The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In order to overcome the defects of shuffled frog leaping algorithm (SFLA) such as slow searching speed in the late evolution and easily trapping into local extremum, an Opposition-based Chaos Shuffled Frog Leaping Algorithm (OCSFLA) was originally proposed in this paper. It utilized the opposition strategy to generate initial population, adopted a modified frog leaping updating formula, and combined...
The current research aims at developing IT to achieve the gas energy service and present service performance. Therefore, we focus on e business solutions in NIGC's present service areas. There were two phases involved, in the first phase, the e business solutions were developed to study the effective adoption of information technology (IT) in the NIGC. In the second phase data was collected by questionnaire...
Intelligent systems can assist the diagnosis of a plant disease in early stages, allowing continuous plant monitoring. The most important symptoms of a disease include lesions, overdevelopment or underdevelopment of various parts of a plant, necrosis and deteriorated appearance. The color, area and the number of the lesions can often be used to determine the disease that has mortified a plant. A Windows...
In this paper FPGA implementation of a simple median based technique for selective image encryption is presented. Image encryption imposes heavy resource requirements on the hardware platform due to large size of data. Although Advanced Encryption Standard (AES) provides a high level of security to the image, it takes more time when used for image encryption. The technique presented in this paper...
In this paper a new method for information hiding in club music is introduced. The method called StegIbiza is based on using the music tempo as a carrier. The tempo is modulated by hidden messages with a 3-value coding scheme, which is an adoption of Morse code for StegIbiza. The evaluation of the system was performed for several music samples (with and without StegIbiza enabled) on a selected group...
Goldreich-Goldwasser-Halevi (GGH) is a lattice-based public-key cryptosystem which has been widely developed due to its simple encryption and decryption procedures. Despite many existing GGH improvements, its huge public key size remains its main drawback, which prevents the system from being used in practice. In order to reduce the key size, we propose in this paper a new GGH cryptosystem using Generalized...
This research investigates the use of a multi-threaded framework as a software countermeasure mechanism to prevent attacks on the verifypin process in a pin-acceptance program. The implementation comprises of using various mathematical operations along side a pin-acceptance program in a multi-threaded environment. These threads are inserted randomly on each execution of the program to create confusion...
This study investigates a method for recognition of tea aroma using a multilayer neural network. A gas-sensing system utilising an array of quartz crystal resonators coated with plasma-organic-polymer-films is designed. Three teas, oolong, jasmine and puerh, are used as the sources of sample gas. Wavelet transform frequency analysis is applied to the signals from the gas-sensing system, and the features...
In this paper, a quantum image encryption based on scrambling-diffusion (SD) approach is proposed. The position information of the quantum image is scrambled by Arnold cat map followed by Fibonacci transformation to avoid iteration problem in each technique. Then, quantum gray-code is used to encrypt the gray-level information of the scrambled quantum image. Simulations and analyses indicate that...
For the targets whose maneuverability is not too severe, the azimuth echoes in a range bin are modeled as quadratic phase signal after the translational motion compensation. The FrFT algorithm can obtain a focused image by motion parameter estimation and compensation. However, when a range cell contains more than one scatterer, the effects of sidelobes and interference terms will deteriorate the performance...
In this paper, we focus on the 3D SC model reconstruction from data with wide azimuthal aperture at a single elevation. Since the existing method is difficult to implement for high-frequency signal or large-size target, we propose a novel method to solve this problem. In our approach, the 3D positions of the SCs are estimated from the 1D SCs via a randomized Hough transform (RHT) method. Then the...
The possibility of detecting Alzheimer's Disease (AD) was examined using the pupil light reflex (PLRs). PLRs for chromatic stimuli were recorded for 14 AD patients and 21 healthy participants, and some features of the waveform shapes in their PLRs were extracted. Though there were no significant differences in the features between the two participant groups, most healthy participants were predicted...
Many studies have been made in order to propose automatic diagnostic in medical fields. This paper proposes a new approach to deal with the problem of spectral clustering for signal extracted from brain MRI images. The tool-chain developed during this study can be easily implemented for the extraction and the analysis of information from perfusion MRI. In order to prove this, a reliable program which...
The presented work approaches the topic of method development for automated feature extraction and ECG analysis. The MATLAB-based toolbox ecgFEAT (ECG Feature Extraction and Analysis Toolbox) includes a comprehensive set of algorithms to extract temporal, morphological and statistical information for time analysis and heart rate variability (HRV) analysis. The implemented feature extraction concept...
Deep venous thrombosis (DVT) occurs when a blood clot appear within a deep vein, usually in the legs. The main complication is pulmonary embolism (PE) which is the third cause of vascular death after myocardial infarction and cardiovascular event. DVT onset is multifactorial (immobilization, surgery, age, cancers, genetic variations) and it is mostly diagnosed via ultrasound. In our project, we are...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.