Search results for "Computer Networks"
showing 10 items of 860 documents
DiDuSoNet: A P2P architecture for Ditributed Dunbar-based Social Networks,
2015
Online Social Networks (OSNs) are becoming more and more popular on the Web. Distributed Online Social Networks (DOSNs) are OSNs which do not exploit a central server for storing users data and enable users to have more control on their profile content, ensuring a higher level of privacy. In a DOSN there are some technical challenges to face. One of the most important challenges is the data availability problem when a user is offline. In this paper we propose DiDuSoNet, a novel P2P Distributed Online Social Network where users can exercise full access control on their data. Our system exploits trust relationships for providing a set of important social services, such as trustness, informati…
Investigating the impact of virtual tourism on travel intention during the post-COVID-19 era: evidence from China
2022
This study explores the mechanism that contributes to travel intention in the field of virtual tourism. The overall research method is based on the "Stimulus-Organism-Response" theory. In the research model, the effects of content quality, system quality, and interaction quality in virtual tourism on tourism experience and travel intention are explored, as well as the role of virtual attachment and travel intention. A total of 390 respondents were invited to participate in a virtual tourism experience, and provide feedback through a questionnaire. SmartPLS 3.3.2 was used to validate the causal model, and most of the study hypotheses were supported. The findings show that virtual tourism sig…
Decentralized Lightweight Group Key Management for Dynamic Access Control in IoT Environments
2020
Rapid growth of Internet of Things (IoT) devices dealing with sensitive data has led to the emergence of new access control technologies in order to maintain this data safe from unauthorized use. In particular, a dynamic IoT environment, characterized by a high signaling overhead caused by subscribers' mobility, presents a significant concern to ensure secure data distribution to legitimate subscribers. Hence, for such dynamic environments, group key management (GKM) represents the fundamental mechanism for managing the dissemination of keys for access control and secure data distribution. However, existing access control schemes based on GKM and dedicated to IoT are mainly based on ce…
Optimized Parallel Implementation of Face Detection based on GPU component
2015
Display Omitted An algorithm for face detection has been implemented on CPU.An acceleration of this algorithm on GPU migration.Performance of GPU implementation shows the effectiveness of this implementation.Another optimization method on GPU are operated. Face detection is an important aspect for various domains such as: biometrics, video surveillance and human computer interaction. Generally a generic face processing system includes a face detection, or recognition step, as well as tracking and rendering phase. In this paper, we develop a real-time and robust face detection implementation based on GPU component. Face detection is performed by adapting the Viola and Jones algorithm. We hav…
A distributed genetic algorithm for restoration of vertical line scratches
2008
This paper reports a distributed algorithm for the restoration of still frames corrupted by vertical line scratches. The restoration is here approached as an optimisation problem, and is solved using an ad-hoc Genetic Algorithm. The distributed algorithm is designed following a pipeline logical structure. The front end is a network of standard workstations with heterogeneous operating systems. The quality of image is appreciable and the computational time is quite low with respect the sequential version.
The complexity of graph languages generated by hyperedge replacement
1990
Although in many ways, hyperedge replacement graph grammars (HRGs) are, among all graph generating mechanisms, what context-free Chomsky grammars are in the realm of string rewriting, their parsing problem is known to be, in general, NP-complete. In this paper, the main difficulty in HRG parsing is analysed and some conditions on either grammar or input graphs are developed under which parsing can be done in polynomial time. For some of the cases, the parsing problem is shown to be log-space reducible to context-free string parsing.
CORMORANT
2019
People own and carry an increasing number of ubiquitous mobile devices, such as smartphones, tablets, and notebooks. Being small and mobile, those devices have a high propensity to become lost or stolen. Since mobile devices provide access to their owners' digital lives, strong authentication is vital to protect sensitive information and services against unauthorized access. However, at least one in three devices is unprotected, with inconvenience of traditional authentication being the paramount reason. We present the concept of CORMORANT, an approach to significantly reduce the manual burden of mobile user verification through risk-aware, multi-modal biometric, cross-device authentication…
Hereditariness of Aortic Tissue: In-Vitro Time-Dependent Failure of Human and Porcine Specimens
2018
This study aims to investigate the time dependent failure of aortic tissues for pathological and healthy samples by biomechanical testing. The experimental campaign has involved human pathological tissue and healthy swine tissue as preliminary study towards the development of novel failure criteria.
Geometry-Based Statistical Modeling of Non-WSSUS Mobile-to-Mobile Rayleigh Fading Channels
2017
In this paper, we present a novel geometry-based statistical model for small-scale non-wide-sense stationary uncorrelated scattering (non-WSSUS) mobile-to-mobile (M2M) Rayleigh fading channels. The proposed model builds on the principles of plane wave propagation to capture the temporal evolution of the propagation delay and Doppler shift of the received multipath signal. This is different from existing non-WSSUS geometry-based statistical channel models, which are based on a spherical wave propagation approach, that in spite of being more realistic is more mathematically intricate. By considering an arbitrary geometrical configuration of the propagation area, we derive general expressions …
A Unified Disk Scattering Model and Its Angle-of-Departure and Time-of-Arrival Statistics
2013
This paper proposes a novel probability density function (PDF) for the distribution of local scatterers inside a disk centered on the mobile station (MS). The new scattering model is introduced as the unified disk scattering model (UDSM), as it unifies a variety of typical circularly symmetric scattering models into one simple model. By adjusting a designated shape factor controlling the distribution of the scatterers, both the uniform circular and uniform ring scattering models can be obtained as special cases. Furthermore, the original Gaussian and uniform hollow-disk scattering models can be approximated with a high level of accuracy. In addition to these established scattering models, a…