Results (1521)
Search Parameters:
Keyword: SPA Novel Ultra High Speed and Configurable Discrete Wavelet Packet Transform Architecture
This work is dedicated to present a new pipeline-parallel architecture of Discrete Wavelet Packet Transform (DWPT) for all wavelet family implemented in FPGA technology. The main target of our architecture is to provide an effective performance trade-off, where it significantly increases the throughput with a restricted amount of hardware. In this article, we propose two…
Read MoreSpace Time – Track Circuits with Trellis Code Modulation
The track circuits are very important equipments used in the railway transportation system. Today these are used to send vital information, to the running train, in the same time with the integrity checking of the rail. The actual track circuits have a small problem due to the use of the same transmission medium by the…
Read MoreSpatial Modulation Technique For Filtered-OFDM Based Wireless Transmission
In this paper, a spatial modulation (SM) which provides no synchronization between the transmitting antennas and avoids inter-channel interference (ICI) at the receiver input while maintaining high spectral efficiency is applied to filtered-orthogonal frequency division multiplexing (F-OFDM) transmission. The SM technique maps a block of information bits into two information carrying units, namely, a symbol…
Read MoreSpectral Reflectance Estimation and Color Reproduction Based on Sparse Neugebauer Model
This paper proposes a method for estimating the spectral reflectance of Neugebauer primaries or eight basic colors when the spectral reflectance data of several colors are given. The proposed method is based on Neugebauer model, which expresses an arbitrary color as a weighted average of Neugebauer primaries, and its sparse version called sparse Neugebauer model.…
Read MorePerformance Evaluation of Associative Classifiers in Perspective of Discretization Methods
Discretization is the process of converting numerical values into categorical values. Contemporary literature study reveals that there are many techniques available for numerical data discretization. The performance of classification method is dependent on the exploitation of the data discretizing method. In this article, we investigate the effect of discretization methods on the performance of associative…
Read MoreEfficacy of multiple anticancer therapies may depend on host immune response
The host immune system is a key player in anticancer therapy response and resistance. Although the impact of host immune response in the ‘war against cancer’ has been studied and it has been the basis for immunotherapy, understanding of its role in attenuating the action of conventional anticancer therapies is an area that has not…
Read MoreA Theoretical and Experimental Comparison of One Time Pad Cryptography using Key and Plaintext Insertion and Transposition (KPIT) and Key Coloumnar Transposition (KCT) Method
One Time Pad (OTP) is a cryptographic algorithm that is quite easy to be implemented. This algorithm works by converting plaintext and key into decimal then converting into binary number and calculating Exclusive-OR logic. In this paper, the authors try to make the comparison of OTP cryptography using KPI and KCT so that the ciphertext…
Read MoreCombination of Caesar Cipher Modification with Transposition Cipher
The caesar cipher modification will be combine with the transposition cipher, it would be three times encryption on this experiment that is caesar modification at first then the generated ciphertext will be encrypted with transposition, and last, the result from transposition will be encrypted again with the second caesar modification, similarly at the decryption but…
Read MoreModification of Symmetric Cryptography with Combining Affine Chiper and Caesar Chiper which Dynamic Nature in Matrix of Chiper Transposition by Applying Flow Pattern in the Planting Rice
Classical cryptography is a way of disguising the news done by the people when there was no computer. The goal is to protect information by way of encoding. This paper describes a modification of classical algorithms to make cryptanalis difficult to steal undisclosed messages. There are three types of classical algorithms that are combined affine…
Read MoreSpatiotemporal Traffic State Prediction Based on Discriminatively Pre-trained Deep Neural Networks
The availability of traffic data and computational advances now make it possible to build data-driven models that capture the evolution of the state of traffic along modeled stretches of road. These models are used for short-time prediction so that transportation facilities can be operated in an efficient way that guarantees a high level of service.…
Read MoreIncorporating Spatial Information for Microaneurysm Detection in Retinal Images
The presence of microaneurysms(MAs) in retinal images is a pathognomonic sign of Diabetic Retinopathy (DR). This is one of the leading causes of blindness in the working population worldwide. This paper introduces a novel algorithm that combines information from spatial views of the retina for the purpose of MA detection. Most published research in the…
Read MoreA comparative between CRISP-DM and SEMMA through the construction of a MODIS repository for studies of land use and cover change
Among the most popular methodologies for development of data mining projects are CRISP-DM and SEMMA, This research paper explains the reason why it was decided to compare them from a specific case study. Therefore, this document describes in detail each phase, task and activity proposed by each methodology, applying it in the construction of a…
Read MoreForced Vibration Response of Double-Bay Multi-Storey Building Frames with Joints of Infinite Rigidity
This paper studied external-source-excited vibration response of double-bay multi-storey building frames for the effect of joint stiffening on bending moment and joint displacement. One of the frames has normal rigid joints. Three others of the frames have stiffened joints of stiffened lengths: 275mm, 425mm and 775mm respectively. Lumped mass system was the dynamic model adopted.…
Read MoreSecurity in SWIPT with Power Splitting Eavesdropper
Simultaneous wireless information and power transfer (SWIPT) has drawn significant research interest in recent years. In this paper, we investigate the information theoretic secrecy of a SWIPT system under Weibull fading channel. To be specific, we analyze the information security in the presence of an energy harvesting and information decoding eavesdropper. All links are subjected…
Read MoreMoving Towards Reliability-Centred Management of Energy, Power and Transportation Assets
Infrastructure Asset Management was first adopted in 1980s for challenges faced by the utilities, road and rail transport systems, mining, process and manufacturing industries in asset life cycle value optimization. International standards ISO 55000 and PAS 55 were subsequently developed to provide a basis for a structured methodology in the development of Asset Management System.…
Read MoreControl design for axial flux permanent magnet synchronous motor which operates above the nominal speed
The axial flux permanent magnet synchronous motor (AFPM motor) using magnet bearings instead of ball-bearings at both two shaft ends could allow rotational speed of shaft much greater than nominal speed. One of the solutions to increase motor speed higher than its nameplate speed is reducing rotor’s pole magnetic flux of rotor (Yp). This paper…
Read MoreOptimal Synthesis of Universal Space Vector Digital Algorithm for Matrix Converters
This paper presents the synthesis of a dynamic space vector modulation for power matrix converters so that it is possible to implement a universal modulator that provides a control algorithm dynamically optimized according to the requirements for the matrix converter.
Read MorePaper Improving Rule Based Stemmers to Solve Some Special Cases of Arabic Language
Analysis of Arabic language has become a necessity because of its big evolution; we propose in this paper a rule based extraction method of Arabic text to solve some weaknesses founded on previous research works. Our approach is divided on preprocessing phase, on which we proceed to the tokenization of the text, and formatting it…
Read MoreTravelling Wave Solutions of Coupled Burger’s Equations of Time-Space Fractional Order by Novel (Gʹ/G)-Expansion Method
In this paper, Novel (Gʹ/G)-expansion method is used to find new generalized exact travelling wave solutions of fractional order coupled Burger’s equations in terms of trigonometric functions, rational functions and hyperbolic functions with arbitrary parameters. For the conversion of the partial differential equation to the ordinary differential equation, complex transformation method is used. Novel (Gʹ/G)-expansion…
Read MoreImproving customs’ border control by creating a reference database of cargo inspection X-ray images
Countries’ effective and efficient border security is becoming increasingly important in today’s global world of economy and trade. To ensure these, customs organisations are responsible for the prevention of illicit goods’ transportation across borders, particularly upon entry. The predicament of the customs administrations will soon be aggravated by both the increase of global trade and…
Read MoreZero Trust Cloud Networks using Transport Access Control and High Availability Optical Bypass Switching
Cyberinfrastructure is undergoing a radical transformation as traditional enterprise and cloud computing environments hosting dynamic, mobile workloads replace telecommunication data centers. Traditional data center security best practices involving network segmentation are not well suited to these new environments. We discuss a novel network architecture, which enables an explicit zero trust approach, based on a steganographic…
Read MoreSpatial Sampling Requirements for Received Signal Level Measurements in Cellular Networks of Suburban Area
A process for the determination of a required spatial resolution in the collection of the Received Signal Level (RSL) is discussed. This method considers RSL measurements as a three dimensional surface that is sampled through the data collection process. In addition, it is difficult to collect RSL measurements for an entire coverage area because of…
Read MoreTheoretical Expression of the Balance Function during Galvanic Vestibular Stimulation in Dual Space
A method to construct a stochastic differential equation describing a non-Gaussian process in a stationary state and to obtain a static potential function in terms of the temporal average is proposed. However, it has been suggested that the potential function changes temporally through some analysis of climatic change. In this paper, a mathematical model of…
Read MoreDevelopment of a new lines of sight analyzer while playing sport
The Olympics will be held in Tokyo in 2020, and the training of the athlete using technology has been gaining attention. In an effort to refine the competitive ability of top athletes by evaluating their performance objectively, we have focused on eye movement and head movement. Since the field of view moves according to the…
Read MoreA Survey of Text Mining in Social Media: Facebook and Twitter Perspectives
Text mining has become one of the trendy fields that has been incorporated in several research fields such as computational linguistics, Information Retrieval (IR) and data mining. Natural Language Processing (NLP) techniques were used to extract knowledge from the textual text that is written by human beings. Text mining reads an unstructured form of data…
Read More
