The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Paper describes the main methods for ensuring the integrity of information systems, software implementation of these methods will create a security system for information structures. The focus is on algorithms transformation matrix algebra and investigation of modifications and improvements.
Knowledge management (KM) literature identifies numerous barriers that inhibit employees' knowledge sharing practices. Presently, there is a research gap that examines what factors promote such barriers and their direct impact on knowledge seeking and knowledge contributing behaviors via information and communication technologies (ICTs). To bridge the gap, a content analysis study of 104 KM articles...
We examine the learning curves of individual software developers in Open-Source Software (OSS) Development. We collected the dataset of multi-year code change histories from the repositories for 20 open source software projects involving more than 200 developers. We build and estimate regression models to assess individual developers' learning progress (in reducing the likelihood they make a bug)...
TV drama is a kind of big data, containing enormous knowledge of modern human society. As the character-centered stories unfold, diverse knowledge, such as economics, politics and the culture, is displayed. However, unless we have efficient dynamic multi-modal data processing and picture processing methods, we cannot analyze drama data effectively. Here, we adopt the recently proposed deep concept...
This paper focuses on the intra frame rate control of H.264/AVC High Profile and introduces a new frame gradient-based rate control algorithm. In this algorithm, a rate-gradient-quantization parameter model with frame gradient employed as frame complexity is proposed. Then, a proportional feedback scheme, along with an adaptive optimization method, is presented to achieve constant bitrate. Rigorous...
In this paper, two compression mechanisms based on 3D-Discrete Wavelet Transform (DWT) and 2D Embedded Zero Wavelet (EZW) are compared depending on the mathematical parameters Peak Signal-to-Noise Ratio (PSNR) and compression ratio(CR). In this paper, we are using Haar wavelet decomposition for compression, as it has shown improved compression in recent years when used with the techniques like EZW,...
The recent image/video coding standards adopt a full quad-tree structured block partitioning with a number of different transform sizes. However, the statistical behavior of the transformed coefficients becomes more difficult to estimate than the previous standards while the single pdf might be enough for modeling the distribution in the previous standards. In this paper, we propose a novel probability...
Github facilitates the pull-request mechanism as an outstanding social coding paradigm by integrating with social media. The review process of pull-requests is a typical crowd sourcing job which needs to solicit opinions of the community. Recommending appropriate reviewers can reduce the time between the submission of a pull-request and the actual review of it. In this paper, we firstly extend the...
Network Coding has significantly improved the achievable throughput and robustness compared to traditional store-and-forward transmission paradigm. However, network coding-enabled networks are susceptible to pollution attack where a small number of polluted messages will propagate in recoding and corrupt bunches of legitimate messages. Recently, several light weight Homomorphic Message Authentication...
Due to the explosive growth of multimedia content (especially videos) over the Internet, content-centric networking (CCN) is proposed to remit the problems of modern bandwidth-intensive Internet usage patterns. Additionally, the current streaming media coding is designed for video service for IP networks. However, there are few researches who concentrate on efficient streaming media coding for the...
In this paper, a new linear decompress or is presented. A specific two-step encoding is incorporated in the implication process to exploit the degree of freedom during ATPG. The proposed decompress or achieves on average 247X test application time reduction for 10 industrial cores. A comparison with multiple seeds per pattern shows that the proposed decompress or achieves higher test application time...
In 1994 the QED Manifesto described an ideal whereby mathematics is communicated via a computerized system in a fully formalized fashion complete with automatic proof checking and other derived tools facilitating profound improvements to the way mathematics is taught, the way new results are disseminated, and ultimately to how mathematics is practiced. Two decades later it is safe to say the dream...
LDPC (Low Density Parity Check) is a channel coding technique is used to correct errors so that the validity of a data transmission on the noise transmission channel guaranteed for accuracy. LDPC is suitable for applications that require a large bandwidth, high reliability, and high noise channel like DVB-S2 (Digital Video Broadcast-Satellite) application. Despite the high level of complexity, LDPC...
A new algorithm, IP traceback algorithm based on deterministic linear network coding (DLNC) is proposed. The new algorithm applies the deterministic linear network coding to the probabilistic packet marking algorithm. Theoretical analysis and simulation in NS2 environment show that the new algorithm reduces the amount of packet needed to reconstruct the attack path, improves the computational complexity...
A lossy hyperspectral image compression method is proposed using online learning based sparse coding. The least number of coefficients are obtained to represent hyperspectral images by applying the sparse coding algorithm which is based on a dicriminative online dictionary learning method. Results indicate that a pre-analysis of the number of non-zero dictionary elements may help in improving the...
We will define two models of error-detecting codes based on quasigroups of arbitrary order. For some special cases of these two models we provide experimental results for the probability of undetected errors if a given quasigroup of order 4 is used for coding. At the end, we will compare the considered special cases.
Cloud computing the newly emerged service oriented paradigm, has changed IT industry significantly. Virtualization is the main technique to empower cloud computing by separating compute environments from the actual physical infrastructure and creating virtual machines (VMs). Mapping of these virtual machines to the physical servers is called virtual machine placement problem and known to be NP hard...
The model of hypothetic biotechnical 2D natural neuron system for images recognition is presented. Results of real biophysical experiments with transmembrane electrical current registration and fluorescent neuronal markers usage were put on the base of this model.
This paper presents a study about how efficient implementation of software changes helps students to better understanding of programming techniques and algorithms. The study is performed during last three years on first year students, considering applications classes for two first year courses: computer programming part I and part II. There are taken into account some partial results during the semester,...
A scaling technique is proposed to maintain the decoding failure probability of Vector Symbol Decoding (VSD) with the increase in data rate. Specifically, the symbol size must be increased in the same ratio as the data rate. VSD is attractive since it allows for a very flexible scaling. This paper also presents a way to compute the optimal maximum number of syndromes to minimize the complexity of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.