The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, fractional order Integrator for microwave frequencies is proposed. The fractional order Integrator is designed using microstrip and the operating frequency range of that Integrator is in the microwave range. The frequency response of the proposed fractional order microwave Integrator matches with that of an ideal Integrator. The bandwidth of the proposed circuit is 0.6 MHZ. A comparison...
We live in a world of Energy. We use it and, following the laws of Thermodynamics, give up a portion of that as inevitable toll for its conversion for our purposes. There are the non-conventional sources around us. Utilization of these energies will help to reduce harmful pollution caused by the oil and coal technologies and save money for the social developments. Beside the previously considered...
The design and optimization of low insertion loss finline filters is described in this paper. Finline filter with a large pass band has been designed using equivalent circuit approach. Mode matching method has been used for the analysis of discontinuities in the filter. The performance of the filter obtained through this method is further optimized to achieve improved pass band and stop-band performance...
Quantum algorithms have gained a lot of consideration especially for the need to find out the extreme values like minimum or maximum. This paper introduces novel quantum algorithms to figure out the minimum and the maximum numbers among a set of positive integer numbers by employing some of the quantum features such as superposition, entanglement, and probability. The proposed algorithms utilize qubits...
Operating microscopes are integral components of modern neurosurgery. Despite the fact that there has been a significant technological progression in optics, many neurosurgeons are not satisfied with the present day neurosurgical instruments. With many instruments having dexterity limitations, constrained degrees of freedom and deprived ergonomics, the need for creating enhanced and better instruments...
Wireless Sensors Networks (WSN) have become vital in many areas and critical applications. Some applications require a reliable network and less maintenance, especially the power consumption. ZigBee standard shows the ability to be used for many applications that require low data transmission and low power consumption. The standard helps the overall network to reduce worries about the sensors power...
This paper presents two different implementations for recognition of handwritten numerals using a high performance autoencoder and Principal Component Analysis (PCA) by making use of neural networks. Different from other approaches, the non-linear mapping capability of neural networks is used extensively here. The implementation involves the deployment of a neural network, and the use of an auto encoder...
This paper describes a novel approach used to integrate two leading satisfiability (SAT) solvers, Dimetheus and WalkSAT, into a system to provide users with solver selection and solution customization capabilities. The two solvers are efficient for two different cases, have different execution procedures and generate a single solution from a single line of command. This integration provides the most...
Dirty Copy on Write (COW) vulnerability, discovered by Phil Oester on October 2016, it is a serious vulnerability which could escalate unprivileged user to gain full control on devices (Computers, Mobile Smart Phones, Gaming devices that run Linux based operating systems). This means that any user who exploits this bug, would escalate his/her privileges; and can do anything either locally or remotely...
Security is the major aspect in any type of communication systems. The generation of secret keys randomly provides good security as well as better complexity in cryptographic based algorithms. In literature there exist symmetric key algorithms which use the same key for encryption as well as decryption. Among all the algorithms, Advanced Encryption Standard (AES) is used in many fields of security...
In this work, we evaluate performances of four super-resolution techniques for estimating complex spectra or points under various scenarios. Suitable for resolving non-coherent signals, the two adaptive techniques (Root-MUSIC and ESPRIT) use multiple snapshots to acquire data covariance matrix, which can then be divided into signal subspace and noise subspace for estimating the desired complex parameters...
Quantum cryptography is considered a solution for sharing secret information in a secure mode. Establishing a quantum security platform into an exciting system requires a package of stable processes. One of these processes is based on creating a Quantum Key Distribution (QKD) protocol or sharing a secret key. This paper presents a QKD protocol that utilizes two quantum channels to prepare a shared...
Validated by Mote Carlo simulations, a 2D-Markov chain model is proposed for analyzing the throughput of a simplified LTE system. User scheduling strategy for maximizing the sum throughput in a heterogeneous network consisting of LTE and WiFi systems is obtained using the proposed LTE's 2D-Markov chain model and a previously developed WiFi's 2D-Markov chain model.
This paper presents an extension of the ITU-R P.1411-8 urban low antenna path loss models to higher antennas. The Line-of-Sight (LOS) and non-Line-of-Sight (NLOS) urban canyon models presented in the paper are typically used for street level peer-to peer or cellular communications, but can be more generally used to account for radio waves propagating through urban street canyons. It is shown through...
Most of the machine learning algorithms requires the input to be denoted as a fixed-length feature vector. In text classifications (bag-of-words) is a popular fixed-length features. Despite their simplicity, they are limited in many tasks; they ignore semantics of words and loss ordering of words. In this paper, we propose a simple and efficient neural language model for sentence-level classification...
Quantum Digital Signature (QDS) schemes provides authenticity of information that is guaranteed by quantum mechanics. This paper compares the blind signature schemes with two and three-bit quantum state bits and provides a implementation for the four quantum states. We proposed a technique where four partial entangled states are used to implement the blind signature scheme. The proposed technique...
Nowadays, video steganography has become important in many security applications. The performance of any steganographic method ultimately relies on the imperceptibility, hiding capacity, and robustness. In the past decade, many video steganography methods have been proposed; however, the literature lacks of sufficient survey articles that discuss all techniques. This paper presents a comprehensive...
Data analysis plays an indispensable role in the knowledge discovery process of extracting of interesting patterns or knowledge for understanding various phenomena or wide applications. Visual Data Mining is further presenting implicit but useful knowledge from large data sets using visualization techniques, to create visual images which aid in the understanding of complex, often massive representations...
In cryptography, a hash function is a very important cryptographic primitive with a wide range of applications. There are three required properties for a good hash function, i.e., collision, pre-image, and second pre-image resistance. In this paper, we try to contest these properties on a popular and widely used hash function called MD5 - and its two simplified versions that we made. The birthday...
This paper describes a project to enhance a commonly used educational robot, the Parallax Scribbler 2 (S2), by adding more sensor capabilities and making it truly autonomous. The S2 is a popular platform in high school and college robotics courses yet it lacks significant capacity that is compensated by often pairing it with Fluke 2, an interface/controller card developed by a third party group. However,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.