The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper introduces a new family of rank metric codes: the Low Rank Parity Check Codes (LRPC) for which we propose an efficient probabilistic LRPC decoding algorithm concatenated with convolutional code associated with an interleaver. The main idea of decoding LRPC codes is based on calculations of vector spaces over a finite field F(q). This family of codes can be seen as the equivalent of classical...
In the recent communication engineering, communication links require antennas which can operate more than one application band. Multiband antennas with microstrip patch are designed basically for mobile and aerospace applications, the reasons for that is that these antennas have very light weight, low profile and low power consumption. These antennas have many shapes to get the bandwidth and the gain...
This paper presents the theoretical approach in developing the estimator equations for estimating distance and unknown channel parameters of indoor environment based on the received signal strength (RSS) method in Wireless Sensor Networks. The estimator equations are derived by manipulating the lognormal propagation model via maximum likelihood estimation method. In this paper, the path loss exponent...
In the area of computational intelligence as like Artificial Neural Networks (ANNs) or Fuzzy logic have been used for the construction of an effective and reliable system in order to solve a real world problem where appropriate outcome along with certainty as well as precision are highly required. In this article, we present an integrated approach based on a fast elitist non-dominated sorting genetic...
A range of load prediction techniques has largely been used for energy management at various levels. However, the data used for the prediction are cumulative energy data, which reveal the activities of consumers and not individual consumer, on the distribution power network. Individual consumer data is essential for real time prediction, monitoring and detect of electricity theft. A new approach of...
The recent technology of intelligent systems is using multiple sensors to assess real-time information of the internal system states and the environmental operating conditions. In the case of sensor(s) transient faults, the dis-connection of the readings causes inappropriate actions. So the need for sensor fault detecting and estimating multiple sensor faults becomes an important issue to optimize...
The LTE-Advanced HetNets deployment is meant to address the increasing demand for quality of service (QoS), high data rates, and coverage extension to mobile users especially in hotspot areas. One of the main challenges of the deployment, where different network tiers share spectrum, is how users associate with the cells to achieve load balancing for improving system performance. The importance of...
The Internet is simply a series of worldwide computer networks linked together, communicating almost instantly by using various access technologies. It is playing a major role in many areas of our lives, such as communication, entertainment and information which is supported by newer innovations and technology evolvement. While the broadband Internet penetration rate is encouraging in many countries,...
Getting visa or its renewal is one of the important elements for International students studying abroad. Each and every year students need to renew their visa, to extend their studentship in order to stay in a particular country. In Malaysia, in order to process visa renewal faster, Education Malaysia Global System (EMGS) was introduced by Malaysian Government. Since the implementation of EMGS in...
For the past decade, researchers have developed rehabilitation robot based-therapy for post-stroke patients which goal is to complement the traditional manual therapy. However, they are still lacking in terms of measuring the human arm's impedance that neurorehabilitation therapist used to estimate before deploying a specific training regime. There are numerous assessment strategies exist to estimate...
In a distributed environment, one of the major concerns is authentication of remote users. In this sector, legitimate users are more powerful attackers. The remote systems working with password and smart card ensures authorised access. Smart card based remote user authentication schemes have been adopted due to their low computation cost and portability. In 2012, Wen and Li proposed an improved dynamic...
Nowadays, there are more than 500 Quranic recitations available freely on the internet. Most of the audio files were recorded in MP3 format due to its popularity, but lossless audio coding has gained much interest due to its high quality. The drawback of the lossless audio coding is the higher bitrate requirement. In this paper, the characteristics of the Quranic recitation of all surahs from various...
Visually Impaired Malaysians find great difficulty in recognizing bank notes as there are no commercially available aid for her currency and not much research done in the area. A very low cost, high efficient system has been proposed to help visually impaired Malaysians identify her bank notes. This system is built around the unique color of her bank note. The system features a sound module, color...
This study identifies and evaluates discriminative lexical features of malware URLs for building a real-time malware URL classification. The lexical features of malware URL are first identified from existing blacklisted malware URLs through manual examination. Feature identification is followed by studying the prevalence of these features on newly collected malware URLs through empirical analysis...
One of the main security criteria that mostly influence the strength of a conventional cipher system is the Nonlinearity criterion. A classical cipher system is considered strong if it is characterized by high nonlinearity. That is, the underlying Boolean function employed within the system is required to be far from being linear. The measure of a Boolean function's nonlinearity can be done with the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.