The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Nowadays, people rely heavily on local or cloud storage to store their data digitally. To ensure data safety, various data fault tolerance mechanisms have been widely studied and deployed to provide reliability. Data fault tolerance mechanisms incur additional cost to the storage system. Therefore, data of different importance should be stored on storage that provides different levels of fault tolerance...
Non-volatile memory (NVM) has widely participated in the evolution of the next-generation memory architecture by way of being the substitution of the main memory. To cope with the problem of asymmetric read/write speeds of NVM, several excellent researches have been proposed to reduce the number of writes to the NVM-based main memory. Nevertheless, most of these existing approaches do not take the...
With the generalization of information and communication technology, instant messaging (IM) has emerged as a tool for synchronous and asynchronous communication in recent years. Among all of the IM applications, Line and Skype are the most frequent used in corporate internal communication. As IM has become one of the necessary means for communication upon workplace, its appearance is also gradually...
As smartphones are going universal, the quantity of downloaded applications is rocketing. How to classify applications by page has been the major concern facing users. However, most cellphone-related designs are at the service of young generations, ignoring middle-aged groups who use cellphones at increasingly higher frequencies. This study, through literature review, focused on three paging styles...
Social networks have become a vital mechanism to disseminate information to friends and colleagues. But the dynamic nature of information and user connectivity within these networks raised many new and challenging research problems. One of them is the query-related topic search in social networks. In this work, we investigate the important problem of the personalized influential topic search. There...
A Wireless Sensor Network (WSN) uses a larger number of low-power sensor nodes to gather environmental information which is then wirelessly forwarded to a base station. However, sensor nodes have very limited communication ranges. Thus, relay nodes are required to ensure reliable connectivity throughout the WSN. On the other hand, relay nodes are typically more sophisticated and expensive than sensor...
In this research, we consider the deficiencies of current e-collaboration design systems that are introduced to enterprises, and then concentrate on how to express the essential requirements for product design. The authors propose a systematic process model to support collaborative product development (CPD). The required multi-disciplinary information for CPD will be handled via the processes of classification,...
In this study, Nd2O3 was used as the dopant and the commercial Sr2SiO4:Nd phosphors was produced by using solid-state reaction method. The Sr2SiO4:Nd phosphors was sintered at the temperature range of 1000°C∼1300°C for 2 h. From the results of X-ray diffraction patterns, even sintered at 1000°C only Sr2SiO4 phase was observed, no secondary and unknown phases were residual in the calcined Sr2SiO4:Nd...
To protect privacy while using LBS, we propose a pattern-based cloaking system that incorporate a trusted privacy preserving server to compute the cloak region for each sensitive patterns. To prevent adversaries culling out some patterns with some simple clues, we define a pattern-safe-cloak (PSC) region as a rectangle area that contains at least other l−1 reasonable and dissimilar patterns. To facilitate...
Unlike a traditional network architecture, a software-defined networking architecture is divided into the control plane and the data plane. Network administrators use the centralized control plane to manage network authority and determine where network traffic is to be sent in the data plane. However, a centralized control structure causes a bottleneck with an overloading flow or under a DDoS attack...
Other than some driving assistant systems that can automatically avoid accidents, providing a driver with highly relevant and real-time traffic information is useful in attracting a driver's attention and striving more reaction time to possible dangers. In this paper, we propose an intelligent traffic information extraction system that explores a vehicle's trajectories to discover its driver's movement...
Social network generation is an important problem in social network analysis. The goal is to produce artificial networks that preserve some real world properties of social networks. As one of most popular social network generation algorithms, the Barabási -- Albert (BA) model is a method that can generate random social networks with power-law degree distribution. This paper discusses the situation...
Graph mining is a popular technique for discovering the hidden structures or important instances in a graph, but the computational efficiency is usually a cause for concern when dealing with large-scale graphs containing billions of entities. Cloud computing is widely regarded as a feasible solution to the problem. In this work, we present an open source graph mining library called the MapReduce Graph...
Utility mining is proposed to consider additional measures, such as profits or costs according to user preference. In the past, a two-phase mining algorithm was proposed for fast discovering high utility itemsets from databases. In this paper, an incremental mining algorithm to efficiently update high utility itemsets is proposed for record insertion. Experimental results also show that the proposed...
In this paper, we use video watermarking on H.264 video compressed, to reach protect for video data. In recent years, H.264 is a new advanced video compressed standard. It provides high compression efficiency and compress quality, digital data is easy to be altered. One of the most important things is to prevent the data to be illegally used. We propose a method is compare many corresponding AC coefficient,...
Teaching Assistants (TAs) can play a major part in project education, being an extra pair of eyes and hands for the lecturer. TAs are usually senior students and by becoming a TA these students stop being part of the group of students. They become part of the staff and take on part of the responsibility for the learning and grading of fellow students. To make sure the TAs are prepared for these tasks,...
We asked students to answer a question about the probability of a sequence of events - a soccer team winning at least seven games in an eight-game season, given that the probability of winning each game is one half. While relatively few of the answers were totally correct, nearly all showed understanding of some of the aspects of combining event probabilities. Additionally, the answers illustrated...
The proposed scheme of this paper is embedding watermark into intra frame (I-frame). The most challenge of watermark that embedded into intra frame is the selection of intra prediction might be changed. In the research, different AC coefficient gets different effect when the selection of intra prediction was changed in another compression course. Therefore, it's necessary that finding what AC coefficients...
There are several algorithms proposed for maintaining the sequential patterns as records are inserted. In addition to record insertion, the pattern maintenance for record modification is also very important in the real-applications. In the past, we have proposed the fast updated sequential pattern tree (called FUSP tree) structure for handling record insertion. In this paper, we attempt to handle...
In this paper, we proposed an intelligent visual surveillance in specific sea-area based on video processing. We apply the technology of computer vision and video processing to implement the automatic system. At the first, we separate background and foreground in videos, and set a weight to update the new background. To extract the moving ships in videos, we apply the techniques including the change...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.