The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we provide a non route-calculating MPLS LDP fast protection switching scheme called LDPNRC-FPS scheme which is efficient in transient multi-failures in MPLS networks. This scheme makes full use of various working modes and configurable loop detection of LDP protocol.. When network failures happen, the scheme need not to compute routing again. The scheme uses Path Vector TLV and Hop...
In the Internet today, multipath routing is proved a popular technique that improves reliability and robustness of data delivery; however, current forwarding algorithm over multipath network have problems such as lacking of preparing for sudden spikes. This paper proposes a new forwarding algorithm, which is based on time series prediction and PSO (particle swarm optimization). We describe how the...
Router is the key equipment in Internet and its cost is an important issue in network community. Line-speed processing is a fundamental rule in modern router design and it influence the router cost dramatically. By taking the real characteristics of Internet traffic into account, this paper proposes methods to lower the requirement of line-speed processing with a factor of g(<<1). Theoretical...
With the rapid increasing of the same destination address traffic, traditional forwarding equivalence class (FEC) can not process these traffic efficiently. After elaborating the drawbacks of single FEC, we propose a variable FEC (VFEC) algorithm and evaluate the algorithm using ns2 simulation. VFEC obtains alternative paths and forwards these traffic to multiple available paths. From the thorough...
A Mobile Ad hoc NETwork (MANET) is composed of a set of wireless mobile devices that are able to communicate with each other in a peer-to-peer mode. In recent years video streaming over MANETs has drawn significant attention due to the popularity of high-speed IEEE 802.11 standard series. However, it is still a challenging task for channel variation and bandwidth limitation and fluctuation. In this...
Embedded video surveillance has become a large market as the number of installed cameras around us can show. At the same time, video compression technique has been rapidly developed in recent years. As a new generation of video coding compression standard, extensive attention has been given to H.264/AVC. On the other hand, because of good cost-effective and low-power consumption, DSP is widely used...
The block motion estimation is a very time consuming part in the H.264 video coding standard. Although many fast motion estimation algorithms have been proposed to reduce the huge calculation complexity instead of full search, the motion estimation time still can not satisfy the critical real-time application. This paper proposes a new fast motion estimation algorithm, which improves on the UMHexagonS...
IP multicast has been proposed for over a decade, but deployment in heterogeneous Internet is still limited within small area for lack of network management and congestion control. Many application layer multicast (ALM) protocols have been proved to be more scalable and feasible than IP multicast in practical environment. In this paper, we propose an ALM protocol called scalable hierarchical multicast...
In the last years the increasing programmability of GPU lead to lots of point-based rendering could be implemented on GPU, which not only let CPU to be available for other tasks, but also improve the execution speed through GPU. However, since the recent GPU does not support the epsilon-z-buffering algorithm, a majority of GPU based rendering algorithms are based on multi-pass rendering to achieve...
According to the drawback of the traditional circle target extraction algorithm used by Hough Transform, such as computation complexity, low efficiency and etc, an new circle target extraction algorithm is proposed in this paper which can extract multiple circle targets with different radius at one time. First, the Average Absolute Difference is implemented to enhance the edge of the circle targets...
A new algorithm is proposed for triangular mesh reconstruction from 3D scattered points based on the existing intrinsic property driven (IPD) method. The improvements include a new approach to determine the seed triangle, a new approach to define the influence region for active edge, and a new approach to select the best active point. The new triangle is also tested with the constraint of geometric...
Based on spherical parameterization, we in this paper present an algorithm to naturally morph a mesh model to another. Our algorithm first adjusts poses of both the models to align them in 3D space. Then, the two normalized models are parameterized onto a common spherical parametrical domain. Subsequently, the algorithm matches a group of given features of the models on spherical domain via a re-parameterizing...
Adaptively up-sampling of point-sampled models is one of key technologies to build multi-resolution point-based surfaces. In this paper, we propose an up-sampling algorithm for point-models. Our algorithm first defines a smooth manifold patch for each point in model based on a local projecting procedure, defined by the famous moving least squares (MLS) method. A valid up-sampling region is calculated...
In the study of ALM, how to improve the performance of multicast system is a hotspot. Theoretical study shows that network coding can improve the performance of network multicast. In this paper, in accordance with the actual structure and features of HM-ALM, a cluster-oriented, and hybrid mesh ALM model, we select the deterministic linear coding strategy, and design the appropriate coding algorithm...
An efficient immittance spectral frequency (ISF) parameters quantization algorithm is proposed based on the Gaussian mixture model (GMM). The basic idea of the algorithm is the use of GMM to send the ISF parameters into M Gaussian clusters, ISF parameters are quantized by a Gaussian lattice vector quantizer corresponding to that Gaussian clustering, and the minimal spectral distortion value among...
In order to improve the speaker recognition accuracy, a new mel-frequency cepstral coefficient (MFCC) parameters extraction criterion based on F-Ratio and correlated distance criterion is proposed. Take the correlation of the characteristics into account, F-Ratio and correlated distance criterion (FRCDC) is proposed, which provides an idea about the significance of each component for MFCC feature...
Recently, Pour et al. proposed a group key management scheme for secure multicast, where each member is privately assigned a member secret, and the algebraic inverse element of this secret is assigned to others but not the member himself. The scheme is claimed to be efficient in that the inverse element of a leaving member can be mathematically employed for updating the group key locally, which would...
We present an efficient authenticated group key agreement (AGKA) protocol in certificateless public key setting (CL-AGKA). The protocol only needs two communication rounds. In each protocol run, only four pairing computations are involved for each participant. The authentication in our protocol is realized using a signature scheme which is provably secure in the strongest security model for certificateless...
Authentication and key agreement protocol is designed to provide pair of parties communicating over an insecure network with a secure session key. However, most of the existing authenticated key agreement protocols are not designed for protecting privacy. A mutual authentication key agreement protocol based on CPK technology and the improved Elliptic Curve Diffie-Hellman key agreement is proposed...
Signcryption is a kind of cryptographic primitive which allows combining the signature and encryption into one scheme efficiently. In this paper we first improve the proxy key generation protocol enforced by Tasi et al and then propose a novel identity based proxy signcryption scheme based on the improved proxy key generation protocol and a identity based signcryption scheme proposed by Libert et...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.