The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Collaborative filtering has become one of the most widely used methods for providing recommendations in various online environments. Its recommendation accuracy highly relies on the selection of appropriate neighbors for the target user/item based on a user-item matrix. However, existing neighbor selection schemes have inevitable inadequacies, especially when handling a very sparse user-item matrix...
Multimedia informational security problems including copyrights piracy emerge as the development of network technology. Studying the analyses of watermarking capacity becomes a hot point. Technologies of digital watermarking model are researched in this paper. Some analytical methods of digital watermarking capacity are discussed. The analyses of digital watermarking capacity can balance imperceptibility...
In the underwater environment exist marine mammals and underwater wireless sensor networks (UWSNs), both of which use acoustic signals for communication. However, most of existing researches only focus on the performance, such as energy efficiency, packet error rates and propagation delay, of acoustic communication in UWSNs, which seems not friendly to marine mammals. With the purpose of sharing the...
With the development of mobile internet, wireless communications via mobile devices in the form of Delay Tolerant Networks (DTNs), becomes a hot research topic. One critical issue in the DTNs with social characteristics is that there could exist selfish nodes which are unwilling to forward messages from strangers and malicious nodes which intentionally impair normal communication. Although there are...
In face recognition, the illumination variation problem in uncontrolled environments has gained some research activities. Although the quotient image based methods are reported to be a simple yet practical technique in face recognition, these methods could not satisfactorily maximize the ratios of between-class and within-class scatter and may not effectively be used for the illumination variation...
With the development of mobile internet, wireless communications via mobile devices, which is typically in the form of Delay Tolerant Networks (DTNs), becomes a hot research topic. One critical issue in the development of DTNs is the routing. Although there are a lot research works addressing routing issues in DTNs, they handle routing problem from only one or two aspects, which cannot produce an...
With the continuous expanding of Internet scale, the network users and application increase rapidly and congestion control has become focus of network study. Several congestion control algorithms have been proposed out and improved for effective reduction of packet loss rate and for better utilization of network bandwidth. After analysis of several reasons causing network congestion, this paper presents...
The network coding could improve the wireless network transmission performance. The network nodes using the traditional full network coding have to wait the arrival of other data packets for coding, which increase the network delay. This paper proposed the ORPNC (Opportunistic Routing based on Partial Network Coding) protocol, which combining partial network coding with opportunistic routing to decrease...
Pedestrian detection in dynamic and outdoor environment is considered to be a challenging task due to complicated scenes and human's various appearances. To achieve more efficient and precise detection, stereo vision is an attractive approach. This paper introduces a pedestrian detection system which makes use of binocular stereo. A new method of ROIs (Regions of Interest) extraction is proposed and...
this paper presents a novel and efficient illumination normalization method based on the local binary pattern Image (LBPI). LBPI is a global description combined by the descriptions of every points in the face image using the local binary pattern (LBP) Compared with the traditional approaches, the experimental results show that our algorithms can significantly improve the performance of face recognition...
Multiple human detection and tracking is a complicated task in real scenarios. We present in this article a robust approach for multiple human detection, tracking and identification. For human detection, an improved HOG human detector is used. In multiple human tracking, serving to inter-frame accordance, it is essential to generate distinctive signatures for each person. As global appearance description...
The high propagation delay in Underwater Sensor Networks (UWSNs) causes space-time uncertainty, making spatial fairness a challenging problem in UWSNs. In this paper, we propose a weight-based spatially fair MAC protocol (WSF-MAC) for UWSNs. It postpones sending the underwater-reply (UW-REP) packet for a silence duration time, and then determines the node to send UW-REQ first according to the sending...
Network multi-view stereoscopic TV remains an unfilled blank, because multi-view stereoscopic TV is characterized by high bit rate and low tolerance for bit error which are the restriction of the development of network multi-view stereoscopic TV. This paper aims to solve the problem by distributed video coding (DVC) and GPU acceleration. Distributed video coding is an effective approach of Wyner-Ziv...
IEEE 802.16 standard is one of the most promising standards for wireless broadband access in metropolitan scale, which is characterized by its high speed, wide coverage, flexible design, relay networking and mobility. The analysis on coordinated distributed scheduling (CDS) in Mesh mode shows that Randomized control bandwidth allocation algorithm of CDS can't guarantee QoS requirement. In order to...
RFID (Radio Frequency Identification) technology can identify an object and get its information conveniently and automatically via radio waves, but it causes security and privacy problems for its exchange information without contact and without notifying the tag owner. In response to this situation, scholars propose many authentication protocols based on cryptographic techniques. Random numbers play...
Botnet is one of the most serious threats to the security of the Internet nowadays. This paper introduces Botnet-based distributed denial of service (DDoS) attacks and the characteristics of botnet, research botnet detection and control technologies, summarized the botnet trends.
The proliferation of large-scale P2P VoD overlays has created the demands to characterize and to understand the emergent properties of P2P VoD applications. In this paper, we investigate the P2P VoD overlay network by active measurements with the help of the developed software, VoDCrawler. Different from other existing work, our study focuses on the topology of the overlay networks. From the study,...
Although widely used in various applications, the current RFID (Radio Frequency Identification) systems lack efficiently enforcement of security and privacy. Furthermore, considering that the bearer of a RFID tag might be changed, the ownership transferring of the tags also becomes an issue. Some schemes have been suggested, but they are lack of participation of people. In this paper, we propose a...
The illumination variation problem is still an open question in face recognition in uncontrolled environment. To cope with this problem, many methods are proposed to strengthen illumination compensation and feature enhancement, among which quotient image based methods are reported to be a simple yet practical technique. Recently the SQI, MQI and DMQI are reported to obtain good results in illumination...
Delay Tolerant Networks (DTN) is a kind of sparse Ad Hoc networks in which no contemporaneous path exists between any two nodes most of the time. Multicasting in DTN is a desirable feature for applications where some form of group communication is in demand. In this paper, we propose a multicast protocol for DTN: ECAM (Epidemic-based Controlled Flooding and Adaptive Multicast for Delay Tolerant Networks)...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.