Results (468)
Search Parameters:
Keyword: BERHardware Acceleration on Cloud Services: The use of Restricted Boltzmann Machines on Handwritten Digits Recognition
Cloud computing allows users and enterprises to process their data in high performance servers, thus reducing the need for advanced hardware at the client side. Although local processing is viable in many cases, collecting data from multiple clients and processing them in a server gives the best possible performance in terms of processing rate. In…
Read MoreInnovative Research on the Development of Game-based Tourism Information Services Using Component-based Software Engineering
In recent years, a number of studies have been conducted exploring the potential of digital tour guides, that is, multimedia components (e.g., 2D graphic, 3D models, and sound effects) that can be integrated into digital storytelling with location-based services. This study uses component-based software engineering to develop the content of game-based tourism information services. The…
Read MoreA Smart Mobile Application for Assisting Parents in Anti-Drug Support
Drug abuse problem is not a new problem, but it is still serious in Hong Kong. The emergence of hidden drug abuse youth has brought more difficulties to them and their parents. The usual ways of providing anti-drug abuse assistance are not sufficient to these types of young people. Intelligent methods have been developed to…
Read MoreThe method of correlation investigation of acoustic signals with priority placement of microphones
Examples of analytical calculations of the system characteristics of the hardware and time complexity of the correlation system based on a certain number of microphones and the corresponding number of interrelations are presented. The structural solutions of the hardware special processor implementation of such class of multichannel devices for recognition and identification of types and…
Read MoreSignal-Based Metamodels for Predictive Reliability Analysis and Virtual Testing
In the current industrial development, an increasing number of sensors is applied for monitoring of any kind of appliances and machines. A predictive mathematical model allows for realistic assessment of the health state of the appliance, indication of service requirements, as well as control of the appliance, serving as so-called digital twin on a control…
Read MoreSimulation and FPGA Implementation of a Ring Oscillator Sensor for Complex System Design
This paper, presents the design of a temperature sensor based on RO (Ring Oscillator) in order to make a thermal study for the detection and localization of thermal peaks in a complex system. In this work, a simulation and FPGA implementation of a fully digital temperature sensor features a number of exact inverters that can…
Read MoreA Survey of Security Challenges in Internet of Things
Internet of things (IoT) is an innovative technology subject to all kind of imaginary and science fictional solutions. Dreams and speculations are still possible about it. A technology combining real life objects and virtual life (Internet) is indeed a fertile pitch of fantasy and original ideas. However, IoT has in practice to face several challenges…
Read MoreConstant Envelope DCT based OFDM System with M-ary PAM Mapper over Fading Channels
Constant Envelope Discrete Cosine Transform based Orthogonal Frequency Division Multiplexing (CE-DCT-OFDM) system with M-ary Pulse Amplitude Modulation (PAM) mapper is considered. In the system phase modulation is used to achieve constant envelope signals that have 0 dB Peak-to-Average-Power Ratio (PAPR). Transmission of such signals permit high power amplifiers in the system to operate with maximum…
Read MoreA High Efficiency Ultra Thin (1.8 um) CdS/CdTe p-i-n Solar Cell with CdTe and Si as BSF layer
CdTe-based photovoltaic (PV) cells provide the lowest EBPT (energy payback time) and emit less amount of GHG (green house gases) among different types of PV cells. Thus, it is very essential to enhance the efficiency of CdTe-based solar cells. A high efficiency CdTe/CdS p-i-n heterostructure solar cell is designed and the performance of the cell…
Read MoreBuilding an Efficient Alert Management Model for Intrusion Detection Systems
This paper is an extension of work originally presented in WITS-2017 CONF. We extend our previous works by improving the Risk calculation formula, and risk assessment of an alert cluster instead of every single alert. Also, we presented the initial results of the implementation of our model based on risk assessment and alerts prioritization. The…
Read MoreA new color image encryption algorithm based on iterative mixing of color channels and chaos
In this paper, we present a novel secure cryptosystem for direct encryption of color images, based on an iterative mixing spread over three rounds of the R, G and B color channels and three enhanced chaotic maps. Each round includes an affine transformation that uses three invertible matrices of order 2 _ 2; whose parameters…
Read MoreA Study on Isomorphic Properties of Circulant Graphs
denotes circulant graph of order for a set where Circulant graph is said to have the Cayley Isomorphism (CI) property if whenever is isomorphic to , there is some for which . In this paper, isomorphic properties of circulant graphs that includes Self-complementary circulant graphs; Type-2 isomorphism, a new type of isomorphism other than already known Adam’s isomorphism of circulant graphs and Cartesian product and factorization of…
Read MoreA Taxonomy for Enhancing Usability, Flexibility, and Security of User Authentication
Two technology trends – a move toward software defined capabilities and toward networked devices – support both unprecedented innovations and requirements for security. A fundamental aspect of security is user authentication, which allows devices and software applications to establish their user’s identity and identity is in turn used to establish which of its capabilities the…
Read MoreDistributing the computation in combinatorial optimization experiments over the cloud
Combinatorial optimization is an area of great importance since many of the real-world problems have discrete parameters which are part of the objective function to be optimized. Development of combinatorial optimization algorithms is guided by the empirical study of the candidate ideas and their performance over a wide range of settings or scenarios to infer…
Read MoreDesign of Cognitive Radio Database using Terrain Maps and Validated Propagation Models
Cognitive Radio (CR) encompasses a number of technologies which enable adaptive self-programing of systems at different levels to provide more effective use of the increasingly congested radio spectrum. CRs have potential to use spectrum allocated to TV services, which is not used by the primary user (TV), without causing disruptive interference to licensed users by…
Read MoreSoft Handoff Evaluation and Efficient Access Network Selection in Next Generation Cellular Systems
The increased motivation (by service providers) to offer user-centric and seamless communication services – that satisfies users’ quality of experience (QoE), has manifested a myriad of challenges in the field of wireless communication; and given the increased traffic capacity and sudden explosion of cellular devices, communication systems are constantly threatened by performance related issues –…
Read MorePlanning an Availability Demonstration Test with Consideration of Confidence Level
The full service life of a technical product or system is usually not completed after an initial failure. With appropriate measures, the system can be returned to a functional state. Availability is an important parameter for evaluating such repairable systems: Failure and repair behaviors are required to determine this availability. These data are usually given…
Read MoreOn the Performance of a Clustering-based Task Scheduling in a Heterogeneous System
Recent task scheduling algorithms for a generalized workflow job in heterogeneous system adopt list-based scheduling. In those algorithms, the response time cannot be effectively reduced if the given workflow job is data-intensive. If the workflow job is computationally intensive, an attempt is made to assign tasks to many processors, which can lead to resource starvation.…
Read MoreClean Energy Use for Cloud Computing Federation Workloads
Cloud providers seek to maximize their market share. Traditionally, they deploy datacenters with sufficient capacity to accommodate their entire computing demand while maintaining geographical affinity to its customers. Achieving these goals by a single cloud provider is increasingly unrealistic from a cost of ownership perspective. Moreover, the carbon emissions from underutilized datacenters place an increasing…
Read MoreA Machine Learning based Framework for Parameter based Multi-Objective Optimisation of Video CODECs
All multimedia devices now incorporate video CODECs that comply with international video coding standards such as H.264 / MPEG4-AVC and the new High Efficiency Video Coding Standard (HEVC), otherwise known as H.265. Although the standard CODECs have been designed to include algorithms with optimal efficiency, a large number of coding parameters can be used to…
Read MoreLookup Tables-based mean level detection of spatially distributed targets in non Gaussian clutter
In this paper, Constant False Alarm Rate (CFAR) detection of spatially distributed targets embedded in compound Gaussian clutter with Inverse Gamma texture is addressed. By taking into account the fact that clutter parameters are unknown in practical situations, we propose mean level based on Lookup Tables detectors, that operate as a two-step approach, which consists…
Read MoreSource Code Vulnerabilities in IoT Software Systems
An empirical study that examines the usage of known vulnerable statements in software systems developed in C/C++ and used for IoT is presented. The study is conducted on 18 open source systems comprised of millions of lines of code and containing thousands of files. Static analysis methods are applied to each system to determine the…
Read MoreMonocular Height Estimation Method with 3 Degree-Of-Freedom Compensation of Road Unevennesses
Height estimation of objects is a valuable information for locomotion of autonomous robots and vehicles. Even though several sensors such as stereo cameras have been applied in these systems, cost and processing time have been motivating solutions with monocular cameras. This research proposes two new methods: i) height estimation of objects using only a monocular…
Read MoreRadiation Hybrid Mapping: A Resampling-based Method for Building High-Resolution Maps
Abstract— The process of mapping large numbers of markers is computationally complex, as the increase of numbers of markers results in an exponential increase in the mapping runtime. Also, having unreliable markers in the dataset adds more complexity to the mapping process. In this research, we have addressed these two issues and proposed our solution.…
Read MoreHybrid Ontology-based knowledge with multi-objective optimization model framework for Decision Support System in intercropping
The problem of multi-criteria or multi-objective intercropping crop planning makes it vital to consider all related factors under the constraints that will produce the highest revenue and minimum cost. Principles of intercropping elements including soil type, plant area, plant diseases, planting and harvesting time and economics factors (e.g. price, cost) are some of the factors…
Read More
