The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Wireless Sensor Networks (WSN) environments are increasingly becoming intelligent with the rapid boost in the capabilities of sensor nodes. The Sun Small Programmable Object Technology (SPOT) platform offers a high-end sensing device in terms of processing, memory and battery configurations compared to other existing in the community. Within the scope of this paper, a health care use case is derived...
The femtocell networks that use Home eNodeB and existing networks as backhaul connectivity can fulfill the upcoming demand of high data rate for wireless communication system as well as can extend the coverage area. It is also of interest to minimize operational effort by introducing self-optimizing mechanisms, and the optimization of the Home eNodeB involved handover is an important goal of LTE-Advanced...
In this paper, we propose a novel approach for the optimal communication spanning tree (OCST) problem. Our algorithm is based on the Particle Swarm Optimization (PSO) technique and take account into node biased encoding (NBE) scheme to find nearly optimal solution. The new algorithm can achieve a result that is better than known heuristic algorithms do, as verified by a set of public benchmark problem...
In the unstructured P2P networks, the flooding resource search method may cause much communication overhead, and severely constrains the scalability of network. In order to overcome this disadvantage, a new search strategy named TTL-Search based on the local caching and the scope of searching requests is proposed in this paper. According to this strategy, the searching process is divided into two...
Error Concealment is a very useful method to improve the video quality. It aims at using the maximum received video data to recover the lost information of the picture at the decoder. Lagrange interpolation algorithm is the most effective interpolation for error concealment while it lost some detail information. Hermite interpolation algorithm considers the change rate of the motion vector as well...
In this paper, we apply data mining technology to Chinese stock market in order to research the trend of price, it aims to predict the future trend of the stock market and the fluctuation of price. This paper points out the shortage that exists in current traditional statistical analysis in the stock, then makes use of BP neural network algorithm to predict the stock market by establishing a three-tier...
In recent year, some popular P2P file-sharing systems have been identified to be polluted by the copyright Industry to control the unauthorized distribution of content. As one of the most common P2P pollution methods, the index poisoning controls the P2P file-sharing by inserting massive numbers of bogus records into the index of the P2P file-sharing system. In this paper, the index poisoning in the...
An open problem about tweakable blockcipher proposed by Liskov et al. is how to construct tweakable blockciphers without using pre-existing blockcipher. In this paper, on the basis of MISTY-Type transformation, we perform a systematic study of the open problem. We analyze the approach of including a tweak by XORing the tweak value into one place in the dataflow of the MISTY-Type structure. We mainly...
Application development security utilizes a list of threats that identify and organize application security classes of attack. The developed system is decomposed into relevant components and then each component is analyzed for threats. Data flow diagrams (DFDs) are typically used to graphically represent a system. In this paper we propose a flow-based model as an alternative methodology for identification...
In Medium and High Rate Wireless Sensor Networks (MHWSNs), a sensor node may gather different kinds of network traffic. To support quality of service (QoS) requirements for different kinds of network traffic, an effective and fare queuing and scheduling scheme is necessary. The paper present a queuing model to distinguish different network traffic based priority, and proposed a rate adjustment model...
This paper proposes the utilization of mobile agents to increase the performance in maintaining the consistency of web caches. Most popular browsers like Internet Explorer and Netscape are providing options to cache the frequently used web pages in the client sites itself in order to provide faster access to the clients and to reduce the network overhead due to the reduction in number of messages...
UCINET, Pajek, Networkx, iGraph, JUNG and statnet, are commonly used to perform analysis with complex network model. The scalability, and function coverage of these six software packages are assessed and compared. Some randomly generated datasets are used to evaluate the performance of these software packages with regard to input/output (I/O), basic graph algorithms, statistical metrics computation,...
Internet have become so indispensible in today's world. It is being used for varied purposes from using it as a source of information to use it for effective communication and sharing resources around the world. People today favor more for the communication oriented web portals like the chatting services and social networking portals. This has been evidently proved by the highly famous social networking...
Nowadays convergence of digital appliances meet both economic and practical demands of users. And current UI of the appliances not only provides interesting to users but also enhances convenience and accessibility. In this paper, we propose FRETEL (Face Recognition-Based Convergence Communicator with Internet Telephony) that is a new digital home appliance that satisfies these requirements properly...
We propose a new distributed alarm correlation and fault identification in computer networks. The managed network is divided into a disjoint management domains and each management domain is assigned a dedicated intelligent agent. The intelligent agent is responsible for collecting, analyzing, and correlating alarms emitted form emitted from its constituent entities in its domain. In the framework...
This paper proposes a new method which combines blind equalization and morphology based image-processing to identify MQAM signals in multipath environment. The advantage of our approach is that, by using image-processing, only 128??128 bits data is required to be stored. Furthermore, even the eye diagram of equalized signal for 64QAM is not opened enough, it can still be used to classify. Computer...
In this study researcher tried to improve relation between citizens and government by presenting a new model based on Service Oriented Architecture (SOA). With utilizing the presented model in government body on one hand governments will have the ability to minimize citizens' dissatisfaction and on the other hand it can encourage citizens to participate in controlling government body such as governments'...
Recent advances in wireless communications and electronics have promoted the development of wireless sensor networks (WSN) for a wide variety of applications. The size and power constraints of sensor nodes are the main concerns in the design of robust and efficient routing protocols. Consequently, various approaches, such as data-centric approach, hierarchical approach and location-based approach,...
Reducing energy consumption is one of the key challenges in sensor networks. Lots of researches have tried to turn the nodes off when not needed to reduce energy consumption. In this paper, we propose a mechanism which dynamically turns on/off different components of the node to conserve energy while maintaining required performance. We model power management problem in a sensor node as an average...
For the virus signature matching time of traditional the eigenvalue is too long, which can't meet the need of the information security, a method of fast virus signature matching on the GPU is compelled. The system uses the GPU as a fast filter to quickly identify possible virus signatures for thousands of data objects in parallel. The performance of their library suggests that the GPU is now a viable...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.