The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents an open recommender system to ease the entering barriers due to lack of sufficient background knowledge for small or new service providers. The proposed Open Preference and Feature recommender (OPF) uses user preference and item feature as the basis of recommendations, since the generality of preference and feature and therefore meets the needs of an open recommender system. In...
Nowadays, wireless network technology becomes one of the most popular technologies, especially IEEE 802.11n. However, there are many conditions that cause performance to decrease. This study has been conducted to analyze the IEEE 802.11n standard while using Voice over IP (VoIP) in the Enhanced distributed channel access (EDCA) mode which is supported in IEEE 802.11e. The study was conducted in 2...
In heterogeneous network environment, it is important to choose an appropriate access network for a Multimode Mobile Terminal (MMT). Currently, there are some methods proposed to make network access selection decision. However, those methods didn't consider some dynamic attributes and could not offer effective handoff strategies. In this paper, we introduce an Intelligence Access Selection Scheme...
In this paper, we investigate the multi-hop connectivity in cognitive radio ad-hoc networks (CRAHNs). Specifically, we propose an algorithm to check the multi-hop connectivity of two arbitrary secondary nodes with random nodes' locations and primary nodes' active states as inputs. Then, we use statistical simulation approach with our proposed algorithm to obtain the overall multi-hop connectivity...
Cloud Computing (CC) represents an attractive and cost-efficient of server-based computing and application service provider models. Virtualization technology enables dynamically allocate resources based on workload fluctuations from users' needs. The current paradigm of Data Center (DC) or Mega Data Center (MegaDC) has changed to new approach where Micro Data Centers (MDC) are distributed to different...
VANETs are self-organized networks in which their constituent nodes are vehicles. They can be classified as a subcategory of MANETs. Due to their special characteristics, they demand protocols designed specifically for their scenario of action. Different types of applications can be created for VANETs such as security protocols, traffic management, systems maintenance, comfort for drivers and passengers,...
Internet transaction is increasing significantly due to very fast grown of mobile devices, electronic commerce, and electronic records. Many researchers proposed several protocols to analyze the accountability in Internet transaction. In this paper we propose accountability model and protocol in Internet transaction that have advantages over existing protocols and satisfies essential security properties:...
Proposed development strategy aims to resolve regional issues in a local area, by use of ICT technology, to build a strong reliable regional high-speed network immune to disasters at a low cost and to achieve disaster monitoring and the emergency services in mountainous areas and rivers, by leveraging regional network. We will achieve the location confirmation service in fields for local residents...
Telecommunication networks often face power outage problems in the natural disaster affected areas. Also, owing to a sudden substantial increase in network traffic loads the battery backup power of the base stations run out quickly and therefore hampering telecommunication services. To overcome this system performance issues, we propose a Long Term Evolution (LTE)-Advanced (LTE-A)-based user equipment...
The small-cell base station (SBS) has emerged as a promising technology to improve the network coverage of a macro-cell base station (MBS) for green communications. With the plug-and-play property and without the auto-configuration ability, SBSs are installed unplannedly and unequally. Under such an occasion, it is important to reduce the energy consumption in two-tier MBS-SBS networks. In addition,...
In this paper, we propose an image interpolation algorithm that uses a hybrid transform and zero padding scheme. The proposed transform uses the Discrete Wavelet Transform to decompose the image into multi resolution subbands where the Discrete cosine transform (DCT) is used to interpolate the image. Then we use Zeropading method to interpolate the DCT transformed high frequency wavelet coefficients...
Bit patterned media recording is one of the candidates for the next generation magnetic data storage. When the storage density is increased, the space between the islands narrows. Therefore, it has inter-symbol interference (ISI) in all directions, unlike in the serially in-and-out storage systems. In this paper, we propose a two-dimensional (2D) ISI compensation method for bit patterned media recording...
The proportion of cellphone users who have smartphones has been increasing. However, many smartphone users are unhappy with its battery life, which is shorter than that of conventional cellphones. Users attribute this problem to the energy consumption caused by the background traffic that installed applications create. In most cases, users are not unaware of the background traffic in their daily use,...
The DDS (Data Distribution Service) is real-time communication middleware used for a large-scale network system. For performance evaluation of the DDS, we developed a DDS simulator on QualNet. The performance measures obtained from the DDS simulator include discovery-completion time, end-to-end message-transfer delay, the number of data messages and the user-data processing time. The DDS simulator...
Recently years, vector map has many advantages than raster map when it is used in many domains as research, education, military or digital map services. And in most cases vector map data contains confidential information which must be kept away from unauthorized users. Moreover, the producing process of a vector map is considerably complex, and the maintenance of a digital map requires substantial...
The use of repeater for the support of high data rate data transmission and the extension of cell coverage is imperative for the Wibro system, which is based on the IEEE 802.16e standardization. Generally, if the separation between transmitting and receiving antennas is not sufficient, the oscillation of repeater and the interference due to the feedback signals from original transmitted signal may...
An online web application called Student-Trade has been developed. It is a state-of-the-art platform for direct consumer-to-consumer trading in the Internet. The platform is targeted for direct consumer-to-consumer trading among university students. The items for trading include books, household items, electronics, housing rental, sports equipment and tutoring services. This paper is on the design...
Wireless indoor localization is crucial in ubiquitous computing environments. Although accurate and efficient indoor localization can be provided in dense wireless networks, most existing algorithms fail to locate a mobile user in sparse deployment networks. In order to address this issue, this paper presents a new fingerprinting localization algorithm based on cost function where received signal...
This paper proposes a new Distributed Bayesian Algorithm (DBA) for data fault detection in order to address problems of data fault in wireless sensor networks. Although many methods for data fault detection have been proposed, the diagnosis accuracy is still very low especially in the situation of the densely deployed WSN with a large number of faulty nodes. In DBA, the Bayesian network is introduced...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.