The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we first present a formal specification for a part of Software Defined Networks(SDN) using a process algebra called Algebra of Communicating Shard Resources(ACSR). To provide a correct and efficient solution for forwarding packets on the Software Defined Networks, ACSR can express processes running concurrently and communicating switches and a controller. Forwarding packets can be modeled...
Many generic position estimation algorithms are vulnerable to ambiguity introduced by no unique landmarks. Also, the available high-dimensional image data is not fully used when these techniques are extended to vision-based localization. In this paper, we consider the problem of mobile robot indoor position estimation using only visual information from a single camera which has a fisheye lens. The...
With the increasing demand for access of mobile Internet via smartphones, the needs of adult images and videos filtering is escalating. In this paper, we propose a simple and fast objectionable video classification scheme using temporal motion and color energy features (TMCEF) and evaluate the performance on accuracy and processing time. The video segments extracted from a video clip have similar...
In this paper, we investigate the performance of the proxy mobile IPv6 and compare it with that of the hierarchical mobile IPv6. It is well known that performance of proxy mobile IPv6 is better than that of hierarchical mobile IPv6. For the more detailed performance analysis, we propose an analytic mobility model based on the random walk to take into account various mobility conditions. Based on the...
The method which research a standardization from real time cyber threat is finding the suspicious indication above the attack against cyber space include internet worm, virus and hacking using analysis the event of each security system through correlation with the critical point, and draft a general standardization plan through statistical analysis of this evaluation result. It means that becomes...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.