The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
There are many occasions that an organization needs to distribute important data to only authorized agents. However, there might happen illegal interceptions of the data by unauthorized agents. Commonly used methods of protecting information from unauthorized accesses have been based on text, but there have also appeared media based approaches in the literature. In this paper, we model and implement...
A method for the progressive lossy-to-lossless coding of arbitrarily-sampled image data is proposed. Through experimental results, the proposed method is demonstrated to have a rate-distortion performance that is vastly superior to that of the state-of-the-art image-tree (IT) coding scheme. In particular, at intermediate rates (i.e., in progressive decoding scenarios), the proposed method yields image...
Due to the inverse relation between cable length and transmission bit rate, many current DSL deployments do not truly benefit from the wide spectrum of VDSL2. In this paper, we propose a new DSL network technology, called DSL Rings (DSLRs), to overcome the challenge of long cable runs in DSL networks. Utilizing MIMO techniques from the central office to the pedestal and a ring network between the...
We consider a wireless sensor network (WSN) that needs to install hundreds of sensor nodes over a vast extent of land, (e.g., an orchard temperature sensor network). For monitoring critical events such as frost-prone temperature over an orchard, WSN users, (namely farmers) need to identify all sensor locations, which is however overwhelming from the viewpoints of costs and man power. To address this...
This paper explores the feasibility of Exascale Cloud Computing over the Nobel-EU (European Union) IP backbone network. The EU represents an attractive environment for Exascale Cloud Computing, due to its well-established IP infrastructure with relatively low edge distances. An Exascale Cloud Computing system linking hundreds of data-centers can interconnect potentially millions of servers, considerably...
Task scheduling and resource allocation are two of the most important issues in grid computing. In a grid computing system, the workflow management system receives inter-dependent tasks from users and allocates each task to an appropriate resource. The assignment is based on user constraints such as budget and deadline. Thus, the workflow management system has a significant effect on system performance...
In this brief, fractional 90-degree phase-shift filtering technique is investigated. First, thanks to the two commonly used Liouville and Weyl fractional integral definitions, we present Liouville and Weyl fractional differintegrators which are generalized magnitude-and-phase modulations. Then, paralleling a Liouville fractional differintegrator with a Weyl fractional differ-integrator to obtain a...
A new mesh-generation method for image representation based on data-dependent triangulations (DDTs) is proposed. The proposed method is shown to produce meshes of higher quality (both in terms of mean squared error and subjectively) than those generated by two competing approaches, namely the greedy-point removal scheme of Demaret and Iske and a DDT-based scheme of Garland and Heckbert. Furthermore,...
This paper considers a beamforming (BF) system for 60 GHz wireless communications. A low complexity codebook-based BF scheme that uses the signal angle-of-arrival (AOA) is proposed. This exploits the ability of a millimeter-wave (MMW) antenna array to provide the signal AOA. The effective power beam width (EPBW) is defined to obtain beams that are approximately orthogonal. A reduced transmit beam...
In this paper, we address the problem of separating N unknown non-stationary signals using as many observed mixtures. Using short-term Fourier Transform (STFT) of the mixtures along with a classification approach based on affinity propagation (AP) clustering provide an efficient technique for separating non-stationary signals. The proposed method is featured by its simplicity and improved classification...
The Wiikembe is an augmented Likembe from Zaire, believed to be 100+ years old. A Wiimote affords 3D gesture sensing for musical-HCI. An Arduino interface offers explicit control over DSP functions. Puredata (Pd) scales, converts, and routes control data into Ableton Live. A contact mic is used to acquire a direct audio signal from the Likembe. The audio inputs into a conventional computer audio interface...
In this paper, a new context-aware method for detecting events in noisy hydrophone data is proposed. The method transforms first the 1D hydrophone data into a 2D relevance map. A dynamic context-aware relevance features set is then proposed extracted from the normalized relevancy map. Feature classification is finally performed using a least-squares support vector machine (LS-SVM). The method shows...
This paper outlines the motivation, design and development of a self-tuning, robotic monochord. This work presents a portable, autonomous musical robotic string instrument intended for creative and pedagogical use. Detailed tests performed to optimize technical aspects of STARI are described to highlight usability and performance specifications for artists and educators. STARI is intended to be open-source...
This paper presents a low-cost add-on sensor that has been developed to provide other systems with music listening and note detection capabilities. This sensor has been integrated as part of an intelligent system for solfeo learning. The system is capable of listening the performance of a user as well as assessing the correctness of both the rhythmic pattern and intonation in the performance, and...
A new image inpainting technique is developed to fit perfectly for special categories of images that contain mainly buildings. This technique handles the need to obtain an image of building free from parking cars along sides of the roads. To do that, one needs to carefully inpaint the roads and the missing parts of images. This can be done by combining vanishing points detections and image segmentation...
Nowadays, hardware Trojan protection became a hot topic especially after the horizontal silicon industry business model. Third party IPs are the building blocks of many critical systems and that arises the question of confidentiality and reliability of these blocks. In this work, we present novel methods for system protection and Trojan detection that alleviate the need for a golden chip. In addition,...
This paper explores how iterative channel estimation, symbol detection and decoding at the receiver affects the achievable capacity compared with a non-iterative, purely pilots-based scheme. First, a bound is put on the linear minimum mean-square error (LMMSE) estimator of doubly selective radio channels. Subsequently, a bound on the capacity using an LMMSE estimator is found. These bounds take into...
A small link bandwidth can lead to insufficient capacity and delay problems. Header compression can reduce the amount of packet header to make link utilization more efficient, but this compression technique introduces a longer processing time and may increase end-to-end delay. In time-sensitive applications such as VoIP, this additional delay is unacceptable since high network latency can lead to...
Call admission control (CAC) is an important technology for maintaining Quality of Service (QoS) in Software-Defined Networking (SDN). The most popular type of CACs is trunk reservation (TR) control, and many TR control methods had been proposed for improving evaluation values such as call blocking probability or the resource utilization rate. In general, some users under these TR control methods...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.