The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In our previous work, k-value pseudo random sequence generated by power residue symbol has been researched. The sequence is generated by applying a primitive polynomial over odd characteristics field, trace function, and power residue symbol. The sequence has some important features such as period, periodic autocorrelation, and linear complexity. In this paper, by applying an additional process to...
In order to narrow the learning divide, mobile learning should be provided to handicapped learners, especially to learners with visual impairment. However, in spite of development of the resolution and screen size of mobile devices, there are still many inconvenient factors. Among recent studies, there is a Proposal of Ahmed Rana and Four Startup Screen operates in mobile devices with touch screen...
Bayesian networks (BNs) is widely used for system reliability modeling because of its versatility. It is crucial to build BNs from reliability data without experts' intervene. However, the BNs structure learning is still an open problem. Traditional approaches always integrate a structure scoring metric with a particular heuristically searching method. This usually overfits or underfits the data....
A Mobile Ad-hoc Network (MANET) has been studied in order to realize a ubiquitous society. However, MANET has many issues. One of the issues is security. For example, MANET is vulnerable to network sniffing because it is using a wireless communication that can be heard by others and existing security approaches are difficult to be applied to it. For the purpose, we have already proposed a novel secure...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.