The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper we have proposed an adaptive network based fuzzy inference system (ANFIS) model where the number of data pairs employed for training is minimized by application of two techniques called the full factorial design (FFD) and V-fold. Our proposed method is applied in building ANFIS models for the benchmark example of Box and Jenkins gas furnace data and the thermal power plant of the North...
A password authenticated key exchange (PAKE) is a secure and authenticated bilateral key-exchange scheme, which uses a memorable password. Most of the key exchange protocols have high computational complexity leading complex hardware implementations. Though CA based PAKE is easily realizable in hardware, we observe that it has serious security flaws. In this paper we propose RPAKE, a secure PAKE scheme,...
A theoretical analysis is developed to evaluate the bit error rate (BER) performance degradation of an optical heterodyne CPFSK system caused by signal phase distortion due to polarization mode dispersion (PMD) in a single mode fiber. The average BER performance results are evaluated at a bit rate of 10 Gb/s considering Maxwellian distribution for the differential group delay (DGD). The results show...
Today distributed denial of service (DDoS) attacks is a major problem to the availability of Internet services. Several schemes have been proposed for countering DDoS attacks directed at an Internet server, but they suffer from a range of problems, some of them being impractical and others not being effective against these attacks. In this paper we propose a dynamic rate throttling technique that...
Power scheduling is a new concept of system-level dynamic power management in battery powered mobile systems. A power scheduling policy depends completely on the power request patterns of the target applications. The designer of any power scheduling policy has to guarantee that inclusion of her power scheduler in a particular set of applications would never force the system to violate any of its correctness...
This paper presents an automatic test generation methodology for complex coverage points in the context of systems consisting of an environment (E), a machine (M) and a controller (C). The coverage points are modeled as temporal scenarios over a set of low-level events supported in M. These events can't be generated directly. There exists a set of high-level macros (supported in E) that can generate...
The rapidly growth of the transmitted data amount, over wireless networks, has triggered special needs for compression, in an attempt for real-time communications. wireless transport layer security (WTLS) is the security layer for both wireless application protocol and open mobile alliance. In spite of the fact that a great, a compression unit is optional. Compression in wireless portable devices...
Emotional speech plays an important role for conveying the desired message. Emotions are manifested in speech signal at all the levels, in particular they are significant at suprasegmental level (i.e., prosodic level). In this paper four emotions are characterized (anger, compassion, happy and neutral) using the prosodic features such as duration, intonation (variation of pitch), and energy. The analysis...
This paper proposes a modified spectral subtraction method for the enhancement of noisy speech. The conventional spectral subtraction method involves two phases. In the first phase the average estimate of the noise spectrum is subtracted and the second phase involves several modifications to reduce the signal level, predominantly in nonspeech regions. The present work implements the first phase as...
We are proposing enhancements in one of the most popular data compression algorithm named LZW algorithm to increase overall performance of the algorithm. We have achieved this by applying three modification schemes to LZW algorithm. First two enhancement schemes eliminate the frequent flushing of dictionary, thus lowering processing time and third enhancement improves the compression ratio by reducing...
Nonlinear interference cancellation multiuser detection algorithms have less BER and are less complex than linear multiuser detection methods. We present a hybrid switched mode detector that uses existing interference cancellation methods i.e. parallel interference cancellation (PIC) and successive interference cancellation (SIC) based on channel conditions. This proposed detector takes decisions...
Information systems are one of the most rapidly changing and vulnerable systems, where security is a major issue. The number of security-breaking attempts originated inside the organizations is increasing steadily. Attacks made in this way, usually done by "authorized" users of the system cannot be immediately traced. As the idea of filtering the traffic at the entrance door, by using firewalls...
In this paper, robust and efficient time and frequency synchronization technique suitable for IEEE 802.11a wireless LAN system is proposed. The proposed method performs OFDM symbol boundary detection and frequency offset estimation using correlation techniques. The conjugate property of long preamble is used to reduce the computational complexity. In this proposed method, coarse time and fine frequency...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.