The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents a proposed adaptive technique for nonholonomic wheeled mobile robot (NWMR) using the sliding-mode control (SMC) method. The proposed control system based on the backstepping kinematic controller and PI sliding mode dynamic control. With an adaptive fuzzy logic to adjust adaptation gain of SMC for trajectory tracking control of nonholonomic mobile robot. Parametric and nonparametric...
Spacecraft Attitude Determination and Control System (ADCS) is considered to be one of the most critical subsystem of the low earth orbit satellites due to the pointing accuracy required during its operation. Consequently a fast and reliable Fault Detection and Identification (FDI) technique is obtaining more significant weight meanwhile years of researches. This paper presents a procedure to ameliorate...
With the increasing impact of capital regulation on banks financial decisions especially in competing environment with credit constraints, it comes the urge to set an optimal mechanism of bank lending decisions that will maximize the bank profit in a timely manner. In this context, we propose a self-organizing method for dynamically organizing bank lending decision using Genetic Algorithm (GA). Our...
Cooperative spectrum sensing assumes an essential part in cognitive radio network due to having the capacity to enhance spectrum sensing performance and reduce probability of error in fading and shadowing channels. In fact, clustering scheme and cooperative spectrum sensing are combined to reduce Jostle of reporting channel, improve performance of sensing and reduce the computational cost. Many methods...
The development of seismic monitoring brings hope to the prediction of the rockburst and other seismic hazards, where the determination of the potential hypocenter is the key point. Here the equations are listed according to the measured data of sensors, and the seismic location is solved from the equations. The accuracy of location is closely related to the solve method. In this paper, a microseismic...
Online Social Networks (OSNs) are a great venue for scammers to impersonate the identities of users via creating fake profiles. Fake profiles are a popular tool for the intruders which can be used to carry out malicious activities such as impersonation attacks and harming persons' reputation and privacy in (OSN). Hence, recognizing the identities of fake profiles is one of the critical security problems...
Negotiation gets more attention in the field of business and becomes a more critical issue especially with the increasing use of services. In web services, negotiation is important for providers to meet consumers' expectation. For consumer and provider, security is an important concern. In this paper, an efficient genetic-based security negotiation approach for web service is proposed. A prototype...
Wireless sensor network applications are composed of a vast number of inexpensive battery-powered sensors. One of its primary applications is environmental monitoring for physical phenomena in rigid areas such as forests and volcanoes. In such applications, a large number of sensors are randomly scattered by aircraft over the area of monitoring. These applications mainly depend on clustering to arrange...
Electronic Learning, or more popularly known as eLearning, is generally defined to be the use of technology in the delivery of education or training. eLearning Systems (eLS) are now integral parts of educational organizations. eLS are diverse in nature and size. They are nowadays integral parts also of some commercial or governmental organizations as they are cost-effective means of delivering training...
A Feature Model (FM) is a powerful tool used to model requirements in any domain on a high abstract level. A FM is applied to model variable and common assets of Software Product Lines (SPLs). The industrial importance of a FM has been increasing rapidly in the last years. FM is built with a set of notations to maintain the relations between the modeled requirements. Day after day feature modeling...
This paper presents a technique for incorporating local data and membership information into the standard fuzzy C-means (FCM) algorithm. The objective function associated with the technique consists of a modified version of the standard FCM function plus a weighted regularized FCM-like one. In the first function, the Euclidian pixel-to-cluster distances are computed using the original data. However,...
This paper presents improvements upon a previous paper detailing an Android mobile phone application demonstrating methods for implementing or assisting traditional speech therapy techniques using mobile devices. [1] After development, the software was implemented on a Galaxy Tab, an Android tablet that, at approximately $100 per tablet, is quite affordable. The techniques are principally aimed at...
Multidimensionality is a distinctive aspect of real world social networks. Multidimensional social networks appeared as a result of that most social media sites such as Facebook, Twitter, and YouTube enable people to interact with each other through different social activities, reflecting different kinds of relationships between them. Recently, studying community structures hidden in multidimensional...
Since Long Term Evolution (LTE) is a totally IP based cellular network hence, it only supports the packet switching (PS) function, which leads to the proposal of many alternatives for offering voice services over LTE to maintain the continuity of the most important cellular service over the new architecture of the celluar networks, these alternatives include Voice over LTE (VoLTE) which is the most...
P2P SN is emerging as a promising technique for allowing to members to exchange messages or files to a members of group However, the growing number of users who use DSN for sending and receiving messages or sharing their files is increasingly challenging users' privacy and security. In this paper, we propose a flexible privacy-preserving file sharing scheme over DSN that ensures both semantic security...
Despite the great efforts to assure quality in higher education institutions, the ambiguity of its related concepts and requirements constitute a big challenge when trying to implement it as an automated information system. The present work introduces a framework for an automated information system that manages the quality assurance in higher educations institutions. The aim of designing such a system...
Protecting Online Social Networks (OSNs) against the new generation of the automated software tools (i.e. Social Bots) is an increasingly important lack from the security and privacy perspectives. Social bots is automated software scripts, which able to carry out dangerous activities in OSNs, such as auto-sharing and posting, auto-sending friend requests, auto-harvesting private information,etc. Indeed,...
For many decades, artificial neural network (ANN) proves successful results in thousands of problems in many disciplines. Back-propagation (BP) is one of the candidate algorithms to train ANN. Due to the way of BP to find the solution for the underlying problem, there is an important drawback of it, namely the stuck in local minima rather than the global one. Recent studies introduce meta-heuristic...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.