This paper studies the military 1394b bus data format of airborne acquisition records based on asynchronous stream packet and the ICD information file format associated with the bus data, extracts the important inform...
详细信息
Cryptographically cloud computing may be an innovative safe cloud computing design. Cloud computing may be a huge size dispersed computing model that ambitious by the economy of the level. It integrates a group of ina...
详细信息
ISBN:
(纸本)9781538695098
Cryptographically cloud computing may be an innovative safe cloud computing design. Cloud computing may be a huge size dispersed computing model that ambitious by the economy of the level. It integrates a group of inattentive virtualized animatedly scalable and managed possessions like computing control storage space platform and services. External end users will approach to resources over the net victimization fatal particularly mobile terminals, Cloud's architecture structures are advances in on-demand new trends. That are the belongings are animatedly assigned to a user per his request and hand over when the task is finished. So, this paper projected biometric coding to boost the confidentiality in Cloud computing for biometric knowledge. Also, this paper mentioned virtualization for Cloud computing also as statistics coding. Indeed, this paper overviewed the safety weaknesses of Cloud computing and the way biometric coding will improve the confidentiality in Cloud computing atmosphere. Excluding this confidentiality is increased in Cloud computing by victimization biometric coding for biometric knowledge. The novel approach of biometric coding is to reinforce the biometric knowledge confidentiality in Cloud computing. Implementation of identification mechanism can take the security of information and access management in the cloud to a higher level. This section discusses, however, a projected statistics system with relation to alternative recognition systems to date is a lot of advantageous and result oriented as a result of it does not work on presumptions: it's distinctive and provides quick and contact less authentication. Thus, this paper reviews the new discipline techniques accustomed to defend methodology encrypted info in passing remote cloud storage.
In this paper, we study Network coding (NC) at switching level. We use novel algorithms and a new header to route coded messages to various destinations. coding is based on address correlation and decoding is performe...
详细信息
ISBN:
(纸本)9781467353076;9781467353069
In this paper, we study Network coding (NC) at switching level. We use novel algorithms and a new header to route coded messages to various destinations. coding is based on address correlation and decoding is performed only at destination. The main characteristics of our approach is the use of adaptive memory to validate decoding capability at destination and converting multicasted messages to unicasted. We also argue that there are benefits in applying such approach and finally we examine the design of the new added header to hold adaptive memories.
In this paper we formulate Network coding (NC) and Analog Network coding (ANC) using analytical models to quantify ANC performance parameters. For this reason, a chain topology in a non-mutual transmission was investi...
详细信息
ISBN:
(纸本)9781479954230
In this paper we formulate Network coding (NC) and Analog Network coding (ANC) using analytical models to quantify ANC performance parameters. For this reason, a chain topology in a non-mutual transmission was investigated. Our formulations demonstrate the benefit of NC and ANC over traditional approaches which depend on the number of transmission packets and the number of timeslots required for packets transmission in broadcasting scenarios. The advantage of this analytical approach is independence with respect to running a network simulation in order to evaluate the effect of the network coding schemes on the networks before proceeding to design or system simulation. The result shows ANC can improve capacity in the chain network as much as 50%.
In spite of several advantages of free space optics (FSO) such as huge bandwidth, license-free communication and high electromagnetic interference, immunity over radio frequency technology, these systems are also seve...
详细信息
ISBN:
(纸本)9781538611449
In spite of several advantages of free space optics (FSO) such as huge bandwidth, license-free communication and high electromagnetic interference, immunity over radio frequency technology, these systems are also severely affected by fog and atmospheric turbulence. Generally, the performance of such communication systems can he measured by the two important parameters such as bit error rate (BER) and Q-factor. To improve the average BER performance of the system various advanced modulation techniques with different coding schemes have been proposed in the past literature. Thus in the proposed system, Manchester coding technique is used with the differential phase shift keying (DPSK) modulated signal. The designed system is compared with the differential phase shift keying with the 2-array pulse position modulation (DPSK-2PPM) scheme and the conventional DPSK system. Manchester encoding synchronizes the signal itself;hence, it minimizes the error rate and optimizes the reliability of the proposed system. In addition, a 16-channel wavelength division multiplexing (WDM) FSO system is considered for improving the spectral efficiency of the system. For analyzing, the low to high turbulence level of atmosphere, Gamma-Gamma type channel model is preferred.
Transmission reliability of data is an essential requirement of communication systems and multi-source Cooperation ensures it by allowing users to share their resources in order to collaborate through distributed tran...
详细信息
ISBN:
(纸本)9781479975051
Transmission reliability of data is an essential requirement of communication systems and multi-source Cooperation ensures it by allowing users to share their resources in order to collaborate through distributed transmission and processing of data. Another implication added on any communication system is that of a higher throughput;which is catered effectively by superposition coding. In this paper, a novel interleave division multiple access (IDMA) aided superposition coding scheme is considered. IDMA has been specifically designed for energy efficient multi-source cooperation. The concept of IDMA is introduced and the relation between superposition coding and IDMA is revealed. Our simulation results demonstrate improved signal to noise ratio (SNR) with reduction in bit error ratio (BER). Moreover performance comparison of single and multisource communication is presented.
A coding scheme for unicast over lossy packet wireless networks is presented in this paper. In the scheme, intermediate nodes perform additional coding and send out coded packets by broadcasting in subnet which is cal...
详细信息
With Network coding, a source can multicast information at a rate approaching the smallest minimum cut between the source and any terminal through encoding the incoming packets at intermediate node. On the other hand,...
详细信息
ISBN:
(纸本)9781424437092
With Network coding, a source can multicast information at a rate approaching the smallest minimum cut between the source and any terminal through encoding the incoming packets at intermediate node. On the other hand, in current wireless systems, terminals could receive multiple cells signal, but only registered cell's packets could be used, and others are dropped as useless or noise. This traditional way didn't make full use of information received by terminals. In this paper, a new transmission scheme using random network coding (RNCT) is introduced, in which all signals received by terminal are useful. Simulations show that this new scheme can improve spectral efficiency and wireless system throughput significantly than current transmission scheme (CTS).
This paper studies on wavelet transform coding for image sequence compression, proposed coding method includes displacement estimating in transform domain, quantization of transform coefficient difference values and a...
详细信息
This paper studies on wavelet transform coding for image sequence compression, proposed coding method includes displacement estimating in transform domain, quantization of transform coefficient difference values and a scheme of variable length coding. The computing simulation shows that wavelet transform coding has a superior performance in terms of free block-effects as well as the subjective quality to other transform coding method.
Electronic health record systems used in clinical settings to facilitate informed decision making, affects the dynamics between the physician and the patient during clinical interactions. The interaction between the p...
详细信息
ISBN:
(纸本)9781728185798
Electronic health record systems used in clinical settings to facilitate informed decision making, affects the dynamics between the physician and the patient during clinical interactions. The interaction between the patient and the physician can impact patient satisfaction, and overall health outcomes. Gaze during patient-doctor interactions was found to impact patient-physician relationship and is an important measure of attention towards humans and technology. This study aims to automatically label physician gaze for video interactions which is typically measured using extensive human coding. In this study, physicians' gaze is predicted at any time during the recorded video interaction using optical flow and body positioning coordinates as image features. Findings show that physician gaze could be predicted with an accuracy of over 83%. Our approach highlights the potential for the model to be an annotation tool which reduces the extensive human labor of annotating the videos for physician's gaze. These interactions can further be connected to patient ratings to better understand patient outcomes.
暂无评论