Optimal filter based on scale-invariance generation of natural images
One of the most striking properties of natural image statistics is the scale invariance. Some earlier studies have assumed that the kurtosis of marginal band pass filter response to be constant throughout scales for a natural image. In our study, this ...
A novel secure architecture of the virtualized server system
To make cloud computing environments more secure, this paper focuses on the security of virtualized server systems. A security layer is introduced to the secure architecture of a virtualized server as an abstraction. Because the security layer will play ...
Smart knowledge sharing system for cyberinfrastructure
For development of science and technology, a lot of physical infrastructures are constructed, to be used in many fields. Recently the concept of Big Data, mass information and rich contents has emerged. In the case of particular infrastructure which is ...
A new approach to deploying private mobile network exploits
Private mobile communication systems (MCS) can be established easily with an open project and small MCS base stations are increasingly deployed in experiment environment. They can support not only voice communication, but also short message services (...
Trust model at service layer of cloud computing for educational institutes
Cloud computing is one of those technologies which have revolutionized the modern world. Through this, people can start their businesses without huge investments required for infrastructure like servers, technical staff for maintenance, and purchasing ...
Adaptive Internet of Things and Web of Things convergence platform for Internet of reality services
Recently, Internet of things (IoT) and Web of Things (WoT) lead us to the excellent era of connected everything device. However, the devices hardly show the property of the autonomous connectivity and the self-cooperation for applying in real-world ...
Security experts' capability design for future internet of things platform
Security-related accidents have been occurring frequently in the last few years despite the focus on training security personnel with technical capabilities. Although it is important to be equipped with a technical security system, what is also urgently ...
Data concealments with high privacy in new technology file system
This paper proposes a new approach, called file concealer (FC), to conceal files in a computer system. FC modifies metadata about a file in NTFS (New Technology File System) to hide the file. Unlike traditional hooking methods which can be easily ...
Cybercrime investigation countermeasure using created-accessed-modified model in cloud computing environments
Cyber offenders spread their influence as fast as the Internet and cloud computing develop. Cloud computing enhances challenges in collecting and analyzing digital evidence in a cybercrime investigation. Research on cloud storage forensics is scarce to ...
Neighbor stability-based VANET clustering for urban vehicular environments
In this paper, we propose a neighbor stability-based VANET clustering (NSVC) that can efficiently deliver data in urban vehicular environments. The salient features of urban vehicles are their high mobility and unpredictable direction of movement, so ...
Mutual authentication scheme between biosensor device and data manager in healthcare environment
This study suggested a new security method which can be applied to healthcare environment aimed at those geographically living away from hospitals, including the elderly living alone, the handicapped, people living in islands and highlands, and chronic ...
Coloring-based scheduling for interactive game application with wireless body area networks
A wireless body area network (WBAN) consists of wireless sensors and a central processing device collecting data from the sensors. The WBAN is used to monitor human physical actions. This is applicable to an interactive game with multiple WBANs, i.e., ...
Real-time motion control on Android platform
Recently, it is increasingly important to provide good real-time performance with the Android platform, since it has been used in industrial devices. The Android platform, however, does not provide a tight real-time guarantee that is required by such ...
A novel security architecture of electronic vehicle system for smart grid communication
As ICT is incorporated into the existing electrical grid, security threats can also be unintentionally introduced to the Smart Grid, as has happened with conventional information and communication networks. To avoid this, a new security architecture ...
Anti-debugging scheme for protecting mobile apps on android platform
The Android application package file, APK file, can be easily decompiled using Android reverse engineering tools. Thus, general apps can be easily transformed into malicious application through reverse engineering and analysis. These repacked apps could ...
Privacy-enhanced middleware for location-based sub-community discovery in implicit social groups
In our connected world, recommender services have become widely known for their ability to provide expert and personalize information to participants of diverse applications. The excessive growth of social networks, a new kind of services are being ...
Improving fault-tolerance capability of on-chip binary CDMA bus
Shrinking technology and growing complexity of the contemporary system on chip designs require high performance and reliable interconnection architecture. Binary CDMA on-chip bus permits simultaneous use of the shared communication medium by multiple ...
RE-UPS: an adaptive distributed energy storage system for dynamically managing solar energy in green datacenters
Datacenters, the essential infrastructures for supercomputing and cloud computing, are facing increasing pressure of capping tremendous power consumption and carbon emission. Many studies have proposed to leverage energy storage devices to shave peak ...
Admission control in cloud computing using game theory
Cloud computing is emerging as a promising platform for ubiquitous computing where various types of resources are offered on pay-per-use basis. Cloud services are basically offered at three levels; infrastructure, platform and software. Service ...