The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Human computer interface (HCI) in pervasive computing environment (PvCE) faces many kinds of devices and different user preferences. To create user interfaces for every device and user preference traditionally in each user interaction is unacceptable, especially when the user interface have to be generated dynamically. This paper proposes a so-called type model for simple user interaction in PvCE...
Emerging neural network accelerators are often implemented as many-core chips and rely on a network-on-chip to handle the huge amount of inter-neuron traffic. The wellknown mesh and tree are the most popular topologies in prior many-core neural network accelerator designs. However, these conventional topologies suffer from high diameter, low bisection bandwidth, and poor collective communication support...
Wireless body area networks (WBANs) have risen great concern among the society in the fields such as health care and disease control and prevention. However, the radio frequency radiation produced by frequent communication and utilization of nodes leads to temperature rise, which does great harm to human bodies. For that reason, the thermal-aware technology is of great value in research, which also...
Aiming at the problem that the 3D DV-Hop localization algorithm has great error in the location of coal mine roadway, an improved three-dimensional DV-Hop fixed node location method is proposed based on the relationship between the geometric model of coal mine roadway and the sensor node. Based on the traditional 3D DV-Hop calculation hops and the lack of distance between nodes, the difference method...
In order to adapt to the characteristics of high mobility, low density in Internet of Things, this paper proposes a novel P2P service discovery algorithm based on Markov. The Markov is used to achieve the prediction of the meeting time interval between any two nodes, and to construct a two-stage prediction model of meeting time interval. This paper uses the model to improve the Spay and Wait routing...
In this paper, we jointly perform the cell selection and activation (CSA) to maximize the network energy efficiency (EE) under users' long-term rate constraints for green communications in ultra-dense heterogeneous networks (UD-HetNets). The finally formulated problem is in a mixed-integer fractional form and hard to tackle. We first transform it into a parametric subtractive form, by which we reach...
In this paper, we propose a CPA-Secure encryption scheme with equality test. Unlike other public key solutions, in our scheme, only the data owner can encrypt the message and get the comparable ciphertext, and only the tester with token who can perform the equality test. Our encryption scheme is based on multiplicative homomorphism of ElGamal Encryption and Non Interactive Zero Knowledge proof of...
Collaborative filtering algorithm is widely used in the recommendation system of e-commerce website, which is based on the analysis of a large number of user’s historical behavior data, so as to explore the user’s interest and recommend the appropriate products to users. In this paper, we focus on how to design a reliable and highly accurate algorithm for movie recommendation. It is worth noting that...
In cloud storage, the data owner and data users can easily perform cooperative work on shared data. In this paper, we focus on operation behavior auditing in shared cloud storage, which is significant for the avoidance of potential crimes in the cloud and equitable accountability determination for the forensic investigation in shared cloud. We first introduce a novel secure public auditing model for...
In this paper, based on the dimethyl ether plant process and production process control system, the optimal design of DME control system is studied and the simulation system are established. First of all, the production equipment is regarded as the research object, and through the device operation requirements and device characteristics of structural analysis, and combined with the DCS control system...
5G-based Vehicular Social Network (VSN) fiercely calls for an advanced requirement of vehicle's location and trajectory privacy preserving scheme. Since the VSN owns the characteristics of high mobility and multiple hops relay, we first construct an architecture of 5G-based VSN with the Mobile Femtocell (MFemtocell). Then we propose the Dynamic Group Division algorithm (DGD), which is suitable for...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.