The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wireless Local Area Networks WLAN based on wireless technology, i.e., no physically connection exists. Therefore, security is always a major concern for WLAN development and one of the major problems in WLAN security issue is authentication. EAP (Extensible Authentication Protocol) is a framework of authentication that uses several methods of authentication such as TLS, TTLS, PEAP and LEAP. EAP-LEAP...
In this paper, we focus on two main properties of random sequences; Hamming correlation (HC), and linear span (LS). We study these properties for RC4 stream cipher, a family built on M-sequences, and sequences generated by Reed - Solomon Code.
In this paper, we will propose some models for PON/RoF-PON combines a number of ideas used before in the research papers, the ITU-U recommendations and also a number of novel models. We compare between those proposed models by using the Expected Survivability Function; a simple and intelligent tool to evaluate network survivability. The analysis was done for different number of simultaneous faults...
This paper proposes a low-complexity vector-core called LcVc for executing both scalar and vector instructions on the same execution datapath. A unified register file in the decode stage is used for storing both scalar operands and vector elements. The execution stage accepts a new set of operands each cycle and produces a new result. Rather than issuing vector instruction (1-D operations) as a whole,...
This paper shows how to make the QR decomposition algorithm run faster on Intel multi-core processors by exploiting explicit parallelism and memory hierarchy. Streaming SIMD extensions and multithreading computation on multiple cores are used to exploit data-level parallelism (DLP) and thread-level parallelism (TLP), respectively. In addition, memory hierarchy is exploited by performing the QR computation...
Data-parallel kernels dominate the computational workload in a wide variety of demanding applications. Since the fundamental data structures for a wide variety of data-parallel applications are scalar, vector, and matrix, this paper proposes a simple matrix processor (SMP) for executing scalar/vector/matrix instructions. Instead of using accelerators to improve the performance of data-parallel applications,...
Different optimization functions are used to develop the particle swarm optimization (PSO) technique, based on natural and physical phenomena. The presented techniques range from Standard PSO, Linearly Decreasing Weight PSO, Center PSO, Mean PSO and many others. In this paper, a new hybrid particle swarm optimization technique, called Linearly Decreasing Weight Mean PSO, is presented, based on the...
The spread of mobile devices and wireless networks help the learning process and offer opportunities for knowledge acquisition also brings hope to universities use technology to improve their services. The aim of this paper is to measure the Egyptian student's perception toward the concept and benefits of m-learning through a survey of two hundreds and eighteen students at different colleges in Egypt...
This paper introduces how to apply rough set classification and attribute reduction method in the field of landfill site selection. Unlike the analysis in the past which focused solely on the spatial data of the map, in this paper, rough set attribute decision table specific for the criteria is created, thus to meet the needs for landfill site selection decision. This paper proposes a solution for...
To initialize a high dimensional system design process, it is very important to be able to develop an initial estimate of its design parameters to satisfy designer required specifications. For new emerging designs, this estimate has to be made based on a limited available set of examples. Moreover, a practical estimate prediction strategy should be flexible enough having no distinction between input...
The problem of controlling the π-model induction motor with magnetic saturation is considered in this proposed research. DTC of induction motor have been developed since 1980, many techniques have been proposed to improve the performance of the induction machines that using the DTC drives in industry but all the previous models are using the linear model of the machine for approximation which is not...
Every year, automobile manufactures spend millions in funding development of cutting edge technologies to keep drivers safe and accident free while operating their vehicles. These technologies are known in the industry as Advanced Driver Assistance Systems and each one is controlled by complex real-time embedded systems. This paper will present the state of the art for Advanced Driver Assistance Systems...
This paper presents a new method for color image compression and enhancement. The color image is decomposed into its three components. Each component is decomposed using any type of wavelet. The high frequency components are mapped using the color space YUV,YIQ or CIEXYZ. The mapped components with the low frequency component constitute the red, green and blue components. The compressed image is reconstructed...
In this paper a new technique is introduced to hide nine images in a color image. The color image has size four as the watermark size. In each of the color image components three images are hidden. Each color component is decomposed by a Discrete Wavelet Transform (DWT) into four components. Three of four components are used to hide the three images. The hiding operation starts with taking the Discrete...
In this paper, computed tomographic (CT) images were investigated to develop a computer-aided system to discriminate different lung abnormalities. These were done by analyzing Data recorded for healthy subjects and patients suffering from lung asthma and emphysema diseases were considered. The techniques for utilized feature extraction included statistical, intensity, and morphological features as...
Content-Based Image Retrieval (CBIR) considers the characteristics of the image itself, for example its shapes, colors and textures. The Current approaches to CBIR differ in terms of which image features are extracted. Recent work deals with combination of distances or scores from different and independent representations. Content-based image retrieval has many application areas such as, education,...
In digital gray-scale images, nearby pixels tend to have similar intensities, which normally are encoded using the ordinary binary code. However, the correlation between bits in such binary representation does not reflect how close these intensity values to each other. In this research, we proposed to utilize Gray code, instead of the ordinary binary code, and to decompose the image into multiple...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.