studied in the last three decades, there are still a huge number of open questions and even the best systems are still struggling to get better error rates than 5%. This paper targets some of the weak spots of the research area,...

    Provided By WSDOT

  • White Papers // Oct 2008

    A New Scalable Distributed Authentication for P2P Network and Its Performance Evaluation

    Recently P2P networks become more and more popular. Though they have many advantages, P2P networks suffer from authentication of nodes. To overcome this problem, a new authentication method called Hash-based Distributed Authentication Method (HDAM) is proposed in this paper. HDAM realizes a decentralized efficient mutual authentication mechanism for each pair...

    Provided By WSDOT

  • White Papers // Aug 2008

    A Novel Boolean Algebraic Framework for Association and Pattern Mining

    Data mining has been defined as the non-trivial extraction of implicit, previously unknown and potentially useful information from data. Association mining and sequential mining analysis are considered as crucial components of strategic control over a broad variety of disciplines in business, science and engineering. Association mining is one of the...

    Provided By WSDOT

  • White Papers // Aug 2008

    GSM Mobile SMS/MMS using Public Key Infrastructure: m-PKI

    Presently, mobile handheld device has successfully replaced traditional telephone to become the most popular wireless communication tools. Mobile Short Message Service (SMS) and Multimedia Message Service (MMS) fulfill almost all the user requirements as an effective communication and information delivering service. Since SMS/MMS become so popular on daily communication, there...

    Provided By WSDOT

  • White Papers // Jul 2008

    Business Intelligence Applications for University Decision Makers

    The development of a business intelligence application starts with the execution of OLAP queries to extract information from data stored in a Data Warehouse. The results of these queries, together with an opportune data representation, offer a deep synthesis of data and help business users to better discover hidden knowledge...

    Provided By WSDOT

  • White Papers // Jul 2008

    Optimizing Energy Consumption of Data Flow in Mobile Ad Hoc Wireless Networks

    Because of the limited node battery power, energy optimization is important for the mobile nodes in wireless ad hoc networks. Controlled node mobility is an effective approach to reduce the communication energy consumption while the movement itself also consumes energy. Based on Cooperative Communication (CC) model, this paper takes the...

    Provided By WSDOT

  • White Papers // Jul 2008

    Design and Implementation of a Cipher System (LAM)

    This paper presents the design and implementation of a digital integrated encryption/decryption circuitry called LAM which is based on Peripheral Component Interconnect (PCI) Architecture for a Personal Computer (PC) communication card. The implementation of a hardware PC cryptography card has been designed using a Field Programmable Gate Array (FPGA) chip...

    Provided By WSDOT

  • White Papers // Jun 2008

    WhiteSteg: A New Scheme in Information Hiding Using Text Steganography

    Sending encrypted messages frequently will draw the attention of third parties, i.e. crackers and hackers, perhaps causing attempts to break and reveal the original messages. In this digital world, steganography is introduced to hide the existence of the communication by concealing a secret message inside another unsuspicious message. The hidden...

    Provided By WSDOT