This paper proposes a new multiple description coding technique that uses different data transforms to generate multiple descriptions of a given signal. A linear fusion is employed to reconstruct the signal as the out...
详细信息
ISBN:
(纸本)0769523153
This paper proposes a new multiple description coding technique that uses different data transforms to generate multiple descriptions of a given signal. A linear fusion is employed to reconstruct the signal as the output of a central decoder. This new method exhibits the advantages of multiple description vector quantization while having the complexity of multiple description scalar quantization. Another technique called "forced errors in channels" is then introduced to reduce the distortion in the central decoder output allowing some increase in the side distortions. When applied to images, the new techniques yield results, which are competitive compared with the results from current state-of-the-art coders.
In recent years, amphibian populations in many parts of the world have experienced an apparent widespread, yet poorly understood decline. One of the obstacles comes from the difficulties in rapidly collecting and anal...
详细信息
ISBN:
(纸本)0769523153
In recent years, amphibian populations in many parts of the world have experienced an apparent widespread, yet poorly understood decline. One of the obstacles comes from the difficulties in rapidly collecting and analyzing amphibian population data from the field sites. In this paper, we will investigate how to apply wireless network and mobile computing technologies to build a Mobile Amphibian Population information System (MAPIS). This system will not only enhance communication between field biologists in different locations, but also speed on-site data entry and analysis. Thus, the field biologists can optimize collection efforts and better exploit narrow windows of ecologically relevant population behaviors.
We propose the n-state quantum coin flipping protocol by generalizing the three states protocol proposed by Ambainis. Furthermore, we conduct security analysis on our protocol and show that in our protocol we can redu...
详细信息
The goal of this paper is to promote application Of logic synthesis methods and tools in different tasks of modern digital designing The paper discusses functional decomposition methods, which are currently being inve...
详细信息
ISBN:
(纸本)0769523153
The goal of this paper is to promote application Of logic synthesis methods and tools in different tasks of modern digital designing The paper discusses functional decomposition methods, which are currently being investigated, with special attention to balanced decomposition. Since technological and computer experiments with application of these methods produce promising results, this kind of logic synthesis will probably dominate the development of digital circuits for FPGA structures. Many examples confirming effectiveness of decomposition method in technology mapping in digital circuits design for cryptography and DSP applications are presented.
It is important to predict and analyze user acceptance of informationtechnology in order to address success and failures of technological products. The Theory of Reasoned Action (TRA) has been used for two decades in...
详细信息
ISBN:
(纸本)0769523153
It is important to predict and analyze user acceptance of informationtechnology in order to address success and failures of technological products. The Theory of Reasoned Action (TRA) has been used for two decades in empirical studies to predict user acceptance of informationtechnology. Agent-based modeling (ABM) is well suited for studying user acceptance of informationtechnology, which is an instance of contingent behavior. In this paper we extend our research on ABM of the TRA by comparing technology adoption rates across varied sections of a population. We discuss intention variations among laggards, innovators and the undecided sections of employees in an organization. Our implementation is cost effective and easy to use in contrast to the empirical method The results we produced corroborate the results obtained from the last few decades of empirical research in this field.
Protecting sensitive information (credit card information, social security number... etc) from being captured is of utmost importance as it can lead to serious repercussions if the collected data lands into unscrupulo...
详细信息
ISBN:
(纸本)0769523153
Protecting sensitive information (credit card information, social security number... etc) from being captured is of utmost importance as it can lead to serious repercussions if the collected data lands into unscrupulous hands. Despite tremendous advances in security, plenty of security problems still afflict systems. Existing security approaches do not prevent processes running in the background from capturing sensitive information on the screen. This paper proposes a no-capture hardware security feature that prevents capturing of sensitive data by users that have administration privileges.
Distinct features of handheld devices, such as their mobility, personalization and location-awareness, engender a new class of consumer-oriented software applications. While simple shopping assistant programs were one...
详细信息
ISBN:
(纸本)0769523153
Distinct features of handheld devices, such as their mobility, personalization and location-awareness, engender a new class of consumer-oriented software applications. While simple shopping assistant programs were one of the first to emerge for this class of devices, many modern m-commerce applications become more complex and utilize a wide range of features of pervasive, computing. In this paper, we discuss a number of design issues pertinent to the development of these applications including context awareness, personalization, ubiquitous access, and intelligent interfaces., We applied these and other principles in the design and development of SMMART, an intelligent context aware framework for delivery of personalized and targeted promotions to the users of mobile devices, which is used as a case study throughout this paper.
Although individual node cooperation is necessary for the correct execution of network protocols in Mobile Ad-hoc Networks, it is not always guaranteed Therefore, misbehavior defection and reputation mechanisms need t...
详细信息
ISBN:
(纸本)0769523153
Although individual node cooperation is necessary for the correct execution of network protocols in Mobile Ad-hoc Networks, it is not always guaranteed Therefore, misbehavior defection and reputation mechanisms need to be implemented in order to reinforce node cooperation. In this paper, we address the issue of detecting non-cooperative behavior during packet forwarding in clustered mobile Ad-hoc networks which operate under the coordination and supervision of a central entity. The proposed solution uses end-to-end authenticated acknowledgments for every transmitted packet. Low computational overhead is achieved by employing an adapted version of the TESLA symmetric key broadcast authentication protocol.
Location is one of the most important contexts used in pervasive computing environments. GPS systems are intensely used to detect the location information;they mainly work in outdoor environment. Applications call for...
详细信息
ISBN:
(纸本)0769523153
Location is one of the most important contexts used in pervasive computing environments. GPS systems are intensely used to detect the location information;they mainly work in outdoor environment. Applications call for precise, easy-to-build, and easy-to-use indoor location systems. This paper presents our work to implement an indoor location determination system, for Microsoft-Windows-based platforms using a preexisting IEEE 802.11 wireless network. The location is determined from radio signal strength information collected from multiple base stations at different physical locations. Our experiments show a high accuracy rate of this approach.
暂无评论