Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Reflects downloads up to 06 Oct 2024Bibliometrics
Skip Table Of Content Section
article
Optimal filter based on scale-invariance generation of natural images

One of the most striking properties of natural image statistics is the scale invariance. Some earlier studies have assumed that the kurtosis of marginal band pass filter response to be constant throughout scales for a natural image. In our study, this ...

article
A novel secure architecture of the virtualized server system

To make cloud computing environments more secure, this paper focuses on the security of virtualized server systems. A security layer is introduced to the secure architecture of a virtualized server as an abstraction. Because the security layer will play ...

article
Smart knowledge sharing system for cyberinfrastructure

For development of science and technology, a lot of physical infrastructures are constructed, to be used in many fields. Recently the concept of Big Data, mass information and rich contents has emerged. In the case of particular infrastructure which is ...

article
A new approach to deploying private mobile network exploits

Private mobile communication systems (MCS) can be established easily with an open project and small MCS base stations are increasingly deployed in experiment environment. They can support not only voice communication, but also short message services (...

article
Trust model at service layer of cloud computing for educational institutes

Cloud computing is one of those technologies which have revolutionized the modern world. Through this, people can start their businesses without huge investments required for infrastructure like servers, technical staff for maintenance, and purchasing ...

article
Adaptive Internet of Things and Web of Things convergence platform for Internet of reality services

Recently, Internet of things (IoT) and Web of Things (WoT) lead us to the excellent era of connected everything device. However, the devices hardly show the property of the autonomous connectivity and the self-cooperation for applying in real-world ...

article
Security experts' capability design for future internet of things platform

Security-related accidents have been occurring frequently in the last few years despite the focus on training security personnel with technical capabilities. Although it is important to be equipped with a technical security system, what is also urgently ...

article
Data concealments with high privacy in new technology file system

This paper proposes a new approach, called file concealer (FC), to conceal files in a computer system. FC modifies metadata about a file in NTFS (New Technology File System) to hide the file. Unlike traditional hooking methods which can be easily ...

article
Cybercrime investigation countermeasure using created-accessed-modified model in cloud computing environments

Cyber offenders spread their influence as fast as the Internet and cloud computing develop. Cloud computing enhances challenges in collecting and analyzing digital evidence in a cybercrime investigation. Research on cloud storage forensics is scarce to ...

article
Neighbor stability-based VANET clustering for urban vehicular environments

In this paper, we propose a neighbor stability-based VANET clustering (NSVC) that can efficiently deliver data in urban vehicular environments. The salient features of urban vehicles are their high mobility and unpredictable direction of movement, so ...

article
Mutual authentication scheme between biosensor device and data manager in healthcare environment

This study suggested a new security method which can be applied to healthcare environment aimed at those geographically living away from hospitals, including the elderly living alone, the handicapped, people living in islands and highlands, and chronic ...

article
Coloring-based scheduling for interactive game application with wireless body area networks

A wireless body area network (WBAN) consists of wireless sensors and a central processing device collecting data from the sensors. The WBAN is used to monitor human physical actions. This is applicable to an interactive game with multiple WBANs, i.e., ...

article
Real-time motion control on Android platform

Recently, it is increasingly important to provide good real-time performance with the Android platform, since it has been used in industrial devices. The Android platform, however, does not provide a tight real-time guarantee that is required by such ...

article
A novel security architecture of electronic vehicle system for smart grid communication

As ICT is incorporated into the existing electrical grid, security threats can also be unintentionally introduced to the Smart Grid, as has happened with conventional information and communication networks. To avoid this, a new security architecture ...

article
Anti-debugging scheme for protecting mobile apps on android platform

The Android application package file, APK file, can be easily decompiled using Android reverse engineering tools. Thus, general apps can be easily transformed into malicious application through reverse engineering and analysis. These repacked apps could ...

article
Privacy-enhanced middleware for location-based sub-community discovery in implicit social groups

In our connected world, recommender services have become widely known for their ability to provide expert and personalize information to participants of diverse applications. The excessive growth of social networks, a new kind of services are being ...

article
Improving fault-tolerance capability of on-chip binary CDMA bus

Shrinking technology and growing complexity of the contemporary system on chip designs require high performance and reliable interconnection architecture. Binary CDMA on-chip bus permits simultaneous use of the shared communication medium by multiple ...

article
RE-UPS: an adaptive distributed energy storage system for dynamically managing solar energy in green datacenters

Datacenters, the essential infrastructures for supercomputing and cloud computing, are facing increasing pressure of capping tremendous power consumption and carbon emission. Many studies have proposed to leverage energy storage devices to shave peak ...

article
Admission control in cloud computing using game theory

Cloud computing is emerging as a promising platform for ubiquitous computing where various types of resources are offered on pay-per-use basis. Cloud services are basically offered at three levels; infrastructure, platform and software. Service ...

Comments