The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Arabic character and text recognition methods for printed or handwritten characters are known since many years. We present in the first part of this paper a state of the art of Arabic text classification techniques and existing recognition systems. In the second part we discuss how evaluation methods and competitions help to support the development of text recognition systems and methods. Based on...
The purpose of this study is to clarify the mechanism of how software engineering capabilities relate to the business performance of IT vendors based on the continuous researches in 2005, 2006 and 2007. To end this, we developed a structural model, including the Software Engineering Excellence (SEE) indicator which consisted of deliverables, project management, quality assurance, process improvement,...
A low cost invariant-based online test scheme is proposed for general digital linear time-invariant (LTI) systems. An analytical signal processing approach is used to extract an invariant property of LTI systems in frequency domain. An optimal implementation of the developed technique is also proposed using Goertzel algorithm to reduce area and computational overheads. The overhead is fixed and does...
By dividing the rendering of neurons into two modes called exploration mode and static mode, the user can explore large neuron databases interactively. The exploration mode contains only the necessary visual characteristics of neurons for the user to be able to navigate inside of the circuit, with an upper limit of primitives used. It is done in a forward rendering fashion. The static mode is of a...
Recent years have witnessed the development of a wide-range of wireless technologies. Next generation communication systems are aimed at integrating existing and emerging wireless systems to enable ubiquitous network access to mobile end-users. The availability of various access networks requires a mobile device to be capable of selecting the best access network with minimum user intervention. We...
In fingerprint recognition system, performance of fingerprint feature extraction algorithm is important. We use visual analysis to evaluate this performance. 100 respondents fill a questionnaire consisting of 30 images from fingerprint feature extraction process. We get 12,3 % minutiae points missed by this algorithm. With BOZORTH3 minutiae matching algorithm, the distribution of matching score of...
In this paper we address the problem of XML document normalization and their reconstruction using XQuery. Instead of one type of XML documents, we consider a set of different types of XML documents presenting the same data to different kinds of users. This consideration influences the normalization because more types of redundancies can appear. The presented technique is not based on logical XML schemas...
Snort is one of the most popular Network Intrusion Detection Systems (NIDS) that exist today. Snort needs to be highly effective to keep up with today's high traffic of gigabit networks. An intrusion detection system that fails to perform packet inspection at high rate will allow malicious packets to enter the network undetected. In this paper we demonstrate that the current default configuration...
Body language is a connection way between humans. Computer vision based system try to facilitate human connections using human gesture interpretations. This paper proposes a method based on hand gesture recognition for device control using inner distance feature. Our method consists of three primary parts. 1) Hand segmentation and state identification. 2) Hand tracking, and 3) gesture recognition...
Ontology is a sharable structure of knowledge that when integrated with e-learning techniques where the e-learning portal provides the interface that carries the values (knowledge) to learners can enrich the learning process for both teachers and students. We aim to propose an ontological approach for teaching/learning software quality in an adaptive e-learning environment. This paper considers some...
Video watermarking is a relatively new technology that has been proposed to solve the problem of illegal manipulation and distribution of digital video. By virtue of this technology, copyright information is embedded in the video data to provide ownership verification. In this paper, we propose an effective, robust, and imperceptible video watermarking algorithm. The effectiveness of algorithm is...
There are many search engines in the web, but they return a long list of search results, ranked by their relevancies to the given query. Web users have to go through the list and examine the titles and (short) snippets sequentially to identify their required results. In this paper we present how usage of Singular Value Decomposition (SVD) as a very good solution for search results clustering.
In this paper, we present and compare three clustering approaches which group fingerprints according to its minutiae points locations. The best technique for grouping fingerprints is based on the ART1 clustering algorithm. We compare the quality of clustering of ART1 based clustering with k-mean clustering technique and self organizing neural network (SOM) [1] clustering algorithm in terms of intra-cluster...
Wireless local area networks (WLANs) are increasingly popular because of their flexibility. This spreading of WLANs comes with an increasing use of multimedia applications. Such applications are bandwidth sensitive and require a quality of service (QoS) that guarantees high performance transmission of continuous data. This requirement is the focus of the new enhanced IEEE 802.11e standard protocol...
This paper investigates attributes of user search behavior and develops dasiasearch satisfaction metricspsila to determine user satisfaction with search engine. Unlike most previous Web studies that have analyzed user behavior through search engine logs, this work focuses primarily on remotely observing user as he queries search engine. A survey was conducted to identify pattern of search among large...
Life scientists use a variety of bioinformatics software tools to perform tasks such as annotation of DNA and protein sequences. Most of these tools are command-line driven and handle various data types (nucleotide, protein, etc.) and data formats (Fasta, Genbank, etc.). As many bioinformatics software tools are generally involved in analysis tasks, scientists are more and more requiring that these...
SIP is able to support MH mobility at the application level using a redirect server. SIP, however, performs signaling on the basis of an open network, the Internet. Thus, it is exposed to security threats that do not exist in a closed network such as PSTN. Although much research concerning SIP security threats have been conducted, studies regarding security threats under a SIP application-level mobility...
We investigate, model and compare the expected energy consumption of routing over many short hops to the expected energy consumption of routing over longer hops. In addition to the common energy cost metrics of transmission and reception, our energy cost model also includes idle, noise, multi-path fading and retransmission energy costs. We study and compare various routing scenarios. In all of the...
Existence of software platform, which will allow us to monitor the patients' bio-parameters and provide us with services which help with full health care, is more than relevant these days. The aim of our project is to provide solution which can be used in different spheres of health care and which will be available through PDA (Personal Digital Assistant), web or desktop clients. Practically developing...
Wireless sensor actor networks are a new challenging type of network in which sensor and actor nodes must coordinate to achieve network goals. But in some situations actors cannot directly communicate with each other. The wide extent of environment, obstacles in the environment and bad communication conditions are some of the reasons. One solution is to exploit accessible sensor nodes to indirectly...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.