Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








3,051 Hits in 3.4 sec

Regularly Lossy Functions and Their Applications [article]

Yu Chen, Baodong Qin, Haiyang Xue
2018 IACR Cryptology ePrint Archive  
In the normal mode, functions are injective and invertible with a trapdoor. In the lossy mode, functions statistically lose information about their inputs.  ...  We demonstrate the utility of RLFs and their extensions in the leakage-resilient cryptography. • As a special case of RLFs, lossy functions imply leakage-resilient injective one-way functions with optimal  ...  Dual projective hashing and its applications -lossy trapdoor functions and more. In Advances in Cryptology -EUROCRYPT 2012, volume 7237 of LNCS, pages 246-262. Springer, 2012.  ... 
dblp:journals/iacr/0003QX18 fatcat:7dmow5fr65hhbls2kauybc2dte

Computing Just What You Need: Online Data Analysis and Reduction at Extreme Scales

Ian Foster
2017 2017 IEEE 24th International Conference on High Performance Computing (HiPC)  
This change in focus complicates application and experiment design and introduces algorithmic, implementation, and programming model challenges that are unfamiliar to many scientists and that have major  ...  Instead, applications must analyze and reduce data online so as to output only those results needed to answer target scientific question(s).  ...  -Provide the infrastructure needed to create a testing framework (Cheetah) to evaluate reduction and analysis functions for performance on a variety of levels (application and platform) -Provide a reference  ... 
doi:10.1109/hipc.2017.00042 dblp:conf/hipc/Foster17 fatcat:li6yvnrkqbe6blhn72mqv64sre

Image Compression using Bayesian Fourier

Pritthish Chattopadhyay, Ronit Chaudhuri, Sreyam Dasgupta
2017 International Journal of Engineering Research and  
It will have a user-friendly interface, and it will be web based software where the database of images clicked by the account holders will be stored in their accounts.  ...  The software will have options for uploading the original image, compressing the image and downloading and storing the compressed output image in a desired folder of the system.  ...  Image compression might be lossy or lossless. Lossless compression is favored for authentic purposes and regularly for medicinal imaging, specialized drawings, clip art, or comics.  ... 
doi:10.17577/ijertv6is050262 fatcat:enmkiphdsngurkxkfzy6sqtey4

An Adaptive Data Aggregation Algorithm in Wireless Sensor Network with Bursty Source

Kumar PADMANABH, Sunil Kumar VUPPALA
2009 Wireless Sensor Network  
In the second case the sensor data goes under statistical process (average, maximum, minimum) and results are communicated to the base station, this is called lossy aggregation, because we cannot recover  ...  Sensor network has severe energy constraints, redundant low data rate, and many-to-one flows. Aggregation is a technique to avoid redundant information to save energy and other resources.  ...  In our system we consider both lossy and lossless types of aggregation. To choose between lossy and lossless is completely application dependent.  ... 
doi:10.4236/wsn.2009.13029 fatcat:2qv4vuxlarf6ncy5o5xbt2xfvq

Network-conscious compressed images over wireless networks [chapter]

Sami Iren, Paul D. Amer, Phillip T. Conrad
1998 Lecture Notes in Computer Science  
We explain why this approach is useful in general and speci cally for wireless heterogeneous environments.  ...  Using an Application Level Framing philosophy, an image is compressed into path MTU-size Application Data Units ADUs at the application layer.  ...  In Figure 2b , there is better progressive display for two reasons: the transport protocol delivers TPDUs 3 and 4 to the application sooner, and, the application can perform their decompression even though  ... 
doi:10.1007/bfb0055313 fatcat:lwahcsor5bedxaln4nwcgcvpsi

Name-based Location Service for Mobile Agents in Wireless Sensor Networks

Shunichiro Suenaga, Shinichi Honiden
2008 Proceedings of the 1st International ICST Conference on Mobile Wireless Middleware, Operating Systems and Applications  
Mobile agent technologies are effective ways of deploying applications in wireless sensor networks (WSN).  ...  We show that our approach can enable communication with the nearest target agent and maintains a constant level of communication among mobile agents over the whole WSN.  ...  In our method, the names of the agents that together form an application are defined according to their function or type.  ... 
doi:10.4108/icst.mobilware2008.2802 dblp:conf/mobilware/SuenagaH08 fatcat:c32e74ujlbds5otik6clmedxbq

Medical Data Compression and Transmission in Noisy WLANS: A Review

Mustafa Almahdi Algaet, Abd Samad Bin Hasan Basari, Ali Ahmad Milad, Salem Msaoud Adrugi, Salem Mustafa Aldeep
2019 International Journal of Grid and Distributed Computing  
Computer-based modeling applications serve as possible approaches in designing easy-to-evaluate medical data communications.  ...  This paper also reviews related research, especially studies on data compression algorithms and data transmission standards on Wi-Fi with past, present, and future directions.  ...  ACKNOWLEDGMENTS This research was funded by the Ministry of Higher Education Libya and Elmergib University.  ... 
doi:10.33832/ijgdc.2019.12.2.01 fatcat:qsycpadysrc5beigzcaobbwvl4

Adaptive Joint Lossy Source-Channel Coding for Multihop IoT Networks

Imad Ez-zazi, Mounir Arioua, Ahmed El Oualkadi
2020 Wireless Communications and Mobile Computing  
We consider monitoring applications in multihop wireless sensor networks (WSNs), where nodes rely on limited batteries so that energy efficiency and reliability are of paramount importance.  ...  Then, we evaluate the performance of the JLSCC system compared to lossy compression and ECC systems in both end-to-end and multihop communications.  ...  error function.  ... 
doi:10.1155/2020/2127467 fatcat:zbelsecibfdppjatoscl6hi46u

Analysis of Efficiently Lossless Compression of Color Image by using Deferent Algorithms

Siddharth Sinha, Ayoush Johari
2015 International Journal of Computer Applications  
Digital Color Image required large amount of space to store and large bandwidth to transmit it.  ...  Due to limitations in bandwidth and in storage space, it is vital requirement to compresses digital color image.  ...  It is by and large utilized for applications that can't permit any contrast between the first and reconstructed information [2] .  ... 
doi:10.5120/19248-0888 fatcat:7aw4j2sp2rbwtb3uoyogabxw6y

An Intelligent Packet Loss Control Heuristic for Connectionless Real-Time Voice Communication

Murat Şensoy, Burcu Yılmaz, Erdoğan Yılmaz
2010 Mathematical Problems in Engineering  
Instead of detecting and resending lost voice packets, this heuristic estimates the packet loss rate adaptively using a modified version of reinforcement learning and resends the most critical packets  ...  However, connectionless protocols such as UDP do not provide such packet loss control and suitable for real-time communication such as voice or video communication.  ...  For different applications, different aging functions can be used. A general aging function used in this study is shown in 2.5 .  ... 
doi:10.1155/2010/984923 fatcat:rsx5l2oq7vajjfg37jbjpqvcjq

A STUDY ON THE IMPORTANCE OF IMAGE PROCESSING AND ITS APLLICATIONS

Basavaprasad B .
2014 International Journal of Research in Engineering and Technology  
A systematic study on importance of image processing and its applications to the field of computer vision is carried out in this paper.  ...  Some of the important applications of image processing in the field of science and technology include computer vision, remote sensing, feature extraction, face detection, forecasting, optical character  ...  OCR is a meadow of research in intelligence, pattern and computer vision. Early versions required to be automated with images of each character, and functioned on one font at a time.  ... 
doi:10.15623/ijret.2014.0315029 fatcat:4f3s5q6whbaj7knuylb3bjt6mm

Image data compression using fast Fourier transform (FFT) technique for wireless sensor network

M. H. Haron, M. N. Md. Isa, M. I. Ahmad, M. A. Mohamed Arshad, A. B. Jambek, S. Z. M Naziri, R. Hussin, R. C. Ismail, A. Harun, S. N. Mohyar
2024 AIP Conference Proceedings  
Low-power LoRaWAN networks may regularly transmit compressed images from an agricultural region to a monitoring system up to 15 km away.  ...  According to the numbers, the best achievable compression ratio is 49.04, with an MSE of 172.72 and a PSNR of 25.75 at its highest.  ...  The authors express their gratitude to the Faculty of Electronic Engineering Technology at University Malaysia Perlis for their valuable guidance and to the Fundamental Research Grant Scheme (FRGS) for  ... 
doi:10.1063/5.0195298 fatcat:muzt2sr3wrbbri7dwgxrjgwepq

Passive Loss Inference in Wireless Sensor Networks Using EM Algorithm

Yu Yang, Zhulin An, Yongjun Xu, Xiaowei Li, Canfeng Che
2010 Wireless Sensor Network  
Finally, we validate the algorithm through simulations and it exhibits good performance and scalability.  ...  Our algorithm is applicable not only to periodic data collection scenarios but to event detection scenarios.  ...  The presented algorithm passively monitors the application traffic between sensor nodes and the sink, and then uses network tomography technology [7, 8] to locate lossy links.  ... 
doi:10.4236/wsn.201027063 fatcat:wb7y55y3tjaothzjbo3rednlci

A Survey Paper on Context Base Routing Protocol (CBRP) in IoT

Dr. Pardeep Kumar, G H Raisoni College of Engineering Nagpur
2020 International Journal of Engineering Research and  
However, records isn't inherently associated with expertise in their context.  ...  This information may additionally be available at the conversation end-points (applications) but now not when facts is in transit.  ...  function.  ... 
doi:10.17577/ijertv9is090386 fatcat:6ngicpmnmrfeno4n66fbexm6ue

Compression Challenges in Large Scale Partial Differential Equation Solvers

Sebastian Götschel, Martin Weiser
2019 Algorithms  
Often, bandwidth is the limiting factor due to the relatively small arithmetic intensity, and increasingly due to the growing disparity between computing power and bandwidth.  ...  We illustrate concepts for particular methods, with examples, and give references to alternatives.  ...  Acknowledgments: We thank Florian Wende for implementing mixed-precision preconditioners, Alexander Kammeyer for implementation and testing of checkpoint/restart, and Thomas Steinke for many helpful discussions  ... 
doi:10.3390/a12090197 fatcat:6ijsicazfbgxfgnma5sb4kow4q
« Previous Showing results 1 — 15 out of 3,051 results