The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We propose a remapping algorithm to tolerate the failures of Processing Elements (PEs) on Multiprocessor System-on-Chip. A new graph modeling is proposed to precisely define the increase of communication cost among PEs after remapping. Our method can be used not only to repair faults but also to improve the communication cost of given initial mapping results. Experimental results show that under multiple...
When Business support systems (BSS) suffer poor performance, the system administrator has to spot the problem of BSS as soon as possible. The monitoring system is a great help to quickly gain insight of the system from all sides. By the monitoring system, the administrator can evaluate various metrics on the different fields in one single arranged page and understands the whole picture of current...
Automated detection of moving objects is an essential task for any intelligent transportation system. However, conventional motion detection techniques often suffer from the loss of moving objects due to bit-rate variation in video streams transmitted via wireless video communication systems. To achieve motion detection that is both reliable and accurate in video streams of variable bit-rate, this...
Objects need to be analyzed in the video surveillance system, while motion detection can be applied to define the analyzable area. This paper proposes a novel motion detection algorithm with background model generation. In order to accurately generate background model, 4-connectivity function is directly used to approximately label the background region. The labeling function makes the background...
Wireless sensor networks observe the occurrences of concerned events by the collaboration between sensor nodes via wireless communication. Sensors are usually prone to errors due to the unstable conditions they are exposed to. The goal is to solve event boundary detection with faulty sensors (EBDF) problem which is to successfully identify the sensor nodes close to the event boundary when faulty sensors...
Based on authors' previous work on a travel hub and semantic recommender, a mobile travel service recommender is proposed in this article, to discover and recommend composite travel services though mobile terminals. Among the recommender's features are (i) using OWL-based user semantics to discover travel services, (ii) searching travel Web services both from predefined resources and from UDDI-supported...
In this paper, we consider the problem of interferers for cooperative spectrum sensing in a centralized cognitive radio network comprising N cognitive radios (CRs) and one fusion center (FC) in the presence of a fixed interferer. The design metric chosen is the error probability. We prove the existence of a saddle-point in the minimax game between the interferer and the CR network. An optimal solution...
This paper proposes a predator-prey cellular genetic algorithm to solving dynamic optimization problems. A predator-prey model replaces the evolution rule in regular cellular genetic algorithm, which is more similar to the evolution scheme in real world. It contains two different populations: predator and prey, both of them are dynamic changes with predatory operation. The predators and preys are...
We design the optimal jamming attack strategy for a cognitive radio network in the presence of path-loss decaying signal models. We consider a cognitive radio network with K participating cognitive radios and one fusion center in the presence of one primary user and one jammer in the operating region. We assume that the network is not aware of the presence of the jammer and hence employs the optimal...
Collaborative (or distributed) spectrum sensing has been shown to have various advantages in terms of spectrum utilization and robustness in cognitive radio networks (CRNs). The data fusion scheme is a key component of collaborative spectrum sensing. We have recently analyzed the problem of Byzantine attacks in CRNs, where malicious users send false sensing data to the fusion center (FC) leading to...
Cognitive radio (CR) has emerged as a solution to the problem of spectrum scarcity as it exploits the transmission opportunities in the under-utilized spectrum bands of primary users. Collaborative (or distributed) spectrum sensing has been shown to have various advantages in terms of spectrum utilization and robustness. The data fusion scheme is a key component of collaborative spectrum sensing....
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.