The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The performance of data access plays an important role for the applications of the emerging ubiquitous consumer wireless world (UCWW). As a 'Not only SQL' (NoSQL) database, Redis has been deployed in the UCWW cloud as an open-source key value store acting as the key component in the system. Given the limited performance of a single Redis node, to improve the system's performance and handle large amounts...
In large IoT systems, many millions of records reach back-end servers every second from devices that generate data automatically and continuously. The receiving servers have to process and store these high volumes of data and support interactive ad-hoc and real-time queries that require data to be searched quickly. Servers typically create bitmap indexes to reduce the quantity of data that needs to...
Though the queuing model with impatient customer has been studied in the past decades, little is definitively known about the overtime waiting characteristics. In this paper, we present an overtime-waiting model for Web servers. This model is taken as a special case of the impatient customer, which quit when the waiting time is longer than a tolerable value. The pdf of the client response time is...
In this paper, we devise a novel anonymous voting protocol based on bilinear pairings. This protocol can be used by a group of participants to vote for one or more resolutions under the decentralized condition (boardroom voting), at the meantime preserving the privacy of participants. More specifically, in the session key set-up phase, every participant just need to broadcast a single message containing...
This paper presents a high throughput pipeline decoder architecture for multiple input multiple output (MIMO) with good performance and its field programmable gate array (FPGA) implementation. This enhanced pipeline decoder architecture can handle large amounts of data and is suitable for very high throughput system. Based on the proposed architecture, the pipeline decoder architecture has been implemented...
This paper studies a three-hop two-way relaying network, in which two end nodes exchange their information data via two relays. In literature, it usually assumes that each link of the two-way relaying network is error-free. Under this assumption, if considering scheduling and network coding (NC), one only needs three time slots to exchange a pair of messages, obtaining throughput 2/3 messages/time...
The Seeker Optimization Algorithm (SOA) is adopted to optimize the pattern synthesis of linear antenna array and the conjugate gradient method is introduced to improve the local search ability of SOA algorithm. The side lobe level, the null depth and the pattern notches of the 20 element linear array pattern are optimized. The results are compared with the data obtained by Genetic Algorithm (GA) and...
This paper presents a configuration compression approach for coarse-grain reconfigurable architectures (CGRA) to reduce the context size in configuration caches, and therefore improve the reconfiguration efficiency of CGRAs. Firstly, some kernel sub-algorithms of radar signal processing including FFT, FIR and Matrix Inversion are analyzed, to explore the features that configuration contexts consist...
Cognitive radio is a promising technology to improve the spectrum efficiency by allowing unlicensed users to exploit the spectrum unused by licensed users in an opportunistic manner. Spectrum allocation avoids interference between cognitive users and licensed users, thus the spectrum is more efficiently used. Due to the fact that traditional methods in solving the problem of spectrum allocation are...
Handover is an essential issue in wireless networks including the Long Term Evolution (LTE) system, especially for high-speed real-time service. An efficient handover scheme with the prediction of candidate target eNodeBs and prompt handover decision is proposed in this paper. By referring to the previous positions of the user equipment (UE), the proposed scheme decides the zone where the potential...
Co-site and co-antenna for multimode networks are effective ways to resolve the problem of space limitation for antennas installation during project implementation, while it brings inconvenience in coordinate optimization for multimode networks. After deep analysis on the electrical adjustment principle of antennas, this paper provides a solution synthesizing both the physical feeding network and...
Cognitive Radio Networks can use scarce spectrum efficiently and envision as emerging technologies that can fulfill the future demands. In Cognitive Radio Networks, users (or secondary users/ unlicensed users) sense channels and use the idle channels and vacate the channel on being use by primary licensed users so that cognitive users do not interfere with the license users. End-to-end performance...
This paper proposed an identity authentication scheme for opportunistic networks based on multidimensional scaling. The scheme provides a method to evaluate the trust relationship between nodes by calculating the relationship strength using the social context based on MDS and avoid the security issues caused by invalid certification from malicious nodes. Since there are no complete links between nodes...
Money laundering refers to disguise or conceal the source and nature of variety ill-gotten gains, to make it legalization. In this paper, we design and implement the anti-money laundering regulatory application system (AMLRAS), which can not only automate sorting and counting the money laundering cases in comprehension and details, but also collect, analyses and count the large cash transactions....
Authentication is a slick and important security property and its proposed formal definitions are not widely agreed upon. Moreover, these definitions cannot faithfully express the requirements of diverse security and privacy in the Internet of Things (IOTs). To solve these problems, we proposed a framework of authentication, which including three forms of authentication -- entity authentication, action...
Network anomaly detection has become the promising aspect of intrusion detection. The existing anomaly detection models depict the detection profiles with a static way, which lack good adaptability and interoperability. Furthermore, the detection rate is low, so they are difficult to implement the real-time detection under the high-speed network environment. In this paper, the excellent mechanisms...
This paper aims to introduce some key parameters for the tracking application in wireless sensor networks. In this paper, the Nearest Closer protocol has been implemented in J-sim simulation platform, and consequently some useful analysis results among the Coverage, Reliability and Lifetime have been obtained. Based on these results, a coverage optimization model is proposed.
This work considers the problem of decision fusion using the three-level censoring scheme in wireless sensor networks. An optimal fusion rule is derived for the model of Rician fading channel. However, the optimal fusion rule requires instantaneous channel state information (CSI) which may be too costly for resource constrained sensor networks. Hence, a sub-optimal alternative with the knowledge of...
Event detection with wireless sensor network (WSN) is an important task required in various applications. The existing approaches consider the spatial and temporal correlation of sensor data separately or not in a cohesive way. In this paper an event detection scheme is introduced, which adopts a hierarchical architecture to efficiently integrate the spatial and temporal correlation of the sensor...
Top-N frequent item sets mining gets the interesting results by appointing the quantity of the most frequent item sets. It is an important data mining application. This article proposed a Top-N frequent item sets mining algorithm based on greedy method. The obtained Top-N item sets are stored in a static doubly linked list. Join two frequent item sets which have the highest support in the not joined...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.