The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents a high level architecture for a robot, designed for item picking task for E-commerce fulfillment center. The architecture was designed to be modular and has features that allow the robot to operate in an E-commerce warehouse environment, where bin content changes over time. Our system was built upon the Robot Operating System (ROS), with the benefits of abstracting low level machine...
Advanced driving assistance systems (ADAS) have developed in widespread use for traffic safety, they must include mechanisms functioning in bad weather conditions. However, the rain reduces visibility and degrade the effectiveness of computer vision algorithm when they are vision-based methods. We propose an orientation-adaptive non-local mean (OA-NLM) filter algorithm to further improve rain removal...
Various product applications bring up with increasing demands of logic NVM IP in advanced technology nodes. Encryption, security, functionality, and identification setting become indispensable in communication and high-end consumer electronics. A non-volatile memory cell, using anti-fuse programming mechanism to achieve high density and excellent data storage lifetime, is proposed. The unique cell...
Location privacy preservation has become an important issue in providing location based services (LBSs). When the mobile users report their locations to the LBS server or the third-party servers, they risk the leak of their location information if such servers are compromised. To address this issue, we propose a Location Privacy Preservation Scheme (LPPS) based on distributed cache pushing which is...
Information-centric networking (ICN) aims to make the Internet more data-oriented or content-centric, thus name-based routing and universal caching are used to change the way users requesting and fetching content, as well as to improve network performance. However, current implementation mechanisms define some kinds of "clean-slate" architecture and certain brand new technologies need to...
The single message ferry routing scheme works well in the small scale clustered DTNs (Delay/Disruption Tolerant Networks). However, as the increasing of the network scale, this scheme will lead to high delay. To solve this problem, a hierachical multiple ferries routing scheme (HMFRS) was proposed in this paper. In this scheme, a message ferry and a ferry access point are deployed in each DTN cluster,...
This paper introduces the Open filer operation system to setup a network storage environment, and to build five different private small-cloud computing servers (PSCCS). Then by using the iSCSI storage technique through the TCP/IP protocol to explore the accessing assessments of the Open filer storage device for each feasible cloud computing system is undertaken. This includes comparing reading efficiency...
The feature of digital model on hull structure is studied, combined with modern ship building pattern it put forward the establish method of ship digital model. Rely on 3-D molding software exploit structural design system which provides basic operation and calculation from ship structure modeling to assembly simulation. Through the combination of the program's centralize control ability; the database's...
Non-Manhattan structures, such as the X and Y architectures, propose different flavors in reducing the use of physical resources, such as total wirelength and number of vias. However, in order to take full advantage of these structures, we need to develop new tools for these architectures, especially for early stages in physical design. In this paper, we propose the packing algorithm with isosceles...
Cognitive networks become hotspot in the field of network research recently. It is considered a valid solution for heterogeneous networks. In this paper, we propose a new architecture of cognitive networks and divide its cognitive capabilities into three sub-layers named access cognitive layer, network cognitive layer and service cognitive layer. The aim of the design is to implement cognitive capabilities...
In this paper, an unified hardware architecture for the complete set of transforms in H.264/AVC codec is presented. This architecture has been mapped into 2-D 4×4 forward/inverse transforms, 2-D 4×4/2×2 Hadamard transforms, and 1-D 8×8 forward/inverse transforms resulting in 31 sub/adders, 7 adders, 6 subtractors, 34 shifter, 4 multiplexer, and 16 registers. The architecture calculates 16 inputs and...
This paper proposes a two-dimensional scan shift control concept for multiple scan chain design. Multiple scan chain test scheme provides very low scan power by skipping many long scan chain switching activities. Based on two-dimensional scan shift control, we can achieve low test power with simple and small overhead structure. The proposed scheme skips many unnecessary don't care (X) patterns to...
Today, many bio-signals such as Electroencephalography (EEG) are recorded in digital format. It is an emerging research area of analyzing these digital bio-signals to extract useful health information in biomedical engineering. In this paper, a bio-signal analyzing cloud computing architecture, called BACCA, is proposed. The system has been designed with the purpose of seamless integration into the...
Identification of various P2P flows accurately is fundamental for network management. To obtain P2P flow information in real-time and low price, a distributed extensible architecture for P2P flows identification called DEAPFI is proposed. DEAPFI decentralizes functions of flow identification and statistic on different PC, which is composed of identification system (IS) and statistic system (SS) respectively...
A Three Layer Multimedia Sharing (TLMS) for managing access right of user in a P2P network is proposed in this paper. The features of TLMS include: 1) a novel DRM scheme for P2P networks, 2) a digital content protection without the need of an on-line server, and 3) low communication and computation cost. In addition to introducing the operation of TLMS model, we also compare its performance and security...
In today's data centers, precisely controlling server power consumption is an essential way to avoid system failures caused by power capacity overload or overheating due to increasingly high server density. While various power control strategies have been recently proposed, existing solutions are not scalable to control the power consumption of an entire large-scale data center, because these solutions...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.