Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Authentication is a process by whichaparty (could be a person or intended computer) establishes its identity to another party. In private and public communication channels including the Internet, authentication is usually done via the use of login passwords. Knowing of the password is supposed to guarantee that the user is authentic. Online business and many other deals need a stricter authentication...
This work considers the issue that (national) internet service providers (ISPs) need to be capable to deliver increasingly more demanding services with higher quality standards. For this purpose, a general framework for enhancing QoE through better configuration of QoS parameters and end users' feedback measurement has been proposed. The proposed framework includes two main parts: the QoS part and...
Search on the web is a delay process and it can be hard task especially for beginners when they attempt to use a keyword query language. Beginner (inexpert) searchers commonly attempt to find information with ambiguous queries. These ambiguous queries make the search engine returns irrelevant results. This work aims to get more relevant pages to query through query reformulation and expanding search...
License plate recognition (LPR) system is an important system in our life. LPR is an image processing and a character recognition system that used to recognize any car from the others. An automatic license plate recognition system for the three different Iraqi car license plates was proposed in this paper. Differentiating between the three styles were done depending on the plate size. An optical character...
In this paper, a new proposed model has been used to recognize human actions from video frames using a 3D deep neural network (3D DNN). To classify human actions, our recognition process is implemented under different recording conditions from a surveillance camera. By applying Caffe_GoogLeNet framework, we trained our 3D DNN with different training epoch values (TEs). The experiments were then evaluated...
Red Blood Corpuscles (RBC) constitutes the main cellular element of human blood. They are gaseous exchangers between living cell and external environment. In normal physiological state, RBC has circular shape in front view and biconcave shape in side view. RBCs take the sickle shape with person infected with cell anemia. Based on such different shapes, the work objective is to count the numbers of...
In the stream cipher, the Keystream generator can be built depending on the linear feedback shift register (LFSR) or nonlinear feedback shift register (NLFSR). In the case of NLFSR, three general methodologies can be used, two of them (nonlinear combination generator and nonlinear filter generator) depending heavily on the usage of the combining function. In this paper, we proposed a new method to...
In this research the security issues are discussed for securing big data. Encryption algorithms play an essential part to secure information. This paper demonstrates analysis of well-known block cipher CAST-256 and its modified version using modified S-Box and key generator. In this research the implementation of the modified CAST cryptography algorithm was discussed. It was worked dynamically on...
The detection and matching of logos have widely attention for the document images retrieval projects. In this paper an automatic effective logo matching has been developed and applied to different Arabic documents. The proposed technique based on matching between logos by using two types of significant features. The first is region based feature which represent the global features of an object. This...
The increase of the web 2.0 applications and the Spread of mobile devices in the institution of higher education and increasing users lead to slow wireless connection. Moreover, the uses of different web 2.0 application lead to the consumption more bandwidth where the web 2.0 has inspired intense and growing interest, particularly as social networks, search engines, multimedia, markets and news, education,...
There is a necessity to schedule the system and user processes by the operating system to getting maximum utilization of the CPU and obtaining high throughput. This paper presents a dynamic scheduling algorithm that make use of genetic algorithm operations for scheduling multi non-preemptive task on uniprocessor system to get minimum average waiting time and average turnaround time. The algorithm...
In this paper a hierarchical wireless sensor network is designed and tested. Each node of the network is based on an ARM Cortex-M3 microcontroller from NXP and nRF24L01+wireless transceiver from Nordic operating in the 2.4GHz unlicensed band. The designed node is featured by high energy saving and large data rate capability. These features were obtained by proper time synchronization and transmit...
Distributed Denial of Service (DDoS) attack is a congestion-based attack that makes both the network and host-based resources unavailable for legitimate users, sending flooding attack packets to the victim's resources. The non-existence of predefined rules to correctly identify the genuine network flow made the task of DDoS attack detection very difficult. In this paper, a combination of unsupervised...
Providing acceptable multimedia Quality of Experience (QoE) to mobile end users is an ultimate goal for any service and network provider in order to avoid churn and promote business growth. QoE is envisaged to be a critical element in the design of the next generation of mobile networks such as in 5G. In cellular networks, the Reference Signal Received Power (RSRP) has been widely used for handover...
In this search; Bayesian analysis of the two parameter Lomax distribution reliability has been considered, and the estimation has been obtained under logarithm loss function for three different prior distributions (Quasi distribution, Exponential distribution and Gamma distribution). they has been made under complete data analyses. The simulation study has been conducted to compare by mean squared...
Fractal image coding technique is considered as very effective for a higher compression ratio. Despite this method had received much attention because of its high resolution and fast decoding and many other advantages, but it has not been used widely because it requires high computation time for the encoding process. This defect is considered as one of the drawbacks of fractal image coding technique...
The main design principle of Information-Centric Networking (ICN) is the name based routing, that makes users able to ask for a data object by only using its name, and makes the network deliver data to users from a nearby cache if in-network caching is available. Software-Defined Networking (SDN) decouples the control layer from the data layer, so that the complexity, and network control and management...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.