The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The significant increase in Voice over IP (VoIP) service providers over the last few years has prompted an increase in VoIP services and currently poses additional challenges when deployed on wireless mesh network. Packet losses and delay due to interference in a wireless mesh network degrade significantly the VoIP call quality. In this work, we propose an approach inspired of Traffic Engineering...
In this paper we test an elaborated algorithm based on particle Swarm Optimization for reducing the Peak to Average Power Ratio (PAPR) with respect to ACE-AGP (Active Constellations Expansion) in OFDM signals, by removing and then rearranging pilots in the original signals. Simulation results show that the proposed method doesn' undergo any degradation interm of PAPR reduction with a very low complexity.
This paper conduct a comprehensive simulation study on the behavior of TCP-friendly Rate Control (TFRC) protocol over Ad-Hoc On Demand Vector (AODV) routing protocol and Dynamic Source Routing (DSR) protocol. The aim are first, to measure the performance of TFRC in terms of throughput, delay and jitter. The second objective is to identify which Mobile Ad-Hoc Network (MANET) routing protocols work...
Visual information is becoming increasingly important and tools to manage these vast repositories of media collections are highly sought after. In this paper, we focus on images and image databases and how to effectively and efficiently access these. In particular, we present the idea of image browsers which provide an intuitive and interactive means of handling image collections. Not only do image...
In this paper, we consider a stage structured model of a harvested fish population. The model is a continous-time system involving a nonlinear recruitment function. Using the generalization of Gronwall-Bellman lemma, we show how to act on the fishing effort in order to prevent the extinction of the population. More precisely, we show how to compute the fishing effort as a feedback control in order...
We propose a deterministic secure quantum communication scheme by using Greenberger-Horne-Zeilinger GHZ4 states. The scheme consists of sharing the correlation of four particle GHZ4 states between the legitimate users. After ensuring the security of the quantum channel, they begin to exchange the secret information according to their four-particle projective measurements and classical information...
Classification system and textural features play increasingly an important role in remotely sensed images classification and many pattern recognition applications. In this work, we propose to fuse the information outputed by 3 well-known classifiers : Support Vector Machines (SVM), Neural Network (NN) and Parzen Window (PW). These classifiers were combined according to the Dempster-Shafer theory....
In this paper we present a sub-carrier and power allocation algorithm for multiuser MIMO-OFDM system. In order to minimize the total transmit power under the condition that users' QoS requirements are satisfied, the proposed algorithm assigns the sub-carrier to user that has the maximum gain on all spatial sub-channels on each sub-carrier. Simulation results show that the proposed algorithm converges...
In this paper we propose a novel steganographic method for hiding information within the spatial domain of the gray scale image. The proposed approach works by dividing the cover into blocks of equal sizes and then embeds the message in the edge of the block depending on the number of ones in left four bits of the pixel. Our experimental results have shown that the proposed method not only has an...
In this investigation we applied the Multi Layer Perceptron (MLP) neural networks for modeling and predicting a real non Gaussian process. The obtained results show that an agreement between predicted and measured values. The statistical error analysis used to evaluate the performance of the correlations, between measured and predicted values provides satisfactory results. The developed model is tested...
A Backpropagation Neural Network (BPNN) is one of the most used methods in the domain of face recognition. BPNN need supervised training to learn how to predict results from desired data, and through many research and studies, they proof there robustness to do so. In this paper, we propose a hybrid method to achieve face recognition purpose using semi supervised BPNN. The idea is to get the desired...
A major drawback of orthogonal frequency division multiplexing interleave division multiple access (OFDM-IDMA) is the high peak to average power ratio (PAPR) of the transmitted signal. In this paper, the basic principle of Orthogonal Wavelength-Division Multiplexing-Interleave Division Multiple Access (OWDM-IDMA) technique is outlines. The PAPR for multicarrier systems with different pulse shapes...
This paper describes the designed hardware and software systems (planimeters) for contactless measurement of areas (measuring the variation of oedema area's) of planar projections of laboratory rodent leap. These systems operate on the principle of processing the video signal scanned by a digital camera.
In this paper, we make a first attempt to combine face and iris biometrics using an efficient local appearance feature extraction method based on steerable pyramid (S-P), to captures the intrinsic geometrical structures of face and iris image, it decomposes the face and iris image into a set of directional sub-bands with texture details captured in different orientations at various scales. Local information...
In this study, We are particularly interested in designing and analyzing chiral devices to quantify their shielding effectiveness as a function of frequency. The typical materials used for shielding are the copper, aluminium and steel. In order to do a comparative study between the different types of materials, the results obtained are presented. Due to chirality, there is magnetoelectric coupling...
In the present paper, we are interested in the security functions and algorithms of the 3GPP 4G standard known as LTE. A special interest is given to the protection of the data integrity and the provisioning of data encryption. In a previous work, we were interested in the study of the cryptographic algorithms EEA1/EIA1 and EEA2/EIA2 operation and their implementation. The analytical study of the...
In the case of small IT projects the project managers are tempted to not make a planning to save time. However, establish a schedule is necessary for a successful project, in this work we propose a platform for planning assistance, based on solving the planning problem modeled in CSP, that should help project managers to analyze the project feasibility and to generate useful schedule with just some...
Nowadays, recommender systems are considered as one of the basic pillars of e-commerce as they help users to take decisions easily. These systems involve a multitude of techniques ranging from hybrid filtering mechanisms to techniques derived from statistics or artificial intelligence. In the present paper, we put forward an improved recommender system that supports ethics in an automatic way without...
This paper presents a new method of video sequence segmentation. The principal aim of our approach is the detection of cuts suites in a video sequence (boundaries of transactions). The method is based on two thresholds which allow the localization of transactions suites in a video sequence.
Today recommender systems are widely used not only in e-commerce but in e-learning as well. They are actually made use of in the latter environment to suggest resources and learning materials to learners and, thus, contribute in improving the quality of both teaching and learning. In this paper, we put forward a new recommendation system that provides learners with the most appropriate answers and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.