Skills in high-performance computing are increasingly desired by many employers, such as Google [1] and Intel [2]. However, traditional curricula often do not provide adequate preparation. This is often due to the hig...
详细信息
ISBN:
(纸本)9781479947744
Skills in high-performance computing are increasingly desired by many employers, such as Google [1] and Intel [2]. However, traditional curricula often do not provide adequate preparation. This is often due to the high cost of HPC equipment needed to provide students with needed hand-on experience. In this paper we describe a HPC system that is small, low cost, and yet powerful enough to support educational activities in HPC.
This paper presents an improved embedded zerotree wavelet (EZW) coding algorithm. According to the characteristic of coefficients and human visual system (HVS), an attempt is made to improve Shapiro's EZW algorith...
详细信息
Cryptographically cloud computing may be an innovative safe cloud computing design. Cloud computing may be a huge size dispersed computing model that ambitious by the economy of the level. It integrates a group of ina...
详细信息
ISBN:
(纸本)9781538695098
Cryptographically cloud computing may be an innovative safe cloud computing design. Cloud computing may be a huge size dispersed computing model that ambitious by the economy of the level. It integrates a group of inattentive virtualized animatedly scalable and managed possessions like computing control storage space platform and services. External end users will approach to resources over the net victimization fatal particularly mobile terminals, Cloud's architecture structures are advances in on-demand new trends. That are the belongings are animatedly assigned to a user per his request and hand over when the task is finished. So, this paper projected biometric coding to boost the confidentiality in Cloud computing for biometric knowledge. Also, this paper mentioned virtualization for Cloud computing also as statistics coding. Indeed, this paper overviewed the safety weaknesses of Cloud computing and the way biometric coding will improve the confidentiality in Cloud computing atmosphere. Excluding this confidentiality is increased in Cloud computing by victimization biometric coding for biometric knowledge. The novel approach of biometric coding is to reinforce the biometric knowledge confidentiality in Cloud computing. Implementation of identification mechanism can take the security of information and access management in the cloud to a higher level. This section discusses, however, a projected statistics system with relation to alternative recognition systems to date is a lot of advantageous and result oriented as a result of it does not work on presumptions: it's distinctive and provides quick and contact less authentication. Thus, this paper reviews the new discipline techniques accustomed to defend methodology encrypted info in passing remote cloud storage.
The "black box" is one of the electronic recording equipment dedicated aircraft, called aviation flight recorders. In this paper, according to the characteristics of the Boeing 787 aircraft black box data, w...
详细信息
This paper studies the military 1394b bus data format of airborne acquisition records based on asynchronous stream packet and the ICD information file format associated with the bus data, extracts the important inform...
详细信息
Secure group communication enables only the users in that group securely communicate with each other. Because the users can join or leave the group dynamically, scalability is a major concern. In this paper we propose...
详细信息
This study focuses on enhancing an automated SQL statement grading model by expanding the dataset and integrating Local Interpretable Model-agnostic Explanations (LIME) to improve explainability. By incorporating...
详细信息
Cloud computing has been growing rapidly in the world over the past decade. The Studies and development of this system has met the demand of large number of users in the world. In order to share shared resources, most...
详细信息
It is significant to develop an approach to realizing reliable transmission in the uplinks of InterPlaNetary (IPN) Internet. Multipath cooperative communications provide a magnificent prospect in this scenario. Furthe...
详细信息
ISBN:
(纸本)9781467351379
It is significant to develop an approach to realizing reliable transmission in the uplinks of InterPlaNetary (IPN) Internet. Multipath cooperative communications provide a magnificent prospect in this scenario. Furthermore, network coding has ability to further improve the outage performance of cooperative communication systems. We investigate the properties of the uplinks in IPN Internet and propose a novel Cooperative Network-Coded scheme based on Linear Block Codes (CNC-LBC). This scheme employs network coding through constructing MDS (Maximum Distance Separable) linear block codes which selects coding coefficients over GF(q). Through the analyses and simulations, it can be shown that the outage probability performance and diversity order of the IPN Internet uplinks are improved significantly by using the CNC-LBC scheme.
Partially overlapped channels are barely used for concurrent transmission in WiFi networks, since they lead to collisions where the collided packets cannot be decoded successfully. In this paper, we observe that the a...
详细信息
ISBN:
(纸本)9781467372145
Partially overlapped channels are barely used for concurrent transmission in WiFi networks, since they lead to collisions where the collided packets cannot be decoded successfully. In this paper, we observe that the actual corrupted symbols by partial-channel interference in OFDM-based WiFi networks are not as severe as we expected. There remains extra coding redundancy that can be exploited from the corrupted symbols, and utilized for packet recovery. Accordingly, we present a novel paradigm termed Piros, in order to Push the lImits of paRtially cOncurrent tranSmission in WiFi networks. Piros strategically leverages the coding redundancy according to the overlap portion in a distributed manner, and extracts useful decodinginformation from the corrupted symbols to decode the packet with partial-channel interference.
暂无评论