The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Each data center would provide the different total processing time to users at different locations in a cloud computing environment with multiple data centers over a wide area. The authors proposed the joint multiple resource allocation method in a cloud computing environment that consists of multiple data centers and each data center provides the different network delay. However, it cannot provide...
Deep packet inspection (DPI) technology has conventionally been introduced for traffic monitoring, bandwidth control, bandwidth allocation, access control of specific types of traffic, etc. By installing a DPI equipment at any arbitrary point in a network, it is possible to monitor communications of many servers simply and this could simplify dramatically the conventional work load for system management...
In this investigation, we introduce new kinds of sentence similarity, called Euclid similarity and Levenshtein similarity, to capture both word sequences and semantic aspects. This is especially useful for Semantic Textual Similarity (STS) so that we could retrieve SNS texts, short sentences or something including collocations. We show the usefulness of our approach by some experimental results.
Cloud computing has become one of the popular terms in academia and IT industry. The security of the cloud computing infrastructure is the main concern to adopt it. Despite this concern, cloud providers do not disclose any information about their security precautions. Therefore, a provider's clients cannot be certain that their applications are protected while they are in cloud. Furthermore, clients...
Recently, spatial modulation (SM) and space-time block coding (STBC) are combined to take advantage of the benefits of both while avoiding their drawbacks for multiple-input and multiple-output (MIMO) systems. The pioneering works on STBC-SM assume that perfect knowledge of the channel fading coefficients is available at the receiver. This work1 addresses the challenging and timely problem of channel...
Due to the proliferation of plug-in hybrid electric vehicles (PHEVs), the peak load in the power grid is expected to increase in future. The peak load can be reduced by implementing appropriate load scheduling schemes using advanced metering infrastructure (AMI) and smart chargers. In this paper, we formulate the charging problem of PHEVs as a potential game to jointly optimize the cost of the utility...
Recently cloud systems have been spread widely through internet so that we can get to huge amount of complex information (mainly in text) easily and quickly. However we can hardly catch up with the changes inside since we should go through them and see quickly what's going on. This is why automatic labelling is indispensable. In this work, assuming concept hierarchy, we extract suitable labels for...
Web caching is widely used to cache resources that have already been used and reuse them in near future. Prefetching, in comparison, is a technique to cache resources that have never been used. The core of prefetching is prediction - predicting which resources might be used in the the near future. Prefetching is a technology that has been actively studied in the recent years. Most of the modern browsers...
The paper presents an analysis on the concentration of learning. By capturing video images of students, the proposed method detects and analyzes facial features from the image data and determines the state of learner's concentration. Since the concentration is important to the learners, this method is applied to the classrooms. First, feature points are generated from the face and then feature points...
Large sets of similar images are produced in many applications. To store these images more efficiently, redundancy among similar images need to be exploited. A number of methods have been proposed to reduce such inter-image redundancy in lossy image set compression. These methods encode each image either using a conventional image compression algorithm, or predicts the image from a similar image already...
This paper investigates the use of the Oriented Fast, Rotated Brief (ORB) method to automatically detect the most significant broadcast view associated with cricket broadcasts: the Bowler Run-up Sequence (BRS) for cricket highlight generation. This method is computationally less expensive than other methods proposed for BRS detection. It is shown here that only a single frame is required for training...
The mathematical theory of the time-compression overlap add scheme for radio communications is presented. A simple time-shifting model is developed to explore performance in AWGN and multipath Rayleigh fading channels. Equivalent multirate filter structures for both the transmit and receive processes are developed and used to analyze the spectrum of the transmitted signal as it relates to the spectrum...
A 60 GHz ranging model is established and a strongest path search ranging algorithm based on beamforming is proposed. The range error caused by a non-line of sight (NLOS) channel is mitigated by modeling the corresponding delay bias. Outlier detection is employed to improve the accuracy. Performance results are presented which show that 60 GHz ranging can achieve centimeter level accuracy in indoor...
This paper focuses on the use of machine learning techniques for the analysis of computer programs in order to acquire information about an author's gender. There are few existing studies that address the relationship between linguistics and programming; however, in many areas where language is analyzed it is possible to mine important information about the users of that language associated with set...
This paper introduces performance analysis of 64-bit Carry Lookahead Adders using conventional and hierarchical structure styles. We evaluate conventional carry lookahead adder (CLA) and hierarchical carry lookahead adder (HCLA) using different parameters. Our design is targeted into FPGA Virtex 7 family. Area, delay, and area-delay product of all design choices are reported. In the experimental results,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.