The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Internet of Things (IoT) connects smart objects so they can share information in a network to provide context-sensitive services. The amount of shared information will increase, likely dramatically, as more and more smart objects join the network and disseminate their contextual information. In this paper, we explain how smart IoT devices can share a large amount of context information using much...
Cryptography is necessary in every field of IT applications; security is required in every minor field that helps in stopping the understanding of the data that is encrypted. In this research, we are trying to implement an encryption technique that is very light and yet strong enough to secure large amount of data being transferred in the network. This does not require a key that has to be randomly...
Multipath TCP (MPTCP) is a promising extension of TCP to spread data across several subflows enabling multiple path support. Like TCP, MPTCP suffers from performance degradation when deployed in wireless networks. It tends to interpret random link losses as congestion signals. Yet, the protocol is showcased for handheld devices with multiple radios to enable throughput aggregation and seamless handover...
360° video streaming to clients using Virtual Reality head mounted displays is a challenge for traditional video delivery. As transmission of the complete content in a desirable quality sacrifices a large fraction of available client and network resources, adaptivity to the user viewport promises substantial benefits. An efficient way to achieve viewport adaptive streaming without per-user or per-orientation...
In this work, we consider a variant of the set reconciliation problem where the estimate for the size of the symmetric difference may be inaccurate. Given this setup, we propose a new method to reconciling sets of data and we then compare our method to the Invertible Bloom Filter approach proposed by Eppstein et al. [2].
This case study is about the introduction of computer science to girls in an all-girl environment. Due to the lack of women in technology, many efforts are being made to expose girls to computer programming at an early age. Code camp organizers are using the all-girl model to help put participants more at ease and boost their computing confidence. High computer self-efficacy leads to studying computer...
Deep learning is a hot research topic at home and abroad. In view of the massive 3D model data, a 3D model identification method based on topographic sparse coding is proposed. Firstly, the 3D model is projected to get its three views, and the feature vector is used as the training sample. A complete dictionary is constructed by using the greedy algorithm to train the dictionary, which makes the normal...
In search of extensive security for data gave an idea of developing a methodology; such as the one that when tried to unwrap can never get exposed. In this research, data security is done in two methods; alphabetical encoding along with DNA operations, then Position weight matrix is calculated on the original data. The advantage of alphabetical encoding is that each alphabet and characters are mapped...
Cyber crime is the biggest shortcoming in this fully connected internetworking world. Third party attacks, phishing by intruder like hackers are always active to leak official, personal or legislative information in the form of a message using this public networks. This is why we call for Steganography where the sneaky message has been hiding the data/information firmly. Steganography is one of the...
To cope with the significant computational complexity introduced by High Efficiency Video Coding (HEVC) standard, several parallelization schemes are introduced, such as Tiles, Wavefront parallel processing(WPP) and Dependent slice segments. These coding structures make multi-core processing possible. In this paper, we analyzed the degree of parallelism WPP can achieve and then proposed a multi-threaded...
A lot of research shows that network coding can significantly improve the performance of multi-cast transmission. However, due to the inherent disadvantage of network coding, it is very vulnerable to pollution attacks in which adversaries can inject bogus data. Moreover, those bogus data will be used with legitimate data at the downstream nodes, resulting in the failure of decoding original data as...
In the airline industry, a Passenger Name Record (PNR) stores the travel itinerary of an individual or group of passengers travelling together. A PNR always contains all the flight information regarding each segment of a journey, and may contain additional important information such as nationality, gender and age of the passengers. From a commercial point of view, these passenger attributes are of...
Access latency is a crucial performance metric in distributed storage systems as it greatly impacts user experience, especially for hot data visitors. Existing papers argue that coding can reduce access latency compared with the replication method, and many dispatch schemes, such as those implementing redundant requests, dynamically changing code rates, and so on, are proposed and proved to work well...
Network coding is becoming a very important technology to improve the reconstructing performance of distributed storage systems due to its high reliability and low redundancy. Update is a typical and important operation involved in the network-coding-based systems. However, the overhead incurred by the update operation has a significant impact on the system performance. Traditionally, the small updated...
We present a distributed and asynchronous versioning mechanism (DAVM) in this paper to identify consistent replicas for each encoding block in BW-RAID, which uses "mirroring and RAID4" encoding scheme to improve the system performance and disk space utilization. DAVM has three advantages: Firstly, it is distributed and asynchronous in management. Secondly, it is correct and workable in any...
A distributed system's interconnection structure emerges as a pattern in the system matrices. This pattern must be preserved through system analysis and control synthesis, and much has been written on these topics. A problem which has not received any attention to date is how to identify a pattern, given the linear system model. This paper proposes a method for identifying a pattern that is mathematically...
Smart grid (SG) is an efficient technology for electrical power distribution and management by incorporating two-way communications between utilities and customers. The versatile features of cognitive radio (CR) technology meet the requirements of SG communication and have drawn much attention. In this paper, we study the On-Demand cognitive radio communication for SG. Our contributions includes two...
In this paper, we introduce a new color texture operator for natural texture classification, the Dominant and Minor Sum and Difference Histograms (DM-SDH) descriptor. The proposed approach allows to incorporate both color and texture information in order to enhance the texture discrimination performance. For this purpose, a vectorial representation of the image is used for the descriptor extraction...
On the one hand, Constraint Satisfaction Problems (CSP) are a declarative and expressive approach for modeling problems. On the other hand, propositional satisfiability problem (SAT) solvers can handle huge SAT instances up to millions of variables and clauses. In this article, we present an approach for taking advantage of both CSP modeling and SAT solving. Our technique consists in expressively...
On the one hand, Constraint Satisfaction Problems (CSP) are a declarative and expressive approach for modeling problems. On the other hand, propositional satisfiability problem (SAT) solvers can handle huge SAT instances up to millions of variables and clauses. In this article, we present an approach for taking advantage of both CSP modeling and SAT solving. Our technique consists in expressively...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.