The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cooperative regenerating codes are a class of codes that enable a data collector to reconstruct the original data by connecting to a subset of storage nodes, and also can repair multiple failed nodes by downloading data from the surviving nodes and exchanging data among the new nodes. In cooperative regenerating codes, there exists a tradeoff between the storage size of each node and repair-bandwidth...
Detection and localization of Partial Discharge (PD) accurately has become an increasingly important topic for researchers in High Voltage (HV) system. PD measurement helps in condition monitoring of the total power system utilities with minimal expenditure, as it acts as an evidence to fault detection prior to outage. For complex power distribution systems, it is also very essential to locate PD...
In this paper, we introduce a fast, secure and robust scheme for digital image encryption using chaotic system of Lorenz, 4D hyper-chaotic system and the Secure Hash Algorithm SHA-1. The encryption process consists of three layers: sub-vectors confusion and two-diffusion process. In the first layer we divide the plainimage into sub-vectors then, the position of each one is changed using the chaotic...
Image encryption plays a crucial role in modern day secure multimedia communication. Confusion and diffusion are the two important mechanisms to encrypt the images employed in most of the image encryption schemes. In this paper, a grayscale image encryption method has been proposed with the confluence of Linear Feedback Shift Register (LFSR), Cellular Automata (CA) and hardware generated synthetic...
In this paper the using of methods of assessment entropy of signals for data transmission systems is given. The special processors developed with using of this methods allow optimization of signal processing algorithms.
The evaluation dependencies of the high-speed parallel ADC hardware, time, structural and functional complexity on the range of the output signal quantization and binary codes capacity were received. The prospects of mass production and use of this type of ADC in digital equipment and microelectronic technology were shown.
In complex systems significant information about their inherent dynamics is hidden in the interactions between the system components and thus the analysis of the mutual information is essential for providing a better understanding of the principles underlying the system behavior. We focused on four different methods to assess the mutual information such as phase synchronization analysis; time delay...
A novel procedure to detect Interstitial Lung Disease (ILD) with High Resolution Computed Tomography (HRCT) images is proposed. Seven texture measures from a selected slice of HRCT lung image of fifteen ILD cases, fifteen non-ILD cases and fifteen healthy individuals were obtained and their pairwise correlation calculated. Two groups of texture measure obtained from standard clustering procedure were...
In this note, we extend the notion of Ollivier-Ricci curvature on weighted graphs with all positive weights to the case in which the weights may also be negative. This is done by employing the Hahn-Jordan decomposition of signed measures, allowing us to extend the Earth Mover's Distance to an extended class of measures. The resulting curvature will be utilized to study the robustness properties of...
Neurons forms interconnected networks to process information. In brain such networks are implemented for the purpose of computation or decision making. Neuron cultures on Multi Electrode Array gives advantage to study the network topology of network of neurons as it facilitates recording from population of neurons. Spike train recorded from the dish is used for analysis of the information content...
In this work, we presented an approach based on Rakaposhi system for securing digital information. The approach is developed to encrypt and decrypt digital information. A gray level image, speech data saved as .wav and text file recorded as .txt are taken to validate the proposed approach. The approach is easy and highly efficient. Some tests are performed to validate the performance of the proposed...
Scan registration is the fundamental of several advanced 3D data processing techniques, and the majority of existing global registration methods depend on explicit features. This paper presents a global feature-less scan registration strategy based on the Spherical Entropy Image (SEI) and the Generalized Convolution Theorem. The structure of the scan is described by a spherical function named SEI...
Nowadays, with the exponentially growth of information, more and more recommendation systems are used for commercial purpose. Among all kinds of recommendation systems, Collaborative Filtering-based Recommender is the most popular one. It is used in a wide range of music recommendation systems and its accuracy is pretty high. However, it is hard for this kind of recommender to find novel things. In...
Climate is an important contributing factor in the outbreak and spread of dengue fever because it strongly affects the density and distribution of the mosquitoes that carry dengue. However, dengue forecasting models based solely on local weather factors have had limited success. Hence, this paper proposes a novel dengue outbreak detection method that relies on delay permutation entropy (DPE) features...
In this paper, we present a novel thermodynamic framework for graphs that can be used to analyze time evolving networks, relating the thermodynamics variables to macroscopic changes in network topology, and linking major structural transition to phase changes in the thermodynamic picture. We start from a recent quantum-mechanical characterization of the structure of a network relating the graph Laplacian...
User number prediction in cell phone base station is a very important problem for cell phone communication system design and base station location selection. Recent years, we have witnessed the encouraging potentials of deep neural networks for real-life applications of various domains. User number prediction, however, is still in its initial stage. In this paper, we propose a wavelet-based stacked...
Measuring the amount of dependency among multiple variables is an important task in pattern recognition. In the last few years, many new dependency measures have been developed for the exploration of functional relationships. In this paper, we develop a dependency measure between variables based on an extreme-value theoretic treatment of intrinsic dimensionality. Our measure identifies variables with...
Security of multimedia data becomes an obligation, due the increasing use in smart embedded systems and other domains such as medical industrial and engineering applications. In this paper, we propose a fast, secure and light weight scheme for digital image encryption based on nested chaotic attractors using the Secure Hash Algorithm SHA-1 using only two-diffusion process. The results of security...
In big cities, taxi service is imbalanced. In some areas, passengers wait too long for a taxi, while in others, many taxis roam without passengers. Knowledge of where a taxi will become available can help us solve the taxi demand imbalance problem. In this paper, we employ a holistic approach to predict taxi demand at high spatial resolution. We showcase our techniques using two real-world data sets,...
A large part of unoccupied licensed spectrum can be vital for many applications and can be accessed opportunistically by Cognitive Radio. Cognitive Radio serves to be a framework for forthcoming 5G communication systems and therefore, extensive research is being carried out in its different domains. The task of sensing spectrum should be efficient and reliable to avoid interference between licensed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.