The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Servai Mesh Extender is a low-cost open-source infrastructure-independent telecommunications relay device developed to support telecommunications during and following disasters, as well as in remote and isolated locations. The Mesh Extender has been under development for five years, and is just now transitioning from a primarily University research system, into a mass-producible and deployable...
Bonferroni mean (BM), one of the desirable operators that can capture the expressed interrelationship among the individual arguments. Moreover, Pythagorean fuzzy sets (PFSs) have been proved extremely effective for modeling uncertainty of the Multi-attribute decision making (MADM) problems. In this paper, we present a new extension of linguistic term called Pythagorean triangular fuzzy linguistic...
In this paper, we propose sparsity-aware data-selective adaptive filtering algorithms with adjustable penalties. Prior work incorporates a penalty function into the cost function used in the optimization that originates the algorithms to improve their performance by exploiting sparsity. However, the strength of the penalty function is controlled by a scalar that is often a fixed parameter. In contrast...
During the last years, there is increasing interest in analyzing social networks and modeling their dynamics at different scales. This work focuses on predicting the future form of communities, which represent the mesoscale structure of networks, while the communities arise as a result of user interaction. We employ several structural and temporal features to represent communities, along with their...
With the popularity of the Internet, online news media are pouring numerous of news reports into the Internet every day. People get lost in the information explosion. Although the existing methods are able to extract news reports according to key words, and aggregate news reports into stories or events, they just list the related reports or events in order. Moreover, they are unable to provide the...
This paper proposes a scalable and efficient cacheupdate technique to improve the performance of in-memorycluster computing in Spark, a popular open-source system forbig data computing. Although the memory cache speeds up dataprocessing in Spark, its data immutability constraint requiresreloading the whole RDD when part of its data is updated. Suchconstraint makes the RDD update inefficient. To address...
User preference profile is generally significant to marketing strategy decisions as well as user experience improvement for mobile telecom operators. To establish preference profile, perators create a hierarchical taxonomy of preference and classify records of user browsing history on mobile internet by the taxonomy to measure user preference. However, the incompleteness of recorded browsing history...
In this paper, we investigate a tradeoff between the secrecy rate (SR) and energy efficiency (EE) in an underlay cognitive radio network that consists of a cognitive base station (CBS), a cognitive user (CU), a primary user (PU), and multiple eavesdroppers (EDs). By using a so-called secrecy EE (SEE), which is defined as the ratio of SR to the total power consumption of CBS, as the design criterion,...
Midori64 proposed by Banik et al. in 2015 is an SPN-type block cipher with 128-bit secret key. The higher-order differential characteristics of the boolean polynomial of encryption function can be exploited for cryptanalysis. In this paper, we show a variety of the peculiar third-order differential characteristics of Midori64 block cipher, and theoretically analyze the characteristics.
To cope with the ongoing changing demands of the internet, ‘in-network caching’ has been presented as an application solution for two decades. With the advent of information-centric network (ICN) architecture, ‘in-network caching’ becomes a network level solution. Some unique features of the ICNs, e.g., rapidly changing cache states, higher request arrival rates, smaller cache sizes, and other factors,...
Congestion is a major problem for the data-processing Ethernet Networks, because it causes data loss and application failure in consequence. To this end, this kind of network needs to be suitably controlled in order to guarantee good performances. IEEE 802.1Qau standard is in progress to find an efficient congestion control mechanism, which may ensure a properly use of the available resources and...
When the Great East Japan Earthquake occurred in 2011, it was difficult to immediately determine all telecommunications network conditions using only information from network monitoring devices because the damage was considerably heavy and a severe congestion control state occurred, Moreover, at the time of the earthquake, telephone and e-mail services could not be used in many cases, although social...
The node replica attack is known to be dangerous to wireless sensor networks (WSNs) because it enables the adversary to extend the damage throughout the network with very low cost. To stop such attack, we propose a similarity estimation based scheme with group deployment knowledge. Compared with prior works, our proposal provides extra functionality that prevent replica from generating false location...
A model of growing networks (social, telecom, collaboration, etc.) taking into account random connection losses among participants of a network in the course of its evolution is proposed and investigated. A significant effect of connection losses on the dynamics of network growth and on the node distribution is established experimentally. Based on the random graph theory with nonlinear preferential...
Worldwide, constant growth of number of computers in use actualises issue of IT users impact on environment. Green IT methodology is one of the proactive action on preservation of environment and reduction of negative effects of IT. Untill 2012. there was not a clear metric standard for measuring data center power efficiency. Among available metrics in this paper two of them are considered: Power...
There are two basic groups of methods for text to speech synthesis — concatenative and parametric. Expansion of speech technology applications, made parametric methods more attractive owing to their flexibility of changing speaker and speech style. The paper describes the development of the first speech synthisizer based on deep neural networks in Serbian language by using open source Merlin toolkit...
The question of how to define a pleasant sounding bell has been posed long ago, since the bell is one of the oldest musical instruments. Recent technological advances provide powerful tools for detailed acoustic analysis of bells. However, subjective aspect of a bell sound as a main indicator of a bell sound quality has been to a certain extent neglected. The main goal of this research was to determine...
Based on the theoretical model of two-components “Г” analog LC current filters, the current filter was designed. The parameters of the power transformer to which filters are connected have a great impact on the current filters for relay protection. Based on the theory of four-ends the following was determined: relations between components, optimal reduction of the influence of disturbances and required...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.