Localized network coding can greatly improve the throughput of wireless mesh networks. In a typical practical wireless transmission mechanism using localized network coding, such as COPE, to make decision which forwar...
详细信息
ISBN:
(纸本)9780769550886
Localized network coding can greatly improve the throughput of wireless mesh networks. In a typical practical wireless transmission mechanism using localized network coding, such as COPE, to make decision which forwarding packets should be coded together, each node needs to broadcast a notification message every tau interval time to inform their neighbors which packets they have buffered currently. However, the tau-interval-notification mechanism will incur non-negligible overhead, especially when tau is small, and it is difficult to determine the value of tau due to the unbalanced network payload. In this paper, we analyzed the overhead of the tau-interval-notification mechanism, and proposed a novel lightweight reception-report-notification mechanism, named ARSM, for localized network coding, in which a node will be triggered to send notification of reception reports when it has buffered k new packets, and each notification will include information of 2k latest buffered packets to decrease the message size of the notification and guarantee the coding efficiency meanwhile. Simulation results show that ARSM can achieve higher coding efficiency with less overhead, and a coding aware transmission mechanism based on ARSM will achieve a higher throughput than the one based on the tau-interval-notification mechanism.
A hybrid estimate model for transmission distortions is proposed by analyzing characteristics of error propagation in multiview video coding (MVC) in this paper. Based on this model, a joint source-channel RDO mode se...
详细信息
The Web information space is rapidly growing in the size and the diversity of both its data and its audience. A consequence is that Web information Systems (WIS) in many applications replace existing traditional (not ...
详细信息
ISBN:
(纸本)0769519164
The Web information space is rapidly growing in the size and the diversity of both its data and its audience. A consequence is that Web information Systems (WIS) in many applications replace existing traditional (not Web based) information systems. Since the nature of WIS differs from the nature of traditional information systems there is a strong demand for design methodologies specifically oriented towards WIS design. The complexity of WIS implies the need for an effective design process and a rigorous and systematic design approach. We argue that besides the quality of the navigation that is typical for Web (hypermedia) data also the adaptation of the presented content is a desired feature of a modern WIS. In this paper we briefly describe the navigation and adaptation design in selected WIS design methodologies, RMM, OOHDM, UWE, and particulary Hera.
Recently, edge computing (EC) has attracted wide attention as a novel and promising computing mode with high real-time and low-latency characteristics. However, users' privacy and the limited resources have become...
详细信息
ISBN:
(纸本)9781665416580
Recently, edge computing (EC) has attracted wide attention as a novel and promising computing mode with high real-time and low-latency characteristics. However, users' privacy and the limited resources have become major concerns in the implementation of EC because edge devices are usually heterogeneous and untrustworthy. Although many related works have protected the user's privacy, they did not take the storage resource limitation of heterogeneous edge devices into consideration and their schemes may cause high communication load. In this paper, we propose PCHEC, a Private Coded computation scheme for Heterogeneous Edge computing, to protect the user's privacy and minimize the communication load. Specifically, PCHEC first gives a storage allocation scheme to minimize the communication load in EC where the heterogeneous edge devices have different storage limits. Secondly, PCHEC utilizes linear coding to mix the target data with other information for the protection of the user's privacy. To evaluate the efficiency of PCHEC, we make theoretically analysis and conduct extensive simulations. The experiments show PCHEC effectively reduces the communication load by up to 70% compared with other schemes.
Wireless video security becomes an important challenge for commercial applications. Two efficient encryption algorithms for video system, Signed Integer Exponential-Golomb Coded (SE) Encryption Algorithm and Context-A...
详细信息
作者:
Nambi, AKAAnna Univ
Dept Elect & Elect Engn Madras 600025 Tamil Nadu India
The rate at which information is produced in today's world is mind-boggling. The information is changing by every minute and today's corporate mantra is not "knowledge is power" but "Timely know...
详细信息
ISBN:
(纸本)0769519164
The rate at which information is produced in today's world is mind-boggling. The information is changing by every minute and today's corporate mantra is not "knowledge is power" but "Timely knowledge is power". Millions of Dollars are won or lost, due to information or lack of it. Business executives and corporate managers push their technology managers to provide information at the right time in the right form. They want information on the go and want to be connected all the time to the Internet or their corporate network. The rapid advancement of technology in the field of miniaturization and that of communications has introduced a lot of roaming devices for people to connect through to the network like laptop, PDA, mobile phones and many embedded devices. Programming for these devices were cumbersome and limited since each device supported their own standard I/O ports, screen resolution and had specific configurations. The introduction of Java 2 Micro Edition (J2ME) has solved this problem to some extent. J2ME is divided into configuration and profiles, which provide specific information to a group of related devices. Mobile phones can be programmed using J2ME. If the mobility offered by the cellular phones combined with Electrical Engineering many new uses can be found out for existing electrical machines. It will also enable remote monitoring of electrical machines and the various parameters involved in Electrical Engineering.
The covariance analysis of linear predictive coding has wide applications, especially in speech recognition and speech signal processing. Real-time applications demand very high processing speed for linear predictive ...
详细信息
The explosively growing wireless video traffic demands high video quality and transmission efficiency. A new scheme for video transmission over channel with noise is proposed in this paper. Like standard video transmi...
详细信息
ISBN:
(纸本)9781538636527
The explosively growing wireless video traffic demands high video quality and transmission efficiency. A new scheme for video transmission over channel with noise is proposed in this paper. Like standard video transmission, the scheme includes entropy coding followed by powerful channel coding. Unlike conventional schemes, we use a rateless coded modulation scheme instead of adaptive modulation coding (AMC) in traditional digital video transmitting to solve the dilemma of inaccurate channel estimation. The proposed rateless scheme does not need the explicit channel condition, it matches channel condition implicitly. We optimize the proposed system over GF(2). Performance comparisons are made with respect to the state-of-the-art video coding and channel coding scheme used in Long Term Evolution (LTE) mobile network. Experiments show that the proposed system outperforms LTE by 2-3dB.
Clinical information systems (CISs) in some hospitals streamline the data management from data warehouses. These warehouses contain heterogeneous information from all medical specialties that offer patient care servic...
详细信息
ISBN:
(纸本)9781614998686;9781614998679
Clinical information systems (CISs) in some hospitals streamline the data management from data warehouses. These warehouses contain heterogeneous information from all medical specialties that offer patient care services. It is increasingly difficult to manage large volumes of data in a specific clinical context such as quality coding of medical services. The document-based Not Only SQL (NO-SQL) model can provide an accessible, extensive and robust coding data management framework while maintaining certain flexibility. This paper focus on the design and implementation of a big data-coding warehouse, it also defines the rules to convert a conceptual model of coding into a document-oriented logical model. Using that model, we implemented, analyzed a big data-coding warehouse via the Mongodb database, and evaluated it using data research mono- and multi-criteria and then calculated the precision of our model.
The document representation is an important aspect of both information retrieval and information extraction. In this paper the bag of words representation of documents is enriched with Lexical, Conceptual and Contextu...
详细信息
ISBN:
(纸本)0769519164
The document representation is an important aspect of both information retrieval and information extraction. In this paper the bag of words representation of documents is enriched with Lexical, Conceptual and Contextual relationships. In order to effectively represent and inference with this representation, a mathematical model is required. In this work, the enhanced interrelated set of bag of words that is semantically lattice of words is represented using description logic. The conceptual taxonomy extracted using WordNet can be represented naturally using DL. The DL also provides consistency, satisfiability, instance checking, subsumption services to semantically extend the initial enhanced lattice of words. The contextual knowledge can be extracted by syntactic patterns, dependency relations and heuristics. Tourist and Sports domains are taken for the implementation of this work. This knowledge extracted and represented can be used in applications like information retrieval and information extraction.
暂无评论