The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Learning of threshold concepts in courses such as statics has traditionally been a difficult and critical juncture for students in engineering. Research and other systematic efforts to improve the teaching of statics in recent years range widely, from development of courseware and assessment tools to experiential and other "hands-on" learning techniques. This paper reports a portion of the...
Software Engineering projects typically go through stages of development, with implementation near the end. Following the normal order in a school semester leaves students with little time to develop code and little to show for their efforts besides long written reports. Students also work in a bubble, having little contact with anyone outside their immediate group. This paper describes an innovative...
Student software projects are often focused on training coding skills and on model-driven software system design. The projects rarely develop skills needed for the proper formulation of system visions and requirements specifications. To solve this issue the projects must deal with real-life software projects issues. The projects should solve main commercial aspects of real-life - they must include...
In this article we describe two alternative order-preserving encryption schemes. First scheme is based on arithmetic coding and the second scheme uses sequence of matrices for data encrypting. In the beginning of this paper we briefly describe previous related work published in recent time. Then we propose alternative variants of OPE and consider them in details. We examine drawbacks of these schemes...
This paper describe a byte oriented transmission code and its hardware implementation with elaborating a method for implementation of the DC-balanced 8B/10B coding using a very fast FPGA from Spartan family. This code is particularly well suited for high-speed local area networks. This technique can be used by other high speed buses such as PCI Express, IEEE 1394b, Serial ATA, SAS, Fiber channel,...
A data coding is presented in this paper for ZigBee-based wireless data communication system for future microgrids. It is assumed that each microgrid has a central controller and each distributed generation unit in the microgrid has a local controller. The communication system is responsible for transmitting and receiving data amongst these controllers. This communication system is based on ZigBee...
Many digital libraries are providing Virtual Reference Services (VRS). There could be various approaches to increase the quality of VRS. In this study, we focused on two key factors; improving helpfulness and reducing user's feeling of intrusiveness. Studies indicated that librarian-initiated attempts for help may increase user's feeling of intrusiveness [2] [3]. It is challenging to provide high...
Bounded model checking (BMC, for short) is a successful application of SAT technique in model checking. In a broad sense, BMC encoding approaches could be categorised into the syntactic fashion and semantic fashion. In this paper, we present a new BMC encoding approach specially tailored for LTL model checking. The key observation is that syntactic encoding and semantic encoding respectively have...
We consider the problem of efficiently computing homology with Z coefficients as well as homology generators for simplicial complexes of arbitrary dimension. We analyze, compare and discuss the equivalence of different methods based on combining reductions, co reductions and discrete Morse theory. We show that the combination of these methods produces theoretically sound approaches which are mutually...
The existing research of distributed provenance storage is at the preliminary stage. Most of the researchers are endeavor to improve the query efficiency of storage solution, whereas, very few people pay attention to the matching problem of provenance and data and the waste of storage space. Two aspects on the problem of provenance storage were proposed in this paper. First one is the relationship...
The VLSI placement problem is presented in this article. A mechanism of representation of solutions for further genetic algorithm implementation is described. The proposed encoding algorithm is based on a placement tree and reverse Polish notation. The decoding algorithm is implemented in two stages: twinning of elements in macroblocks and calculation of real coordinates of elements. Experimental...
This paper proposes a novel recovery scheme for the XOR-based storage codes with the increasing-difference property. For a message of kL bits stored in n storage nodes, a data collector connects any k out of the n storage nodes to recover the message. In our scheme, the data collector acquires exactly L bits for each node, so that no transmission overhead exists. Furthermore, we propose an in-place...
I-frame affects image quality seriously, but costs enormous bits in video coding processing. In order to optimize the increasing bit rate caused by I-frame, we design a novel video codec based on residual image for the latest video coding standard HEVC. An appropriate method to obtain residual image is proposed depend on the characteristic analysis. The proposed codec reduces considerably by up to...
This paper proposed a transmission system for mobile device. Different from traditional transmission methods which connect smart phone by wireless network, universal serial bus or blue tooth, the proposed method transmit information in audio by headset. To protect the company's right, the proposed method verify data by audio hiding. If the signal has not been verified, the program will not decode...
Data hiding is a well-known technique which embeds the secret data into a digital media. Most of the existing schemes either have the low image quality, or provide the restricted embedding capacity. In this paper, a new data hiding scheme based on turtle shell is proposed to obtain better image quality and higher embedding capacity. In the proposed scheme, a secret digit is embedded into each cover...
Transport networks satisfy requests to forward data in a given topology. At the level of a network element, forwarding decisions are defined by flows. To implement desired data properties during forwarding, a network operator imposes economic models by applying policies to flows. In real applications, the number of different policies is much smaller than the number of flows. In this work, we draw...
In recent years, practical software development exercises have been carried out in many higher education institutions. To carry out the exercises effectively, it is important that teachers understand the difficulty of learners in exercises and advise appropriately for it. Currently, a common way to check the results of the exercises is that teachers review artifacts which learners submitted. However,...
Ideal dense coding protocols allow one to use prior maximal entanglement to send two bits of classical information by the physical transfer of a single encoded qubit. We investigate the case when the prior entanglement is not maximal and the initial state of the entangled pair of qubits being used for the dense coding is a mixed state. The upper bound on the probability to do dense coding is analyzed,...
In software development, the waterfall model is commonly used, especially for large-scale software systems. For smaller-scale software development, agile software development approaches such as extreme programming or scrum are used. Traditional software development methodologies are mainly targeted toward customer-centric development, and therefore, new software methodologies are often not well received...
The belief propagation (BP) decoding of LT codes on BEC recovers only a small subset of the source symbols when the overhead is smaller than a particular value, at which point an avalanche of decoding takes place. In this paper, a degree distribution modification method is proposed to solve this problem. The encoder adopting the modified degree distribution equals to an encoder adopting the original...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.