The Block Lossless Data Compression Algorithm
The mainstream lossless data compression algorithms have been extensively studied in recent years. However, rather less attention has been paid to the block algorithm of those algorithms. The aim...
View Article3D Cardiac MRI Data Visualization Based on Volume Data Preprocessing and...
The diversity and complexity of cardiac tissues makes it very challenging to visualize 3D cardiac Magnetic Resonance Image (MRI) data. This paper proposed an adaptive volume data preprocessing...
View ArticleXML Data Management in Compressed Relational Database
XML is an important standard of data exchange and representation. As a mature database system, using relational database to support XML data may bring some advantages. But storing XML in...
View ArticleRandomness Testing of Compressed Data
Random Number Generators play a critical role in a number of important applications. In practice, statistical testing is employed to gather evidence that a generator indeed produces numbers that...
View ArticleDirected Factor Graph Based Fault Diagnosis Model Construction for Mode...
Satellite power system is a complex, highly interconnected hybrid system that exhibit nonlinear and mode switching behaviors. Directed factor graph is an inference model for fault diagnosis using...
View ArticleLanguage Based Information Routing Security: Policy Enforcement
Languages-based security promises to be a powerful tool with which provably secure routing applications may be developed. Programs written in these languages enforce a strong policy of...
View ArticleA SCOR Reference Model of the Supply Chain Management System in an Enterprise
State-of-the-art supply chain management systems can be obtained from the supply chain operations reference-model for business applications, advancement and practices. Problematic management...
View ArticleDeveloping Approaches of Supply Chain Management Systems of Enterprises in...
This paper identifies the problems of pakistani enterprises concerning supply chain networks and orders solutions to improving its overall performance and competitiveness. Seldom, a non-trivial...
View ArticleTopological Queries on Graph-Structured XML Data: Models and Implementations
In many applications, data is in graph structure, which can be naturally represented as graph-structured XML. Existing queries defined on tree-structured and graph-structured XML data mainly focus...
View ArticleAn Efficient Algorithm for Reliability Lower Bound of Distributed Systems
The reliability of distributed systems and computer networks have been modeled by a probabilistic network or a graph G. Computing the Residual Connectedness Reliability (RCR), denoted by R (G),...
View ArticleCooperative Inter-Vehicle Communication Protocol Dedicated to Intelligent...
MANET marks the new age of the modern communication and it is a key technology to solve many applications such as telemedicine, environment monitoring, intelligent transport system (inter-vehicle...
View ArticleA Two-Way Strategy for Replica Placement in Data Grid
In large Data Grid systems the main objective of replication is to enhance data availability by placing replicas at the proximity of users so that user perceived response time is minimized. For a...
View ArticleEncrypting More Information in Visual Cryptography Scheme
The Visual Cryptography Scheme (VCS) is a scheme which encodes a secret image into several shares, and only qualified sets of shares can recover the secret image visually, other sets of shares...
View ArticleComposition of Business Components Based on Behavior for Software Reuse
The capability to easily find useful components has become increasingly importance in software reuse field. Current researches on component retrieval are mostly limited to retrieve the component...
View ArticleA Multimedia Digital Fingerprinting Scheme for Resisting Average Attack
Digital fingerprinting achieves piracy tracing through embedding a unique serial number called fingerprint into each distributed digital copy secretly. Once an unauthorized content copy is...
View ArticleA Fast Timing-Accurate MPSoC HW/SW Co-Simulation Platform Based on a Novel...
Fast and accurate full-system simulation is needed for MPSoC design space exploration to achieve tight time-to-market design goals. In the field of full-system simulation, transaction level...
View ArticleMaking Aggregation Scheduling Usable in Wireless Sensor Networks: An...
The problem of aggregation scheduling in wireless sensor networks is widely studied in order to minimize aggregation latency and prevent collisions. Many aggregation scheduling algorithms have...
View ArticleMinimum-Time Aggregation Scheduling in Multi-Sink Sensor Networks
Wireless sensor networks have been deployed in various applications such as battlefield surveillance and traffic monitoring. Data aggregation is an essential operation in sensor networks and has...
View ArticleA Novel Collaborative Navigation Architecture Based on Decentralized and...
To provide services for other applications, promoting the availability of Global Positioning System (GPS) is very important. While in the urban environments or with the high power malicious...
View ArticleSignal Perturbation Based Support Vector Regression for Wi-Fi Positioning
Location estimation using Received Signal Strength (RSS) in pervasively available Wi-Fi infrastructures has been considered as a popular indoor positioning solution. However, accuracy...
View Article
More Pages to Explore .....