The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Mobile phones in today's era are not just small devices that provide the means of communication, rather, they are equipped with more processing power, storage capacity and battery performance. Now, the hand held devices are not only service consumers but are also capable of hosting and providing services to their peers. These services deployed on mobile devices bring in the idea of mobile Web services...
Dispersion-compensating fibers (DCF) location optimization is studied for WDM systems that use return-to-zero (RZ), chirped RZ (CRZ) and carrier-suppressed RZ (CSRZ) modulation schemes. Only uniform DCF spacing is considered. The analysis shows that when partial dispersion compensation is used, as is the case in practice to reduce four-wave mixing effects, the optimization process failed to enhance...
This paper looks at the bottlenecks associated with packet capturing using commodity hardware in local area networks (LANs) without losing data. Experiments were carried out using the Wireshark packet sniffer to write captured packets directly to disk in a Fast Ethernet network with various test setups. These experiments involved generating large packets at almost line rate. Various sizes of the kernel...
Scheduling analysis of fixed priority systems can generally be divided into two categories: (1) utilization based approaches and (2) response time analysis. The farmer class is more efficient but propose a bound on system utilization, while the later posses pseudo-polynomial time complexity and considered to be slow, although its importance has been recognized. For periodic tasks with larger deadlines,...
The IEEE 802.16 broadband wireless access (BWA) system offers a cost-effective solution to the last-mile wireless connection problem. To provide the necessary QoS guarantees to the multimedia traffic in BWA systems while utilizing the resources as efficiently as possible, optimal scheduling mechanisms and resource allocation strategies are needed. In this paper, we propose a dynamic resource allocation...
The word boundary detection has an application in speech processing systems. The problem this paper tries to solve is to separate words of a sequence of phonemes where there is no delimiter between phonemes. This paper tries to compare two conceptual models for word boundary detection, named preorder and postorder models. In this paper, at first, a recurrent fuzzy neural network (RFNN) together with...
Many commercial companies collect large quantities of data from daily operations. For example, customer orders or purchase data are collected daily at the counters of grocery stores. Data mining is applied on such kind of data to extract patterns that could be useful to learn about the purchasing behavior of the customers. Such information are used to support a variety of business related tasks. For...
This paper introduces an operating system virtual machine platform for deploying affective intelligent tutoring systems in an e-iearning environment. Managed e-learning environments are often web based and rely on a browser to minimize configuration on the client machine, however even in these scenarios it is not unusual to have very specific requirements of the client machine, browser type and version,...
The identification and labeling of non-hierarchical relations are among the most challenging tasks in ontology learning. This paper describes an approach for suggesting ontology relationship types to domain experts based on implicitly learned relations from a domain corpus. The learning process extracts verb- vectors from sentences containing domain concepts. It computes centroids for known relationship...
The cognitive radio (CR) has been proposed as a technology to improve the utilization of radio spectrum and enables to adapt dynamically to local spectrum availability, such that unused parts of spectrum can be temporarily utilized by other users (secondary CR users). But CR must be able to demonstrate usage with minimal harm to primary users. In addition, the problem of co-channel interference by...
Recently many applications like fire simulation bring more interests in the extents of moving objects. Present research usually focuses on the positions of moving objects. The proposed models are more compatible for the position management. As a result, tracking the continuously changing extents of moving objects is becoming increasingly necessary. This paper proposes a novel model that can represent...
This paper aims at protecting copyrights in multicast communication. Multicast communication can be provided either at the network layer (example is the IP multicast) or at the application layer (also called overlay multicast). This work focuses on overlay multicast. A main feature of overlay multicast is that end systems (rather than network routers) take over the responsibilities of delivering the...
The structure of most software systems is large and complex. Therefore, understanding these software systems is difficult. The reason for this complexity is the dependency of their varied modules on each other. The type of dependencies in software systems may be function calls, variable references, macro invocations, and so on. Dependencies of modules of a software system can be viewed as a weighted...
For memory constrained environments like embedded systems, optimization for program size is often as important, if not more important, as optimization for execution speed. Commonly, compilers try to reduce the code segment size and neglect the stack segment, although the stack can significantly grow during the execution of recursive functions as a separate activation record is required for each recursive...
In this work, we present an iterative technique for 3D images alignment based on multi-agent approach. This technique tries to reduce the dependency to the initial transformation from which suffers most of the traditional iterative methods. In deed, they require a good estimate of the transformation to guaranty the convergence to the correct solution. The proposed multi-agent approach considers the...
This paper proposed a set of data taxonomy procedure. MassArray is an array of distributed devices to provide data taxonomy from output of a digital video broadcast via satellite (DVB-S) receiver. The array consists of four functions: MasterArray as the array controller, FrontGate as DVB-S reception point, ArchGate performs data classification and information retrieval, storage server conducts repository...
In cognitive radio (CR) networks, a secondary CR network borrows spectrum bands from primary networks for the purpose of improving spectrum efficiency. In this paper, we present a model in which a secondary network uses uplink sub-carriers by borrowing from a primary network in OFDM-based systems. We show optimization formulation and propose allocation algorithms for the model. Performance of proposed...
The Fuzzy Radial basis function Neural Networks (FRBFN) for software cost estimation is designed by integrating the principles of RBFN and the fuzzy C- means clustering algorithm. The architecture of the network is suitably modified at the hidden layer to realise a novel neural implementation of the fuzzy clustering algorithm. Fuzzy set-theoretic concepts are incorporated at the hidden layer, enabling...
In this paper, we propose a new admission control scheme for 802.11 ad hoc networks. The scheme utilizes two criteria for accepting flows: one during the route request phase and the other during the route reply phase. The scheme achieves optimal results in terms of overhead and delay. However, it is based on high power transmissions that consume more energy power. We also propose a bandwidth management...
This paper introduces a new multidimensional sessions comparison method (MSCM) using dynamic programming. Our method takes into consideration of different session dimensions such as the page list, the time spent on each page, and the length of each session. The method showed more accurate results than other known methods such as sequence alignment method (SAM), multidimensional sequence alignment...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.