The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The problem of linear prediction for multiple channels of data sampled at different rates is considered. The prediction error filters in this case are periodically time-varying. A Levinson-type recursion is developed for the linear prediction parameters. A sliding window formulation is also developed.
The theoretic ground of a locally topological method for defining a minimal attractor embedding dimension on the basis of linear and nonlinear decompositions in state-space of a dynamic system is proposed. The computer confirmation of the theoretical results is presented.
A scalable realisation of a two dimensional (2D) fast wavelet transform (FWT) is presented and compared to an earlier implementation of discrete wavelet transform (DWT), which uses matrix multiplication method. Parallelisation and mapping possibilities are analysed. The main emphasis is in minimising communication requirements and utilising local communication. Measured performance figures verify...
Plagiarism is known as illegal use of others' part of work or whole work as one's own in any field such as art, poetry, literature, cinema, research and other creative forms of study. Plagiarism is one of the important issues in academic and research fields and giving more concern in academic systems. The situation is even worse with the availability of ample resources on the web. This paper focuses...
In the field of cycling competition, cyclists commonly utilize binding pedals to maximize their competitive performance. The feature of binding pedals is to hold the sole of cycling shoe on the upper body of pedal, which enables a cyclist to not only push down the pedals but also pull up the pedals in one revolution of pedaling motion. Pedaling motion is implemented by the combination of muscle activities...
Encoder circuits are vital component of an electronic computer system. Encoders are generally used for the conversion of a 2" bit number into the n bit number. Applications of encoders can be visualized as keyboard encoder on widespread use. Design of an optimized encoder circuit with the concept of reversible logic is the main outcome of this research paper. The concept of reversible logic has...
The previous electronic sealed-bid auction schemes usually have a common drawback, the third party (auction host) can conspire with a malicious bidder to leak all bidding prices before the opening stage. It results in the malicious bidder wining the auction with an optimal bidding price. This paper proposes a sealed-bid auction scheme without third party to get over this drawback. The proposed scheme...
Utilization of limited resources and quality of service (QoS) improvement are most important challenges for wireless networks. Excessive call blocking of lower priority traffic is very often event at higher traffic rate in multiple services. Considering these factors, we proposed a uniform band thinning call admission control (CAC) scheme that reduces the call blocking probability of lower priority...
Trust has been a hotspot for adopting cloud computing. This paper proposes a hybrid model to build, evaluate and expose trust. It uses different techniques like sliding window technique to reach optimum processes for trust value delivery. Trust value is evaluated through integrated mechanisms from literature. Moreover, measuring trust included evaluating SLA violations side to side with consumer customized...
The security of software-based systems is one of the most difficult issues when accessing the suitability of systems to most application scenarios. However, security is very hard to evaluate and quantify, and there are no standard methods to benchmark the security of software systems. This work proposes a novel methodology for benchmarking the security of software-based systems. This methodology uses...
Requirements change is an inevitable activity and can occur due to changes in user demands, increased understanding of the stakeholders, customer organization, project vision, requirements specification and availability of technological solutions. Although requirements change management (RCM) is not a straightforward process in collocated software development, the presence of geographical, social,...
Semantic computing is an important task in the research of natural language processing. For the problem of the inaccurate conceptual graph matching, this paper proposed the algorithm based on Conceptual sub-Graph weight self-adjustment. Based on the in tensional logic model of Chinese concept connotation, using Recursive Conceptual Graph as knowledge representation method and combining with the computation...
First, the paper gives the definition of the strongly row (column) full rank matrix, the quasi-upper triangular matrix and the quasi-lower triangular matrix of the m × n matrix. Then the triangular factorization is generalized to the m × n matrix, and some factorization theorems are obtained. By using the triangular factorization, the linear equations with strongly row (column) full rank coefficient...
The physical process modeling of an estuary is a complex mechanism that comes along with the existence of uncertainty. In contrast, due to significant variability of flows in space and time, an extensive modeling effort must be accommodated with the application of parallelization technology. Therefore, the implication of estuary model parallelization to the model result uncertainty must be examined...
Mathematics education is an essential part of every engineering curriculum. The question of how much math should be included in an engineering curriculum is under discussion and the mathematics content has come under closer scrutiny with the aim of teaching engineers mathematical topics that have close practical relevance to their discipline at a time when those topics are most needed. This article...
In this paper an image processing algorithm for automatic evaluation of scanned examination sheets is described. The discussed image contains selected function graphs sketched on a prepared sheets. This type of task is characteristic of final high school exams of natural sciences. Our challenge was to develop an evaluation algorithm, which works with a precision comparable to the teacher. If the image...
In this paper, a sub-Nyquist sampling system for multiband signals is presented, which can perform accurate spectrum sensing and reconstruction. The system is based on PXI bus and virtual instrument technology, which make the proposed system able to be adjusted flexibly for different input signals. Compressive sensing (CS) theory and modulated wideband converter (MWC) are adopted in the system. The...
Local stereo matching methods are still used widely because they are fast and simple. But the accuracy of local methods is much poorer than the global methods. They usually achieve accuracy at the expense of speed. Simple local methods are fast, but exhibit systematic errors. In this paper we propose an improved method based on support-weight approach, which can enhance the matching efficiency and...
Over the past few years, the relationship between attitudes and behavior has been of a major interest to educators. Previous studies have found varying degree of associations between attitudes, behavioral intention and perceptions and corroborate the fact that attitudes influence patterns of behavior. As computer technology is becoming pervasive in the society, researchers have attempted to explore...
In this paper, a new admission control scheme is presented based on the proportional admission control scheme of the IEEE802.11aa to solve the problems in the 802.11 WLANS. Quality of service (QoS) and throughput are the most significant questions in the 802.11 WLANS especially when the bandwidth is scare. In the Overlapping Basic Service Set (OBSS), we need to face many problems such as the high...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.