The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Large service providers (SP) who own their computing, storage, and networking resources have the potential to jointly manage their resources to achieve better quality of service and lower cost. Information-centric networking (ICN) exploits in-network caching resource, by unique identification of content objects. Orchestrating cache and networking resources in a coordinated way is the key to the success...
This paper includes the discussion about the principle of working, performance investigation and simulation of FPGA controlled three-level diode clamped inverter, which is fed by solar PV based DC bus. DC bus was created with the help of solar PV modules and charge controller to feed DC loads directly or AC loads indirectly through proposed three-level inverter. FPGA based three-level inverter was...
A new successive displacement type load flow method is developed in this paper. This algorithm differs from the conventional Y-Bus based Gauss Seidel load flow in that the voltages at each bus is updated in every iteration based on the exact solution of the power balance equation at that node instead of an approximate solution used by the Gauss Seidel method. It turns out that this modified implementation...
We consider a cooperation among nodes in a network which aim to reconstruct a common broadcast message. Distributed estimation algorithms are highly suited for such a scenario. Nevertheless, communication overhead due to an exchange of variables among nodes can be problematic concerning energy efficiency and costs. In this paper, we present a Reduced Overhead Distributed Consensus-based Estimation...
Attempts by the research community to meet expectations arising from future Internet systems, and specifically to provide Quality of Service (QoS) for multimedia multi-user sessions, have resulted in mechanisms such as MultiUser Aggregated Resource Allocation (MARA). Its results have been promising, mainly because it drastically reduces signaling and processing overhead, despite its limitations in...
Social networks facilitate information sharing and communication among people who have common interests. Although social networks have been widely used to compute the reputations of Web services, they are limited in the ability to support the sophisticated estimation of service reputations. This paper proposes a sophisticated method of computing service reputations, which considers service requesters,...
The increase in the amount of digital data transferred between contents Servers and Clients in a network causes problems created by congestion when downloading big web files, streaming media, etc. Content Delivery Networks (CDNs) are introduced to overcome such problems by redirecting the Clients request to the nearest Server. However, as the number of people accessing Internet increases rapidly,...
This paper reviews sensor selection methods for distributed detection, distributed estimation and distributed tracking in wireless sensor networks. Before the discussion of different sensor selection methods, brief introductions of distribution detection, distribution estimation and distributed tracking are presented respectively. Future research directions are also given to facilitate further research...
Image Matting is the key technology in image processing, video editing, and film-making applications. With the fast development of modern information technology, image matting has gained increasing interests from both academic and industrial communities. So what is Image Matting? And, What's the Role of Image Matting in Image Segmentation? In this paper, we will try to give a comprehensive and constructive...
This paper presents a novel image haze removal approach from single image. In the algorithm, the constant albedo and dark channel prior methods are combined to represent the transmission model of hazed image. And then, the watershed segmentation approach is introduced to decompose the input image into some gray level consistent areas. Compared with traditional fixed image partition schemes, better...
A common technique employed to eliminate switching harmonics is programmed SHE (Selective Harmonic Elimination) which requires the solution of a set of nonlinear equations. Typically, the method calculates the switching angles for each modulation depth offline using iterative computations and programmed into a digital processor. These values are recalled on a need basis for a particular application...
Security management requires quantitative security metrics in order to effectively distribute limited resources and justify investments into security. The problem is not only to select the right security metrics but also to be sure that the selected metrics correctly represent security strength. In this paper, we tackle the problem of formal analysis of different quantitative security metrics. We...
The high computational complexity and great memory requirement prevent the SIFT algorithm from being processed realtimely. The block-parallel SIFT algorithm with boundary extension adopted by existing researches suffers from redundant storages or extra communications to process the boundaries of partitions. The block-parallel SIFT algorithm without boundary extension (pSIFT-noBE) can spontaneously...
This paper presents a novel control approach based on time delay concept for buck DC-DC converter control and implementation. Time delay control is effective and useful for the voltage tracking of the buck DC-DC converter that exhibits inherent state variable variations under disturbance. To prove the voltage tracking performance improvement of the proposed method, a conventional model predictive...
This paper presents an unsigned truncated recursive multiplier architecture based on the variable correction method. The proposed design can be partitioned to perform as one N-bit fixed width multiplier or as two N/2-bit full precision multipliers. Design targets single level recursive multiplier architecture. Exhaustive analysis was carried out to calculate the maximum error bound in case of truncated...
The task of removing rain is of great significance for outdoor vision systems such as video surveillance, vision based navigation and so on. Rain produces complex time varying intensity fluctuations in images or videos, which seriously reduce the performance of outdoor vision systems. Due to similar visual appearances of rain and moving objects, the current rain removal algorithms cannot easily distinguish...
Wireless sensor networks (WSNs) composed of large numbers of sensor nodes to monitor the environment and collect data. Self-organization of sensor nodes has been widely investigated to enhance the quality of service provided by WSNs. This paper proposes a Severity based Clustering Algorithm for Emergency (SCAE) for WSNs. The residual energy of nodes and severity of the emergency environment are the...
Extraction of unknown independent source signals from a noisy mixture is a fundamental problem in most signal processing applications. The existing independent component analysis (ICA) algorithms have tackled this problem for complex and real valued mixtures for both super and sub Gaussian sources. However in reality super and sub Gaussian sources exist collectively in a mix. It was observed when...
Modern social networks frequently encompass multiple distinct types of connectivity information; for instance, explicitly acknowledged friend relationships might complement behavioral measures that link users according to their actions or interests. One way to represent these networks is as multi-layer graphs, where each layer contains a unique set of edges over the same underlying vertices (users)...
Hybrid Bond Graph (HBG) is a bond graph-based modeling approach which provides an effective tool not only for dynamic modeling but also for fault detection and isolation (FDI) of switching systems. Efficient algorithms exist for fault detection and isolation based on functional redundancy. In a qualitative approach, this redundancy can be captured by a temporal causal graph (TCG), a directed graph...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.