The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A star-topology local area network is designed to carry optical packet traffic, employing collision-free switching. Data forwarding is under centralized control based on scheduled resource reservation, eliminating the need for optical buffers in the central switch. Packets are stored in electronic buffers within the end stations prior to their electronic-to-optical conversion and transmission in the...
Because of the characteristics of photoelectric sensors and the working environment of cameras, real-time surveillance video contains much noise, which does not only decrease the subjective visual quality, but also increases the output bitrate of video encoder. The effect of partial spatio-temporal smoothing is not evident. According to the characteristics of surveillance video, we propose a novel...
In this paper, a probabilistic testing algorithm is proposed to increase the fault coverage for OSPF based E-NNI routing protocol testing. It automatically constructs random network topologies and checks database information consistency with real optical network topology and resource for each generated topology. Theoretical analysis indicates that our algorithm can efficiently increase the fault coverage...
Resilient packet ring (RPR) is a metropolitan area network technology for data transfer based on ring configuration and is standardized as IEEE 802.17. RPR provides a local fairness, Spatial Reuse and high bandwidth utilization. And fairness algorithm is very important for RPR. RPR can be regarded as dual-ring of Register Insertion Ring (RIR). In this paper we revise our former algorithm for RPR,...
In communication environments such as power line channel, impulsive noise greatly deteriorates the performance of detection algorithm based on Gauss optimization. This paper introduces a symmetric alpha stable (SalphaS) distribution to model a statistical model of impulsive noise, and considers that interference in the receiver is a mixture of additional white Gaussian noise (AWGN) and SalphaS noise...
UPnP is a novel networking and content sharing standard for digital home applications with its main feature, automatic discovery technique, allowing client users to fast deploy and easily access multimedia resources shared by UPnP media servers. As the high quality of multimedia content becomes more delicate today, the file size is becoming gigantic resulting from its high bit rate with complex encoding...
To improve the performance of in-loop deblocking filter in H.264/AVC, this paper proposes a pipelined hardware architecture. A novel transposer design is presented and its hardware cost is reduced by 15% with forwarding logic to shift pixels. Through adopting a filtering order with vertical and horizontal edges processed alternately, on-chip memory is greatly saved and only two 32times32 bits SRAMs...
Estimation of nonlinear communication channel has long been an important problem in digital communications. Being able to identify the nonlinear characteristics of the channels can help in the design of the nonlinear equalizer. In this paper, we propose a novel method for estimation of cubically nonlinear channels using random multisine signals as the input. By analyzing the higher-order moment spectra...
PN-sequence padding scheme has been proposed in TDS-OFDM systems instead of the cyclic prefix scheme in the traditional CP-OFDM systems. The PN-sequence, padded between normal OFDM symbols, has dual functions for assisting in channel estimation and preventing inter-symbol-interference between normal OFDM symbols over frequency-selective fading channel. However there are ISI to the normal OFDM symbols...
A fast and general simulation of linear fractional stable noise (LFSN) is presented in this paper, which utilizes the efficiency of FFT to minimize calculation overload, and has no limitation on parameters of LFSN so that self-similar network traffic model based on LFSN can be thoroughly studied. Relevant codes and examples are demonstrated here, as well as simulated network traffic.
Spatial diversity is an effective technique to mitigate the negative effects of fading and depends on deployment of antenna array on small mobile unit. This is infeasible due to the small size of the mobile node. In order to overcome this limitation, a new concept of diversity that has emerged called cooperative diversity is realized. In this technique, different nodes in a wireless network are allowed...
The high volume of packets and packet rates of traffic on some router links makes it exceedingly difficult for routers to examine every packet in order to keep detailed statistics about the traffic which is traversing the router. Sampling is commonly applied on routers in order to limit the load incurred by the collection of information that the router has to undertake when evaluating flow information...
The proposed delayed reservation decision scheme offers the same node complexity as that in general OBS networks with optical buffers. Simulations show the proposed scheme has better performance than existing schemes in terms of burst loss probability.
With the increasing demands of copyright protection, watermarking technology has being paid more and more attention. In the design of watermarking algorithm, a good watermark detection scheme can improve the successful detection rate, which pushes more and more researchers to work on optimum detectors. In this paper, with respect to Barni's multiplicative watermarking that is based on human visual...
The multimedia broadcast multicast service (MBMS) has been included in the 3GGP architecture to provide broadcast/multicast services. In the 3GPP Long Term Evolution, the evolved MBMS (e-MBMS) architecture is currently being standardized. This position paper discusses the security issues currently being considered for the e-MBMS IP multicast user plane. Currently proposed security architectures ldquolimitrdquo...
In this paper, a novel concept "authentication set" is used to analyze the security of the authentication schemes in detail. Several novel concepts on the authentication set are defined, which are called "cover authentication set", "attack authentication set", "watermark-based authentication set" or "signature-based authentication set", "verified...
A distinguishing feature of today's large-scale platforms for multimedia distribution and communication, such as the Internet, is their heterogeneity, predominantly manifested by the fact that a variety of communication protocols are simultaneously running over different hosts. A question that arises in such settings of multimedia systems concerns the presence (or not) of stability properties when...
Hiding image in a color image is a very interesting research topic, especially using very popular software such as Microsoft Windows Paint, Internet Explorer browser (IE) Mozilla Firefox, etc can achieve very amazing result. In this paper, we start from the select operation of IE, and introduce the mechanism how to hide a color image in a real natural image. Based on this, we generate an animation...
In the last few years, live pay-TV system via Internet has come to be established with the development of broadband network. To develop such a system, a mechanism for content protection is required. In this paper, a new architecture integrating fingerprint with cryptosystem is proposed to protect contents from unauthorized access and illegal redistribution. We describe a scheme integrating anti-collusion...
(N - 1) attack is one of the most powerful active attacks against mix, which is the basic building block of many modern anonymous systems. RG mix is an effective scheme to protect against (n - 1) attack. However it has some security and design weaknesses. This paper investigates these problems and gives solutions. Information dispersal algorithm is imported to prevent the security and robustness vulnerabilities...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.