Sfoglia per Soggetto "Electronic"
Items 1-20 di 24
-
Application of fuzzy cognitive maps for cotton yield management in precision farming
(2009)The management of cotton yield behavior in agricultural areas is a very important task because it influences and specifies the cotton yield production. An efficient knowledge-based approach utilizing the method of fuzzy ... -
Asymptotic Laws for Joint Content Replication and Delivery in Wireless Networks
(2013)We investigate the scalability of multihop wireless communications, a major concern in networking, for the case that users access content replicated across the nodes. In contrast to the standard paradigm of randomly selected ... -
Capacity and Stable Throughput Regions for the Broadcast Erasure Channel With Feedback: An Unusual Union
(2013)We consider a source node broadcasting to two receivers over a general erasure channel with receiver feedback. We characterize the capacity region of the channel and construct algorithms based on linear network coding ... -
CIPHER BLOCK BASED AUTHENTICATION MODULE: A HARDWARE DESIGN PERSPECTIVE
(2011)Message Authentication Codes (MACs) are widely used in order to authenticate data packets, which are transmitted thought networks. Typically MACs are implemented using modules like hash functions and in conjunction with ... -
A comparison of centralized and distributed meta-scheduling architectures for computation and communication tasks in Grid networks
(2009)The management of Grid resources requires scheduling of both computation and communication tasks at various levels. In this study, we consider the two constituent sub-problems of Grid scheduling, namely: (i) the scheduling ... -
Detecting and Preventing Machine-to-Machine Hijacking Attacks in Cellular Networks
(2012)Machine-to-machine (M2M) communications are increasingly popular over cellular networks, due to their unlimited potential and the low cost of deployment. As a result, M2M infrastructures are attractive targets to attackers. ... -
An efficient Recommendation System based on the Optimal Stopping Theory
(2014)A Recommendation System (RS) aims to deliver meaningful recommendations to users for items (e.g., music and books), which are of high interest to them. We consider an RS which directly communicates with a set of providers ... -
Enhancing principal direction divisive clustering
(2010)While data clustering has a long history and a large amount of research has been devoted to the development of numerous clustering techniques, significant challenges still remain. One of the most important of them is ... -
Evaluating an intelligent diagnosis system of historical text comprehension
(2003)This work aims to present and evaluate a Fuzzy-Case Based Reasoning Diagnosis system of Historical Text Comprehension. The synergism of fuzzy logic and case based reasoning techniques handles the uncertainty in the acquisition ... -
Exploiting wireless channel, state information for throughput maximization
(2004)We consider the problem of scheduling packets over channels with time-varying quality. This problem has received a lot of attention lately in the context of devising methods for providing quality of service in wireless ... -
Exploring new search algorithms and hardware for phylogenetics: RAxML meets the IBM cell
(2007)Phylogenetic inference is considered to be one of the grand challenges in Bioinformatics due to the immense computational requirements. RAxML is currently among the fastest and most accurate programs for phylogenetic tree ... -
Group Authentication: A New Paradigm for Emerging Applications
(2012)Traditional secure registration protocols rely on client-server authentication procedures. This concept has been extended to support single client registration to multiple servers, using single sign-on protocols. In this ... -
High performance, low complexity cooperative caching for wireless sensor networks
(2011)During the last decade, Wireless Sensor Networks have emerged and matured at such point that they currently support several applications such as environment control, intelligent buildings, target tracking in battlefields. ... -
Industry performance evaluation with the use of financial ratios: An application of bootstrapped DEA
(2012)In data envelopment analysis (DEA) context financial data/ratios have been used in order to produce a unified measure of performance metric. However, several scholars have indicated that the inclusion of financial ratios ... -
A Multiscale Error Diffusion Technique for Digital Multitoning
(2012)Multitoning is the representation of digital pictures using a given set of available color intensities, which are also known as tones or quantization levels. It can be viewed as the generalization of halftoning, where only ... -
Multiuser Broadcast Erasure Channel With Feedback-Capacity and Algorithms
(2013)We consider the N-user broadcast erasure channel with unicast sessions (one for each user) where receiver feedback is regularly sent to the transmitter in the form of ACK/NACK messages. We first provide a generic outer ... -
Optimal deployment of large wireless sensor networks
(2006)A spatially distributed set of sources is creating data that must be delivered to a spatially distributed set of sinks. A network of wireless nodes is responsible for sensing the data at the sources, transporting them over ... -
Optimal overload response in sensor networks
(2006)A single commodity network that models the information flow in an arbitrary topology sensor field that collects and forwards information to a backbone through certain designated gateway nodes is considered. Resilient ... -
Refinement of human silhouette segmentation in omni-directional indoor videos
(2014)In this paper, we present a methodology for refining the segmentation of human silhouettes in indoor videos acquired by fisheye cameras. This methodology is based on a fisheye camera model that employs a spherical optical ... -
Secure Enablement of Real Time Applications: A Novel End-to-End Approach
(2012)The Internet has evolved into a multi-service Internet Protocol (IP) network with support for various types of traffic, including multimedia. Given the relatively open nature of IP networks, securely enabling multimedia ...