Quantcast
Channel: Harbin Institute of Technology on TechRepublic
Browsing all 46 articles
Browse latest View live

The Block Lossless Data Compression Algorithm

The mainstream lossless data compression algorithms have been extensively studied in recent years. However, rather less attention has been paid to the block algorithm of those algorithms. The aim...

View Article



3D Cardiac MRI Data Visualization Based on Volume Data Preprocessing and...

The diversity and complexity of cardiac tissues makes it very challenging to visualize 3D cardiac Magnetic Resonance Image (MRI) data. This paper proposed an adaptive volume data preprocessing...

View Article

XML Data Management in Compressed Relational Database

XML is an important standard of data exchange and representation. As a mature database system, using relational database to support XML data may bring some advantages. But storing XML in...

View Article

Randomness Testing of Compressed Data

Random Number Generators play a critical role in a number of important applications. In practice, statistical testing is employed to gather evidence that a generator indeed produces numbers that...

View Article

Directed Factor Graph Based Fault Diagnosis Model Construction for Mode...

Satellite power system is a complex, highly interconnected hybrid system that exhibit nonlinear and mode switching behaviors. Directed factor graph is an inference model for fault diagnosis using...

View Article


Language Based Information Routing Security: Policy Enforcement

Languages-based security promises to be a powerful tool with which provably secure routing applications may be developed. Programs written in these languages enforce a strong policy of...

View Article

A SCOR Reference Model of the Supply Chain Management System in an Enterprise

State-of-the-art supply chain management systems can be obtained from the supply chain operations reference-model for business applications, advancement and practices. Problematic management...

View Article

Developing Approaches of Supply Chain Management Systems of Enterprises in...

This paper identifies the problems of pakistani enterprises concerning supply chain networks and orders solutions to improving its overall performance and competitiveness. Seldom, a non-trivial...

View Article


Topological Queries on Graph-Structured XML Data: Models and Implementations

In many applications, data is in graph structure, which can be naturally represented as graph-structured XML. Existing queries defined on tree-structured and graph-structured XML data mainly focus...

View Article


An Efficient Algorithm for Reliability Lower Bound of Distributed Systems

The reliability of distributed systems and computer networks have been modeled by a probabilistic network or a graph G. Computing the Residual Connectedness Reliability (RCR), denoted by R (G),...

View Article

Cooperative Inter-Vehicle Communication Protocol Dedicated to Intelligent...

MANET marks the new age of the modern communication and it is a key technology to solve many applications such as telemedicine, environment monitoring, intelligent transport system (inter-vehicle...

View Article

A Two-Way Strategy for Replica Placement in Data Grid

In large Data Grid systems the main objective of replication is to enhance data availability by placing replicas at the proximity of users so that user perceived response time is minimized. For a...

View Article

Encrypting More Information in Visual Cryptography Scheme

The Visual Cryptography Scheme (VCS) is a scheme which encodes a secret image into several shares, and only qualified sets of shares can recover the secret image visually, other sets of shares...

View Article


Composition of Business Components Based on Behavior for Software Reuse

The capability to easily find useful components has become increasingly importance in software reuse field. Current researches on component retrieval are mostly limited to retrieve the component...

View Article

A Multimedia Digital Fingerprinting Scheme for Resisting Average Attack

Digital fingerprinting achieves piracy tracing through embedding a unique serial number called fingerprint into each distributed digital copy secretly. Once an unauthorized content copy is...

View Article


A Fast Timing-Accurate MPSoC HW/SW Co-Simulation Platform Based on a Novel...

Fast and accurate full-system simulation is needed for MPSoC design space exploration to achieve tight time-to-market design goals. In the field of full-system simulation, transaction level...

View Article

Making Aggregation Scheduling Usable in Wireless Sensor Networks: An...

The problem of aggregation scheduling in wireless sensor networks is widely studied in order to minimize aggregation latency and prevent collisions. Many aggregation scheduling algorithms have...

View Article


Minimum-Time Aggregation Scheduling in Multi-Sink Sensor Networks

Wireless sensor networks have been deployed in various applications such as battlefield surveillance and traffic monitoring. Data aggregation is an essential operation in sensor networks and has...

View Article

A Novel Collaborative Navigation Architecture Based on Decentralized and...

To provide services for other applications, promoting the availability of Global Positioning System (GPS) is very important. While in the urban environments or with the high power malicious...

View Article

Signal Perturbation Based Support Vector Regression for Wi-Fi Positioning

Location estimation using Received Signal Strength (RSS) in pervasively available Wi-Fi infrastructures has been considered as a popular indoor positioning solution. However, accuracy...

View Article
Browsing all 46 articles
Browse latest View live




Latest Images