Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
In this paper a method is proposed to segment the board in Snooker games automatically. The algorithm involves the following steps: first, separable second derivative of Guassian steerable filters, which are linear combination of basis filters and can implement filtering with variant direction, are used to extract the edges in both horizontal and vertical directions. The input image f(x,y) is convolved...
A recent trend in Ad Hoc network routing is the reactive on-demand philosophy where routes are established only when required. Most of the protocols in this category are not incorporating proper security features. The ad hoc environment is accessible to both legitimate network users and malicious attackers. It has been observed that different protocols need different strategies for security. The Hashing...
The objective of this paper is to provide the middle school students and teachers with the adaptive mathematic e-learning study system by using Microsoft .NET framework technique, MathML plug-in and dynamic mathematical graph-maker which is the tool to analyze and construct the middle school mathematical dynamic graph-maker in order to help middle school students in better understanding and mastering...
Nodes in Mobile Ad-hoc Networks (MANETs) are battery powered and hence have limited life time. Due to excessive utilization a node may die which can result in energy depletion problem and thereby affect overall network performance. Local rate of energy consumption based on application (e.g.: audio, video, word, etc) can be monitored. We can estimate the remaining battery life (residual energy in a...
To scale with the on-chip wire delay, the inside of a processor will further be partitioned into more small banks. As the amount of data cache bank scales, the load routing latency will contribute a considerable portion to program executing time. In a tiled processor like T-Flex, we observed that the average load routing latency (hit in data cache) can be largely reduced (by 72.1%) when data is perfectly...
In this paper we focus on one critical issue in mobile ad hoc networks that is multicast routing and propose a mesh based "on demand" multicast routing protocol for ad-hoc networks with QoS (quality of service) support. The proposed scheme has four key features: (a) it is based on the forwarding group concept (i.e., a subset of nodes is in charge of forwarding the multicast packets); (b)...
This paper provides an insight into the integration of automatic speech recognition with VoIP based Asterisk PBX Server. Softphones are used as VoIP clients which uses SIP and IAX as primary communication protocols to connect to Asterisk PBX Server. A tied-state hidden Markov model based automatic speech recognizer for digits recognition is designed with the help of HTK Toolkit which is integrated...
E-Learning systems in Arab countries necessitate technology for the purpose of detecting plagiarism in Arabic. Although search engines such as Google can be utilized, there would be tedious efforts to copy some sentences and paste them into the search engine to find similar resources. For that reason, developing Arabic plagiarism detection tool for e-learning systems facilitate and accelerate the...
This paper analyses how far training programme through information and communication technology help in empowering women. The paper has two stages. First, it analyses the training project "Building skills of self help group women in establishing and maintaining information kiosks." through a case study. The second stage of the paper finds out the real status of the trained women after two...
Denial-of-service attacks are the second most costly type of computer crime, after viruses, according to the 2008 Computer Security Institute survey of security professional's at large organizations. Until recently, denial-of-service attacks were usually weapons used by novice attackers in vendettas against enemies. But like other types of malicious activity on the Internet, attackers increasingly...
Video segmentation has been and is likely to be an important component of the content-based video acquisition and retrieval systems. In this paper, we have proposed an video segmentation technique that uses Kohonanpsilas self organizing map (SOM) neural network for segmentation of color videos. It has been observed that, SOM training if performed on the wavelet-transformed video, not only reduces...
New information and communication technologies (ICTs) have dramatically altered the landscape of education at all levels. The present article explores how such technologies are integrated into the classroom environment and also their influences, especially on post-secondary faculty development. This paper makes a case for the full implementation of ICT in university programs for the education of professionals,...
Discrimination between watermark and host image is one of primary problems in DCT-based watermarking algorithms, especially when attack occurred on watermarked image. In this paper, a new pre-processing approach is presented to improve watermark extracting performance of DCT-based watermarking schemes. This method is based on adding noise magnifying and enhancement operations as beginning steps to...
The objective of this research is to design and develop the dynamics and kinematics simulation software for robot education purpose. The dynamic models of robots and controllers are composed of, six types of robot and PID-controller. The kinematics model to consider Forward kinematics based on Denavit-Hartenberg Transformation. MATLAB software is applied for creating graphical user interface allowing...
Computer networks have added new dimensions to the global communication. But intrusions and misuses have always threatened the secured data communication over networks. Consequently, network security has come into issue. Now-a-days intrusion detection systems play an important role in security infrastructures. Intrusions typically start with intruders infiltrating a network through a vulnerable host...
The scoring mechanism of the text features is the unique way for determining the key ideas in the text to be presented as text summary. The treating of all text features with same level of importance can be considered the main factor causing creating a summary with low quality. In this paper, we introduced a novel text summarization model based on swarm intelligence. The main purpose of the proposed...
Intrusion detection systems have become a standard component of network security infrastructure now-a-days. So far, several IDS's have been proposed. And they all have there own limitations as well as advantages. But there has been not enough significant works to put them all together and discuss their merits and demerits in a comparative manner. So when new researchers try to have a research on this...
The major area of interest in networking is to connect the user of mobile devices to the Internet. These mobile devices are connected to the foreign networks in the Internet will expect or requires the same functionality when they are connected to the home network. The ad hoc networks provide connectivity between the mobile hosts and access points without backbone infrastructure. The network mobility...
A Schema-Guiding Evolutionary Algorithm (SGEA) is proposed in this paper. The novel SGEA has many good features. It proposes the schema-modified operator to adjust the distribution of the population. What's more, it constructs an elite-schema space and proposes the cluster-center schema to guide the direction of individual's evolution. And by such two strategies, the diversity of the population and...
In this paper, the corrosion damage of the aluminum alloy specimens were studied at different temperature for various corrosion times. The surface corrosion damage ratio of aluminum alloy structure was defined to reveal the degree of pit corrosion intensity. Based on the probability model of pitting corrosion growth, a new probability model capable of simulating the surface corrosion damage is developed...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.