The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents compact ultra-wideband (UWB) LLI-slit slotted antenna for 5.2 GHz WLAN, 5.5 GHz Wi-Fi, and 5.8 GHz WLAN and Bluetooth operations. The proposed antenna provide a wide operating bandwidth of 1.9 GHz (4.85 – 6.75 GHz), thus allowing it to easily cover the required bandwidths for WLAN, Wi-Fi and Bluetooth operation in the 5.15–5.35/5.47–5.725/5.725–5.875-GHz bands respectively. The...
A new approach for motion-based representation on the basis of optical flow analysis and random sample consensus (RANSAC) method is proposed in this paper. Optical flow is the pattern of apparent motion of objects, surfaces, and edges in a visual scene caused by the relative motion between an observer (an eye or a camera) and the scene. It is intuitive that an action can be characterized by the frequent...
Multiple input multiple output (MIMO) technology allows mobile networks to obtain higher signal to noise ratio to achieves considerable performance gain. It provides the significant performance improvement for the fourth generation (4G) communication systems. This paper, we compare the performance of least mean square (LMS) and recursive least square (RLS) channel estimation (CE) algorithm for MIMO...
Since its invention, Kalman filter hit the crux of numerous innovation and successful endeavor in unwanted signal reduction. However, it is still to reveal the conducts and performance of extended kalman filter in heavily noisy wireless signal. Due to the state space concept it conveys superior performance in adaptability over any RLS (Recursive Least Square) filter. In this context, the constitution...
HIBASE compression technique simply replaces the attribute values in a tuple with fixed length code-words. However, fixed length coding system is not an optimal compression technique because some redundancies occur in the compressed table. This redundancy can be avoided if we use Huffman code-words. Moreover, using Huffman code-word will ensure optimal compression as well as High performance operation...
Re-visitation or re-finding information in a website is a very frequent activity in web browsing. When a user re-visits a website especially after a long time, she encounters some problems among which being oblivious about the information structure of the site is very prominent. Another problem is that in a website, users have no way to organize the information space or the navigational structure...
Because of its unique capability to identify, track, and trace-back objects, Radio Frequency Identification (RFID) technology has been used by organizations in innovative applications. Australian livestock industry is regarded as one of the biggest in the world and currently has adopted RFID for cattle identification. However, still a large number of farms have not adopted RFID for sheep and other...
The paper presents an efficient adaptive Lempel-Ziv-Welch (LZW) data compression algorithm for medical image compression applications. The encoder is based on custom-sized library and custom-valued threshold where both the size of the library and the threshold parameters are adjusted by the user. The algorithm is compared with other existing compression schemes applicable to medical imaging. Because...
In this paper a fast method has been proposed for the detection of optical disc in retinal fundus image using mean intensity values, to be used in retinal image based person authentication system. The proposed method uses pixel intensity in green channel of RGB image and candidate based approach to detect optical disc location. Proposed system has been successfully tested on DRIVE, MESSIDOR, VARIA,...
A multiple-valued (d-dimensional with d > 2) quantum system enables a much more compact and efficient information encoding than for binary (d = 2) quantum system. As multiple-valued quantum system is physically realizable, it is worth to explore multiple-valued quantum algorithm. In this paper, we propose quaternary (4-dimensional) quantum algorithm for testing whether a quaternary logic function...
Data mining is a process of discovering useful information from a database and analysis of extracted information. Text mining uses many techniques of data mining. It primarily deals with unstructured data. Web mining is an extension of text mining since it deals with unstructured data. Data mining relates to find data from “static databases” which contains “structured” data where as, web mining plays...
An effective and efficient resource allocation policy could benefit the cloud environment by saving cost. To support the continuous load increase, the cloud platform needs to create new virtual machines. However, substantial amount of time is required for the creation and the setup of a virtual machine. Therefore, allocating resources in advance based on prediction models could improve the quality...
Multicore architectures with multilevel caches are being used in both desktop and embedded processors for their improved performance. Caches increase execution time unpredictability and make it difficult to support real-time applications. Caches also challenge the power supply system by consuming a lot of power. Studies show that cache locking improves predictability and performance/power ratio for...
e-Governance provides government services through interactive website and portals. The strategic objective of e-Governance is to support and simplify governance for all the stakeholders: a) Government, b) People, and c) Businesses. It is a collection of ICT enabled applications to achieve efficiency, effectiveness, transparency and accountability in various forms of e-Governance such as G2G, G2E,...
Due to small available English-Bangla parallel corpus, Example-Based Machine Translation (EBMT) system has high probability of handling unknown words. To improve translation quality for Bangla language, we propose a novel approach for EBMT using WordNet and International-Phonetic-Alphabet(IPA)-based transliteration. Proposed system first tries to find semantically related English words from WordNet...
The goal of an ensemble construction with several neural networks is to achieve better generalization than that of a single neural network. A Neural Network Ensemble (NNE) performs well when the component networks are diverse, so that failure of one is compensated for by others. Training data variation (i.e., different training sets for different networks) is a good source of diversity because the...
Artificial Neural Network is among the most popular algorithm for supervised learning. However, Neural Networks have a well-known drawback of being a “Black Box” learner that is not comprehensible to the Users. This lack of transparency makes it unsuitable for many high risk tasks such as medical diagnosis that requires a rational justification for making a decision. Rule Extraction methods attempt...
The statistical disclosure attack (SDA) is an effective method for compromising the anonymity of users in a mix based system. Cover traffic, in the form off ake or dummy messages sent by other users of the mix, is an effective defense to make the task of the attacker difficult. Our aim is to examine the effect that background cover - the cover traffic sent by other users - has on the effectiveness...
A self-healing application brings itself into a stable state after a failure put the software into an unstable state. For such self-healing software application, finding fix for a previously unseen fault is a grand challenge. Asking the user to provide fixes for every fault is bad for productivity, especially when the users are non-savvy in technical aspect of computing. If failure scenarios come...
One of the major tasks in stock market analysis is the discovery of specific events that give rise to a particular event. In this research we emphasize bin partitioning technique on a stock-oriented dataset with a time dimensional approach. We are mainly interested in bringing forward an algorithm for pattern discovery in sequential data streams and also bring out the interdependencies among the events...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.