The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Synthetic Aperture Radar(SAR) has been widely used in airborne remote sensing and satellite ocean observation fields to reduce the affect of weather condition and sun illumination. As technology developed, swath and resolution requirements are increased in terrain, which arouse a huge increase in the number of simulated points and simulated pulses and lead to a huge increase in simulated time. With...
The linear array 3D imaging sensor uses a common optical path system to acquire image and point cloud data at the same time. The registration of these two types of data is realized by the common optical axis alignment and time synchronous control system. Since the image and point cloud data have different sampling frequencies; the process of generating colored point cloud needs to interpolate the...
Multi-resolution analysis (MRA) is a useful technique for multispectral (MS) image pan-sharpening. To overcome the limitation of the conventional wavelet-based method, multi-directional MRA approaches have been proposed to provide an efficient directional information representation. In this paper, we present a new hybrid method for MS image pan-sharpening that uses non-subsampled contourlet transform...
Vehicle Management System (VMS) is onboard real-time network, which ensures the flight safety and economy by scheduling and managing the onboard resources. With the help of computers, local area network (LAN), simulation software and real-time operation system, we build a distributed computer simulation platform to simulate this onboard network. In this paper, we present a Simulink/RTX/Reflective...
Modern enterprises collect, process, and analyze security data from various system and network logs. Previous studies show that, handling large security datasets and detecting anomalies from those are key challenges faced by most of todays' enterprises. Unfortunately most security professionals are inexperienced at performing data analysis. In this paper, we study published works analyzing one publicly...
Mobile games have come to revolutionize the mobile handset and gaming industry, pushing chip vendors to compete in order to provide better and better graphics capabilities by means of dedicated processors. This capability coupled with the sensing and communication ability offered by smartphones, provides the developers with the building blocks for innovative gaming solutions. In particular, multiplayer...
Machine-to-machine communication (M2M) is a core elements in the Internet of Things (IoT) vision. Due to the large number of devices expected, the Long-term Evolution-Advanced (LTA-A) networks may present congestion and overload problems. In this paper, we present two approaches to mitigate the impact of M2M communication in LTE-A. We model such overloaded scenario as a bankruptcy problem and apply...
It is well known that load balancing and low delivery communication cost are two critical issues in mapping requests to servers in Content Delivery Networks (CDNs). However, the trade-off between these two performance metrics has not been yet quantitatively investigated in designing efficient request mapping schemes. In this work, we formalize this trade-off through a stochastic optimization problem...
Named Data Networking (NDN) is a promising Future Internet architecture to support efficient content distribution. Specifically, P2P may gain benefits from NDN, as NDN inherently provides a flexible forwarding plane for multi-source and multi-path communications. Existing studies in this area have proposed solutions, but these are adversely affected by link latency. This leads to illogical resource...
To address the challenges raised by the Internet usage evolution over the last years, the Content-Centric Networking (CCN) has been proposed. One key feature provided by CCN to improve the efficiency of content delivery is the in-network caching, which has major impact on the system performance. In order to improve caching effectiveness in such systems, studying the functioning of CCN in-network storage...
Remote server vulnerability exploit is one of the most troublesome threat to the Internet security. An effective defense against the remote vulnerability exploit is code randomization, which randomizes the program code address to disrupt the malicious payload execution. Unfortunately, code randomization is particularly susceptible to address exposure vulnerabilities; the leak of a single code or data...
In many medical problems, clinicians are suffering from information overload. Nowadays, clinical decision support systems (CDSS) are widely available to alleviate this issue. However, they are often not transparent, in contrast to medical scoring systems originating in the clinical world itself. This work presents an extension of Interval Coded Scoring System (ICS), an approach for semi-automatic...
Data replication is used to track the most popular files (i.e., the ones with most requests) and replicate them in selected nodes. In this way, more requests for such popular files can be completed over a period of time and bandwidth consumption is reduced, since these files do not need to be transferred from remote nodes. In this article, we extend our previous work [1] to make it more efficient...
We address a well known problem of computer science, the problem of computing the probability that a given number of people m > 1 have the same birthday from among the members of a larger set of cardinality n ≥ m. The solution to this problem for m = 2 is well known and is usually referred to as the ‘birthday surprise probability’. A solution for m = 3 is also known and appears in the 2004 paper...
A remarkable characteristic of human beings is their tendency to form societies. That put themselves in a social position, where they interact with the environment and try to convince others of their own convictions. This study proposes a model for interactions among individuals of a society, accompanying the evolution of their opinions over time. We consider a situation where the individuals are...
Adaptability and energy-efficient sensing are essential properties to sustain the easy deployment and lifetime of WSNs. These properties assume a stronger role in autonomous sensing environments where the application objectives or the parameters under measurement vary, and human intervention is not viable. In this context, this paper proposes LiteSense, a self-adaptive sampling scheme for WSNs, which...
Effective big data analysis is one of the most notable research challenge of the latest few years. Hadoop, the most popular implementation of the MapReduce framework, has today become widespread used for processing large data sets using cloud resources. However, in many scenarios, data are geographically distributed over data centers and moving them to a single site for processing may result extremely...
As the rapid growth of smart phones, dense and large-scale 802.11-based WLANs have become an important infrastructure to the Mobile Internet. Usually, mobile devices perform periodic scan to collect the information of surrounding APs for awareness of wireless environment. However, this kind of frequent scan severely degrades both the performance of network and client. In this paper, we first collect...
More and more people watch TV with a second device in the nearby. They use it for many different reasons: to play, to search for something, to interact with other people, etc. As a result, their visual attention is often turned to the second screen, especially during commercials. This scenario scares broadcasters, as they fear losing the advertisers' investment. Therefore, it is necessary to improve...
The wide availability of video lectures within digital archives is causing significant problems to video providers. Indeed, students search for very specific contents and the few minutes of video lecture that cover the required topic have to be found in an archive composed of thousands of hours of videos. Therefore, the indexing of video material is becoming a critical process. Unfortunately, most...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.