The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we propose the new torus network which has the hypercube Q3 as the basic module. The proposed Hyper-torus has the degree 4, and is the network which has the node and edge symmetric, scalability, and the fine diameter. If we compare the class of the torus in the viewpoint of network cost, the Hyper-torus with 1.4radicN is proved to be approximately 65% than the torus with 4radicN and...
We propose a modified high density bipolar 3-zeros (HDB3) line coding for a visible light communication (VLC) system. Modified HDB3 line coding is defined as follows. First, we apply half bit transition to HDB3. Second, we decode encoded bits using difference of bit transition level in one bit duration. As a result, we obtain advantages about synchronization problem and noise effect mitigation at...
One of the most significant changes from Korean mobile telecommunication market in 2008 may be the USIM-lock lifting. The unlocking USIM was expected to bring significant changes in the telecommunication market. Against expectation, there is no considerable change and no successful brand-new mobile services in the market. The major cause lead to the present situation is a lack of compatible services...
In this paper, we investigate the use of cooperative communications for reliable data dissemination in wireless sensor networks. We first identify the disadvantages of some existing cooperative schemes. While the previously proposed ldquomulti-hop mesh cooperative transmission structurerdquo addresses these disadvantages, it suffers from large end-to-end delays during data disseminations due to its...
During the last years value engineering has become a usable method for assessing, developing and improving high value products. It has also been used as a basis for assessing and improving value in software processes. In complex and highly competed markets information of assessed and planned value might not always be enough, because development of high value products contains also several risks. These...
This paper addresses to the issues to be solved when the services like Second Life or OpenSim are used in the enterprise network environment and proposes the solutions for these issues. Especially this paper describes the Cache Server and the White List Filtering system based on the Information Server for the Second Life and OpenSim.
In many remote user authentication schemes, there was no scheme to resist the power analysis attack. As far as we know, this is the first remote user authentication scheme which considers power analysis attack. In this paper, we propose a new efficient and secure remote authentication scheme. Compared with other smart card-based schemes, our scheme has more merits as follows: 1) the system does not...
This paper examines the call set-up delay (CSD), a performance parameter that may be used in specifying, measuring, and comparing the speed of call set-up processing in networks that employ the session initiation protocol (SIP), in establishing and terminating media sessions (calls) between users. One of the most important standardized technologies that use SIP in this way is the IP multimedia subsystem...
IP multimedia subsystem (IMS) is a set of core network functional entities for provision of IP multimedia services. IMS supports peer-to-peer communication model based on fixed and mobile networks. As multi-mode terminal with multiple interfaces emerges, IMS begins to develop session continuity between interfaces in the same device or devices controlled by the same user. However current session transfer...
Decoding attacks are subjected to McEliece code-based public key cryptosystems. Nowadays, complexity of order 280 is considered to be immune. However, the original McEliece cryptosystem has work factor of order 264 against this kind of attacks. There aren't any immune methods to avoid this kind of attacks except increasing code parameters, whereas, this modifications make McEliece cryptosystem impractical...
This paper suggests a system providing a personalized yellow page service for IPTV end-users to create an interesting partnership in the business directory market. The personalized yellow page service system enables server to provide a personalized yellow page service based on each end-user's profile. The important components of the system are client agent for exchanging user interest information...
Localization algorithms are required for indoor wireless sensor network (WSN) applications because the identification of real positions can upgrade the importance of sensing information. In this paper, we introduce a efficient algorithm which can improve the accuracy of location identification by employing jumper setting at each sensor. The proposed algorithm perform localization more accurately than...
Recently, as technologies for obtaining locational awareness and wireless telecommunications develop, technologies and services involving Telematics have been growing rapidly. However, the services are currently available on certain terminals specifically selected by the telematics service provider (TSP). This means in order to access services provided by other TSPs, it is necessary to have the terminal...
Multi-media voice service will became one of main BcN services in near future. Operator's QoS policy, function of interworking gateway and BcN exchange point, specification, architecture, and detail service scenario for QoS assurance of multi-media voice service among BcN operators are suggested, along with class of service for QoS and specifications. Especially, service scenarios are classified with...
This research paper is a product of discussion about measuring reusability of software components, pieces of reusable software, in a system called component grid. This research paper consists of four parts. First, three different cases of component reuse are explained. Second, elements that should be considered to measure reusability in component grid are discussed. Third, component reusability metrics...
In this research, we focused on the problem of context switching [2,4] and recording overhead [2,4,5] faced by the users while recording time log for the personal software process (PSP). Even the existing solution to these problems i.e. using sensors to automatically collect activity time, cannot record all the activities performed by the user. Our approach address these problems from different prospective...
In this paper, we investigate the performance of rateless erasure resilient codes for distributed file storage in P2P networks. While the key distinctive feature of the proposed codes is the scalability to an arbitrary number of peers in the P2P network, it will be shown that the proposed rateless erasure resilient codes also offer great improvement in increase in bandwidth and reliability of data...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.