The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Interleaving, an important technique in digital wireless communications systems, is commonly used to improve robustness against burst errors because it provides a form of time diversity. The unitive mathematical model of the convolutional interleaver was presented for the first time and the blind estimation of convolutional interleaving parameters has been investigated using the linearity of the linear...
Radar Signal Sorting is always a problem of radar countermeasure. In this paper, shifting grids technique is applied to signal sorting. The current grid clustering algorithm, used for radar signal sorting, has some problems such as data input reliance and low clustering precision. So a new signal sorting algorithm based on shifting grids technique is proposed. The algorithm can discover arbitrary...
Biogeography-Based Optimization (BBO) is a recently developed global optimization algorithm and has shown its ability to solve complex optimization problem. In order to speed the optimization process and get better results, an improved opposition-based biogeography optimization (IOBBO) method is proposed. By dividing the range of values into several areas, the proposed method produce more evenly distributed...
This paper presents a study on the problem of designing non-fragile H∞ filters with sparse structure for linear discrete-time systems. The filters to be designed with sparse structure are assumed to be with additive gain variations, which are resulted from filters implementations. Firstly, a class of sparse structures based on the observable standard form is specified from a given fully parameterized...
Steganography is the technique to hide secret data in certain media, digital image for example, without leaving any obvious evidence. As a branch of steganography, HVS feature for years has been one of the issues researchers focus on. In this paper, we introduce an improved adaptive steganography algorithm-SVBA algorithm, which fully analyzes the area statistical properties and adopts HVS features...
Stepping stone attacks are often used by network intruders to hide their identities. To detect and block stepping stone attacks, a stepping stone detection scheme should be able to correctly identify a stepping-stone in a very short time and in real-time. However, the majority of past research has failed to indicate how long or how many packets it takes for the monitor to detect a stepping stone....
Species Mutation technique, inspired from reliability design, is combined with a species conserving genetic algorithm (SCGA) to solve multimodal optimization problems. In reliability design, in order to improve system reliability and safety requirements, a redundancy component is added to a most efficient subsystem, in which the ratio of the increase of reliability to the increase of resources is...
Stepping stone attacks are often used by network intruders to hide their identities. The Round Trip Times (RTT) between the send packets and corresponding echo packets for the connection chains of stepping stones are critical for detecting such attacks. In this paper, we propose a novel real-time RTT getting algorithm for stepping stones which is based on the estimation of the current RTT value. Our...
It is obvious that internet has become a key media to share resources and exchange information. As a special category of social activities, the behavior from network users normally shows its complexity and diversity, which makes people pay an increased attention to study and manage it. Based upon the formation mechanism of ant colony, this paper proposes an ant colony algorithm to do cluster analysis...
The species conservation technique is a relatively new approach to finding multiple solutions of a multimodal optimization problem. When adopting such a technique, a species is defined as a group of individuals in a population that have similar characteristics and are dominated by the best individual, called the species seed. Species conservation techniques are used to identify species within a population...
The paper presents a novel Three-tier Parallel Simulated Annealing algorithm with Memory function (TPSAM) based on multi-core computer with Threading Building Blocks (TBB). The purpose of a new memory function is not to trap into a local optimization. TPSAM is decomposed into three-tier: data decomposition parallelism, task processing parallelism and data composition parallelism and it can improve...
Cellular networks are often modelled as different regular grids and the channel assignment problem for interference avoidance is formulated as a coloring problem of the grid graph, where channels assigned to interfering stations at distance i must be at least δi apart, while the same channel can be reused in vertices whose distance is at least σ. In this paper, we consider the channel assignment problem...
The paper presents one novel algorithms: Parallel Floyd-Warshall algorithm(PF) based on multi-core computer with Threading Building Blocks (TBB). TBB offers a rich and complete approach to express parallelism in a C++ program. Serial Floyd-Warshall algorithm(SF) and PF are implemented and verified with TBB for the all-pairs shortest path problem. Experiments show that the efficiency of multi-threaded...
In this paper, an implementation of low-power, high-speed radix-2 DIT (decimation-in-time) FFT suitable for AAC/DRA audio decoding is presented. For low-power and high-speed considerations, two methods are adopted: adding cache to ROM (ROM-cache) and proposing a new butterfly (AI-Butterfly). Simulations in Matlab have verified the correctness of this implementation. The comparisons between the proposed...
In this paper, a compact hardware accelerator structure for realizing fast inverse modified discrete cosine transform (IMDCT) computation is proposed. The proposed structure stemmed from our previously presented type-IV discrete cosine transform/type-IV discrete sine transform (DCTIV/DST-IV) decomposition algorithm. After transformation of DST-IV to DCT-IV, the DCT-IV/DCT-IV implementation structure...
In this paper we study a reliable downloading algorithm for BitTorrent-like systems, and attest it in mathematics. BitTorrent-like systems have become immensely popular peer-to-peer file distribution tools in the Internet in recent years. We analyze them in theory and point out some of their limitations especially in reliability, and propose an algorithm to resolve these problems by using the redundant...
The classical union-find algorithm is the basis for many graph algorithms and for dealing with equality. The easiest way to implement concurrent objects is by means of classical software solutions, but this leads to blocking when the process that holds exclusive access to the object is delayed or stops functioning. Thus we require our solutions to the data structure problem have the lock-free property...
Along with the development of Internet/Intranet application, more and more sensitive data is transmitted through the network. In order to prevent the critical data from being divulged and guarantee the security of information, we should pay more attention to the surveillance of network traffic. With this motivation, we present an efficient TCP flow reassembling algorithm which is the key of dataflow...
For the superiority of good uniqueness, stability and being easily collected, fingerprint has become one of the most widely used biological characteristics. The algorithm of fingerprints identification is generally divided into three parts: image pretreatment, feature point extraction and matching. This paper analyses and improves the most widely used matching algorithm - the shortest distance point...
Communication network has been shown as a key factor to influence system performance even under the same coordination algorithm. Although many distributed algorithm designs have been proved to be feasible to make up some functions in the large scale networks as claimed, for example, recovering the network from link failure or node failure, the efficiency of recovery in different network topologies...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.