The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A variety of approaches have used fuzzy logic for modeling nonlinear and complex systems due to fuzzy logic’s inherent ability in handling complexities and uncertainties. Such techniques, however, generally ignore the statistical nature that many such complex systems may exhibit. When the system’s behavior is significantly influenced by stochastic parameters such as in human behavior, it is reasonable...
For any space mission operations, safety and reliability are the most important issues. Sophisticated and accurate fault detection and diagnosis of monitoring processes can minimize downtime, increase safety of space and ground operations, and reduce costs. To tackle this problem, system operations telemetry data was studied and analyzed to automatically characterize normal system behavior and anomaly...
This paper describes a review of turbo coding with channel estimation for Single-input and Single output system in ultra-wide band (SISO-UWB) channel. The common decoding algorithms used in turbo codes are Bahl, Cocke, Jelinek and Raviv (BCJR) algorithm, Viterbi algorithm, and Soft Output Viterbi Algorithm (SOVA). In the application of channel estimation with turbo codes the techniques used are maximum...
An extended distance for FTTSchool deployment using a single OLT for a distance of 29km with 256 optical splitting ratio from the OLT to the furthest school deployed is demonstrated. An average of 2ms round trip time and 92.383 Mbps throughput is observed.
2D simulation model of helix TWT is developed by MAGIC Code. This model contains electron gun and helix Slow-Wave Structure (SWS). 3D magnetic simulation is done by means of CST EM Studio and the axial periodic magnetic field is imported into MAGIC 2D. Absorber coating profile is measured using reduced-height rectangular waveguide and subsequently bulk conductivity for each segment is calculated to...
This paper describes a new approach to cylindrical antenna controlled by the excitation (amplitude and phase) to synthesize directive lobe and multilobe patterns, and create adaptive nulls in interference direction and large lobe pattern. The proposed method is based on iterative minimization of a function that incorporates constraints imposed in each direction with respect to excitation (amplitude...
The printed antennas are actually in tremendous growth; their use is widespread in all areas of telecommunications where their low cost and congestion are advantages. Thus, we present in this paper the application of these antennas in the domain of radio link X band. Two antennas with directive (high gain) and sector (large) radiations are made and tested.
This paper described the design, simulation and fabrication of a parallel-coupled band pass filter. The design was for K-band applications with bandwidth of 300 MHz. The filter was operated between 21 to 21.3 GHz. The circuit was designed and simulated using Genesys and the measurement was carried out after fabrication on RT Duroid 5870 with 0.508 mm thickess and the dielectric constant, epsivr of...
This paper presents a multi-agent framework for distributed web-based face recognition using fuzzy logic based result fusion mechanism. The model is designed in JADE framework and takes advantage of JXTA agent communication method to allow agent communication through firewalls and network address translators. This approach enables police stations to build and deploy P2P applications through a unified...
Intrusion detection has become an indispensable defense line in the information security infrastructure. The existing signature-based intrusion detection mechanisms are often not sufficient in detecting many types of attacks. K-means is a popular anomaly intrusion detection method to classify unlabeled data into different categories. However, it suffers from the local convergence and high false alarms...
In this paper we propose a neuro-fuzzy architecture for Web content taxonomy using hybrid of Adaptive Resonance Theory (ART) neural networks and fuzzy logic concept. The search engine called Kavosh is equipped with unsupervised neural networks for dynamic data clustering. This model was designed for retrieving images without metadata and in estimating resemblance of multimedia documents; however,...
In this paper we propose a content-based text and image retrieval architecture using fuzzy adaptive resonance theory neural network. This method is equipped with an unsupervised mechanism for dynamic data clustering to deal with incremental information without metadata such as in Web environment. Results show noticeable average precision and recall over search results
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.