The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A wireless sensor network consists of many sensors that collect and transmit physical or environmental conditions at different locations to a server continuously. Many researches mainly focus on processing continuous queries on real-time data stream. However, they do not concern the problem of storing the historical data, which is mandatory to the historical queries. In this paper, we propose a system...
Dynamics of wireless sensor networks (WSN) make security one of the top issues we should pay attention to. WSN's can be deployed in hostile environments where their nodes are easy to be captured or re-programmed for deleterious use by an adversary. Therefore, it is necessary to protect communications between sensor nodes through cryptographic methods. To address this, symmetric key management in wireless...
Standard wireless sensor networks models emphasize energy efficiency and distributed decisionmaking by considering unattended sensors. Wireless sensor networks are confronted with the challenges of performance and energy consumption. To prolong the lifetime of the sensor networks, a game theoretic energy balance routing (GTEBR) algorithm is proposed. This algorithm aims at the balanceable energy consumption...
In ubiquitous computing environments, smart home system is the one of major applications that offers appropriate service reacting user's specific activity intelligently. Therefore, in contrast to a traditional system, the intelligent service device in smart home system needs various user data and the information about the environment. However, it is difficult for the device to obtain the information...
Software test-data generation research primarily focuses on using control flow graphs for producing an optimum set of test cases. This paper proposes the integration of a data flow graph module with an existing testing framework and the utilisation of a specially designed genetic algorithm for automatically generating test cases based on data flow coverage criteria. The enhanced framework aims to...
Internet voting protocols is the base of the Internet voting systems. In this paper an Internet voting protocol applied designated verifier proof and proof of knowledge of two ciphertexts of the same plaintext is introduced. The proposed Internet voting protocol has the properties of universal verifiability, receipt-free and coercion-resistant and don't use the strong physical constraints. We only...
An unsupervised fuzzy clustering technique, fuzzy c-means (FCM) clustering algorithm has been widely used in image segmentation. However, the conventional FCM algorithm must be estimated by expertise users to determine the cluster numbers. To overcome the limitation of FCM algorithm, an automated fuzzy c-mean (AFCM) algorithm is presented in this paper. The proposed algorithm initiates the first two...
Injection attack is a technique to inject codes into a computer program or system by taking advantage of the unchecked assumptions the system makes about its inputs. The purpose of the injected code is typically to bypass or modify the originally intended functionality of the program. It is popular in system hacking or cracking to gain information, privilege escalation or unauthorized access to a...
Skew detection acts as an important role in document image analysis systems. Many methods have been designed for text-dominant document images, but they usually fail in handling formula-dominant images. Hough transform is an effective method to estimate the skew angle of formulas with fraction bars, but cannot dealing with formulas without fraction bars. This paper presents a skew angle detection...
This paper discusses the document classification problems in text mining from the viewpoint of asymptotic statistical analysis. By formulation of statistical hypotheses test which is specified as a problem of text mining, some interesting properties can be visualized. In the problem of text mining, the several heuristics are applied to practical analysis because of its experimental effectiveness in...
Existing methods for color image segmentation using diffusion can't preserve contour information and noises with high gradients become more salient as the number of times of the diffusion increases, resulting in over-segmentation when applied to watershed. This paper proposes a new method for color image segmentation by applying morphological operations together with nonlinear diffusion. Morphological...
There is a great demand to support high resolution local video conference in today's PCs. However, although PC is convenient and local access network bandwidth is sufficient, the computational capacity is a big bottleneck in high resolution laptop video conference system. Here, a feedback-based adaptive video coding algorithm named Template-Based Coding Algorithm (TBCA) is proposed for such a situation...
Providing video on demand (VoD) service over the Internet is a challenging problem. In this paper, we present a novel Kademlia P2P network-based VoD streaming scheme: KadStreaming. In this infrastructure, we emphasize on the main mechanism of node initiation, node joining, media publishing, media searching, node departure. Based on that, a developed prototype system of this scheme is given. As part...
As cellular network technologies continue to evolve, various network standards must coexist in most CDMA-based cellular networks. This means that mobile device users access mobile services over different network bandwidths according to the users' positions or the mobile devices' network access capabilities. Such differences of network bandwidths result in considerable differences in service response...
The purpose of this paper is to develop a mobile phone application for women's health monitoring and information management. This mobile phone application is targeted on FOMA900 series mobile phones released by NTT DoCoMo and known as i-appli. A wearable temperature logger device is used to measure body surface temperature during sleep automatically. Collected temperature data are transmitted to a...
Minimum variance distortionless response (MVDR) beamformer are known to degrade due to the effects of imprecise knowledge about the steering vector and finite sample size. The diagonal loading method is a simple and efficient method that improves the robustness of beamformers. However, determining an ideal diagonal loading factor (DLF) is not a trivial problem, one that still has not been adequately...
Web services may produce the effect change of the world. To describe web services faithfully, not only static information but also dynamic information such as state change should be represented. In this paper we propose service dynamic description logic (SDDL) to represent and model the dynamic aspect of web services. Three basic reasoning services are introduced in our formal framework to support...
Applications like weather forecasting and prediction, health-care monitoring, habitat monitoring, tsunami- warning systems, demand integration of wireless sensor networks (WSNs) with grids. The issues that need to be addressed are, providing suitable programming platform, seamless networking, data management, service/resource discovery etc. Objective of this work is to provide a programming model...
Throughout their public school education, Japanese students are socialized into cultural learning practices [1] that emphasize group-oriented tasks. Well-organized group work is paramount to successful EFL teaching in Japan. In this paper, we look at how Moodle an open-source learning management system, is used at a Japanese computer science university to organize both individual and group tasks....
In order to optimize the using of server resources which host different services such as Web services, this paper describes an adaptive and dynamic resource flowing scheme amongst VMs in a VM-based utility computing environment called ADVM (adaptive and dynamic virtual machine). In our scheme, VMs adjust their resources (CPU and memory) adaptively to share the physical resources efficiently. ADVM...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.