Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
We have proposed a new form of action recognition using motion sensors built in mobile and wearable devices. Due to the miniaturization of hardware sensors, action classification through mobile sensors has become a much more attainable task. Using Android and Tizens integrated development environment, we have devised applications for each of these devices to document raw sensor data for analysis....
Data is becoming more and more valuable as technology advances. Through crowdsourcing organizations are able to collect large amounts of data at an effective rate with little cost. This paper proposes a crowdsourcing-based music playing system, where the next song to play is determined by the listening preferences of realtime online users. Unlike conventional radio play system, where songs are randomly...
As a shared economy platform, Airbnb provides collaborative practices for customers and guides them to match with hosts' rooms. Based on the records and ratings, there is great significance attached to inferring the satisfaction between users and rooms. Several essential problems arise when evaluating satisfaction and matching. Data confidence and prediction bias influence the inference performance...
Water supply system has characteristics of non-linear, time-varying parameter, large time delay, so its mathematical model changes time by time. Water supply system widely use PID controller to keep constant pressure and PID controller need accurate mathematical model. The system that use PID controller is along with large overshoot, more adjusting time. Fuzzy controller don't need the accurate mathematical...
Sign language is important since it permits insight into the deaf culture and allows more opportunities to communicate with those who are deaf or hard of hearing. In this paper, we show that Wi-Fi signals can be used to recognize sign language with sparsely labeled training dataset. The key intuition is that sign language introduces different multi-path distortions in Wi-Fi signals and generates different...
Recent breakthroughs in wireless energy transfer-based rechargeable batteries enable a promising application of Wireless Charging Vehicles (WCVs) in Wireless Rechargeable Sensor Networks (WRSNs). This paper studies cooperative WCV schedules in WRSNs to optimize sensor recharging. The objective is to minimize the number of WCVs under the constraint that all sensors must be periodically recharged before...
In this paper, we propose 3DLoc, which performs 3-dimensional localization on the tagged objects by using the RFID tag arrays. 3DLoc deploys three arrays of RFID tags on three mutually orthogonal surfaces of each object. When performing 3D localization, 3DLoc continuously moves the RFID antenna and scans the tagged objects in a 2-dimensional space right in front of the tagged objects. It then estimates...
The emergence of large-scale dynamic sets in real applications creates stringent requirements for approximate set representation structures: 1) the capacity of the set representation structures should support flexibly extending or reducing to cope with dynamically changing of set size; 2) the set representation structures should support reliable delete operation. Existing techniques for approximate...
Security and privacy issues are considered to be two of the most significant concerns to organizations and individuals using mobile applications. In this paper, we seek to address anonymous communications in delay tolerant networks (DTNs). While many different anonymous routing protocols have been proposed for ad hoc networks, to the best of our knowledge, only variants of onion-based routing have...
Stream processing applications continuously process large amounts of online streaming data in real-time or near real-time. They have strict latency constraints, but they are also vulnerable to failures. Failure recoveries may slow down the entire processing pipeline and break latency constraints. Upstream backup is one of the most widely applied fault-tolerant schemes for stream processing systems...
In this paper, the high-speed modified uni-traveling-carrier photodiode (MUTC-PD) was designed and fabricatedfor low reverse bias. The 3-dB bandwidth and responsivity of MUTC-PD with 24-μm mesa diameter at 1-V reverse bias is 22.5 GHz and 0.22 A/W at the wavelength of1550 nm, respectively. The dark current of the device is less than 4nA at 3.3 V reverse bias. The fabricated device can achieve high...
Medical data collection in healthcare monitoring applications through traditional frameworks raise serious concerns of patient data privacy and security, due to numerous security threats and attacks. In this paper, we investigate the concerns with privacy protected data collection and propose a novel patient privacy protected data collection framework with the aim to provide patient data privacy....
The rapid growth of mobile network traffic has posed a serious challenge to the limited spectrum. The United States Federal Communications Commission (FCC) allowed the utilization of unused TV White Space (TVWS) by unlicensed secondary users (SUs). Particularly, the IEEE 802.19.1 standard is proposed to regulate the coexistence of dissimilar or independently operated SU networks and devices on the...
The optimal modified tracking performance of single-input single-output (SISO) discrete-time networked control systems (NCSs) with packet dropouts is investigated in this paper. An explicit expression is obtained by using the method of partial fraction and co-prime factorization. A new modified tracking performance index of NCSs is provided to present variations in the tracking error when there is...
Aiming at efficiently mapping multiple virtual optical networks (VONs) on a shared substrate network. This paper proposes a load balancing algorithm that is based on key-link and resources contribution degree (RCD) for VONs mapping (KLRVM) in elastic optical networks (EONs). In this algorithm, virtual nodes mapping gets the network status according to the proposed RCD, and comprehensively considers...
The operational principles of circularly-polarized (CP) antenna elements for use in wideband simultaneous transmit and receive (STAR) antenna arrays are presented and discussed in this paper. Based on these operating principle, two designs of CP STAR array elements are presented. Both designs use the same cancellation technique to achieve STAR operation but they use different radiating elements. They...
Locality preserving projections (LPP) can preserve the local structure of the datasets effectively. However, it is not capable of separating the samples that are close to each other in the high-dimensional space but belong to different classes. Focusing on the problem, a class-dependent locality preserving projections (CDLPP) algorithm is proposed in this paper. The class information is embedded into...
In online social networks, people may want to make new friends to maximize their social influences. For example, business page owners on Facebook want to influence as many people as possible for commercial advantages. Hence, we study a friend recommendation strategy with the perspective of social influence maximization. For the system provider (e.g., Facebook), the objective is to recommend a fixed...
Network coding is a technique used to improve both wired and wireless networks' throughput and provide reliable transmission. In network coding, original data packets can be encoded to an infinite number of coded packets. A subset of these coded packets is sufficient to decode the coded packets and retrieve the original data. In addition to providing reliable data transmission, network coding can...
With the substantial incensement of broadband networks, Internet applications have shifted from simple web browsing to content-centric applications. From the perspective of the content distributor, how to reduce the cost while satisfying quality of service and how to respond timely to users are of great concern. Currently, using multi-cloud technology is a feasible solution to provide more agile and...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.