The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In identifying communities in the online environment most approaches consider as the basic tie that connects social actors together some form of direct contact, such as through communication. Other approaches use surrogates for direct ties including copresense, cooccurrence, or structural equivalence. In contrast, this paper focuses on semantic equivalence among social actors, regardless of their...
Communications usually do not have enough security. One of the ways for making the data secure is using methods for coding the information in a special manner. In this article one of the algorithms of coding and decoding information has been reviewed and explained. Coding is converting information to the form of coded text and decoding is the operation of converting coded information to the original...
Jiaguwen or Oracle bone script, which is inscribed on ox bones or tortoise shells of the Shang dynasty in ancient China, is one of the oldest mysterious characters in the world. Along with the rapid development of computer science and information technology, people are eager to deal with Jiaguwen characters just like the way they deal with modern characters. Unfortunately, Jiaguwen characters have...
A heuristic genetic algorithm for multi-mode resource-constrained project scheduling problem is given because the requisition of constraints of using renewable and nonrenewable resource in practical engineering is taken into consideration. Consumption of nonrenewable resource, weighted coefficient and the duration are combined, and objective function is constructed dynamically by choosing different...
Public Switched Telephone network (PSTN) is the strongest means of voice communication and shows the highest performance characteristics. In this paper the potential of Voice over Internet Protocol (VoIP) for future generations and the methods to improve its performance are discussed. As the internet has grown rapidly it has given a wide range of choices in the selection of a carrier to set up a VoIP...
Data compression is always a critical issue in areas such as database storage and communications etc. Traditional Huffman algorithm presents a coding technique to compress data into a smaller form based on the fact that some characters are used more frequently than the others. This paper introduces SHUF mechanism which still follows Huffman code's basic principle that symbols which occur a lot in...
To find MST (Minimum Spanning Trees) in complete graph is a classical problem in operation research having network design as an important application. It is possible to solve MST problem efficiently, but its Biobjective versions are NP hard. In this paper, we present a comparison of two encoding schemes for representing tree in Biobjective optimization scenario. The three different instances of Biobjective...
Serial Digital Interface (SDI) has become a standard video interface gradually. The former methods to implement the SDI cause much costs and low agility. Aiming at the situation that analogue and digital coexist, this paper uses a FPGA-based way to design the SDI, it mainly expounds the scheme of the SD SDI design, and analyses its structures and function of each module, which is implemented by Hardware...
The degree of achievable test-data compression depends on not only the compression scheme but also the distribution of the applied test data. Therefore, it is possible to improve the compression ratio of a given test set by regenerating test set and using suitable compression scheme without harm the fault coverage. This paper proposes a novel encoding scheme, named hybrid prefix code. In the proposed...
A novel BIST structure is presented which can greatly reduce the test power dissipation without losing fault coverage. Single input change test pattern is generated by a counter and a gray encoder. The built-in test vectors are generated by the single input change patterns which are exclusive-ORed with seeds generated by the modified LFSR. All test vectors will be single input change patterns during...
The past decade has witnessed substantial progress towards the application of low-rate speech coders to civilian and military communications as well as computer-related voice applications. Central to this progress has been the development of new speech coders capable of producing high-quality speech at low data rates. Most of these coders incorporate mechanisms to represent the spectral properties...
In order to maintain format compliance of MPEG video, some encryption algorithms using spatiotemporal chaotic system for information-carrying fields of MPEG are presented. For balancing the tradeoff between security and performance, a comprehensive algorithm is proposed then. Experiment results and performance analyses show that the proposed scheme achieves format compliance, high security, high compression...
With the popularity of Extensible Markup Language (XML) as the new standard of data exchange on the web, a large number of data sources are represented or encoded in XML format. Therefore, querying and searching XML data on the web has attracted much attention in the database literature. The new emerging Peer-to-Peer (P2P) computing model has fueled the autonomous data sharing over the Internet in...
In order to solve the problems of laxity, redundancy and poor interaction that exist in current web curriculum resources and the effectively manage the curriculum resources, this paper is to study the ontology-based curriculum resource management model by taking data-structure curriculum as an example. Protégé ontology editing tool is used to define, classify, establish relationship for curriculum...
Different data hiding methods would be required in different operating environments. To improve the quality of videos embedded by data, this paper will apply the differences of matching blocks in the H.264 encoder during the inter prediction stage and enforce the size of the matching blocks to implement data hiding. Bit rate increases after being embedded by data, to resolve the problem, this paper...
Medium Grain Scalable (MGS) coding is widely used as the quality scalable video coding (SVC) method. In this paper, we study bitstream extractor for MGS-based bitstream. In MGS, the coded data corresponding to a quantization step size can be fragmented into at most 15 sub-layers, which is called MGS slices. The contribution of each slice to the video quality is evaluated by our proposed algorithm,...
Some characteristics of genetic algorithm just reflect dynamic characteristics of urban spatial growth, thus in order to obtain the quantitative urban growth result, this paper constructs urban spatial growth system based on genetic algorithm and GIS technique. Hereon, the system functions and data are firstly depicted, then system implementation process are further confirmed, including data inputting,...
This paper designs an RFID IP core by utilizing FPGA technology, which has advantages of internal task scheduling and high-speed encoding & decoding. The RTL design of base-band communication IP core based on modular method is presented. The RFID simulation model is established and the experiment results show that the proposed communication simulation model has a good performance, and the IP-core...
Wireless Sensor Network (WSN) nodes are powered by limited battery and communication consumes most of the energy. Therefore, it's not appropriate to transmit data directly in the networks while compressing data before sending is an effective method to save energy for nodes. According to the need for fully recovering the compressed numerical data, based on the LZW (Lempel-Ziv-Welch) algorithm, this...
In this paper, we study the iterative optimization of the encoder-controller pair for closed-loop control of a multi-dimensional plant over a noisy discrete memoryless channel. With the objective to minimize the expected linear quadratic cost over a finite horizon, we propose a joint design of the sensor measurement quantization, channel error protection, and optimal controller actuation. It was shown...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.