The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the further development and utilization of space resource, space communications nowadays are increasingly becoming irreplaceable networking technologies for highresolution earth observation, satellite navigation and deep space exploration where big data is produced. This has created great challenges in ensuring the security and reliability of some sensitive data. In order to solve some problems...
We study a secure communication scenario in which the channel is under two classes of attacks at the same time: a passive eavesdropper and an active jammer. This scenario is modelled using the arbitrarily varying wiretap channel (AVWC), in which the channel varies from one channel use to the other. It has been shown that in general reliable communication over AVWCs requires some sort of coordination...
We study the data reliability problem for a community of devices forming a mobile cloud storage system. We consider the application of regenerating codes for maintaining a file within a geographically-limited area. Such codes require lower bandwidth to regenerate lost data fragments compared to file replication or reconstruction. We investigate threshold-based repair strategies where data repair is...
In this paper, we analyze the performance of a single-relay network in which the reliability is provided by means of Random Linear Network Coding (RLNC). We consider a scenario when both source and relay nodes can encode packets. Unlike the traditional approach to relay networks, we introduce a passive relay mode, in which the relay node simply retransmits collected packets in case it cannot decode...
In this paper, we examine message prioritization in terms of both rate and reliability in the two-way relay channel using decode-forward relaying. Each source sends both a low priority message and a high priority message. We design a scheme that routes the high priority messages through the relay and direct link but the low priority message is only decoded by the destination. For fixed message priorities,...
The encroachment of technology grading — smaller dimensions, higher consolidation densities, and lower berth operating voltages — has come to a level that reliability of memory is put into jeopardy. Hence a novel approach is proposed to overcome this multiple cell upsets using error correction coding techniques. Recently, matrix computer code (MCs) based on senses of hamming codes have been proposed...
Construction engineering is considered as a complex network system project. By analyzing the relationship of construction costs and reliability in engineering project, a mathematical model is established to optimize the costs and genetic algorithm (GA) is used for this purpose. In the application of GA, penalty function is used to handle the constraint. Ranking based on the evaluation function and...
In this paper, we propose a Fragmentation-based Multipath Routing (FMR) model for Software Defined Networks (SDNs) to enable attack-resilient data transfer. With the use of erasure encoding to fragment a message, the fragments are routed along multiple paths such that no intermediate node receives enough fragments required for message decoding. This ensures that, any intruder on a compromised node...
Speech signal processing is being increasingly explored in health domains given both its centrality as a behavioral cue and the promise of robust, automated analysis of data at scale. We discuss general issues in health-related speech research. We further highlight two health applications we have undertaken: addiction counseling and autism spectrum disorder. Methods range from deep supervised learning...
A novel approach to design capacity-approaching variable-length constrained sequence codes has recently been developed. A critical step in this design process is the construction of minimal sets based on a finite state machine description of the encoders. In this paper we propose three generalized criteria to select the state that will result in construction of the minimal set with the best achievable...
Cognitive radio technology aims to meet the demand for higher data rates in wireless communications by allowing secondary users to opportunistically locate and utilize otherwise under-utilized spectrum resources [1]. This paper focuses on the cases when a secondary user monitors the occupancy of frequency subbands by using a multiband spectrum sensing approach in which multiple frequency subbands...
Providing a high level of information reliability is one of the most important problems of digital data transmission systems synthesis for various applications. The paper suggests the theoretical foundations of communication channel model based on a code signal feature (CSF). The encoding and decoding algorithms using CSF models are proposed that allows one to increase the information reliability...
This study aims to address how change agents assist engineering instructors in adopting new curriculum. During a two-day workshop, 16 mechanics of materials instructors from community colleges and universities around the Pacific Northwest developed hands-on activities and models that they later implemented in their classrooms. Five additional instructors became interested in the materials developed...
In this paper, we propose a new improved algorithm to reduce the decoding complexity of NB-LDPC codes especially when the number of iteration is large. The proposed algorithm is based on the extended min-sum (EMS) which truncates the message vectors and trellis-based EMS (T-EMS) which employs the trellis representation. Our modification of EMS introduces the thresholds to further truncate the incoming...
In large scale data centers, with the increasing amount of user data, Triple Disk Failure Tolerant arrays (3DFTs) gain much popularity due to their high reliability and low monetary cost. With the development of cloud computing, scalability becomes a challenging issue for disk arrays like 3DFTs. Although previous solutions improves the efficiency of RAID scaling, they suffer many problems (high I/O...
The systematic polar codes under successive cancellation list (SCL) decoding suffers from very high time and space complexity when list size becomes larger. Aimed at getting the tradeoff between error performance and algorithm complexity, a practical CRCs-ADSCL(Adaptive SCL) decoding scheme is proposed for systematic polar codes, in which CRC values will be held by the bit-pair arrays in the decoding...
We consider a communication scenario in which the channel undergoes two different classes of attacks at the same time: a passive eavesdropper and an active jammer. This scenario is modeled by the concept of arbitrarily varying wiretap channels (AVWCs), in which the channel varies from one channel use to the other in an unknown and arbitrary manner. It has been shown that uncorrelated codes fail to...
The negative secrecy capacity case is an important problem for secure wiretap channel polar coding, however former polar coding schemes have not considered this negative case because physical layer channel coding cannot achieve a positive secrecy rate under this condition. In this paper, a chaos embedded polar coding scheme is proposed which can achieve a positive secrecy rate for wiretap channel...
In this paper, we present our prototype system which supports coding of mapping-enhanced SPARQLoid queries for users by providing recommendation mechanisms for both vocabularies and endpoints. Our prototype system aims for reducing the cost for eliciting appropriate ontology mappings and the mapped vocabularies. Furthermore, to make the recommendation of vocabularies and endpoints be widely covered,...
In this article deals with estimating and analysis capacity of the closed video channel in the case of applying the method for processing video data based on standardized MPEG technology, the method for closing the video based on the series circuit (compression followed by encryption), the method to hide all the video after the DCT blocks of the base of the video frame, the method based on the selection...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.