The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The main of the paper is to investigate some problems of qualitative nature concerning perturbed fractional integral equations it is well known that many physical systems are covered by such equations a fact which justifies the increasing interest in their study. Various results are derived by special choice of an integral operator of convolution type.
The security of the information stored or transmitted through a wireless sensor network against attacks is a primary objective. Key management includes many security services such as confidentiality and authentication. Under the constraints of WSN, designing a scheme of key management is a major challenge. In this paper, we improve the resilience of pool based on symmetric key pre-distribution scheme...
Discrete wavelet transform (DWT) has diverse applications in signal and image processing fields. In this paper, we have implemented the lifting “Cohen-Daubechies-Feauveau 9/7” algorithm on a low cost NVIDIA's GPU (Graphics Processing Unit) with MatLab to achieve speedup in computation. The efficiency of our GPU based implementation is measured and compared with CPU based algorithms. Our investigational...
The nature of operational data that is frequently updated, and the interest to reflect business environment alterations in the business analysis process to make operational decisions, need more than the typical data warehousing methodology for data integration. In this paper, therefore, we propose a new methodology to dynamically extract real-time data from various internal and external data sources...
The article in hand deals present a new approach focuses on the electric modelling of split ring resonators based on an equivalent circuit. The elements of circuit are determined from geometric parameters forming the three dimensional model of this type of resonators.
With rapid development of E-commerce, obtaining product features from online reviews effectively is both important consumers and product manufacturers. In this paper, we proposed a two-level Hierarchical Hidden Markov Model (HHMM) to extract product features. In HHMM-1, we use segment tags to divide comment text into Feature-Contained Segment and Non-Feature-Contained Segment. Then the product feature...
This paper presents a new RFID Tag antenna in automotive tire applications. The proposed antenna is designed to resonate at 915 MHz. We applied a miniaturization technique to obtain more than 50% size reduction with an acceptable gain which is about 2.3 dB.
Periodic noise has a global effect, so it cannot be removed and hence recovered in data or spatial domain. This paper develops two approaches of auto detection and recovery of two spikes and their associated degradation lines using frequency domain edge detection. These procedures apply two separated band reject filters to avoid blocking the unaffected bands. Also, the Ring and Notch filters have...
In this work, we present a system of speech synthesis from a text written in Standard Arabic, we explain the methodology used for its design and we demonstrate the principale stages of its conception which can be shown in the folowing two points; 1) The creation of the sound Database (BD) from the elaboration of a corpus. 2) And the acoustic generation of the text previously acquired. To insure this...
In this paper we combine two techniques in order to detect, track and identify person actions in a stream video. The combination of optical flow and stereovision allows also reconstructing the 3D shape of a scene from its 2D images. We take images from two cameras and match points to determine disparity, and therefore depth. The optical flow method is used to estimate motion field in a video scene...
The paper presents an approach to dimension Circuit Switched networks and find the relationship between the parameters of the Circuit Switched networks on the condition of specific probability of call blocking. Our work is creating a Simulation code based on Erlang (B) formula to draw graphs which show two curves for each graph; one of simulation and the other of calculated. These curves represent...
The world population is rapidly increasing due to uncontrolled growth especially in developing countries, however governments still hold the responsibility to provide civilized and modern life which includes infrastructure, housing and healthcare system. Random settlements are the main problem associated with this issue. To solve these problems governments must have advanced spatial plan to deal with...
A touch screen mobile device become more popular in society because of its flexibility and discoverability. Unfortunately, due to its high visual demand it creates significant barriers for visually impaired users. But some touch screen devices available in the market with various accessible techniques like using screen reader, haptics and different input mechanisms. But they did not give any remarkable...
In recent years, pedestrian detection for Automobile Driver Assistance System (ADAS) is a primordial task in the smart vehicle. Histogram of oriented gradients (HoG) is one of the most effective pedestrian feature extraction approaches to the study. In this paper, an optimization of pedestrian detection based on HOG method is presented and investigated to achieve an accurate human detection system...
We present cache consistency (adaptive concurrency-control and adaptive replica management) protocols for page-server database system in which the database is indexed by B±tree. These protocols avoid the data contention that may occur when concurrency control and replica management are performed at the page level. Page-level X locks are needed only for splitting or merging database (index or data))...
Social media online forum is one of the most popular platforms used by students to communicate. Unfortunately, these media have been hijacked by people to plan and commit online fraud and societal evils. Some of the secondary and university campuses in Nigeria have been turned to cultist environments leading to killings and anarchy amongst students. This situation has defied solutions in most tertiary...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.