The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper a new watermark embedding and recovery technique is proposed based on the compressed sensing framework. Both the watermark and the host signal are assumed to be sparse, each in its own domain. In recovery, the L1-minimization is used to recover the watermark and the host signal perfectly in clean conditions. The proposed technique is tested on MP3 audio where the effects of MP3 compression/decompression,...
This paper implements a technique that enhances parallel execution of auto-generated OpenMP programs by considering architecture of on chip cache memory. It avoids false-sharing in 'for-loops' by generating OpenMP code for dynamically scheduling chunks by placing each coreâs data cache line size apart. An open-source parallelization tool called Par4All has been analyzed and its power has...
With the move toward mobile computing being the trend of this technology era it is clear that our way of life and how we deal with objects in it is changing. This swift shift from large desktop computers to inexpensive, low power applications that are easily carried in our pockets or placed next to a cup of coffee on the living room table clearly changed the way we interact with media and contact...
Welcome to CyberC 2012: the International Conference on Cyber-enabled Distributed Computing and Knowledge Discovery conference. The goal of CyberC is to provide a forum for presentation and discussion of innovative ideas, research results, applications, and experience for network-enabled distributed computing and knowledge discovery technologies. It focuses on all aspects of distributed computing...
CyberC 2012 showcases a technical program to promote research for cyber-oriented knowledge discovery that covers cyber-networks, data mining, cyber security, distributed computing, mobile computing, cognitive computing, cloud computing, computing tools, applications, and system performance. CyberC 2012 is co-sponsored by the University of Louisville, Beijing Jiaotong University, IEEE Computer Society,...
CyberC 2012 (The fourth International Conference on Cyber-enabled distributed computing and knowledge discovery) is an international conference technically co-sponsored by IEEE, IEEE Computer Society, IEEE Technical Committee on Simulation, and IEEE Task Force on Networked Mobile Systems. CybeC 2012 is co-operated by the University of Louisville and Beijing Jiaotong University, and is supported by...
The Internet of Things (IoT) has been considered as the third revolution in the digital technology after the computer and the Internet, and it brings significant advantages to smart grid. Disaster prediction and prevention of power-lines is one of the most difficult problems for electricity transmission companies. Advanced sensing and communication technologies of IoT can effectively avoid or reduce...
Simulation based decision tools have been playing a significant role in the flood mitigation operation, especially for a river network with a large number of flood control structures. However, to evaluate the feasibility of alternative scenarios, decision-makers must repeat executing a simulation, which is a tiresome and time-consuming work. Based upon the technique of simulation cloning, a parallel...
In this paper, the minimum phase space volume (MPSV) method is modified to identify an autoregressive (AR) system driven by a chaotic signal blindly. After modification, the estimation speed is much faster than before, which makes the MPSV method more suitable for engineering applications. The simulation results show that, when comparing with the original MPSV method, the proposed method can obtain...
In this paper, we propose a coarse-to-fine approach to discovery motion patterns. There are two phases in the proposed approach. In the first phase, the proposed median-based GMM achieves coarse clustering. Moreover, the number of clusters can be heuristically found by the proposed algorithm. In the second phase, to refine coarse clustering in the first phase, a Fisher optimal division method is proposed...
The new age of 4G technology is upon us which is about to reshape our lives. 4G offers us greater bandwidth, higher data rates, efficient spectrum use, and increased interoperability across the globe. It supports user friendly, innovative, and secure application environment. 4G systems are expected to become a platform capable of providing seamless integrating between the existing systems like GSM...
Recent threats caused by worms on mobile phones are recognized as one of the most serious security threats to heterogeneous networks. Some early work model assumes that worm propagation on mobile phone cannot infect Computer in the Internet, or vice versa. However, as the development of mobile phone and multiply approaches surfing online, such as 3G, Wi-Fi, itputs hybrid nodes (mobile phone and Computer)...
Data confidentiality is critical for communication, which is generally achieved only by data encryption. In this paper, we proposed a hybrid data hiding approach that uses the crypto-steganography method for Uyghur script. This approach first hides the decimal values of the message letters upon the encryption with a secret key table. The decimal values are subsequently converted into the bit-groups...
In this paper, we investigate the simulation time and wall clock time synchronization problem for High Level Architecture (HLA). We first identify and analyze two drawbacks in the traditional HLA-based time synchronization algorithm. A novel time synchronization algorithm based on synchronization events is then proposed to address these two drawbacks. To verify the proposed algorithm, experiment are...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.