The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Full-duplex (FD) is a very promising technique that offers the potential to double the spectral efficiency. In this paper, the achievable rate for uplink-downlink user and antenna selection in poor scattering channels of FD multiuser system is studied. The considered FD communication system consists of one FD multi-antenna base station (BS) and multiple half duplex (HD) single antenna mobile terminals...
4G wireless standard, Long Term Evolution (LTE), promises to guarantee delivering of band-consuming applications. In this context data-based services as web browsing with equipped video and video streaming are the most requested services by end user. In order to be able to use all LTE innovative features, Mobile Network Operators (MNO) need to also guarantee both an opportune Quality of Service (QoS)...
Over the last few years many techniques have been applied to find and mitigate vulnerabilities, misuses, cyber-attacks and other cyber-security flaws. One of the approaches, which we consider in this paper, is a model-based technique applied to network communication protocols. This idea is not brand new, and model-based techniques have been successfully used to verify and validate the standard models...
When it comes to satellite navigation and positioning services, people firstly think of the GPS/GLONASS/BeiDou/Galileo and other mature navigation systems. But the single satellite navigation and positioning may play a gigantic role when facing disasters. In this paper, we briefly analyzed the traditional localization algorithms of single satellite. Meanwhile, a new rapid localization algorithm is...
Goldreich-Goldwasser-Halevi (GGH) is a lattice-based public-key cryptosystem which has been widely developed due to its simple encryption and decryption procedures. Despite many existing GGH improvements, its huge public key size remains its main drawback, which prevents the system from being used in practice. In order to reduce the key size, we propose in this paper a new GGH cryptosystem using Generalized...
For the targets whose maneuverability is not too severe, the azimuth echoes in a range bin are modeled as quadratic phase signal after the translational motion compensation. The FrFT algorithm can obtain a focused image by motion parameter estimation and compensation. However, when a range cell contains more than one scatterer, the effects of sidelobes and interference terms will deteriorate the performance...
Intelligent systems can assist the diagnosis of a plant disease in early stages, allowing continuous plant monitoring. The most important symptoms of a disease include lesions, overdevelopment or underdevelopment of various parts of a plant, necrosis and deteriorated appearance. The color, area and the number of the lesions can often be used to determine the disease that has mortified a plant. A Windows...
This research investigates the use of a multi-threaded framework as a software countermeasure mechanism to prevent attacks on the verifypin process in a pin-acceptance program. The implementation comprises of using various mathematical operations along side a pin-acceptance program in a multi-threaded environment. These threads are inserted randomly on each execution of the program to create confusion...
Deep Venous Thrombosis (DVT) is a major national health problem. Its progression to a pulmonary embolism can lead to significant mortality. DVT is a frequent, severe and often under-recognized diagnosis for critically ill patient. Many factors can increase the risk of DVT: immobilization, cancer, age, surgery, previous DVT, hormone, thrombophilia, etc. Ultrasonography is mostly performed for its diagnosis...
In this paper, different image preprocessing methods are compared based on their ability to remove noise and to segment the images. Two filters, namely, Median filter and Wiener filter, and seven image segmentation methods, namely, Sobel, Prewitt, Roberts, Laplacian of Gaussian (LoG), Canny edge detection, basic global thresholding (BGT) and Otsu's global thresholding (OGT) are applied on the images...
This study investigates a method for recognition of tea aroma using a multilayer neural network. A gas-sensing system utilising an array of quartz crystal resonators coated with plasma-organic-polymer-films is designed. Three teas, oolong, jasmine and puerh, are used as the sources of sample gas. Wavelet transform frequency analysis is applied to the signals from the gas-sensing system, and the features...
The current research aims at developing IT to achieve the gas energy service and present service performance. Therefore, we focus on e business solutions in NIGC's present service areas. There were two phases involved, in the first phase, the e business solutions were developed to study the effective adoption of information technology (IT) in the NIGC. In the second phase data was collected by questionnaire...
In order to overcome the defects of shuffled frog leaping algorithm (SFLA) such as slow searching speed in the late evolution and easily trapping into local extremum, an Opposition-based Chaos Shuffled Frog Leaping Algorithm (OCSFLA) was originally proposed in this paper. It utilized the opposition strategy to generate initial population, adopted a modified frog leaping updating formula, and combined...
In this paper FPGA implementation of a simple median based technique for selective image encryption is presented. Image encryption imposes heavy resource requirements on the hardware platform due to large size of data. Although Advanced Encryption Standard (AES) provides a high level of security to the image, it takes more time when used for image encryption. The technique presented in this paper...
In this paper, a quantum image encryption based on scrambling-diffusion (SD) approach is proposed. The position information of the quantum image is scrambled by Arnold cat map followed by Fibonacci transformation to avoid iteration problem in each technique. Then, quantum gray-code is used to encrypt the gray-level information of the scrambled quantum image. Simulations and analyses indicate that...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.