The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Detecting topics from Twitter streams has become an important task as it is used in various fields including natural disaster warning, users opinion assessment, and traffic prediction. In this article, we outline different types of topic detection techniques and evaluate their performance. We categorize the topic detection techniques into five categories which are clustering, frequent pattern mining,...
Clustering has raised as an important problem in many different domains like biology, computer vision, text analysis and robotics. Thus, many different clustering techniques were developed to address this essential problem and propose astonishing solutions to conquer it. However, traditional clustering techniques suffer either from their limitations to detect specific shapes like K-means and PAM or...
Cognitive radios emerged as a solution for utilizing the spectrum which is considered a limited resource. Multi-hop routing in cognitive radio networks (CRNs) has been gaining increasing attention as it enables future large-scale CRNs. However, many existing protocols flood the network with control packets in route discovery phase, which leads to wasting bandwidth. In this paper, we introduce a location-aware...
We present a novel practical and provably secure key sharing scheme for Near Field Communication (NFC) devices. The scheme is based on sharing secret keys using the noisy wireless channel. We present two schemes based on the different modes of operation of typical NFC devices. Our numerical results establish the achievability of vanishing secrecy rates using the proposed techniques. Implementation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.