The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The fast and wide advancement of the Internet of Things (IoT) boosted by the remarkable development of sensor networks, RFID, software platforms and the Internet as a global container of IoT, have opened the appetite of several vertical industries to include IoT in their strategic vision for the coming years. Academic institutions have also established projects to vigorously investigate the potential...
In recent years, due to the rapid decrease in the cost of micro electro mechanical systems, compact operating systems and the changing requirements of the users are enforced the use of low cost processing devices which are connected in a networked structure, named as wireless sensor networks, which utilize from different type of sensors in it. The data management task in WSNs is a trivial issue and...
Traditional video surveillance takes a huge amount of space storage. Recording everything captured by a surveillance camera consumes the storage devices used by the system. Extracting useful and meaningful information from surveillance videos is a time consuming process due to the long time of the recorded videos. These drawbacks limit the effectiveness of traditional video surveillance systems. In...
This paper presents an approach for designing of JPEG2000 video encoder board based on firmware programmable SRAM-style hardware CODEC. Typical, mostly used, electro optical sensor output signal and its basic characteristics are given and then signal-data size relationships are explained. Later, some fundamental information about JPEG2000 standard is summarized. System design blocks and implementation...
Using a mobile device to store sensitive data is not recommended, because of the high possibility of losing or thieving these data; although, neither using single cloud as a storage service is not proper solution for number of reasons; for instance, the data could be captured while uploaded to the cloud, and the data could be stolen from the cloud via using stolen ID. In this paper, we propose a solution...
Having an effective technique for bandwidth allocation is very important in wireless communications. Artificial Immune Systems, a relatively new meta-heuristic for solving optimization-related problems, is investigated in this study to design a cellular channel allocation framework. In this study, mobile hosts are allowed to continue interacting with the cells that they are currently in, even when...
Graph matching is a fundamental graph theory problem which has a broad application range including information retrieval, pattern recognition, graph partitioning, chemical structure analysis, protein function prediction, backup placement and cellular coverage. This problem has gained attention in distributed computing as there are distributed matching algorithms with asymptotically guaranteed time...
In a sophisticated and coordinated cyber-attack $100 million has been stolen from Bangladesh's account. Attackers introduced malicious code remotely into the Bangladesh Bank's server, which allowed them to process and authorize the transactions. Advanced attack techniques poses threats to all web application systems. Cross Site Scripting (XSS) and Cross Site Request Forgery (CSRF) are two vulnerabilities...
As a consequence of advances in wireless communication, digital systems and micro-electronic-mechanical system technologies, wireless sensor networks (WSNs) have been developed and applied in lots of different real-world applications. Especially; military, industrial, environmental and health WSN applications have critical roles in daily life. WSNs consist of small and resource limited sensor nodes...
Aiming to solve the track anti-bias refined correlation problem of the group targets, based on the characteristics of the group tracks and the fussy topology theory, an algorithm of track anti-bias refined correlation of group targets based on double fussy topology is proposed. In this algorithm, the group identification of each sensor is obtained based on the cyclic threshold model firstly. And then...
In this paper, the real time ERP-OFDM wireless local area network (WLAN) receiver prototype and its performance analysis based on IEEE 802.11g physical layer requirements are presented. We design and implement a software defined radio (SDR) receiver for all ERP-OFDM WLAN functionalities. The receiver prototype setup based on the universal software radio peripheral 2 called USRP2 with National Instruments...
In this study, determining of the suitable landing areas on the topographical maps were determined for emergency landing of the Unmanned Air Vehicles (UAVs) during flight. In order to reach desired goals of this work, Shuttle radar topography mission maps (SRTM) was used. Nowodays, UAV have been intensively used in civillian and military applications. There are urgent needs on increasing of autonomy...
Cloud computing is model for sharing of computing and storage resources over Internet. Virtualization is the key technique behind Cloud. It enables provisioning of various kinds of services to the Cloud users on one hand; on the other it increases utilization of computing resources and bandwidth. Virtualization of server and network puts pressure on existing hardware features and protocols by arousing...
The combination of smart cards and biometrics results in a strong 2-factor authentication. It facilitates a trusted credential for authenticating an individual's identity through one-to-one biometric verification using the smart card token. Fingerprint Authentication Systems (FASs) embedded in smart cards are gaining massive acceptance as it offers a superior level of security when compared to the...
Mobile Number Portability service has been launched in many countries and supported by all mobile and some fixed telecom operators in the world. In some fixed operators, this service regulation may have an interaction with national VoIP switches for call forwarding scenarios based on ISUP telecom protocol standard. In this work, we share our experience and solution approach for such a case mentioned...
Fingerprint detection is one of the primary methods for identifying individuals. Gray Level Co-occurrence Matrix (GLCM) is the oldest and prominent statistical textual feature extraction method applied in many fields for texture analysis. GLCM holds the distribution of co-occurring intensity patterns at a given offset over a given image. However, images occupy excessive space in storage by its original...
A number of automated techniques for classification of plants based on their leaves have been developed over the past few years. While each of those techniques have been individually implemented and evaluated, but there have been few studies which have made a direct comparison between the various techniques. In this paper we compared the three well-known techniques. We compared their ability to differentiate...
Nowadays, map images are widely used for many applications. To be well exploited, theses maps generally need a contour extraction operation. However, gaps may result from this phase, which would give rise to the need for reconstructing the missing parts. Map-contour gaps can be caused from low-maps quality or from the contour extraction process. This problem cannot be dealt with simple traditional...
Path planning problem (PPP) is a challenging problem in several real-life applications and needs to be developed and implemented in a suitable manner. For that purpose we designed an efficient Genetic Algorithm (GA) for modeling and solving PPP. The proposed GA exploits an adequate solution representation and a smart crossover operator, and introduces a significant fitness function involving several...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.