The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we introduce a digital edition of the Altan Tobchi, a Mongolian historical manuscript written in traditional Mongolian script. The Text Encoding Initiative guidelines were adopted to encode the named entities, commentaries, transcriptions, and interpretations of ancient Mongolian words. Named entities such as personal names and place names were extracted from digitized text by employing...
Quantum Key Distribution (QKD) provides a secure way of generating shared cryptographic keys between a sender (Alice) and a receiver (Bob). The original BB84 protocol uses a two-dimensional polarization basis, limiting the information content of a single photon to 1 bit. Using the transverse position of single photons as one basis and the Fourier space as a second basis, one can construct a pair of...
Chaos-based coded modulation (CCM) systems have been shown to be competitive against important wireless channels impairments, like fading. Nonetheless, these systems have not been tested yet in a real-world scenario, and their performance has only been explored using theoretical and numerical bounds, and validated by simulation. In this proposal, we take advantage of the availability of Software-Defined...
Community of Inquiry (CoI) model is a framework with socio-constructivist roots, which describes an online learning community on three interdependent components: cognitive presence, social presence and teaching presence. Content analysis is widely used to examine transcripts of computer mediated conversations between students in a community of inquiry. However, there are no dedicated support tools...
In the classical approaches of model checking (explicit and symbolic), the tools encode the state space, as well as the transition relation between the states. This way, when the predecessor of a state is needed, as in the case of CTL formulas evaluation, it can be extracted from the state space in a straightforward manner. Practical experience indicates that renouncing at encoding the transition...
The urgent task of the organization of confidential calculations in crucial objects of informatization on the basis of domestic TPM technologies (Trusted Platform Module) is considered. The corresponding recommendations and architectural concepts of the special hardware TPM module (Trusted Platform Module) which is built in a computing platform are proposed and realize a so-called “root of trust”...
As the number of cores increases, power consumption becomes the main concern in Network on Chip (NoC) and Last Level Cache (LLC). In on-chip interconnection networks, bursty-based traffics between components such as cache and memory banks have a big contribution of total traffic in NoC-based many-core systems. In this context, these types of traffics have an impressive impact on NoC energy consumption...
SIFT-based identification techniques have been broadly criticised in biometrics due to its high false matching rate. To overcome this weakness, a new method for SIFT-based palmprint matching, called the Self Geometric Relationship-based matching (SGR-Matching) is presented. While existing matching techniques consider only the relationship between the SIFT-points of the query image on one hand and...
We propose an energy efficient error control code scheme which utilizes the intrinsic property of Hamming code to avoid crosstalk on the computer bus. By using the coding scheme in the noisy deep sub-micron process environment, the proposed scheme can achieve both error prevention and error correction. Meanwhile comparing to the (8,4) Hamming code (8-bit data bus with 4 information bits) with the...
Reliable storage is central component of data centers that support private or public cloud. Erasure coding has becoming increasingly popular alternative to replication for its capability in substantially cutting disk cost while delivering the same reliability. This paper reports the comprehensive results of using FPGA for accelerating erasure encoding and decoding algorithms. In particular, to accomplish...
With the rapid development of Unmanned Aerial Vehicle (UAV), the compression of video data captured by UAV has become a growing critical issue. However, most advanced coding schemes, like H.264 and HEVC, are oriented for common videos and thus cannot afford ideal coding efficiency when applied to UAV platform. Considering the characteristics of UAV video, much more improvement could be imposed onto...
The chance to influence the lives of a million children does not come often. Through a partnership between the BBC and several technology companies, a small instructional computing device called the BBC micro:bit will be given to a million children in the UK in 2016. Moreover, using the micro:bit will be part of the CS curriculum. We describe how Microsoft's Touch Develop programming platform works...
This case study is about the introduction of computer science to girls in an all-girl environment. Due to the lack of women in technology, many efforts are being made to expose girls to computer programming at an early age. Code camp organizers are using the all-girl model to help put participants more at ease and boost their computing confidence. High computer self-efficacy leads to studying computer...
In this paper we proposed the method of correcting codes formation based on Residue Number System. The proposed method provides the formation of RNS correcting codes of the input data which is represented in a positional notation.
Traditional way of learning programming is often tedious and fearsome to students, especially to kids. In most cases this results reluctance and uptake, while programming is the core of modern technology. Game is the signature of immersion. With its intense power of engaging players, it can wipe out the aversion and motivate students on coding. Here we have described a better way of learning programming...
In modern world, due to enormous demand for the cloud storage there are high chances of data duplication. Hence, redundancy create problem by increasing storage space and so storage cost. Inline Deduplication used to check duplicity before uploading data. Sometimes while restoring data failures or corrupting data can heavily create problem for users. Erasure coding can be used to encoding and storing...
Dimensionality reduction methods have been shown to be effective for handwritten Chinese character recognition. In this paper, we propose discriminative projection based on locality-sensitive sparse representation (DPLSR) for in-air handwritten Chinese character recognition. DPLSR based on the locality-sensitive sparse representation based classifier (LSRC), which can provide closed-form solutions...
Chemical reaction networks (CRNs) provide a fundamental model in the study of molecular systems. Widely used as formalism for the analysis of chemical and biochemical systems, CRNs have received renewed attention as a model for molecular computation. This paper demonstrates that, with a new encoding, CRNs can compute any set of polynomial functions subject only to the limitation that these functions...
Abstract-The IEEE 802.15.7 standard on visible light communications (VLC) proposes color-shift-keying (CSK) as a way to increase data rate while keeping a constant optical power. In this paper, we propose two algorithms to design codes by finite state machines (FSM) using newly introduced CSK constellations. These codes ensure a constant perceived color eliminating the use of the scrambler proposed...
Traditional Braille is a 6-dot code that can represent maximum 64 unique symbols with each braille cell. This is grossly insufficient to represent even ordinary English text (comprising 26 small letters, 26 capital letters, 10 digits, and 14 basic punctuations) — let alone math and science symbols. Thus a braille user has to enter 2 (and sometime 3 or 4) braille cells to enter one character or symbol...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.