In this paper, a time-domain signal detection algorithm based on second-order statistics (SOS) is proposed for multiple input-multiple output (MIMO)-orthogonal frequency division multiplexing (OFDM) systems over frequency selective fading channels. A new system model in which the ith received OFDM block is left shifted by J samples is introduced. Based on some structural properties of […]
Coding Schemes Applied to Peak-to-Average Power Ratio (PAPR) Reduction in OFDM Systems
High PAPR of the transmitted signal is a major drawback in the OFDM systems. In this paper, coding schemes are proposed to reduce high PAPR One is using parity check coding scheme, and the other is using selected mapping (SLM) applied scheme. With parity check coding scheme, the parity information is used to expand the […]
DNA secret writing techniques
The paper presents the principles of bio molecular computation (BMC) and several algorithms for DNA (deoxyribonucleic acid) steganography and cryptography: One-Time-Pad (OTP), DNA XOR OTP and DNA chromosomes indexing. It represents a synthesis of our work in the field, sustained by former referred publications. Experimental results obtained using Matlab Bioinformatics Toolbox and conclusions are ending […]
Data integrity proofs in cloud storage
Cloud computing has been envisioned as the de-facto solution to the rising storage costs of IT Enterprises. With the high costs of data storage devices as well as the rapid rate at which data is being generated it proves costly for enterprises or individual users to frequently update their hardware. Apart from reduction in storage […]
A Personalized Ontology Model for Web Information Gathering
As a model for knowledge description and formalization, ontologies are widely used to represent user profiles in personalized web information gathering. However, when representing user profiles, many models have utilized only knowledge from either a global knowledge base or a user local information. In this paper, a personalized ontology model is proposed for knowledge representation […]
One Size Does Not Fit All: Towards User- and Query-Dependent Ranking For Web Databases
With the emergence of the deep Web databases, searching in domains such as vehicles, real estate, etc. has become a routine task. One of the problems in this context is ranking the results of a user query. Earlier approaches for addressing this problem have used frequencies of database values, query logs, and user profiles. A […]
Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques
Recommender systems are becoming increasingly important to individual users and businesses for providing personalized recommendations. However, while the majority of algorithms proposed in recommender systems literature have focused on improving recommendation accuracy (as exemplified by the recent Netflix Prize competition), other important aspects of recommendation quality, such as the diversity of recommendations, have often been […]
A Unified Probabilistic Framework for Name Disambiguation in Digital Library
Despite years of research, the name ambiguity problem remains largely unresolved. Outstanding issues include how to capture all information for name disambiguation in a unified approach, and how to determine the number of people K in the disambiguation process. In this paper, we formalize the problem in a unified probabilistic framework, which incorporates both attributes […]
Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in the Cloud
In recent years ad hoc parallel data processing has emerged to be one of the killer applications for Infrastructure-as-a-Service (IaaS) clouds. Major Cloud computing companies have started to integrate frameworks for parallel data processing in their product portfolio, making it easy for customers to access these services and to deploy their programs. However, the processing […]
The Security of Cloud Computing System enabled by Trusted Computing Technology
Cloud computing provides people the way to share distributed resources and services that belong to different organizations or sites. Since cloud computing share distributed resources via the network in the open environment, thus it makes security problems important for us to develop the cloud computing application. In this paper, we pay attention to the security […]