FileName
stringlengths
17
17
Abstract
stringlengths
163
6.01k
Title
stringlengths
12
421
S0045790615000300
Face detection is one of the most important parts of biometrics and face analysis science. In this paper, a novel multi-stage face detection method is proposed which can remarkably detect faces in different images with different illumination conditions, variety of poses and disparate sizes. The idea is to utilize a pre...
A face detection method based on kernel probability map
S0045790615000312
Mobile Cloud Computing (MCC) augments capabilities of mobile devices by offloading applications to cloud. Resource allocation is one of the most challenging issues in MCC which is investigated in this paper considering neighboring mobile devices as service providers. The objective of the resource allocation is to selec...
Context-aware multi-objective resource allocation in mobile cloud
S0045790615000324
Automated recognition of brain tumors in magnetic resonance images (MRI) is a difficult procedure owing to the variability and complexity of the location, size, shape, and texture of these lesions. Because of intensity similarities between brain lesions and normal tissues, some approaches make use of multi-spectral ana...
Brain tumors detection and segmentation in MR images: Gabor wavelet vs. statistical features
S0045790615000336
Wireless multimedia sensor networks (WMSNs) have been used for sensitive applications such as video surveillance and monitoring applications. In a WMSN, storage and transmission become complicated phenomena that can be simplified by the use of compressed sensing, which asserts that sparse signals can be reconstructed f...
Video Compressed Sensing framework for Wireless Multimedia Sensor Networks using a combination of multiple matrices
S0045790615000348
In this study, a novel single-image based dehazing framework is proposed to remove haze artifacts from images through local atmospheric light estimation. We use a novel strategy based on a physical model where the extreme intensity of each RGB pixel is used to define an initial atmospheric veil (local atmospheric light...
Fast single image haze removal via local atmospheric light veil estimation
S0045790615000506
Critical infrastructures require protection systems that are both flexible and efficient. Flexibility is essential to capture the multi-organizational and state-based nature of these systems, efficiency is necessary to cope with limitations of hardware resources. To meet these requirements, we consider a classical prot...
Password systems: Design and implementation
S0045790615000580
This paper presents a new medical image enhancement method that adjusts the fractional order according to the dynamic gradient feature of the entire image. The presented method can extract the edges of an image accurately and enhance them while preserving smooth areas and weak textures; these improvements can be partic...
Adaptive fractional differential approach and its application to medical image enhancement
S0045790615000592
As a part of character recognition, character segmentation (CS) plays an important role in automatic license plate recognition (ALPR) system. In recent years, lots of methods on CS have been proposed and they work well on their own datasets. However, it is still challenging to segment characters from images with frame,...
A two-stage character segmentation method for Chinese license plate
S0045790615000634
The biometrics, the password and the storage device are the elements of the three-factor authentication. In 2013, Yeh et al. proposed a three-factor user authentication scheme based on elliptic curve cryptography. However, we find that it has weaknesses including useless user identity, ambiguous process, no session key...
A novel and provably secure biometrics-based three-factor remote authentication scheme for mobile client–server networks
S0045790615000646
This study proposes a novel optical fiber sensor (OFS) network using three-dimensional (3-D) wavelength/time/spatial optical code-division multiple-access (OCDMA) scheme. The proposed 3-D modified quadratic congruence/M-matrix (MQC/M-matrix) coding scheme overcome the restriction of single pulse per row inherent in tra...
A study of three-dimensional optical code-division multiple-access for optical fiber sensor networks
S0045790615000658
Backbone nodes are effective for routing in wireless networks because they reduce the energy consumption in sensor nodes. Packet delivery only occurs through the backbone nodes, which depletes the energy in the backbone drastically. Several backbone construction algorithms, including energy-aware virtual backbone tree,...
Randomized fault-tolerant virtual backbone tree to improve the lifetime of wireless sensor networks
S0045790615000683
The increasing costs of healthcare along with the increasing availability of new Personal Health Devices (PHDs) are the ingredients of the connected health vision. Also, a growing number of consumer electronic and mobile devices are becoming capable of taking the role of a health gateway, thus operating as a data colle...
A personal connected health system for the Internet of Things based on the Constrained Application Protocol
S0045790615000695
Ubiquitous environments are often considered as highly dynamic environments and contextual information can change at runtime. The user interface should provide the right information for a given user considering runtime context. Such an objective can be achieved only when we deduce the user’s requirements in terms of in...
A formal approach for modeling context-aware Human–Computer System
S0045790615000701
This paper presents our ongoing efforts toward the development of a multi-agent distributed framework for autonomous control of mobile manipulators. The proposed scheme assigns a reactive agent to control each degree-of-freedom of the manipulator(s), a hybrid agent to control the mobile base, and a supervisory agent to...
Fault-tolerant multi-agent control architecture for autonomous mobile manipulators: Simulation results
S0045790615000713
Traffic accidents are a fact of life. While accidents are sometimes unavoidable, studies show that the long response time required for emergency responders to arrive is a primary reason behind increased fatalities in serious accidents. One way to reduce this response time is to reduce the amount of time it takes to rep...
iBump: Smartphone application to detect car accidents
S0045790615000725
In this paper, we propose a blind color image watermarking scheme based on quaternion discrete Fourier transform (QDFT) and on an improved uniform log-polar mapping (IULPM). The proposed watermarking scheme embeds dual watermarks: one is a meaningful binary image watermark and the other is a bipolar watermark. The form...
Color image watermarking based on quaternion Fourier transform and improved uniform log-polar mapping
S0045790615000750
Recently, audio steganography has become an important covert communications technology. This technology hides secret data in a cover audio without perceptual modification of the cover audio. Most of the existing audio steganography techniques are unsuitable for real-time communication. Although field programmable logic...
Concurrent hardware architecture for dual-mode audio steganography processor-based FPGA
S0045790615000981
Recently, several image encryption algorithms based on DNA encoding and chaotic maps have been proposed, which create a novel direction in image encryption. By a careful examination on most of these image cryptosystems, we find that DNA operators can only influence one DNA base, which leads to poor diffusion. A recent ...
Security analysis on a color image encryption based on DNA encoding and chaos map
S0045790615000993
Representation and reasoning about context information is a main research area in Ambient Intelligence (AmI). Context modeling in such applications is facing openness and heterogeneity. To tackle such problems, we argue that usage of semantic web technologies is a promising direction. We introduce CONSERT, an approach ...
CONSERT: Applying semantic web technologies to context modeling in ambient intelligence
S0045790615001019
A major optimization problem in the synthesis of sequential circuits is State Assignment or State Encoding in Finite State Machines (FSMs). The state assignment of an FSM determines the complexity of its combinational circuit and thus area, delay, testability and power dissipation. Since optimal state assignment is an ...
State assignment for area minimization of sequential circuits based on cuckoo search optimization
S0045790615001032
In this paper, we investigate the achievable bit-error-rate performance (BER) of a transmitter preprocessing (TP)-aided cooperative downlink (DL) multi-carrier code division multiple access system by employing three cooperation strategies. In a multi-user cooperative DL communication, multi-user interference at the rel...
Performance of Relay-Aided Multi-Carrier-CDMA using preprocessing based on quantized feedback
S0045790615001056
This paper addresses the problem of identifying meaningful patterns and trends in data via clustering (i.e. automatically dividing a data set into meaningful homogenous sub-groups such that the data within the same sub-group are very similar, and data in different sub-groups are very different). The clustering framewor...
A hierarchical Dirichlet process mixture of generalized Dirichlet distributions for feature selection
S0045790615001068
Modalities other than GPS need to be employed to localize mobile sensor-node-enabled subjects in indoor conditions. The location of some mobile nodes needs to be computed precisely while this may not be essential for the remaining nodes. We have proposed the concept of graded precision localization which allows mobile ...
Performance evaluation of graded precision localization with sensor networks in indoor spaces
S0045790615001081
Service-oriented architecture (SOA) is a self-contained service with a collection of services. Services communicate with each other using a web service. Web services use a collection of open protocols and standards for communication between different web services and their applications. In today’s environment, users ar...
User preference-based automatic orchestration of web services using a multi-agent
S0045790615001111
Anycast is an important way of communication for Mobile Ad hoc Networks (MANETs) in terms of resources, robustness and efficiency for replicated service applications. Most of the anycast routing protocols select unstable and congested intermediate nodes, thereby causing frequent path failures and packet losses. We prop...
Mobility and QoS aware anycast routing in Mobile ad hoc Networks
S0045790615001123
A Mobile Ad hoc Network (MANET) is an infrastructure-less collection of nodes that are powered by portable batteries. Consumption of energy is the major constraint in a wireless network. This paper presents a new algorithm called Energy-Aware Span Routing Protocol (EASRP) that uses energy-saving approaches such as Span...
A new routing protocol for energy efficient mobile applications for ad hoc networks
S0045790615001135
This research proposes a framework for a real time implementation of a Brain Computer Interface (BCI). This interface is designed with a future objective of providing a testing platform as an interactive and intelligent Image Search and Retrieval tool that allows users, disabled or otherwise, to browse and search for i...
A framework for a real time intelligent and interactive Brain Computer Interface
S0045790615001147
An improved image magnification algorithm for gray and color images is presented in this paper to meet the challenge of preserving high-frequency components of an image, including both image edges and texture structures. In the proposed algorithm, a new edge detection method that uses the well-known Otsu automatic opti...
Improved image magnification algorithm based on Otsu thresholding
S0045790615001159
This article presents a new method for detecting objects on waters’ surfaces using colour elimination based on image erosion with a morphological variable. The proposed object detection method includes definitions of the target’s colour space and colour deviation using Euclidean distance. It also introduces a procedure...
Detection of objects on waters’ surfaces using CEIEMV method
S0045790615001238
Key distribution is required to secure e-health applications in the context of Internet of Things (IoT). However, resources constraints in IoT make these applications unable to run existing key management protocols. In this paper, we propose a new lightweight key management protocol. This protocol is based on collabora...
An end-to-end secure key management protocol for e-health applications
S0045790615001251
This study develops a hierarchical scheme with three processing layers for human behavior recognition. The proposed scheme is an audio-based approach that employs a microphone array of the Kinect sensor for sensing and acquiring acoustic data to classify human behavior. The three processing layers, namely the feature l...
Three-layered hierarchical scheme with a Kinect sensor microphone array for audio-based human behavior recognition
S0045790615001263
Multiple-Input Multiple-Output system plays a major role in the fourth generation wireless systems to provide high data rates. In this paper, a blind channel estimation approach has been proposed for finding the channel length based on the signals received from the MIMO (Multiple-Input Multiple-Output) transceiver. The...
Blind channel estimation for Multiple-Input Multiple-Output system using Constant Modulus Algorithm
S0045790615001275
Advances in wireless ad-hoc network techniques have spurred the development of new approaches to increase network efficiency. One of the more popular approaches is swarm intelligence. Swarm intelligence imitates the collective behavior of biological species to solve network routing problems. Meanwhile, weakly connected...
Weakly connected dominating set-assisted ant-based routing protocol for wireless ad-hoc networks
S0045790615001287
Power consumption is emerging as one of the main concerns in the High Performance Computing (HPC) field. As a growing number of bioinformatics applications require HPC techniques and parallel architectures to meet performance requirements, power consumption arises as an additional limitation when accelerating them. In ...
Non-negative Matrix Factorization on Low-Power Architectures and Accelerators: A Comparative Study
S0045790615001299
Geometric distortions are more difficult to tackle than other types of attacks. It is a challenging work to design a robust image watermarking scheme against geometric distortions. In this paper, we propose a robust digital image watermarking scheme based on local polar harmonic transform. The proposed scheme has the f...
A new robust digital watermarking using local polar harmonic transform
S0045790615001317
One of the primary objectives of Wireless Sensor Network (WSN) is to provide full coverage of a sensing field as long as possible. The deployment strategy of sensor nodes in the sensor field is the most critical factor related to the network coverage. However, the traditional deployment methods can cause coverage holes...
Rearrangement of mobile wireless sensor nodes for coverage maximization based on immune node deployment algorithm
S0045790615001329
BPEL or Business Process Execution Language is so far the most important standard language for effective composition of Web services. However, like most available process orchestration engines, BPEL does not provide automated support for reacting according to many changes that are likely to arise in any Web services co...
AOMD approach for context-adaptable and conflict-free Web services composition
S0045790615001330
In this paper, we propose GeoRank, a geographic routing approach for the IPv6-enabled large-scale low-power and lossy networks. We discuss the main drawbacks of the RPL (IPv6 Routing Protocol for Low-Power and Lossy Networks) for P2P (point-to-point) communication in large-scale 6LoWPAN networks. Then, we address such ...
A geographic routing approach for IPv6 in large-scale low-power and lossy networks
S0045790615001342
Genetic programming (GP) is an evolutionary method that allows computers to solve problems automatically. However, the computational power required for the evaluation of billions of programs imposes a serious limitation on the problem size. This work focuses on accelerating GP to support the synthesis of large problems...
Use of graphics processing units for automatic synthesis of programs
S0045790615001366
The use of computational accelerators such as NVIDIA GPUs and Intel Xeon Phi processors is now widespread in the high performance computing community, with many applications delivering impressive performance gains. However, programming these systems for high performance, performance portability and software maintainabi...
Accelerated application development: The ORNL Titan experience
S0045790615001378
Malaria, one of the deadliest diseases, is responsible for nearly 627,000 deaths every year. It is diagnosed manually by pathologists using a microscope. It is time-consuming and subjected to inconsistency due to human intervention, so computerized image analysis for diagnosis has gained importance. In this article, an...
Segmentation of erythrocytes infected with malaria parasites for the diagnosis using microscopy imaging
S0045790615001391
Accurate image retrieval is required to index and retrieve large number of images from huge databases. In this paper, an efficient approach is presented to encode the color and textural features of images from the local neighborhood of each pixel. The color features are extracted by quantizing the RGB color space into ...
Rotation and scale invariant hybrid image descriptor and retrieval
S0045790615001408
The paper deals with the level control of a Modified Quadruple Tank Process (MQTP). In that, the interaction is introduced between the bottom two tanks which causes an additional non-linear dynamical component of the conventional Quadruple Tank Process (QTP). Since the process has an inbuilt and imposed uncertainties, ...
Fractional-Order Sliding Mode Controller Design for a Modified Quadruple Tank Process via Multi-Level Switching
S0045790615001421
Steganography has become a hot topic in information hiding, and the reversibility technology allows the recovery of the original image without distortion when the embedded secret information is extracted. In this paper, a high payload image steganographic scheme based on an extended interpolating method is proposed. In...
Reversible steganography using extended image interpolation technique
S0045790615001433
An assessment approach to assess the likelihood of rock burst in coal mines by integrating the Multi-Agent System with data fusion techniques is proposed in this paper. We discuss an optimal algorithm for multi-sensor data fusion to improve the accuracy and reliability of the source data. Some model-based situation qua...
A situation assessment method for rock burst based on multi-agent information fusion
S0045790615001445
Cloud computing provides an effective approach to deliver multimedia services to end users with the desired user quality of experience (QoE). However, cloud-based multimedia applications require many of servers and consume huge energy. To reduce energy consumption, a multimedia service provider (MSP) should balance the...
Tradeoff between energy and user experience for multimedia cloud computing
S0045790615001457
Affine Transform (AT) is widely used in high-speed image processing systems. This transform plays an important role in various high-speed image processing applications. AT, an important process during the intensity-based image registration, is applied iteratively during the registration. This is also used for the analy...
FPGA based accelerated 3D affine transform for real-time image processing applications
S0045790615001469
Inter-Cell Interference (ICI) from neighboring cells is the major challenge that degrades the performance of Orthogonal Frequency Division Multiple Access (OFDMA) cellular mobile systems, particularly for cell edge users. An efficient technique to mitigate ICI is the interference coordination. The most commonly ICI Coo...
Self-organized dynamic resource allocation using fraction frequency reuse scheme in long term evolution networks
S0045790615001470
With the rapid advancement in very large scale integration (VLSI) technology, it is the utmost necessity to achieve a reliable design with low power consumption. The Quantum dot Cellular Automata (QCA) can be such an architecture at nano-scale and thus emerges as a viable alternative for the current CMOS VLSI. This wor...
Towards modular design of reliable quantum-dot cellular automata logic circuit using multiplexers
S0045790615001482
We propose a new optical reconfigurable Network-on-Chip (NoC), named ReFaT ONoC (Reconfigurable Flat and Tree Optical NoC). ReFaT is a dynamically reconfigurable architecture, which customizes the topology and routing paths based on the application characteristics. ReFaT, as an all-optical NoC, routes optical packets b...
Application-based dynamic reconfiguration in optical network-on-chip
S0045790615001494
Manycore CMP systems are expected to grow to tens or even hundreds of cores. In this paper we show that the effective co-design of both, the network-on-chip and the coherence protocol, improves performance and power meanwhile total area resources remain bounded. We propose a snoopy-aware network-on-chip topology made o...
Area-efficient snoopy-aware NoC design for high-performance chip multiprocessor systems
S0045790615001500
Progress in the area of environmental sustainability for the mobile computing industry could be achieved by making advancement on two fronts: reducing the energy consumed by individual devices throughout their life cycle and reducing the rate at which these devices are discarded. In this work, to address both fronts, w...
Thin is green: Leveraging the thin-client paradigm for sustainable mobile computing
S0045790615001512
Based on previous results on periodic non-uniform sampling (Multi-Coset) and using the well known Non-Uniform Fourier Transform through Bartlett’s method for Power Spectral Density estimation, we propose a new smart sampling scheme named the Dynamic Single Branch Non-uniform Sampler. The idea of our scheme is to reduce...
Adaptive non-uniform sampling of sparse signals for Green Cognitive Radio
S0045790615001536
Cooperative spectrum sensing is a process of achieving spatial diversity gain to make global decision for cognitive radio networks. However, accuracy of global decision effects owing to the presence of malicious users/nodes during cooperative sensing. In this work, an extended generalized extreme studentized deviate (E...
Efficient elimination of erroneous nodes in cooperative sensing for cognitive radio networks
S0045790615001548
In this paper, we present two novel interference management stratagems for coexisting one primary user (PU) and multiple secondary users (SUs) by exploiting the unused spatial directions at PU. The cognitive stations sense their environment to determine the users they are interfering with, and adapt to it by designing ...
Precoding design for interference mitigation in cognitive radio networks based on matrix distance
S0045790615001573
In order to retrieve an image from a large image database, the descriptor should be invariant to geometric transformations (e.g., rotation, scaling, and translation). It must also have enough discriminating power and immunity to noise for retrieval from a large image database. The Exponent moments (EMs) descriptor has ...
Color image representation using invariant exponent moments
S0045790615001780
Indefinite and uncontrollable growth of cells leads to tumors in the brain. The early diagnosis and proper treatment of brain tumors are essential to prevent permanent damage to the brain or even patient death. Accurate data regarding the position of the tumor and its size are essential for effective treatment. Hence, ...
Performance analysis of classifier for brain tumor detection and diagnosis
S0045790615001792
Automating actions based on collected context from Internet of Things (IOT)-controlled systems is one of the most important requirements of IOT systems; this paper seeks to satisfy this requirement by offering a context-aware service framework on top of IOT controlled systems. The fault management process in electric p...
A context-aware dispatcher for the Internet of Things: The case of electric power distribution systems
S0045790615001809
In a wireless sensor network where sensors are arranged into a flat topology, sensors near the sink consume much more energy than sensors at the boundary of the network. Sensors near the sink relay many packets than far away sensors to the sink. After these sensors expire, energy holes are created near the sink. Theref...
Load management scheme for energy holes reduction in wireless sensor networks
S0045790615001810
Detecting the linear features in an image is a key technology for different applications. In this paper, a simple and effective algorithm based on the hit-or-miss transform is proposed. To detect linear features with different directions, multi-structuring elements corresponding to different directions are constructed....
Linear feature detection based on the multi-scale, multi-structuring element, grey-level hit-or-miss transform
S0045790615001822
Spectrum sensing is an important aspect of cognitive radios. This paper describes a method for spectrum sensing based on the autocorrelation of the received samples. The proposed method was evaluated by means of experiments wherein the probabilities of detection and false alarm at different signal-to-noise ratios (SNRs...
A spectrum sensing technique based on autocorrelation and Euclidean distance and its comparison with energy detection for cognitive radio networks
S0045790615002050
Image contrast enhancement and brightness preservation are fundamental requirements for many vision based applications. However, these are two conflicting objectives when the image is processed by histogram equalization approaches. Current available methods may not provide results simultaneously satisfying both require...
Image enhancement using the averaging histogram equalization (AVHEQ) approach for contrast improvement and brightness preservation
S0045790615002074
In this paper, we propose a systematic rateless erasure code, namely systematic Random (SYSR) code based on Random code for short messages transmission. Given a message of k symbols, the sender will first send the message to the receiver as Part I coded symbols. The rest of coded symbols starting from k + 1 th onwards ...
Systematic rateless erasure code for short messages transmission
S0045790615002086
Power efficiency is a crucial issue for embedded systems, and effective power profiling and prediction tools are in high demand. This paper presents a cloud-based power profiling (CPP) tool for recording system calls and their associated parameters to predict hardware power consumption when running target applications....
Cloud-based power estimation and power-aware scheduling for embedded systems
S0045790615002116
In this paper we present a novel pose and expression invariant approach for 3D face registration based on intrinsic coordinate system characterized by nose tip, horizontal nose plane and vertical symmetry plane of the face. It is observed that distance of nose tip from 3D scanner is reduced after pose correction which ...
3D face recognition based on pose and expression invariant alignment
S0045790615002128
Mobility currently evolves far beyond owning a car or using public transit services. Passenger transport can be managed by mobility providers by combining and extending various mobility services either directly or by using available mobility service platforms. This paper evaluates the capabilities and technical feature...
The potential of interconnected service marketplaces for future mobility
S0045790615002153
Street lighting is a ubiquitous utility, but sustaining its operation presents a heavy financial and environmental burden. Many schemes have been proposed which selectively dim lights to improve energy efficiency, but little consideration has been given to the usefulness of the resultant street lighting system. This pa...
A traffic-aware street lighting scheme for Smart Cities using autonomous networked sensors
S0045790615002189
This paper presents a new particle swarm optimization (PSO) algorithm, called the PSO-IAC algorithm, to resolve the goal of reaching with the obstacle avoidance problem for a 6-DOF manipulator of the home service robot. The proposed PSO-IAC algorithm integrates the improved adaptive inertia weight and the constriction ...
Integrated particle swarm optimization algorithm based obstacle avoidance control design for home service robot
S0045790615002207
Wireless sensor networks may be used for the surveillance of large systems (bridges, tunnels, etc.) or in the management of disasters such as forest fires, or oil spills. In some of these applications, the topology of the network is going to be dynamic: a connected system can evolve into a clustered system that present...
A session protocol for wireless sensor networks. Application to oil spills monitoring
S0045790615002220
This paper proposes a cross-layer mobility support scheme for the IPv6 over low-power wireless personal area network (6LoWPAN) wireless sensor network (WSN). This scheme combines the handover in the network layer (L3) with the handover in the link layer (L2) so that the L3 handover and the L2 one can be performed simul...
A cross-layer mobility support protocol for wireless sensor networks
S0045790615002244
The existing clustering algorithms are either static or dynamic depending on the frequency of clustering. In static clustering, clusters are formed once, which reduces the clustering overhead but leads to early energy drain of a few nodes in the network. The network lifetime can be improved by dynamic clustering in whi...
Energy efficient data collection through hybrid unequal clustering for wireless sensor networks
S0045790615002256
Preclinical micro-computed tomography (microCT) images are of utility for 3D morphological bone evaluation, which is of great interest in cancer detection and treatment development. This work introduces a compression strategy for microCTs that allocates specific substances in different Volumes of Interest (VoIs). The a...
Efficient storage of microCT data preserving bone morphometry assessment
S0045790615002268
In real-time collaborative environments, address space transformation strategy can be used to achieve consistency maintenance of shared documents. However, as for the execution of compound operations, they are firstly decomposed into primitive operations, the relationships between the referencing objects and referenced...
Consistency maintenance of compound operations in real-time collaborative environments
S0045790615002281
This paper proposes an unambiguous correlation function applicable to generic sine-phased binary offset carrier (BOC) signal tracking. In the proposed scheme, first, we view the BOC sub-carrier pulse as a sum of multiple rectangular pulses. Then, we obtain partial correlation functions by correlating the multiple recta...
An unambiguous correlation function for generic sine-phased binary offset carrier signal tracking
S0045790615002311
In this paper a dynamic modeling, simulation, control and energy management of photovoltaic water-pumping network system is presented. A fuzzy-logic controller has been proposed for a real-time control of the system. The controller generates the reference speeds needed for the pulse-width-modulation generator to contro...
A real-time control of photovoltaic water-pumping network
S0045790615002335
In this paper, we address the problem of broadcast routing and scheduling of video streaming for delay-sensitive applications in backbone wireless mesh networks. Given a source node and a set of destinations, we aim to build a broadcast tree and compute an optimal schedule such that the throughput for the source to bro...
Throughput improvement for delay-sensitive video broadcast in wireless mesh networks
S0045790615002359
To enhance confidentiality and reduce the number of arrayed-waveguide grating (AWG) routers, a dynamic scrambling scheme is proposed in which cyclic and free spectral range (FSR) properties of AWG routers are employed to use a maximal-length sequence (M-sequence) code as the signature address code. In this paper, a cha...
Dynamic scrambling scheme of arrayed-waveguide grating-based encryptors and decryptors for protection against eavesdropping
S0045790615002372
This work investigates the digit serial polynomial basis multipliers performing multiplication in multiple binary extension fields F 2 m 1 , F 2 m 2 , … , F 2 m λ . Designing such versatile multipliers encounters a number of difficulties. First of all, the element sizes of the supported fields are different from each o...
Versatile digit serial multipliers for binary extension fields
S0045790615002384
Stealthy attackers move patiently through computer networks – taking days, weeks or months to accomplish their objectives in order to avoid detection. As networks scale up in size and speed, monitoring for such attack attempts is increasingly a challenge. This paper presents an efficient monitoring technique for stealt...
Detecting stealthy attacks: Efficient monitoring of suspicious activities on computer networks
S0045790615002633
The multifaceted nature of cyber-physical systems needs holistic study methods to detect essential aspects and interrelations among physical and cyber components. Like the systems themselves, security threats feature both cyber and physical elements. Although to apply divide et impera approaches helps handling system c...
On synergies of cyber and physical security modelling in vulnerability assessment of railway systems
S0045790615002669
Computer systems are required to process data more rapidly than ever, due to recent software and internet technology developments. The server computers work continuously and provide services to many clients simultaneously, which results in greater heat production and high temperature that must be managed in order to av...
Performance and cooling efficiency of thermoelectric modules on server central processing unit and Northbridge
S0045790615002670
Sparse Imputation (SI) is a relatively new method that reconstructs missing spectral components of noisy speech signal with the help of the sparse-based representation approaches. In this method, the redundancy of signal in the frequency domain helps to rebuild noisy spectral components from the remained reliable ones....
Joint Sparsity and marginal classification for improving Sparse Imputation performance in speech recognition
S0045790615002694
In this paper we use and extend a parallel optoelectronic processor for image preprocessing and implement software tools for testing and evaluating the presented algorithms. After briefly introducing the processor and showing how images can be stored in it, we adapt a number of local image preprocessing algorithms for ...
Image preprocessing with a parallel optoelectronic processor
S0045790615002700
In general, in order for individuals to take part in a lottery, they must purchase physical lottery tickets from a store. However, due to the popularity and portability of smart phones, this paper proposes a lottery entry purchase protocol for joint multi-participants in a mobile environment. This method integrates cry...
A novel lottery protocol for mobile environments
S0045790615002712
Recent technological trends such as cloud computing, wireless communication, and wireless sensor networks provide a strong infrastructure and offer a true enabler for health information technology services over the Internet. This system is based on the cloud computing environment, integrating mobile communication techn...
Design and evaluation of a cloud-based Mobile Health Information Recommendation system on wireless sensor networks
S0045790615002724
The emerging IEEE 802.22-based Wireless Regional Area Network (WRAN) is the first wireless standard based on the Cognitive Radio (CR) technology. WRAN is designed to offer wireless access services in a large coverage area by allowing Secondary Users (SUs) to opportunistically exploit the under-utilized licensed portion...
Cooperative weighted-fair control strategy for spectrum self-coexistence in multi-cell WRAN systems
S0045790615002736
This paper studies sectorization increase in horizontal and vertical plane. We have simulated downlink (DL) macro long-term evolution (LTE) network using three-dimensional antenna and propagation models. New network layouts have been proposed based on 4-sector site deployment. The challenge was to offer lower network c...
Novel radio cellular design improving capacity and mobility performance for advanced cellular networks
S0045790615002748
The increasing demand of cloud computing motivates the researchers to make cloud environment more efficient for its users and more profitable for the providers. Though virtualization technology helps to increase the resource utilization, still the operational cost of cloud gradually increases mainly due to the consumpt...
Use of proactive and reactive hotspot detection technique to reduce the number of virtual machine migration and energy consumption in cloud data center
S0045790615002761
Wireless sensor networks (WSNs) have a wide range of applications in our lifetime. Indeed, WSNs perform a various missions and tasks in odor localization, firefighting, medical service, surveillance and security. In order to accomplish these tasks, the sensors have to perform partitioning protocols to form an organizat...
A multi-level clustering scheme based on cliques and clusters for wireless sensor networks
S0045790615002785
Data centers use dynamic virtual machine consolidation to reduce power consumption. Existing consolidation mechanisms are not efficient in cloud data centers, which have heterogeneous hardware infrastructure, huge scale, and highly variable non-stationary workloads. We use game theory to develop a novel distributed mec...
Distributed consolidation of virtual machines for power efficiency in heterogeneous cloud data centers
S0045790615002797
Typical MAC protocols for IEEE 802.11-based ad hoc networks employ a direct transmission strategy whenever the transmitter can directly reach the receiver (one-hop transmission). While such a design enjoys simplicity, it limits the number of admitted transmissions in a given neighborhood. Due to the performance anomaly...
Cooperative packet-forwarding mechanism for throughput improvement in multi-channel wireless networks
S0045790615002803
Efficient data delivery accompanied with low end-to-end delay is important in vehicular ad-hoc networks and optimal route selection is vital to improve these performance metrics. Different routing algorithms are proposed in VANETs. This paper reviews and analyzes these algorithms briefly and based on the analysis, a ne...
An opportunistic routing based on symmetrical traffic distribution in vehicular networks
S0045790615002815
Parallelization of task is considered to be a huge challenge for future extreme-scale computing system. Sophisticated parallel computing system necessitates solving the bus contention in a most efficient manner with high computation rate. The major challenge to deal with is the achievement of high CPU core usage throug...
Design and simulation of a parallel adaptive arbiter for maximum CPU utilization using multi-core processors
S0045790615002827
This paper introduces a new fast integer-based algorithm to convert the RGB color representation to HSV and vice versa. The proposed algorithm is as accurate as the classical real-valued one. The use of only integer operations increases performance and portability. Performance measurement results show a speed gain of a...
Integer-based accurate conversion between RGB and HSV color spaces
S0045790615002839
Broadcasting is the simplest form of communication in which nodes disseminate the same information simultaneously to all of their neighbors. Broadcasting has been widely used in many types of networks including wireless networks, wireless sensor networks, and mobile ad-hoc networks. Likewise these networks, broadcastin...
Broadcasting strategies for cognitive radio networks: Taxonomy, issues, and open challenges
S0045790615002840
A number of mobile payment studies have been proposed in recently years. Most of the schemes are largely focused on transaction security, not on users’ privacy. In this paper, we propose an Unlinkable Anonymous Payment Scheme to provide a secure and anonymous mobile commerce environment. In the proposed protocol, a use...
An Unlinkable Anonymous Payment Scheme based on near field communication
S0045790615002876
Current Critical Infrastructures (CIs) need intelligent automatic active reaction mechanisms to protect their critical processes against cyber attacks or system anomalies, and avoid the disruptive consequences of cascading failures between interdependent and interconnected systems. In this paper we study the Intrusion ...
Awareness and reaction strategies for critical infrastructure protection
S0045790615002979
Foreign fibers in cotton seriously affect the quality of cotton products. Online detection systems of foreign fibers based on machine vision are the efficient tools to minimize the harmful effects of foreign fibers. The optimum feature set with small size and high accuracy can efficiently improve the performance of onl...
A two-stage feature selection method with its application
S0045790615002980
Variational decomposition has been widely used in image denoising, however, it can’t distinguish texture from noise well. Replacing the fixed parameter in the (BV, G) decomposition with a monotone increasing sequence, and iteratively taking the residual of the previous step as the input to decompose, we propose a multi...
Multiscale variational decomposition and its application for image hierarchical restoration
S0045790615002992
The traditional approach for energy detection (ED) consists in the comparison of the energy received against a fixed detection threshold, estimated according to an expected noise level. However, the noise power is not a static parameter since it varies as a function of the random sources of noise and interference prese...
Adaptive energy detector for spectrum sensing in cognitive radio networks