The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper examines the call set-up delay (CSD), a performance parameter that may be used in specifying, measuring, and comparing the speed of call set-up processing in networks that employ the session initiation protocol (SIP), in establishing and terminating media sessions (calls) between users. One of the most important standardized technologies that use SIP in this way is the IP multimedia subsystem...
Localization algorithms are required for indoor wireless sensor network (WSN) applications because the identification of real positions can upgrade the importance of sensing information. In this paper, we introduce a efficient algorithm which can improve the accuracy of location identification by employing jumper setting at each sensor. The proposed algorithm perform localization more accurately than...
Received signal strength (RSS) has been attractive for localization in wireless sensor network (WSN) for simplicity and cost. It is one of the simplest methods for ranging. However, in wireless communication channel, especially in indoor communication, the received signal is much fluctuated by multipath fading and shadowing problem. These causes make RSS measurement incur more errors and consequentially...
In order to use Berlekamp-Massey algorithm to decode the (89, 45, 17) binary quadratic residue code, one needs to determine two primary unknown syndromes. In this paper, the authors give some syndrome matrices, so as to calculate one primary unknown syndrome efficiently. This results in a reduction of decoding complexity in terms of CPU time by 35% at least versus the decoder proposed by Truong et...
In this study, we conducted extensive reviews of online shopping literatures and proposed a hierarchy model of online shopping behavior. We collected 47 studies and classified them by variables used. Some critical points were found that research framework, methodology, and lack of cross-cultural comparison, etc So we developed a cross-cultural model of online shopping including shopping value, attitudes...
Scene detection is pretreatment to index video information in video search system, and it is very important technology for overall performance. Existing scene detection used single characteristic of pixel value difference, histogram difference, etc or mixed single characteristics. However, accuracy of those is poor for specific video such as infrared camera, night shooting. This paper is proposed...
The authors have researched a support system of the reminiscence and life review activity. In this life review therapy, it is important to review the sessions after the activity for an effective therapy. Moreover a record of the activities is made the best use for making progress of technique on progressing the sessions and bringing up young or new therapists on training. In this paper, we describe...
The recent rapid increase in the number of HSDPA subscribers in Korea is likely the result of the providers' vibrant marketing activity (such as the handset subsidy)- a facilitating condition which has had more influence on HSDPA adoption than the unique fact that the 3G service provides video telephony, unlike the existing mobile telecommunication wireless high-speed Internet. Few studies, however,...
In this paper, a modified decoding method is proposed for the binary quadratic residue (QR) codes. The key ideal behind the proposed method is to apply the properties of remainder decoding and the modified Gao's algorithm. In the decoding method, the main features are efficient to compute syndromes and determine the error-locator polynomial. And the modified Gao's algorithm is also developed in our...
Passive RFID tags, which have no self-battery and just backscatter the energy from a reader, share a common channel. It causes a tag-to-tag collision problem when at least two or more tags communicate to the reader simultaneously. The dynamic frame slotted Aloha (DFS-Aloha) protocol is one of the well-known anti-collision algorithms to solve this problem. To maximize the system performance and enhance...
Currently existing digital rights management systems employ appropriate methods for protecting contents. But these have high complexity and are too heavy to use in private broadcasting. This is not appropriate in IPTV system that will popularize the private broadcasting or UCC (user created contents). In this paper, we introduce a private broadcasting system based on P2P that prevents the illegal...
Interleaved Source Coding (ISC) is one of the error resilient coding methods for predictive video coded frames transmitted over a single erasure channel. ISC has shown to significantly improve the overall quality of predictive coded video stream over a lossy channel. In this paper, ISC is evaluated over memoryless Binary Erasure Channel (ISC-BEC). Simulations have shown the superiority of ISC over...
There has been steady effort to modelize or recognize human action in fields of computer visions or mechanical learning, which should lead to fruitful results. This study presents how to extract key postures that can explain human actions within video sequence. To detect key postures that can differentiate human actions significantly, we select key posture candidates using information entropy which...
In this paper, we explore the operations of probing environment sensor networks and force to define some mathematical models to describe the operations. By these models, a probing radius adjusting mechanism ldquoPRAMrdquo has been provided to control the trade-off between energy efficiency, network scalability and sensing rate. PRAM can estimate the desirable probing range to minimize the energy consumption...
The emerging self-service technologies (SSTs) make people's daily life become more and more convenient. The users' attitude toward and requirements about the SST also become diversified due to its widely applicable domains. This research aims to establish a model for investigating the factors that will affect the adoption of SST by consumers of convenience stores. Based on the technology acceptance...
In wireless sensor networks (WSNs), boolean sensing model are popularly adopted for coverage analysis since analytical and asymptotic analysis carried with this model are simple and tractable. As the boolean sensing model assumes, however, it is unlikely that sensing capability of sensor drop abruptly from perfect detection capability to zero. Hence, sensing capability characterization in such boolean...
Traffic replay tools that generate traffic in order to recreate real traffic scenarios play an important role in network operation. Nowadays, the Internet backbone links are increasing in capacity as well as in transmission speed making trace-based replay difficult. This paper proposes a novel approach to high-speed backbone traffic replaying. We bring out an original granular split of traffic that...
Special techniques are used in the ground stations in order to track the LEO satellites. Each of these techniques has its own advantages and disadvantages which are used depending on the relative conditions. One of the most well-known of these techniques is monopulse. The feed of the monopulse tracking technique, used in ground stations, has different structures. The most popular of these feeds have...
In this paper, the iteration localization algorithm that NLOS signal is iteratively removed to get the exact location in the wireless sensor network is proposed. To evaluate the performance of the proposed algorithm, TDOA location estimation method is used, and readers are located on every 150 m intervals with rectangular shape in 300 m times 300 m searching field. In that searching field, the error...
The LEO satellites rotate around the earth rapidly. Therefore auto-tracking techniques used in ground station, must have high accuracy for telemetry, tracking and commanding (TT&C) and data acquisition-services. One of the most important of these techniques is conical, because of its low technical complexity and implementation costs and acceptable estimation accuracy, compared to monopulse technique...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.