The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we introduce a vehicle augmented reality (AR) system to present information of driving situation awareness in a vehicle. Today, manufacturers related with vehicles have been pointing to AR as a next-generation visualization technology for in-car driving displays. Such in-vehicle AR-based display systems are helpful in reducing driver distractions, thereby increasing driver safety, and...
An indoor localization system in wireless sensor networks has become a hot development area. Received signal strength indicator (RSSI)-based localization is a promising technique since it requires a relatively low configuration, battery power and easy control. However, the received signal strength is influenced by channel interference and propagation environments. This characteristic affects channel...
Designated verifier proxy signature is a special proxy signature where only the designated verifier can verify the validity. So far, numerous strong designated verifier proxy signature (DVPST) schemes have been proposed. However, many of them have been pointed out to be vulnerable to the forgery attack or have high computational cost. In 2012, Lin et al. proposed a highly efficient and strong DVPST...
At 2014, I tried to do telepresence between different companies, it was not working because of bad network condition. I tested Network by Chariot on all of network points. And I found Network configuration and condition at all of network points. In this paper, I talk about problem analysis and find out problem ofthat phenomenon going on.
Multicasting is a way to deliver copies of single message to multiple recipients at different locations. On the traditional internet, group members join specific multicast address through membership management protocol and packets are delivered along the path tree built by multicast routing protocol. Now we consider how multicast communication can be designed in id/locator separation environment....
This paper propose the architecture of Video Conferencing system based on Presenter/Observer group. The proposed architecture has the advantage of supporting large-scale conference services solving the problem of the existing video conferencing system. In the future, The Video Conferencing supporting UHD(Ultra High-Definition) needing the scalability will be coming in video conferencing market. This...
As data has been increasing explosively due to development of social networks and cloud computing, there has been a new challenge for storing, processing, and analyzing a large volume of data. The traditional technologies do not become a proper solution to process big data so that a big data platform has begun to emerge. It is certain that big data platform helps users develop analysis service effectively...
In this study, we briefly introduce a novel concept of dual-band polar transmitter design based on digital quadrature modulation techniques for the application of railroad wireless communication (e.g., TRS & GSM-R) to reduce the bandwidth of dual-band PM (phase modulation) signal. We show that the complex signal processing at low frequency effectively utilizes the polar transmitter which is susceptible...
High Efficiency Video Coding (HEVC) is becoming more and more important in current consumer application platforms. Compared with H264 standard, it can reach up to 8192×4320 resolutions at 120fps. To accelerate HEVC decoding processing, this paper presents an efficient hardware entropy decoding architecture, Entropy decoding includes Colomb and CABAC decoding. Hierarchy ring buffer is designed to storage...
The article describes a automated method for searching of low level and medium level vulnerabilities in machine code, which is based on its partial recovering. Vulnerability search is positioned in the field of telecommunication devices. Typical vulnerabilities in source code and algorithms for its search is given. There is forecast to develop methods and utilities in the near future.
It is very important to provide common alerting information in the digital signage terminal. Common alerting information can be such as severe thunderstorm warning information, earthquake report information, child abduction warning, and so on. In this paper, we described the standard development considerations of common alert functionality to provide common alerting event which is produced from the...
This paper describes composite propagation effects of both the median pathloss and shadow fading in the large city. In general, the propagation characteristic for the power profile of received signal has the relative power reduction and fluctuation according to distance to the receiver's location far away from the transmitter. The result of these channel propagation losses is due to the reduction...
It becomes popular to equip CPU and GPU on a single computer system because of its performance and energy benefits, constituting a heterogeneous system for processing big data workloads. However, the optimal exploitation of such a heterogeneous system requires us to know the power consumption characteristics of the applications for difference processing units. To this end, this paper aims at characterizing...
Interactive Connectivity Establishment is the process of establishing a transport connection between two peers behind Network Address Translators. To reduce the session setup delay with the existing ICE process, the concept of Trickle ICE is introduced. With Trickle ICE, peers can communicate individual ICE candidates immediately after gathering. The User Agents supporting this Trickle ICE feature,...
VXLAN (Virtual extensible Local Area Network) is an edge-overlay model that uses L2-in-L3 tunneling protocol. It has attracted attentions for multi-tenant datacenter networks. For the deployment of VXLAN in legacy networks, networks can include VXLAN gateways which forward traffic between VXLAN and non-VXLAN environments. This paper proposes the design of VXLAN gateways which are not in servers, but...
These paper summarizes the research carried out as part of the design of an Android application to transcript phone calls. The system will automatically collect out any mobile calls and transcript it with voice recognition into text, which will therefor be reordered in the memory of each mobile phone of the callers. The system allows someone to make calls and send text messages generated to both....
In an orthogonal frequency division multiplexing (OFDM) system, the cyclic prefix (CP) is added to the beginning of each symbol to prevent intersymbol interference (ISI) and intercarrier interference (ICI). In practical OFDM system, the CP lengths are fixed. When the CP length is shorter than the channel impulse response (CIR) length, referred to as "insufficient CP", significant signal...
Real time monitoring and control of wind power farms (WPFs) require a high reliable communication network infrastructure. The WPFs monitoring and control can be guaranteed through the communication network by using redundant resources and quality of service (QoS) for different applications. In this paper, we study and simulate resilient network architecture for monitoring and control WPFs. The communication...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.