The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Tongue supported human-computer interaction (TSHCI) systems can help critically ill patients interact with both computers and people. These systems can be particularly useful for patients suffering injuries above C7 on their spinal vertebrae. Despite recent successes in their application, several limitations restrict performance of existing TSHCI systems and discourage their use in real life situations...
Over the last few decades, feature selection has been a hot research area in pattern recognition and machine learning, and many famous feature selection algorithms have been proposed. Among them, feature selection using positive approximation(FSPA) is an accelerator for traditional rough set based feature selection algorithms, which can significantly reduce the running time. However, FSPA still cannot...
In this paper, a real-time voltage control platform, based-on genetic algorithm (GA) program, is built to optimize a 32-element high gain beam-forming antenna. After 500 generations, S21 has been significantly improved. The gain of the antenna has promoted to 8.95dBi, and the beam-width of the antenna has narrowed down to 30°.
Visualization is critical in power systems engineering since the gigantic amount of data generated by power systems is difficult, and at times impossible, to be analyzed numerically. Therefore, the need for powerful visualization software has been increasingly acute due to the growth in size of power system models. To improve PPV's performance in order to accompany larger systems, this paper focuses...
MouthPad is a tongue-computer interface, which enables the control of a computer pointer through tongue movements, in a joystick like manner. The movement of the tongue is monitored via an electrode array, placed on the palate; the contact impedance between the anterior tongue and the electrodes provides the position of the tongue relative to the electrode array. The performance of the device was...
Computation of maximal exact matches (MEMs) is an important problem in comparing genomic sequences. Optimal sequential algorithms for computing MEMs have been already introduced and integrated in a number of software tools. To cope with large data and exploit new computing paradigms like cloud computing, it is important to develop efficient and ready-to-use solutions running on distributed parallel...
An algorithm to find the maximal clique on an interval graphs was parallelized on Graphical Processing Units. The algorithm was implemented using CUDA and the Thrust library. Performance results are reported.
This paper discusses the design and implementation of a portable oscilloscope using a Programmable System on Chip (PSoC). The main aim of this paper is to highlight the use and need of a low cost system for student applications. The system was implemented using a PSoC 4 device and a Nokia 5110 LCD screen. Performance metrics were measured and compared to show tradeoffs between cost and performance.
Computer game, a new field of artificial intelligence, as the name suggests, is to make the computer learn to think and play chess games like human beings. As one of the important research field of the artificial intelligence, computer game, which is considered as the touchstone of the artificial intelligence, has brought many important methods and theories to the field. Connect6, is a newly introduced...
Live migration of virtual machines is the ability to move running virtual machines between two computers with minimal downtime. Although various migration mechanisms such as pre-copy, post-copy, and state compression have been proposed, they may suffer long migration times when the migrating virtual machines run large computation and memory intensive workloads. This paper presents the design and implementation...
Throughout the development of computing tools usage and computer science, from the calculating machines up and into the present day computers, the major technical problem to be solved was the reduction of the amount of components and their bulk. This led inevitably to the use of serial processing. Only quite recently we started mass producing and using multi-processing. Though the nature itself is...
Surakarta chess is one of Computer Olympiad chesses. Its Chessboard is irregular. The logical structure of Surakarta chess is studied. A new storage structure of realizing the computer game program of Surakarta chess is presented. Representation of chessboard and chessman are presented by using the new storage structure. It is quite easy to judge the position relation of chess pieces with the storage...
A systolic array provides an alternative computing paradigm to the von Neuman architecture. Though its hardware implementation has failed as a paradigm to design integrated circuits in the past, we are now discovering that the systolic array as a software virtualization layer can lead to an extremely scalable execution paradigm. To demonstrate this scalability, in this paper, we design and implement...
A Bloom filter is a compact and randomized data structure popularly used for networking applications. A standard Bloom filter only answers yes/no questions about membership, but recent studies have improved it so that the value of a queried item can be returned, supporting multiple-set membership testing. In this paper, we design a new data structure for multiple-set membership testing, Bloom tree,...
Software Development Life Cycle (SDLC) starts with eliciting requirement of user as a document called Software Requirement Specification (SRS). SRS document is mostly written in the form of any natural language (NL) that is convenient for the client. In order to develop a right software based on user's requirements, the objects, methods and attributes needs to be identified from SRS document. In this...
Solar photovoltaic (PV) system are attaining world wide popularity due to their clean generation mechanism and energy security. The dc voltage obtained from PV system is usually lower than the peak value of the required output voltage of inverter and varies in a wide range. A power transformer is required to step-up the output voltage or a dc-dc converter is required to boost the input dc voltage,...
The future of computational electromagnetics is CHANGING DRASTICALLY with the new generation of computer chips which are multi-core instead of single core. Previously, advancements in chip technology meant an increase in clock speed, which was typically a benefit that computational code users could enjoy. This is no longer the case. In the new roadmaps for chip manufacturers, speed has been sacrificed...
This paper presents the design of a compact uniform circular antenna array system used in conjunction with the RT-1944/U radio and reports the obtained experimental results. The proposed system was primarily designed to increase the communications range between Littoral Combat Ship (LCS) sea frames and Mission Package Unmanned Surface Vehicles (USVs) by developing a modular aerostat communications...
In today's digital world internet became a popular source of online purchasing and plastic money facilitates the transaction of money. Online shopping has made the human life more easier and now user can feel the real shopping experience in virtual world of internet. As the popularity of e-commerce increases so the threats. Service providers and merchants who process credit card and debit card became...
The paper proposes a RGB channel based steganographic technique for images imparting better information security. This technique inserts the information into deeper layers of the selected RGB channel and the position is determined depending on the status of channel and value of the secret key. Pixels of the cover image are selected depending on the environment of the channels and hidden information...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.