The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper studies the SPLAY open-source framework that facilitates the design, deployment and testing of large-scale distributed applications. A mechanism for automatic control of a virtualized testbed created in OpenStack running Ubuntu 14.04.3 was implemented. The SPLAY entities involved herein were the following: a controller and a modified version of the daemons without using the sandboxing concept...
This papers presents the use of color imaging as a starting point of burn wound evaluation, by the discrimination between healthy skin and burn wound. The skin/burn area identification is performed pixel-wise, according to the properties of an entire encompassing patch. The classification is learned under a supervised scenario, according to a ground truth defined by specialist surgeons from a large...
Dictionary learning (DL) for sparse representation is a difficult optimization problem for which several successful algorithms exist, although none can be claimed the best. A common problem is a possible stall in the evolution of the algorithm, due to nearly linearly dependent atoms. The proposed cure was to regularize the error criterion using either the norm of the representations or an atom coherence...
This paper presents an implementation of a binary pulse-position modulator (2-PPM) for impulse-radio ultra-wideband (IR-UWB) systems, capable of producing an appropriate signal to drive the final output stage of an ultra narrow pulse generator. Compared to the usual circuits based on voltage-controlled delay lines, this novel scheme uses digital signal processing of the clock and data signals with...
A new chaotic, permutation-substitution architecture based, image encryption algorithm is introduced in this paper. In order to reduce redundancies of Fridrich's structure based image encryption scheme, a novel inter-intra bit-level permutation based confusion strategy is appealed. By means of the proposed confusion stage, statistical properties of the image produced at its output are enhanced (that...
Several authors have proposed the use of CAs and ELCAs for CDMA key generation, yet a detailed analysis of the cycles produced and of their usability in CDMA has not been performed. We report on the cross-correlation of same-length cycles generated by uniform and heterogeneous ELCAs and suggest ways of combining cycles for higher levels of independence of the keys.
Secure Hash Algorithm (SHA) is the most popular standard of Cryptographic Hash functions. Several security protocols use SHA to provide message integrity, authentication and digital signature. Nowadays, a new technology based on Chaotic Neural Networks is used to design Hash functions due to the following important properties of Chaos and Neural Networks: non-linearity, compression, confusion and...
Embedded system design is subject to many constraints with strong influence on design objectives and architectures. Designers of embedded systems need to consider the desired functionality together with cost constraints, and also with other quality metrics. The paper presents a simplified model for early estimation of system quality based on metrics such as hardware costs and operation speed. The...
The content of Earth Observation archives continues to explosively grow generating the need to extract valuable knowledge from these repositories. A traditional approach for remote sensing image retrieval is to compute the similarity between the user's query and the archive using a query by example system. Additionally, effective data mining involves the user into data exploration, making use of his...
Wireless Sensor Networks (WSN) development has always been driven by the complexity and diversity of modern military applications. From simple intrusion detection to complex border surveillance and monitoring integrated systems, target location and tracking, WSNs have been included in all types of military scenarios. Military live simulation systems are part of complex integrated tactical training...
This paper evaluates the bit-error rate and spectral efficiency performance provided by the convolutional coded Quadrature Amplitude Modulation (QAM) configurations whose global rates are modified mainly by changing the numbers of code and non-coded bits mapped on a QAM symbol. The Bit Error Rate (BER) performance provided are compared to the ones of the convolutional coded modulations which map only...
The paper belongs to a larger study dedicated to the statistical modeling of the printed Romanian language. The experimental analysis focused on a corpus of literary works -novels and short stories (49 books) - comprising approx. 6.3 million words, in printed form with orthographical characters and punctuation marks (that is 47 alphabet symbols). All the investigation here refers to natural language...
This paper presents a comparison between dielectric resonator antennas with different dielectric constant parameter of the resonator. The antenna is fed with microstrip line. The dielectric resonators have cylindrical geometry. In HFSS software program, the simulations are up to compare the antennas' behavior as a function of different parameters, such as: center frequency, gain, frequency bandwidth...
Model checking has proved to be a very useful formal verification technique in the design of communication and security protocols. Researches have used it to validate the communications protocols from the point of view of their functional and security specifications. Over the years, model checking has evolved from explicit encoding of the state space to symbolic encoding, thus overcoming the state...
Developments in the Wireless Sensor Networks (WSN) domain have allowed the extension of these distributed measurement systems from terrestrial to aerospace applications. In developing a reliable WSN, a series of drawbacks like energy consumption; bandwidth or reliability in package delivery require increased attention. One of the available solutions of improving these parameters is using MIMO (Multiple-Input...
Radio resources have had higher demand in the last years. The frequency band licenses for most of the radio spectrum are sold for long periods of time and give exclusive rights to the owner. By using such an approach the spectrum seems overcrowded, but the reality shows that many frequency areas are actually used in a very small degree. We have demonstrated in [4] that cognitive radio (CR) technology...
Experimental checking of the specific absorption rate (SAR) level modifications when using conductive textiles attached to mobile phone handsets was applied by using the COMOSAR system in both 2G and 3G communication standards. Based on measured data, SAR reduction effectiveness was calculated. Results indicated either shielded or amplified absorbed radiation in the head, depending on the communication...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.