The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents multi-user desktop application which can be implemented in any academic institution to record and manage all sort of permanent and day to day statistical data of students and staff. Other than this data, the paper also presents the computerized solution to save all the necessary documents/letters/certificates in the database through multi page high speed scanning system which can...
This paper proposes a new approach of controlling vehicles by detection of visual foot movement. It discusses the constraints imposed by the use of moving vehicle during real-time foot movement tracking. The visual feet tracking attributes ensure the fact that, unlike its counterpart in physical world, our driving does not involve effort of steering. The proposed technique comprises of two main parts;...
In this paper, based on the research and analysis of the existing typical e-commerce logistics models, namely, enterprise itself, third party logistics, logistics alliance and other models, through the analysis of the logistics decision method, a logistics decision method based on business logistics cost is proposed, which has a certain reference for the conduct of e-commerce enterprises in the logistics...
Based on the research on the existing SAR image compression technologies, this paper proposes a wavelet-based SAR image compression algorithm. The algorithm reduces the speckle noise impact on SAR images, improves the SAR image compression performance to some extent, so is an effective SAR image compression algorithm, and has some practical value.
It very hard to collect a large set especially for Arabic handwriting samples used as training set. We generate a good and clear handwriting Arabic character samples for 28 letters, the algorithm learns the strokes directions and properties of the handwriting Arabic character from those real samples. In this paper, we present decision tree to classify the characters belongs to dots, baseline detection...
ROF extracts the voltage magnitude by specifying the rank kth from a given set of inputs. A New and simple voltage-mode analog rank order filter architecture is presented. This paper we proposed a ROF which only needs a unit voltage as an input and selects the smallest value. Meanwhile, for multiple unit voltage by k, the proposed ROF easily selects their respective kth value. The overall hardware...
In order to solve the problem of rigidity in IT architecture and the existence of heterogeneous information islands within most enterprises, a novel service-oriented IT architecture SOA (service-oriented architecture)emerges. The realization of SOA is embodied in the accomplishments of various IT applicable functions in the form of service encapsulation and the interconnection and interoperation of...
In this paper a new architecture to calculate Sine and Cosine Function based on data-oriented theory is introduced. To compute sine and cosine by this model less mathematical operations are needed comparing to common methods. Therefore, hardware implementation of this architecture provides faster module.
In wireless video monitoring system, collaboration and information sharing among monitoring nodes are of great significance to fully mining potential of the monitoring system. It is important to improve its efficiency and reduce the total power consumption, so as to extend its service life. In this paper, by introducing Mobile Agent into wireless video surveillance system, a Mobile Agent based multi-node...
We present the adaptive simulations of Amrita Learning, a web-based, interactive eLearning program that aims to create a realistic mathematics and science laboratory environment for school students to study equipments, perform simulation experiments interactively, measure or analyze results, and understand their application, It teaches abstract concepts, such as flow of electrons and magnetic fields,...
Traditional optical flow techniques applied to object tracking generally perform global searching and calculations of brightness and light intensity of the object in the image. In addition, traditional optical flow techniques assume that the light intensity is constant across a series of consecutive images. The goal is to obtain the displacement and moving direction of an object in a series of images...
This paper explains some existing challenges for network topology visualization. An XML schema for network topology description is proposed to achieve the interoperability between different network management applications. For the better understanding of networks, we use XSLT stylesheet to visualize XML topology descriptions as Scalable Vector Graphics (SVG). It has also been explored how to embed...
Network intrusion detection systems have become a crucial issue for computer systems security infrastructures. Different methods and algorithms are developed and proposed in recent years to improve intrusion detection systems. The most important issue in current systems is that they are poor at detecting novel anomaly attacks. These kinds of attacks refer to any action that significantly deviates...
PRESENT, proposed by A. Bogdanov et al. in CHES 2007, is an ultra-lightweight symmetric cipher for extremely constrained environments such as RFID tags and sensor networks. In this article, a representative platform, 0.25 μm 1.8 V standard cell circuit is proposed to complement the PRESENT, the simulation-based ASIC experimental environment is built to acquire power data. According to the fact that...
The purpose of forensic dentistry is to identify individuals based on their dental characteristics. In this paper, a methodology to classify and assign numbers to teeth in bitewing dental images is presented. The goal is to using the result of this methodology in an automated dental identification system. In this way, proposed approach benefits of categorizing molar and premolar teeth and also spatial...
Information extraction of the images and videos has been done in pixel domain by the traditional methods. But nowadays, great majority of pictures and video are available in compressed form with compression based on block DCT transform. In this paper, we proposed a method based on the DCT blocks for retrieve compressed images. By working on wei-feb and faces94 databases, we show that using the DCT...
Most modern file systems provide journaling method instead of traditional file system check routine for fast recovery and consistency guarantee from unexpected crashes. For clustered file systems with shared storage, to improve the performance of journaling, each node gets its own journal space and each journal can be on its own disk for greater parallelism. After a failure, file system consistency...
Residential areas are the gathering of human activities. It has great significance to master the spatial distribution information timely and accurately by RS in disaster assessment, urban expansion and environmental change research. In this paper, taking Longkou city as an example, we find corresponding models to quickly extract residential areas by studying the image features, spatial features and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.