The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper considers the use of massive multiple input, multiple output (MIMO) combined with single-carrier with frequency-domain equalization (SC-FDE) modulations using a precoding approach. Although millimeter wave (mm-Wave) communications are expected to be a key part of 5G, these frequencies present considerable challenges due to high propagation free-space path losses and implementation difficulties...
A range of algorithms was used to classify online retail customers of a UK company using historical transaction data. The predictive capabilities of the classifiers were assessed using linear regression, Lasso and regression trees. Unlike most related studies, classifications were based upon specific and marketing focused customer behaviours. Prediction accuracy on untrained customers was generally...
Nowadays applications need to deal with a large number of concurrent requests. These systems must be stress tested to ensure that they can function correctly under a load. In this context, a research field called Search-based Software Testing has become increasingly important. Most of the search-based test methods are based on single objective optimization. In the case of multi-objective optimization...
This paper proposes a simultaneous transmission method of Multi-View Video and Audio (MVV-A) with MPEG-DASH. In the MPEG-DASH protocol, the server stores multi-bitrate encoded videos in advance and transmits an appropriate video depending on network condition. In the simultaneous transmission method, the minimum bitrate videos of unselected viewpoints are transmitted with the video of the selected...
Presence detection is used in occupancy control to dynamically adjust energy-related appliances in smart building applications. Yet, practical applications typically suffer from high sensor unreliability. We propose a computationally efficient approach, based on Hidden Markov Models, to fuse sensor observations from multiple sensors to better estimate user state (presence/absence). Our model considers...
Industries, people's activities and urban infrastructure rely more and more on "Internet of Things" (IoT) devices for all kinds of activities and operations. Although securing a computer network has always been a difficult task, it transmutes into a massive challenge with the exponentially-growing network size and heterogenity in these systems. A recent example in that vein is a major security...
With the growing number of mining datasets, it becomes increasingly difficult to explore interesting rules because of the large number of resultant and its nature complexity. Studies on human perception and intuition show that graphical representation could be a better illustration of how to seek information from the data using the capabilities of human visual system. In this work, we present and...
The rapid growth of the volume of multimedia data necessitates efficient compression and transmission of videos, which are requested in divergent bitrates owing to the diverse network bandwidth constraints or end device resolution/complexity requirements. Scalable video coding (SVC) is a coding paradigm that allows once-encoded video to be adapted to any desired bitrate or quality level, and thus...
Building automation systems were designed in an era when security was not a concern as the systems were closed from outside access. However, multiple benefits can be found in connecting such systems over the Internet and controlling a number of buildings from a single location. Security breaches towards building automation systems are increasing and may cause direct or indirect damages to the target...
A GVC (Global Value Chain) optimization requires appropriate approach to make it happen, however, a good approach is not enough when the optimization requires a big changing throughout the chain. It is very important to have a methodology of change management during change processes for GVC optimization. This paper describes the principle of change management, and illustrates a case study on how to...
This paper discusses the performance model for practical computational fluid dynamics (CFD) simulation. Based on the analysis of the conventional qualitative model and empirical knowledge in the simulation, a set of practical models for the linear solution in high-order finite element method (FEM) simulation are established: a linear function model for the storage consumption, and a power function...
Communication between air traffic controllers and pilots remains a vital part of air traffic control operations, and communication problems can result in hazardous situations. The modern Air Traffic Management (ATM) system has independent direct communication channels (CC) for each controllers operating at different radio frequencies. Currently, the main method of improving the reliability of controller's...
Smartphones and other connected devices rely on data services, such as web services (WS) and Google Cloud Messaging (GCM), to share the information they collect or use. Traditionally, these services were classified according to their efficiency or their delivery time, but, when dealing with battery operated devices, another important parameter is the power consumption. In this paper, we present the...
In this paper, we propose a scheduling algorithm for ridesharing. It efficiently serves real-time requests sent by passengers and generates ride sharing schedules that try to meet users' demands. In our method, we first propose a taxi searching algorithm using binary search strategy to quickly and efficiently retrieve candidate taxis that are likely to satisfy a trip request. A scheduling algorithm...
This paper proposes a new method of reducing the steady-state error for the Affine Projection Algorithm (APA) using Error Reduction Factor (ERF) to yield Error Reduction Affine Projection Algorithm (ER-APA). The proposed method is very simple but highly effective. In the paper, we analyze the ER-APA for calculating theoretical filter convergence. Through experiments, it is shown that the ER-APA sufficiently...
Vehicular ad hoc networks (VANETs) are emerging as the possible solution for multiple concerns in road traffic such as mobility and safety. One of the main concerns present in VANETs is the localization and tracking of vehicles. This work presents a passive vehicle localization and tracking method based on direction of arrival (DOA) estimation. The proposed method does not rely on external sources...
Cryptography has been around for thousands of years. We propose a new cryptographic model, lock trees and key trees, and our idea differs from current graphical passwords in this paper. Graphs and their labellings are applied to establish the concepts of key-trees and lock-trees based on abundant of graphs having smaller orders and their corresponding double odd-edge labellings. We propose two methods,...
In recent times, major cybersecurity breaches and cyber fraud had huge negative impact on victim organisations. The biggest impact made on major areas of business activities. Majority of organisations facing cybersecurity adversity and advanced threats suffers from huge financial and reputation loss. The current security technologies, policies and processes are providing necessary capabilities and...
The concept of agile domain name system (DNS) refers to dynamic and rapidly changing mappings between domain names and their Internet protocol (IP) addresses. This empirical paper evaluates the bias from this kind of agility for DNS-based graph theoretical data mining applications. By building on two conventional metrics for observing malicious DNS agility, the agility bias is observed by comparing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.