The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Network-on-Chip (NoC) architectures provide a good way of realizing efficient interconnections and largely alleviate the limitations of bus-based solutions. NoC has emerged as a solution to problems exhibited by the shared bus communication approach in System-On-Chip (SoC) implementations including lack of scalability, clock skew, lack of support for concurrent communication and power consumption...
In design of microwave wireless communication or optical communication systems, reliable and effective computational method is required to evaluate performance of devices such as for filtering, guiding, and dividing. Recently, photonic crystal (PC) or electromagnetic band gap (EBG) structure, which are composed of periodic profile of medium with high contrast for background, is intensively studied...
In recent years, the demand for a content-based 3D model retrieval system becomes an important issue. In this paper, the cylindrical projection descriptor (CPD) will be proposed for 3D model retrieval. To derive better retrieval results, the CPD will be combined with the radial distance descriptor (RDD). The experiments are conducted on the Princeton Shape Benchmark (PSB) database. Experiment results...
Recently, many studies exploit mobile sinks to construct large-scale databases for environmental observations or weather forecasting. Mobile sinks travel in the sensing area that sensors are deployed, collect data from each sensor, and uploads them to sensor databases. By using mobile sinks, we can reduce communication traffic and maintenance cost compared with those for wireless sensor networks (WSNs)...
In recent years, there are many research works on ad hoc networks. In the future, we will see many ad hoc network applications, which are very important for realizing ubiquitous environments. The topology of ad hoc networks may change. For this reason, the routing protocols play an important role for construction of ad hoc networks. In this paper, we propose a new zone based routing protocol, which...
Applying sensor network to emergency lifesaving systems called Triage to decide priority of transportation in disasters is an active area of research. It is necessary to keep collecting data by sensors fixed in injured people. Sensors selected as relay nodes consume battery in large quantity and are easy to be out of battery in collecting the data. In addition, sensors secede from the network because...
In recent years, Mobile Ad hoc Networks (MANETs) are continuing to attract the attention for their potential use in several fields. Mobility and the absence of any fixed infrastructure make MANETs very attractive for mobility and rescue operations and time-critical applications. In this paper, we present the implementation and analysis of our implemented MANET testbed considering the Optimized Link...
In this paper, we discuss Redundancy Allocation Problem (RAP) in network environments. By efficiently combining redundancy with extra defense mechanisms, we attempt to ensure the continuity of a network service, and enhance its survivability against malicious attackers that utilize accumulated experience. We construct an attack/defense scenario, in which an attacker and a defender compete against...
As the demand for mobile broadband services are growing, cellular networks are heading towards their fourth generation (4G). Long Term Evolution - Advanced (LTE-A) is emerging as a major candidate for 4G cellular networks. MIMO technology combined with OFDMA is a major technological change in 4G compared to their 3G counterparts. However various MIMO configurations and modulation/coding schemes(MCS)...
This paper proposes a sensing system for detecting the accident at a space between bed fences. The number of accidents of elderly people on the bed has increased rapidly. Especially, there are a lot of fatal accidents that relate to the bed fence. For instance, some elderly people choked to death because their necks were caught in a space between the bed fences. To prevent such accidents, the full...
This paper deals with a large-scale 3D non-linear magneto static analysis using the Hierarchical Domain Decomposition Method (HDDM). To improve the convergence of the interface problem of the HDDM and to reduce the computation time, the solution strategy of Finite Element Analysis (FEA) in sub domains is reexamined. Because our employed equation is singular, it has been solved by the iterative method...
An iterative domain decomposition method is introduced into magneto static problems, which is formulated by a mixed method with the Lagrange multiplier. By introducing the mixed formulation, a two-sub domain problem is equivalent to the conventional one-domain problem, and yields an interative domain decomposition method of magneto static problems. Moreover, the method has some relations with another...
This paper presents a library navigation system named LiNS, using a combination of Web, sensor and smart phone technologies. In addition to the function of an ordinary book search system, LiNS provides a library user with the function of finding the route from the current location point in the library to the point where the object the user needs is located. Furthermore, it offers the “See Also” function...
One of the most common problems of proxy blind signatures is the constant privilege abuse of the signers. In 2008, Liu et al. proposed a proxy signature scheme capable of revoking proxy privileges. In this method, the original signer can terminate the proxy privilege at any time without needing to go through a commonly trusted third party. However, this scheme is unable to provide untraceability,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.