The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Feed forward Multilayer Perceptron (MLP) Neural Networks are universal approximators. Weight adjustment of the connectionist model is crucial to architectures that model systems behavior. This paper developed a neural network for hydrological purposes. Two architectures were developed, investigated, and tested for forecasting rainfall in the rain-fed Sectors in Sudan. A monthly architecture and a...
Nanoparticles have been used for over a decade in photothermal therapy for cancer treatment. Cancer has been killing thousands of people around the world for years, therefore researches on different methods of fighting it are done in many fields and nanotechnology is one of them. Photothermal therapy (PTT) is the process of using light-absorbing nanoparticles in the range of near-infrared (NIR), to...
This paper discusses a new plagiarism detection method for text documents called Tree-based Conceptual Matching. The proposed method not only represents the content of a text document as a tree, but it also captured the underlying semantic meaning in terms of the relationships among its concepts. The method was adopted to detect plagiarism in text documents. The tree-based played a very important...
This paper describes the use of fuzzy logic to improve the performance of the proxy cache. A multi-agent system has been developed to control the cache cleanup process on both parent and child sides. Fuzzy logic is used to combine LFU and LRU caching replacement policies on the child cache. Size, LFU, and LRU policies are used on the parent cache side. Agents use fuzzy logic to make an intelligent...
Segmentation is the process of dividing the binary image into useful regions according to certain conditions. It is the most important phase in any optical character recognition (OCR) system and its accuracy affects significantly the recognition rate of that system. In cursive nature languages such as Arabic, the segmentation procedure is complicated especially in handwritten documents because writers'...
The current Internet model has proved more sustainable then the provisioned capacity at the time when the architecture was designed. The voluminous growth of traffic over the Internet has brought challenges for the exiting networking architecture. The information centric paradigm appears to offer efficient solution towards content dissemination model. It is a content-focused networking paradigm rather...
Satellite communication technology can well address for global communication system concern along imperative features. Network coding techniques are implicit for future wireless communication network demands in terms of throughput, security and robustness. Physical layer network coding (PNC) and Analog network Coding (ANC), are considered as two of the most studied variants of the network coding....
Specific information on newly discovered compound is often difficult to be found in chemical databases. The chemical and drug literature is very rich with the information resulted from new chemical synthesis. This paper presents a survey on the types of approaches that have been used to extract information associated with chemical compounds from chemical and drug text. Thereafter, it gives a description...
The objectives of this paper are to study, analyze and evaluate the performance of Direct Sequence — Wide Code Division Multiple Access (DS-WCDMA) systems in Mobile Multipath fading propagation channel. The Parameters which are considered for the evaluation performance are Additive white Gaussian noise (AWGN), Multipath propagation fading channel and the Code sequence length. The evaluation of DS-WCDMA...
This paper presents a segmentation approach for online Arabic handwriting. The approach achieves the segmentation based on the boundaries detection of the handwritten characters which included in the handwriting. The approach relies on an algorithm of characters' boundaries detection. The algorithm application is preceded by a feature extraction stage which in turn preceded by a preprocessing stage...
This paper proposes a mechanism for suppression of charge sharing in single photon processing pixel array by introducing additional circuit. The idea of the proposed mechanism is that in each pixel only analog part will introduced, the digital part is shared between each four pixels, this leads to reduce the number of transistors (area). By having communication pixels, a decision that which one of...
In this paper we use open ended stubs on transmission line to design compact BLC by using planner microstrip technique. We will derive in detail the closed formulas for the BLC design. The effect of changing the number of open ended stubs on the coupler performance is investigated. It has been shown that the number of open ended stubs used for optimum design depends mainly on the center frequency...
After the era of mainframe computing (from the nineteen fifties to the nineteen seventies), and the era of personal computing (from the nineteen eighties to the first decade of this millennium), we are now witnessing the emergence of the era of cloud computing (starting from the second decade of this millennium). In the era of cloud computing, end users of computing resources subscribe to service...
Motion Estimation is a key problem in video processing and computer vision. It is the process of determining motion vectors that describe the transformation from one 2-Dimension or 3-Dimension image to another. Many algorithms for motion estimation have been proposed, but some are computationally expensive and some have quality limitations. Block-Matching is a widely-used method for stereo vision,...
The aim of this paper is to present a new static dictionary-based algorithm for text transformation to increase the data compression ratio when using standard compression tools. The basic idea of the new algorithm is to define a pattern for each word in a static dictionary by replacing all or most of the characters in the words of the dictionary by the most frequently used character in any text file...
The aim of this paper is to investigate using the TOPSIS fuzzy model in the academic advising area as an educational management system to advice on probation students to register appropriate number of credit hours to minimize the risk. The most important criteria that could affect the academic advising process are discussed. Accordingly a separate rating table of each alternative and separate weight...
Cognitive Radios' is recognized as a novel approach to improve the utilization of a precious wireless communication natural resource; the radio frequency spectrum. Historically, telecom regulators assigned fixed spectrum bands to the licensee wireless network operators, this spectrum management approach is guarantee interference free environment, except of some configurations faults or illegal usage...
Broadband Wireless Access (BWA) has become the best way to meet escalating business demand for rapid Internet connection and integrated "triple play" services. In addition, not only for topographic but also for technological limitations, alternative wireless solutions have been found. These systems are designed based on Cognitive Radio (CR) approaches, which can adjust its operation according...
Filtering of radar signals frequently takes place to realize a certain task, such as interference reduction or Doppler processing to remove clutter. However, in this paper a digital filter is proposed to be designed as a multifunction processor, achieving several sorts of signal processing within the same module. Processing is easily done in the baseband rather than in passband, for a moderately slow...
Mobile ad-hoc network (MANET) is a collection of mobile nodes that form dynamic and temporary networks. The wireless links in this network are highly error prone and can go down frequently due to mobility of nodes, interference, and less infrastructure. One of the challenges in the study of MANET routing protocols is the dynamically changing topology. Hence, they establish an efficient communication...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.