The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper we study the effect of the channel estimation error on the performance of successive group decoding (SGD) schemes. The contribution of this paper is to evaluate the performance of such systems in the interference MIMO channel environment. Precisely, we aim to assess the sensitivity of such decoding techniques to the imperfect estimation of the channel state information (CSI). The system...
Complexity of embedded systems becomes more and more popular which integrates a hardware and software parts on common platform. This complexity can be inferred on the performance of such systems. This paper, explains the characteristics of LEON3 Soft Core processor and its implementation for several configurations, including single, dual, tri, and quad cores, as well as with and without the hardware...
In multi-robot exploration operation, each robot has to continuously decide which place to move next, after exploring their current location. In this paper we use the extended version of Particle Swarm Optimization (PSO) to robotic application, which is referred to as Robotic Particle Swarm Optimization (RPSO), a technique to compute robots' new location. To better adapt this technique to the collective...
In this paper, two-dimension band pass filters are proposed to design CWDM de-multiplexer which permit to separate two telecom wavelengths (1.31 μm and 1.55 μm). The square lattice with TE mode are adapted to designed the proposed de-multiplexer with help Photonic Band Gap (PBG). The structure has been designed using silicon rods, refractive index 3.45, which are embedded in air. The Plane Wave Expansion...
Plagiarism generally defined as using other people's ideas or work and representing it as one's own original work. Free-text plagiarism detection is an application based on analyzing the texts contained in researches, thesis, scientific reports and also literary products, these analyzed data will be used to compare a group of documents to find out how much these documents are similar. This paper proposes...
Face recognition system is considered as a smart technique for authentication. It guarantees security, stability and variability. It was used in a wide variety of applications like control of access, surveillance, passport and credit cards. Many algorithms were proposed in order to improve the recognition rate. One of these techniques is the fractional Eigenfaces, which combines the Eigenfaces algorithm...
A Genetic algorithm is a search tool that's used to insure high probability of finding a solution by decreasing the amount of time in key space searching. In this paper the focus will be on the cryptanalysis of a Hill cipher by using genetic algorithm and study the algorithm factors that affect finding solution taking in consideration the time and efficiency of the cryptanalysis process, the Different...
Scalable High Efficiency Video Coding (SHVC) is the extension of the High Efficiency Video Coding (HEVC). This standard is developed to ameliorate the coding efficiency for the spatial and quality scalability. In this paper, we investigate a survey for SHVC extension. We describe also its types and explain the different additional coding tools that further improve the Enhancement Layer (EL) coding...
Color segmentation is a preliminary step in many application computer vision systems today, as the detection of human movement, recognition of road traffic signs and video intelligent. Detection stage performance is therefore closely linked to the results obtained from the color segmentation. Detection and recognition automatic road traffic signs are applied in the color spaces RGB, HSV, and HSI....
The sphere decoding (SD) algorithm based on Schnorr-Euchner (S-E) strategy can reduce the complexity for multiple-input multiple-output (MIMO) systems to find the maximum likelihood (ML) solution by updating the search radius whenever a new lattice point was found. In this paper, we propose an improved scheme to reduce the complexity of sphere decoding. In the new method, a factor was introduced for...
Heartbeat signal is an emerging biometric modality which is getting attention for its robustness against spoof attack. Introducing heartbeat into a fingerprint biometric system can yield promising results in two ways. First, it may increase the accuracy of the biometric system and second it may increase its robustness against spoof attacks. In this paper, a score level fusion is used based on the...
The brain tumor segmentation studies based on MRI are attracting more and more attention in recent years due to non-invasive imaging and good soft tissue contrast. This paper describes the proposed approach for detection and extraction brain tumor from MRI scan images of brain. Asymmetry of brain is used for detection of abnormality, after detect of the tumor. The segmentation based on F-transform...
The main idea of this paper is to adapt the Artificial Bee Colony metaheuristic to solve the problem of multilevel thresholding for image segmentation. More precisely, this method is exploited to optimize two maximizing functions namely the between-class variance (the Otsu's function) and the entropy thresholding (the Kapur's function). This leads, respectively, to two versions of the ABC metaheuristic:...
Upcoming Wireless networks have been emerging in the real world applications as well as in researching. Multihop characteristics of ad hoc networks may lead to most of their challenges. Selfishness is an inevitable behavior in these networks and many researches have been performing to thwart it. In this paper we investigate some game theory selfish model and incentive VCG payments to motivate relay...
The ad-hoc mobile markets are increasing daily with providers and consumers ready to participate in these markets. Issues like service discovery and selection are major challenges in these markets. As these markets grow, researchers are working on discovery while little is done on selection. Most scholars have developed different selection mechanisms considering only consumer's quality of service...
Wireless Mesh Networks (WMNs) is a promising technology which has a potential of providing inexpensive solutions to a wide range of applications. These networks have been applied in the context of home, community, and enterprise scenarios. The nodes in these application scenarios can be distributed either in a uniform or normal fashion. The key issue is for the network to continuously manage and share...
Multiple-input multiple-output (MIMO) systems are commonly used in wireless communications to ensure high bit-rate and high capacity transmission. Space time block coding (STBC) is a technique used in MIMO to provide transmit diversity in communication over fading channels. Although STBC has full diversity gain, the coding gain need to be improved by using channel coding such as low density parity...
The wave concept iterative procedure is very efficient numerical method for the electromagnetic modeling in high frequency domain. But, the numerical complexity of the iterative method in modeling complexes structures and a large number of iterations to converge to the optimal result is a very interesting problem to study. For this reason, In this paper we will implement a different adaptive algorithms...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.