The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Dengue fever is viral infection caused by dengue virus which is transmitted in human body by bite of female Eddie mosquito. There are 50 million people suffer from it globally every year. Pakistan has been victim of this rapidly growing disease from last few years. The world health organization identified two main types of dengue fever. This paper appraises the selected classification algorithms for...
This paper provides signal processing requirements of algorithms involved in sensor array systems so that an appropriate processing architecture can be designed and developed. The system design parameters taken into consideration include number of sensors and sensor spacing, sensor array frequency and sampling rate along with computational complexity of processing algorithms such as beam forming and...
Existing online social networks open the doors of socialization for their users by providing a few and easy steps towards user account creation. The major drawback of this feature is that current social network providers lack mechanisms of determining the authenticity of an account. A genuine user's account can be easily forged with fake profile information. There is simply no mechanism to assign...
In Pakistan, millions of people have access to internet and now it has become essential part of their lives. It is now a driving force for innovation of all industries. After arrival of wireless service providers, internet users are growing rapidly. On the other hand, internet is still just a source of information sharing and social interaction. Its role in trade and business is limited. Some business...
Due to widespread availability of WiFi networks in buildings, indoor location based systems become a reality. To provide indoor location based services (LBS), finding the current location of a human, a computer, a mobile device or equipment such as a small UAV (like Quad copter) is of great interest. The most prominent method for this purpose is the received signal strength (RSS)-based location from...
Open medium access is an inherent feature of wireless networks that makes them vulnerable to security threats and unauthorized access by foreign entities and malicious users. In cognitive radio networks, effect of these malicious users on network performance becomes more threatening, where they impersonate primary users by emitting similar signals, causing secondary users to vacate the occupied channel...
Delay is one of the most important parameters of interest while providing QOS guarantees for Wireless Sensor Networks (WSN). Various MAC layer protocols for WSN have been proposed for efficient management of delay. Analyzing single hop and end to end delay using queuing analysis can provide significant help in modeling various real time WSN applications. This paper parameterizes the cross-layer analysis...
This paper is based on an industrial survey conducted on software engineer motivation as previous research shows that motivation is amongst the most frequently highlighted causes of software projects failure. Motivation greatly impacts practitioner's productivity. Yet motivation is mostly ignored in software engineering literature and practice. Researchers have conducted studies on motivation in software...
This paper presents a simple yet efficient image retrieval technique that defines image feature descriptors using localized multi-text on histogram. The proposed technique extracts a unique feature vector for each image in the image database based on its shape, texture and color. First, the image is divided into smaller equal size blocks and then for each block texture orientation is computed independently...
The conventional Genetic algorithms (GAs) use a single mutation operator for whole population, It means that all solutions in population apply same leaning strategy. This property may cause lack of intelligence for specific individual, which is difficult to deal with complex situation. Different mutation operators have been suggested in GAs, but it is difficult to select which mutation operator should...
With latest advancements in architecture, reprogram ability and availability of abundant on-chip resources, FPGAs (Field Programmable Gate Array) are used as hardware accelerators to speedup computationally intensive tasks with inherent parallelism. However non-availability of standard MATLAB and C/C++ computation routines and communication interface for general purpose programming restricted researchers...
Vehicular Ad Hoc Networks (VANETs) is a challenging field of wireless technology that offers a wide variety of useful applications. These applications span from safety related applications to infotainment services. IEEE 802.11p standard that operates in 5.9 GHz frequency band is widely adopted in VANETs for physical and MAC layers. The radio signals in 5.9 GHz band are less penetrating as compared...
This paper deals with the strategy for fault detection (FD) of discrete-time periodic systems by implementing parity space approach. In this note, periodic discrete time systems are first converted to linear time invariant (LTI) formulation using a procedure called lifting technique which gives the analytic expression for reformulation of periodic systems into linear time invariant representation...
Data-aware scheduling in today's large-scale computing systems has become a major complex research issue. This problem becomes even more challenging when data is stored and accessed from many highly distributed servers and energy-efficiency is treated as a main scheduling objective. In this paper we approach the independent batch scheduling in grid environment as a bi-objective minimization problem...
Increasing use of Component Based Software Engineering (CBSE) has raised the issues related with the security of software components. Several methodologies are being used to evaluate security of software components and that of the base system with which it is integrated. Security characteristics of a component must be specified effectively and unambiguously. To make possible software development progression,...
An ultra-wideband antenna has been proposed in this paper, which rejects WLAN bands to suppress the interference. Dual notch is achieved at the upper and lower WLAN bands by removing U and inverted-L slot. By varying the parameters of slots desired rejected band and notch position is achieved. The proposed antenna size is 30x30 mm2 is fed by 50 ohm micro strip transmission line. Partial ground plane...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.