The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Motion detection typically is the case for applications using a fixed camera such as video surveillance applications or traffic monitoring applications. This research directed to detect a movement within a single scene and build a new background based on the correlation method. The recorded footages scenes (vehicle and human) were outdoor at different day times using a fixed camera. The suggested...
The Bellman-Ford algorithm provide a dynamic programming solution from source to all nodes in the given diagram for the minimum route Issue for single-source shortest paths in graphs with negative edges but no negative cycles. The main advantage of the algorithm is their simplicity and it does not need complex data structures for implementations and also find minimum path weight efficiently and high...
This paper proposed a new approach to improve the security of Chaos based on using triple of different Chaotic Maps, include Chen, Lorenz and Henon Maps for speech scrambling. These Chaotic Maps using to generate secret key. Also, the paper use linear and non-linear functions to calculate the secret key, thatit uses in speech scrambling process. The main goal of the use of triple Chaotic Maps is to...
Based on the parametric identification method and radial basis function networks, the meshfree approach to the solution of inverse coefficient problems of mathematical physics is proposed. For regularization of the solution, an iterative method is used where the number of iterations, determined by the norm of the residual, plays the role of the regulator. The effectiveness of the approach is confirmed...
For over a century, fingerprints (FP) have been considered one of the most highly used methods for human recognition; automated biometric systems have only been available in recent years. FP recognition is becoming indispensable part of many identification systems in the world. This research present a proposed authentication system based on FP as biometric type and some of static credential personal...
The trend for about twenty years, the research regarding the number of states in Hidden Markov Model (HMM) was mainly aimed at increasing it in order to ensure the robustness of the face recognition system. In this paper, a novel face recognition method is presented based on one state of discrete HMM, where it seemed impossible in the past. Contrary to other approaches that use the three parameters...
The Artificial Fish Swarm Algorithm (AFSA) is a swarm-based metaheuristic algorithm which mimics the conduct of a group of fish in nature. In this paper, we proposed an improved AFSA algorithm for solving the Flexible Job Shop Scheduling Problem (FJSSP). The improvement is based on Variable Neighborhood Descent (VND) strategy which is performed on AFSA by different neighborhood structures to improve...
The color reduction or color quantization is needed for many reasons such as, to compress the high-resolution images which take a lot of the disk space and to easily view the images on the screens that do not support a large number of color ranges (low-resolution Screens). Color quantization generates a new image, which has less number of colors, but the difference between the Quantized Image and...
The increasing in utilization of cell phones and number of cell phone users in rural and urban areas has requested the network specialists to grow their scope to cover all spots In wireless communication system, the cell towers distribution requires effort such as network planning and cost as it needs expensive equipment's like Global Positioning System (GPS). This paper proposes new technique to...
According to the wide developments in the area of communications, there is a demand for secure system for data transmissions. In this paper, a Hash system SHA-1 and SHA-2 Processor is designed using Xilinx Spartan-3AN and interfaced with keyboard and Video Graphics Array (VGA) Display. The implementation of the processor is done by using MIPS (Microprocessor without Interlocked Pipelines) single cycle...
Networks-on-chip (NoC) has been proven to satisfy different on-chip communication requirements in terms of costs, performance, and reliabilities. This has been proven true especially for spiking neural network (SNN) with its high multicast communication demands. However, metal-wires that form the foundation for regular NoCs face a set of challenges since metal-wires have been stretched to their physical...
Nowadays, Internet Service Providers (ISPs) have been depending on Deep Packet Inspection (DPI) approaches, which are the most precise techniques for traffic identification and classification. However, constructing high performance DPI approaches imposes a vigilant and an in-depth computing system design because the demands for the memory and processing power. Membership query data structures, specifically...
This electronic document is a “live” template and already defines the components of your paper [title, text, heads, etc.] in its style sheet This paper provide a broad review for most important algorithms used in the CAD application for lung tissue diagnostics and highlighted the performance of each distinctive algorithm. Moreover, ROC characteristics have been made for each selected algorithms (support...
Encryption is one of many methods that have been used to secure storage and transmit images over unsecured and open networks. The asymmetric cryptography need more time for encryption and decryption. In this paper we suggested new method for image encryption that has the potential to overcome many of encryption problems. The proposed algorithm based on the concept of scrambling the positions of pixels,...
A location-based service (LBS) is a software level service that are offered through mobile device based on users' location, that means the user location is known to the service and data provider who may be an external third-party location service (LCS) client. To achieve a good quality of service and good system performance, the system needs to preserve the user's privacy with a quick response and...
Centrifugal pumps are considered as one of the most common types of pumps in industry today. They are widely-used because their design is simple, they are available in wide range of capacity and head, they have high efficiency and smooth flow rate, and they are easy to operate and maintained. There are many factors that contribute to the efficiency and life time of centrifugal pumps. In this work,...
License Plate (LP) is a rectangular metal plate located on vehicles body and contain numbers and characters or words for identification purposes. License Plate Recognition (LPR) system is a computer vision and image processing technology normally used to identify vehicles by their unique license plates. Over the last few years, the great importance of finding the exact accurate location of the license...
In this paper, an exact and proactive technique is created to distinguish Distributed Denial of Service (DDoS) attacks. This is achieved by using an entropy concept to measure abnormal traffic changes according to the phases of the attack. This traffic is then clustered by using a modified DBSCAN algorithm, and the centroids for the resulting clusters are then used as patterns for efficient distance-based...
Nowadays intelligent transportation system has become an active research field, automated vehicle identification is the primary aspect for achieving good intelligent traffic analysis, this paper illustrates a comparative study among three techniques that used for identifying vehicles: ANPR system, Barcode system, and RFID system. In addition, this paper describes similarities, differences, and challenges.
One of the important trends which is supposed to have more attention in the system of cognitive radio is wireless security models. Security requirements for CRNs are the same as the general wireless networks, taking into consideration that the frequency band changes dynamically adding a specific feature when we deal with security of CRNs. A new category of security issues and challenges have been...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.