Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
In this paper, Multiband 9-shaped microstrip patch antenna using epoxy substrate has been designed, simulated, and optimized to meet the best possible result using two simulation software: HFSS (High Frequency Structure Simulator) software and CST Microwave Studio software. Microstrip patch antennas are widely used because of their several advantages such as light weight, low volume, and low fabrication...
Beam-steering antennas are the ideal solution for a variety of system applications, it is most commonly achieved through using phased arrays, where phase shifters are used to control the relative of the main-beam. In this paper, a low-cost directive beam-steering phased array (DBS-PA) antenna using switched line phase shifters is demonstrated. The proposed DBS-PA antenna has four micro-strip patch...
One of the considerable use cases for network functions virtualization (NFV) is the IP multimedia subsystem (IMS). With the emergence of software defined network (SDN) and NFV, the mobile network operators (MNOs) that are deploying the IMS look to make a gain from these leading technologies to mitigate hardware costs and reduce time to market. With the use especially of the NFV approach, the MNO looks...
The main concept behind 5G mobile network is to expand the idea of small cell network (SCN) to create a cooperative network able to cache data in active nodes inside radio access and Core network. Caching technique is a workaround to deal with bottleneck in the Back-haul, as the capacity of the wireless links could not support the increasing demand for rich multimedia. In this perspective multiple...
Since our research to study mobility, we noted that the best way to represent the mobility of sensor nodes is to follow a mobility model. Numerous models have been proposed in the literature, they are commonly used as a data source in all kinds of studies, including motion in several networks. To this end, we propose to exploit this mobility, which results in the proposal of a new approach based on...
Radio Frequency Identification (RFID) is one of the basic requirements for the realization of Internet of Things (IoT). It is an automatic identification technology, without contact, aiming to identify the tag signal, in order to collect and send data instructions to the controller. Nevertheless, security is a very crucial issue for these RFID tags, since they suffer from a large number of threats...
Countering network threats, particularly intrusions, is a challenging area of research in the field of information security. Intruders use sophisticated mechanisms to hide the attack payload and break the detection techniques. To overcome that, various unsupervised learning approaches from the field of machine learning and pattern recognition have been employed. The most popularly used method is Principal...
In the latest communication system protocols, the Error Vector Magnitude (EVM) become the most significant measurement for evaluating power amplifier performance. It determines the modulator performance and how much error free signal is modulated, represented by the transmit signal phase and amplitude [1]. The main focus of this work is to design a transmission chain for Wireless Sensor Network (WSN)...
This paper deals with modeling human behavior routines during driving. We propose a new vision of the maximum causal entropy framework for inverse reinforcement learning to predict actions to be triggered in particular situation (lane change). We designed a plugin to enhance functionalities of the vCar platform which is presents an open source solution for the analysis and visualization of data from...
Question Classification is a very important component in question answering system. In this paper, we present a rule-based method to classify Arabic questions. We have used two taxonomies: Arabic taxonomy and Li & Roth taxonomy. We have conducted several experiments using TREC and CLEF questions. The obtained results show the importance of our method.
Recently, the problem of the intrusion detection has been largely studied by the computer and networks security communities. Then, the Intrusion Detection System (IDS) becomes a interest topic in research and in particular in machine learning and data mining. In order to improve the classification accuracy and to reduce high false alarm rate from the classical data base like KDD99 or others. In this...
The vertical handover is an important issue in the world of internet. In fact, the use of internet is becoming wider with the diversity of possible offered services, going from emailing, Data and video transfers, to IoT. The number of internet users has reached multimillions of people these last two decades, in addition, they are willing to connect wirelessly anytime and anywhere, to the best available...
In this paper we are interested to the decoding of blocks turbo codes constructed from Reed Solomon (RS) codes. We have modified the iterative algorithm proposed by Chase in order to exploit the a priori information provided by a correlated source. Indeed, some sources such as images have a strong correlation. A simple iterative decoding algorithm does not take this feature into account. The choice...
Cell phones and all radio transmitters become unavoidable in our daily life. Several debates held on the effects of the waves emitted by these equipment on human health especially that emitted by base stations. Therefore several studies have estimated the electric field emitted by stations in order to analyze the specific absorption rate on the human body of these waves. But the problematic is that...
Rescue tasks in coal mines are fundamental but often suppose the loss of rescuers lives, as currently they are carried out only by humans. TeleRescuer project expects to make this activity safer by developing a robot to be driven by rescuers from a safe area. It offers virtual teleportation providing to the operator an environment where he can interact with the reality perceived by the robot. In this...
Color and texture have been proven to be very discriminant attributes in image analysis across many works. This paper proposes a color texture analysis method based on the graph theory, in which we convert the texture in question into an undirected weighted graph and explore the shortest paths between four pairs of pixels according to different scales and orientations of the image. Basically, we extend...
In biomedical signal processing, Power Line Interference (50Hz) is one of the most and commonly types of electrical noises that often corrupt the quality of a biomedical data. In this paper, we present a simple tool for ECG signal enhancement approach based on Power Line Interference (PLI) reduction algorithm in Undecimated Wavelet Transform and Interval Thresholding. In our scheme, we use the Undecimated...
Traffic sign recognition (TSR) represents an important feature of advanced driver assistance systems, contributing to the safety of the drivers, pedestrians and vehicles as well. Developing TSR systems requires the use of computer vision techniques, which could be considered fundamental in the field of pattern recognition in general. Despite all the previous works and research that has been achieved,...
We propose a new caching concept in which wireless nodes in Device-to-Device (D2D) network can cache the initialsegments of the popular video files and may share to users in their proximity upon request. We term this approach as Bootstrapping-D2D (B-D2D) system. Our findings suggest that caching only initial-segments creates a large pool of popular files, thus improving the probability of availability...
This paper deals with a network of interconnected micro grids. The transient dynamics is modelled as an averaging process involving dynamic agents in a network. An analysis of the convergence of the consensus dynamics is provided using a network model based approach and by exploiting the properties of the corresponding graph-Laplacian matrix. Furthermore an investigation of the transient dynamics...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.