The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
An RFID-based holonic control scheme for production control systems is presented. This scheme enables each component of the products to be attached with an RFID tag and to be controlled and supplied autonomously by the FRID tag into product assembly facilities. Each RFID tag contains the control information, called "lifetime information," such as assembly facility and status information...
A hybrid middleware for RFID-based parking management system is presented in this paper. The publish-subscribe approach is combined with group communication in overlay networks in the design of event monitors and application service connectors to comprise the core of a hybrid middleware. In this paper, group communication relevant to P2P networks is the focus of middleware technology development....
Increasing the applicability of ubiquitous computing, minimizing energy consumption and hardware cost are mandatory in real world applications. In this paper we present our platform prototype for ubiquitous computing, which has been implemented based on commercial Bluetooth off-the-shelf components. It allows every object to be augmented with processing and communication capabilities in order to make...
rapidly, much attention has been paid on the use of spectrum resources. Recently, a new technology called Cognitive Radio (CR) was developed for using the unused spectrum band efficiently. In the CR systems, one possible approach is to allocate the unused spectrum band to the usage spectrum band provided by spectrum sensing technique. In this paper, we propose a new spectral correlation based signal...
It is generally accepted that sequential procedures for stochastic discrete-event simulation of communication networks are the only practical approach for controlling statistical errors of the final simulation results. A commonly used stopping rule is based on the relative statistical error, since the magnitudes of the point estimates do not need to be known beforehand. The relative statistical error...
Particle swarm optimization (PSO) has gained increasing attention in tackling optimization problems. Its further superiority when hybridized with other techniques is also shown. In this paper a novel hybrid particle swarm optimization (NHPSO) is proposed in order to solve high dimensional optimization problems more efficiently, accurately and reliably. It provides a new architecture of hybrid algorithms,...
DDoS(distributed denial of service) attack is a critical threat to current Internet. Recently too many technologies of the detection and prevention have developed, but it is difficult that the IDS distinguishes normal traffic from the DDoS attack. Therefore, when the DDoS attack is detected by IDS, the firewall just discards all over-bounded traffic for a victim of absolutely decreases the threshold...
This paper presents a transform-based watermarking scheme based on human visual system. Human visual parameter (HVP) such as sensitivity of contrast (SoC), texture degree, entropy, and standard deviation are useful to ensure the imperceptivility of watermark image. In this approach, we involved these HVP to select the optimal coefficients region in which watermark will be embedded. Several experiments...
Video conferencing systems have been widely used all over the word and bring much convenience to our daily life. With the increase of network capability, users of video conference desire upgrade of video quality more and more intensively. However, the extensibility for large-scale standard-definition video conference is seriously restricted by the ability of decoding multi-path standard-definition...
In this paper, a SMARbot is designed to be a highly modular, adaptable, inexpensive miniature mobile robot paradigm which can be easily integrated into its ubiquitous computing environment. A generic multi-layer architecture of the SMARbot is proposed, where both hardware and software are reconfigurable, expendable with low-power and low-cost. Some preliminary experimental results are presented, including...
Pervasive computing calls for applications which are often composed from independent and distributed components using facilities from the environment. This paradigm has evolved into task based computing where the application composition relies on explicit user task descriptions. The composition of applications has to be performed at run-time as the environment is dynamic and heterogeneous due to e...
In this paper we discuss the necessity and implementation technique of machine cognition and learning of mathematics expression transformation in the educational software. We give two pattern-recognition algorithms for machine learning of expression transformation, and propose a human-machine dialogue method for machine learning of higher-level knowledge. The prototype implementation shows that the...
The nature of the concepts regarding images in many domains are imprecise, and the interpretation of finding similar images is also ambiguous and subjective on the level of human perception. To solve these problems, in this paper, images' semantic categories and the tolerance degree between them are defined systematically, and the approach of modeling tolerance relations between the semantic classes...
Nowadays, embedded systems can be found in a wide range of pervasive devices (e.g., smart phones, PDAs, or video/digital cameras). These devices contain large cache memories, whose power consumption can reach about 50% of the total spent energy, from which leakage energy is the predominant fraction in current technologies. This paper proposes a technique to reduce leakage energy consumption in data...
Location systems are core technologies for enabling pervasive computing smart spaces. Signal strength based location estimation offers economical viability and sufficient accuracy for numerous location based services. Despite extensive research being carried out in this positioning method, tedious and lengthy development life cycle prohibits wide scale deployment of these systems. We present a new...
With recent advances in electronic design files, Computer Aided Design (CAD) has become a common place to store the design knowledge. Therefore, it is critical to secure the CAD files so that such valuable intellectual property is not available to competitors by internal users. Because most CAD drawings are composed of a collection of files with various extensions, there exist problems associated...
To offer the best possible care for their patients, family physicians need coordinated data obtained from the physicians own patient database, from other physicians database, pharmacies, and drug reference databases. P2P-based sharing systems have been actively researched to enable resource sharing between multiple heterogeneous healthcare enterprises. Unfortunately, P2P system introduces a whole...
Expert systems for healthcare services are widely studied where accuracy of diagnosis and efficiency of the system for various services are examined. Also, recent researches include decision support services, expert medical services and autonomous management, which are based on multi-agent systems. The cooperation of the agents is crucial in analyzing, and managing the data of patient to detect abnormal...
vices to provide seamless user experience in diversified situations. However, while many research activities have addressed the im- portance of adaptation, proposed scenarios have mainly focused on user's stationary situations and not on continuously moving state. In this paper, we scoped the user interface adaptation for walking users and proposed an approach to keep the viewability of displayed...
Recently, botnet becomes a social problem due to the expansion of bot infection. Ideally, all the vulnerable computers should be fortified to counteract laying malware. Accordingly, it is important to implement an information system which detects bot-infected computers and alerts them. In this paper, we focused on bots using IRC to communicate, and examined the behavior of such bots when they connected...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.