The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This study collects reports related to the future electric power industry, analyzes the text data of the report, and reviews key issues related to ICT convergence by a period. As a result, ICT convergence discussions have been ongoing, but discussions on the types, functions, and utilization of ICTs are more specific than the effects provided by ICTs in recent years. ICTs are becoming increasingly...
With the upsurge in the volume of data and profuse cloud applications, big data analytics becomes very popular in the research communities in industry as well as in academia. This led to the emergence of real-time distributed stream processing systems such as Flink, Storm, Spark, and Samza. These systems sanction complex queries on streaming data to be distributed across multiple worker nodes in a...
In this paper, we propose a subspace method for solving unconstrained optimization problems without derivatives. In each iteration, we construct a subspace, which enables a large-scale unconstrained optimization problem to be transformed into a lower dimensional subproblem. This paper describes how to use polynomial interpolation model to capture the information of function and its derivatives, and...
There has been a considerable debate on the applicability of conventional encryption techniques for protecting images. Chaos based encryption systems are preferred for digital image encryption for a long time now. For a reliable encryption method any alteration in image content or the key must be reflected in the cipher image. The present work demonstrates a highly secure and reliable encryption of...
Controlling power utilization in the residential area is one of the major challenges in the smart grid (SG). Demand response (DR) has played a vital role in energy management and improved it with the involvement of residential consumers who participate in such programs from utilities for scheduling their appliances to the off peak hours. In this paper, we have proposed a world-wide adaptive thermostat...
The world is facing the pandemic of infectious diseases. Together with the development of transportation technology, the global spread of diseases continues to accelerate. To examine the correlation between transportation and infection, we did the statistical analysis on the highway transport and the domestic flight based on the GIS in the South Korea. Consequentially, the traffic movement through...
The full potential of multiple-input multiple-output (MIMO) wireless technology can be achieved through iterative MIMO decoding with soft information. In iterative MIMO decoder, the complexity can be major obstacle for practical implementation. The soft interference cancellation-minimum mean squared error (SIC-MMSE) approach for detection is considered as a feasible approach due to its complexity-performance...
Present IoT smart service provided in the smart home is vulnerable to various malicious attacks such as spoofing and denial of service (DoS) from attackers by using IP address based communication. To avoid malicious attacks, the IoT device need to include security technologies and security equipment. But it is really hard to install security technologies and security equipment on the IoT device with...
This paper considers a wireless power transfer system with multiple antennas by using the multicarrier signal waveforms. A prior art optimizes the waveform with the channel state information at the transmitter (CSIT) to improve the energy harvesting efficiency of the receiver with the non-linear model. The impact of the imperfect CSIT on the energy harvesting capability is studied as a function of...
A unidirectional security gateway is a network system in which data can travel in only one direction. Therefore, the system are used in protecting the safety and reliability of various critical infrastructures. Most of all, it has to be deployed with send and receive transceivers disconnected for one direction to ensure information security. In this paper, we introduce a unidirectional security gateway...
The fifth-generation (5G) mobile systems are considered as a promising infrastructure to provide connectivity for massive Internet-of-Things (IoT) devices leading to the fourth industrial revolution (Industry 4.0), i.e., smart manufacturing. The smart manufacturing is characterized by capabilities of digitization, smartization, and connectivity for manufacturing operations and machinery where a huge...
Since one GRS used for Control and Non-Payload Communication (CNPC) of Unmanned Aerial Vehicle (UAV) cannot support all operational ranges of an UAV, the handover technology of CNPC is essential to operate an UAV in a wide range. However, the CNPC physical layer standard of Radio Technical Commission for Aeronautics (RTCA) does not have a reference signal for measuring the signal strength of a neighboring...
There are a diverse set of products for a particular type on the internet. When any user tries to find out best product among a certain type it is very much difficult to do it manually go through every one of them. That's why manually searching is not very efficient. In that scenario, recommendation system plays a great important role to recommend the best products. In this study, we develop a recommendation...
This paper investigates the deployment of an SDN-based UAV network providing communication service. Such a network is extremely useful in emergency scenarios. In such a network, the mobility of UAVs is minimal. We consider the placement of the SDN controller and its implications in terms of communication overhead and end-to-end delay of the control packets exchanged between the UAVs and the controller...
Indoor localization system is an important topic in the wireless navigation system. Many technologies, such as Wi-Fi, Bluetooth, and ZigBee, have been developed for the indoor localization system; however, these systems still demonstrate poor accuracy and performance. The indoor localization system using Wi-Fi signals is the best option for indoor localization because most of the buildings are covered...
This research aims to determine the cause-effect series with concepts of problem events, especially drug-addiction, expressed by several simple sentences from web documents. The cause-effect series benefits for the problem-solving system. The research has two problems; how to determine sentences having cause/effect event concepts, and how to determine the cause-effect relation pairs with the boundary...
The purpose of this research is proposing a theory to verify the influence of virtual props trading sites to game loyalty of players. The objects of sampling aims at users who are actually engaged in online games props trading sites. A survey of 459 game players in Taiwan was conducted; research results were generated through the use of descriptive analysis, reliability analysis, correlation analysis,...
RaptorQ is the most advanced raptor code and has an overhead-failure curve close to the random fountain code over the GF(256) finite field. Theoretically, it is possible to encode and decode with linear time complexity by an inactivation decoding algorithm, which is a hybrid algorithm of belief propagation and Gaussian elimination. However, achieving linear time complexity in a real-world implementation...
Recently, the specifications for 5G system architecture and procedures including TS 23.501 and 23.502 are being developed by 3GPP. In the specifications, one of key principles and concept is to separate the user plane (UP) functions from the control plane (CP) functions, allowing independent scalability, evolution and flexible deployments and modularize the functions design to enable flexible and...
In this paper, we propose a system to measure the crowdedness of a specific area using CCTV images. In the proposed system, objects are distinguished by using the Visual Background Extractor (ViBe) algorithm. The background that has not been removed by the ViBe is excluded from the object area using the opening technique. Then, the object area assigned to different weights based on the pixel positions...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.