The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
It is currently attracting the interest of theoretical biologists, biochemicists and experimentalists to attempt to deduce the structure of biochemical networks "ab initio" from routinely available experimental data. The recent advances in systems biology have been driven by the methods that generate in vivo time-course data characterizing biochemical network interactions. Such data can...
Usability evaluation of collaborative writing system for education usage is essential to improve its functionality. In this paper, the usability of Web office (ThinkFree doc) is tested using mix research approach. Usability evaluation is performed via the think aloud protocol. A questionnaire was designed for quantitative survey. The questionnaire was completed by users who have been using Thinkfree...
Fractal analysis represents a powerful tool to identify the inner dimension of various chaotic, non-linear dynamic systems. The R/S analysis, which belongs to the class of the fractal tools, can help to determine the cycles' length of a time series, however it mostly relies on visual examination. In this paper we complement the R/S analysis with an automated method for cycles' length detection, which...
The process of gene selection for the cancer classification faces with a major problem due to the properties of the data such as the small number of samples compared to the huge number of genes, irrelevant genes, and noisy data. Hence, this paper aims to select a near-optimal (small) subset of informative genes that is most relevant for the cancer classification. To achieve the aim, a three-stage...
In this paper, we present our approach for discrete event simulation of embedded systems. In our case, embedded systems are modelled via UML diagrams with some extensions. From UML diagrams a discrete event simulation model is generated. We use the latter model to estimate system performance.
In this paper, we present a novel multi-view visualization tool for trace files generated by network simulations, currently supporting the ns-2 and ShoX trace formats. As the first tool in this area, it shows simultaneously three synchronized views (or perspectives) of the current network state in one window: (a) An enriched text view showing events line-by-line, marked up using colors and symbols...
We have formulated and combined three problems: clustering, firewall placement and network hierarchy into one optimization problem, where the objective function is to minimize the total design cost of the synthesized network, while maximizing its security and scalability. Due to the computational complexity of the combined three problems, we have developed a custom-made intelligent algorithm based...
The performance of mobile ad hoc wireless networks has been primarily limited by the radio propagation channel. In the mobile radio environment, fading due to multipath delay spread impairs received signals. The aim of this paper is to propose a suitable mobile radio channel model based on a Tapped Delay Line (TDL) structure that not only examines the effect of various parameters on channel behavior,...
Since early eighties, not too many happened in analytical methods of performance valuation for actual computer and communication networks. The methods of the classic queuing theory (the mean value analysis, the convolution method) adopt unrealistic assumptions. The stochastic queuing network methods are not adequate for investigation of actual networks. Therefore, the paper presents an approximate...
Today, peer-to-peer networks are become more popular among internet users and more than millions peers share high volume of data from anywhere. Sending and receiving these data increase the network traffics terribly. By improving the performance of these networks not only the efficiency of these networks increase but also the overall performance of the internet augments. To achieve high performance...
This paper presents a novel low power high linear sub-harmonic mixer for direct-down conversion receiver, in which an inductive connection between RF and LO stages is used to enhance the gain of mixer. A comparison is done between two circuits for two possible conditions, High Gain Medium Linearity (HGML) and High Linearity Medium Gain (HLMG), and recently published works. Simulation results performed...
In this paper, authors have proposed a VAS for personal video recorder (PVR) enabled iSTB. The proposed solution can recognize the regions in the frames where the recipe and ingredients are shown and can save them in image/text format for further use. We have used a hybrid approach where the text regions are localized using the compress domain features of the streaming video in real time and then...
Large scientific projects need collaborative data sharing environments. For projects like the Ocean Observations Initiative (OOI), the Temporal Dynamics of Learning Center (TDLC) and Large-scale Synoptic Survey Telescope (LSST) the amount of data collected will be on the order of Petabytes, stored across distributed heterogeneous resources under multiple administrative organizations. Policy-oriented...
Signature-based Intrusion Detection Systems have numerous redundant rules that do not match network attacks during intrusion detections. Instead, the toolkits have low efficacies in matching each packet with all the detection rules to avoid false positives. Unfortunately, there are no automatic functionalities to debug expert systems so that all noisy signatures and rules set that trigger false alerts...
In this paper, electrical characteristics of bipolar junction transistor (BJT) are studied by using Gummel plot focusing on gain. The investigation has been carried out by using SILVACO Software tool, 6 cases of different doping concentration for base and emitter have been carried out to determine the best concentration that will produce large gain. It can be conclude that emitter doping concentration...
The transport layer security (TLS) protocol is currently the predominant method of implementing Internet security. This paper proposes an FPGA-based embedded system integrating hardware that accelerates the cryptographic algorithms used in the SSL/TLS protocol. OpenSSL, an open source implementation of the SLL v3 and TLS v1 protocol, is deployed in the proposed embedded system powered with a Nios-2...
This paper presents a novel low power high linear sub-harmonic mixer for direct-down conversion receivers, in which an inductive connection between RF and LO stages is proposed to improve the linearity and enhance the gain of Mixer. This is a novel mixer that not only frequency translates the RF signal to baseband directly but also avoids the need for a discrete filter by attenuating the third and...
In the main frame of the optimal control process has to be focused this work, where a methodology based on the performance of Genetic Algorithms to be used to search the appropriate knowledge base, defined in the sense of Fuzzy Logic, for the process controller. Two stages have to be considered to obtain the control system - Initial Stage and Conclusions Phase. First point search the control law for...
This paper surveys intelligent systems (IS) applications using a literature review and classification of articles from 1956 to 2009 with a keyword index and article abstract in order to explore how IS applications in the field of fraud detection and prevention have developed during this period. Based on the scope of 36 articles found from Web of science (SSCI, SCI and A&HCI) database, this paper...
The routine use of Uninhabited Air Systems (UAS) in non-segregated airspace presents many technological and regulatory challenges to the Aerospace Industry. This paper describes the development and key features of a new UAS avionic system designed to meet these challenges, the Advanced Autonomous Integrated Mission System (AAIMS). The paper gives an overview of the systems design process followed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.