The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Fuzzy C-Means (FCM) clustering is the most well-known clustering method according to fuzzy partition for pattern classification. However, there are some disadvantages of using that clustering method, such as computational complexity and execution time. Therefore, to solve these drawbacks of FCM, the two-phase FCM procedure has been proposed in this study. Compared with the conventional FCM, the usage...
In this paper, we first present a heterogeneous theoretical framework for DTNs where the contact between nodes is based on independent differently distributed assumption. Moreover, the message forwarding process follows a Gamma Distribution. Then, we propose a new spray routing scheme based on this framework. Moreover, we compare our routing protocol with traditional spray routing (TSR) protocols...
Traditional schemes of UPQC and OPEN UPQC are proposed in literature to solve both the voltage quality problem of the load and the current quality problem of the grid. However, the traditional UPQC is not flexible when configured to compensate an industrial park if not all loads are sensitive. The previously proposed OPEN UPQC scheme has the advantages that communication coordination are required...
In Content-centric Networking (CCN), in-network caching can enhance content delivery at a global scale without requiring special infrastructure. In this paper, we propose a lifetime-based greedy caching approach (LBGC) which involves both caching decision and cache replacement. Contents are preferred to be stored in nodes with high betweenness centrality, and only expired cache items can be replaced...
This paper presents an improved algorithm for mitigating non-line-of-sight (NLOS) error in time-difference-of-arrival (TDOA) positioning applications employing ultra wideband (UWB) signals. The main idea of the algorithm is based on calculating the residuals for the different subsets formed by the reference nodes. The final estimate is a linear summation of the estimate from the different sets weighted...
In this paper, we evaluate privacy preservation capability of biometric hashing methods. Although there are some work on privacy evaluation of biometric template protection methods in the literature, they fail to cover all biometric template protection methods. To the best of our knowledge, there is no work on privacy metrics and assessment for biometric hashing methods. We use several metrics under...
The classification of different human activities with radar has been a widely researched topic in recent years. Oftentimes, when no experimental data is available, simulated data can be exploited to test classification algorithms. Kinematic models such as the Thalmann Model and motion capture (MOCAP) data are frequently used to simulate radar signatures of human movements. While the Thalmann Model...
In the last few years, the research community has witnessed the rapid development of the Information-Centric Networking (ICN) approach aiming at evolving the Internet from today's host based packet delivery towards directly retrieving information in a secure, reliable, scalable, and efficient way. The Internet of Things (IoT) concept envisions scenarios in which “smart objects” can be interconnected...
In this paper we describe a virtual 3D lab created using Open Wonderland to enable simultaneous execution of different computer science simulator modules in a collaborative, immersive workspace. Simulators were divided into functional modules that can be reused and combined for different teaching topics based on statistics of their usage. We discuss some important issues in our platform setup, describe...
Decision makers are often required to make decisions with incomplete information. In order to design decision support systems (DSSs) to assist decision makers in these situations, it is essential to understand why and how decision makers select their strategies. This paper presents a simulation which examines the impact of incomplete information on the effort and accuracy of decision strategies. The...
The New Forest cicada is a declining species native to the UK, and the last unconfirmed sighting was in 2000. One of the difficulties in identifying the cicada is that it sings at a high frequency typically inaudible to adults. In this paper we describe a field test of a novel citizen science smartphone application designed to detect and classify the cicada's call. We discuss some of the obstacles...
Social networks allow their users to make their profiles and relationships private. However, in recent years several powerful de-anonymization attacks have been proposed that are able to map corresponding nodes within two seemingly unrelated datasets solely by considering structural information (e.g., crawls of public social networks and datasets published after sanitization). These algorithms consist...
In this paper, a Java stand-alone application for linear control systems simulation is presented. This simulator implements linear low-order process models (first order, second order and third order), open-loop architecture and closed-loop architecture with a linear PID feedback controller. Modeling and dynamical simulation are now basic tools for understanding and verifying theoretical subjects....
In this paper, a java-based simulator of dynamical systems and signals is presented. This simulator implements linear low-order process models. Stability analysis, open-loop control and closed-loop tests can be done with the application. Analysis of signals and noise is available using the Fast Fourier Transform (FFT). The main contribution is a Java application that can be used by the instructor...
Search and rescue (SAR) teams often face several complex and dangerous tasks, which could be aided by unmanned robotic vehicles (UV). UV agents can potentially be used to decrease the risk in the loss of lives both of the rescuers and victims and aid in the search and transportation of survivors and in the removal of debris in a catastrophe scenario. Depending on the nature of a catastrophe and its...
Virtual Labs (VLAB) is a multi-institutional Open Educational Resources (OER) initiative, exclusively focused on lab experiments for engineering education. This project envisages building a large OER repository, containing over 1650 virtual experiments mapped to the engineering curriculum. The introduction of VLAB is a paradigm shift in an educational system that is slow to change. Treating VLAB OER...
In the RFID system, when two or more tags respond their IDs to the reader simultaneously, wireless signal collision occurs and no tag can be identified successfully by the reader. How to reduce such collisions in order to speed up the identification performance is thus important. There are many anti-collision protocols proposed to solve the tag collision problem. They can be categorized into two classes:...
In VANET, nodes move at high speed and change connecting network frequently. As a consequence, IP duplication may occur and packets would not be sent to the correct destination. This paper aims at reducing the size of location information in duplicate address detection (DAD) scheme. We propose a grid-based duplicate address detection (GDAD) scheme and separate network into several grids, where the...
The aim of the research is to study the dynamics of multiple unmanned air/ground/surface vehicles (UXV) operating in confined areas. A simple model of the UXV dynamics is first derived, and the expected time of first collision is then formulated using the concept of a mean free path from molecular dynamics. Monte-Carlo simulation is performed to verify the theory developed. In our formulation, the...
This paper analyzes the transmission capacity of D2D (Device-to-Device) network in cellular and D2D heterogeneous networks(HetNets) with cellular users (CeUEs) assisted. The D2D network capacity can be enhanced by allocating a part of CeUE transmission power to assist D2D communication. By utilizing stochastic geometry, we first model the HetNets by homogeneous Poisson point process (HPPP). Secondly,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.