Volume 2 Number 2 June 2010

    
WEDF – Distance Aware Scheduler for Real-Time Applications in Wimax

Melek Oktay, Haci Ali Mantar

https://doi.org/

Abstract Scheduling is an important factor for the performance of Wimax system, especially for real-time applications. Earliest Deadline First (EDF) is a delay-optimal scheduling discipline commonly used in real-time applications in wired and wireless networks. Traditional schedulers like EDF do not take the packet destination distance into account. In this paper, we present a scheme that differentiates real-time packets according to... Read More


Data Transmission System Design on 8b10b

Haishan Wang, Cheng Ma, Huibo Jia

https://doi.org/

Abstract The large-scale seismic acquisition system (LSAS) is a kind of field data acquisition system in super scale. It can cover hundreds of square kilometers. To implement the real time transmission of so much data, speed and reliability are the most important criteria of the system. Based on 8b10b code, this paper discusses frame sync technology, error correction code (ECC), and... Read More


Performance of Feature level fusion of Multi-focused images using Stationary Wavelet Packet Transform

K. Kannan, S. Arumugaperumal

https://doi.org/

Abstract Image fusion is defi ned as the process of combining two or more different images into a new single image retaining important features from each image with extended information content. There are two approaches to image fusion, namely spatial fusion and transform fusion and three levels namely pixel, feature and region level. In spatial fusion, the pixel values from the... Read More


Formalization and Quantitative Analysis of Controllability on Internet Information Security

Yin Lihua, Fang Binxing, Guo Yunchuan, He Hui

https://doi.org/

Abstract Traditional information security models focus on protecting information or information systems. There is little research on controllability of Internet information security. We present network reference monitor (NRM) for access control in Internet environment. Then we propose the defi nition of network reference monitor and Internet information access control. Abstract operation model is put forward for controllability of Internet access control.... Read More


Improving the Accuracy and Efficiency of CBA Algorithm

Zheng Tan, Hanhu Wang, Mei Chen, Xiaoping Zhang

https://doi.org/

Abstract Classification is an important research topic in data mining field, and it is one of main task of data mining. CBA (Classification Based on Associations) is a classification algorithm integration association rule mining and classification. CBA has been widely used in data mining areas because it has high classification accuracy and strong flexibility at handling unstructured data. However, when the... Read More


Generation of Targeted Advertisements for Online Social Networks

Pinaki Mitra, Kamal Baid

https://doi.org/

Abstract Generating targeted advertisements for online social networks is a problem of growing interest. Monetizing activity in online social networks has been the topic of heated discussion lately. The undiscriminating tastes and spending power of a majority of its members makes this medium for self-expression and opinion sharing a very lucrative venue for advertising. The recent $240 million investment by Microsoft... Read More


Design of an Adaptive Security Manager for Distributed Systems

Veli Hakkoymaz, smail Alan

https://doi.org/

Abstract This paper presents an adaptive policy management scheme for the security threats in distributed systems. First, we investigate the security aspects of computer networks architecture and observe that security services are provided at application, transport and network layers. Network layer security presents some important opportunities for offering controls over security threats to distributed information systems connected to the global Internet.... Read More