The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Modal Distribution (MD) is a time-frequency distribution specifically designed to model the quasi-harmonic, multisinusoidal, nature of music signals and belongs to the Cohen general class of time-frequency distributions. Signal synthesis from bilinear time-frequency representations such as the Wigner distribution has been based on methods which exploit an outer-product interpretation of these...
In recent years, a new internet architecture based on the publish/subscribe paradigm has been adopted by organizations such as the FP7 EU project PSIRP (Publish/Subscribe Internet Paradigm) and its follow on FP7 EU project PURSUIT (Publish/Subscribe Internet Technology). Furthermore, a publish/subscribe based zFilter forwarding node has been developed and implemented on the NetFPGA platform. The zFilter...
Energy consumption is arguably the key factor in the design and operation of Wireless Sensor Networks (WSNs). This holds both for normal operation and maintenance operations - such as software updates. Whereas software updates will probably be infrequent, they must still not consume a significant fraction of a WSN's energy reserve; also, the required consumption must be known before triggering an...
A Sybil attack refers to a network attack against identify in which a malicious user obtains multiple fake identities and creates fake nodes which are inserted amongst honest nodes in the system simultaneous. By controlling a large percentage of the system, or a large section of the local scope, the malicious user can take further boring actions like DDos attacks, False Voting, Invalid DHT routing,...
During the past decade, stream data mining has been attracting widespread attentions of the experts and the researchers all over the world and a large number of interesting research results have been achieved. Among them, frequent itemset mining is one of main research branches of stream data mining with a fundamental and significant position. In order to further advance and develop the research of...
This paper presents a project of an intelligent home system based on the Internet of Things. The proposed system provides various convenient services for residents and constructs a network with every single intelligent home node. In this paper, firstly, an intelligent home gateway is described in detail. A number of home sensors, based on Zigbee technology, can be deployed in the house. Various intelligent...
We investigate the vulnerability of complex networks under different node-based attacks. The networks considered include scale-free network (SF), WS small-world network model, ER network and two real-world networks (autonomous system network and Italy power grid). The attacks are induced by removing the nodes in the descending order of the four kinds of weights defined in this paper. By measuring...
This paper proposes a novel approach to overcome the bottleneck in financial data mining. We construct a composite kernel machine (CKM) on the kernel local fisher discriminant space (KLFDS) to solve three problems in high-dimensional data mining: the curse of dimensionality, data complexity and nonlinearity. CKM exploits multiple data sources with strong capability to identify the relevant ones and...
In this paper, we consider adaptive cooperation and relay selection for opportunistic system. A novel hybrid opportunistic cooperation strategy with log likelihood ratio (LLR) threshold is proposed in order to combat error propagation. Firstly, we combine the proactive and reactive opportunistic relaying by employing specific LLR switching thresholds, according to which the best relay and the corresponding...
In conventional binary network coding (BNC), the decode condition constrains the achievement of diversity gain. In this paper, a novel network-coded scheme is proposed, where the inter-rely cooperation (IRC-NC) is employed to loose the above restriction. Firstly, two relays are divided into NC node and assistant node according to their channel gain to destination. This process is accomplished by the...
The increasing complexity of systems poses a big challenge to design systems with fault-tolerant capability. The aim of this study was to establish fault-tolerant system for multiprocessor platform with the help of hierarchical scheduling framework. A mathematical fault and reliability model for hierarchical scheduling framework was proposed firstly, and then a heuristic algorithm by exploiting the...
As the inevitable noises exist in actual application, the common method (MTMM) gets unacceptable result of singularity detection. In order to get more accurate singularity detection, wavelet transform shrinkage and spatially selective noise filtration methods are respectively utilized to denoise the corrupted signals. Then, the wavelet transform are applied to the two independent preprocessing signals,...
According to the chaotic characteristics of frequency hopping (FH) sequences and the short-term predictability of Chaos, this paper presents an improved Bayesian network predictive model applied to FH sequences prediction. Firstly, the model regards the entire reconstructed phase space as a prior data information; Then, according to the characteristic of FH sequences which consist of multiple frequency...
Evaluating the power consumption of cache in an early time is very important for designer to judge their system whether meets the constraints of power. An improved cache power model is proposed to simulate the peak power of cache according to the system parameters. Compared with the traditional power model, it additional supports leakage power, routing power, and multi-port cache. Process scaling...
A voltage reference with low temperature coefficient (TC), low supply voltage and ultra-low power consumption is presented. The proposed reference is made up of MOSFETs working in subthreshold region without resistors. Therefore the advantages of ultra-low power consumption and ultra-small area can be obtained. The best TC is 2.1ppm/°C in a temperature range of −20°C to 80°C. The supply voltage ranges...
Fair bandwidth allocation and congestion control is an important issue when accessing a common shared link in the modern TCP/IP networks. In this paper, we propose and evaluate fair downlink bandwidth distribution method which is based on online upstream control and limitation. The method is designed to maintain the fair shared bandwidth allocation by adaptively controlling the upload rate of the...
This paper describes the design and implementation of low power modular multiplier of RSA and balances its area and speed. By improving Montgomery modular multiplication algorithm, optimizing critical path and using several low power methods, this paper achieves low power as well as high speed performance. The design is implemented using SMIC 0.13um CMOS process, the average power consumption is 106uW...
Network coding is a promising technology which can improve the network resource utilization and network throughput effectively. Because of the broadcast procedure for network coded packet and the different link qualities between destination nodes and relay node, the selection of destination node as the configuration standard for the broadcasting of network coded packet gives direct effect towards...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.