The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper deals with the recovery of an image from noisy observations when multiple noisy copies of the image are available. Two configurations based on wavelet shrinkage algorithm and averaging technique are proposed. The performance of these methods is an improvement upon other methods proposed in the literature and are algorithmically simple for large computational saving. The proposed structures...
The purpose of this article is to clarify and present all the rules that we have elaborated in our base of rules for phoneme-allophone conversion for the Arabic language. The generation of the different acoustic realizations (allophones) is particularly important to improve the quality of the speech synthesizers dedicated to the Arabic language. This improvement is achieved by integrating the allophone...
In this paper, we introduce our method for metamorphic malware detection (i.e. malware variants), which is based on the analysis of the PE (Portable Executable) Header information (PEH). We propose an efficient hybrid Filter-Wrapper feature reduction and selection method that uses a combination of Chi-Square test (KHI2) and the Greedy Hill Climbing search algorithm (GHC). The KHI2 is first applied...
The single biometric system may be inadequate in many applications such as public security, access control and banking because of noise in data samples or because of unavailability of a sample at a given time. In order to overcome the limitation of the single biometric, a Multi-representation biometric is used. In this paper we present a multimodal personal identification system using the Histogram...
The data collection is an important phase in the internet of things (IoT). The efficient way to collect data from the IoT environment is one of the challenges for the future of IoT. In this paper, we first design a data collection system for IoT. This system is based Bluetooth Low Energy (BLE) technology to forward the collected data from the data collector to the data gateways and proposes the use...
In distributed systems, materialized views are used to improve data availability and reduce data transfers. A materialized view is a query whose results are pre-computed from multiple data sources and stored in the database. Defining views over heterogeneous data sources requires the design of a common query language or the conversion of the data sources in the same format. This paper addresses this...
Orthogonal Frequency Division Multiplexing (OFDM) is of great interest for researchers and research laboratories all over the world. OFDM is widely used in contemporary communication systems for its good robustness in multipath environment, and its high spectral efficiency. The capacity of wireless system can be increased dramatically by employing Multiple Input Multiple Output, (MIMO) antennas. The...
Recently, a wide variety of applications require reliable personal recognition systems to either confirm or determine the identity of an individual requesting their services. So, a reliable identity recognition system is a critical part in these applications that render their services only to genuine users. Thus, biometrics is an emerging technology that utilizes distinct behavioral or physiological...
The vehicular networks represent an innovative and a promising research area. They contribute in the realization of ITS (intelligent transportation systems) to improve road safety and to provide various services and applications for both drivers and passengers. Several applications require knowledge of vehicle's positions such as target tracking. In a previous work, an approach for tracking exploiting...
In wireless ad-hoc networks, nodes require IP addresses to communicate. The configuration of IP addresses in wireless adhoc networks is accomplished by using distributed algorithms rather than a centralized mechanism such as DHCP. Due to the unpredictable nature of wireless adhoc networks, independently configured networks may come into contact and duplicate IP address may occur. So many approaches...
The formal stepwise refinement method is a powerful manner to design complex systems. It postulates system engineering gradually by starting from initial abstract specification and follows a rigorous refinement process to establish final specification. Fuzzy Labeled Transition Refinement Tree (FLTRT) is introduced to fulfill such purpose. It supports abstraction and handling incomplete information...
Support Vector Machines (SVM) and Maximum Likelihood (MLLH) are the most popular remote sensing image classification approaches. In the past, SVM and MLLH have been tested and evaluated only as pixel-based image classifiers. Moving from pixel-based analysis to object-based analysis, a fuzzy classification concept is used through eCognition software [1]. In this paper, SVM and MLLH are separately adopted...
In this paper, we define a time-extended multirobot task allocation problem, design and analyze some heuristics to tackle the problem complexity in computational resource constrained settings. The robots (or agents) can perform a limited amount of work per unit of time, while the tasks have durations and deadlines by which they must be completed. These constraints, in addition to a relatively small...
This paper presents a digital audio watermarking scheme that can embed imperceptible and robust watermark image into the audio signal. The watermarking process is performed in discrete wavelet domain by applying the QR factorization on 2-D blocks of low frequency part. The watermark bits are inserted in each block by quantizing the coefficients of resulting R matrices. A particle swarm optimization...
Usability for software systems has emerged as an integral part of the continuous commercial success of IT companies. This is partly due to the vital need to satisfy customers' goals for systems becoming pervasive and ubiquitous within our daily life. In this research study, we have explored the use of task models to define how the user should interact with a given system. Based on empirical data collected...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.