The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We investigated the performance of the IEEE 802.1AS time synchronization protocol and its usage in in-vehicle networks by assessing the precise time synchronization mechanisms, such as offset correction, rate correction and the automatic optimal sync message period. In particular, this paper presents a method for adjusting the optimal synchronization message period to achieve high-precision time synchronization...
Wireless sensor networks (WSNs) powered by energy harvesting is a promising technology for monitoring and diagnostic systems in smart grid. However, the limitation and instability of harvesting energy leads to the requirement of high energy-efficient time synchronization algorithms for WSNs. In this paper, in order to minimize the energy consumption, we propose an improved hybrid time synchronization...
Raster scanning is a method for producing or recording a video or a digital image by means of a line-by-line sweep. The scanning process basically transforms a 2D image representation into a 1D representation. While such process has been extensively used for data transmission and storage as well as in most image displaying and capturing devices, its application to Digital Elevation Models (DEM) research...
This paper proposes a real-time data compression and adapted protocol technique for wide-area measurement systems (WAMS). The compression algorithm combines exception compression (EC) with swing door trending (SDT) compression. The compression logic is designed to perform this algorithm in real time. Selection of compression parameters and data reconstruction are presented. An adapted protocol is...
In this paper, we propose a method for estimating message diffusion dynamics in epidemic broadcasting called DIFER (Diffusiveness Inference From Epidemic broadcasting Records). Information diffusion in epidemic broadcasting is affected by several factors such as node mobility and the algorithm for epidemic broadcasting. In the literature, properties of epidemic broadcasting have been investigated...
This paper deals with automatic systems for image recipe recognition. For this purpose, we compare and evaluate leading vision-based and text-based technologies on a new very large multimodal dataset (UPMC Food-101) containing about 100,000 recipes for a total of 101 food categories. Each item in this dataset is represented by one image plus textual information. We present deep experiments of recipe...
Detecting the text in natural scene images is often challenging due to the complexity and variety of text's appearance and its interaction with the scene context. In this paper, we present a novel hierarchical text detection method exploiting textual characteristics at both character and text line scales for improved accuracy. First, seed candidate characters are detected with discriminative deep...
This paper presents the design and implementation of a novel user-initiated indoor localization system called QiLoc. QiLoc is a simple yet effective way to accurately locate and identify occupants of Qi-compatible devices inside buildings. The system is composed of QiLoc Stations and a QiLoc Server. A QiLoc Station is usually embedded inside or under a desk/table. By using the Qi wireless charging...
In software engineering, error impact analysis consists in predicting the software elements (e.g. Modules, classes, methods) potentially impacted by a change. Impact analysis is required to optimize the testing effort. In this paper we present a new protocol to analyze the accuracy of impact analysis. This protocol uses mutation testing to simulate changes that introduce errors. To this end, we introduce...
Accurate and timely traffic classification is a key to providing Quality of Service (QoS), application-level visibility, and security monitoring for network operations and management. A class of traffic classification techniques have emerged that apply machine learning technology to predict the application class of a traffic flow based on the statistical properties of flow-features. In this paper,...
This paper investigates the problem of fine-grained face verification under unconstrained conditions. For the conventional face verification task, the verification model is trained with some positive and negative face pairs, where each positive sample pair contains two face images of the same person while each negative sample pair usually consists of two face images from different subjects. However,...
In remote display protocols, screen image compression plays an important role to improve quality of experience (QoE) of users and reduce the bandwidth consumption. Not all image elements on the display have the same type, so it is wise to apply a screen image classification for compression decision. In this paper, we propose a novel efficient approach for screen image classification that separate...
In this paper we present the results of our recent study on comparing the emotion expression recognition abilities of children diagnosed with high functioning Autism (ASD) with those of typically developing (TD) children through use of a humanoid robot, Zeno. In our study we investigated the effect of incorporating gestures to the emotion expression prediction accuracy of both child groups. Although...
Human-swarm interaction (HSI) is a developing field of research in which the problem of gesture-based control has been attracting an increasing attention, being at the same time a natural form of interaction and an effective way to point and select individual or groups of robots in the swarm. Gesture-based interaction usually requires vision-based recognition and classification of the gesture from...
The de facto implementation of Software Defined Networking (SDN), i.e., OpenFlow, only parses L2-L4 headers, which limits the use of SDN to employ control intelligence in application layer. In this paper, we advocate content parsing to empower SDN with finer grained control ability over traffic. Specifically, we propose a scalable content parser, called COPY, to identify and parse application layer...
Throughout browsing the web or running applications on a wireless network, user's private information should be hidden from other users. Private information may include the visited websites, downloaded files, chatting messages or any other web or network activities. Therefore, several encrypting protocols (such as: IPsec, TLS, SSL, etc.) and privacy mechanisms (such as: SSH and Tor) have been introduced...
Traditional network monitoring involving packet capturing or flow sampling has many challenges such as scalability, accuracy and availability of processing resource when networks become large-scale, high-speed and heterogeneous. SDN is a promising approach to address these challenges, but each SDN switch has it's own capacity limitation, such as it's cache memory called TCAM, and thus it needs coordination...
Time synchronization provides an essential service for wireless sensor networks. In this paper, we present a new synchronization algorithm which is based on average time synchronization in two-way message exchanges. Firstly, the proposed algorithm does not rely on any reference (or root) nodes, therefore, is totally distributed, asynchronous, robust to node failure or changes of network topology....
According to such problems as acquisition terminal and smart meter's real-time deviation is large which has lead to TOU power price and ladder power price policy difficult to successfully implement in electricity information acquisition system, this paper has applied GPS clock synchronization technology and PTP clock synchronization technology in electricity information acquisition system's simulation...
Brain Computer Interfaces enable people with disability to access computer technology, when traditional modes are beyond their ability. This novel technology, uses brain waves to initiate the software, enabling people with acquired brain injury (ABI) to access applications for eHealth and eInclusion. This paper reports on the outcome of research with target end users and a control population to develop...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.