Results (481)
Search Parameters:
Keyword: algorithmEvolving AL-FEC Application on 5G NGMN-Edge Computing Systems
Fifth generation of mobile networks (5G) comes to cope with the context of the new mobile telecommunications era. Edge computing is a new collaborative technology under standardization utilizing end-user devices or near-end-user edge devices to operate processing, communication, or control operations. The achievement of efficient error control is a very critical aspect in the successful…
Read MoreFPGA Implementation of Ultra-High Speed and Configurable Architecture of Direct/Inverse Discrete Wavelet Packet Transform Using Shared Parallel FIR Filters
This work presents new pipeline-parallel, generic and configurable parallel hardware architectures for the Direct/Inverse Wavelet Packet Transform (DWPT/IDWPT) independent of any specific family of wavelets, implemented in FPGA technology using a parallel architecture of direct FIR filter. We propose in the following paper, new P-parallel structures for the DWPT and IDWPT transforms based on the…
Read MoreA Machine Learning Framework Using Distinctive Feature Extraction for Hand Gesture Recognition
There are more than 7billion people in the world where there are around 500 million people in the world who are denied from normal lifestyle due to physical and mental issue. It is completely fair to say that every person deserves to enjoy a normal lifestyle. While physically and mentally challenged people find suitable way…
Read MoreImprovement of Transmission Characteristics in Multilayer Dual Band Filter
This paper first simplifies the GA-optimized filter structure developed by us. Then the filter structure is modified by introducing slot and conductor stubs, based on electric fields and magnetic currents at resonant and transmission zero points. As a result, return losses in two passband regions are suppressed more than 28 dB, and also insertion loss…
Read MoreDesign of smart chess board that can predict the next position based on FPGA
The abilities of human brain to discover solutions for many problems is a great gift that motivate the scientists to develop the revolution of the artificial intelligence and using it in many areas. This paper proposed an intelligent chessboard which works in a way that similar to the human brain that predicts the next positions…
Read MoreA detailed step-by-step electrical parameters identification method for photovoltaic generators using a combination of two approaches
The object of this paper is to identify the unknown electrical parameters of solar photovoltaic generators in real time, through the application of a novel suggested hybrid method. The identification process is discussed with details, about the four steps of identification. In this issue, the first step describes the experimental data acquisition work done to…
Read MoreA Method for Generating, Evaluating and Comparing Various System-level Synthesis Results in Designing Multiprocessor Architectures
Multiprocessing can be considered the most characteristic common property of complex digital systems. Due to the more and more complex tasks to be solved for fulfilling often conflicting requirements (cost, speed, energy and communication efficiency, pipelining, parallelism, the number of component processors, etc.), different types of component processors may be required by forming a so…
Read MoreEAES: Extended Advanced Encryption Standard with Extended Security
Though AES is the highest secure symmetric cipher at present, many attacks are now effective against AES too which is seen from the review of recent attacks of AES. This paper describes an extended AES algorithm with key sizes of 256, 384 and 512 bits with round numbers of 10, 12 and 14 respectively. Data…
Read MoreA Cyber-Vigilance System for Anti-Terrorist Drives Based on an Unmanned Aerial Vehicular Networking Signal Jammer for Specific Territorial Security
During sudden anti-terrorist drives conducted by the law enforcement agencies, a localized cyber security system happens to be a special tactic to avert the unprecedented massacre and gruesome fatalities against the residents of that area by disconnecting the affected territory from the rest of the world; so that the militants and their outside accomplices cannot…
Read MoreEfficient Alignment of Very Long Sequences
We consider the problem of aligning two very long biological sequences. The score for the best alignment may be found using the Smith-Waterman scoring algorithm while the best alignment itself may be determined using Myers and Miller’s alignment algorithm. Neither of these algorithms takes advantage of computer caches to obtain high efficiency. We propose cache-efficient…
Read MoreAn Aggregation Model for Energy Resources Management and Market Negotiations
Currently the use of distributed energy resources, especially renewable generation, and demand response programs are widely discussed in scientific contexts, since they are a reality in nowadays electricity markets and distribution networks. In order to benefit from these concepts, an efficient energy management system is needed to prevent energy wasting and increase profits. In this…
Read MoreA Model for Optimising the Deployment of Cloud-hosted Application Components for Guaranteeing Multitenancy Isolation
Tenants associated with a cloud-hosted application seek to reduce running costs and minimize resource consumption by sharing components and resources. However, despite the benefits, sharing resources can affect tenant’s access and overall performance if one tenant abruptly experiences a significant workload, particularly if the application fails to accommodate this sudden increase in workload. In cases…
Read MoreActuator Fault Reconstruction based Adaptive Polytopic Observer for a Class of Continuous-Time LPV Systems
This paper is an extension of work originally presented in conference name. The goal is to propose new fault detection and fault isolation techniques for a polytypic linear parameter-varying system (LPV). In this work, an adaptive observer design is formulated for a given polyquadratic Lyapunov function. Subsequently, new sufficient conditions are given in terms of…
Read MoreSystematic Tool Support of Engineering Education Performance Management
Engineering schools must adopt or develop their own systems and processes for graduate attribute assessment. In this paper, we take a systems engineering approach to graduate attribute assessment and propose a system architecture and tool-supported continuous improvement process with key algorithms and mathematical analysis to process the data and provide performance management reporting. Over several…
Read MoreNon-rigid Registration for 3D Active Shape Liver Modeling
To avoid biopsies, doctors use non invasive medical techniques such as the computed tomography. Even that, the detection of the liver remains a big challenge because of the gray level and shape variations which depend on patients and acquisition modalites. In this work, we propose to create a 3D liver model in the training phase…
Read MoreVelocity obstacles for car-like mobile robots: Determination of colliding velocity and curvature pairs
This paper addresses the motion planning problem of Reeds-Shepp-type car-like mobile robots moving among static and dynamic obstacles. If the positions and the velocity vectors of the obstacles are known or well estimated, the Velocity Obstacles (VO) method and its non-linear version (NLVO) can be used to plan a collision-free trajectory for a robot in…
Read MoreDevelopment of Indicators for Technical Condition Indexing of Power Transformers
Reliable operation of a power transformer with a certain load depends on the technical condition of individual construction parts and the ability to prevent defects that can cause a failure. During the lifecycle of a transformer, valuable data is constantly accumulated, which forms the basis for technical or risk assessment of the equipment. Therefore it…
Read MoreAuto-Encoder based Deep Learning for Surface Electromyography Signal Processing
Feature extraction is taking a very vital and essential part of bio-signal processing. We need to choose one of two paths to identify and select features in any system. The most popular track is engineering handcrafted, which mainly depends on the user experience and the field of application. While the other path is feature learning,…
Read MoreVirtual Memory Introspection Framework for Cyber Threat Detection in Virtual Environment
In today’s information based world, it is increasingly important to safeguard the data owned by any organization, be it intellectual property or personal information. With ever increasing sophistication of malware, it is imperative to come up with an automated and advanced methods of attack vector recognition and isolation. Existing methods are not dynamic enough to…
Read MoreMachine Learning framework for image classification
Hereby in this paper, we are going to refer image classification. The main issue in image classification is features extraction and image vector representation. We expose the Bag of Features method used to find image representation. Class prediction accuracy of varying classifiers algorithms is measured on Caltech 101 images. For feature extraction functions we evaluate…
Read MoreFlexible lengthening-shortening arm mechanism for fishery resource management
The goal of this study was to use underwater robots instead of a diver’s observations to monitor and record the condition of an obstructed seabed in a shallow area. It is difficult to investigate marine resources that exist in deep water shaded by rock due to large and/or small rocks on the seabed. To solve…
Read MoreApplying Machine Learning and High Performance Computing to Water Quality Assessment and Prediction
Water quality assessment and prediction is a more and more important issue. Traditional ways either take lots of time or they can only do assessments. In this research, by applying machine learning algorithm to a long period time of water attributes’ data; we can generate a decision tree so that it can predict the future…
Read MorePetrov-Galerkin formulation for compressible Euler and Navier-Stokes equations
The resolution of the Navier-Stokes and Euler equations by the finite element method is the focus of this paper. These equations are solved in conservative form using, as unknown variables, the so-called conservative variables (density, momentum per unit volume and total energy per unit volume). The variational formulation developed is a variant of the Petrov-Galerkin…
Read MoreA Relational Database Model and Tools for Environmental Sound Recognition
Environmental sound recognition (ESR) has become a hot topic in recent years. ESR is mainly based on machine learning (ML) and ML algorithms require first a training database. This database must comprise the sounds to be recognized and other related sounds. An ESR system needs the database during training, testing and in the production stage.…
Read MoreDistributing the computation in combinatorial optimization experiments over the cloud
Combinatorial optimization is an area of great importance since many of the real-world problems have discrete parameters which are part of the objective function to be optimized. Development of combinatorial optimization algorithms is guided by the empirical study of the candidate ideas and their performance over a wide range of settings or scenarios to infer…
Read More
