The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The maintenance period, the time frame begging from the registration to the expiration of a patent, is an important property used to evaluate the patent's quality. To predict the maintenance period of a patent, a consistent classifier is desirable. The output of a classifier is usually determined by the value of a discriminant function and a decision is made based on this output which does not necessarily...
Software reliability has always been a concern for both software producers and consumers. Because of their role in binary code generation, compilers have significant impact on software performance. Although many works have been conducted on compilers, little is done on their impact on software reliability. Thus, people often face a void of useful knowledge when deciding which compiler to use in developing...
In many business and scientific data warehouses, not only the data amount is growing in geometric series, but also the requirement of real-time capability is increasing. Database partitioning technique which adopts "divide and conquer" method can efficiently simplify the complexity of managing massive data and improve the performance of the system, especially the range partitioning. The...
In this paper, interference effect given from nongeostationary orbit link into geostationary orbit link is analyzed by BER performance. To analyze the interference effect with the angle between satellites, the angular separation is changed from 1° to 8°, and the number of the satellite is also changed from 1 to 4 for analyzing it. From the results, the interference effect into the geostationary orbit...
This paper proposes a computational lexical entry acquisition model based on a representation model of the mental lexicon. The proposed model acquires lexical entries from a raw corpus by unsupervised learning like human. The model is composed of full-form and morpheme acquisition modules. In the full-from acquisition module, core full-forms are automatically acquired according to the frequency and...
A critical issue in wireless sensor networks is an energy-efficiency since the sensor batteries have limited energy power and, in most cases, are not rechargeable. The most practical manner relate to this issue is to use a node wake-up scheduling protocol that some sensor nodes stay active to provide sensing service, while the others are inactive for conserving their energy. Especially, CTC (Connected...
The limited energy in wireless sensor network has always been a key topic. Most previous studies usually regulate the network loading by periodically directing the data flow to different sinks in order to extend the overall life-time of network and enhance the network availability or data delivery. However, the time and place that an event occurred can not be estimated, thus regular information flow...
The IEEE 802.16 standard is proposed to provide a wide-range broadband wireless service, but it leaves the implementation of the wireless resource scheduler as an open issue. We study the scheduling algorithm and propose a fairoriented two-level scheduling scheme for downlink traffic in a WiMAX network. A central controller (Base Station) has a number of users, and different mobile subscriber stations...
Information retrieval is the most popular database technology, which is focusing on data analysis, association rules, pattern discovery and so on. It is critical to find efficient ways of mining large data sets. In this paper we present a Personalized Travel Information System, called PTIS. PTIS can automatically link to the travel sites to collect information, and then create new data rules. According...
The purpose of this study is to investigate the impact of the activities for KM on the knowledge sharing through the social networking and digital networking. The research conducted a survey and analyzed the level of the social and digital networking, and identified the relationships with the factors of KM activities, and the knowledge sharing. As the results, the findings illustrate that the managers...
The IEEE 802.11 based wireless LAN (WLAN) is most widely used for the real time communication such as Voice over IP (VOIP) video conferencing and etc. As the wireless internet access is increasing day by day by the combination of different small regions which are served by one operator or one Access Terminal. So there is the problem of mobility that a Mobile Node (MN) may move from one network to...
A background model using image subtraction in an intelligent video surveillance system could make severe errors in detection and tracking of objects due to changes of natural phenomena such as shadows and wind. Adaptive background models have been proposed in order to solve these problems, but most previous methods can make a ghost and sometimes miss the left objects which have stopped moving for...
This paper shows approaches to accelerate pixel-level image fusion speed using graphics hardware. Recently, to improve visibility through maximization of information collected through development of various sensors and improvement of sensing technology, the importance of not only development of new fusion algorithm but speed of fusion process is increasing. Though specialized fusion boards for real...
ANoC (Asynchronous Network-on-Chip) has been developed to solve problems of large number of cores in SoC (System-on-Chip) by giving asynchronism to every core. This new architecture requires new Testing methods different from the existing SoC Test, and it freshly needs the test of router and routing networks. This paper first offers high-speed testing architecture that tests more than one routers...
In this paper, we propose a novel evolutionary computing method which is called quantum-inspired electromagnetism-like mechanism (QEM) to solve 0/1 knapsack problem. QEM is based on the electromagnetism theory and using the characteristic of quantum computing. It can rapidly and efficiently find out the optimal solution of combination optimization problem. We compare the conventional genetic algorithm...
This study suggests the method for measuring the BP (blood pressure) which it is one among the important vital sign of the human body with a cuffless and non-invasive. The monitoring of the BP is general to use the physical sensor which it directly contacts with the blood vessel in an operation, but this kind of a method can be impossible in the emergency requiring the rapid treatment. In a situation,...
Anonymous authentication is a method for privacy protection in web service. But, the nature of anonymous authentication, access control of service is seemed impossible because it doesn't know the user's characteristics. In our paper, we propose an anonymous authorization framework which uses qualification certificate and anonymous authentication based on Short Group Signatures. Also, our qualification...
Currently attackers are trying to paralyze servers and networks with various types of DDoS attacks. For example, on 7th July in 2009, a DDoS attack occurred against 48 web sites in South Korea and U.S.A. In this attack, the attack traffic pattern and the botnet construction methods are different from that of previous version. Due to the differences of the attack patterns, the 7.7 DDoS attack was not...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.