The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Tremendous work has been achieved in operating system development. These efforts handed from both experienced and non-experienced developers targeting several milestones. Missing the full vision of operating system subsystems and hardware/software interaction brought up the desire for debugging the code. Ease of use and higher capabilities of the debugger were main goals for software vendors to satisfy...
In this paper we propose a new unconstraining method for demand forecasting. Since true demand forecasting is a key aspect of hotel room revenue management systems, inaccurate forecasts will significantly impact the performance of these systems. We propose a method based on a Monte Carlo simulation forecasting model and an Expectation-Maximization (EM) algorithm that, unlike traditional statistical...
A fuzzy logic based prediction algorithm is developed which predicts when a driver will use cruise control in their automobile. The fuzzy system reads vehicle speed, the smoothness of vehicle speed, the delta speed from the current speed limit and estimates likelihood of cruise control usage. Over 1700 km of real world driving data was recorded. This data was used to calibrate the membership functions...
Diabetic retinopathy (DR) is a condition where the retina is damaged due to fluid leaking from the blood vessels into the retina. In extreme cases, the patient will become blind. Therefore, early detection of diabetic retinopathy is crucial to prevent blindness. The main stages of diabetic retinopathy are non-proliferate diabetes retinopathy (NPDR) and proliferate diabetes retinopathy (PDR). In this...
Multi-view video sequences are compressed using advanced high compression ratio tools called H.264/AVC multi-view coding (MVC). MVC is very sensitive to errors due to its structure as a result Error Concealment (EC) algorithms are developed at the decoder to improve the quality of decoded MVC frames. In this paper efficient multi-view EC algorithms are proposed for intra and inter MBs exploiting the...
Image denoising involves processing of the image data to produce a visually high quality image. The denoising algorithms may be classified into two categories, spatial filtering algorithms and transform domain algorithms. In this paper a comparative study between different denoising filters for speckle noise reduction in ultrasonic b-mode images based on calculating the Peak Signal to Noise Ratio...
This paper presents a new intelligent control scheme which utilizes genetic algorithm and particle swarm optimization (PSO) for off-line tuning of proportional-integral-derivative (PID) controller for the twin rotor multi-input multi-output system (TRMS). The control objective is to make the beam of the TRMS move quickly and accurately to the desired attitudes. The TRMS exhibits MIMO characteristics,...
The Real-time Transport Protocol (RTP) is designed to transmit real time traffic such as audio and video. Secure Realtime Transport Protocol (SRTP) provides confidentiality, message authentication, and replay protection for RTP traffic. SRTP uses advanced encryption algorithm (AES) to protect RTP traffic. Chaotic encryption is new trend in cryptography based on chaos theory. Chaos is a class of complex...
Solving the problem of dynamic nature of the multicast communication is always a challenging task. According to the key management problem in multicast, there are many protocols that try to get an optimized solution to this problem. When anyone deals with this problem he tries to minimize the number of update messages. The number of update messages is the factor which affects the bandwidth of the...
This paper presents a new interleaving scheme for efficient data transmission with Orthogonal Frequency Division Multiplexing (OFDM) over fading channels. This approach is based on the chaotic Baker map. The binary data is interleaved with the proposed approach prior to the modulation step. In addition to improve the system performance in fading channel, the proposed chaotic interleaving approach...
In this paper, we propose a solution for building a secure e-transaction system based on a combination of theorems like proxy, cross validation and blind signature schemes with mobile agent technology. We make the identity of mobile agent unknown for all the service hosts participating in the e-transaction to ensure the equity of service provision. The proposed solution is designed with the aim of...
In this paper we will propose a new blind variable step-size method which is mainly based upon the exponentially weighted step-size method to enhance the performance of the recursive versions of the CMA and the CC-CMA algorithms in multi-user applications. The proposed method presents a new method which detects blindly the channel impulse response variation according to the ever-changing environmental...
Mobile ad hoc networking has gained prevalent interest of the network community in recent years because of it's ability to offer distributed and decentralized communication facility on ad hoc basis. A major issue that affects such a network with dynamically changing topology is the performance since the nodes have both limited battery life and communicate in a bandwidth constrained network. In this...
In this paper, we propose a solution which can not only satisfy security demands like confidentiality and integrity for data carried during e-transaction, but also solve the bottleneck problem caused by the trusted third party (TTP) due to compromise or unavailability of this party. Applying decentralized approach based on mobile agent (MA) technologies improves e-transactionsystem by reducing the...
In this paper, desirable performance of fault localization process in all-optical networks, by employing the recently introduced Monitoring-Trail (m-trail), is explored and a focus is given to the analysis on using m-trails with established lightpaths. A novel technique based on Geographic Midpoint Technique, an adapted version of the Chinese Postman's Problem (CPP) solution and an adapted version...
In this paper, we propose a new method for recognition of color fingerprint images. The data is collected from eight persons in the department. The main contribution of this work is the features extracted from color fingerprint images. The Discrete wavelet (DWT), the discrete cosine transform (DCT) and CIEXYZ color space are used to extract the features. No training is accomplished in our system only...
Image enhancement techniques can be classified into two categories as spatial domain and frequency domain. This paper presents hardware implementation of a five image enhancement algorithms in spatial domain using FPGA technology. These algorithms are: median filter, contrast stretching, histogram equalization, negative image transformation and power-law transformation. All algorithms are studied...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.