The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Mobile devices represented by smart phones are being widely popularized in the world. Among many interesting functionalities and applications of mobile devices, the camera function and image viewer application may be most frequently used by everybody, and consequently a usual person may have more than a thousand of images in his smart phone. However, it is very difficult to find an image that users...
XML (Extensible Markup Languages) is considered as a new standard for the exchanging of information over the Internet. Nowadays, the number of applications using XML data is increasing rapidly. As a result, it is important to develop efficient algorithms to store and query XML data. In this paper, we present our proposed query processing algorithm, namely multidimensional simple path query processing...
Cloud computing has become a mainstream in providing computing resources as services. Recent cloud computing systems are composed of homogeneous hardware resources. Heterogeneous cloud computing can provide better performance and energy efficiency than homogeneous cloud computing. Therefore, heterogeneous cloud computing is expected to be used widely. In general, memory management policy has huge...
Recently, there has been an increase in research where cutting edge research networks have been used, and thus there is an increased need for more accurate network management. For more accurate management, this study attempts to build a management information creation system called network stability. There is preceding research related to calculating network stability based on articulation nodes,...
In these days, privacy-preserving has been studied extensively, many algorithms and techniques have been designed for this issue, in this paper, we discus k-anonymity methods as most technique used for privacy-preserving and mainly we concentrate in the methods based on generalization techniques as mostly studies based on.
Nowadays Internet-scale data centers are serving diverse applications, such as cloud computing, online trade, mass storage services, large-scale distributed applications, and et al. However, one issue concerned about data centers is huge energy consumption, which not only increases operational cost, but also causes environment problems. One way to reduce energy con-sumption is decreasing the scale...
This paper presents the mastering signal processing with the residual coding scheme in spatial audio object coding. The proposed method can eliminate the difference between the original down-mix signal and the compensated down-mix signal and enhance the sound quality, successfully. Experimental result shows that the proposed method can greatly improve the performance of the original mastering signal...
In this paper, noise gets reduced with an average estimate LMS filter in a car noise environment so robust voice activities are being detected in a car noise environment. For the noise reduction, an average estimate LMS filter, which is a method for maintaining a source feature of speech and decreasing damages on speech information, is used in a speech signal detection process to reduce noise from...
In this paper we build a simple large-scale object recognition system which consists of several publicly available software. With 1 million distracter image database, we measure precision and search time to show the performance. To support searching within a reasonable time, we need an index structure, e.g. vocabulary tree. We quantize 128 dimensional SIFT feature to a single positive integer value...
Image retrieval is one of the most exciting and fastest growing research areas in the field of multimedia technology. In this paper, we present and implement an image descriptor that extracts the feature of image using combination of SURF (Speed Up Robust Feature) and DCD (Dominant Color Descriptor) scheme. To evaluate the performance of implemented algorithm, we assess the performance of simulation...
This paper proposes a Connected Dominating Set (CDS) based clustering algorithm to prevent the broadcast storm problem in Vehicular Ad-hoc Networks (VANETs). The proposed algorithm accounts for the mobility and degrees of vehicles, and matches the highly dynamic nature of VANETs. VANETs are infrastructure less multihop wireless networks. Routing in VANETs is a one of the challenging task to accomplish...
Since 2004, Vehicular Ad-hoc Networks (VANETs) is core technology of Intelligent Transportation System (ITS), in which standardize the Wireless Access in Vehicle Environments (WAVE) based on IEEE 1609 and IEEE 802.11p. WAVE is a field of study to provide safety service and information to person such as driver and passenger. Recently, many researchers have been proposed resolution for high velocity...
In the present study, a finite element analysis of conjugate heat transfer problem inside a cavity with a heat-generating conducting body, where constant heat flux is generated, is conducted. A conduction heat transfer problem inside the solid body is automatically coupled with natural convection inside the cavity by using a finite element formulation. A finite element formulation based on SIMPLE...
When there is the necessity to send an email message to a big list of email destinations and following the valid standard Simple Mail Transfer Protocol (SMTP), it takes too much time to be delivered, because this message is sent one by one to each of the email destinations. If we talk also of an important message that all the recipients are in need to receive it in a timeless way, converting this...
Large-scale data-intensive problems characterized with high task concurrency have overwhelmingly been on the rise, calling for higher computing efficiency. One solution for this is to make use of high-performance computers. In this paper, we propose an optimization by constructing distributed file system in big memory of nodes and rearranging compute nodes to greatly reduce repeated and redundant...
The technological advancement of digital devices such as digital cameras, smart phones and tablet, provides convenience way for people to take pictures during in daily life. In traditional method in photo browsing, searching, and retrieving from SNS or a large database is performed by tag or text descriptions that described the photos. However, this process becomes more difficult as the number of...
With the increasing popularity of multimedia devices and applications, JPEG (Joint Photographic Experts Group) images have been being used in almost all kinds of digital devices. In JPEG compression, color space conversion has become a very important role in the image acquisition, display and the transmission of the color information. This paper experiments the performance of JPEG color space conversion...
The smart phone markets rapidly grow in the whole world as well as Korea and at the same time, security threat also tends to increase. These various studies on security threat of smart phones have been arranged but the studies on prediction models are insufficient. This paper tries to modeling to predict security threat of smart phones by using Markov Chain which is very much used in prediction studies.
As near field communication technologies develop rapidly and the supply ratio of smart phones gets higher, the scope to utilize NFC(Near Field Communication) is gradually increasing. It tries to propose the service to inform you parking location and traffic line with the mobile parking management system which combines these NFC technologies with IPS(Indoor Positioning System) for parking congestion...
Mobile Ad Hoc Network consists of a large number of nodes. When we work with a large network with dense nodes, there are some nodes that have to bear the heavy traffic load, then over the time such nodes become weak and they start losing the packet. This packet loss is bearable up to some threshold value, but as the packet loss exceed this level, it disturb the whole network and now any kind of data...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.