The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
For various reasons in recent years the interest in building quantum computers has increased gradually. To do the calculations in quantum computer we need quantum arithmetic logic unit (ALU). The building block of quantum ALU is quantum adder. In quantum computer multivalued logic is possible. In this paper a generalized circuit has been proposed to build odd base multivalued quantum full adder. A...
A neural representation of combinational logic circuit is proposed, called `Logical Neural Network' (LNN). LNN is a feed-forward neural network (NN) where the weights of the network indicate the connections of digital circuit. The logic operations of the circuit such as AND, OR, NOR etc are performed with the neurons of LNN. A modification of Simple Genetic Algorithm (mSGA) is applied to design and...
Simplified visualisation of the fuel spray developing process of varied ethanol content in an open spray by the liquid injection technique. For obtaining spray characteristics in the liquid, the visualisation principles were based on spray penetrations images. The video imaging and schlieren technique have been used to investigate the spray development and behaviours at different injection time defined...
Fingerprint detection is one of the most important applications of image processing in a security system. Recent literature deals with fingerprint detection based on pattern recognition, moment based image recognition and discrete wavelet transform (DWT). Among them DWT based analysis requires the least amount of memory space which considers only wavelet coefficient of an image in matching with preserved...
As a promising broadband wireless technology, WiMAX has many salient advantages over such as: high data rates, quality of service, scalability, security and mobility. Many sophisticated authentication and encryption techniques have been embedded into WiMAX but it still facing a lot of challenging situations. This paper shows different security vulnerabilities found in IEEE 802.16e and gives possible...
We introduce a facial expression recognition method, which incorporates a weight to the Local Binary Pattern (LBP), and generates solid expression features. Furthermore, we use Adaboost to select a small set of prominent features, which is used by the Support Vector Machine (SVM) to classify facial expressions efficiently. Experimental results demonstrate that our method outperforms the state-of-the-art...
In this paper auditory like features MLPC and MFCC have been used as front-end and their performance has been evaluated on Aurora-2 database for Hidden Markov Model (HMM) based noisy speech recognition. The clean data set is used for training and test set A is used to examine the performance. It has been found that almost the same recognition performance has been obtained both for MLPC and MFCC and...
Finding desire information from a large text database is one of the most important issues of modern information processing systems. In this regard different types of searching techniques are used. Though some of them are vary useful, they frequently fail to show appropriate performance when a user enters misspelled data as searching keyword. In this paper we have developed an efficient search suggestion...
In a data exchange system the correctness of the system depends on data exchange semantics. This can be well verified by using query answering. In the close world assumption (CWA) two types of answers are obtained, one is certain answer, which ignores the null values, another is maybe answer, which considers the null values. In this thesis, we give a procedure for computing a finite representation...
Many recommendations are proposed for accommodating multimedia content into wireless media with lower bandwidth. These formats of the content have been developed with different objectives. Now it has become really challenging to compare all these diversified formats. In this paper, we proposed an algorithm to compare the FLV, MPEG4 and 3GP format of multimedia content using the parameters that determines...
IP based Wireless Sensor Networks (IP-WSN) are gaining importance for its broad range of applications in health-care, home automation, environmental monitoring, security & safety and industrial automation. In all of these applications mobility in sensor network with special attention to energy efficiency is a major issue to be addressed. Host based mobility management protocol is inherently unsuitable...
Business-to-Employees (B2E) systems represent a new breed of web-enabled eBusiness application that helps develop productive and committed workforce. However, even though eBusiness technology vendors advocate that enormous values organisations and their employees can gain from the introduction of B2E systems, no systematic empirical study is yet reported from employees' viewpoint in particular for...
Rural women in Bangladesh have limited access to resources and public spheres due to socio-cultural restrictions. Women suffer from severe discrimination, due partly to a lack of access to information. Information and communication and technologies (ICT) are tools that potentially can reach rural women and address their knowledge and information needs. Considering this scenario, the aim of this paper...
Network traffic has been studied extensively since new findings by Taqqu et. al. (1994), which has shown that network traffic is not memoryless. Such traffic has been called self similar with Long Range Dependence (LRD) and their distribution is commonly known as heavy-tailed. It is very hard to estimate buffer size to protect against overflow in presence of such traffic as packet sizes and their...
A widespread methodology for performance analysis in the field of communication systems engineering is network simulation. Network Simulator 2 (NS2) is one of the most popular tools in academia for evaluation of network, protocols and topologies. It has become virtually the standard of network simulation. It represents a discrete, event-based simulator that has an ability to be easily extendible and...
Wireless technology is the fastest growing segment of the modern communication industry. The IEEE 802.16e standard, commonly known as mobile WiMAX, is the latest wireless technology that has promised to offer Broadband Wireless Access over long distance. The concept of OFDM is used in WiMAX to obtain high data rate in addition to reducing the effects like inter symbol interference and inter channel...
In this paper, we propose a dynamic TDMA slot reservation (DTSR) protocol for cognitive radio ad hoc networks. Quality of Service (QoS) guarantee plays a critically important role in such networks. We consider the problem of providing QoS guarantee to users as well as to maintain the most efficient use of scarce bandwidth resources. A dynamic frame length expansion and shrinking scheme that controls...
The emergence of WiMAX has attracted significant interests from all fields of wireless communications. WiMAX has been tipped to bring a revolution in the way where broadband services have been used today; those have been strengthened by the optimization of RF. The systematic investigation to establish facts of necessary modification about the theory for smooth optimization is targeted. This paper...
In today's world, ensuring security for important locations is a burning issue. Different surveillance methodologies such as alarm system, CCTV, PC based video system are used to ensure this security. But using all these systems, it is not possible for a person to monitor the security of his or her desired location when they are outside. Now-a-days anybody can communicate with anyone at anytime around...
Classroom teaching has always been a face to face interaction between students and teachers and here in the proposed system we would like to preserve this aspect of teaching with help of information and communication technology. We like to bring this quality along with the concept of geographical independence in a distributed system. Teleteaching as in any collaborative system is difficult to model...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.