The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents three deep-towed vehicles including the Abyss Twisted-pair Imaging System (ATIS), the Fiber-optical Instrumentation Towed System (FITS), and the Video-guided multi-corer (V-Corer), which were developed under the National Energy Program (NEP) of Taiwan from 2013 to 2016. Both of the vehicles ATIS and FITS were designed mainly for seafloor imaging but with different power and communication...
Crowdsourced mobile network access (CMNA), in which mobile users can share their Internet access with others, is a promising paradigm for addressing users' increasing needs for ubiquitous connectivity and alleviating cellular network congestion. In this paper, we study the operator-assisted CMNA model, in which a mobile virtual network operator (MVNO) incentivizes its subscribers to operate as mobile...
Smartphone theft is a non-negligible problem that causes serious concerns on personal property, privacy, and public security. The existing solutions to this problem either provide only functions like retrieving a phone, or require dedicated hardware to detect thefts. How to protect smartphones from being stolen at all times is still an open problem. In this paper, we propose iGuard, a real-time anti-theft...
The proliferation of loT applications drives the need of ubiquitous connections among heterogeneous wireless devices. Cross-Technology Communication (CTC) is a significant technique to directly exchange information among heterogeneous devices that follow different standards. By exploiting a side-channel like frequency, amplitude or temporal modulation, the existing works enable CTC but have limited...
Limited power budget is becoming one of the most crucial challenges in developing supercomputer systems. Hardware overprovisioning which installs a larger number of nodes beyond the limitations of the power constraint is an attractive way to design next generation supercomputers. In air cooled HPC centers, about half of the total power is consumed by cooling facilities. Reducing cooling power and...
This paper introduces an automatic categorical-marking model for text categorization. Traditional classification algorithms are generally applying labeled training set and call for a lot of manual work to tag classifications beforehand. Also due to the ambiguity and fuzziness of texts, the results of traditional text categorization algorithms may not be clear enough and abundant in content. This paper...
The ATIS (Abyss Twisted-pair Imaging System) and FITS (Fiber-optical Instrumentation Towed System) were developed for real-time observing on the sea floor around the gas hydrate seeps, while the V-corer (Video-guided multi-corer) was for effective sediment collection. Considering that the CTD (Conductivity, Temperature, and Depth) winch is a standard equipment on most of the research vessels, the...
In this paper, we aim to model the formation of interest-driven data dissemination in online social networks (OSNs). We focus on a usual type of interest-driven social sessions in OSNs, called Social-InterestCast, under which a user will autonomously determine whether to view the content from his followees depending on his interest. To figure out the formation mechanism of such a Social-InterestCast,...
Providing personalized content on smartphones is significant in ensuring user experience and making mobile applications profitable. The existing approaches mostly ignore the rich personalized information from user interaction with smartphones. In this paper, we address the issue of recommending personalized music to smartphone users and propose Smart-DJ. Smart-DJ incorporates an evolutionary model...
RFID systems nowadays are operated at large-scale in terms of both occupied space and tag quantity. One may have prior knowledge of the complete set of tags (denoted by N) and any set of wanted tags (denoted by M) within the complete set, i.e., M ⊆ N. Then here comes an open problem: when one is particularly interested in a subarea of the system, how to collect information (not simply tagIDs) from...
Operating in unlicensed ISM bands, ZigBee devices often yield poor throughput and packet reception ratio due to the interference from ever increasing wireless devices in 2.4 GHz band. Although there have been many efforts made for interference avoidance, they come at the cost of miscellaneous overhead, which oppositely hurts channel utilization. Our empirical results show that, a specific interference...
A new simple maskless fabrication method based on room temperature Bosh process was developed to fabricate silicon nanoforest. After being coated with a layer of Au, the Au-coated silicon nanoforest was converted into a surface-enhanced Raman spectroscopy (SERS) substrate. To further enhance SERS signals, the Au-coated silicon nanoforest was grafted with silver-plate nanoparticles (AgNPs). The SERS...
Modern on-chip networks (NoCs) rely on virtual channel (VC) flow control to allow effective utilization of link bandwidth at the cost of more power and longer per-hop latency. Despite many existing optimization techniques for NoCs under VC flow control, we take a further step on questioning its necessity. Our finding is, when the network is not busy, circuit-switching (CS) may already satisfy the...
The previous numerical matching method can't apply in the whole angle space (0° ≪ β0 ≪ 90°) whether only based on the normal incidence case nor based on grazing to the edge incidence case when solving the diffraction problem of the anisotropic impedance wedge at oblique incidence by plane wave. A revised numerical matching method (NMM) based on the framework of the uniform geometrical theory of diffraction(UTD)...
Based on spectral domain method (SDM), an asymptotic approach to the investigation of the reflection of electromagnetic waves from a metal plane interface separating a vacuum half-space and a anisotropic plasmas layer is presented. Firstly, the spectral formulas of type I and type II waves existing in the plasmas are deduced. Then the boundary conditions at the top and bottom interfaces of the plasmas...
This paper presents a position correcting method concerning the existing problem in the forward approach to establish component-level parametric scattering center models for known complex radar targets. The forward approach decomposes the target-model of radar into some parts and then extracts the scattering centers and their parameters through radar simulation. In the actual utilization of the forward...
Human target detection and tracking have great potential in military, safety, security and entertainment applications. In this paper, a complete processing procedure is proposed for human tracking in foliage-penetration environment by multistatic radar. It consists of five main steps, including clutter suppression, target detection, measurement estimation, target localization and target tracking....
Offloading network traffic from cellular to WiFi is widely used to reduce energy consumption since WiFi is assumed to have lower power consumption than cellular. However, we find that WiFi link quality may vary significantly under user mobility. Consequently, the energy efficiency of WiFi varies and sometimes becomes even worse than that of cellular. Therefore, widely used WiFi offloading may not...
It is a challenge to detect and identify the targets in the foliage-penetration environment. Radar is superior to other sensors in this poor visibility condition. The micro-Doppler signature is one of the most prominent information for target classification and identification in radar applications. In this paper, a complete procedure is proposed for human micro-Doppler signature extraction in the...
Mobile crowdsourcing is deemed as a powerful technique to solve traditional problems. But the crowdsourced data from smartphones are generally with low quality, which induce crucial challenges and hurt the applicability of crowdsourcing applications. This paper presents our study to address such challenges in a concrete application, namely floorplan generation. In order to utilize pedestrians' traces...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.