The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The energy storage system creates optimum conditions for energy regeneration in urban transit systems. The energy storage system is able to store and discharge energy at an extremely rapid rate. This enables a complete exchange of energy between vehicles, even when they are not braking and accelerating at precisely the same time, as is most frequently case in everyday service. The benefits of the...
In this paper, we propose a multi-biometrics authentication system based on our proposed priority-based watermarking method. We investigate how watermarking techniques affect the container, which is facial image used in further authentication steps. We conduct experiments on facial and fingerprint features using both priority-based watermarking method and non-priority-based method. Results show that...
In Multi-View Video Coding (MVC), through effective Motion Estimation Algorithm (ME), it can remove the inter-frame redundancy and significantly reduce the bits of video transmission and effectively improve coding efficiency and reduce the encoding time. To improve coding efficiency of the MVC, and effectively improve the ability to views random access, a MVC scheme using hierarchical B frames and...
A practical video frames retrieval scheme is developed to retrieve video frames efficiently. The proposed scheme transfers each video frame to a color string using straightforward rules. Subsequently, using the color strings to compare the images, namely color strings comparison. We succeed in transferring the video frames retrieval problem to strings comparison. Thus the computational complexity...
Using TOE Model, this paper aims to examine drivers of Web technology investment in Malaysia service industry using questionnaire survey. The structural equation modelling (SEM) results indicate that firm size, managerial beliefs, and pressure intensity explain the variance in Web technology investment. Managerial belief is found to have the function of mediator in the relationship between pressure...
In this paper, we develop a new algorithm for the principle subspace tracking by orthonormalizing the eigenvectors using an approximation of Gram-Schmidt procedure. We carry out mathematical derivation to show that when this approximated version of Gram-Schmidt procedure is added to a modified form of Projection Approximation Subspace Tracking deflation (PASTd) algorithm, the eigenvectors can be orthonormalized...
Copyright protection of plain text while traveling over the Internet is very crucial. Digital watermarking provides the complete copyright protection solution for this problem. Text being the most dominant medium travelling over the Internet needs absolute protection. Text watermarking techniques have been developed in past to protect the text from illegal copying, redistribution and to prevent copyright...
The acquisition of requirements assets are important in software product line (SPL) engineering for it help enhancing the effectiveness of reuse. Traditional methods are heavily based on manual effort. This appears to be a barrier for many organizations which tend to launch a SPL. In this paper, we propose an approach to extract functional requirements by analyzing text-based software requirements...
Based on the analysis of the round transformation and key expansion, the advanced encryption standard (AES) algorithm is optimized through the look-up table. And then the optimized Rijndael algorithm based on SOPC (system on a programmable chip) is designed and implemented through software and hardware. According to the software design flow chart of the optimized Rijndael algorithm, the program design...
This paper mathematically analyzes the phase distortion of optical orthogonal frequency division multiplexed (O-OFDM) signal due to fiber dispersion and Kerr effect. The results verified by the computer simulation using OptiSys 5.0 software are in a good agreement with the mathematical analysis result.
Backpressure-based Max-Weight Scheduling (MWS) algorithms are theoretically proven to be optimal with respect to wireless multi-hop networks throughput maximization. On the other hand, Optimized Link State Protocol (OLSR) is the leading proactive protocol for wireless ad-hoc networks. However, in its standard implementation, OLSR is a single-path protocol, whereas it is widely known that wireless...
We perform real-world tests of the performance of medium access control protocol schemes for scalable data aggregation in sensor networks. Specifically, we evaluate the performance of a Listen-and-Suppress Carrier Sense Multiple Access (LAS-CSMA) scheme on the duplicate-insensitive exemplary monotonic aggregates MAX and MIN. These schemes reduce power consumption, network bandwidth usage and delays...
Recently, Finite Fields are the most important security mathematical function in the area of elliptic curve cryptography. In this paper, we classify the finite fields into a prime field and a binary field. The proposed approach offers solution to solve the real time implementation based on the finite fields. One such important property is point doubling that has not been focused previously. Finite...
Till date, most of the signature schemes are based on an Elliptic curve. The Elliptic curve based on signature scheme is called as ECDSA. In support of this scheme a study on a number of schemes was done. We also extend this signature schemes to a Variant Scheme level of ECDSA. In this paper, we propose a new variant ECDSA scheme that will produces the high level security with the help of the parameters...
Variable-length codes, using source statistical features, improve the encoding. However, using these codes can results in error propagation in bit string transmitted to noisy transmission environments. This paper has used reversible symmetrical codes in the bit string obtained from JPEG compressor in order to overcome this problem. several examples of reversible code design algorithm have been reviewed...
Synchronous designs have grown dominant in terms of implementing digital systems because of their simpler design and well established design methodologies. However, using a global clock poses several disadvantages. Asynchronous implementations provide solutions to these problems. In this research, a fully asynchronous 32-bit DLX microprocessor is implemented using the HDL (hardware design language)...
A new evolutionary algorithm called Two-stage Evolutionary Algorithm with Variable Mutation Intervals (TEAVMI) is proposed in this paper. TEAVMI improves the performance of traditional EAs by introducing new evolutionary operators, and it has many new features. It introduces the multi-parent crossover operator with elite-preservation, and develops dynamical mutation operator and space contraction...
Aiming at improving the accuracy and speed of short-term load forecasting (STLF), the proposed BCC-LS-SVM model is presented, among which bacterial colony chemotaxis (BCC) optimization algorithm is used to determine hyper-parameters of least squares support vector machine (LS-SVM). BCC is a novel category of bionic algorithm, which takes advantage of the bacterium's reaction to chemoattractants to...
The objective of this research is to evaluate 233 Web sites of vocational education institutions in Thailand through the opinions of experts who have full range of access in Web service information to gather relevant facts about the system of education associated with Web service program. The standards of evaluation were categorized in four major aspects such as: design and creativity; the content;...
Communication is the god given gift that enables intellectual and cultural exchange and builds up our competence in social behavior. The internet has taken communication to unimaginable attitudes. But many questions arise when we think of security. Is Internet communication private? Most security concerns focuses on preventing eavesdropping that is outsiders listening in on electronic conversions...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.