The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Malaria is a very serious infectious disease caused by a peripheral blood parasite of the genus Plasmodium. Conventional microscopy, which is currently “the gold standard” for malaria diagnosis has occasionally proved inefficient since it is time consuming and results are difficult to reproduce. As it poses a serious global health problem, automation of the evaluation process is of high importance...
Defects uncovered during software testing usually consume a considerable amount of the overall project's budget. Unfortunately, project managers are not well-equipped with techniques to estimate such cost overrun. Moreover, incorporating defects removal process as part of the software testing activities has made the project managers overlook this important cost component during their planning processes...
Web cache replacement plays important role in increasing the performance and speed of browsing web sites using internet. This paper highlights a new proposed Average Least Frequency Used Removal (ALFUR) and compares it with web cache replacement techniques like (LFU, LRU, SIZE, and PCCIA). Hit Ratio (HR) and Byte Hit Ratio (BHR) were used to measure the performance of these algorithms, and it was...
This paper introduce design, implementation and measurement of front end crystal video receiver (CVR) that operates in the frequency range of 8–10 GHZ to intercept short duration pulse radar signals. The proposed receiver is designed with two outputs, video signal for real-time signal processing and an amplified version of the received signal for frequency measuring and/or determine the presence of...
High penetration of distributed generation leads to the importance of adapting the new trend of Smart Grid to divide the grid into intelligent Micro-Grid zones and facilitate its operation using decentralized distributed control schema. In this paper a practical Microgrid model has been designed and simulated using MATLAB/SIMULINK (MATrix LABoratory). JADE (Java Agent DEvelopment Framework) platform...
This electronic document is about to calculate the performance of cloud computing for distributed data center using cloud-sim software programme, The simulation and performance analysis will be done by using the cloud analyst tool. It is easy to evaluate new strategies in utilization of clouds considering policies, scheduling algorithms, load balancing policies, etc. It can also be used to assess...
The excessive use of the communication networks, rising of Internet of Things leads to increases the vulnerability to the important and secret information. advance attacking techniques and number of attackers are increasing radically. Intrusion is one of the main threats to the internet. Hence security issues had been big problem, so that various techniques and approaches have been presented to address...
This paper proposed a hybrid energy system containing diesel generators, photovoltaic cells and wind turbines, along with storage devices, to supply a continuous load of an industrial facility. The main objective of the paper is to determine the optimal size of the hybrid scheme with the lowest Net Present Value (NPC), and the reliability indices for the proposed system. The overall optimized results...
During the last decade a huge amount of data have been shown and introduced in the Internet. Recommender systems are thus predicting the rating that a user would give to an item. Collaborative filtering (CF) techniques are the most popular and widely used by recommender systems technique, which utilize similar neighbors to generate recommendations. This paper provides the concepts, methods, applications...
Content-based image retrieval (CBIR) is a technique uses visual contents such as color, texture and shape to search images from large scale image databases according to users' interest. In a CBIR, visual image content is represented in form of image features, which are extracted automatically and there is no manual intervention, thus eliminating the dependency on humans in the feature extraction stage...
In the last few years a number of search engines have been introduced which support Arabic language. Explain the reasons of late appearance of search engines that related to Arabic language and pages has appeared because Arabic language is morphological language. While other languages such as English or French are language's affixation. This research aims to develop the Arabic search engine and to...
In this paper, the clutter estimation problem in the bistatic multiple-input and multiple-output (MIMO) radar system is considered, and a novel compressed sensing (CS)-based model is proposed to describe the clutter by exploiting the clutter sparsity in the angle domain. Then, the CS-based methods are adopted to reconstruct the sparse clutter, and to estimate the clutter scattering coefficients and...
Vehicular Ad hoc networks (VANETs) have recently attracted both industry and research communities as emerging technology that strongly support people safety and comfort. However, VANET is susceptible to various types of attacks due to the lack of permanent infrastructure, high mobility, and serving broad range of applications. In this paper a simple security system that can provide integrity and privacy...
A Bandwidth reservation is an essential component in providing of quality of service (QoS) in vehicular ad hoc networking (VANENTs). The recommended MAC protocol for VANET experiences a high percentage of packet loss. Somehow its performance can be improved by using Time Division Multiple Access (TDMA) techniques. In this paper, we propose a new algorithm for multi-constrained QoS routing and show...
Internet security is a branch of computer sciences often involving browser security, network security, applications and operating systems to keep the internet as a secure channel to exchange information by reducing the risk and attacks. There are a number of studies that have been conducted in this field resulting in the development of various security models to achieve internet security. However,...
Each day comes, the sector of autopilot and Unmanned vehicles get bigger exponentially; the autopilot design process plays an essential role in the unmanned aerial vehicle (UAV) development process. Autopilot can be designed and developed using different approaches depending on the control theory which is adopted in this paper Proportional-integral-derivative (PID) is adopted. Testing of autopilot...
Machine learning is a subdivision of Artificial Intelligence (AI) that is concerned with the design and development of intelligent algorithms that enables machines to learn from data without being programmed. Machine learning mainly focus on how to automatically recognize complex patterns among data and make intelligent decisions. In this paper, intelligent machine learning algorithms are used to...
Signal processing front end for extracting the feature set is an important stage in any speaker recognition system. There are many types of features that are derived differently and have good impact on the recognition rate. This paper uses one of the techniques to extract the feature set from a speech signal known as Mel Frequency Cepstrum Coefficients (MFCCs) to represent the signal parametrically...
Traffic accidents have recently become a significant terror for all members of the community, their contribution to the cause of death and huge economic losses have become very large, this is due to the violation of the traffic rules and exceeding the speed limit for the road by the drivers. The main objective of this study is to improve the traffic flow to overcome these problems. The methodology...
Wireless power transmission (WPT) is the transmission of electric power devoid of using cable or conductor from electricity source to an output terminal. This technology is beneficial in locations that are not easily served by wired electricity, dangerous or unfeasible for cable connection and since the transmission is in form of microwave, there is no power loss from the generating and distribution...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.