The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Over the last decades, information technology in the field of computer networks and Internet is improved rapidly. Hence, in order to achieve high efficiency of information systems in the dispersed environments, it is needed to provide dynamic and distributed applications. There are various kinds of information system architectures to deploy information systems such as Agent-Base Architecture, Enterprise...
Background: Agile Software development is becoming the most preferred approach for the process of software development. Since the traditional plan-based methods are rigorous and not flexible with changing requirements, some projects are postponed, go over budget, and are sometimes canceled or started from scratch. Questions remain on whether the traditional plan-based approaches will be replaced by...
Vehicle Make and Model classification is an important part of Intelligent Transportation System. In this work, we have proposed a method based on Linear Support vector machine to solve this problem. Scale Invariant Transform Feature (SIFT) algorithm is used in this work to extract and represent local interest points. Bag of words model is used to represent the local features as fixed length vector...
Applications like automatic safe lane change and adaptive forward collision avoidance are increasingly based on connected vehicles approach. At the heart of communications-based automotive safety applications lies the need for reliable position estimation. Augmenting GPS positioning by utilizing short-range wireless and other on-board sensors improve positioning accuracy. However, the introduction...
Rate region precisely measures the transmission ability of a network. Three graph processing techniques are presented: reduced graph, union reduced graph, and virtual node. Applying these techniques, an operable method to completely solve the calculation of rate regions for unicast routing networks is developed. The correctness of the method is proved theoretically and illustrated with an example...
Network intrusion detection is critical component of network management for security, quality of service and other purposes. These systems allow early detection of network intrusion and malicious activities; based on this detection, appropriate actions can be applied to manage these attacks. Several network intrusion detection systems are proposed and evaluated and many of them are currently in use...
Aiming at the inefficiency of polynomial time algorithm of linear network coding (NC) for multicast applications, the authors propose an improved algorithm which combines polynomial time algorithm with subtree decomposition. The algorithm is composed of five steps, including line graph transforming, subtree decomposition, static subtree set generating, assigning of global coding vector, and calculation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.