The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We present a new scalable and decentralized design for a server cluster that provides a single service with a certain QoS objective: maximum response time guarantee. Our design is based upon providing autonomy for each node in the cluster by having the node maintain only partial information about the system and having a mechanism for each node to process jobs or redirect it to a neighbor node. Also,...
In this paper, the new hybrid algorithm is used as real time fire recognition algorithm in visual image sequences. For the purposes of real time fire pattern recognition tasks neural networks (NNs) are typically trained with respect of error function minimization by propagating a linear sum of errors. Recent studies in the fire vision recognition have confronted the problem of the inconstant and different...
The paper presents the design of a model for forecasting long-term electricity load. The model uses data mining techniques. The paper defines the load forecast and the summary of the most important factors affecting the load forecast in Egyptian electricity network. The steps needed for the knowledge discovery process is implemented to the time series data. Preprocessing the data in order to detect...
Rapidly growing amount of data available on World Wide Web (WWW). Data as the ultimate collection of public accessible text documents complicates the task of acquiring usable and relevant information from raw data. Several of improvement methods and optimization in information retrieval (IR) systems (IRs) providing user interaction with WWW documents have been introduced and discussed. In this paper,...
Pattern matching is a fundamental feature in many applications such as functional programming, logic programming, theorem proving, term rewriting and rule-based expert systems. Usually, patterns size is not constrained and ambiguous patterns are allowed. This generality leads to a clear and concise programming style. However, it yields challenging problems in compiling of such programming languages...
In this paper we perform image compression and face recognition using principal component analysis (PCA) and the generalized Hebbian algorithm (GHA) which is one of the PCA techniques involving neural network. By implementing the PCA and GHA algorithms for image compression we found that PCA gives better compression ratio to the image than GHA and as for face recognition we found that GHA gives more...
With an increasing emphasis on security, automated personal identification based on biometrics has been receiving extensive attention over the 1990s. Iris recognition, as an emerging biometric recognition approach is becoming a very active topic in both research and practical applications. Iris recognition is the process of recognizing a person by analyzing the apparent pattern of his or her iris...
Simultaneous data transmission in both directions (full-duplex) over two-wired circuits can be achieved using two-wire to four-wire hybrid couplers. Transmission signal leakage through the near-end hybrid (near-end echo) and transmission signal reflection by the far-end hybrid (far-end echo) ending up in its own receiver due to imperfect hybrid isolation can greatly affect the correct detection of...
This paper introduces a new approach targeting the RWA problem for static traffic and under the general assumptions of multiple requests between the same SD pairs and multifiber links. The case of infeasibility of the problem is also discussed and integrated into our frame work. We first present a categorization of the RWA problems according to the different assumptions involved. In addition, a classification...
Multi-protocol label switching (MPLS) is a promising cutting-edge technology for advanced forwarding of IP packets. Better performance of multicast routing in large-scale networks is expected when it is implemented over MPLS. In this paper, we simulate core-based tree (CBT) multicast routing protocol over MPLS-based networks using NS2, and compare its performance with protocol-independent multicast-sparse...
Ultrasound is a widely used medical imaging technique. Tissue characterization with ultrasound has become important topic since computer facilities have been available for the analysis of ultrasound signals. Automatic liver tissue characterizations from ultrasonic scans have been long the concern of many researchers. Different techniques has been used ranging from processing the RF signals received...
This paper proposes an enhancement to a novel end-to-end QoS framework that has been recently introduced in the literature and referred to as the on demand QoS path (ODP). The ODP provides the end-to-end QoS guaranty of the integrated service (IntServ) while keeping the scalability nature of the differentiated service (DiffServ). The proposed enhancement, named E-ODP, efficiently reconfigures network...
One of the major problems faced by all pattern language builders, is how to manage their languages. In this e-search work, an HCI pattern language management tool (HCI PLMT) was developed based on the ontological-approach we proposed in the work of Badr (2005). The HCI PLMT is an automated tool that manages the searching and browsing of patterns existing within the HCI pattern language that we also...
The following topics are dealt with: computer engineering and systems; computer architecture; computer aided design; control systems; embedded systems; hardware-software codesign; computer networks and security; signal processing; multimedia; Web applications; mobile and ubiquitous computing; artificial intelligence; evolutionary computing; database and data mining
The basic cache consistency strategy is the use of periodic invalidation reports (IRs) broadcast by the server. Recently, the addition of updated invalidation reports (UIR) has been proposed. The IR+UIR scheme achieves a much shorter query delay than the basic IR scheme. Previous researches were based on two impractical simplifying assumptions: 1) broadcast traffic is error-free and 2) no other downlink...
GAIAOS event manager is a distributed event service, based on CORBA event service with a centralized entry point, resulting in limited fault resilience and scalability. In this paper, we have proposed a decentralized event service for GAIAOS through the use of DHT based structured overlay network to overcome these problems. The proposed architecture provides a completely distributed event communication...
A new chip design paradigm, so called network on chip, has been introduced based on the demand of integration of many heterogeneous semiconductor intellectual property (IP) blocks. In this paper, the H.264 decoder designed with three differently heterogenous tree-based network topologies are proposed. The topologies are designed so as to maximize the network throughput in accordance with the required...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.