The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents a novel microstrip ring filter with a center frequency (f0) of 2.4 GHz and ultra-wideband (UWB) characteristics. It has an extremely compact size (10mm times 10mm). A Fractional Bandwidth (FBW) of around 120% and a sharp rejection greater than 40 dB have been achieved. Two transmission zeros have been introduced by adding short-circuit vias at the band edges which provide a reasonably...
This paper investigates the performance of direction-of-arrival (DOA) estimation in Rayleigh fading environment using a uniform discrete scatterer model. DOA estimation based on the MUSIC algorithm is used in adaptive smart antenna systems to detect the location of mobile users in broadband 3G/4G wireless communication systems. The effect of Rayleigh channel encountered in urban environments is modeled...
This paper presents practical design of a smart antenna system based on direction-of-arrival estimation and adaptive beamforming. Direction-of-arrival estimation is based on the MUSIC algorithm for identifying the directions of the source signals incident on the sensor array comprising the smart antenna system. Adaptive beamforming is achieved using the LMS algorithm for directing the main beam towards...
The aim of this paper is to present "filimage" a new Web accessibility contents system designed for effective automatic extraction of images (diagrams, tables, pictures, scientific formulas...) and textual captions from e-contents. The proposed solution consists of both textual and visual objects' specific treatment. The developed implementation is based on three sequential modules. "Automatic...
The use of information and communication technology (ICT) within the Australian general practice sector has been widely researched and is well documented. This paper adds to the knowledge by using data collected from 122 regional medical practitioners to show that the driving forces behind the adoption and use of ICTs can be grouped according to three factors: improvement to business and medical care,...
Extensible Markup Language (XML) is the 'love-child" of the World Wide Web Consortium (W3C). XML is expected to facilitate Internet B2B messaging because of its simplicity and flexibility. One big concern that customer may have in doing Internet B2B messaging is security. Therefore considering some security features in XML such as element-wise encryption, digital signature and access control...
On-line analytical processing (OLAP) provides tools to explore data cubes in order to extract interesting information. Nevertheless, OLAP is not capable of explaining relationships that could exist within data. Association rules are one kind of data mining techniques which finds associations among data. In this paper, we propose a framework for mining association rules from data cubes according to...
The object of this paper is to present a model of intelligent and mutant autonomous agents (J. Sallatin, 1997), dedicated to the computer-assisted maintenance. We will approach in this paper only the autonomous side of their behaviour. Conceived to manage an information expert system called CONRAD (communication network request adaptator device), they have the role of dealing with the dynamics of...
Personal management of information bears several problems including vague definition of personal information, fragmentation of information, and uncertain boundaries of study. This paper identifies a subfield of personal management of private information as a more coherent independent area. Private information is defined as information that refers to a uniquely identifiable person. Personal management...
The mining of frequent patterns in databases has been studied for several years, but few reports have discussed fault-tolerant (FT) pattern mining. FT data mining is more suitable for extracting interesting information from real-world data that may be polluted by noise. This paper considers proportional FT mining of frequent patterns. The number of tolerable faults in a proportional FT pattern is...
In this paper, we present a study on association rule mining based on real POS data from a SME (small and medium enterprise). Our main contribution is proposing a new criterion, called R-repeat, to evaluate the significance of rules by focusing attention to the purchase pattern repeated by a certain customer. We also focus on detecting a special customer segment, called R-repeater. In addition, we...
The most crucial question when using a cryptographic scheme is how to select the cryptographic parameters such that the scheme is "secure" and reasonably efficient at the same time. In this article that question will be considered for cryptographic schemes based on class groups of imaginary quadratic number fields. Specifically, an algorithm is investigated that is very similar to the (p...
Database consistency is one of the major issues in replicated database in peer to peer environment. The logical design for the replicated nodes and the transaction management mechanism are two aspects that give a serious impact to the performance and the consistency of replicated database. This paper proposes a new model that combines the neighbor replication on grid (NRG), where the data is replicated...
Automatic key phrase extraction has many important applications including but not limited to summarization, cataloging/indexing, feature extraction for clustering and classification, and data mining. This paper presents a simple, yet effective algorithm (KP-Miner) for achieving this task. The result of an experiment carried out to investigate the effectiveness of this algorithm is also presented....
The key threat to IS security is constituted by careless employees who do not comply with IS security policies. To ensure that employees comply with organizations' IS security procedures, a number of IS security policy compliance means have been proposed in the past. Prior research has criticized these means as lacking theoretically and empirically grounded principles to ensure that employees comply...
Secure key management in sensor networks is fundamental for data protection. However securing key management process is not a trivial task. Especially key generation and key distribution phases require extreme care. Most cited current research work focuses on finding appropriate methods to securely transmit a key generated by some master node in the insecure wireless sensor network. This work presents...
We present a novel visitor management application to manage visitors in hazardous areas of process plants. Visitor safety, including subcontractors, is increasingly the responsibility of plant management. The ubiquity and near real time operation of a Web services application offers plant management novel assurances of best practice. The VMA offers the ability to connect sub-contractor primary management...
Wireless sensor networks (WSN) have the potential of significantly enhancing our ability to monitor and interact with our physical environment. Realizing a fault-tolerant operation is critical to the success of WSN. The main challenge is providing fault-tolerance (FT) while conserving the limited resources of the network. Our main contribution in this paper is to propose a general framework for fault-tolerance...
Semantic metadata, which describes the meaning of documents, can be produced either manually or else semi-automatically using information extraction techniques. Manual techniques are expensive if they rely on skilled cataloguers, but a possible alternative is to make use of community produced annotations such as those collected in folksonomies. This paper reports on an experiment that we carried out...
There is an increasing need to effectively mine for knowledge both across the Internet and in particular Web localities. Manual processing of Web documents with specific information about a particular domain is a delicate and very time-consuming activity performed by expert professionals, and which can not be easily delegated to automatic tools. The introduction of tools, which exploit semantics for...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.