The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Flexible manipulator systems exhibit many advantages over their traditional (rigid) counterparts. However, they have not been favored in production industries due to its obvious disadvantages in controlling the manipulator. This paper presents theoretical investigation into the dynamic modeling and characterization of a constrained two-link flexible manipulator, by using finite element method. The...
A Hierarchical Torus Network (HTN) is a 2D-torus network of multiple basic modules, in which the basic modules are 3D-torus networks that are hierarchically interconnected for higher level networks. The dynamic communication performance of the HTN using the dimension-order routing under common traffic patterns have been evaluated, and have been shown to be good. However, dynamic communication performance...
A novel SQL Tunnelling system to allow communication with an SQL database is developed by utilising the standard Internet protocol HTTP. The communication with the database is allowed by a client interacting with a Web Service running on a standard off-the-shelf HTTP Server. With this tunnelling system, access to a database can be provided without providing access to the database native communication...
The following topics are dealt with: algorithms; artificial intelligence; Bangla language processing; computer networks; data communication; distributed systems; digital logic; system design; e-commerce; e-governance; graphics; multimedia; information systems; knowledge engineering; data engineering; neural networks; robotics; pattern recognition; image processing; ubiquitous computing; and mobile...
In traditional directional spatial prediction based video coding standards such as H.264/AVC, MPEG4 and AVS, zigzag scan is the fixed scan pattern which designed to organize quantized transform coefficients in order to bring the high-frequency components as more as possible, so that the coefficients can be encoded more efficiently using the entropy encoding. However, zigzag scan cannot efficiently...
The most critical and difficult problem in speech analysis is reliable discrimination among Silence, Unvoiced and Voiced speech. Several methods have been proposed for making this three levels decision and most of them need Speech Activity Detection (SAD). In this study, we propose the Estimated Degree of Noise (EDON) to adjust the threshold of speech activity. To estimate the degree of noise, a function...
Single Wall Carbon Nanotubes exhibit outstanding contributions in the recent VLSI interconnections. Interconnects analyzed in VLSI circuits depends on the electrical properties of carbon nanotubes. Metallic carbon nanotubes are very distinct for their ballistic conductivity in nano level interconnections. Different peaks are analyzed in Raman spectroscopy technique for characterizing metallic carbon...
Ternary content-addressable memory (TCAM) has become popular in high-speed lookup intensive applications. Large dynamic power consumption of TCAMs makes power reduction techniques an active area of research. In this paper we present a new match-line (ML) sensing scheme employing ML segmentation and positive feedback in the sense amplifier of the first segment. Simulation using 130nm 1.2V CMOS logic...
Quaternary logic requires a dedicated comparator circuit besides the usual add/sub unit which may not be optimal due to several reasons. In this paper, we have thoroughly discussed various alternative expressions for equality operator which serves as the basis for quaternary comparator. Then we have derived the necessary equations for single qudit comparator and extended it to serial multi qudit comparator...
Mobile networks can be formed in bus, train, aircrafts, satellites with a wide variety of on-board IP-enable devices and Network Mobility (NEMO) protocols are required to support uninterrupted services to ongoing sessions. Node mobility has a direct impact on the performance evaluation of various NEMO protocols. However, most of the analysis on mobility protocols used random waypoint mobility model...
For many years the only known passive circuit elements were resistor, inductor and capacitor. In 1971, Leon Chua showed using argument that there should exist another passive element which he named memristor. It is basically a resistor whose resistance increases when current flows through it from one direction and decreases when current flows from the other direction. After 37 years researchers of...
Over the last decade many but totally different Total Cost of Ownership reports were generated for a same system. It was even more puzzling since most of the times these reports were sponsored by the vendors themselves. There is more or less a war between Windows and Linux about which one has the best TCO. It is highly likely that the generated TCO is based on vendors' feelings for their operating...
This paper presents a prototype implementation of an intelligent system called safe system that monitors container security in the port logistics. Logistics supports in the port require safe container status. The main focus of our contribution is to design a system that supports RFID (Radio Frequency Identification) Readers of all types (such as Reader Protocol complaint and vendor provided Readers),...
The increased prevalence of mobile phones provides exciting opportunities for the growth of mobile banking (m-banking). This article reviews the emerging research literature on m-banking. It presents a classification framework for m-banking research based on 65 m-banking articles published between 2000 and mid-2010 in Information Systems (IS), technology innovation, management, and marketing journals,...
In this paper the authors have shown the ebb and flow of subscribers of different cell operators in Bangladesh based on their call rate, network, and other external facilities and suggests a new approach for the constituency of these operators to find out how all the operators can ensure customer satisfaction. Performance of a cellular system mainly depends on circuit merits (CM) of voice quality,...
Internet has gained huge popularity over the last decade. It offers its users reliable, efficient and exciting online services. However, the users reveal a lot of their personal information by using these services. Websites that collect information state their practices with data in their privacy policies. However, it is difficult to ensure if the policies are enforced properly in their practices...
Automated Essay Grading (AEG) is a very important research area in educational technology. Latent Semantic Analysis (LSA) is an information retrieval technique used for automated essay grading. LSA forms a word by document matrix and then the matrix is decomposed using Singular Value Decomposition (SVD) technique. Existing AEG systems based on LSA cannot achieve higher level of performance to be a...
Given a set of n points in the plane, the problem of computing the circular ordering of the points about a viewpoint v and efficiently maintaining this ordering information as v moves is well defined in computer graphics and animation. Each of the unique circular ordering in respect to v is called as view. In this paper, our task is to generalize this idea for 3D point set and to propose a kinetic...
Automated Theorem Proving systems are enormously powerful computer programs capable of solving immensely difficult problems. The extreme capabilities of these systems lie on some well-established proof systems. Semantic tableau is such a proof system used to prove the validity of a formula by contradiction and can produce a counterexample if it fails. It can also be used to prove whether a formula...
In this paper, a faster supervised algorithm (BPfast) for the neural network training is proposed that maximizes the derivative of sigmoid activation function during back-propagation (BP) training. BP adjusts the weights of neural network with minimizing an error function. Due to the presence of derivative information in the weight update rule, BP goes to `premature saturation' that slows down the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.