The Following Papers Belong To: WSEAS NNA-FSFS-EC 2002, February 11-15, 2002, Interlaken, Switzerland
The Following Papers Belong To: WSEAS NNA-FSFS-EC 2002, February 11-15, 2002, Interlaken, Switzerland
A Genetic Algorithm for blind source separation of Blind Source Separation, Genetic
spectral data Algorithms, Nuclear Magnetic Resonance
A goodness of fit index to reliability analysis in fuzzy Fuzzy set, Goodness of fit, Regression
model analysis
A Lossless Rule Reduction Technique for a Class of Fuzzy Systems, Rule Reduction,
Fuzzy Systems Residuated Implication, Fuzzy Inference
A model analysis of temporally asymmetric Hebbian Hebbian learning, Anti-Hebbian learning,
learning unsupervised learning
Neural network, Thermal margin,
A modified elman recurrent neural Network to predict Recurrent Network, Simulation, Heavy
DNBR ratio in a pressurized heavy water reactor water reactor
Neural Networks, Multilayer feedforward
A Multi Layer Perceptron Learning Algorithm with network, Gradient descent, Convergence,
Modified Cost Function Training cycle
A Multi-Agent System uses Artificial Neural Networks to Multi-agent systems, Distributed artificial
Model the Biological Regulation of the Lower Urinary intelligence, Neural networks, Lower
Tract urinary tract
A Neurocognitive Cell Assemblies Approach to Self- Brain-Inspired Self-Organising Networks,
organisation of Verb Actions Robot Action, Language Processing
A new vector quantization approach via self-organizing Codebook Construction, Self-organizing
map Map, LBU-U, Vector Quantization
A New Wave Neural Network Dynamics for Planning Path planning, Neural networks, Wave
Safe Paths of Autonomous expansion, Robotics, Autonomous
Objects in a Dynamically Changing World navigation
Differential Evolution, Optimization,
A Parameter Study for Differential Evolution Strategy parameters
Affine Takagi-Sugeno model, Quadratic
A Shape-preserving Affine Takagi-Sugeno Model Based splines, Nonuniform fuzzification
on a Piecewise Constant Nonuniform Fuzzification transform, Shape-preserving
Transform approximation
A Simulation of Hand Written Characters using Neural Artificial neural networks, Neocognitron,
Networks Techniques Character recognition, Pattern recognition
A Study of Machine Learning Methods using the Game Game Theory, neural networks, genetic
of Fox and Geese algorithms, co-evolution.
About sone models of chainging world and its Model, Transformation, Equation,
applications Problem, Integer, Solutions, Points,
Acoustics Parameters Estimation by Artificial rιseaux Neurones, Apprentissage, Elman,
Neural Networks Paramθtres Acoustiques
Adaptive Model for Diseases Number Prediction Based Fuzzy logic, Linguistic approximation,
on Neuro-Fuzzy Neuro-fuzzy network, Training of the
Technique neuro-fuzzy network
Adaptive Reservoir Genetic Algorithm: Convergence Genetic Algorithms, Convergence
Analysis analysis, Adaptive control of search
An adaptive fuzzy-logic algorithm for measuring and
improving autonomous Adaptive fuzzy logic algorithm, Sensor
mobile robot sensory performance Fusion, Mobile robots, Logical sensors
An Inverse Neuro-Controller Scheme for Robot Joint Neural networks, Robot, Neuro-controller,
Trajectory Tracking Performance Inverse dynamics, Path-planning
Warehouse Location Problem, Zone
An Optimization Technique for the Solution of an Based, Time, Distribution Strategy,
Enhanced Warehouse Simulated
Location Problem Annealing
Application of Artificial Neural Networks in Evaluation and
Identification of Electrical Loss in Transformers Transformers, Losses identification,
According to the Energy Consumption Neural networks, Load factor, Demand
Application Of Fuzzy Dynamic Programming And Neural Unit Commitment, Fuzzy Logic, Neural
Network In Generation Scheduling Network, Generation Scheduling
Computer vision, camera calibration,
neural networks, stereo vision, 3-D vision,
3-D image
Applying Neural Networks in 3-D vision acquisition.
Computer networks, Network intrusion
Approximate Reasoning and Detection of Computer detection, Fuzzy logic, Approximate
Network Intrusions reasoning
Automatic Clustering with Self-Organizing Maps and Clustering, Neural Networks, Genetic
Genetic Algorithms Algorithms, Optimization
Comparing predictions of SPORAS vs. a Fuzzy Fuzzy Logic, Reputation, Trust, Agents,
Reputation System Electronic Commerce, Recommendations
Unexploded ordnance detection,
Comparison of the Performance of Statistical and Fuzzy Statistical detection, Electromagnetic
Algorithms for Unexploded Ordnance Detection induction, Magnetometer, Sensor fusion
Electrical stimulation, Fuzzy logic, Closed
Control for electrical neuromuscular stimulator using loop, Electrical goniometers, Spinal cord
Fuzzy Logic injury, Artificial gait
Data fusion, Intelligence, Condition based
Data fusion applications in intelligent condition maintenance, Optimising maintenance
monitoring decisions
Delay-dependent stability criterion of T-S fuzzy models Fuzzy control, T-S fuzzy models, Time-
for nonlinear time-delay systems via fuzzy control delay systems
Digital ICD control with applications to submarine depth Multivariable control, digital
control control,robustness,submarine applications
DSP,digital motion
control,shell,programming
environment,communication,macroinstruct
Digital Motion Control Development Shell ions
Diffraction Fraunhofer region, Self-
Directional Self-similarity in the Superposition of Cantor similarity, Cantor bars, Fractal, Gratings
Transmittances superposition
Distributed computing, concurrency, load
Distributed computing for study of load flow in the flow, distributed database, electrical
electrical engineering engineering, power systems.
Using Virtual Reality and Teleoperation for Configuration Virtual Reality, Teleoperation,
of Robot Based Automation Systems Configuration, Robots, Simulation
Video hardware system and image compression using
the DCT Video, Compression, Hardware, DCT
Water, Wastewater, Physics, Chemestry,
Water/Wastewater distance learning Math, Microbiology
Wearing test on copper coated in diamond by :- Friction, surface, triboadhesion and
triboadhesion wear.
Design and Implementation of a dual mode digital APC PON, access network, laser driver, Dual
Algorithm for an APON burst-mode Laser driver mode APC algorithm
e-v@l: an Automatic Evaluation Module for Information Evaluation, Information Retrieval, Natural
Retrieval Language Processing, Recall, Precision
Robot vision, Computer vision, Mobile
robots, Inhomogeneous illumination,
Evaluation of object segmentation algorithms as Redundant programming, Image
components of autonomous video based robot systems segmentation
Experimental and Theoretical Analysis of Wavelet-Based
Denoising Filter for Echocardiographic Images Wavelet,Medical image
Experimental evaluation of a low-power sense Flash memories, multilevel, sensing,
comparator for multilevel flash memories sense amplifier, comparator
Direct--drive robot, Position controllers,
Exponential controller for robot manipulators Lyapunov function, Asymptotic stability.
Electromagnetic Scattering,Integral
Fast algorithms for dyadic greens function and solvers for Equation Methods, Green's Functions,
electromagnetic scattering in layered media Fast Solver
First location problem, RTDENN, neural
Fast Position Estimation for Autonomous Mobile Robot network, continuous mobile robot
Navigation relocalization
Pseudo-articulatory representations
(PARs), Hidden Markov models (HMMs),
Feature-Based Approach to Speech Recognition Sonority, Phonotactic, Morphological
Multirresolution Analysis, Digital
Filter Interpretation for the relations-ship between the filters,Wavelets, Sacling Function, Riesz's
two-scale sequences in B-splines's MRA basis
Fingerprint identification using the finite element Fingerprint, Finite Element, Image
technique Retrieval, Content-based, Database.
VLIW, ILP, Hw-Sw Co-design, DSP,
Multimedia, Development Tools,
Flexibility, speed and accuracy in vliw architectures Instruction Simulation, Simulation Speed,
simulation and modeling Simulation Accuracy
Fusion Segmentation Estimation
Fusion of piecewise stationary process Detection
Fuzzy function approximation with guaranteed error-
bounds estimate
Process planning, Scheduling, Genetic
algorithms Crossover, Heuristics, Multi-
GA–based integrated scheduling with a new crossover objective optimization
Hardware testing, software testing, fault
Hardware and software testing models, testing techniques, testability
Hardware Implementation of a Generic Fuzzy-ROM Controller, Fuzzy Logic, ROM, VHDL, and
Controller FPGA.
Integrating and Modelling Sensors: An Approach to Low- Multilayer Perceptron, Sensor Fusion,
Cost Robotics Systems using Multilayer Perceptrons Sensory Model, Low-Cost System
Security Management, Event
Intrusion Detection System using Rough Classification Management, Intrusion Detection,
Algorithm Firewalls, Rough Set Theory
Optimal processing, SAR, resolution,
MAP radar cross-section estimation in SAR random scene model
Maritime overage in dual gsm 900 dcs 1800 network of Maritime Coverage Extended Range Gsm
big capacity planning integration and optimization Sea Propagation
Modeling, Control operations,
Methodology of development of high-tech profitable Optimization, Methods, Hierarchical
Mission Control Center for automatic space vehicles systems, spacecraft
Sea surface surveillance with a very high resolution Radar, Surveillance, High-Resolution,
continuous wave radar FMCW
Security, routing, RIP, OSPF, ISIS,
Security issues in network control protocols multicast, QoS, active networks
thresholding,binarisation,slant
correction,neuro heuristic
Segmentation and recognition using neural networks segmentation,character matrix extraction
Equivalent-Circuit, Extraction, Small-
Sensitivity Analysis of a Mesfet Small- Signal Model by Signal, Condition Number, Optimization,
Calculation of Condition Number Measurements Errors
Digital, Neural, Transduction, Geomancy,
Hypnosis, Torsion, Bioplasma, Fluidice,
Shaping Events:Self-Organazation of Digital Photos Esp, Telekinesis
Shaping Tool Head Pneumatic Actuator Commands To
Reduce Flexible Structure Cut Car Letters Machine
Vibration Vibration, Input Signals
Electromagnetic radiation, Simulation,
Simulation of Electromagnetic Radiation Levels for some propagation models, Radiocommunication
Radiocomunication Systems Systems.
Key Words: -Fuzzy logic processors;
Structured Logic Processors Based Self Learning Fuzzy Neural networks; Relative cardinality;
Neural Network Receptive field.
Supervisory process control based on trained Process Control, Time-variant Process,
experience: combining bayes-statistics, fuzzy-vagueness Bayes-statistics, Bayes-Network, Fuzzy-
and adaptive control Logic, Adaptive Control
Audio DSP, Audio compression, Sampling
Synchronism Architecture Implementation for High frequency, PLL, Audio transmission,
Quality Audio Processing and Transmission Synchronism
Nonlinear signals and systems, Neural
networks, Image coding, Fuzzy systems,
Synthesis of a cellular nonlinear network for a fuzzy Cellular fuzzy processor, Fuzzy
associative memory in stereoscopic vision associative memories
TCOM : a Temporal Component Oriented Methodology Components methodology, Temporal
for the industrial Automation Engineer Logic, CBS, Automation, PLC.
The CPA Paradigm for Autonomous Mobile Robot Autonomous mobile robot, Knowledge
Knowledge Representation representation, knowledge database
The design of pseudo-n-path bandpass μUμG a/d BandpassκBμUμGκBPseudo-n-
modulator with single op-amp pathκBSwitched-capacitorκBModulator
The Multi-band LPC Coherence for Voice Activity Voice activity detection, Linear prediction,
Detection Coherence method, Multi-band decision
The Reg Circle Game - Learning about Remote Internet, Remote Laboratory, Control,
Hardware Control Edutainment
Interstitial microwave hyperthermia, Power
distribution, Tissue parameters, Antenna
Theoretical study of the power distributions for interstitial parameters, Microstrip antenna,
microwave hyperthermia Theoretical study.
Adaptive channel equalization, Artificial
Using Neural Networks for Adaptive Equalization neural networks, , M-PAM signals
eLearning, education, rapid prototyping,
Using New Tools for Education. A Case of an manufacturing, automatic control, digital
International Cooperation for a Rapid Prototyping Course systems.
Educational technology, ICT in education,
Education, Educational
Versatile spaces for the use of the information hardware/software, Multimedia,
technology in education Hardware/Software maintenance.
Vision System, Self-Positioning, Camera
Calibration, Hough transform, Wheeled
Vision-based System for Self-positioning and Calibration Mobile Robots
A Common Security Model for Conducting e-Auctions Privacy, Security, Cryptology, e-Auctions,
and e-Elections e-Elections
a comparison analysis of graphical models of object- Graphical Query Languages, Object-
oriented databases and the goql model Oriented Databases, Desktop Metaphors
Density-Gradient Equations, Monotone-
A Computational Efficient Approach to the Numerical Newton's Iterative Method, Convergence,
Solution of the Density-Gradient Equations for Ultra-Thin Quantum Mechanical Effects, Ultra-Thin
Oxide MOS devices Oxide, MOS Devices
Constructivealgorithms,Multilayerfeedforw
ard,Supervisedtraining,Trainingalgorithms,
a constructive algorithm for multilayer feedforward Numberofhiddenunits
Imager, Shunting inhibition, Dynamic
A current-mode cmos imager using shunting inhibition- range, Edge enhancement, VLSI, System-
based dynamic range compression on-chip
A design for call/connection control software with AAL2 ATM, AAL2, Call, Connection, Signaling
signaling protocol in ATM transit node Protocol, Control Software
A Fixed Point Optimisation Scheme for Direct Form IIR IIR Filter, Fixed Point, Optimisation
Filters Scheme, Quantisation
Public-key encryption, Broadcast
encryption, Traitor tracing, Semantical
A Fully Public-Key Traitor-Tracing Scheme security, Long livedness, Anonymity
An Ideal Connectivity for Ad Hoc Networks An Ideal Connectivity for Ad Hoc Systems
High-level test synthesis, Built-in self-test,
An Integrated High-Level Test Synthesis Algorithm for ASIC designs, Digital systems, Scheduling
Built-In Self-Testable Designs and allocations
An Intuitional Method for Mobile Robot Path-planning in a Path planning, Obstacle avoidance, Fuzzy
Dynamic Environment logic controller
Impulse Current, Impulse Current
Analysis and design of an impulse current generator Generator, IEC 60060-1
Bi-directional DC-to-DC Converter for Solar Applications Bidirectional DC-DC Converter, Parallel
with Battery Backup Operation, Solar Converter
Data induced metric - based algorithm for detection of Data induced metric;Fuzzy clustering;Non
non convex patterns convex patterns;Fast marching algorithm;
Decentralized systems, Large scale
Decentralized Multirate Control of Interconnected systems, Multirate systems, Control
Systems systems
Decentralized Stability via Fuzzy Control for Nonlinear Interconnected Subsystems, TMD, T-S
TMD Systems with External Force Fuzzy Models, Fuzzy Control
Decision Support Planners for Military Operations
Design and Implementation of a Multi-carrier Multi-carrier Demodulator, Polyphase-
Demodulator FFT, System on a Chip
Design of 1-D Piece-wise Maps for Multi-user CDMA Genetic programming, DNA computation,
Communications Using a Novel GP-DNA Algorithm chaos, CDMA, orthogonal codes
Cerebellar Model Articulation Controller,
Design of Cerebellar Model Articulation Controller with Grey Model, Learning Rate, Inverted
Fuzzy Rules and Grey Method Pendulum System
Cmos,Phase-locked loop,Gm-c
design of fully Integrated cmos phase-locked loop with filter,Integrated,Operational
gm-c filter transconductance amplifiers
Collaborative working , distributed
Designing the Configurable Collaborative Architecture computing, data modeling, legacy
(COCOA) systems, battle planning
Intracranial eeg, Epilepsy, Ictal and
preictal periods, Nonlinear dynamics,
detection of a preseizure state in intracranial eeg signals: Nonlinear correlation, Shannon entropy,
a case study Mutual information
Detection, Identification, Encoding and Processing of Reasoning, Decision-Making, Question,
Questions in Detection of Questions, Identification of
Decision-Making Questions
Diagrammatic systems, logic, existential
Diagrammatic representations in logical systems: graphs, conceptual graphs, semantic
Graphs, games and discourse games, discourse, negation, modality.
Diagrammatic Systems, Logic, Existential
Diagrammatic representations of logical systems: Graphs, Conceptual Graphs,
Graphs, games and Semantic Games, Discourse, Negation,
discourse Modality
Electrical crosstalk estimations on flip-chip and wire- Optoelectronics, Oe-vlsi, Oeics, Integrated
bonded OEICs Circuits Modelling, Electrical Crosstalk
SystemC, System Level Design,
Behavioral Synthesis, High-level
Synthesis, IP-based Design,
Elements of a SystemC Design Platform Design Reuse
Flow graphs for analysis (not only) current-mode Mason-CoatesΤ flow graph, node, Current
analogue blocks conveyor, Current-Feedback amplifier
Forecasting the Nile River Flow Using Fuzzy Model Prediction, River Flow, Fuzzy Logic
FPGA Based Real Time Constrained Time Area IIR, Biquad, FPGA, Distributed Arithmetic,
Optimized IIR Design Using Digit-Serial Arithmetic Hybrid Multiplier, Pipelining
FPGA Implemented Algorithm for Detecting Line Contour Image, Line Junction, FPGA,
Junctions in Comlex Contour Images Local Operator, Embedded System
Full Interactive Functions in MPEG-based Video on
Demand Systems
Fuzzy number linear programming: a probabilistic Fuzzy number, Ranking function, Fuzzy
approach linear programming
Fuzzy Tracking Controller for Underwater Robotic Underwater vehicle, Fuzzy logic,
Vehicles Intelligent control, Automation
Intruder Tracing through Dynamic Extension of a Security Intruder Tracing, Shadowing Mechanism,
Domain Security Domain, Replication
Value Prediction, Speculation, FCM,
Investigating the Predictability of Linked Data Structures Linked Data Structures
OPNET modelling of infrared and ultrasonic channel location, radio, infrared light, ultrasound,
dedicated to location of mobile station in a WLAN wireless LAN, indoor environment, mobility
CMOS Analog Design, Photo-receiver,
Optical Receiver with Duty Cycle Control in 0.35um Duty Cycle Control, Device Matching,
CMOS Monte-Carlo Simulation
Optimal control of time-varying linear systems using Wavelets, Legendre scaling functions,
wavelets Time-varying systems, Optimal control
Communiction Networks, Power Control,
Optimal Stochastic Power Control in Interference-Limited Stochastic Programming, Resource
Fading Wireless Channels Allocation
Computer vision, Optical flow, B-spline
Parallel issues of an optical flow estimator based on a functions, Quasi-interpolant operator,
quasi-interpolant operator Distributed multiprocessor
Fuzzy Classification, Fuzzy Pattern
Parametric Study of the Fuzzy Pattern Matching method Matching, Possibility theory, Fuzzy
used in classification with a multiprototype approach Membership
Path Planning, Obstacle Avoidance,
Path Planning for Obstacle Avoidance by using Fuzzy Fuzzy System, Grey Prediction, Fuzzy
System and Grey Prediction Control
Performance Analysis of crossbar Multiprocesor Crossbar multiprocessor systems,
Architectures via Analytical Simulation Analytical simulation
Pilot Assisted Clipping Avoidance for OFDM OFDM, PAR, Clipping Avoidance
Artificial intelligence, Multi-agent
Planning in multi-agent environment as inverted STRIPS environment, STRIPS system, Invertible
planning in the presence of uncertainty planning problems
Polar-wavelet energy signatures for rotation-invariant Polar-wavelet, Rotation invariance,
texture classification Texture classification
Trust in virtual teams: the use of a directive sentence in Virtual Teams, Swift Trust, Management
the script of the thinklet Control, Thinklets, Computer Socialization
Autonomous Behavior, Behavior
Decomposition, (Internal) Factor Skew-
Two-dimensional behavior decompositions with finite- Primeness, Two-Sided Diophantine
dimensional intersection Equations
Unknown Attribute Value Processing,
Uknown Attribute Value Processing by Hierarchical Hierarchical Trees, Background
Background Tree Knowledge, Data Mining
Unbundling the Access Network: Technical Issues and Access Network, Asynchronous Transfer
Architectures to Boost Mode, Digital Communication, Local Loop,
Open Competition for Telecommunications Services Market Regulation, Unbundling
Unsupervised Stereoscopic Video Object Segmentation Adaptive Neural Networks, Video Objects,
Based on Active Contours and Retrainable Neural MPEG-4, Depth Based Segmentation,
Networks Active Contours
Using Fuzzy Cognitive Maps for the Study of Religious Fuzzy Logic, Artificial Neural Networks,
Behaviour Cognitive Maps, Theology
GI/GI/1 Workload Distribution, Quality of
Verified Computing of the Stationary Workload Service, Result Verification, Enclosure of
Distribution of a GI/GI/1 Server Complex Roots
Computer-Aided Design, Finite Elements
Voltage Presence Indicating System for Medium Voltage Method, Voltage Indicating System,
Switchgear Medium-Voltage Switchgear
Harmonics, Wavelet, Wavelet Packet,
Wavelet Analysis of Harmonic Signals in Noisy Time-varying signals, noise, FFT,
Environment: Application to Industrial Plant Data simulation, industrial data.
Prototyping, Robotics, Automation,
Web Based Virtual Robot Prototyping and Manufacturing Manufacturing, CAD, CAM
System of MHM, static magnetic
Welding Joint Samples Quality Criteria properties
The following papers belong to the
3rd WSEAS International Multiconference on Applied
and Theoretical Mathematics,
Miedzyzdroje, Wolin Island, Poland, September 1-5,
2002
Multimedia Databases, Scheduling,
A Better Heuristic for Multimedia Object Requests Variance Minimization, Client-Server
Scheduling Problem on Two Servers Model.
A Geometrical Approach to Quantum Holonomic
Computation Algorithms
A Method of Order 1 + √3 for Computing the Smallest Eigenvalue problem, Toeplitz matrix,
Eigenvalue of a Symmetric Toeplitz Matrix Secular equation
A Monotone Iterative Method for Bipolar Junction Nonlinear Circuit Model, Semiconductor
Transistor Circuit Simulation Device, ODE, Monotone Iterative Method
Lossless Image Compression, Neural
A New Lossless Compression Method for Small Satellite Networks, Prediction, Peano-Hilbert Scan,
On-Board Imaging Integer Wavelet Transforms
Effects of Multiple C-Band Pumping on the L-Band EDFA EDFA, Gain Flattening, L-Band
Gain Profile amplification, C-Band Pumping
Effects of water-soluble fullerene C60(OH)24 on fullerene, cell line, cell cycle, DNA
proliferation of K562 human erythroleukemia cell line synthesis, mitosis
Electrical charge, Amino acids,
Electric Charge of Protein Amino Acids: Implications Into Classification Golden Mean, Endohedral
Molecular Nanotehnologies fullerenes, Molecular nanotechnology
Energy,Potential,Magnets,Dangerous and
Electromagnetic compatability for the third world Government
Double-shell periodic system, Number
theory, The Klechkovskii's rule, TrifonovΤs
Electronic Configurations in Periodic System, Determined model, Golden mean, Fibonacci numbers,
by Golden Mean: Implications in Nanoelectronics Lucas' numbers.
Market surveillance, EMC Directive, Low
EMC and LV Directive Enforcement in Finland – an Voltage Directive, LVD, electrical safety,
Analysis Using the EFQM Model product safety, EFQM
Encoding methods for fiber optical communication and Encoding, Delta modulation, Reed-
storage systems Solomon codes, Fiber optical, Storage
Exploiting enhanced reliability features in MPLS traffic MPLS, Traffic Engineering, Reliability,
engineered optical speed networks Resilience, Fast Reroute
Fullerene as a nanomaterial: Fullerenes Extractions and Electric arc, Carbon Soots Fullerenes,
Chromatographies with Different Solvents From Carbon Soxhlet Extractions, Chromatographies,
Soots IR, UV/Vis
Intellectual Property Creation and Management of
Nanotechnology Legal Problems
Law of light transmittance, Narrow-band
Law of light transmittance filters, Light theory
Maritime coverage in dual gsm 900 dcs 1800 network of Maritime Coverage, Extended Range
big capacity planning integration and optimisation GSM, Sea Propagation
Mesh Enrichment, Adaptive Mesh
Mesh generator for adaptive numerical solution of Refinement, Adaptive Numerical Solution,
differential equations Delaunay Triangulation
Magnetizable biocolloids, Lipid exchange,
Magnetoliposomes, Magnetophoresis,
Membranes, Nanometer-sized iron oxide
Modification of the surface coat of nanometer-sized grains, Phospholipid transfer,
magnetoliposomes by phosphatidylethanolamines. Phospholipid vesicles
Golden mean, Nanobiology, Clathrin,
Molecular Nanotechnology: Golden Mean as a Driving Microtubules, Molecule C60, Nanotubes,
Force of Self-Assembly Molecular nanotechnology
Thermal Desorption from the Carbon Material Enriched in Nanomaterial, Sorption, Rs Spectrum,
Nanotubes Temperature, Magnetization
Transmission Coefficient Estimation for High-k Gate Device simulation, High-k dielectrics,
Stack Evaluation Tunneling current, Gate stack
Two-Dimensional Modeling of Quantum Mechanical Quantum confinement, Two-dimensional
Effects in Ultra-Short CMOS Devices device modeling, Ultrashort CMOS
Ultra High Speed Packet Buffering using “Parallel Packet High speed Routers, Round trip time,
Buffer” Packet buffer, ATM switch, DRAM
Electromagnetic Transients, Initial And
Using the Volterra integral equations method for Boundary Problems, Nonstationary
investigation of electromagnetic field propagation in a Medium, Integral Equations In Time
non-stationary dielectric layer Domain
Enhanced Aggressive Error Recovery For TCP Noor WLAN Networking Wireless Tcp Ip
Simulation modeling, Business process
modeling, Process maps, e-business,
Evaluation Of Alternative E-Business Models By Business renovation, Business process
Business Process Simulation Modeling reengineering
Robot vision, Computer vision, mobile
robots, inhomogeneous illumination,
Evaluation of object segmentation algorithms as redundant programming, image
components of autonomous video based robot systems segmentation
Filter interpretation for the relations between two-scale Multirresolution Analysis, Digital filters,
sequences of B-MRA's splines Wavelets, Scaling function, Riesz's basis.
On clustering methods for jointly equalization and Channel equalization, Clustering methods,
decoding Combined Equalization and Decoding
On some questions of the theory and practice of the Product integral,Functionally commutative
product integral evaluation matrix, Functionally nilpotent matrix
Privacy, Cryptography, Coding, Data
on the steganography effects in digital images Hiding, Steganography, JPEG, DWT
On-line controller autocalibration based on parameter
predictors: a comparison study
BakerΤs yeast fermentation, State
observers, Kinetics estimators, ODE,
On-line state observers for baker's yeast fermentation Simulation
Optimising Image Feature Extraction Process using Features, Threshold, Optimise, Detection,
Genetic Algorithms Extraction, Genetic, Algorithm
Multipoint conferencing, Signaling, SIP,
Optimization of Signaling Traffic in Centralized Conference server, Traffic optimization,
Conferences using SIP Fault tolerance
Conservative PDES, Event-List,
Communication Network, WAN, Long
Optimizing Conservative Parallel DE Simulation of WANs Delays
Multiobjective optimisation, Task
Pareto Neural Model for Finding Task Allocations assignment, Neural Networks
Control, Spacecraft, Modeling,
Peculiarities of spacecraft “Ocean-O” control in Geomagnetic storms, Aerodynamic
geomagnetic storms moment, Solar Array
Sheet-of-light, Laser range sensor, Smart
Performance evaluation and optimization of a smart sensor, Environmental light, Incidence
range sensor by experimental characterization angle
personal identification using fingerprint verification Keywords: Fingerprints, minutiae,
technique matching, ridges
Pitch Estimation Using Music Algorithm Based On The
Sinusoidal Speech Model Music , Mbe
e-Learning, learning models, distance
Proposed Principles for Context Development of e- learning, learning taxonomies, learning
Learning Training Courses operations and learning principles
Pseudo-articulatory representations
Pseudo-Articulatory Representations and the Use of (PARs), Hidden Markov models (HMMs),
Syllable Structure for Speech Recognition Resynthesis, Phonotactic, Sonority
Image Perception, Retina, Mach Effect,
Receptive Field, Smoothing, Reaction
reaction neuron network model for image perception Neuron Network Model
Reasons in the merging favour of two methods to Key-Words: - PWM converters modeling,
modelling dc/dc pwm converters averaged characteristic coefficients
Speech recognition,Keyword
spotting,Hidden markov model,Support
recognition and rejection performance in wordspotting vector machines,Radial basis function
systems using support vector machines kernel,Linear kernel
Queuing networks,Regenerative
method,Simulation output
Regenerative estimation variants of response times in analysis,Sequential control,Coverage
closed networks of queues analysis
Binary imprint, Parameter, Prototype,
Regions of the accepted tolerance for the recognition of Region of the accepted tolerance,
binary imprints in robotics Distance
Embedded Internet, Embedded Systems,
Remote Monitoring and Control of Electronic Nutrunners Remote Control, Remote Monitoring,
with Embedded Internet Real-Time Operational System
Electrocardiography, Activation,
Resolution limits of electrocardiography: Evidences of a Bioelectrical tissue properties, Unexcitable
model study tissue, Resolution
Real-time database, Data storage, Data
Restraining measurement noise in historical data compression, Data smoothing, Accuracy,
compression Measurement noise
Software for Synthesis of Radiation Patterns by Linear Antenna Arrays, Radiation Pattern
Antenna Arrays Synthesis, Optimization, Gradient Method.
Microphone array, Source tracking, DOA
Sound Source Tracking Using Microphone Arrays estimation
Speckle noise, Synthetic Aperture Radar,
Speckle noise phenomena - Simulation results Monte Carlo methods
speech recognition technology for dysarthric speech Software, Speech, Recognition, Dysarthria
reinforcement learning, apprentice
Speed up Reinforcement Learning in Multi-robot learning, planning, multi-robots and
Domains by Apprentice Learning cooperation
MIMO, Wireless Digital Transmissions,
Statistical Analysis of the Smallest Singular Value in Random matrices, Whishart matrices,
MIMO Transmission Systems Eigenvalues, Singular Values, Statistics.
The effects of spatial correlation and the LOS component OFDM, MIMO, Channel capacity, Spatial
on the capacity of broadband MIMO channels correlation, CSI, Beamforming.
The estimation of convolutional noise in PMC for robust PMC, EM estimation, Convolutional noise,
speech recognition in noisy environments Cepstral domain, Spectral domain
The Estimation of Convolutional Noise In PMC For PMC, EM estimation, Convolutional noise,
Robust Speech Recognition In Noisy Environments Cepstral domain, Spectral domain
The model of expenses management system in Management system, expenses, system
construction simulation
The model of expenses management system in Management system, expenses, system
construction simulation
Using Agents to Reduce Maintenance Cost Complex Intelligent Agents, Software Maintenance,
Software Systems ERP Systems, Web-based Applications
Using Color Histograms to Recognize People in Real Person Recognition Surveillance
Time Visual Surveillance Histogram Color
- Automatic annotation, Speech
using hidden markov models in segmentation of speaker- segmentation, Markov models, Speech
independent connected-digits corpus recognition
Using Previuos Knowledge for Stock Market Prediction - Previous Knowledge, Fuzzy Neural
Based on Fundamentalist Analysis with Fuzzy-Neural Networks, Stock Market Prediction,
Networks Fundamentalist Analysis
Valence topological charge-transfer indices for dipole Valence topological charge-transfer index,
moments Dipole moment, Heteroatom, Steric factor
Various methods application to the research of the
minimizing maximum lateness problem on a single Scheduling, minimize maximum lateness,
machine $1\mid r_j\mid L_{\max}$ single machine, heuristic approaches
Color-flow imaging, Velocity estimation,
Velocity estimation and adaptive clutter filtering for color Autocorrelator, Clutter rejection filtering,
flow imaging Adaptive digital filter design
video object segmentation, Head and
Shoulder Sequences (HSS), Cellular
Video object segmentation for head and shoulder Neural Networks (CNN), color edge based
sequences in the cellular neural networks architecture change detection (CECD)
Multimedia Databases, Finite Element
Method, Galerkin’s Method, Compressed
visual information retrieval employing the galerkin finite images, Content-Based Image Retrieval,
element technique (virgfet) Shape description, image indexing.
Wavelet-Based Digital Image Watermarking using Level Digital Watermarking, Discrete Wavelet
Adaptive Threshold Transform, Level Adaptive Threshold
Wavelet-Based Digital Image Watermarking using Level Digital Watermarking, Discrete Wavelet
Adaptive Threshold Transform, Level Adaptive Threshold
Wavelets, Multiresoltion, galerkin Method,
Wavelet-Based Solution to Elliptic Two-Point Boundary Connection Coefficients, Difference
Value Problems with Non-Periodic Boundary Conditions Formulation
Web-based Multimedia Content Management System for MCMS, J2EE, Personalized news,
Effective News Personalization on Interactive Interactive broadcasting, NODKN, XML,
Broadcasting XSLT, SMIL
globalization, e-business, localization,
content management system,
what might go wrong when trying to globalize e-business globalization platform
WIM: Personalized Information Monitoring Using Block WIM, Internet, WWW, Information
Heading-Trees Monitoring, Block Heading-Trees
WIM: Personalized Information Monitoring Using Block WIM, Internet, WWW, Information
Heading-Trees Monitoring, Block Heading-Trees
Adhoc Networking, Radio Resource
Wireless Adhoc Networks in the Metropolitan/Wide Area: Management, Synchronization, IEEE
Concepts and First Results 802.11
Classification, Search, Text, Linguistics,
Words Classes and Texts Classification Formalization, Word, Class
A Distance Learning Tool for Teaching Parallel Distance Education, Parallel Computing,
Computing Cluster.
network management, distributed
a distributed multi-agent system for network management, multi-agent system, unix,
management on unix environments intelligent agent, gaia methodology
Information security, Human factors,
A framework for human factors in information security System dynamics, Policy design
network; security; security systems;
firewalls; securityNetwork; Security;
Security systems; Firewalls; Security
A Framework for Network Security System Design policy; Network architecture.
A Hardware Implementation in FPGA of the Rijndael Rijndael, Encryption, Decryption, Cypher,
Algorithm FPGA
A load balancing and monitoring service for CORBA- Middleware, distributed objects, OMG,
based applications CORBA, Interceptors, load balancing
An Aspect Oriented Java Virtual Machine Java, OOP, AOP, Codesign, Persistence
Quality of Service, Multicast routing, Multi-
an efficient evolutionary algorithm for QoS-based constrained Steiner tree, Genetic
multicast routing algorithm
Electronic commerce,Small-to-medium
sized enterprise,Iran,Least development
An Evaluation of E-Commerce Support for SMEs in Iran countries,Emperical study
an hw-sw co-design environment for dsp and multimedia Hw-Sw Codesign, Simulation, DSP,
application development and simulation Multimedia, VLIW
an integrated testing and debugging environment for java Java card, Simulator, Testing, Debugging,
card Development tool
Payment protocol, PSAM, Contactless
An Interoperable Payment Protocol for the public transit smart card, Interoperability, Transit fare
fare payment system payment system
Delay model, Interconnect inductance,
Analysis of Clock Interconnects at Mult-GHz Frequencies Parasitic extraction, RLC,
Incorporating Inductance Effeect Inductance,Clock net
TCP/IP, Local area network, Gigabit
Analysis of TCP/IP Protocol Processing in Gigabit network, Measurement, Processing time,
Networks Queuing time
Time Triggered architecture, formal
Application of Synchronous Technology for the Modelling verification, synchronous languages,
and Validation of Time Triggered Systems Lustre
Electronic commerce, Atomicity,
Applying accountability and atomicity to Secure Accountability, Secure Electronic
Electronic Transaction Transaction
Quality of service, routing, scheduling,
Approaches and challenges for guaranteeing quality of resource reservation, Internet, DiffServ,
service in next generation Internet IntServ.
Informational privacy, Web security,
Are Security and Privacy Indissociable Concepts? Privacy invasion
Area redution techniques for synthesis of Asynchronous Asynchoronous Circuits, Codesign, STG,
Circuits in concurrent applications based on STG Complete State Coding and Petrify.
Interface, generation, Hercules, object
oriented programming, system building,
Automatic Generation of Interfaces maintenance
Partitioning, Codesign, Optimization, NP-
automatic multilevel approach for partitioning in codesign Completeness, Parallel Architectures.
System, Balancing method, Stakes,
Balancing different stakes: A system based proposed Stakeholders, Strategic management,
method Stakeholder theory
single rate three color marker, fairness
Bandwidth Fairness of single rate Three Color Marker and throughput evaluation, middleware,
algorithm implementation traffic shaper
Behavioral Variables Determinant of Virtual Retail E-Commerce, Consumer's Behavior,
Shopping: a Study of Brazilian Consumers Internet, E-Marketing, Cybermarketing
E-commerce systems, Ontology
repositories, System integration, E-
commerce networking infrastructure,
Building Ontology Repositories for E-Commerce Systems Interoperability, XML
Centralized Join/leave algorithm for Multicast support in
diffserv domain Multicast, DiffServ, QoS
Hardware/software reusability;
Architecture-based system development;
Service-based collaboration; Intelligent
Co-desing architecture for reconfigurable assembly physical agents; Agent UML; Assembly
platforms automation
digital simulation, wireless, IEEE 802.11
Components Specification for Modeling Wireless IEEE standard, components, reusability,
802.11 Networks software specification
design of a label switch controller for differentiated Internet, Mpls, Switching, Performance,
services in ip and atm integrated networks Forwarding engine, Service differentiation
Policy Management Tool, Policy
Development of Policy Management Tool in Policy Based Information Model, PBNM, Network
Network Security System. Security
difficulties to transport digital certificates in active ANE, active networks, certificates
networks transport, hostile hosts
Distributed denial of service (DDoS),
Network congestion, Protection of
effective traffic control scheme for protecting legitimate legitimate traffic, Malicious traffic, Traffic
traffic from malicious traffic on internet control
Key agreement protocol, Wireless
efficient key agreement protocol using proxy server for Internet, Diffie-hellman problem, Proxy-
wireless communication based cryptosystem, Active attack
Electronic Office, Electronic Signing
Contract – Tele-services – Tele-working -
Web – Java/J2ee – Certificate –
Electronic Trade Solution for Teleservices Signature – Soap- Ssl
Policy based network management, Role
enhanced network security management using role based access control, Role
Evaluation of Dynamic Service Negotiation Models in the QoS in the Internet, service negotiation,
Internet: the Fairness Criterion resource allocation
Quality of Service, Multimedia
Extension of the MACH-RT Kernel to Quality of Service Communication, Operating System, Real-
Control in Multimedia Communications. time, MACH-RT
FPGA Implementation of Three IPSec Cryptographic FPGA, cryptography, IPSec, CAST5,
Algorithms RC4, HMAC SHA-1, VirtexII
Generation of LRD packet traffic by hard quantization of Traffic Modeling, Traffic Generation, Long
FGN Range Dependence, Self Similar Traffic.
Group signature, Undeniable signature,
Signature of knowledge, Unforgeability,
group undeniable signatures Coalition resistance.
Image Processing, Hardware/Software
Hardware/Software Codesign approach for a Vehicle Codesign, Fpga, Vehicle Detection, Traffic
Detector Surveillance
Side Channel Leakage, Differential Power
Analysis, DPA, Electromagnetic Analysis,
How Secure is your E-Purse against Side Channel DEMA, Smart Card, Exponentiation, RSA,
Leakage? Elliptic Curve Cryptography, ECC.
TI Impacts, Remote Work, Groupware
Impacts of the Use of Information Technology in Tools, Recommendations on TI use,
Supporting Remote Team Work: A Case Study Groupware in the Web
Inductive Model for Sensor Power Optimization in Sensor network, Degree of tolerance,
Wireless Sensor Networks Sleep, Wakeup
Electronic Mail, Digital Signature, Domain
Integrating digital signature with message handling Name Registration
Integrating the face verification algorithm into the smart Face Verification, Face Detection, Smart
card system Card
Evaluation - Didactical Modeling -
Internet Projects – International Cooperation Interdisciplinary - Internet
Internetworking with Different QoS Mechanism Quality of Service (QoS), MPLS, DiffServ,
Environments Internetworking, BA, PHB
Network security, Intrusion detection, IDS,
Intrusion Detection Based on Patterns of Communication Communication anomalies,
Flows in IP Networks Communication flow analysis
IT infrastructure, information technology,
IT infrastructure: standards and flexibility standards, flexibility
Modelamento de roteadores IP para análise de atraso IP, Delay, Jitter, QoS, Router
WRR, Packet Scheduler, Quality of
Modeling WRR Packet Scheduler with Petri Nets Service
Multicast Caching: Efficient Distribution of Encrypted
Content to Mobile Clients
nil nil
Mobility Models, Wireless Modeling,
Mobile Communications Systems,
on border effects in mobility models of wireless Modeling and Simulation, Norder Effects,
communications systems User Movement.
Chomsky Hierarchy, Languages
Classification, Parallel Input System.
On Languages --- A Reflection Parallel Dual-Quincunx.
papílio, an encryption algorithm compatible with forward Security, Cryptography, Viterbi algorithm,
error correction technique Convolutional coding, Encryption
Optimization, Np-completeness, Sat, Max-
sat, Genetic algorithms, Simulated
annealing, Taboo search, Hybrid
PARME, an environment for Max-Sat problem solving algorithm, Parallel architectures.
Testing the efficacy of an intrusion signature Security, Intrusion, Signature, Model, Ids,
representation model Xml
Keywords: chaotic system, adaptive
control, unstable periodic orbits,
The control optimization of dynamic systems evolutionary strategies.
The Efficacy of E-Procurement to Businesses: Lessons Internet, E-commerce, E-procurement,
Learnt from Malaysian Industries Opportunities, Challenges, Industries
The Implementation of the MAC (monitor, Alarm and MAC, Digital, Broadcasting, MMAC,
Control) System for Digital Terrestrial Broadcasting SMAC, control, monitor, alarm
A neural network applied to map and to compute Power system, neural network, lighthning,
overvoltages related to lightning in power systems gronding systems, identification
Biometrics, Fingerprint identification,
A New Algorithm of Fingerprint Enhancement Enhancement, Singular Point, Filter
Model reference adaptive control,
A New Multivariable Robust Model Reference Adaptive Multivariable control, Robust Adaptive
Controller Control.
Code division multiple access (CDMA),
Multi-user detection (MUD), Parallel
a new nonlinear multistage parallel interference interference cancellation (PIC), Steepest
cancelation in multi-user detection for CDMA descent method and Hyperbolic tangent.
Reconfigurable Computing, Fpga,
Microcontrollers, Codesign, Biological
A reconfigurable architecture for multi-context application Application
Predictive Maintenance; Three-phase
induction motor; Motor Current Signature
A Rough Sets Based Classifier for Induction Motors Fault Analysis; Rough Sets based classifier;
Diagnosis Fault diagnosis
Current mode, Floating gates, Translinear
A Second Generation Low-Voltage Current Conveyor circuits, Positive feedback.
A simple regulators optimization method for a Optimization; Induction motor drives;
thyristorized controlled induction motor drive system Regulators
Power Electronics - Control - DC-DC
A Simplified Method for Controlling DC-DC Converters Converters- Sliding mode control - Non
Using Sliding Mode Control linear control
On-lattice random walk, self-avoiding
A simulation and a study of random walks walk, simulation, visualization
computer vision, 3d motion, 3d structure,
nonrigid motion analysis, finite element
method, deformable models, physically
A study of 3d motion and structure estimation using FEM based modeling.
Human activity system, HAS, Soft system,
A system approach to identify stakeholders’ stakes Stakeholder, Stake, System
A Theoretical and Experimental Investigation for a New
Reduced and Reliable Life Time Estimation Method of A New Method, Lifetime, Estimation and
Insulating Materials Electrical Insulating Materials
VRML, Avatar, Virtual Medical Office,
Layer Representation, Art of Illusion,
A Three Dimensional Humanoid Layer Model Modeling Tool
Multivariable control - Model reference
A Three-Phase Uninterruptible Power Supply using adaptive control - Robust adaptive control
Multivariable Repetitive Robust Model Reference - Repetitive control - Uninterruptible power
Adaptive Control supply
order and chaos in a food web consisting of a predator Food web, Functional response, Stability,
and two independent preys Chaos, Strange attractor, Bifurcation.
P-adic Dynamics, Cycles, Cognitive
P-adic Dynamical Systems and Applications Science, String Theory, Image Analysis
Power System Stabilizers Tuning, Parallel
Genetic Algorithms (PGA), Cluster
Parallel Genetic Algorithms Applied to Damping Computing, Master-Slave PGA, Multi-
Controllers Tuning on a Linux Cluster of PCs Population PGA.
Feedback linearization; uncertain
systems; tracking systems; nonlinear
parameter identifier with full-state measurements applied systems; parameter estimator; magnetic
to a magnetic levitation system suspension.
Pareto Distribution. Application to Analysis of Extreme Generalized Pareto distribution, Numerical
Wind Speed. simulation
Wavelet transform- linear prediction-
partial discharge site location as a condition monitoring detection and location-condition
tool in power cables monitoring-partial discharge-cable
Particle Swarm Optimization versus Genetic Algorithms Particle Swarm Optimization, Genetic
for Fitting Fuzzy Membership Functions Algorithms, Fuzzy Membership Functions.
Control, Spacecraft, Modeling,
Peculiarities of spacecraft ΥOcean-OΦ control in Geomagnetic storms, Aerodynamic
geomagnetic storms moment, Solar Array
k-u distribution, Nonselective fading,
Performance Analysis of Binary and Quaternary Average error probability, Digital
Modulations modulation.
The Influence of Generator Voltage Control Modeling Voltage control, transmission loading,
on Transmission Network Loading Assessment generator model, voltage stability
Digital, TV, Broadcasting, HPA, Control,
The HPA Control System of Digital Broadcasting System Remote
Deregulation, IPPs, Open Access, Project
The Impacts of Tightening Credit and Lack of Liquidity on Finance, Power Marketing, Risk
Partially Deregulated Power Markets Management
Modeling and Simulation,
The Study and Simulation for the Sympathetic Transformers,Sympathetic,Substations,
Phenomena in Transformers Inrush Current
Three Dimensional Modeling of a Virtual Medical Office Medical Office, Virtual Reality, VRML, 3D
in a Medical Area Modeling, Avatar
Topological Rings for Neural Network Preprocessing in Neural networks, Physics, Preprocessing,
Calorimetry Pattern recognition, Calorimetry
Fuzzy systems, Optimization problems,
Tuning of Fuzzy Inference Systems Through Parameters estimation, Time series
Unconstrained Optimization Techniques analysis, Neural systems
Uncontrollability, Feedback Equivalence,
Uncontrollability of Multi-Input Dynamical Systems Uncontrollable Mode, Perturbation, Matrix
Depending on Parameters Pair, Versal Deformation
Wavelet-based Solution to Time-Dependent Two-Point Wavelets, Multiresolution, galerkin
Initial Boundary value Problems with Non-Periodic Method, Connection Coefficients,
Boundary Conditions Involving Advection Difference Formulation
Workspace Fuzzy Modelisation and Robot Navigation in Mobile robot, fuzzy, robot navigation,
Dynamic Environments dynamic environment
A fully integrated cmos pll for frequency synthesizer Phase-Locked Loop, Operational
using gm-c filter Transconductance Amplifier, Gm-C Filter.
E-commerce automation, Architecture,
a grid architecture for e-service: its components and Semantics, Workflow, Integration,
composition Composition.
A Modeling and Analysis Methodology for DiffServ QoS QoS, DiffServ, OPNET, Modeling,
Model on IBM NP architecture Simulation, FSM, CLS-40.
Sagas, Kangaroo transactions, hop, Joey
A Modified Kangaroo Model For Long Lived transaction, Joey infiltration, Joey
Transactions Over Mobile Networks infiltration manager
Code division multiple access (CDMA),
Multi-user detection (MUD), Parallel
a new adabtive nonlinear multistage parallel interference interference cancellation (PIC), Steepest
cancelation in multiuser detection in cdma descent method and Hyperbolic tangent.
Genetic algorithms, Image segmentation,
A new approach to image segmentation using genetic Object extraction, Mathematical
algorithm with mathematical morphology morphology, Optimization.
Camera calibration, Neural network,
Multilayer perceptrons, Projection, Back-
A new neural network structure for camera calibration projection
A Novel Framework For Business To Consumer E- E-commerce, E-Trust, Third Party, E-
Commerce Security, and Framework
A Novel Image Processing Approach For Qualitative Image Processing, Transportation, Pattern
Road Traffic Data Analysis Recognition, and Segmentation
A novel wide operating range technique of delay-locked Delay-locked loop, Frequency selection
loop with frequency selection block block, Voltage controlled delay line.
Click and Brick: Retailing Realities for the Future E-Commerce, Internet, E-Tailing
Fuzzy c-Means Clustering Designed FLC for Air- Fuzzy logic controller, Fuzzy c-means
Conditioning System clustering, Air conditioning system.
Fuzzy Logic Based Yaw Steering of a Micro-satellite in a Micro-satellite. Attitude Control, Fuzzy
Low Earth Orbit to Compensate for Earth Rotation Effect Logic, Remote Sensing.
Co-evolution, Digital halftoning, Genetic
Generating and Testing Halftoning Filters Co- algorithms, Software testing, Test image
Evolutionarily generation
Cryptography, cryptanalysis, genetic
Genetic Algorithm Utilization of Timing Attack Prospect algorithms, timing attacks, RSA, key
for RSA Cryptoanalyst. search.
call admission control, Code Division
Genetic-Algorithms-Based Fuzzy Call Admission Control Multiple Access, fuzzy logic control,
for CDMA Cellular Systems genetic algorithms
Cluster, Single System Image, Global
Glosim: Global System Image for Cluster Computing Working Process, IPC
GPS Based Azimuth/Gradient Determination for Land GPS, Attitude Determination,
Vehicle interferometry, land vehicle
HDL Synthesis and Simulation of SLMS Adaptive Filter LMS Adaptive filters, SLMS algorithm,
Algorithm for Echo Cancellation of Speech-Band Data Echo cancellation, HDL Simulation, High
Transmission speed architecture, FPGA implementation
high performance adaptive kalman equalizers in dsss Kalman Equalize Learning Rates Spread
receivers to combat worst channel fading and isi Spectrum Bit rate
Hybrid System Modeling Using Impulsive Differential Hybrid systems, Impulsive differential
Equations equations, System theory
Motion planning, path planning, trajectory
Implementation and Comparison of different Algorithms planning, visibility graph approach, frame
in Path Planning buffer approach, algorithms.
- e-commerce, communication,
Improving Communication in e-Commerce Applications compression techniques
power conversion efficiency of airborne parametric array Parametric Array, Ultrasonic, Audio Beam
Nonlinear Hybrid System, Powertrain,
Powertrain Hybrid System Optimization Using Dynamic Modeling, Control, Dynamic Programming,
Programming Optimization
prediction of errors and improvement the position
accuracy on low cost gps receiver with adaptive neural Improve the position accuracy - Low cost
networks GPS receiver - Neural network
Mobile Agents, Agent Security, Malicious
Protecting Mobile Agents against Malicious Host Attacks Host, Threat diagnostic tree.
reduction of coding artifacts using recursive line filtering coding artifacts, post-processing,
based on a fuzzy model algorithm, fuzzy logic
relation between video bitrate and frame size in arbitrary Arbitrary downsizing transcoding, bitrate,
downsizing transcoding frame size
Relation Between Video Bitrate And Frame Size In Arbitrary downsizing transcoding, Frame
Arbitrary Downsizing Transcoding size, Bitrate
Optical Wireless Links, Free Space
Optics, Atmospheric Transmission
Reliability of Optical Wireless Links Medium
BSP
model,NOWS,Parallel
computing,Cost
Research on Parallel Computing Model of BSP in the formula,Accelerated
NOWs adapt Environment ratio,Linear
Risks, assets and security in view of E-activities design Assets, E-activity, Risk Assessment,
and implementation.H. Security
Fuzzy control, Robust control, Adaptive
robust adaptive fuzzy controller design for wing rock law, Neural network, Limit cycle, Wing
syetems rock system
Robust output tracking, Uncertain
robust output tracking of siso nonlinear systems with nonlinear systems, Input/output
partially known uncertainties linearization, Lyapunov method
Hybrid systems; Tracking; Disturbance
rejection; Robust control;
Robust tracking and disturbance rejection in linear hybrid Servomechanism problem; Linear
systems systems.
Wafer map editor, Rule-based, Dct, ADC,
Rule-Based inspection of wafer surface SSA
AR Modelling, Optimal AR order, AR order
Sample Size and Optimal AR Order Selection for Natural criteria, Near optimal AR order, Sample
Signals size, Natural signals
Cooperative software development,
Secure Cooperative Software Development for Secure development environment, Pattern
Handwritten Character Recognition recognition
XML Security, Wireless Devices, Mobile
secure mobile commerce based on xml security Commerce, Java
Security Management, Intrusion
security management system for iIntrusion detection Detection, Policy, JSP
simplified algorithm of generalized predictive control Generalized predictive control, Neural-
based on neural networks networks, Nonlinear, Real-time
Independent component analysis,
Statistics of feature extraction by topographic Topography, Natural images, Higher-order
independent component analysis from natural images statistics
e-governance, birth registration, social
Steps Toward e-governance: Analyzing necisity of e- security, Immunization, health , Vital
dentity of citizen in Bangladesh Statistics
e-governance, birth registration, social
Steps Toward e-governance: Analyzing necisity of e- security, Immunization, health , Vital
dentity of citizen in Bangladesh Statistics
Key-Words: nitrided oxide, dynamic
Fowler-Nordheim stress, interface trap
Study of interface trap generation caused by dynamic generation, DCIV technique, power law
Fowler-Nordheim (FN) stress on nMOSFETs behavior.
Wavelet transform, Image texture ,
Feature extraction, Genetic algorithm,
texture classification using wavelet packets with genetic Multi-resolution analysis, Texture
algorithm as a tool for threshold selection classification
the design and analysis of an expansible digital pulse Pulse Compression, Radar, FIR filter,
compressor for coherent integration radar in time domain FFT, DSP
The Efficient Authentication and Key Exchange Protocol
suitable for Mobile Environments Key exchange, Password Authentication
Industrial Ethernet, Profibus, AS-interface,
The levels of communication in PLC (Programmable Triaxial Networks, twisted-pair network,
Logic Controller) systems And - where each one is used Optical network
The Multimedia Messaging Center (MMC) – An MMC, JoinNet, Encryption, Authentication,
Innovative Solution to Distance Collaboration and E- QoS, Firewall, Recording, Playback, MCU
Learning Relay
intelligent control, fuzzy systems, multi-
The Simplified Action of Intelligent Fuzzy Control For A variable system, industrial process, non-
Multivariable Industrial Process linear system, computer applications
Time-Frequency Analysis, Wavelet
Time-Frequency Analysis of Ultrasonic Echo for the Transform, Ultrasonic Echo, Attenuation,
Nondestructive Evaluation of Material Damage Velocity
Authentication, Trusted Path, E-
Trusted Authentication between User and System Commerce, Internet server
ip-based wcdma solution for advanced wireless services 3G, all-IP WCDMA, UMTS, RAN, QoS,
provision OSS, Wireless Multimedia, Mobile Internet
Time-frequency signal analysis,
Least Squares Multi-window Evolutionary Spectral Evolutionary spectrum, Multi-window
Estimation Gabor expansion.
low delay 16 kb/s wideband speech coder with fast Low Delay CELP, G728, Backward LPC
search methods analysis, Algebraic Codebook
Speech Processing, Speech Production
Model, Linear Prediction, Vocal Tract
LP-based Graphical Visualisation of the Vocal Tract Model
Speech Processing, Speech Production
Model, Linear Prediction, Vocal Tract
LP-based Graphical Visualisation of the Vocal Tract Model
Making Interactive Electroacoustic Music with Computer
through the Use of RTMix -- a Real-Time Interactive Computer, Music, Interactive, RTMix,
Electroacoustic Music Performance, Composition, and Linux, Electroacoustic, Open-source, Art,
Coaching Interface Computer-aided.
Mining SNP associated with disease to annotate non- Genome annotation, Orthologous,
documented transcription factor binding sites localizable Paralogous, Pseudo genes, Transcription
at the related genes factor binding site, SNP
Mining SNP associated with disease to annotate non- Genome annotation, Orthologous,
documented transcription factor binding sites localizable Paralogous, Pseudo genes, Transcription
at the related genes factor binding site, SNP
Modeling stock price volatility using data from the order Volatility, Forecasting, Order book,
book Geometric Brownian motion, Price vector
427
Djarfour Noureddine, Baddari Kamel, Djeddi
Mabrouk 384
E. Macer-Story 446
K. Lavangnananda 380
D. Huynh 336
Changchun Li 101
Cesar A. Coutino,
Josi Torres-Jimenez 287
262
YAN LI 230
Carlos Sanchez-Lopez, Alejandro Diaz-
Sanchez, Esteban Tlelo-Cuautle 155
Francisco Martinez, Guillermo Sanchez,
Bonifacio Rugerio 270
Sumit Chachra,Nagender Parimi,Shyam
Chander 196
261
Enescu Mihail, Chiliment Ilie, Pechi
Constantin, Mondiru Denisa, Ivan Cosmin 300
I. Boumhidi 443-127
Magnus Mossberg, Michel Gevers, Olivier
Lequin 443-193
443-196
443-92
Yan Li 443-88
443-95
Yiming Li 361
A.Flegontov 779
488
K. H. Edelmoser 730
D. Varoutas, T. Sphicopoulos, A.
Arapoyianni, D. Syvridis 750
George Economakos 792
N. A. Stathopoulos 441
550
347
K.E. MELKEMI
M. BATOUCHE 476
V. N. Christofilakis, A. A. Alexandridis, P.
Kostarakis, K. P. Dangakis 323
490
Stefano Bregni,
Riccardo Melen 617
Yiming Li 446-177
446-200
445-128
I. N. Keleberda, N. S. Lesna, S. D.
Makovetskiy 445-175
445-126
445-129
445-127
445-87
J. P. Setrajcic, S. K. Jacimovski, D. Rakovic,
D. I. Ilic 445-109
445-94
447-371
Yan Li 447-281
447-92
H. g Gonzalez-hernandez, M. Montiel-
castellanos 447-220
A.M.PASHAYEV, R. A. SADIQOV,
S.G.ALIEV 447-100
447-311
447-109
447-63
Ye Bin 447-125
447-347
447-77
447-126
Margaret Jefferies, Wai-Kiang Yeap, Jesse
Baker 447-381
447-105
P. Lavangnananda 447-271
447-72
447-71
447-283
447-69
447-111
448-194
K. Ben chehida, P. Guitton-ouhamou, C.
Belleudy, M. Auguin 448-190
José Eduardo Malta de Sá Brandão,João
José Costa Gondim,Patrícia Sumie
Hayakawa,Marco Antonio Reis Henriques 448-140
Flavio Silva, Emilio Yamane, Rodrigo
Campiolo, Joao Sobral 448-174
448-244
Lúcio Flavio Vismari, Ricardo A. Veiga
Gimenes, João B. De Camargo Jr., Jorge R.
De Almeida Jr. 448-150
Sang-Man Ahn, Soo-Hyun Oh, Dong-Ho
Won* 448-148
Eunjung Kwon, Hansung Koo, Ohyung Kwon,
Chiduck Ahn 448-209
449-245
B. P. LUCENA, L. M. BRASIL, T. L.
MACHADO, C. B. MÉLO 449-250
Nian Li 449-254
A.Anuytin,V.Stasevich 449-137
449-117
449-116
JOSÉ CARLOS TEIXEIRA, NATÁLIA
PROVIDÊNCIA, JOÃO DA PROVIDÊNCIA,
GONÇALO CARVALHO, JOÃO DA
PROVIDÊNCIA JR 449-273
M.C.Gouveia 449-229
Luciane Canha, Vladimir Popov, Felix Farret,
Daniel Bernardon, Andrώ Konig 449-145
449-268
Xiaodong Zhuang, Qingchun Meng, Bo Yin,
Wenli Dun, Hanping Wang, Jijun Zhang 449-201
M Y Siyal 451-208
Yongtae Do 451-317
M Y Siyal 451-204
M Y Siyal 451-207
Wen-Ching Chang, Chun-Hung Lien and
Tung-Chi He 451-277
J.Roushanian,F.Nadjafi 451-157
Mi-Ryong Park, Joo-Myung Seok, Kyou-ho
Lee 451-298
Inge Koch and Belinda Faddy 451-231
M Y Siyal 451-206
451-287
451-129
Hing-Yan Lee, Khee-Erng Lau, Chun-Keat
Wong 451-198
451-254
451-160
451-253
Valeriy Alekseevich Udaloy, Nikolay
Mihailovich Ivanov, Nikolay Leonidovich
Sokolov, Vladimir Urievich Pazdnikov 451-113
Valeriy Alekseevich Udaloy, Nikolay
Mihailovich Ivanov, Nikolay Leonidovich
Sokolov, Vladimir Urievich Pazdnikov 451-112
451-140
Zhengmao Ye 451-144
451-141
452-209
D.a.Linkens,C.h.Ting.A.Angel 452-242
T.Newe,T.Coffey 452-214
452-63
M. Flissi 452-160
H. SAYOUD, S. OUAMOUR and M.
BOUDRAA 452-251
I-Ching Yang, Ying-Ying Chen, Beverly Chen,
Chi-Ching Chen 452-105
Jari Turunen, Damjan Vlaj, Pekka Loula,
Bogomir Horvat 452-207
452-114
M. Planat 453-162
M. Mahmoud 453-148
M. Mahmoud 453-149
453-106
Valeriy Alekseevich Udaloy, Nikolay
Mihailovich Ivanov, Nikolay Leonidovich
Sokolov , Vladimir Urievich Pazdnikov 453-103
M. Planat 453-161
M. Mahmoud 453-150
453-105
E.Macer-Story 453-130
Valeriy Alekseevich Udaloy, Nikolay
Mihailovich Ivanov, Nikolay Leonidovich
Sokolov, Vitaliy Valerievich Astafiev 453-124
453-107
In this paper, a new on-line measurement and accuracy analysis method for part configuration and surface is presented by
vision and neural networks. Different from conventional contact measurement, it is non-contact measurement method,
In this paper, a 3D reconstruction approach based on wavelet analysis and neural networks is presented. It can be used in
The approach can be divided into two parts. First, the stereo matching problem is solved with wavelet analysis.
This paper presents a Bandpass μUμG Modulator, which can be used in the new generation wireless communication rece
signals to the digital domain at the intermediate-frequency (IF). The modulator is implemented in the UMC 0.5μgm CMO
In this paper, we describe a BIST testability metrics-based algorithm for operation scheduling and data path allocation. It is
testability analysis algorithm at register-transfer level. In our approach, mod- ule and register allocation are
This paper presents an adaptive PID controller for MIMO (multi-input multi-output) systems having a polynomial input nonli
system is decomposed into MISO (Multi-input Single-output) subsystems. By this decomposition, the identification, d
Iterative Feedback Tuning (IFT) is used for tuning PID controllers for the case when it is of interest to reach a new set poin
possible. A special variant of the IFT criterion is used, where zero weighting is applied during the trans
In this paper we study the mathematical foundations of the phenomenon of multiplicative scaling of synaptic weights (stren
learning rule that gave rise to the entire neural network area is only an approximation of what happens in Centra
A hybrid Neural-Genetic algorithm (NG) is presented for FPGA Segmented Channel Routing problems (FSCRP). The NG
Hopfield Neural Network (HNN) which manages the problem constrains, hybrided with a Genetic Algorithm (GA) for impro
In this paper, a new method for edge detection based on Support Vector Machines (SVM) is presented. This method impro
edge detection with SVM by reducing the execution time and upgrading the visual quality. Our work shows that a ne
This study addresses a new approach to the Hardware/Software partitioning problem focused on the integration of commu
during design space exploration. Frequently in this phase most communication channel features are ignored, since commu
This paper presents a new approach to image segmentation using genetic algorithm (GA) in conjunction with morphologica
proposed method consists to classify each pixel of the image in pixels belonging either to the object or to the backgro
Sigma-Delta Modulators (SDM) have been extensively used in signal, speech and image processing. They avoid many of
encountered with conventional methods for A/D an D/A conversion and compromise extremely few components compared
A video frequency linear-phase switched-capacitor (SC) low pass filter has been designed and fabricated in a 0.35-um CM
filter employs a very simple clock programmable scheme for the different low pass corner frequencies to meet the exi
System-on-chip (SoC) designs provide integrated solutions to challenging design problems in the telecommunications, mu
electronics domains. Much of the progress in these fields hinges on the designers ability to conceive complex elec
This paper presents a new recursive formulation for Walsh-Hadamard Transform (WHT) that allows the generation of high
multidimensional (m-d) WHT architectures from lower order (shorter sizes) WHT architectures. Our methodology is
This paper presents a prototype of a self-developing neural network architecture, named Neuromorphic Autonomous Cont
control a discrete event feedback system, this architecture is conformed by layers of lined up modules, each modu
A simplified suboptimum algorithm for radiation source localisation by passive Multisite Hyperbolic Systems (MHSs) using
Arrival (TDOAs) measurements is suggested and analysed. It is shown that the accuracy of the simplified algorithm
Sound localization plays a crucial role in the perceptive function of living beings, being vital for the survival of many animal
an important role in human-machine interaction and robot interaction with its environment. In the ty
In this paper, it is presented an algorithm that allows the detection and identification of targets with low signal-to-noise ratio
especially suitable for LPI radar systems that rely on very low transmitted powers.
The presence of limit cycles in fixed-point arithmetic implementations of digital filters can significantly impair their performa
algorithm that can be utilized to determine the behavior of such limit cycles is given. Also this paper
In checking the correctness of programs, understanding programs for modifications, assessing the maintainability of progra
for programming, it is required to identify how programs correspond to the specification. Here we focus on an
In this paper, we present our recent experiences with QuiXote, a mobile robot for guided tours inside public buildings. The
obtained during last year are presented, underlying learned lessons during experimentation. The purpose of th
We present a novel implementation scheme for IS-95 CDMA
Reverse Link Transceiver based on Codesign principle. At functional level, the tasks are partitioned between a low-cost ge
and application specific DSP to
optimize power-dela
Although the Controller Area Network (CAN) protocol is increasingly used for real-time critical applications, its original spec
provide a clock synchronization service. In this paper we introduce the architecture of a clock subsystem tha
We are going to show the application of neural networks in one of the critical modules of a text-to-speech system: duration
is the accurate prediction of segmental duration. We present a complete environment in which to decide whic
This paper deals with the application of Radial-Basis Function Networks (RBFN) to radar detection. Attention has been pai
Training Signal to Noise Ratio (TSNR) on detection performance. The influence of the network size has been s
Application of the "perfect" combinatorial configurations involves techniques for design of non-uniform arrays as well for fin
of structural elements for telescope aperture with non-redundant masks, based on wide-aperture interferome
Universal modification of the method of discrete sources (MMDS) is applied for solving of 2D and 3D Dirichlet, Neumann a
problems. The results of its using are illustrated by calculations of the scattering pattern by dielectric (-or perfect
Wavelets technique is applied for solving of 2D and 3D Dirichlet, Neumann and mix boundary problems The developed me
linear Battle-Lemarie functions and Fredholm integral equations (-or a system of the Fredholm integral equations) of
This paper presents an efficient architecture for system level verification of multiprocessor SoCs. We introduce an architec
of existing structures, such as on-chip buses, for core verification and protocol execution monitoring. Th
There are a number of excellent papers and articles talking about the artificial neural networks, and this modest paper doe
with them, but serves as a gentle introduction to artificial neural networks for novices.
This paper starts
In this paper, the general problem of multi-rate systems where discrete-time signals are not synchronized is treated. A mul
extended state is first proposed in section 2. Similarly, in section 3 BMIO model is described [1]. Lifting t
This paper compares the performance of two feature extraction techniques, a full-band technique and a Discrete Wavelet t
multi-band technique, for fixed-text speaker recognition under matched/mismatched acoustic conditions between tra
Multiple alignments of nucleic acid, or amino acid, sequences are one of the most commonly used techniques in sequence
techniques are usually characterized by great computational complexity. We present a stochastic approach based on Gen
This paper proposes a carrier phase estimation of a power efficient APSK signal with a honeycombed constellation at a re
point fixed wireless access systems using quasi-millimeter frequency band. The signal has a lower amplitude le
The continuous detection and correction of unnatural process behaviours, due to special causes of
variations, is a basic task in manufacturing systems to maintain any process stable and predictable. This difficult
task is generally carried out by human
The image processing described in this paper is used for visual quality inspection in ceramic tile production. The tiles surfa
the surface defects and has the influence to the tile quality classification. The described image processin
Osteoporosis is a bone pathology inducing an increased fragility of the skeleton. With the lengthening of the duration of life
to concern an increasing population. A better knowledge of the quality of the bone structure can help a
This paper combine wavelet theory with chirp detection embedded in Additive White Gaussian Noise. To join both theories
of the connection between Wide Band Functions and the Discrete Wavelet Transform. The results are pr
Clock distribution networks synchronize the flow of data in digital systems, and the features of the clock signal affect syste
reliability. The great advances in integration levels and speed requirements in actual digital systems lead to
In this paper, a summary of the work undertaken in the construction of a grammar set and a finite automata which give sup
of an editor/compiler of dynamic WAP pages is presented. The compiler provided support for WML and WMLScript,
De-noising of electrocardiogram signal is studied by the application of wavelet-based approaches. A new thresholding met
linear denosing procedure is offered. The threshold value newly defined is assigned by considering the maximum t
A dual mode digital Automatic Power Control (APC) circuit was designed and integrated in a burst-mode laser driver for 15
applications. The chip can drive most commercially available FSAN compliant laser diodes in almost any circumstances. T
Given the great impact of fiber Bragg gratings in DWDM communication networks we present a MatLab based graphical in
model the FBG parameters to compensate the optical fiber link chromatic dispersion. This tool allows the
A new analytical method for designing digital FIR filters is presented which equates the filter transfer function using Least S
This method in comparison with other analytical approaches of FIR filter make a better approximation for pa
Broadband wireless technology for future second generation macro-cellular non-line-of-sight architecture is globally emerg
alternative to wired technology for meeting high speed data demands of the increasing residential and s
The development of the hardware will allow that the virtual reality extends gradually. They are many their educational appl
presence of this technology in the pedagogic dynamics has diverse advantages and inconveniences: It becomes necess
A method is described to facilitate the implementation of subband correlation of wavelet representations. The technique is
comparing images or image fragments with respect to all translations of a full image, for simultaneous co
Prediction of workpiece-fixture contact forces is important in fixture design since they define the fixture stability during clam
influence workpiece accuracy during manufacturing. This paper presents a solution method for predicting the
In this paper are presented the results obtained by means of a procedure developed for measures of the electromagnetic f
commercial antenna of mobile communications The objective of the measures that have been carried out in a se
The paper deals with a series of noisy images generated from a moving object or several objects. An estimation procedur
shape and some other parameters is proposed that is based on the EM-algorithm.
The evaluation of information retrieval systems is a difficult and arduous task if it is done without computerised support. Sta
response to a set of queries and their relevance judgements, ?e-v@l? computes different values of retrie
Five robot vision algorithms for object segmentation are explained. This algorithms are compared in an experiment. The ai
to check which of this five algorithms are useful for our robotics project in the field of indoor room explora
In this paper we proposed a simple and effective filter design for image denoising and contrast enhancement based on mu
denoising method. Wavelet threshold algorithms replace wavelet coefficients with small magnitude by zero and keep or sh
This paper presents the experimental evaluation of a fully-differential offset-compensated voltage comparator designed for
Flash memory sensing. The comparator is made up by an input buffering stage followed by a gain stage that per
In this article, we propose a new control algorithm with exponetial structure for the position control problem of robot man
demonstrated by taking into account the full nonlinear and multivariable nature of the robot dynamics, tha
In this paper, we will address two computational issues for electromagnetic scattering in layered media: Fast algorithm of c
Green's functions, and fast solver for layered media.
One of the problems in mobile robotics is the estimation of the robot position in the environment. In this paper we propose
positioning model, for estimating a confidence interval of the robot position, in order to compare it with the esti
The alternative approach for speech recognition proposed here is based on pseudo-articulatory representations (PARs), w
approximation of distinctive features, and aims to establish a mapping between them and their acoustic specific
In this paper, one relation-ship between the two-scale sequences which characterize two Multirresolution Ana
derivation, is obtained. The wavelet of one of this MRA is the derivative of the functions of the
In this work, we present an approach for fingerprint identification based on the Finite Element Technique (FIFE). The basic
approach is to generate a feature matrix of the fingerprint employing the standard Galerkin weighted residual me
In this document the Instruction Set Architecture (ASI) simulation issue is discussed. Typical tradeoffs between Flexibility,
shown. Based on hypothesis on Architecture approach (VLIW) and Applications of interest (DSP and Multimedi
We present in this article a Bayesian fusion model for the join segmentation of a set of piecewise stationary process. The e
based on the maximization of the posterior distribution of the change instants conditionally to the process p
Traditional job shop scheduling problems generally supposes that there is a single feasible process plan with which a part
shop. The assumption is hardly true in today’s flexible manufacturing environment. It has great significance t
As modern digital systems consisting of both hardware and software become more and more complex, the testing of thes
their entire system life cycle, including design verification, production testing and field testing, become a more an
We present an environment for designing and implementing Fuzzy-ROM control systems. The environment makes use of
simulink and fuzzy control toolbox for the controller design and simulation, and uses Mentor Graphics products like FPGA-
There are exist several robust feedback controller have been developed for manipulator [1]. Typical techniques are based
[2],[3], Lyapunov Min-Max technique [4], Variable Structure System [5] and Hoo controller [6]. All methods have
This work deals with real image segmentation and labeling by means of texture identification of the scene's objects. The pr
on texture classification by comparison with a database that stores series of each texture perceived with succ
Image compression often leads to undesired artifacts. This paper shows an image restoration approach to correct for these
associative memory. Investigations for modeling the coder-decoder process by a linear system are described. A compens
Projective framework provides useful cues of 3-D structure even without metric information or calibration processes. Howe
to suffer from the image noises. In this paper, an application of the projective framework to image syntheses
In this paper the implementation of fragment digital Cellular Neural Network (CNN) for image processing on the Field Prog
(FPGA) and it's experiment results are present. The high processing speed of the network is use to provide real ti
In this paper, an efficient realization of the Least Mean Squared (LMS) error, Generalized Sidelobe Canceller (GSC), appl
beamforming, is presented. The GSC method provides a simple way for implementing adaptive Linear Constraint Minimum
Nowadays there is a great amount of classifiers. Nevertheless, the results of these do not always satisfy the requirements
example, it would always be desirable to have zero errors. In order to try to get better results than those
The present article shows the evolution of the application of the Direcci≤n General de Trάfico to set in motion traffic manag
incidences. The development of the plans goes from the first versions in paper format up to the definitive version
Hough transform is one of the most common methods for detecting shapes (lines, circles, etc.) in binary or edge images. It
to detect discontinuous patterns in noisy images, but it requires a large amount of computing power. This
In this article we deal with the problem of modelling the sensory behaviour of sensors in a low cost robotics system, model
taken measurements and fusing different measurements, in order to improve the quality of the information
This paper aims to present a proposal where these moves may be detected starting from previous set up standards, allow
be taken in such a way as to minimize even to prevent that these threats become facts. Initially we will describe t
In this paper considered optimal maximum a-posteriori probability (MAP) estimation in the synthetic aperture radar. Propos
derived for the random scene model, which may be characterized by amplitude/phase fluctuation of the reflected elect
The present article explains and describes the selection of the empirical propagation model proposed in ITU recommendat
other models, for sea path propagation modelling, being based on measurements. The objective is the Planning and
There are various Mission Control Centers (MCC) in many countries. But analysis of the existing literature proves absence
structure optimization although optimal structure of MCC could allow to increase profitability of mission cont
The new generation of Internet applications which permit the development of activities of electronic commerce are charact
two new elements: mobility and wireless connections. In this paper is summarized the process developed in
In this paper presented algorithm for the main statistical characteristics (input signal covariance function, time domain) esti
aperture radar. Considered approach was considered for the stochastic models of the scattered electromagneti
A method for mosaic image reconstruction is proposed as a multiscale algorithm intended for use in such image processin
selective treatment is required for different image fragments. It is based on piecewise-constant image approximation us
We present a new Markov Random Fields model-based algorithm for image segmentation achieved by a robust heuristic c
Optimization. This heuristic is inspired by Self-Organized Criticality. The general-purpose of this algorithm is to find a co
The backpropagation algorithm can be used to train multilayer networks. Backpropagation is an approximate steepest des
the performance index is the mean square error. It is realized the training of a two layer perceptron to approxi
A new approach for Multi-Port Network Modeling (MNM) of multi-layer planar circuits containing slots is introduced. Genera
formulation for aperture problems is combined with OkoshiΤs model for planar circuits to obtain a unified circuit model
In spite of impressive achievements in radar subsystem technology, traditional radars cannot in many cases meet modern
requirements to radar information. One promising way is to move from the individual radar to the Multisite Radar Sy
The trend in programmable architectures for digital signal processing (DSP) is to move towards high-level language progra
requirements for compilers to efficiently exploit the instruction level parallelism in modern processors. In th
By using restrictive equivalent transformations, a new parameterization of all causal observers for generalized dynamical s
The mechanism of the derived observers is also analyzed.
Russian-Ukraine spacecraft ΥOcean-OΦ (S/C) was launched on July, 17, 1999. S/C is controlled from Mission Control Cen
M), town Korolev, Moscow region. Purpose of the S/C ΥOcean-OΦ is operative reception of Earth and World ocean remot
The purpose of this work is to predict the performance of a codesign system, in terms of execution time, considering the ha
characteristics and those of the target architecture. This allows us to decide whether the critical function should
This paper describes a new neural network able to adapt itself, both its parameters and its structure, to a data set in real-ti
adaptation is based on a non-supervised learning procedure. The new neural network can automatically create i
In this paper, one relation-ship between the two-scale sequences which characterize two Multirresolution Ana
derivation, is obtained. The wavelet of one of this MRA is the derivative of the functions of the
Relief can be presented on maps in various ways, and its presentation by means of shading offers an adequate idea by vis
features and relief extension. In this paper the research has been made of various softwares (Surfer, SCOP, Arc
This paper introduces some experimental results yielded by ARIES, the new high- resolution radar developed by Indra Sis
operation with the Universidad Politώcnica de Madrid and the Spanish Ministry of Defence. This system is primarily aime
This paper focuses on the network infrastructure security measures currently proposed and at a certain point deployed in l
mechanisms proposed for network control protocols -mainly layer three routing protocols- are studied and their
The following is a proposal for separating cursive characters into separate and distinctive characters for recognition.The pr
with thresholding of gray level image into binarised image using iterative thresholding selection method.The
Abstract: An appropriate procedure making possible to evaluate the sensitivity of a MESFET small-signal model to the una
errors is presented in this paper. This technique which is based on the calculation of the condition number has
In previous papers, [1] the existence of an additional energy to the electromagnetic has been described and designated as
fluidice]. This living energy operates to transduce information into the electromagnetic, molecular continuum fro
This paper present an initial Input Shaping implementation for flexible machines with pneumatic actuators. Some pneumat
for basic shapers characteristics. Non linear pneumatic dynamic reduces shaping performances, to overcome this
In this paper an analysis is carried out of the possible approaches to the problem of the theoretical determination of the ele
emission levels and some primary solutions are proposed considering different situations. We will focus our a
This paper presents a new and simple fuzzy neural network based on structured fuzzy logic processors. The modifications
logic processors provide the equality index. The major advantage of the proposed network is that the learning
The Trainable Expert System (TXPS) is a new approach to supervisory control of time-variant processes. The main objecti
easy acquisition of knowledge and a reasoning interpretable by the human operators of the process. To attain th
Transmission of high quality audio over telecom networks requires specific synchronization schemes. It is necessary to ma
fidelity over several signal parameters. Particularly important is to achieve a effective synchronization betwe
In this paper a Cellular Fuzzy Associative Memory containing fuzzy rules for gray image fuzzification is designed, consider
CNN-based architecture able to store bidimensional patterns. After establishing the fuzzy rules which charact
We present in this paper a methodology for the industrial Automation Engineer to help him design, build and run computer
containing, physical and software parts. This methodology enables him to define a system through its requirements and it
Autonomous mobile robots develop their activity immerse in a physical environment that they must share with people. Cha
environment are only partially known at the moment of robot programming, and could change during the robot's life c
This paper analyses and implements a bandpass μUμG modulator with a pseudo-N-path resonator using one Op Amp onl
directly digitize the 10.7 MHz IF signal in a radio receiver with 40dB Dynamic Range. A pseudo-N-path resonator can be u
This paper deals with speech activity detection in noise. The approach is based on the similarity measure between the no
prediction residue. A multi-band decision applied on the coherence function, used to measure the similarity, consti
Recently, the Internet has become a prime communication tool for many users world wide. Neither its still increasing popul
of its use seem limited today. One of the hardly known possibilities is the remote interactive real-time
Reliable information on the heat distribution inside biological tissues is necessary for the planning and optimization of expe
obtain the electromagnetic field and heat inside biological tissues for interstitial microwave hyperthermia,
This paper presents a personal view about the utilization of new tools for education. In particular, the observations and res
based on the experience of the authors who cooperated to teach in a course on rapid prototyping, and their
Most of the specialists in educational technology defend the integration of the ICT (Information and Communication Techn
learning processes. However, they are few the studies that are centered in the adaptation of classrooms and educ
This work presents a solution for self-positioning (i.e. heading angle and offset) a vision system with respect to a line and t
single vision system. The tools Hough transform and camera model are used to obtain the position of the ca
Sample-and-hold circuits are usually used to be the front-end of the analog circuit. It can transform the continuous time sig
signal that is suitable for the sampling of the main circuits. This paper presents a new low voltage samp
In this paper we present a comparison analysis of the most important graphical models of object-oriented databases. Thes
compared with the graphical model (UserΤs View Ψ UV) of GOQL - our graphical query language for object-oriented datab
We solve the density-gradient equations using the hybrid monotone and Newton's iterative methods for ultra-thin oxide (<
This novel hybrid solution methodology provides a stable, efficient, and fast simulation technique to solve the h
The usual way to determine the number of hidden units in Multilayer Feedforward networks is by a trial and error procedure
constructive algorithms which change the neural network structure during training. In this paper we propos
If transferred with AAL (ATM Adaptation Layer) Type 1 cell in ATM network, low speed data like speech would use network
So AAL Type 2 is generally used to increase bandwidth utilization in voice-over-ATM network. AAL Type 2 connec
A storage area network (SAN) is a high-speed special-purpose network (or subnetwork) that interconnects different kinds o
with associated data servers on behalf of a larger network of users. In SAN, computers service local file reque
In this paper, we apply our earlier proposed parallel and adaptive triangular mesh simulation technique for the numerical s
quantum correlation drift diffusion equations. We solve the 2D drift diffusion equations coupled with a gene
Due to the dynamic behavior of the network traffic, a suitable congestion control remains a critical issue especially for mult
In contrast to the typical increase-by-one decrease-to-half strategy used in various schemes, we investigat
In this paper, a low power digital intermediate frequency (IF)-discriminator is proposed. A lower frequency reference clock
reference frequency in this new IF-discriminator circuit. This new structure utilizes a 4-bit residual-code co
Nowadays it is commonly accepted that the web is structured in a chaotic way. Due to the fact that it grows exponentially,
efficiently locate specific information. This paper presents a User-defined Meta-Search Engine (UMSE), cap
The paper presents an estimation method for the electromagnetic and mechanical parameters of squirrel cage induction m
consists in the use of an improved dynamic model that allows also the estimation of the iron loss. The estimated pa
The paper proposes a new scheme for call admission and bandwidth reservation for the next generation wireless network.
OPBR (optimal cell partition based bandwidth reservation) does an optimal partitioning of the cell to give high deg
A solution to perform an automatic parking manoeuvre for an electric vehicle is presented in this paper. A mathematical dy
described considering the initial and final position of the vehicle in each point of the desired trajectory controlled
In this paper a new method for developing a realistic model of any type of solar cell is presented. Taking into account the h
experimentation involved with the development of advanced cells, we present here this novel methodology.
In this paper, a new Transform Domain implementation of the well known Multilayer Perceptron Neural Network is presente
Domain implementation, the input of the Neural Network can be represented in a more compact manner and the element
On-line handwritten signatures are often used for verification or identification in various applications. This paper proposes
handwritten signatures. From a signature sample, a private key can be dynamically generated based on the
A projection based method for sparse fuzzy system generation is proposed. Given a set of training data, clustering is first
space. Data points from each output cluster are projected back to each input dimension forming one-dimens
We present a real-time fault-tolerant design for the k-ary n-cube multiprocessor and examine its reconfigurability. The k-ar
by spare nodes at stages one and two. We consider two modes of operations, one under heavy computation or ha
Abstract: This paper presents a simplified analytical approach of machines interference problem. For a group of S systems
repairpersons two indicators must be evaluated: the systems availability and the percentage of working time f
Abstract: A dynamic FSS incorporating Schottky diodes on high resistivity Si is proposed. Results from an equivalent circu
applied reverse bias on the Schottky diodes to be the controlling parameter.
In this paper a blind algorithm for combining Rake receiver and beamformer is introduced. It is shown that a blind adaptive
by directly utilizing bussgang algorithm. But these algorithms may converge to local minima therefore some
Image restoration is a process that restores a degraded image to its original or near original form. A review of the current r
reveals that the Cellular Neural Network (CNN) has not been used to its full potential in image restoration
In this paper we propose a parallel and adaptive 1-irregulr mesh simulation technique for the Monte Carlo solution of semic
Boltzmann transport equations. We iteratively solve the coupled partial differential equations (Poisson equation an
This paper addresses adaptive routing in the intersatellite link network of a non-geostationary packet-switched satellite sys
traffic class differentiation. In order to evaluate the performance of class dependent routing three diff
This paper presents an adaptive vector quantization with deletion method based on equinumber of inputs in partition space
partition errors are equivalent to each other when the numbers of inputs in partition space are mutually same,
A new approach for the adaptive algorithm of a fully connected recurrent neural network (RNN) based upon the digital filte
Each recurrent neuron is modeled by using an infinite impulse response (IIR) filter. The weights of each layer
In this paper, we consider the problem of evaluating the complexity of random and pseudo random binary sequences. It ha
traditional estimation of linear complexity does not allow us to fully estimate of the probability of forward and
This paper describes an architecture which allows an un-trusted search algorithm supplied by a User to be granted access
disclosable data of a Data Provider. The result is that the User can receive the output of the algorithm, a relevance
The objective of this paper is to present an efficient computational methodology for the quality design of the electrical circu
methodology can be applied in a later stage than the system design, and focuses on selecting the appropriat
Abstract: The design of an efficient MAC protocol is of paramount interest for the definition of wireless ATM (WATM) acces
MAC layer protocol yields reasonably low link channel utilization efficiency and more delay when only small num
We explore the possibility of solving differential equations by using Evolutionary algorithm. The trial solution is constructed
Neural Network component and a non-Neural part so as to satisfy the initial/boundary conditions. The effecti
According to the common underlying mathematical model of ad hoc networks introduced, a selective network model is de
node connectivity. Based on a system architecture with a predetermined number of independent and simultaneous link
In this paper, we describe a high-level test synthesis algorithm for operation scheduling and data path alloca- tion. It gener
data path design while maximizing the sharing of test registers, which means only a small number of reg
An intuitional path-planning method is addressed for a mobile robot moving through a field of obstacles to a goal. Such as
the locations of the mobile robot, obstacles, and goal are known via a real time global vision system and all
This paper presents an analytical method for the design and analysis of impulse current generators according to the requie
international standard IEC 60060-1. The circuit of the generator is analyzed and mathematical expressions for the most
In this work a procedure to perform the handover in a Bluetooth network is proposed and its performance in terms of time
is studied. The standard procedure inquiry defined by Bluetooth to create and manage an ad-hoc netw
The scope of this paper is to derive a set of simple formulas to dimension virtual paths in IP/ATM packet networks that car
traffic. The project further gives an overview of voice over packet technology with a special focus on voice ove
The Recommendation Architecture is a connectionist model, which simulates several aspects of the human brain. In this p
investigate its capability to solve a real world problem in document classification. For this purpose an experiment h
A Dense Wavelength Division Multiplexing (DWDM) system can be viewed as a parallel set of optical channels, each using
wavelength (as defined in the ITU-T normative G.692), but all sharing a single transmission medium. Each sign
In this paper, Artificial Intelligence applications that can be applied to theological data are identified. Theological data inclu
sources but also cultural, social and scientific data that either have been inherited or are new. The
Abstract: - In this paper a novel general methodology is introduced for the computer-aided reconstruction of the magnificen
Greek island Thera, painted in the middle of the second millennium BC. These wall-paintings are excavated in
bThis paper describes a technique for automatically measuring brain height by processing an X-ray image. The developme
derives from the need to normalise patient data according to skull size and shape for the purpose of comparing new p
We consider the problem of identifying an unknown value X in {1...n} using only "X <= C ?" queries, when at most E of th
receive erroneous answers. We describe a strategy that solves this problem by using a number of comparisons that
In a recent paper the authors proposed a new Transform Domain LMS algorithm with variable step-size (TDVSS). As a no
existing Transform Domain LMS algorithms, the new TDVSS uses an adaptive step-size that depends also on the out
Abstract : This paper is concerned with the design of super-resolution Direction Finding (DF) arrays that satisfy prespecifie
(CRB) on error variance. The sensor placement problem is formulated in the framework of subspace-based DF tec
In a world of enormous technological developments and increasing competition between financial services providers custo
customer retention becomes more and more important. In this paper the authors use a micro-economic model to analyze
The present study treats the problem of fuzzy clustering of arbitrary shapes. A new approach, based on the principle of Da
is adopted, distance is defined as medium dependent and the algorithm fits an optimal metric to the given dat
This paper addresses the design of one dimensional piece-wise maps to generate optimal codes for short and long code m
systems. A novel approach, GP-DNA, that uses genetic programming to search in the functional space and DNA computa
In this paper, we proposed a fully integrated Phase-Locked Loop (PLL) with transconductance-C (Gm-C) filters. The PLL a
loop filters, one is passive filter and the other one is Gm-C filter. Additionally, the Phase-Looked Loop has a
An increasingly dispersed workforce has created an increasing need for collaboration tools that emulate human-oriented c
These systems should support the ability of users to have access to the same, possibly overlapping tool set. The
Records of brain electrical activity from depth electrodes are analysed to detect dynamical marks anticipating an impending
patients who are candidate for surgery. This is pursued by using the available information contained in the mu
Diagrammatic logical systems are investigated, especially aspects of existential and conceptual graphs, semantic games,
representation. Their fundamental features are outlined and compared, and it is argued that semantic games entail certain
In this paper the performance of discrete link-cost function for best effort adaptive routing algorithm is evaluated and comp
link-cost function. Both link-cost functions are considering link-cost metric composed of traffic load and pr
Abstract: - In this paper it is pointed out that there is a new decisively important factor in both the perceptual as well as the
identification process. This factor is determined by the inharmonic spectral content of a note, while it
In 1983, Welch, L.R. and Berlekamp, E.R. introduced a new key equation based on rational interpolation for algebraically d
(RS) codes over finite fields. A key feature of their so-called remainder decoding approach is that the computat
In order to characterize the amplitude and phase distortions of power amplifiers, several methods have been developed fo
of the active components and their effects on transceivers: Volterra series, harmonic balance and behaviora
Mode analysis and dispersion relations are the basic characteristics for cylindrical dielectric waveguides. The waveguide c
geometry and on the index profile. The nominal index profile is the basis for the calculation of the field
This paper discusses the evaluation of Meeting Support Systems (MSS). More specifically, it tackles the problem of evalua
organizational value of these systems. MSS lay down one sub area of research crossing Computer Supported Cooperativ
A multiresolution dynamic genetic algorithm (GA) searching technique is introduced to enhance the on-line model identifica
state, discrete-time Markov models with continuous-range observations under white Gaussian noise. Markov cha
Different techniques have been introduced for the improvement of Evolutionary Algorithms (EA) to increase their performa
better results. Adaptive methods are commonly used. In the scope of this work these extensions are applied to
A simple method for MESFET parameters extraction is presented, where the wideband behavior of intrinsic and extrinsic e
account. The method is based on splitting the whole operating frequency into several sub-bands where extraction o
This paper introduces a correction to the traditional backpropagation (BP) net, which uses the ∆-rule or any of its m
net. The correction introduced to the backpropagation net is a matrix that multiplies the ∆-rule at
We present division-free analogs of the accelerated Berlekamp-Massey (BM) algorithms of R. Blahut based on an algorithm
their similar structures, the computational complexity of Blahut's algorithms and ours are essentially the same. H
In this paper, fault tolerant compensation for non-linear plants is addressed. Soft fault detection and isolation is performed
detection. New method is proposed that combine model predictive controllers with fuzzy Takagi-Sugeno
Modified Mason-CoatesΤ flow graphs are introduced in this paper. Utilizing a simple rule, the voltage graph node can be e
node, which corresponds to the current of a branch oriented out of the incident circuit node. Then an arbitrary
In this paper, a fuzzy model for forecasting the Nile river flow is developed. The fuzzy model is represented by a set of rule
Sugeno type. The Gustanfson-Kessel (GK) algorithm was applied to determine the antecedent membership function
The conditions for optimized design of the second dynamical system having low eigenvalue sensitivities are derived. Their
accordance with the previous results obtained by using linear topological conjugacy.
In this paper we present CESTAC, a method to control round-off errors in floating-point scientific computation, based on st
real time use of this method suffers from bottleneck software calculation. This paper gives a hardware alte
Beat-to-beat changes in heart rate are modulated by different mechanisms of control. A strong influence on heart rate varia
by the activity of the autonomic nervous system (ANS). To investigate how and to which extent ANS is involve
In this paper an Adaptive-Network-Based Fuzzy Inference System (ANFIS)architecture is presented and we use it as a too
Identification. System Identification consists of three related steps: 1:) Structure specification, 2:) Parameter estimation
Some of the existing methods of image thresholding method have been critically reviewed. And objective evaluation of all t
carried out. Along with existing performance measures like correlation factor, region uniformity, entropy, dive
During the past years, many researchers have done lots of work to improve the performance of parallel storage systems .
out a novel policy that utilizes Scatter and Gather operation to reduce the data movement in memory. After anal
In this work, we show that using the pinhole model as a basic single-camera, image-formation process is not most appropr
calculation. This is particularly true in robotic vision applications where, often, relatively close-range ima
In this paper we propose and evaluate ERICA as explicit rate mechanism in GFR backbones with ABR Flow Control. This
VS/VD to each VC at the entrance of the network, and uses ER marking mechanism at backbone FIFO switches. The perf
Co-ordinating the insulation of an electric network is to design its insulation with all its components, so as to economically m
service interruption as a consequence of steady state and transient overvoltage stresses. The paper deals wi
AbstractΩ In lots of applied occasions, the sampling sequence is often taken as the initial input in the decomposition of the
this method approaches the exact initialization at a slow rate, this paper is focused on how to accelera
In paper analyses the level of organisational integration of group support technologies, specially the meeting support syste
evaluation we identified in what extent the system fits in the group, individuals and organisations dimension.
A computer system of next generation of chemical computing software is designed. It is a architecture which facilitative the
modeling and design by means of various integrated modules. This system is an integrated applications environ
In this paper, we present the basic principles underlying the main types of intelligent educational systems used for individu
Intelligent Tutoring Systems and Adaptive Educational Hypermedia Systems). Their characteristic is the abili
Abstract: - Intelligent Self-Study Aid (IS-SA) is a revision tool that communicates in natural language. Hypertext facilities ar
process but they are not enough. They are tailored more to what teachers expect from students than t
The capacity of backbone networks keeps increasing to cope with the increasing user traffic demands. The key user of suc
capacity is the IP protocol, which is nowadays seen as the universal network protocol for any type of user application
The major prerequisites for successful wireless ad hoc networkingare an almost homogeneous distribution of a nontrivial n
determination of an almost ideal selective connectivity of
the nodesin the network.
We present various learning methods for RBF networks. The standard gradient-based learning is augmented by the weigh
The three-step learning algorithm uses different unsupervised learning algorithms for setting the centroids. Two pos
In this work we present a study of the MPLS overhead on Linux platform measuring the RTT (Round Trip Time). We comp
between two scenarios: the IP network and MPLS network. In this paper we show the results in three situations: connectio
There are available many standard models for data exchange covering a wide domain of business and industrial activities.
International Standard (IS) releasing several of these standards. Each of them is identified as an Application
A new method for designing a minimal order perfect functional observers for singular continuous-time linear systems is pro
sufficient conditions for the existence of the minimal order perfect observer are established. A procedure for c
An alternative approach for minimization of pole frequency error and pole quality factor error in high Q-pole switched capac
presented. It is based on the use of fast amplifiers with low but precisely known gain value in finite gain in
In order to achieve the users acceptance requirements and to satisfy some constrains on the multimedia systems, we nee
includes modeling, architecture, traffic management protocols, etc. In these paper topics such as communication mode
In this paper an Adaptive-Network-Based Fuzzy Inference System (ANFIS) architecture is presented and we use it as a to
Identification. System Identification consists of three related steps: 1:) Structure specification, 2:) Parameter estimatio
A novel system for conducting non-signature based, or patternless, intrusion detection of computer networks is presented.
principles of thermodynamics to model network conversation characteristics. Observing the properties of entropy, ene
Planning and scheduling are close areas but on the other hand, they use very different solving technologies. Recently, the
from industry to integrate both approaches into a single system. In the paper we propose a basic framework for
For the solutions of large and sparse linear systems of equations with unsymmetric coe╞cient matrices, we propose the IQ
Lanczos pro- cess as a major component combining elements of nu- merical stability and parallel algorithm design
WE PRESENT a new Markov Random Fields model-based algorithm for image segmentation achieved by a robust heurist
Optimization. This heuristic is inspired by Self-Organized Criticality. The general-purpose of this algorithm is to find a co
In this work we present a collection of tools (named Mtools) for analyzing network performance through the measurement
the round-trip-time of packets that traverse the network. Mtools has many useful features that will be shown in
We present a multi-window method for obtaining the time-frequency spectrum of a non-stationary signal. This method is ba
combination of evolutionary spectra that are calculated by using multi-window Gabor expansion. The optimal weights are o
This paper analyzes performance and throughput of an adaptive bit allocation and variable rate algorithm depending on ch
(CSI) and a transmit power in a multi-user OFDM transmission. The purpose of the presented multi-rate OFDM syst
In this paper we present the mu-synthesis of a robust control system for a triple inverted pendulum. Using the D-K iteration
constructed for which the closed-loop control system achieves robust stability and robust performance.
We have recently described a range-based neighbourhood operator and an experimentally discovered
edge detector based on it. The latter relies on data fitting in a pixel neighbourhood, and has a wide dynamic range.
A preliminary theoretical investigation
The key factor defining the efficiency of IP routers is the speed of the forwarding operation, that is the speed of determining
destination for each packet. The operation is not simple because the IP addresses are unstructured and the destina
The paper presents a method for parameters estimation of squirrel cage induction motor. The state-space model of the sys
decomposed in two quasi-decoupled systems because the dynamic of electrical system and the one of the magnetizing sy
In this paper the control of DC-link voltage in shunt active filters is studied. The main control objective in this kind of active
proper current in the electric mains in order to compensate for harmonic distortion generated b
In this paper we evaluate the performance of a variety of techniques to improve the parameter analysis in CELP speech co
include using extended cost horizon in the fixed codebook search process, as well as joint optimization and delayed
The theory of the asynchronous circuits is non-formalized. Our aim is trying to suggest a start in the construction of a semi
this could happen, in our opinion, by finding a suitable language and acceptable definitions of the delays.
In order to optimize the running of a wireless or hybrid local network, it is important to know the exact physical position of th
the network. This parameter could help to improve the routing's algorithm. In a former article, we've
Abstract: -In this paper we study the effect of round trip propagation delay in performance measures of Wavelength Divisio
networks. Even though the impact of propagation delay is substantial in optical networks behavior, most of t
The provision of multimedia services to mobile users is one of the main goals of Third Generation (3G) systems. The traffi
3G mobile networks will be composed by different information flows with various constraints on the requir
Rain induced attenuation at 19.4 GHz over a terrestrial path link of 2.29 km was measured for the period of one year (i.e. f
December 2001) in Amritsar (31.36 degree N 74.52 degree E) environment. An empirical model for predicting rain-induc
Internet telephony now enables a wealth of new communication services. Traditional telephony services, such as cal forwa
transfer can be enhanced with directory services, Web, or e-mail. Programmability of Internet telephony ser
A major problem with meetings is that too often they are boring and a considerable waste of time. But supposing that a me
are still problems. In order to solve some of those problems, several software systems were developed, amo
The aim of this paper is to provide a new Intelligent Approach, which can be used as a decision making tool in a sophistica
selection of a reaction system for the conversion of cellulose materials to fermentable sugars. The development of
Abstract: In this paper we develop a performance model of the well-known Passive star coupled structure operating in a m
system environment. The performance model is developed to reflect the impact of finite number of tunable receive
We propose that a new parameter, the set of link stability functions, should be taken into consideration when selecting a ro
transmission in an Ad Hoc Network. Due to this parameter, any proposed routing algorithm must explicitly take
Two simple circuits containing one operational amplifier (op-amp), i.e. current controlled-voltage source (CCVS) and invert
analysed. In the first step the op-amp is considered ideal, while in the second step the simple one-pole
CanadaΤs RADARSAT-2 (R2) commercial Synthetic Aperture Radar (SAR) satellite, scheduled for launch in April 2004, w
mode that will permit Ground Moving Target Indication (GMTI) measurements to be made. In this mode of operation, th
Many wide-area industrial systems are spread over large geographical regions, and need to be monitored and controlled fr
point using SCADA systems. Long-range, low-data-rate communication is an intrinsic part of such systems. Tradi
The development of computer networks and technology allow organizations to process and transmit tremendous volumes
large amounts of personal data. However, national and European data protection laws regulate the processing of perso
New tools for combining queries in a useful way are needed. The rise of multimedia data repositories is changing the way
searching a particular piece of information, so we will be forced to change many of our usual concepts about
We developed the applet showing different defect structures in a thin nematic liquid crystal film. The nematic structures are
nematic director field representation. Points defects and close enough pairs of point defects of any topologi
A software defined radio (SDR) system is based on state-of-the art technologies covering topics such
as: smart antennas, radio frequency (RF) down/up converters, analog to digital converters (ADCs) and digital
to analog converters (DACs), digital signal
Determining causality has been a tantalizing goal throughout human history. Proper sacrifices to the gods were thought to
make the proper observations were thought to lead to disaster. Today, data mining holds the promise of extr
Transients produced upon shunt reactor switching (closing or opening), may be harmful for the reactor itself, for the switch
adjacent system components. A variety of countermeasures, either alone or in conjunction, are used by the el
A number of samples of Ferrite Sr(CoTi)zFe(12-2z)O19 where z varies from 0.1 to 0.9 in steps of 0.2 have been prepared
method and their complex permittivity has been measured as a function of frequency over X-band of microwaves. Repl
We present a methodology for watermarking firm cores so that the test set is preserved. We protect the Intellectual Proper
number of redundancies as directed by the method in this paper.
Formal syntax plays a very important role within logic so pattern matching is of a great importance in this discipline. Even o
the beginning in logic education. In this paper we argue about the necessity of having tools for practisi
Abstract-the Mallat algorithm and the approximation(or, detail) coefficientsΤ inner production definition are the same in ess
that the initial input is , we analyze the connection between the two through a visual way ,which is benef
The thesis speaks about the internal default determination by vibrodiagnose and mathematical model and the decrease of
balance sistem (SAE). By thesis title itself, the thesis itΤs a new concept in self-balance of dynamic system
In this paper, we mainly study the parallelization aspects of the accelerated waveform relaxation algo- rithms for the transie
semiconduc- tor devices on parallel distributed memory computers since these method are competitive with standar
RAID has been used for high performance and high availability of data, but it has problems that cost of data regeneration f
availability in disk failure mode(degraded mode) and cost of data rebuilding for recovery of failed disk are very
Abstract: In die Werk Beweise vorbringen der Gleichung sincron Motor beladen fⁿr situation einheitlich das winderstudsfϊhig
diese Regime auf ein syncron Motor das 600 Kw; sich prϊsentieren das Abwechslung Kurves der intern Winkel,
Time-hopping (TH) communication techniques have gathered increasing attention since the introduction of ultra-wide-band
Scholtz, in 1993. In these systems, the design of TH sequences is a critical point, since they constitute the only s
Efficiency increase of hash-algorithms built on the basis of cipher-block chains is considered. Scripts for breaking known h
been analyzed. Directions on designing hash-algorithmΤs topology with increased crypto-resistance and possibili
An algorithm has been designed that models the outlines of handprinted and electronic fonts. By capturing the input throug
bitmapped image is converted to a more flexible format by means of a mathematical description. This in turn
Especially in the Financial Services Sector we can see a strategic shift towards implementing Customer Relationship Mana
strategies. The basic assumption of this strategies is that customers who are locked into a stable relationship will be wi
Fuzzy Cognitive Map (FCM) is an Artificial Intelligence technique that incorporates ideas from Artificial Neural Networks an
create models as collections of concepts and the various causal relations that exist between these concepts. In
The paper presents an application of Wavelets for the analysis of time-varying harmonic signals in noisy environment. Deta
carried out for the proper selection of wavelet family. We also evaluated the effect of details and approximati
The multimedia object requests scheduling problem is addressed in this paper. The problem can be modeled as a two-ma
scheduling problem for which two heuristics have appeared in the literature with respect to the objective function of minimi
In this paper, we solve bipolar junction transistor electric circuit ordinary differential equation with the decoupling and mono
With the monotone iterative technique, we prove each decoupled and transformed circuit equation converg
Small satellites performing remote sensing missions are equipped with better imaging systems. However, technical limitati
system create a bottleneck preventing transmission of large amounts of raw data to the ground station. The use of
The paper concerns the pairwise comparison method used to rank a finite, usually small number of alternatives, in the Ana
(AHP), which belongs to a certain class of multiple attribute decision making methods. Ranking of alternatives
The Java virtual machine (JVM) is usually im- plemented with an interpreter or just in time(JIT) compiler. JITs provide the
must performance but must be substantially rewrit- ten for each architecture they are ported to. In- ter
Soliton graphs having an alternating cycle are characterized with the help of a shrinking procedure. This characterization le
the existence of an alternating cycle in a soliton graph. The suggested algorithm runs in $\ordo(n^3)$ tim
The time required to solve a problem is one of the most important measures in evaluating an algorithm.The time is also ca
the algorithm. The probability distribution of the frequency of access on an individual key plays a crucial r
There are several attempts to give exact solutions of the Navier-Stokes equations. Certain progress has been made in tha
exception of the three dimensional case with two independent variables. In this note, a new exact solution of the
In this paper, an integrated production and transportation model is proposed. This model is based on multi-item capacitate
location type models. The objective of the integrated model is to minimize the total production and transpo
This paper describes the results obtained from a time marching solver based on Jameson’s Scheme to study the nucleatin
of steam through blade cascades. The main flow is considered non-viscous and the nucleating and wetness are intro
The application of two effective partial factorization iterative methods for solving the large linear systems arising by the num
neutron diffusion equations is presented. These methods have been implemented in the new improved three-dime
The paper is concerned with innovative techniques of multidimensional systems design based on Combinatorial Sequencin
concept of Ideal Numerical Bundles (INB), which can be used for finding optimal solutions for wide classes of technol
We consider the following scheduling problem. Suppose we have $n$ jobs to be processed on a single machine which can
a time. Job $j, j\in N,\ N=\{1,2\dots,n\},$ requires an uninterrupted processing time $p_j > 0$ (can be nonintegr
Research and application of the "perfect" combinatorial configurations involve techniques for multidimensional optimization
based on the Combinatorial Sequencing Theory, namely the concept of Ideal Ring Bundles (IRB)s. Multidimensional
In the paper we shall investigate an approximation of a solution of the Schroedinger equation in an unbounded region for a
spectrum, where the potential is of short or long range or oscillating one. Two steps are considered. In the first
Optimal alphabetic binary trees (OATs) have a wide variety of applications in computer science and information systems. A
such trees in O(n log n) time and O(n) space do exist. In this paper, we introduce a new simpler method for sol
\makeindex \documentstyle[12pt]{article} \def\theequation{\arabic{section}.\arabic{equation}} \oddsidemargin 0mm \textwid
-5mm \textheight 220mm \begin{document} \setcounter{section}{1} \parskip=.4cm \newcommand{\kap}[2] {{\raise .45ex
Integral equations in space-time play very important role in mechanics and technology. Particular cases of these equation
integral equations or Volterra-Fredholm integral equations. Studied equations arise in heat conduction theory, dif
\makeindex \documentstyle[12pt]{article} \def\theequation{\arabic{section}.\arabic{equation}} \oddsidemargin 0mm \textwid
-5mm \textheight 220mm \begin{document} \setcounter{section}{1} \parskip=.4cm \def\vekb#1{\lower -1.60ex \hbox{$\s
Abstract: An alpha-labeling of a graph G is a graceful labeling of graph G with an additional property. In this paper the exi
of an alpha-labeling of the graph C4a Εy C4b Εy C4c is discussed.
Decision making consists in choosing, on the basis of various criteria, an appropriate subset of actions among a set of alte
research related to this field proceeds by aggregating all the criteria in a single objective function and rank
This paper presents design and control of active mufflers used in engine exhaust systems. Boundary element method is e
noise attenuation performances of various active muffler structures. Based on these performance evaluations, an
Numerical experiment is the only available approach to demonstrate long-term complex phenomena evaluation of a high-le
disposal system. Designer and performance assessor of underground facility have to consider some phenomena due to t
B.L.VIKAS Pre-final year student Madras university India [email protected] DEVELOPMENT OF SOFT
FOR PROJECT MANAGEMENT USING CPM AND PERT WITH SIMULATION The complexity of the prese
The development of vibration monitoring system for the MARIA nuclear research reactor was realised in several steps. Aft
measuring equipment the systematic measurement of all signals were performed. The deviations from normal operating c
Abstract: This paper presents the discrete sliding mode control for two link rigid robotic manipulators with uncertain modell
Mode Control problem is formulated. Necessary and sufficient conditions of stability along with the eff
The problem of reasoning on Bayesian networks with knowledge updating is considered. The reasons of this updating are
data evaluation, changes in the surrounding world, test data and adaptive systems. This knowledge updating for
Laplace's equation is of immense application in fluid dynamics in general and in water wave problems in particular. The ev
coefficients and loads on submerged bodies has a lot of significance in designing these structures. Analytic
\textbf{Abstract:}~ In this paper we extended the Hajek-Renyi inequality, and obtain strong laws of large numbers\\ \it for n
(ND) random variables by use in this inequality and\vspace{.5cm} martingale techniques.\\
In this paper, the well-known Lyapunov stability theory is further investigated and two new concepts on broad-sense Lyapu
Lyapunov distance are introduced. The broad-sense Lyapunov stability theory is then developed. It is shown that a bro
In the paper the theory of bilinear forms suitable for the equation of particle neutron transport is developed. These bilinear
respect to both their arguments, each of them belonging to an approximate functional space. In general th
Abstract: In this paper, an efficient and robust equalization scheme based on genetic-algorithm (GA) is developed in MATL
environment. This is to optimize the coefficients of the transfer function of the partial response equalizer, which will
A {\it $k$-coloring } of a graph $G=(V,E)$ with vertex set $V$ and edge set $E$, is a function $C$ defined on $V$ into a s
k\}$ such that any two adjacent vertices have different colors. A {\it Grundy $k$-coloring} of a graph
Vorobyova.doc
The fast and accurate evaluation of elementary functions is vitally important in many fields of scientific computing. We des
method to calculate powering (Xp). This method employs table lookups and polynomial approximation, a second-o
In this paper we extend our work, finding the norm of the Hilbert Matrix operator,\\ to the weighting sequence spaces $d(w
sequences $w = (w_{n})$ defind\\ either $w_{n} = 1/n^\alpha$ or $W _{n} = n^{1 - \alpha }.$
In "2nd WSEAS Multiconference on Applied and Theoretical Mathematics", we have introduced the concepts of multisem
a generalization of the concepts of semilattice and lattice, respectively. In this paper, we give another step
This paper presents an implicit enumeration based 0-1 integer programming methodology for finding the optimum preventi
schedule of generating units. The objective function is to maintain the units as earlier as possible. Various constraints
Our program BABELPDB allows browsing and interrogating the native and derived structural features of biological macrom
obtained from the Protein Data Bank (PDB). Major features of BABELPDB are: (1) convert from PDB to other formats; (2)
In this paper we consider the Leslie matrix model, which decribes the time evolution of populations in which fertility and su
strongly depend on their age. This population model is a positive dynamic linear system of age-structu
Since the automobile is a major contributor to air pollution, methods of predicting concentrations of automobile exhaust ga
needed for the planning and design of roads and nearby structures. The traffic on motorways is a source for CO
Abstract:- In this paper we focus on analysis of the defect trap model equations which one of them explains the peculiaritie
results. Then, we give some computation results proving that solution of the coupled differential equatio
In this paper, we investigate the maximum generating rate of the variable-length Markov random sequence. Our results ar
Han's results on the variable-length intrinsic randomness.
In this paper, we solve systems of time-dependent nonlinear partial differential equations(PDEs)by method of lines(MOL).
application of MOL on systems of partial differential equations is presented. Secondly, we consider some examples
In this paper, we solve systems of time-dependent nonlinear partial differential equations(PDEs)by method of lines(MOL).
application of MOL on systems of partial differential equations is presented. Secondly, we consider some examples
Let $S$ be a semigroup. $S$ is called {\it right (resp. left) reductive }if for each $a,b\in S$, from $at$=$bt$ (resp. $ta$=$tb
follows that $a$=$b$. A semigroup is called {\it reductive } if it is both right and left reductive.
The problems of power and energy shortage (natural or associated with the economic feasibility of load management) allo
within the framework of multicriteria optimization models. This allows one to realize a new technology of load man
New class of two-parameters triangular smoothers for Multigrid method based on skew-symmetric part of the initial matrix
conditions of convergence and choice of iterative parameters for smoothers are proposed. Linear equation syst
In this paper the authors present a neural network (NN) backpropagation (BP) training with dynamic optimal learning rates
(GA). An initial learning rate a0 in the hidden-output layers and proceed to train the NN with the dynamic opti
The process of collision between particles is a subject of interest in many fields of physics ,astronomy,polymer physics, ato
colloid chemistry. This system can be discrete and continuous. In the discrete case,the time evolution of the
The method for numerical study of the open quantum systems is proposed. It is based on our recent results in the field of n
respect to probability measures in complete separable metric spaces. Our approximations satisfy the condit
\textbf{Abstract:}~ A class of Banach sequence spaces which contains $l_{p},~(1<p<\infty)$ hereditarily, is introduced\\ \i
denoted by $X_{\alpha ,p}$ .~ We show that (i)$ X_{\alpha ,p}$ spaces contain $l_{p}$ hereditarily complem
We investigate the global existence of both strong and weak solutions for a linea coupled system with homogeneous feed
conditions in bounded-open domain $\Omega$ in ${\mathbb R}^n$ with $\,n\in \mathbb N.\,$ We also prove the exponen
In this paper new explicite formulae for Hankel matrix inversion are suggested. They are derived by the construction of spe
fundamental Hankel or Toeplitz equations systems. The formulae differ from each other via their form, complexity and
In this paper, {alpha, k}-group periodic matrices are introduced and analyzed. Using different approach (as {1}-inverses, M
elementary matrices, left and right inverses and singular value decomposition) we characterize this kind of ma
We develop the mathematical theory of algebra functions on $A^*$ for a finite alphabet $A$, such that the functions are lev
are restricted to the different levels $m$ according to $A^m$. We shall first establish the fundamentals and
The main subject of the paper is the study of performance of iterative prefactorization methods for solving linear systems o
the dierence approximation of nonself-adjoint two-dimensional elliptic partial dierential equations. The
This comunication describes some image-compression concepts such as the transmitted energy of the digital signal and th
compressed image in function of the number and magnitude of the singular values used in the Singular Value Decom
In Zhu's survey, only one example of a circulant graph of prime order which is not star-extremal is mentioned, and it was fo
search. In this paper, we investigate the circular chromatic number of partitionable graphs. Our results entail t
In this paper we prove the existence and uniquenesse of strong solution for parabolic equations with weighted integral bou
conditions( nonlocal boundary conditions).The proof is based on apriori estimate and the density of the range of the operat
A connected domination set $D$ of a graph is a set of vertices such that every vertex not in $D$ is adjacent to $D$ and the
$D$ is connected. The minimum connected domination set of a graph is the connected domination set with the mini
The Krylov methods such as CGS, Bi-CGSTAB, TFQMR and GMRES are some of the most efficient methods for solving la
symmetric linear systems of equations. The incomplete factorization-based preconditioners considered in this paper are IL
Proper and coherent conditions for Algebraic Numerical Algorithms (ANA) and Algebraic Finite Difference Equation (AFDC
realistic tool. Importance of algebraic finiteness that is generated by blowing-up is shown relating ANAΒfs and AFDCE
This paper presents a training method for radial basis function neural network (RBFNN) based on GA and dynamic optima
algorithm (GA) is applied to search for the optimal centers from input space of the RBF. Dynamic optimal learning
Rheonomic (nonstationary problems)could be studied as a generalisation of relative motion. Added acceleration related to
derived and studied. Equilibrium and energy integral of these systems are examined.
The control laws involving distributed delays, have some problems for its realization. Employing numerical approximations,
that the approximate controller be stable, however, when the plant has disturbance in its nominal parameter
For many application domains the best way to produce intelligent behavior is to encode knowledge about this domain to kn
Verification of KB is one of the crucial issues in developing reliable knowledge-based systems. SAT techniques as resolut
New skew-symmetric triangular iterative methods without iterative parameters are presented. The triangular operator of th
skew-symmetric part of the initial matrix. Some ways to accelerate convergence are proposed. The test of thes
The multiwave nonlinear Schrodinger equation (MNSE) that generalizes the nonlinear Schrodinger equation (NSE) for the
propagating quasi-monochromatic waves is studied theoretically and numerically. Regions of the modulational instabilit
Special structure of a kind of matrices and its Drazin inverses have been studied. The $r-$block monomial matrices are int
nonnegative Drazin inverse. The influence of these matrices on the positiveness of the trajectory of a descriptor s
Propagation of coherent light through photonic gratings with varying Kerr nonlinearity is modeled within a coupled-mode s
Maxwell equations. Numerical computations of linear stability problem and time-dependent equations confirm o
The abstract has mathematical notations. I will send the ps file of it along with this submission.
Formal syntax plays a very important role within logic so pattern matching is of a great importance in this discipline. Even o
the beginning in logic education. In this paper we argue about the necessity of having tools for practisi
An nxn matrix is called an N-matrix if all principal minors are negative. In this paper, we are interested in N-matrix completi
when a partial N-matrix has an N-matrix completion. In general, a combinatorially or non-combinatorially
A coupled system of electromagnetic (in the terms of field strengths) and scalar fields, which satisfy the generalized Maxw
gradient-type 4-current, is under consideration. The general solution of these equations is found without any app
In this report the numerical schemes of the collocations method and quadrature method for approximate solution of the sys
diferential equations were elaborated, taking into consideration the fact that nuclei in the regular part co
The Hydrological Dispersion Module (HDM) of the RODOS (real-time on-line decision support) system for nuclear emergen
Europe has been is developed at IMMSP, Kiev, Ukraine; NRG, The Netherlands; FZK, Karlsruhe, Germany; SPA ΥTYPHO
The paper presents a method for the solution of the st-connectedness problem for a Fibonacci graph. It is shown that this p
polynomial time complexity. The number of mincuts of a Fibonacci graph is computed.
Classes of Banach spaces that are finitely, strongly finitely or elementary equivalent are introduced. On sets of these class
defined in such a way that sets of defined classes become compact totally disconnected topological spaces. Resul
New class of triangular and product triangular iterative methods for solving nonsymmetric linear systems of equations with
positive real matrices is proposed. The triangular operators of these iterative methods use skew-symmetric par
In this paper various approaches for solving the minimizing maximum lateness scheduling problem on a single machine $
are considered. Both traditional combinatorial methods and mathematical programming methods are presented.
The load balancing problem, which can be defined as the effective redistribution of workload among the system processing
time, is dynamic in nature where the load and the processing power of the system may change in time as units of
In this work are discussed some problems of the multiplier over Galois Field GF(256), which can be used in different mode
decoders for communication and storage systems.
Due to the advanced fabrication technology, the oxide thickness is now in the regime of 1.0 nm for nanoscale MOSFETs. T
and inversion charge density displacement away from the interface of oxide and silicon can not be neglected. The
The use of Metropolitan rings based on WDM technology is spreading in response to strong demand for IP traffic. In slotte
re-use the problem of fairness inherent in the ring topology is quite significant. To combat this and allow
In this paper the theoretical model for charge transport through microtubules (MTs) by soliton mechanism is developed, an
of nonequilibrium statistical physics. Thus obtained electrical current through MT is estimated as ~ 0.1 nA.
The Wigner equation taking into account both the non-local potential operator and a scattering operator represents a suita
carrier transport in nano structures. In this paper a new Monte Carlo method is proposed for the solution of t
With the consolidation of Internet as a means to share information in the new society and the need to access such informa
devices, such as cellular telephones, PDAs, WebTVs, Playstations, and others, we are now facing the problem of mak
This paper reviews an all semiconductor approach to develop nano-scale spintronic devices. We propose to deploy the sp
convensional non-magnetic III-V semiconductor nano-structures as elements of the spintronic devices. We demonstra
Reorientation optical nonlinearity in liquid crystals is very promising in application to all-optical switching and to build cross
networks. In this work we present experimental results of influence of electric field on reorientational
With the dramatic increases in desktop computing power driven by Intranet-based operations and the growing demands fo
between networked users, office and production-level Ethernet LAN technology has rapidly evolved from a coaxial
Abstract: Chemical modification of hydrophobic fullerene C60 molecule yielded many water-soluble adducts exhibiting the
activities. In the last few years a large body of evidence on diverse biological activity of water - soluble C6
Spectral characteristics of amplifying uniform and p phase-shifted FBGs are investigated via computer simulation by an ad
expression. Amplification essentially affects transmission characteristics of a grating and halves the bandw
A specific feature of multilayer quasiperiodic structures, namely, the inequality of the numbers of constituent layers of diffe
Fibonacci structure, allows to increase dispersion in comparison with periodic multilayers of the same len
In this contribution we develop a theoretical statistical approach to predict the acceptable bandwidth tolerances for optical
wavelength division multiplexing (WDM) networks. We also establish tolerances for the center frequency misalig
We present a method for the synthesis of Bragg gratings using a Fourier Transform-based algorithm. The algorithm has an
yields to reasonably accurate results and is fast due to the use of FFTs. Moreover, it resolves partially some of
Capacity and interference performance are among the most important issues in the cellular frequency planning process. T
reach a tradeoff between the quality and the offered traffic. In this paper, we study and compare some cluster t
A thin polymer film on the top of the nanotubes enables the photons to emerge the electrons. As the conductor, the nanotu
electrons along the way to the other end where we conduct them. This results with the getting of the solar cells the s
The Generalized Wiener-Rosenblueth (GWR) model is formulated for 2D-networks with refractorities (when some of netwo
sleeping state). The specialized program based on the cellural automata approach was elaborated for the GWR model i
Evolution of Lennard-Jones microdroplets and microparticles of high-temperature melts at the solid-vacuum interface has b
basis of Monte Carlo simulation and isothermal molecular dynamics. Effects of the energy of the substrate, and it
Abstract New non-covalent intermolecular fullerene systems containing discrete C60 and alcohol molecules (as intercalant
from the saturated solutions of fullerene in xylene, ethyl-benzene, n-propylbenzene, n-butylbenzene (intercalati
Proposed in the present paper is the method of implementation of the PNNI-based VP tunneling function in the ATM switch
tunneling occurs signaling at end-to-end. Therefore, it is effective to reduce signaling overhead occurring at many nodes
In this paper a summary of an academic experience related to the design and development of a tool for the editing and co
WAP (Wireless Application Protocol) applications is presented. in which it was included support for WML (Wirele
In this paper the C-band pumping equalization method is studied in terms of amplifier performance dependence on the C-p
power precision. This methodology needs an extra low power pump, and for that reason it is important to have its requ
Fullerenes and their water-soluble derivatives have recently become a topic of interests in biomedicine. Here we report on
activity of fullerene C60(OH)24 on K562 human erythroleukemia cells.A capability of K562 cells to synthesiz
In this paper we have presented the importance of electrical charges as a determinat of classifications of amino acids. This
used both in molecular biology and molecular nanotechnology. We proposed endohendral fullerenes to use as a bas
"This technology is not a strange thing in the first world countries, it has to be the same in ours by studing much about it by
lectures,conferences and watching stations like cnn that talks about every new thing in this world of ours"
The paper presents relations between classes of prime numbers within the set of natural numbers; relations determined by
series of numbers, and at the same time also by the Golden Mean. It also presents that analog relation are valid
- The EMC and the safety enforcement of electrical equipment in Finland changed when Finland joined the EU. Today, enf
international obligations with The Safety Technology Authority of Finland (TUKES) being responsible for maintaining
This paper describes and analyzes different problems of information encoding in digital communication and storage system
sufficiently full structure scheme of these systems as the cascade connection of six encoding methods is discussed. S
The demand for multimedia applications along with rapid growth, the need for quality of service, reliability, and resilience h
engineering an essential consideration in the design and operation of large public Internet backbone networks. I
In the Bucky System II, based on electrical arc, carbon soots were produced. Fullerenes C60/C70 were Soxhlet extracted
toluene and chlorobenzene. Yields of the extracts were compared. Crude fullerene extracts were purified by col
This course will provide attendees with a basic knowledge of intellectual property including patents, trademarks, and copyr
focus on protecting intellectual property while using examples from the Nanotech and related industries. In
I have analysed the basic examples of cases of completely transmitted light. The text presents a theory of light transmissio
media. This theory is universal for all electromagnetic ranges. Then Law of Light Transmittance is proposed. Mor
The present article explains and describes the selection of the empirical propagation model proposed in ITU recommendat
other models, for sea path propagation modelling, being based on measurements. The objective is the Planning and
A simple two-dimensional mesh generator for adaptive numerical solution of differential equations is briefly described. The
generator is demonstrated by considering three different examples.
Using high-gradient magnetophoresis, the non protein-mediated transfer of dimyristoyl-phosphatidylethanolamine (DC14:0
dipalmitoylphosphatidylethanolamine (DC16:0PE) between sonicated phospholipid vesicles and magnetoliposomes was fo
In this paper we are considering self-assembly approach from nanobiology to molecular nanotechnology. Because the ge
complex biomolecular system, is determined by Golden mean, we used it knowledge to study approaches to nanotechnol
In this paper we described a structure of an original multiwavelength optical fiber source for DWDM systems. In order to ob
optical carriers with highly stable channel spacing of 4.5GHz a single laser source and acousto optic freque
In this paper we present results of experimental research of luciferase-anesthetic interaction in vitro. To characterise secon
luciferase we used circular dichroism (CD), while to characterise luciferase-anesthetic interaction we have use
This paper describes the need of knowing fiber non-linear coefficient in global optical networks. The basic Kerr non-linearit
based optical fibers have been summarized, together with their implications for optical communication sy
Recent progress in research on optical fiber devices, especially optical fiber couplers and optical fiber grating couplers, by
method, that is, a CO2 laser irradiation method is reviewed. Furthermore, applications of optical fiber gratin
A diffuse infrared wireless system relies on reflections from the ceiling and other reflectors within a room, and is susceptibl
emanating from both natural and artificial sources [1][2]. Even when optical filtering is used in the
Subwavelength Optical Elements (SOEs) - refers to a substrate with a nano-structure on its surface, topped with a protecti
surface structures interact with light according to novel physical principles, yielding new arrangements of
The phenomenon of microwave power absorption has recently become of increased public and research interest in variou
research topics as an EM power absorption by human head with closely coupled hand-held mobile phone and the problem
This paper proposes the use of XML Petri Nets (PNML), a kind of high-level Petri Nets, for modeling, development, manag
Web-based systems, e-Activities like e-Business, Business-to-Business (B2B), e-Commerce and mobile applications
A simulation model of single-mode single-polarization Vertical Cavity Surface Emitting laser (VCSEL) in optical communica
by which the turn-on event of the VCSEL can be observed when the modulating current is applied to it. The spo
The data encryption standard (DES) is the commonly used publicly available secret-key algorithm. The advanced encryptio
replace DES, as it will use a more complex algorithm, based on a 128-bit encryption standard instead of the 64-bit
Considering the models of spatially bounded structures and structures with broken translational symmetry (ultrathin films, q
we have found the phonon spectra using the method of two-time commutator Green's functions. The phonon spec
The access network of the Universal Mobile Telecommunication System (UMTS) forms a tree--topology network, however
traffic carried in it requires a more reliable network structure. That way, new methods are needed to plan a minimum co
In this paper, we propose an implementation scheme of source routing function, one of the characteristics, in applying PNN
switching system. The proposed substance is a PNNI routing software structure design and source routing algorithm.
This paper details an original access method that can be used for all types of network using broadcast media (ad-hoc WLA
RNET protocol is a major development of the COMB method while bringing uniformity in the choice of codes and prior
In this paper an adaptive double-dwell acquisition system of Gold sequences for DS-CDMA systems is porposed. The syst
correlator structure for acquisition scheme and the acquisition needs knowledge of partial correlation of Gold sequences.
In this contribution we discussed the problem of the reliability of interactions existing both inside
the complicated heterogeneous systems among its partial functional blocks (FBs) and also between the system
and human subjects, operating with it or us
Wireless networks are growing at an unprecedented rate. But there are some flaws inherent to the security mechanism em
wireless networks. To perform secure transmission in wireless networks, it is pertinent to implement security services
A numerical solution of the potential distribution of two-dimensional Poisson's equation and Schrodinger wave equation
conditions has been obtained for a deep sub-micron and nanometer MOSFET. The quantum as well as classical
Abstract: - The optimization of apodized linearly chirped fiber Bragg gratings in the field of chromatic dispersion compensa
of group delay response and pulse recompression. To develop this study two prototype scenarios are consi
In this work we investigate the possibility of receiving the single mode regime of vertical cavity surface emitting laser in wid
change. In this case we propose two ways: using the oxide confinement windows with small radius and t
One has shown that Gibb's thermodynamics of surface phases may be extended to small objects, including nanoparticles,
of the surface tension (the specific surface excess free energy) is adequately taken into account. Thermodynamic s
We investigated analytically and by numerical simulations the possibility of dispersion managed solitons in links with dispe
compensating fibers. We present an analysis where the conventional DCF (Dispersion Compensating Fiber) is replaced by
The calculation of free energy of crystals has been performed on the basis of molecular-kinetic notion. The equilibrium equ
examined, the critical temperature of superconducting ordering has been estimated, its concentration dependence the
A possibility of a suppression of a backward electromagnetic wave by virtue of a finite sequence of rectangular pulses mod
parameters is shown. The backward wave is inevitable result of the medium time changing. Dependence of a relation
A non-coherent synchronous all-optical code-division multiple-access (CDMA) network is proposed. In this network, symm
prime sequence codes are used. We present the construction of symmetric codes and show that the pseudo-orthogona
In this paper, we propose the pre-equalization technique for the uplink burst transmission under the intersymbol interferenc
rain attenuation channel existed in the Ka band (20~30GHz) of the B-WLL system. We compare the mean-square-
The obtained results at mass-spectrometer study of composition of gases evolving from the nanomaterials enriched in sing
nanotubes have been presented in this paper. The nanomaterial has been produced by the electric arc sputtering of graph
We investigate methods to estimate the transmission coefficient of high-k gate stacks. Based on the commonly used Tsu-E
approximate the WKB and Gundlach methods to be feasible for device simulators. Comparisons with a rigorous solution u
Quantum mechanical analysis of the quantum confinement of ultrashort CMOS is numerically very expensive. In this pape
macroscopic model, which includes a new approach to match the vertical carrier profile and combines it with a classical mo
Modern switches and routers often use dynamic RAM (DRAM) in order to provide large buffer storage space. However, the
DRAM is frequently a limiting factor in the design of high-speed switches and routers. The focus of this paper is
Adoption of the Volterra integral equation method to investigations of electromagnetic field interaction with a 1D dielectric n
considered. Non-stationary means that the medium permittivity inside the layer changes in time owing to a
Fullerenes and their water-soluble derivatives have recently become a topic of interest in biomedicine. Here we report on g
activity of fullerenol C60(OH)24 on K562 human erythroleukemia cells. Capability of K562 cells to synthesize
The objective of this paper is to show that the visualization of an urban landscape by 3D computer graphics can be used a
habitats on a worldwide basis when we think of a sustainable world in future. In the 1900s, 2D digital urb
Abstract: In this paper a Cellular Fuzzy Associative Memory containing fuzzy rules for bidimensional image fuzzification in
developed. This cellular processor constitutes a subsystem of a CNN-based architecture which can store both
Abstract: This paper addresses the local grid map-building problem. Sensor readings are interpreted using a feedforward n
Bayesian rule is used to update the occupancy probabilities of the grid cells. A comparison of three neural network
This paper presents a geometric primitives extraction method from an image based on genetic algorithms. These algorithm
the optimization of the irregular functions since they deal with large and complex search spaces. Our
Wireless technology is frequently used in military networks for establishing communication in areas characterized by non-u
morphology (i.e., mountains, islands, etc.) where mobile military units have to be moved and for creating also a secur
In this paper a novel, graphical user interface, is presented. This interface can be used to generate a desired path of the e
manipulator. The path is selected by a static scene of the robot environment, manually either on line usi
In this paper we will discuss a mathematical modeling process and a computer simulation of an epidemic problem. The pro
control optimal, and then analyze by the maximal principle of Pontryagin with bang-bang control. The result will be
Block Digital Filtering (BDF) is a well known method for fast digital filtering. Indeed, it decomposes the input signal into bloc
computationality reduction provided by the Fast Fourier Transform algorithm to considerably reduce the
A crucial problem in development of systems of automatic morphological analysis for inflective languages is treatment of s
existing models require the development of the corresponding rules that specify which stems can be generated fr
Aim of this paper is to enhance product risk estimation by providing an integrated model. The similarity of “technical” and “m
management methods is identified and there is an effort to compromise two of the most known and widely accepted o
Several efforts have been focused on the improvement of new services of an urban transport network in order to face the i
demand. In this paper, we present a methodology based on a meta-model to design and simulate multi-agent systems. Th
Braille is the most widely used system for written communication using tactile means. Automation of the Braille reading pro
enable the transcription and duplication of existing documents as well as their preservation. By converting a
This paper presents a new algorithm for distributing bits to the subchannels of a DMT modem. The so-called Inverse Robin
converges rapidly and can effectively optimise the overall bit error rate in a non-Gaussian channel.
The gaussian filter is a 2-D convolution operator that is used to smooth out textures and noise in order to obtain a uniform
segmentation. The selection of the used filter scale parameter is still an ill-posed problem, and has not yet rec
Abstract: --- System of linear equations appear in a wide range of application fields. The Partially Solving Method(PSM)
us is one of the methods of solving a linear equation. So far, PSM can be solved without require knowled
System of linear equations appear in a wide range of application fields. The Partially Solving Method(PSM) which was prop
the methods of solving a linear equation. So far, PSM can be solved without require knowledge of the entire s
Stereo vision is a well-known technique for obtaining depth information from two or more video images of a scene. The he
problem in this approach is how to find the corresponding features extracted from the stereo images. In this paper,
For some kinds of linearly constrained optimization problems with unique optimal solution, such as linear and convex probl
optimum is also global. However, there are a broad variety of problems in which the property of unique solution
In several many situations we need to calculate the eigenvalues and eigenvectors of a matrix which is given as a product o
that is, we need to calculate the eigenvalue and eigenvectors of a matrix M which is given as $M=m_{1}m_{2}..
Noisy sensor data must be filtered to obtain the best estimate of the robot position in the robot navigation. The discrete Ka
is used for prediction and detection of signal in communication and control problems has become a commo
In this paper, a parallel VLSI processing architecture for MPEG-4 standard motion estimation implementation is proposed.
characteristics of low memory bandwidth and low clock rate requirements, thus primarily aiming at 3G mobile applicati
The electronic distribution of digital works leads to the collection and processing of huge amounts of personal data, and co
information. However, international treaties, EU Directives and National Laws contain provisions which protect t
While the computation of the matrix exponential is known to be dubious, the computed value is used widely in system anal
true for the time-dependent matrix exponential. As the systems that we model become more complex, the order
This paper presents an approach to defining multimedia applications.. Multimedia applications are different from other type
database, payroll, etc. in the sense that a multimedia application is a reactive system. It interacts with
This paper describes a new selective attention based method for wide range of target detection tasks, without using any a-
the target. In proposed system, several basic features are extracted directly from visual stimuli, and these f
In this paper is presented a method that permits to determine a best initial point of the simplex method (SM) proposed by D
of linear problems. This method is based on the analysis of the angles between the gradient of the objecti
Investigated is the problem of points matching in stereo images (both color and monochrome). The correlation method is a
around the points being matched. The influence of noise on the matching errors and the error reduction by vector an
- In the paper we present a systematic approach in managing fiscal data in Local Public Administration. The novel way has
with the “avalanche effect”, due to the mismatch of fiscal data in adjacent years, and other similar problems,
The paper describes a system to design computer processors and to simulate their behaviour during the execution of as
The system, called APE (Architecture Prototyping Environment), is based on a dynamic object oriented definition
One of incremental learning-based neural networks that theoretically guarantees the optimal generalization capability and
same generalization capability as that obtained by batch learning is incremental projection generalizing neural
The paper proposes a new adaptive VS LMS algorithm, obtained by combining LMS algorithms with different step sizes wi
weighting coefficients. As a criterion for choosing the VS LMS algorithm step size, we take the ratio between the
The tactile recognition of the shapes in robotics is based on the prototypes; their description imposes the processing of ma
imprints of each known shape. This paper presents some possibilities for the generation and processing of almos
Facial feature, as an important description characteristic, has been used for face recognition and facial expression analysis
has proposed an active shape model for facial feature extraction. Although it has a number of advantages ov
Due to the high mobility of low earth orbit (LEO) satellites, there is a significant number of handover attempts in a LEO sate
communication system, causing a high handover failure rate. This paper proposes an Adaptive Channel Reservation Sche
There are many industrial products that use digital video image processing for orientation control or object detection. Often
classification. However, if detection task has to be performed very fast and there are many different ca
In this paper, an adaptive median median filter (AMMF) is proposed to improve removal performance for image processing
algorithm is based on the local variance of each image pixel. So, it is used for adapting window size. The advantage of
In this paper we present a simple adaptive block-matching algorithm for video compression. Our method is an adaptive ap
difference classification (PDC) matching criterion. A constant threshold is used in original PDC algorithm. The optimum
In this paper we present a simple adaptive block-matching algorithm for video compression. Our method is an adaptive ap
difference classification (PDC) matching criterion. A constant threshold is used in original PDC algorithm. The optimum
A hybrid iterative learning algorithm for recurrent neural networks based on higher-order statistics to blind signal separation
paper. Fourth-order statistics are used as the separation criterion to train an RNN to perform the separat
This paper shows an adjective text estimation method to map from still-images and 3d models to adjective texts because a
used for different multimedia data to link texts, images, 3d object models, etc. The method automatically obtains
As network technology is growing very rapidly, many people have had PCs and used Internet service with high-speed mod
providing high quality network services in home and connecting home devices together in a network become a main issue
An agent-based emergent intelligence methodology is utilized to assemble agents into teams and assign distributed tasks
environment. The application concerns the management of military missions that utilize intelligent munitions that
An automated machine cuts the rolls of corrugated paper longitudinally and splits the paper stripe into multiple conveyors,
different equidistant lateral cut can be applied. There is a choice of input rolls of infinite length but d
HyperSAT is a generator of instances base in Hypergraph. This generator creates instances hardness that Selman, Pretol
sets of hard instances of propositional satisfiability is of interest for understanding the complexity of SAT, an
In this paper, we address one-machine real time scheduling problem when new jobs are continually arriving during the pro
with considering the limit times constraints. The objective is to optimize the execution number of tasks that arriv
This paper considers the decomposition of surface electromyograms (SEMG) using higher-order statistics (HOS). Modellin
MIMO system whose inputs in the form of innervation pulse trains are considered independent identically distributed
Intelligent tutoring systems are a generation of computerized educational systems, which are intended to improve the proc
teaching by attempting to mimic the capabilities of human teachers. The development of application technology in t
Pavement damage is actually one of the most crucial problems in roads. Agencies need first to localize the damage, secon
Indeed, the rehabilitation can be compromised, if the cause is not removed. The ground penetrating radar (GPR
This paper present an efficient low cost solution for the 3D free form object recovery problem. We first describe the realize
used to measure the 3D range image of the object, this system consists of a laser grid projector and a CCD
Abstract: - This paper presents a technique for developing a simple yet practicable model that can accurately replicate equ
cooling coil units and heat exchangers. The modeling technique is based on energy balance and heat transfer pr
This paper presents a theoretical analysis and a case study based on Taguchi’s model in quality engineering. The model p
of quality. Quality related cost and money losses, are not considered just for the manufacturer at the time of
- In this paper we propose an architecture for modeling the service discovery functionality of computing devices operating
environments. Forming wireless ad hoc networks requires service discovery protocols that support both proximi
This paper introduces a fast and reliable color-vision based inspection algorithm for real-time automated surface bone dete
meat. The algorithm employs a hierarchical segmentation and classification scheme and is designed to accomm
A satellite communication system is distinguished by its global coverage, inherent broadcast capability, ability to support m
on-demand flexibility. Taking into account this emerging communication role of the satellite systems, the pa
In the engineering analysis of the response of the foundation in layered soil, subjected to direct or seismic excitation, param
most desirable type of analysis because it has potentials for better optimal design. We are presenting a c
Because of the evolution of the World Wide Web, the fields of intelligent agents and multi-agent systems have become a fo
intensive research has originated several frameworks, or toolkits, that are used by the researchers to develop I
Separating vibration signals generated by defective rolling bearings is of major importance for rotating machinery health m
bearings of the same type are the quite frequently encountered in the industrial environment, especially in
Abstract In this report a complete analytic description for the temperature dependence of the majority carrier in a single im
semiconductor is proposed. This model should provide an attractive alternative to commonly used rules p
The dynamic load balancing problem which can be defined as the effective redistribution of workload among the system pr
execution time is dynamic in nature where the load and the processing power of the system may change in time as un
Vector quantization is a powerful way to compress images, rarely used in present compression schemes. We present here
technique on subband images, by means on an entropy contrained quantization algorithm. The codebooks are predetermi
This paper is concerned with the innovative techniques of multidimensional systems design based on Combinatorial seque
the concept of Ideal Numerical Bundles (INB), that can be used for finding optimal solutions for wide classes of tec
We research scheduling problem minimizing total tardiness on a single machine $1\mid\,\mid \sum T_j$. In the paper we p
different methods of calculus mathematics and combinatorial analysis to research the problem. In paper it is defin
Some techniques for reconstructing attractors from time series are shown in this paper. First, the time delay for obtaining th
used for the reconstruction is selected using the Average Mutual Information (AMI); second, the embedding dim
Abstract: - Signal processing front end for extracting the feature set is an important stage in any speech recognition system
set is still not yet decided though the vast efforts of researchers. There are many types of features, which
To facilitate overall lay-out optimisation simplified component models for dynamics simulations of automobile exhaust syste
optimisation could otherwise be computationally expensive, especially when non-linear analyses are necessary. S
The performance of speech recognition systems is mainly determined by the used acoustic feature extraction technique. T
known, namely the full-band approach and the multi-band approach using filter banks. Systems using either approach usu
Combined numerical methods being effective from the point of view of realisation in computers (finite difference method, b
least squares method, mullicriterial optimisation, nonlinear programming) have been developed in heterogeneous
Most blind channel estimation methods for Direct-Sequence Code-Division Multiple-Access (DS/CDMA) systems does no
carrier offset resulting from imperfect carrier recovery. The method presented here estimates jointly the carrier
Abstract: This paper presents a computer aided method for the analyses and simulation of a non-linear mathematical mo
machine tool. The derived model consist of the controller, axis drive and the spindle drive of a CNC turning machin
Abstract: - This paper will present an SDL implementation of Bluetooth mobile system’s protocol stack. This implementatio
and development of a validation protocol systems implementation. The final goal is to develop a method for pr
It is presented a modality to compute the boundary between the discontinuous (DCM) and continuous (CCM) operating mo
order PWM converters with parasitic resistances. To reach this goal, an averaged model of the converter has been us
The paper discusses a design framework for building robust military networks. The proposed framework includes advance
methods for defining optimal alternative routing paths, for examining network’s viability in cases of crisis and for
This paper presents a new approach in calibrating a light sectioning measurement system. The developed method permits
system without previous knowledge of the exact positions of camera and laser. The basic concepts of this new ap
Problems in operations research are often NP complete and optimal solution for larger problems cannot be obtained, there
have to be used. The boundary between the size of the problem that can be solved optimally and those where heuri
A new approach to the measurement of three-dimensional movement of particles is introduced. A single TV camera with a
image enables us to record the three-dimensional movement of particles as spiral streaks on a single image. Ever
In this paper we present a Genetic Algorithm (GA) with problem-specific operators for the layered digraph drawing problem
very different meta-heuristics: Tabu search and Multi-start descents. Tabu search has previously proved to be
An isoperimetric problem of the calculus of variations is reviewed. An integral functional, dependent on a function u (x), its
the independent variable x, is minimised. The minimisation is subject to the isoperimetric constraint
The complex object recognition tasks are still one big problem in neurocomputing today. This paper presents a method of
recognizing complex objects, in cluttered environment, in a purely feed-forward way, being able to account for ultra-rapi
Recently, motion activity which is defined as amount of motion in a video sequence has been included as a descriptor in M
motion activity descriptors (MADs) which describe this motion activity need to enable efficient content analyzing
Speaker Verification is a memory and compute intensive process, giving rise to area and latency concerns in the way of its
implementation. The training schemes for computing the speaker models, contribute significantly to the overall com
The brief summary of solving the problem of the computer semantic analysis of Russian texts is presented here. The esse
translation from Russian into the formal semantic language. The semantic dictionary which is the computer ana
Massive multi-agent systems with emergent global behavior represent a new paradigm in designing and building program
complex problems. Emergence, nonlinearity and self-organization of global behavior underpin robustness, flexibility a
The major problem discussed in this paper is to build mathematical model for the project scheduling problem with the unce
to solve the proposed model, a simple algorithm is suggested. The project scheduling problem with uncertain
The theory of linear systems in the max-plus algebra is developed for the analysis of discrete event systems. The timed ev
the tools used for modelling these systems, and their behaviour can be described by (max, plus )-linear equatio
The theory of linear systems in the max-plus algebra is developed for the analysis of discrete event systems. The timed ev
the tools used for modelling these systems, and their behaviour can be described by (max, plus )-linear equatio
One of the limitations of HTML websites is that even with high quality and aesthetically pleasing graphics, the visitor still ex
world. A three dimensional world within a website can provide the visitor with a rich, stimulating and inte
To develop applications for long distance courses has been a steady worry not only for the educator but also for the progra
searching for this modality of course has been increasing in a such great extent and guarantee is good sequence
Current educational curricula don’t fully cover the necessities of childhood and young people in our technological society. E
making a considerable institutional effort in order to improve the introduction of ICT (Information and Co
Current educational curricula don’t fully cover the necessities of childhood and young people in our technological society. E
making a considerable institutional effort in order to improve the introduction of ICT (Information and Co
Abstract: - An application framework to perform web usage analysis using advanced data mining methodology is presente
proposes decision trees for web user behaviour analysis. This includes prediction of user future actions and the typi
The purpose of call admission control in Controlled-load Service network is to offer a Quality of Service (QoS) commitment
bounds are not violated. The traditional way of achieving this goal by declaring the worse case traffic descri
As Internet is becoming popular to everyone recently, demands for higher-quality services such as VOD and home networ
increasing. Especially, home networking system can interconnect and control home appliances which use different protoco
Methodological characteristics of teaching in Primary and Secondary Education make us reconsider the pedagogic and ins
introduce the New Technologies of Information and Communication into schools. That is why it makes sense for teach
Bayesian reasoning method is becoming an increasingly important area for research and application in the entire field of A
paper explores the use of a predictive model for groundwater quality based on Bayesian reasoning. Moreov
This paper relates our experience in developing DISI2E - a distributed system on an Internet/Intranet environment; built fro
way children play LEGO. These modules can be any kind of file visualized by a browser: pictures, html files, aud
A state-space dynamic model for a palm wastes boiler is being developed and simulated. The unique feature of this boiler
the form of fiber and shell from the palm oil processing as its fuels. Specific characteristics of oil palm
An investigation into the dynamic characterisation of a rectangular flexible plate structure is presented and a simulation alg
behaviour of the plate is developed using finite difference methods. A thin, rectangular plate, with al
This paper presents a method called dynamic multi-optimal learning rates for neural network (NN) with backpropagation (B
analysis of the learning rates for a 3-layer NN to minimize the total square error is included. The optimal
This paper focuses on dynamic topic identification for adaptive statistical language modeling in automatic speech recogniti
correct solution of the cache model presented in [1] from a mathematical point of view, which constitutes at
There is a considerable difference in the rate of SW errors detection at different stages of SW use. During the system testi
intensity of SW utilization on the very limited number of systems. After SW release for the general use th
It is a well-known fact that there is a considerable difference in the rate of SW errors detection at different stages of SW us
testing stage there is a high intensity of SW utilization on the very limited number of systems. After SW r
This paper presents a Web-based educational hypermedia system, called ALICE, and focuses on the evaluation of its ada
system builds on the concept domain model and includes the elements of knowledge uncertainty in the process of user mo
This paper is focused in the effect of adaptive weighted non-linearity in speech coding. The results showed that the effect o
improves the spectral distance measure when compared to the system without non-linearity.
In mobile communications and digital TV systems, unknown signals are
transmitted through unknown channels. A common assumption in these issues is to consider the channel order as know
information is not available, and we must est
Switched current circuits cover such important areas of application like filtering systems, neural networks, A/D and D/A con
very simple and effective design method and practical realization of switched current filters has been prese
High-performance error-correcting codes are required by most modern systems for transmitting and storing digital informat
networks, mobile phones, satellites, magnetic disks, CDs and DVDs. We describe the use of computer programs f
The principal objective of this paper is to give elements of the object-oriented architecture of a finite element code dedicate
analysis. Emphasis is placed on the adequacy between object-oriented programming and the finite element m
The congestion control mechanism in TCP introduces idle transmit periods as a result of its small transmission window and
retransmission timer. This behavior occurs while recovering from packet losses, due to wireless LAN link errors. Therefor
Business process modeling, simulation, and an evaluation of different alternative scenarios for improvement has been prov
for decreasing the risk related to business process reengineering projects. Business renovation as the highes
Five robot vision algorithms for object segmentation are explained. This algorithms are compared in an experiment. The ai
to check which of this five algorithms are useful for our robotics project in the field of indoor room explora
In this paper, one relation-ship between the two-scale sequences which characterize two Multirresolution Ana
derivation, is obtained. The wavelet of one of this MRA is the derivative of the functions of the
Cutting force measurement during material working processes on machine tools is the reference point for the precise phen
parameters control which affect it. In this paper construction details were presented relating to the two proto
Formalized Symbolic Execution Zafirios Karaiskos Constantine Lazos Department of Informatics Aristotle Univers
Thessaloniki GREECE [email protected] Abstract: In this paper we present a semantics-directed description of symbol
This paper addresses head movement and its frequency property analysis in natural conversation. We manage to apply th
analysis. First we use head tracking approach to get head movement traces include the movement in x, y, z directions a
Abstract: Many approaches have been developed to solve the nurse-scheduling problem. This problem consists of genera
working days and days off for each nurse in a hospital subject to hard and soft constraints. The approach presented in
Based on video images, face identification gets more and more interesting to be implemented in new products. By the mea
integration (VLSI) based solution, this very challenging task can be solved. As target platform a field program
This paper presents hardware implementation of the data encryption and decryption of the DES standard algorithm. The d
Box circuit Exclusive-OR circuit, Circular Left Shift circuit and the control unit. The S-Box circuit implemented
Sign languages are the basic means of communication between hearing impaired people. A translator is usually needed w
to communicate with persons that do not speak sign language. The work presented in this paper aims at developing a
The paper presents the application of Hidden Markov Models to text generation in Polish language. A program generating
Hidden Markov Models was developed. The program uses a reference text to learn the possible sequences of lette
This paper presents research-in-progress using colour as a means of image segmentation for use in biometric security me
The limited processing capability of mobile devices has restricted the computational complexity of security alg
The method of end-effector pose accuracy improvement using joint error mutual compensation for robotic manipulators wit
presented. The computer simulation and experiments of the developed method showed that it was possible to perform
In order to retrieve an image from a large image database, the descriptor should be invariant to scale and rotation. It must
discriminating power and immunity to noise for retrieval from a large image database. The Zernike moment descript
In order to retrieve an image from a large image database, the descriptor should be invariant to scale and rotation. It must
discriminating power and immunity to noise for retrieval from a large image database. The Zernike moment descript
As a distributed computing middleware, the Smart Data Server (SDS) provides a general frame for easy-to-build environm
with distributed functionality and a secure mechanism for invocation. But there are still some problems in the wi
Hough transform is one of the most common methods for detecting shapes (lines, circles, etc.) in binary or edge images. It
to detect discontinuous patterns in noisy images, but it requires a large amount of computing power. This
Incursion-based computational method of estimation of robotic manipulator path tracking accuracy deterioration, caused b
the control law in the near-singularity areas, was developed. The simulation results of the 2R robotic manipu
Most superquadric-based three-dimensional (3D) image representation methods recover superquadric models by minimizi
defined objective function. The objective function serves as an error metric to evaluate how accurately the recovered mo
Today, different control methods have been proposed for ac drives. Considering the relatively vast application of induction
designers always try to use the best control methods in order to improve the efficiency and performance of indu
In this paper we analyze the evolution of the modern educational delivery system. The main emerging educational paradig
paradigms are considered as main features of a new educational delivery model. This model is treated as an e-bu
To enable content-based access and manipulation of video content, modern multimedia communications require per-objec
data. Two additional building blocks of video transmission systems needs to be defined, which enable access to vide
SHAI is developing a Comprehensive Astronaut Health Maintenance System to improve astronauts’ ability to maintain thei
during long-duration space missions. Long-term goals of the project include producing an integrated set of intellig
The simulation of realistic networks is an important aspect in the development of new protocols or algorithms for communic
traditional approach for such a simulation is to connect a certain amount of sources to network nodes and to meas
We consider the eigenvalue problem H*x=lambda*x, where H is a real symmetric matrix. When eigenvalues of symmetric m
is generally expected that they will be computed with an error bound proportional to the product of machine precisi
Multiple description (MD) codes have been proposed as a mechanism to provide robustness against loss of data in the con
networks. Therefore correlation is inserted between the descriptions produced by the MD code. In this paper the foc
A least-connection algorithm based on variable weight is presented in this paper in order to satisfy the requirement of mult
which is based on the analysis of the existing cluster architecture, algorithms of the load distribution and b
In this paper the authors present a Lyapunov theory-based FNN with MOGA for application to nonlinear time series predic
employs FNN structure and the learning algorithms are the combination of MOGA and LAF. The application considered
The need for better quality of service is growing as new quality sensitive services are becoming more and more important
key element in providing quality-of-service or grade-of-service in packet networks is deciding when or in what o
This paper presents MATLAB programs for generating the coefficients of the lowpass analysis filter corresponding to ortho
analyses. One of the programs generates the famous Daubechies maxflat wavelets, and a second generates the Daubec
This paper presents a comparison of two different methods for estimating the impulse responses of multiple FIR channels.
consists of two iterative steps. The two-step maximum likelihood (TSML) method is based on knowledge of the probabili
There are various Mission Control Centers (MCC) in many countries. But analysis of the existing literature proves absence
structure optimization although optimal structure of MCC could allow to increase profitability of mission cont
Magnetic microactuation systems of torsion silicon cantilever is described. Devices are constructed in a batch fabrication p
electroplating with conventional photolithography , materials, and equipment. The magnetic transducers are ap
MOBILE COMPUTING: Recent Advances Najeh Mohmed, Department of Communication, Petroleum Research Center, T
ABSTRACT: Mobile computing is a new device of computer access with two currently dominant trends: producing portable
With the development of the modeling and simulation of agent-oriented complex system, we can mostly share the model a
technology, improve the reusability and interoperation of the model, and fully develop the ability of decision support of th
Mobile phones are already approaching penetration rates of close to 80 per cent in some parts of the world. Mobile payme
are expected to become an important part of retail payments. M-payments are defined as payments that are carried
Image segmentation aims at partitioning an image into meaningful regions in order that each region groups contiguous pix
attributes This paper describes a pyramid–based method for unsupervised image segmentation. In our approach, image
Multiple users communicate with individually assigned codes on a single radio carrier frequency in a DS-CDMA system. M
codes limits the capacity of the system. Conventional detectors of receivers are for single-user, which are desi
Advances in the work on interfaces that facilitate access to databases through Internet are presented. Increasing needs of
computer resources, the technological advance in this field, and the limitations of the graphic interfaces and
In this paper, the integration of Artificial Intelligence and sensitivity analysis is described for the formulation and resolution
load flow problem. Instead of formulating of a scalar optimization problem, the development of a fuz
In this paper an application is presented of the wavelet packet method for denoising of impulsive vibration signals. Vibratio
often includes signals with periodic excitation of resonances. The aim is to extract information regarding
In this paper, the task of channel equalization is considered as a classification problem. A classification method using adap
presented. The possibility of replacing the channel equalization and decoding solely by classification, using c
The solution of ODE systems with a variable matrix of coefficients can be found explicitly if the matrix satisfies the conditi
commutation. It is known that the solution of such systems with a noncommutative matrix is found by product
In this paper the effects of steganography in different image formats (BMP, GIF, JPEG and DWT-coded) are studied. With
we try to give an answer to the following questions: “how many bits of noise (i.e. the textual secret message)
Product quality and productivity improvement of a fermentation process implies, usually, reliable on-line measurements. Du
costs and inefficient technology to obtain on-line measurements, several methodologies were developed to
Extracting features of interest from large and possibly heterogeneous imagery data sets is a crucial task faced by many co
from broad area environmental monitoring, to modern cartography and medical imagery. With new distribution tec
Multiparty conferencing is becoming an important topic in the next generation networks. An essential part of multiparty con
protocol, which has to establish, modify, update and terminate conferencing sessions. This paper focuses
A common problem encountered in the simulation of WANs is the huge amount of data that the simulator handles. Especia
discrete-events simulation scheme, this affects dramatically the performance because most of the data overloads the li
In this paper, the Hopfield model of artificial neural networks called HANNs for finding some software task allocations in mu
have been proposed. A multiobjective optimisation problem with two criteria has been considered. Resource
Russian-Ukraine spacecraft “Ocean-O” (S/C) was launched on July, 17, 1999. S/C is controlled from Mission Control Cent
M), town Korolev, Moscow region. Purpose of the S/C “Ocean-O” is operative reception of Earth and World ocean remote
This paper presents an experimental characterization scheme to evaluate and optimize the performance of a sheet-of-light
Characterization of a sensor is an important way to determine its working range. The proposed characterization pro
Abstract Fingerprint is the most vital & unique biometric feature used for personal identification. The manual fingerprint ve
consuming & incapable of meeting the increasing performance requirements of today’s e-commerce & oth
In this paper we present a new method of pitch estimation in speech signals. The existing methods in pitch estimation do n
estimate of the pitch value, in presence of sinusoidal noise.Thus these methods have large errors in presence
Growing evidence suggests that the success of a learning system may critically depend not only on the nature of the envir
learner is placed, but also on the methodology for context development and for learners' evaluation. This paper is
The alternative approach for speech recognition proposed here is based on pseudo-articulatory representations (PARs), w
approximation of distinctive features, and aims to establish a mapping between them and their acoustic specific
A new neuron network model, as an assistance of image perception, is proposed in this paper. It is based on the retina. An
neuron network model can both describe the transfer property of retina well and neglect subordinate details w
Eyetracking is one of the latest technologies that has shown potential in several areas including human-computer interactio
without disabilities, and for noninvasive monitoring, detection, and even diagnosis of physiological and neuro
Regularized iterative image restoration is proven to be a successful technique in restoring degraded images. However, its
still images or off-line video enhancement due to its slow convergence. In order to enable this iterative
Abstract: - This paper proposes the merging of two well-known methods used to model DC/DC PWM converters: the state
method and the injected-absorbed-current (IAC) method. The resulted method is called the averaged characteristic coef
Support Vector Machines (SVM) is one such machine learning technique that learns the decision surface through a proces
has a good generalization capacity. SVMs have been proven to be successful classifiers on several classical patte
In this paper, we present a comparison of the possible regenerative estimation variants of response times, in multivariate s
queuing networks. The underlying stochastic framework of the techniques under study is first described and the
The tactile matrix sensors often generate the binary imprints of the explored shapes in robotics. For the shape recognition,
characteristic features define both the prototypes and the unknown shapes. The similarity between two shapes
In this paper, we introduce the advantages of using a microcontroller with Embedded Internet to automate and integrate m
equipment with supervisory computers and process/production control servers. We also present a real application
According to previous modeling studies - propagation of depolarizing wavefronts - consists of subintervals, each character
smooth progression of activation. At the onset and end of these intervals, abrupt changes occur in the 3D pattern
In the development of the real-time database, the storage and management of historical data are very important. High effic
algorithms are necessary for large storage of data. In this paper, the swinging door algorithm and its property
Mechanisms of results merging in a distributed search system have been discussed in this paper. Such mechanisms’ aims
relevant documents retrieved by different servers and put them on the top of the list returned to the end user. In
The retrieval of images from a large database of images is an important and emerging area of research. High-resolution im
database are decomposed into sets of image features which are stored in the logical database. Currently a few ima
Abstract In this paper we show how a cognitive mapping theory [1,2] can be used to implement a navigational map for a ro
theory is the notion that a representation is computed for each local space the robot visits. These representa
Abstract to follow
Generally the one of problems in Voice Activity Detection (VAD) is speech region detection in noise environment. Therefor
the new method using the energy, lsp varation. Processing time and speech quality of the proposed algorithm as
The objective of this paper is to show that the visualization of an urban landscape by 3D computer graphics can be used a
habitats on a worldwide basis when we think of a sustainable world in future. In the 1900s, in Japan, 2D d
Mobile Agent (MA) systems are complex software entities whose behavior, performance and effectiveness cannot always
designer. Their evaluation often presents various aspects that require a careful, methodological approach as well as
After an introduction into safety terms a fuzzy controller for safety related process control will be presented. One can show
necessary rules is relatively small. Thus, there exists a real chance for verification and validation of softw
Developping fast and robust methods for identifying multiple FIR channels driven by an unknown common source is impor
communications, speech reverberation cancellation and other applications. Many second order approaches have been pro
When cryptographic techniques are added to advanced network services such as Multimedia-on-demand many aspects ha
Especially, when commercial services are being offered, aspects related to secure payments, server fraud protection and c
A new segmentation algorithm, which utilizes boundary, area and texture features, for segmenting extended target in comp
proposed in this paper. First, according to the characteristics of extended target, the target is preliminary segmen
Given a large set of natural language documents, their numerical characteristics and the corresponding metrics allow selec
for a given topic, dividing the set of relevant documents into groups that reflect sub-topics of the given to
The method to create shadows with shadow volumes for real-time applications, was introduced by Crow and improved by
Shadows Real Time“. Heidmann used the Stencil Buffer for the calculation of the inner geometry of shadow volumes. The
In this paper we give a detailed description of the progress achieved in the techniques for feature extraction, signal pre-pro
representation and robustness against noise necessary to implement a speaker verification system useful in a
To facilitate overall lay-out optimisation inexpensive dynamics simulation of automobile exhaust systems is desired. Identif
linearity as well as finding simplified component models is then important. A flexible joint is used betwee
This paper focuses on the production scheduling in MEMS (microelectromechanical system) manufacturing. The whole ME
can be organized as three sub-processes, that is, the front-end process, the wafer cap process and the back-end proces
This paper proposes the use of XML Petri Nets (PNML), a kind of high-level Petri Nets, for simulations Web-based system
Business, Business-to-Business (B2B), e-Commerce and mobile applications wireless in the Web or ad-hoc network
In our previous works, we advocated the use of distributed search architectures where multiple independently owned and m
search engines act as one search system. This approach has significant advantages over the currently predominant
During the last 20 years, several congestion control algorithms have been proposed to achieve network stability, fair bandw
resource utilization. This paper aims at comparing three well-known control schemes that are Reno, Vegas an
This paper presents the characteristics of a software developed on MatLab Scripts to obtain the synthesis of radiation patt
antenna arrays. Several classical techniques have been considered such as Schelkunoff method, Fourier series and
The capability of being able to track moving sound sources is one of the most important characteristics for microphone arra
a simple source tracking scheme is presented. Performance analysis and simulation results are also present
Coherent Imaging Systems (CIS), such as optical and acoustical holograms and Synthetic Aperture Radars (SAR), have m
suffer from the phenomenon of speckle noise. It has been believed that the main reason of this noise is the interfer
The initial results of investigations into the use of current commercial automatic speech recognition (ASR) software by peo
(dysarthria) is presented, together with a brief summary of the history of the development of ASR and its
When multiple reinforcement learning robots engaged in collective behavior the apprentice learning (AL) arise, where each
learner and the trainer simultaneously. The objective of the learner is learn a good policy that can be appli
Multi-Input Multi-Output (MIMO) transmission systems is a topic of great interest for a few years due to the huge spectral e
provide over rich scattering transmission channels, such as indoor (e.g. wireless local area networks) or u
Drape is considered to be one of the most important fabric properties, because it is main contributory factor in designing an
this reason, the measurement and understanding of drape are required to specify the performance of fabri
In the course of an industrial research project a high-speed optical surface defect detection system was developed. The m
piston ring wire. Main condition was to continuously inspect the whole surface without slowing down the producti
We research scheduling problem minimizing total tardiness on a single machine $1\mid\,\mid \sum T_j$. We formulate and
conditions of optimality of schedule and create suitable branch method ($A$) which solves general example of the problem
The Probabilistic Context-Free Grammar (PCFG) model is widely used for parsing natural languages, including Modern Ch
Chinese (also called Old Chinese), the computer processing is just commencing. Our previous study on the part-of-
Distributed Partial Mixing (DPM) is an approach to creating a distributed audio service that supports optimisation of bandw
multiple related audio streams (e.g. from concurrently active audio sources) while maintaining fairness to T
E-learning courses based on video-streaming technology are a promising form of transferring lectures to the Internet. Thou
types of courses, lecturing is a well-tried educational mode suitable in many cases and proven for transport
The Internet has been utilized in several real life aspects such as online searching, and chatting. On the other hand, the In
in communication of crime related matters. Monitoring of such communication would aid in crime detection o
Though BIFS is a complex description language that represents MPEG-4 content as text or bit streams, most traditional M
tools are developed for a BIFS expert. Before using these tools, many authors must invest much time and energy i
State-of-the-art TCAD software like the multi-dimensional device and circuit simulator MINIMOS-NT require a huge amoun
addition to the device input data to control several different complex modules and tasks. This information is normall
Abstract: - The effects of spatial correlation and LOS (Line of Sight) component on capacity of broadband MIMO channels
purpose a flexible, parameterised model for the MIMO channel is proposed. The capacity gain that can be achi
The model adaptation scheme PMC plays an important role in robust speech recognition. PMC can handle not only additiv
noise. However, how to get the model of convolutional noise remains an open problem. In this paper, the methods o
The model adaptation scheme PMC plays an important role in robust speech recognition. PMC can handle not only additiv
noise. However, how to get the model of convolutional noise remains an open problem. In this paper, the methods o
The paper deals with initial methodological basis for building expenses management system in construction. It also design
management process under the standard SADT. The paper suggests methods of expenses management system in constr
The paper deals with initial methodological basis for building expenses management system in construction. It also design
management process under the standard SADT. The paper suggests methods of expenses management system in constr
In this paper, we propose the pre-equalization technique for the uplink burst transmission under the intersymbol interferenc
rain attenuation channel existed in the Ka-Band (20~30GHz) of the B-WLL system. We compare the mean-square-
In this paper, we propose the pre-equalization technique for the uplink burst transmission under the intersymbol interferenc
rain attenuation channel existed in the Ka-Band (20~30GHz) of the B-WLL system. We compare the mean-square-
The exact pitch(fundamental frequency) extraction is important in speech signal processing like speech recognition, speec
However the exact pitch extraction from speech signal is very difficult due to the effect of formant and tra
It is essential to build the models in the sunken ship ’s optimal simulation system. The paper provides a simple simulation m
oriented Analysis technology. The method presented here is practicable to realize with simulating the real pro
Image restoration is an important issue in image processing, which helps recovering of degraded images caused by variou
circumstances. Neural networks models have been successfully applied in handling image restoration problem and so
This paper describes new method for building occupancy grid from single camera, automatic calibration of this method and
this internal representation for cleaning unknown environment. The algorithm is designed for indoor application. T
Nowadays the network management buzzword is mostly associated with SNMP. Traffic increasing between the SNMP ent
problems such as congestion, and this may lead to entity failure. This paper suggests a new database called Consultant D
While reading handwritten text accurately is a difficult task for computers, the conversion of handwritten papers into digital
automatic processing. Since most bank checks are handwritten, the number of checks is very high, and man
In practice for making administrative or other decisions use so-called "commanding-staff" organization of making decisions
is the final decision elaboration during interaction of the person who making decision (PMD or "commander")
PaTra (PAtch TRAcker) is an agent capable of keeping track of patches that have been applied (old) and have to be applie
software system. Patra uses Oracle's Metalink, a support web site that can provide a list of patches for a specif
This paper presents a surveillance system that detects and recognizes people in indoor scenes. To distinguish between d
histograms on a perceptually uniform color space are used. The goal here is to associate a sequence showing a p
The first task to be accomplished in speech recognition is the segmentation and labeling of records. Regarding speech, thi
and costly procedure, although of most importance because at the present time many available speech corpora a
The purposes of this paper are: i) show how to use the previous knowledge of any economic analyst and represent this kn
[7]; ii) discuss the application of a combination of Neural Networks and Fuzzy Logic to predict the evolution of st
New topological valence charge-transfer indices are applied to the calculation of dipole moments. The dipoles calculated b
semisums of the charge-transfer indices are defined. The combination of the charge-transfer indices allows the
In this paper various approaches for solving the minimizing maximum lateness scheduling problem on a single machine $1
are considered. Both traditional combinatorial methods and mathematical programming methods are presented.
Preliminary results are presented for a color-flow imaging system being developed to detect early cancer by imaging tissue
simultaneously. The principal challenge is to separate blood velocities from movement of the surrounding
Abstract: MPEG-4 introduces the concept of video object to support content-based functionalities. Video object segmentat
defining the contents of any video sequences. Head and Shoulder Sequences (HSS) are typical in video conferencing
In this work, we present our approach for indexing images in multimedia databases, in order to facilitate the visual informat
We propose a new shape descriptor that can incorporate color information as well. The descriptor is bas
In this paper, we propose a method of digital watermarking for still image using multi-stage discrete wavelet transform whic
original image for watermark detection. The watermark, generated by pseudo-random sequence with a normalized
In this paper, we propose a method of digital watermarking for still image using multi-stage discrete wavelet transform whic
original image for watermark detection. The watermark, generated by pseudo-random sequence with a normalized
The Wavelet solution for boundary-value problems is relatively new and has been mainly restricted to the solutions in data
processing and recently to the solution of differential equations with periodic boundary conditions. This paper i
This paper describes the design and implementation of an effective web-based multimedia content management system (M
integrating and composing personalized digital news for interactive broadcasting. A 5-layered architecture is proposed
Enterprises in a small country, like Croatia, can enjoy many benefits from e-business globalization, but they can also suffe
able to find the right way to accept new rules of their business behavior. A vast majority of Croatian ex
The World Wide Web is currently used as an information source, and information can be retrieved from the Web by search
Although existing search engines are powerful in helping users to locate and find information of interest, they do not
The World Wide Web is currently used as an information source, and information can be retrieved from the Web by search
Although existing search engines are powerful in helping users to locate and find information of interest, they do not
This paper is dedicated to on-going research activities in the field of wireless metropolitan and wide area networks with Qu
guarantees. We focus on self-organizing systems, so-called adhoc networks, which can operate without any wir
In this paper we present the three algorithms of classification text solution. The first solution bases on the key words. The s
words classes. The third one bases on the mixed algorithm. The algorithm of the automatical texts classif
We may get erroneous outputs because of random defects in the IC fabrication, which affects the functionality of the chip.
applied to the circuits by a tester must have high defect coverage in identifying the defective chips. For cir
This paper shows the results of a comparative study among digital money protocols - that are base to several schemes us
conventional money. Some indicators have been defined to compare them. All data that are shown here have been obtain
Current business applications require a large number of components, resulting in complex and tightly coupled systems. De
systems demands for a strategy promoting reuse, modularity and easy integration. Architectural fitness enlists a
This paper describes a www application developed to access and manage a virtual laboratory for teaching parallel comput
cluster of personal computers with Intel processors running the NASA's Beowulf cluster software and using the M
Abstract: This paper presents an experiment of using a multi-agent system that improves the efficiency in network manage
environments. This system aims to decrease the financial damages occasioned by processing interruptions of the computa
Any security system, even when designed and implemented according to the newest technology, will have to rely on peop
factors play a crucial part in the majority of accidents is a troubling feature of modern “security know-how”: We
This work presents a framework for network system development that introduces a new phase in the usual procedure: the
The main goal of this phase is to bridge the gap between high-level security requirement analysis and the low-le
Implementation in FPGA of the new Advanced Encryption Standard, Rijndael, was developed and experimentally tested us
Development Kit board, based on Xilinx Virtex II XC2V1000-4 device. The experimental clock frequency was equal to 75 M
With the competitiveness and the explosion of Internet, companies need to minimize the cost and effort demanded in the s
and to increase the quality of services, turning them able to serve efficiently the great and growing number of exi
The realization of a virtual private network (VPN) necessitates the application of encryption at some level of the network-la
work, we propose the use of our encryption algorithm “Yet Another Encryption Algorithm” (YAEA) to encr
When evaluating today business environment, it is noticed that e-business technologies are being outlined as fundamenta
value chain of traditional business activities. Furthermore, the growth of e-business technologies in the glo
The aim of the relevance feedback model presented here is to apply accumulated users’ knowledge in searching for text in
information retrieval system keeps individual feedback from users, determines appropriate documents and expands the ini
In this paper we present a hardware-software partitioning approach for dynamically reconfigurable systems consisting of a
processor (CPU) and a dynamically reconfigurable datapath (FPGA). The overall latency and the power consumption are m
This paper presents and analyses a case study based on a network security central logging and auditing model using a da
the initially centralized architeture, the use of a database management system and standard storage make it possi
This paper presents ANE (Active Network Environment), a new research project. ANE is an execution environment for gen
Networks. The project is based on observations about other similar existing projects in the same area. ANE is an auxi
EEPROM as persistent memory in smart card has some different features with other memories. It consists of the pages wi
the characteristics due to them. It is more efficient to consider them and to handle EEPROM by page than to think
We show that the protocol for certified mail delivery of Ferrer-Gomila and others \cite{GCR00} is vulnerable to a replay atta
the legitimate originator of a previous run of the protocol to a second, spurious run. As a consequence, pr
- In the future, SIP(Session Initiation Protocol) protocol is to be a standard on the VoIP(Voice over IP) world. There need a
SIP based VoIP(Voice over IP) service on the LAN(Local Area Network). In the Internet, DNS(Domain Name
Abstract: “How to identify the stakes of an organisation stakeholders?” this is the question for which, this paper sugges
approaches from two different areas, strategic management from management area and, designed systems and human a
This paper presents a research on formal specification and verification techniques. The results obtained allowed the devel
tool capable of verifying communications protocols properties. The tool, called Verest+, is based on Fuzzy a
System designers, engineers and user communities in the process and industrial control domain are increasingly realizing
obtained by remotely connecting their control networks with higher level enterprise networks and systems. How
The information society exponential growth has been demanding more efficient methods of education. Constant evolution
require prompt response of education media. The Acadia environment proposes a flexible teaching environment suppo
Multicasting has become increasingly important with the emergence of Internet-based applications such IP telephony, aud
distributed databases and software upgrading. IP Multicasting is an efficient way to distribute information from
It is well known that computer network attacks are a real threat against information security. Thus, some efforts must be de
attack detection methods, so that they favor the intrusion detection and counter-measure procedures. This pap
Object-oriented systems are gaining acceptance in the IT industry while receiving little support from hardware engineering.
aspects of object-oriented computing can receive worthwhile improvements from hardware implementation. These a
The bandwidth-delay-constrained least-cost multicast routing is a challenging problem in high-speed multimedia networks.
constrained Steiner tree is an NP-complete problem. In this paper, we propose a novel QoS-based multicast routing alg
Abstract. Small to Medium Sized Enterprises (SMEs) belong to one of the most important economic sectors in Iran. This pa
survey of 403 SMEs that use Internet or have their own domain name and/or web site. This paper discusses about their
This paper presents an Hw-Sw co-design environment based on the Application-Driven Architecture-design approach. VLI
Instruction Set simulation were chosen to fulfill the application domain requirements and to match effectiveness and fl
This paper describes integrated testing and debugging environment for Java Card. An integrated testing and debugging en
JCRE (Java Card Runtime Environment) and Java Card APIs (Application Programming Interface). And also, developed
The market for the public transit fare payment system using contactless smart cards is rapidly growing, however, the paym
different vendors are not interoperable. This paper presents an interoperable payment protocol for the public
Due to decreasing device sizes and increasing clock speed, the interconnect delay is the dominant factor in clock skew. Th
extracted as RC component in available EDA tools. In this paper, we model the interconnect as RLC for systems runni
Gigabit networks cannot be fully utilized even by today's high end systems. The processing requirements of applications a
like quality of service or security processing aggravate this situation which will get critical with next generat
Time Triggered architectures are widely used in the design of distributed fault tolerant real-time systems. Time-Triggered P
many variations are widely used in safety critical systems such as fly-by-wire systems. In this paper, we
In electronic commerce protocols, atomicity and accountability are very important properties. Atomicity consists of money a
and certified delivery, while accountability consists of money accountability and goods accountability. If
The prime focus of today’s Internet is on providing connectivity without assurance of service quality. However many real-tim
teleconferencing and IP telephony require stringent quality of service guarantees in delays and bandwidth wh
Concerns about Web users' privacy and network security are attracting an increasing attention. Despite that, people have
relationship between privacy and security and usually think that every time we talk about privacy, we are also talkin
Several asynchronous synthesis techniques utilize Signal Transition Graph (STGs) as the initial circuit specification. In this
implementation methodology for asynchronous circuits design in which graph transformations are applied to d
Important changes in the way systems have been built are necessary. Cost and time estimation in system building as well
are imprecise causing decision making risky for managers nowadays. In order to minimize costs and risks, new tech
Partitioning problem in codesign is of critical importance since it has big impact on cost/performance characteristics of the
Complete problem that deals with the different constraints relative to the system and the underlying t
Abstract: For every organisation there exist different stakeholders with variety of stakes. Managing the stakeholders throug
stakes and taking them into account, in order to achieve the organisation purposes, is an essential problem.
- This paper presents and analyzes test results of the single rate Three Color Marker (srTCM) algorithm middleware implem
defined at the RFC 2697 [1], basically performs traffic shaping through two token buckets and packet marking acco
The main purpose of this research is to identify the determinant behavioral variables in the decision to shop in virtual retail
users: those who use, those that have given up using, and those that do not use E-Commerce. The investiga
This paper describes a new method to integrate and implement e-commerce systems in distributed computing environmen
Internet. In this paper, we propose a core part of ontology repositories for e-commerce systems, illustrate the organisat
The migration of classic Internet to support real time and multimedia applications (videoconf, voip) require improvement of
service. Diffserv architecture proposed by IETF is one solution that can provide different services to different
This paper proposes a new architecture for distributed assembly platforms that is well suited to hardware-software codesig
attribute is the reusability of her atomic architectural units called “assembly actors”(software/hardware devi
This paper presents the specification of software components intended to aid the construction of simulation tools used for
the performance of computer network systems. The components specification conforms to IEEE 802.11 wireless s
Abstract: -The objective of this paper is to present and justify the reasons for developing a new part coding systems that in
characterization of the parts. This new coding system not only could be used in common applications, also i
Information is the blood of modern organizations. It permeates the organization in several ways, and it is a key factor not o
competitiveness but also in terms of public perception. The Internet revolution has made all organizations aware t
This paper describes an approach aimed at solving the Quality of Service requirements of the data or of the service purcha
link communication and performance related information to the data itself, so that user-network interactions
A digital representation of complete production facilities will provide a lot of new features and possibilities in plant productio
models cannot be build, because of the diversity of tools and model structures used, nowadays. Furthermore,
The IETF Resource Allocation Protocol(RAP) WG has defined the COPS protocol as a scalable protocol that allow policy s
communicate policy decisions to network devices(PEPs) in a Policy-Based Networking environment. So far most of the stu
This work describes a system of cryptography for storage of data using linear codes. Through the study of the foundations
and algebraic theory of linear codes, the importance and efficiency of the described systems are analyzed,
DEEPSIA (Dynamic on-linE IntErnet Purchasing System based on Intelligent Agents) aims to develop a system to support
purchasers in electronic commerce e-procurement processes. To pursue this task, DEEPSIA is implemented using a Multi
Internet has been playing a major role as communication media. However, client-server technology centralizes publishing
excluding the average user from exposing his ideas. Dedalus is a peer-to-peer platform that proposes an alternative t
With the rapid growth of the wireless Internet service, the interest in security technology over the wireless Internet has bee
Internet security technology provides users with confidentiality, authentication and non-repudiation based
MPLS is highlightened as the most promising technology for the integrated IP-over ATM backbone networks. Nowadays, o
practical issues in MPLS is the capability to provide Differentiated Services. For integrating IP and ATM with scalabil
This paper introduces Policy Management Tool which was implemented based on Policy Information Model in policy based
system that was made by using policy sever. Policy based network security system consists of policy server managing and
ANE (Active Network Environment) is a new environment to active networks programs execution. ANE has a lot of security
hostile hosts issue. But a very interesting issue of ANE is the chosen method to void the certificate transport.
The greatest headache in the information-oriented society of today is security problem. This paper deals with Denial of Ser
which is executed by a malicious user with intention to prevent legitimate users of a service from using the de
A key agreement protocol is the most important part to establish a secure cryptographic system and the effort to standardi
protocols is in rapid progress. Several efficient and secure key agreement protocols have been proposed so far s
Tele-services are one of the promising business area for Small and Medium Enterprises (SMEs) which involve using the In
contracted services performed over the world. This paper provides an assessment of the challenges to be overcome by SM
Network security management is attracting a special attention in recent times. There are many kinds of security technologi
systems and organizations. Each security tool is important aspects of security but, the effective manageme
The deployment of advanced QoS-based services in the Internet requires the coordination of several administrative domai
and maintenance of flexible Service Level Agreements (SLAs) among them. The service levels defined by the SLA m
The increase in the speed and power of the processors now available has given us the opportunity to use workstations and
out multimedia communication. Unfortunately, this type of application requires real-time resources which curren
The paper deals with FPGA implementation of three cryptographic algorithms compliant to IP Security Protocol (IPSec). Th
three different classes of cryptographic primitives: block cyphers (CAST5 algorithm), stream cyphers (RC4) and h
Self-similar processes have been shown to adequately represent Wide Area Network and Local Area Network traffic. Howe
generation of sample paths turns out to be a demanding task. In particular, for packet switching network analysis, the
A group undeniable signature scheme is proposed in which each group member can sign on behalf of the group without re
and the verification of a signature can only be done with cooperation of the group manager. For business appli
: This paper describes a dedicated hardware/software architecture for an image processing application: a computer vision
detection. The system is able to detect and count moving vehicles crossing a selected from a video input captured b
Electronic purses in smartcards are protected by well-designed protocols and strong encryption. However, progress in the
of attacks using side channel leakage show that implementers need to update and improve tamper resistance on a
The main objective of this work is to present a study carried through in the Management College of University of Sao Paulo
Internet as a collaboration tool and to describe the impacts that this kind of communication infrastructure revea
Sensor networks encompass a set of micro sensors deployed across a region for a given application. Power optimization i
stand alone sensors coordinating with each other in a sensor network. This paper presents an inductive model, tha
Digital signature can be associated with Internet messages in order to guarantee authentication, message integrity and no
Verification of incoming digitally signed messages is usually performed by the e-mail client, on behalf of th
Using a biometrics to authenticate a person’s identity has several advantages over the present practices of Personal Ident
in smart cards. However, there is an open issue of integrating biometrics into the smart cards. Typical verif
This paper presents the use of the computer in education. First in Internet projects and after using Special groups with sam
historical overview of the use of information technology in the Brazilian Education. It identifies the main p
Nowadays, many capable mechanisms to provide Quality of Service (QoS) at the Internet are emerging. So, it’s very impo
internetworking among different QoS environments, as Differentiated Services (DiffServ) and MultiProtocol Label Switching
The growing level of interconnection between computer networks and the popularization of the usage of computers has be
information systems to several risks. The Intrusion Detection Systems (IDS) are one of the emergent tools to prot
Information system development is often in connection to functional requirements and business processes in organization.
relevance of the basic information technology infrastructure (IT infrastructure) is therefore easily forgotten. Ho
A distributed program can be described as a group of autonomous computers interconnected and communicating only thro
Although the Internet is the most ubiquitous platform, it is being used mostly for client-server applications. It is
ESES/XKRS(XML-bases Key-Recovery System), which will be introduced in this paper, is a subsystem of ESES(ETRI Sec
Service) that has been implemented to support security services such as authentication, integrity, confidentiality and key-re
The growing of computer networks (LAN, WAN, internet) and technologies like peer-to-peer processing, bring new ways o
people. Nevertheless, interactions in software development remain unchanged. The communication between all roles in
The use of the web-caching technique has been widely spread out with the objective of reducing the impact of some proble
vertiginous growth of the Internet. The main characteristic of this technique is to keep the objects of the Internet n
Traditionally, the hardware architectures of embedded systems have been implemented using custom and general-purpos
connected together on printed circuit boards (PCBs) or high-performance Application Specific Integrated Circuits (ASIC
The IP protocol, also called as the Internet Protocol, is widely used for data transfer, management systems or other specifi
Due to this flexibility, it is a protocol with constant development of new technologies like MPLS(“Multipro
This paper introduces a model using Petri Nets for Weight Round Robin (WRR) packet scheduler for Ethernet switches. Th
802.1Q specification to schedule seven different classes of services in order to support quality of service at lin
Multicast caching is an efficient way to reduce traffic in the core network, and for distributing information to a large group o
are are associated with caching multicast data for mobile clients are different from, for example, HTT
only Participant of the Conference::::::::::
The support to mobility management in wireless communications systems is impacted by movement pattern of mobile use
needed for handover and location manager is directly affected in proportion to mobility load. Analyzing protocols
Noam Chomsky [1, 2], has classified languages in terms of hierarchy, the level above having more expressive power than
top level --- natural language --- holding the most potency. This paper shows that the entire Chomsky hierarchy
This paper presents an encryption algorithm called PAPÍLIO.PAPÍLIO is an symmetric block cipher encryption algorithm. T
The coding’s process is based in the Viterbi algorithm. The Viterbi algorithm was first proposed as a solution
To solve NP-complete problems such as Max-Sat, different approaches exist in the literature, each one presenting advanta
order to determine, for those problems, an efficient method, many tests should be run with different strategies
This work presents a framework for automation of administrative tasks and deployment of protection mechanisms to facilita
analysis. The main goal is to disclose and supply measures for a fast configuration of Microsoft Windows 2000 net
As the Internet becomes increasingly familiar with us, there are many types of attacks – especially Denial of Service and IP
Denial of Service and IP spoofing Attacks are based on the property of TCP/IP. So, Such attacks in traditional n
This paper discusses different methodologies for the design of voice networks over IP, covering the different protocols use
signaling and quality of service. A procedure for the dimensioning of an IP network taking into account voice
Network and business management convergence is seen as the next step towards harmonizing information technology res
target business goals and products. This paper looks at the challenge of building a management platform that automates
In this paper, the control of a Video Camera (VC) using the protocol IPv6 is presented. Communication was established th
using tunneling IPv6 packets over IPv4 routing infrastructures, because that current network technologies do n
This research study seeks to develop a heuristic model, called 4Ps and 1L, for customer loyalty to virtual bookstores. The
most traditional marketing concepts and the L relates to Customer Loyalty. In developing this model the aim
In this article we present a study about the traffic engineering in next generation Internet, with a specific approach of the M
It describes traffic engineering components and features as well as its advantages, highlighting the res
Abstract: - Nowadays, the computer network security is very important and became a crucial point in every computational s
a robust and efficient security system is necessary. The intrusion detection systems (IDS) largely used tod
Summary: In this paper we present an algorithm for the control of chaotic systems through a perturbation in continuous tim
achieved through feedback-like control, by using a LTI filter. The parameters of adaptive control are determin
The emergence of Internet has spurred new and cost effective ways of doing business. One of these innovations is using
method of procurement for business-to-business; which is also known as electronic procurement (e-procurement).
This paper, presents the design and implementation of the master/slave MAC (Monitor Alarm and Control) subsystem for d
broadcasting systems. The master MAC (MMAC) subsystem controls and monitors the status of transmitter equipment on
The support to mobility management in wireless communications systems is impacted by movement pattern of mobile use
affects the signaling traffic needed for location management. Analyzing protocols and mechanisms that supply user’s mo
Requirement Analysis Process is currently done by parallel teams with distinctive cultures and different objectives to imple
concepts in the systems. However, there is a strong dependence of Security on the improvement of Safety co
We describe the Password-hardening protocol proposed by Ford and Kaliski[12] and proposea new 1-pass password-base
using Password-hardening protocol and Nyberg-Rueppel's scheme[9]. The verifier stored in server database is blinded b
In this paper, the design of the POD (Point of Deployment)simulator of digital CATV system. The POD simulator communic
Subscriber Management System)to control the management of subscriber and STB (Set Top Box). The POD simulator com
As the usage of personal mobile devices increase, there are many researches for more efficient and convenient mobile sy
reducing energy consumption is one of the critical issues for those systems owing to their portability. Dynamic volta
In this paper, an efficient unlinkable, single-term divisible electronic cash based on bit commitment scheme is proposed. T
the problems of previous schemes through its greater efficiency and the real unlinkability of every cash it
Embedded systems design combines software implementations running on an on-chip processor and dedicated hardware
introduces IP-components (Intellectual Property) to be reused and integrated in Systems-on-a-Chip (SoCs). This means a
A Self-healing network is a ‘dream’ for a network designer. However, this would not impossible to turn into reality if network
intelligence. By having the intelligent capability the network can be self-managed in response to events that
The rapid growth of corporative users and the amount of real-time applications in the Internet has been demanding IP netw
another data delivery service models that can ensure an user traffic differentiation and supply quality of servi
Trust is becoming an increasingly important topic in security of e-business systems. Trust turned out to be essential for fur
business technologies, especially for agents based technologies. Therefore a proper taxonomy is needed and
Modern switches and routers often use dynamic RAM (DRAM) in order to provide large buffer storage space. However, the
DRAM is frequently a limiting factor in the design of high-speed switches and routers. The focus of this paper is
The UNITAU network project is a simple network architecture with a well suited configuration to deal with different logical n
physical environment. Using VLAN by software and hardware and appropriated routing the network is relatively s
University computer network in Brno, the Czech Republic. Networks used for multimedia transmission. Further posibilities
transmission speed using WDM.
The energy distribution companies have thousands of meter devices spread out over large geographic areas. A telemetry
to control and monitor all those devices from a central point would be certainly of great help for optimize their
In this article we propose the utilization of TCP Explicit Congestion Notification (ECN) mechanism to mitigate the effects of
service level offered by Differentiated Services (DiffServ) networks. The benefits of this strategy are q
While previous marketing activities were primarily focused on increasing market shares in terms of a mass marketing base
the past few years saw a paradigmatic switch towards relationship management. However, customer retention pro
This paper describes adoption of QoS-enabled Internet VPN solution for corporate communications as an alternative to ex
large-scale customer sorted out the lack of knowledge and resources to deploy and manage enhanced Internet servic
As wireless technology is growing at an exponential rate, companies that want to lead in their market have already deploye
individuals are using wireless technology for important communications. Therefore success in the mobile commer
This paper presents a performance comparison between a 24-pulse and a 48-pulse phase-shift VSI based SSSC. Initially
description of the SSSC basic operation, is presented. Simulations of the two configurations have been carried out usin
The design and simulation of a 1.35 GHz CMOS frequency synthesizer for a double band receiver is presented. The propo
in a wideband PLL topology with a high frequency reference, giving as result low phase noise, fast switching time
It is presented a confluence test for the ground terms in Horn theories based on built-in algebras. It is proposed a formalism
rewrite application, the interface between the equational theory and the built-in algebra is well established
Machine intelligence (MI) systems offer several advantages over classical computer systems, but applications in real-life a
they should be. We present a couple of advanced MI applications developed or being developed in our group: an em
Biological sequences, i.e., DNA, RNA and proteins, are coded by strings called primary structures. During the last decades
complexity of these primary structures is growing exponentially. Analyzing this huge volume of data to extract p
An interactor matrix plays some important roles in control system analysis and synthesis. Recently, a simple derivation of t
pseudoinverse. Unfortunately, this method is limited to square systems. In this paper, it will be presen
This paper describes a finite impulse response artificial neural network (FIRANN) based differential protection for synchron
neural network inputs are normalized sampled stator currents. Any preprocessing of signals as in other neural n
The main purpose of this paper is to propose a Diagnostic Rhyme Test (DRT) for evaluating European Portuguese (EP) sy
intelligibility. The DRT is nowadays one of the most common tests for subjective evaluation of speech systems’ intelligibi
Analog multipliers are widely used in fuzzy logic, analog signal, and parallel processing systems. The most important is tha
applications have become popular, several efforts have been oriented to improve the performance of the propose
In this paper, a hybrid Artificial Life (ALife) system for function optimization that combines ALife colonization with Genetic A
proposed. The method includes two stages. In the first stage, the emergent colonization of ALife system is use
The control volume finite element formulation (CVFE) is described for solving solid mechanics equations for laminate comp
detailed based on the weighted residual method, and comparisons are drawn with the conventional Galerkin Finite El
Short-term Generation Scheduling models (STGS) are concerned with the calculation of an optimal generation policy while
various operational limits in transmission and generation systems. Most STGS models described in the literature tot
A non-iterative method for transient electromechanical processes calculation in power system with arbitrary topology netwo
scheme is described. The electrical machines models (synchronous generator, induction motor) and static RL-loads
This paper presents a multi-blackboard approach to design and implement a control/monitoring system for the Automation
The proposed architecture is composed of several control/monitoring agents (CMAs) organised hierarchically. Commu
The induction motors are largely used in several industry sectors. The dimensioning of an induction motor has still been in
most of the cases the load behavior in its shaft is completely unknown. The proposal of this paper is to use art
This paper describes a novel approach for mapping overvoltages related to lightning in power system using artificial neura
acts as identifier of structural features of the grounding processes. So that output parameters can be estima
Minutiae extraction for automatic fingerprint identification system is one of the most important steps. However, the perform
extraction heavily relies on an enhancement algorithm. There are many algorithms of enhancement which depend on th
This paper proposes a new multivariable model reference adaptive controller (MIMO RMRAC), which consists of two parts
the characterization of the integral structure of the modeled part of the plant, and the associated parameteriza
This paper presents a new approach for multi-user detection in code division multiple access (CDMA). Proposed detector i
parallel interference cancellation scheme that uses a nonlinear function (hyperbolic tangent) as decision devic
Abstract: A reconfigurable computer presents the facility of changing functions according to the lacks of the application. B
devices, this approach can reduce costs, especially in terms of hardware implementation. The developing of
This paper describes the ongoing research on Rough Sets based classifier applied to Induction Motors fault diagnosis thro
Signature Analysis (MCSA). The results of mechanical failures detection and how a Rough Sets based classifier is use
A Low-Voltage/Low-Power rail-to-rail Second Generation Current Conveyor is presented. The CCII is implemented using tw
Transistors in weak inversion, which allows the use of small Ib, and Floating Gates, to obtain an extended dynamic rang
Abstract - The capacitor excited induction motor is fed by a natural commutated inverter. The control system has been imp
rectifier voltage. The inverter firing technique used has been the machine terminal voltage sensor, employing t
This paper presents a complete design and analysis of the commonly used dc-dc converters by using sliding mode control
advantage of the SM controller is that there is no restriction on the size of the signal variation around the operating
Random walk model has many useful applications in the study of stochastic (probabilistic) processes including: modeling
molecules in physics, modeling the locomotion of organisms in biology, and modeling the behavior over time of finan
We present a study of algorithms and their performance for determining three-dimensional (3d) motion and structure of non
two-dimensional (2d) projections. This is a task that emerges in various applications such as computer vision
Abstract: “How to identify the stakes of an organisation stakeholders?” this is the question for which, this paper sugges
approaches from two different areas, strategic management from management area and, designed systems and human a
The big share of electrical breakdown in electrical devices failure among other factors is caused by multitasking such as el
mechanical support, energy dissipation, Energy storage, etc. which brings many attentions to lifetime estimati
The aim of this article is to demostrate and consider the potencial of the Layer 3D Modeling Objects to show a complex wa
Human Body and their Biological Sistems [Fig.1], using the Virtual Reality Modeling Language (VRML). This Modeling
This paper presents a repetitive multivariable robust model reference adaptive controller (MIMO RMRAC-RP) applied to a
uninterruptible power supply (UPS). Using ab0 transformation and balanced three-phase load, the plant can be considered
Software development needs to be supported at both the organisational process level (programming-for-the-large) and the
(programming-for-the-small). It is critical to seal the gap in order to enable effective software integration at
The evolution of the Legacy Information Systems (LIS) is a critical issue for many organizations world wide. A Large numb
their daily activities depend on the business critical applications that have been developed over the last two
Power distribution network reconfiguration is performed with open/close operations of sectionalizing switches, maintaining
topology, aimed to losses minimization and load balancing. A distribution networks simulator with a friendly gra
A system of the Fredholm integral equations of fist kind with smooth kernels and modification of the Method Discrete Sourc
solving a 2D scattering problems by N cylinders and cylinder covered by dielectric. The developed method utilize
The id-iq control method are one of the most widespread control methods for active power filters. Two improvements to thi
the elimination of the PLL (Phase Locked Loop) in active power filters for harmonic current compensation only
A method focused on transforming an OTA-C f ilter working in voltage-mode to current-mode using nullors, is presented. F
the OTA is modeled using the nullor concept. Second, the transformation process is done by applying a set o
Applications of several adjustment methods and the Without Replacement Bootstrap (BWO) are presented, using data from
Business Survey, conducted by PortugalΤs National Statistics Institute. The application of these methods is motivated by
This paper present a methodology for fault diagnosis in power transformers using an Adaptative Neuro-Fuzzy Inference S
development and training of the system was used a real data base of gases concentration in power transformers.
The advantages offered by the electronic component LED (Light Emitting Diode) have caused a quick and wide application
replacement of incandescent lights. However, in its combined application, the relationship between the design variable
The shared disk file systems use a technique known as file system journaling to support recovery of metadata on the SAN
In the existing journaling technique, the metadata that is dirtied by one host must be updated to disk space bef
This work describes a phonetic vocoder at an average bit rate of 1.3 kbps using HMM-based speech recognition/synthesis
excitation is applied during the synthesis procedure in order to solve the problem of having unnatural synthetic speech
This paper introduces the application of Symbolic Neural Network in an intelligent distributed system for automated petrole
introduces the application of a special kind of perceptron for the pattern recognition of graphic cards app
Numerical methods for solving inverse eigenvalue problems of matrices with a given block upper triangular part are develo
Thyristor Controlled Series Capacitor (TCSC) is a prominent FACTS (Flexible AC Transmission Systems) device that can r
reactance of a transmission line, resulting in improvement of system performance. In this paper, simulations studies
The design of a low-voltage current-mode Morlet Wavelet, using MOS transistors in weak inversion, is presented. The prop
two translinear building blocks: a normalized gaussian-function generator and a four-quadrant analog-multiplier
The implementation of a family of nonlinear analog filters for image applications, by using MOS-translinear current mode c
Versatility and low power consumption characteristics of MOS transistors operating in weak inversion are used
Algebraic-geometry family of codes contains sequences with excellent asymptotic behaviour, but few work have been repo
concerning their hardware implementation. In this paper, we investigate an algorithm for decoding AG codes under t
Abstract: The need for more efficient electricity systems management has given rise to innovative technologies in power g
transmission. The combined cycle power station is a good example of a new development in power generation and flexible
- Wavelets technique is applied for solving of 2D Dirichlet, Neumann and mix boundary problems. The developed method
spline functions and Fredholm integral equations (-or a system of the Fredholm integral equations) of fist kind
The modernization of the Legacy Information Systems (LIS) is a critical issue for many organizations world wide. The succ
legacy data stored in the old data formats is a challenging issue with respect to backward compatibility and f
Abstract: For every organisation there exist different stakeholders with variety of stakes. Managing the stakeholders throug
stakes and taking them into account, in order to achieve the organisation purposes, is an essential problem.
We present two examples of computational cellular biology that provide perspective on the complexity of creating predictiv
behaviors as they emerge from the interaction of molecular species. The first is a model of the diffusion and react
Abstract: A new methodology for estimation of performance parameters in electricity distribution systems is presented in th
parameters include maximum voltage drop, maximum power losses and length of feeders. The methodology, which can us
One of the main problems related to unsupervised change detection methods based on the "difference image" lies in the la
techniques for discriminating between changed and unchanged pixels in the difference image. Using empirical s
This work presents a Brazilian Portuguese TTS based on HMM modeling of spectrum and pitch. A major advantage of HM
the possibility of fast speaker adaptation. During the HMM training, mel-cepstral coefficients are used to represent t
The use of wavelet decomposition to provide data recording and analysis of Power Quality disturbances depends on estab
compromise between high data compression and low energy loss capability, in order to preserve the basic waveform fe
One of the possible generalizations of the classical numerical range of a given linear operator in an indefinite inner produc
J,C-tracial range. We present an algorithm to generate this generalized numerical range and give simple e
In the paper constrained controllability of distributed parameter dynamical system defined in infinite-dimensional domain is
spectral theory of unbounded differential operators, necessary and sufficient conditions constrained controllabi
The interruption capability of SF6 circuit breakers has increased drastically during the last decade. It is important that the t
experiments give a correct representation of current and voltage stress. In this paper the equations a
Fuzzy models within the framework of orthonormal basis functions (OBF Fuzzy Models) were introduced in previous works
very promising approach to the areas of non-linear system identification and control since they exhibit several ad
In the paper, infinite-dimensional, continuous-time control systems described by nonlinear abstract differential equations a
methods of functional analysis sufficient conditions for constrained exact local controllability are formulate
The cars we are familiar with have circular wheels. Here, we consider cars whose wheels are not circular and nevertheless
smoothly. A mathematical development characterizing the condition for a smooth motion of exotic wheels is presented.
Proposed program is based on original non-iterative method for calculation of transient electromechanical processes in co
systems. This paper proposes a new method for model creating and simulation of power system in high-level lang
This paper presents some techniques of defensive programming to be used in software based safety-critical systems. The
programming in such systems is important and it is totally justified because some problems can cause serious consequenc
Blumlein pulsers are well suited devices for high voltage pulse generation in the range of nanoseconds or microseconds. T
transmission lines charged in parallel and discharged synchronously in series into the load by using a single
The interruption capability of SF6 circuit breakers has increased drastically during the last decade. After the development t
breakers are tested in the high-power laboratory, where test conditions prescribed by standards and swi
The paper deals with the developing of the tool to measure quality of predictions of water levels of tides in the different reg
This work describes a digital instrument for measuring the transform ratio of three-phase and single-phase transformers. T
allows to perform the test simultaneously in coils of the same tap. As the instrument is controlled by compute
This work describes a digital instrument for measuring the transform ratio of three-phase and single-phase transformers. T
allows to perform the test simultaneously in coils of the same tap. As the instrument is controlled by compute
Several methods of domain estimation are analysed and tested according to the specific problem of an agricultural survey
Portuguese National Statistics Institute. The importance of use of appropriate auxiliary information in the scope of
The paper describes an integrated dynamic approach to the simulation of the behavior and performance of integrated ener
and commercialized in 1990's, these systems are able to supply both space and water heating loads to single and/or
The programmatic envelope electronic multimedia tutorial is intended for usage to the student of schools, colleges, Lyce
combination to the database of educational courses in a different application domain. The training implemen
The importance of Short-Term Load Forecasting (STLF) has been increasing lately. With deregulation and competition, en
has become a big business. Bus-load forecasting is essential to feed analytical methods utilized for determining e
Support vector machines (SVMs) tackle classification and regression problems by non-linearly mapping input data into hig
spaces, wherein a linear decision surface is designed. Even though the high potential of these techniques has bee
We find necessary and sufficient conditions for a scalar second-order hyperbolic equation in the plane F(x,y,u,u_x, u_y
=0 to admit an equation in involution of order k.
A Diesel engine is commonly used to drive a generator for autonomous production of electricity. An induction generator as
inverter can substitute the synchronous generator. The inverter allows stabilizing voltage and frequency, while th
This paper is devoted to the problem of tire/read friction estimation and fault detection using only angular information since
velocity cannot always been computed from actual sensors. A new strong practical stable fault observer is con
We establish a connection between finite fiels and finite dynamical systems. We show how this connection can be used to
problems in finite dynamical systems and in particular, in linear systems.
The pathways that exist in porous membranes used to deliver drugs form fractal percolating paths. For a homologous seri
fractal dimension D is calculated as a model for transdermal-delivery drugs. Our program TOPO is used for th
This paper investigates the network flow problems where the arc lengths of the network are fuzzy numbers. Based on the
numbers, the Yager ranking indices is calculated for the fuzzy arcs to change the fuzzy formulation of the prob
The main problem on the Web is to locate information. Some reasons for this arise from the inefficiency of interfaces, incor
organization and data structure issues. A fuzzy approach to information retrieval systems can mitigate these probl
Generalized algorithms for solving problems of discrete, integer, and Boolean programming are discussed. These algorithm
the method of normalized functions, are based on a combination of formal and heuristic procedures, and allow one
An electromagnetic based model approach is used to asses the grounding impedances of typical grounding electrodes geo
on lightning overvoltages. Consideration of frequency dependence of soil resistivity and permittivity is made in
With the rapid development of massively parallel computers, the particle-in-cell (PIC) approach to plasma microturbulenc
has become an increasingly important tool. Global, self-consistent simulations with up to 100 millions part
This work presents hardware architecture to determine the position of objects in video images. The architecture was devel
programmable logic device, taking advantage of some characteristics of the standard video signals to achieve the real
The cellular neural network problem is nowadays a well-known theory. This paper describes some problems with a CMOS
chip. Some designs of a cell circuit is designed a simulated in HSpice simulator. The microelectronic structure is desi
In this paper, the impact of wind generation systems on the conventional electric network is evaluated. Wind power sourc
fuzzy sets, as to include the wind's speed intrinsic uncertainty. The study is performed by using a multi-li
The paper presents pole modelling of small one phase 10 poles synchronous motor with permanent magnets. The purpose
is to provide a reliable operation of the motor with in advance prescribed direction of rotation with 80 % of the
Abstract: - Safety system for recognition of danger situations at automatized work stands (e.g. with stationary robots) is p
consists of a vision part based on the TV camera connected with a frame grabber which observes the neighbour
Depending on the obligation to open its electricity and gas markets to competition, in line with EU-wide minimum levels, mo
countries of central and eastern Europe including Croatia are in the throes of electricity privatization and
Variable rate fertilization aims to improve fertilizer use efficiency and reduce leaching by varying the fertilizer rates accordin
portion of the crop and the soil. The application of liquid fertilizers through variable rate techniqu
There are various Mission Control Centers (MCC) in many countries. But analysis of the existing literature proves absence
structure optimization although optimal structure of MCC could allow to increase profitability of mission cont
A new method for designing a minimal order perfect functional observers for singular continuous-time linear systems is pro
sufficient conditions for the existence of the minimal order perfect functional observer are established. A pro
A new method for designing a minimal order perfect functional observers for singular continuous-time linear systems is pro
sufficient conditions for the existence of the minimal order perfect functional observer are established. A pro
An automatic method focused on modeling the behavior of SPICE circuit-elements using nullors, is described. It is shown t
SPICE circuit-models to nullor-based models, the circuit analysis ends in a pure nodal analysis (PNA), i.e. av
Paper deals with pipelined switched-current A/D converter designed in 0.6 ìm BiCMOS technology with embedded BIST fe
redundant-sign-digit conventional-restoring algorithm was implemented what decreases the amount of high-precision comp
The backpropagation algorithm can be used to train multilayer networks. Backpropagation is an approximate steepest des
the performance index is the mean square error. It is realized the training of a two layer perceptron to approxi
This paper focuses on the MW contingency selection problem. It is assumed a real time operation environment. A multileve
so as to discard the contingencies that are certainly harmless to the system operation from the standpoint of
Power systems are non-linear and they are often subjected to random disturbances. Therefore the use of adaptive controll
on-line system identification is suited perfectly to power system dynamic processes control. The common co-ord
This paper presents the architecure and the implementation of an N-tier internet system model for locating objects distribu
model can be characterized as interoperable and scalable one. The model is implemented as a set of indepen
In this paper, the solution of a chemical differential algebraic equation model of general type has been done using MAPLE
systems. The MAPLE program has been given in appendix. First we calculate Power series of the given equations sys
The new algorithm of numerical solution of return boundary value problems on conformal mappings in the homogeneous is
the curvilinear quadrangular areas limited to lines of current and equipotential lines is developed. The way of the
A discrete Kiefer-Wolfowitz stochastic approximation procedure is considered. The errors of observation are supposed to b
differences. The corresponding algorithm is described as a strong solution to a stochastic difference equation with r
We develop the mathematical theory of algebra functions on $A^*$ for a finite alphabet $A$, such that the functions are lev
are restricted to the different levels $m$ according to $A^m$. We shall first establish the fundamentals and
The structure of mincuts of a Fibonacci graph is investigated. We show that an n-vertex Fibonacci graph has mincuts of all
ceiling[(n+1)/2].
Series compensated commutation is obtained by insertion a capacitor between the converter transformer and the six puls
bridge. This arrangement will able a reduction in the impedance of the commutation circuit. This can permit great
We establish the localization and the structure of the spectrum of normal vibrations described by systems of partial differen
small displacements of stratified fluid in the homogeneous gravity field. We also compare the spectral pr
The theory of generalized inverses is used to discuss the consistency of each of the matrix equations AX-YB=C, AX-XB=C
commutative rng. Some explicit general solutions are also presented.
Abstract: - Distributed generation is currently considered as an attracting way of more economically achieving the electrica
the nearest future. Among various new generation equipment, the fuel cells systems offer an unique technolo
A two independent preys, one-predator model incorporating nonlinear functional response is investigated analytically as w
system exhibits chaos for a range of parametric values when long time behavior studied.
This paper is devoted to dynamical systems in fields of $p$-adic numbers: origin of p-adic dynamics in p-adic theoretical
quantum mechanics and field theory, spin glasses), continuous dynamical systems and discrete dynamical syst
The coordinated tuning of power system stabilizers (PSS) consists of an optimization problem where the objective function
damping. Since conventional optimization methods tend to obtain a local optimum instead of a global one, the ap
This paper focuses on the parameter estimation problem for uncertain nonlinear systems. The presented methodology is u
parameter estimator for an experimental prototype of magnetic levitation system. Simulation results show the effectivenes
This paper discusses the generalized Pareto distribution (GPD), methods of numerical simulation and its application to the
extreme wind speeds.
Partial discharges are caused by various defects such as voids, shield protrusions, contaminants, advanced stages of wat
the main cause of breakdown in insulation materials. Partial discharge (PD) location is a powerful and useful to
The use of Fuzzy Control has been increasing considerably, and its success depends on a number of parameters, such as
functions, that are usually decided upon subjectively. The objective of this paper is to describe and discuss how to imp
Russian-Ukraine spacecraft ΥOcean-OΦ (S/C) was launched on July, 17, 1999. S/C is controlled from Mission Control Cen
M), town Korolev, Moscow region. Purpose of the S/C ΥOcean-OΦ is operative reception of Earth and World ocean remot
This paper presents the performance analysis of binary and quaternary modulations on a k-u nonselective fading channel.
used to model a frequency-nonselective fading channel considering similar time delays for the scattered waves a
The present article describes the trials and results obtained related to the feasibility of using the XML standard (eXtensible
proposed by the international community as a solution given to the disorganization and difficulty in accessing
Abstract: - This work describes the recharging supply of non-road electric vehicles acting in urban areas in Brazil. The fast
vehicles in the market imposes the introduction of new methodologies and procedures for planning studies in
Solar energetic particle events can cause major disruptions to the operation of spacecraft in earth orbit and outside the ear
also have to be considered for EVA and other manned activities. In addition, for certain orbits their contr
Our main goal is the interrelation amongst the new metadata paradigm - the XML family - and the Workflow Process Autom
and interaction with database legacy systems. We intend to answer two fundamental subjects: the granularity o
Abstract: RSP (Radioecological Software Package) is an interactive support software that simulates the behavior of radion
environments and the consequences on the population, in terms of the external exposition. It consists of three
The R-Conversion Encryption Method the universal cryptography algorithm of the binary initial sequence. This method is b
of self-defined data.The power of this algorithm does not depend on any mathematics knowledge and develops just
Verification of non-linear hybrid systems is a challenging task. Unlike many other verification methods the deduction-based
we investigate in this paper avoids approximations and operates directly on the original non-linear system sp
Morphological associative memories (MAMs) belong to the class of morphological neural networks. The recording scheme
MAM models is similar to the correlation recording recipe. Recording is achieved by means of a maximum ($M_{XY}$ mod
Abstract: - Electrical Tomography consists in reconstruction the image of the body interior on the measuraments made on
Mathematically it can be described as a coefficient inverse problem for the Laplace equation, written in the dive
The problem of H-infinity filtering design for a class of nonlinear systems with time-delay via Takagi-Sugeno fuzzy models
paper. Sufficient conditions for the existence of a stable nonlinear filter assuring global asymptotic stab
In this paper a Robust Model Reference Adaptive Control (RMRAC) with an Adaptive Repetitive Controller (ARP) are appli
applications. The RMRAC control law is used to obtain robustness in the closed-loop system, while the ARP control
In this paper, two methods for extraction of knowledge rules through Artificial Neural Networks, with continuous activation f
Those rules are extracted from neural networks previously trained and of the sensitivity factors obtained
. The solution of Systems of Simultaneous Non-Linear Equations (SNLE) remains a complex and as yet not closed problem
methods to tackle such problems do exist, they are limited in scope and, in general, demand certain prior knowledge
Economic Dispatch (ED) problems have been recently solved by neural approaches. Neural networks involve inherently m
and are easy to be implemented in hardware, thus special treatment for parallel implementation are not necessary.
The Welch-Berlekamp (WB) key equation arises in the decoding of Reed-Solomon (RS) codes over finite fields where the
viewed as a rational interpolation problem. The significance of this decoding approach lies in the fact that it does n
Abstract: - This paper presents a preliminary report of statistical modeling for filling gaps in the data collected to make pred
shallow waters of the Gulf of Mexico. The approach discussed is based on data gathered by the Texas Coa
This paper describes a physically interpretable notation named strain gradient notation for writing finite elements polynomi
behavior of solid and structural mechanics problems. The displacement and strain fields are written in terms of
In this work it is presented a study on the current techniques used in the processing and segmentation of vehicle plates. Th
vehicles are considered as complex document pictures, or either, a picture that does not present a definite struc
A novel technique oriented to compute Noise Figure (NF) for MOS Transistor (MOST) circuits, is presented. The proposed
features of symbolic analysis. In order to improve the computation time, a pure-nodal-analysis (PNA) method is applied b
To detect a fault in software, a test case execution must enable an intermediate error to propagate to the output. We descr
based mutation testing methods that use a model checker to guarantee propagation of faults to the visible outp
Generator voltage control may be modeled assuming the terminal bus as a PV bus or a variable voltage source behind the
connected to the voltage controlled terminal bus. Voltage control is lost when generator reactive power is exhaust
In this paper, the implementation of HPA control system for Digital Broadcasting System is presented. This control system
the status of the HPA and gathers the alarm of it. The advantage of this system is the center-concentrated. Re
The Impacts of Tightening Credit and Lack of Liquidity On Partially Deregulated Power Markets
McMAHON Edison Electric Institute 701 Pennsylvania Ave., NW Washington, DC 20004 USA
Abstract – This paper describ
This paper investigates the inrush current phenomena in substations including parallel-connected transformers or transform
analytical expressions for the transformers’ nonlinear, and generally not identical, magnetization curves (f
The main objective of this paper is to provide information on the development of an interface for a Virtual Medical Office, fo
medical area. Apart from the tree dimensional modeling of the virtual environment, a humanoid figure
The next experiments in high energy physics depends a lot on good calorimeter (energy meters) data. During experimenta
calorimeter calibration at CERN, the European Institute for Particle Physics, contaminations on the beam line can aris
This paper presents a new methodology for the adjustment of fuzzy inference systems. A novel approach, which uses unc
techniques, is developed in order to adjust the free parameters of the fuzzy inference system, such as its own par
Linear multi-input dynamical systems smoothly depending on parameters are considered. A set of parameter values corres
uncontrollable systems (an uncontrollability set) is studied. The typical (generic) structure of the uncontrollability set is
The Wavelet solution for boundary-value problems is relatively new and has been mainly restricted to the solutions in data
processing and recently to the solution of differential equations with periodic boundary conditions. This paper i
The paper proposes a mathematical model of dynamic environment based on fuzzy concept, and a method of robot naviga
model. The environment model contains the objects¡¯ motion information which increases the efficiency of the navigation p
A new fast block matching algorithm for motion estimation is introduced. This algorithm uses a new enhanced motion vecto
an effective DC matching technique. The proposed method transforms the expensive 2-D block-matching problem into
Personal identification numbers (PIN), passwords, smart cards and digital certificates are some of the means employed for
various electronic commerce applications. However, these means do not really identify a person, but only knowl
This paper introduces a cascaded RLS-LMS predictor for lossless audio coding applications. In this proposed predictor, a
high-order is employed in order to capture the ample tonal and harmonic components of the audio signal for optima
This article presents the case study as research strategy to be used in the project of optimization of food safety that includ
monitoring of the critical control points using Advanced Manufacturing Technology (AMT´s), under the visio
In this paper we present a comparative study of two important adaptive algorithms for channel impulse response estimatio
recursive least square (RLS) and the decision directed least mean square (LMS) algorithms, weighted and unweig
Large RC(L) subcircuits generated by automatic parasitic-extraction tools are used as the typical models for interconnect o
recent years. In order to simulate this large-scale subcircuits easily, being an efficient choice, Krylov-
Cryptographic file systems are effective way to protect userκψs sensitive data from unauthorized disclosure and most of th
systems that have been developed only support data protection based on individual user. However, this approach h
It is undeniable that report generation is one of the most important tasks in many companies regardless of the size of the c
generation mechanism can increase a companyΤs productivity in terms of effort and time. This is more obvious
Model-based lane detection plays an important role on road following of outdoor robots. Literature review shows that almo
explicit lane models, such as circular arcs or B-Spline curves on a flat ground plane. In this paper, a free
This paper describes a fully integrated CMOS phase-locked loop (PLL) with a transconductance-C (Gm-C) filter. This PLL
implemented in the 0.5 Ήm CMOS technology without the need of any external component. The resulting layout area and
This paper presents a grid architecture for E-Service. It comprises nine semantic components: port, probe, adapter, action
Service, constraint and trigger, which form four different integration levels while each level could handle t
Modeling and Simulation methodology permits analytic and mathematic performance estimation. Recent switched router s
complicated and functional, and so performance estimation is more difficult. This paper shows application capability
With the rapid emergence of mobile commerce, numerous issues challenging its development have come to the highlight o
Two major ones are first ,handling long lived transactions while preserving database consistency and concurrency d
This paper presents a new approach for multi-user detection in code division multiple access (CDMA). Proposed detector i
parallel interference cancellation scheme that uses a nonlinear function (hyperbolic tangent) as decision devic
This paper presents a new approach to image segmentation using genetic algorithm (GA) in conjunction with morphologica
proposed method consists to classify each pixel of the image in pixels belonging either to the object or to the backgro
In this paper, a new design of neural network is proposed for camera calibration. Unlike most existing methods, where cam
determined so that the projection from 3D points to their corresponding image points is as accurate as possible, th
- In recent years an upsurge in the business-to-business electronic commerce has been observed. The popularity of electr
the masses is still not what it was expected and the fall of DOT.COMs has made it even worst. Whereas business-to-b
Real-time qualitative road traffic data analysis is the cornerstone for any modern transport system. So far, most of the anal
and the use of image processing techniques for qualitative analysis is at its early stage. In this paper we
This paper describes a novel technique to increase the operating range of Delay-Locked Loop (DLL) with Frequency Selec
is attached to a conventional DLL and the frequency of input reference signal would be detected by FSB to select
Proposed here is a generalized transform entitled ISITRA for signal decomposition and reconstruction. Its decomposition s
multi-output transform like 2- channel filter bank. The existing perfect reconstruction theory of 2-channel fi
This paper proposes a six-layers reference model for E-Commerce, including infrastructures, science techniques, element
strategies, business modes and society environment layer. Main classifications and some concrete entities in each
Conventional algorithms for blind source separation do not necessarily work well for real-world data. One of the reasons is
applications, the mixing matrix is often almost singular at some part of frequency range and it can cause a certai
A critical step in automatic fingerprint identification is to automatically and reliably decide which part of the fingerprint image
foreground, the noisy area, and the background. In this paper, we define the background as an area except fo
In this paper, a robust fuzzy credit assignment CMAC (FCA-CMAC) is proposed to speed up the learning ability and to incr
capability of CMAC. The FCA-CMAC is to combine the fuzzy logic concept and credit assignment ideas to provide fast and
A new mesh generation algorithm is proposed for mesh-based video coding. The still segmentation result of watershed se
onto motion segmentation result of change region detection in proposed algorithm. Therefore, mesh presentation ge
A new method of reconstructing the distribution of the charge collection probability (CCP) from the measured collection effi
Direct reconstruction of the CCP from the measured collection efficiency profile is usually performed by
A simplified approach for the design of an efficient alternative to adaptive flight control system based on combination of inv
gain feedback has been developed. The derivation of the algorithm is presented. The application of this m
This paper presents a SIP(Session Initiation Protocol) load balancer to make an enlargement performance of call processi
networks. We believe that currently Internet, SIP is a trend of VoIP(Voice over IP) service and will be better deploye
The Zhu and Yuille region competition is considered for image segmentation. The algorithm has successfully been applied
applications. Based on their ideas, we address a number of issues not covered in their treatment. In particular
In this paper, we present a geometrical and time-variant wireless vector channel model with hyperbolically distributed scatt
mobile environment. This model is based on the assumption that the distances between mobile and local scatter
A digital control system was implemented to operate the microelectromechanical (MEMS) variable optical attenuator (VOA
photodetectors, two couplers, an analogue to digital converter (ADC) and a digital to analogue converter (DAC). A 1550 nm
Interaction is an essential hallmark of education. Therefore widgets are relevant in educational software. This article descr
capable of describing a possibly infinite widget collection in a finite way by drawing a distinction betwe
Various researchers for a number of years have investigated traffic data collection and analysis. Many techniques have be
the operations and some intelligent approaches have been developed to compensate the effects of lighting, shad
The Dynamic Integrated Systems Optimization And Parameter Estimation (DISOPE) algorithm is an algorithm for solving n
problems and is of the gradient descent type. One of the major setbacks to this type of algorithms is the slow ra
The Dynamic Integrated Systems Optimization And Parameter Estimation (DISOPE) algorithm is an algorithm for solving n
problems and is of the gradient descent type. One of the major setbacks to this type of algorithms is the slow ra
Realtime video coding over handheld devices needs to meet the rigorous limitation of the available computational capacity
worse, the computation power allocated to the encoding process varies dramatically from time to time as the C
The central theme of this paper is to demonstrate how a neural network can be incorporated into an antenna array for ada
Specifically, the problem considered involves a single desired signal arriving at the array simultaneously with an u
We extend the adaptive model reference treatment of an articulated two link manipulator described by Slotine [1] by incorp
We incorporate constraints upon the physical movement of link 1, analogous to a shoulder-elbow assembly, b
Abstract: - This report proposes a new method for obtaining satisfying "full-duplex feeling" in hands-free communication un
cost. The proposed method uses a combination of an acoustic echo cancellation unit and an adaptive gain uni
In this paper, we consider the analysis of frequency modulated (FM) signals corrupted by heavy-tailed additive noise. Here
analysis for such signals. However, for a good performance we need a pre-processing of the noisy signal. This
Many approaches for background subtraction have been proposed in recent years. In this paper, three new real-time dyna
generation techniques called ΥSelective update using temporal averagingΦ, ΥSelective update using an exponentially wei
Abstract: - This paper proposes a new Least Mean Square (LMS) based algorithm aimed for acoustic echo cancellation. T
elaboration of an existing algorithm developed for the Konftel 200 conference phone. The purpose of the algorithm is to
This paper deals with the application in control of boiler using Signal Interpreted Petri Net (SIPN), which is an extension of
(PN) with interaction between input and output signals. For automation purposes, this control system sees
Partial discharges are caused by various defects such as voids, shield protrusions, contaminants, advanced stages of wat
the main cause of breakdown in insulation materials. Partial discharge (PD) location is a powerful and useful to
Abstract: - In this paper, we apply a new approach, called optimal fuzzy control based on linear TS type fuzzy model, to de
magnetic bearing systems. The linear TS type fuzzy model is used to represent the nonlinear plant. To obtain the l
In electronic commerce protocols, atomicity and accountability are very important properties. Atomicity consists of money a
and certified delivery, while accountability consists of money accountability and goods accountability. If
The paper deals with an enhanced method for matrix-based approximate symbolic analysis. The method assures the valid
expressions over a certain interval of network parameters by means of the sensitivity analysis. A computationally effec
In this paper, a shop2box system is presented in which a customer can order over the Internet grocery that is delivered to
by the customer in his or her neighborhood. The aim of this paper is to focus on a Bluetooth application desi
Based on frequency domain measurements in the 2.4GHz band, an autoregressive (AR) model for the frequency response
channel is introduced. A comparison is made between the statistical characteristics of the empirical data and of the cha
Image entropy as prior in Bayesian inference was applied to the restoration of X-ray digital images with additive zero mean
noise. An iterative algorithm based on a conjugate gradient method with numerical evaluation of partial deriva
We study the uniform stabilizability of a Timoshenko beam by one control force. We prove that under, one locally distribute
exponential stability for this system is assured if and only if the wave speeds are the same.
IPsec has now become a standard information security technology throughout the Internet society. It provides a well-define
takes into account confidentiality, authentication, integrity, secure key exchange and protection mechanism agai
This article describes two approaches to selling, the “brick and mortar” type of retailing and the E-tailing ma
Internet. The growth of the new companies on the Internet has newcomers and established companies rushing t
As you know in IS95 cellular system, in contrast with 3rd generation CDMA-based cellular systems, the only coding schem
code in reverse link, and (2,1,8) convolutional code in forward link, both with constraint length equal to 9.
This paper is the continuation of previously published work in which we have been analysing different methods Ψ traditiona
recognition Ψ for their suitability to be applied to Environmental Sound Recognition. While current research devot
Streaming SIMD Extensions (SSE) is a unique feature embedded in the Pentium III and Pentium IV classes of microproce
SSE, parallel algorithms can be implemented on a standard personal computer and a significant speedup can be ach
Abstract:- Speaker Verification is a memory and compute intensive process, giving rise to area and latency concerns in the
Chip implementation. The training schemes for computing the speaker models contribute significantly to the ov
The paper discusses the construction of the virtual learning environment in E-learning with streaming media, and explores
interactive environment. Some ways that is suitable for web-based interactive environment have been develo
This paper presents a parallel adaptive networks controller which is implemented by our Fuzzy Input Adaptive Network (FI
be set initial parameters and structure by the human sense. All FIAN parameters can be adjusted by gradient de
We report on the design and status of an implementation of a high speed distributed data storage system which will meet t
access requirements of Fermilab experiments for the next collider run. Enstore's architecture is based on the D
In this paper, we report an approach to determine the depth profiles of Si nanocrytals fraction distributed in SiO2 films base
ellipsometry (SE). In the SE analysis, a Si implanted SiO2 film is divided into m sub-layers with equal thickn
AAA protocol is a framework that provides AAA (Authentication, Authorization and Accounting) function on multiple networ
Diameter is the newest AAA protocol that can displace RADIUS which has been used as AAA protocol. There are some D
We look at the design of oversampled filter banks and the resulting framelets. The undecimated wavelet transform is know
properties and has applications in areas such as denoising. The framelets we will design, will have improved
Recently the number of Internet user has very sharply increased, and the number of intrusion has also increased very muc
security products are developed and adopted to prevent systems and networks from hacking and intrusion. But even if
The theory and design of optimal uniform orthonormal filter banks has been investigated for a long time. It has been prove
coding gain of a uniform paraunitary analysis/synthesis filter bank system is maximized if and only if the filte
With the development of applications of XML and the publication of XML schema recommendation by W3C, XML+XMLsch
becoming a good solution to the electronic commerce applications. Now a lot of large-scale enterprises want to make the t
In this paper, we consider the detection of a known frequency modulated signal corrupted by known heavy-tailed additive n
techniques will be presented. The first one is based on the Neyman-Pearson theorem and the second technique is bas
PLL(phase locked loop) frequency synthesizer takes a long switching time because of the inherent closed-loop structure. T
PLL(DH-PLL) which involves the open loop structure in the conventional PLL synthesizer has been studied to overcome
Industrial safety devices are an interesting field of application for video surveillance and image processing. Complex produ
can not be protected sufficiently by usual light row based safety devices. In the present paper, a fully vide
- This paper introduces a novel hybrid algorithm that combines, Genetic Algorithms (GA) with the Naïve Bayesian Cla
employed in a Web filtering agent. The GA-NBC searches for a near optimal Bayesian profile using the power of GA. A
Abstract: - This study aims at identifying effects of different coding artifacts towards video quality in various situations, via c
of VQEG test results. It confirms that an individual coding artifact factor (e.g., blockiness or edge
Abstract: - This study aims at identifying effects of different coding artifacts towards video quality in various situations, via c
of VQEG test results. It confirms that an individual coding artifact factor (e.g., blockiness or edge
Today’s trend in multimedia is towards providing real time voice and video services over a diverse range of channe
their quality. As the network switching capability has dramatically increased over the last decade, the concent
Abstract: - This paper addresses the paramount importance of addressing the requirements of all departments in the gove
organizations and individuals ‘together’ and defines a coordinated ‘integrated’ approach t
E-Government: Behind the High Tech LI, Lue Abstract E-Government can be simply defined as delivering government ser
It has only a few years history but has already become reality from a dim vision. Someone believes that E-Govern
Electric power quality is an aspect of power engineering that has been with us since the inception of power systems; howe
quality have risen to the forefront since the advent of high power semiconductor switches and networking of trans
Abstract: The Internet is an extremely important new technology, and its revolution is bigger than any one realized. This p
survey of 467 companies that use Internet or have their own domain name and/or web site. This paper discusses ab
After we examine the pros and cons of e-surveys for e-marketing and e-government purposes, we argue why it remains an
from the practical angle and propose a multi-mode approach to conducting surveys, even as the Internet becomes ever m
This paper addresses the problem of noise-generated, spurious temporal variations of disparity measurements produced b
matching algorithms. To deal with this problem, we propose a filtering technique based on the exploitation of su
On the basis of the well-known modified nodal analysis, universal matrices-stamps are defined for modeling more types of
these stamps, modified Mason-CoatesΣ graphs are derived for fast analysis of circuits with current conveyors C
An automated feature extraction and evaluation method of feeling information from printed and handwritten characters is p
based on image processing and pattern recognition techniques. First, an input binarized pattern is transformed
In this work, we present an approach for fingerprint identification based on the Finite Element Technique (FIFE). The basic
approach is to generate a feature matrix of the fingerprint employing the standard Galerkin weighted residual me
F-Mail communication system to support e-mail like communication of users with disabilities is presented. This system is a
multimedia communication environment based on self-explanatory component and multiple interface concepts. In
High-speed multimedia data transmission is vulnerable to burst errors primarily due to its frame structure. Forward error co
mitigate the effects of multipath fading as some form of time diversity by adding redundancies into the trans
High-speed multimedia data transmission is vulnerable to burst errors primarily due to its frame structure. Forward error co
mitigate the effects of multipath fading as some form of time diversity by adding redundancies into the trans
After an introduction to safety terms fundamental principles for safety relevant system design for electronics are presented
comprise: fail-safe design, watch dog function, dynamization of signals, qiescient current principle, mon
A Fuzzy c-Means Clustering designed FLC (fuzzy logic controller) is presented in this paper and applied to air-conditioning
procedure, the auto-tuning PID controller was used to operate the plant of air-conditioning system and the pl
:- Stereo imaging is an important application of remote sensing from satellites. This is achieved by tilting the camera in the
different days. Another strategy, is to use a pair of cameras in the along track direction with approp
In this paper we evaluate the potentials of using co-evolutionary optimization method to automatically generate both halfto
images. The genetic algorithm generates halftone filters and at the same time, tries to create the harde
This paper presents an approach to cryptanalysis of RSA cryptosystem based on the application of genetic algorithm. The
of timing attack as computation time information may leak due to different modular operations throughout the R
Wireless personal communication systems grow very fast, and the Code Division Multiple Access (CDMA) system has bec
for multiple accesses in the third generation communication systems. Unlike conventional FDMA and TDMA systems, the c
This paper presents a novel architecture of a single system image built on cluster system, named Glosim. This system orie
middleware, which provides global system image support. It not only supports global IPC objects including mes
This paper presents the theory and simulation results of a GPS-based Azimuth/Gradient determination instrument for a lan
GPS receivers to realize interferometry. Our purpose is to design a system, which is both robust and accurate. A s
This paper deals with simulation of a Serial Least Mean Square (SLMS) adaptive filter algorithm for echo cancellation of sp
transmission with higher computational speed. A regular dial-up telephone network has been chosen for this applicatio
A new technique is presented that will substantially improve equalization and noise cancellation, problems in communicatio
designed in more robust for worst channel deformalities and fading conditions. Our simulation results and syste
Hybrid systems have emerged as a rapidly expanding field for modeling and analyzing systems which have a mixture of co
valued state variables. The modeling framework of hybrid systems has received considerable attention over the past
Abstract: This paper is an effort on our part to develop a method that enables a robot to reach the target from the starting p
manner, avoiding all the obstacles (both static and moving) that come in it's way. In the process of doi
Electronic commerce is emerging as the new Internet business model. In electronic commerce, most net traffic is multimed
that there is a real need for an efficient hybrid multimedia compression technique that improves the communicatio
Abstract: - A filter cache is proposed at a higher level than the L1 (main) cache in the memory hierarchy and is much small
filter cache is of the order of 512 Bytes. Prediction algorithms popularly based upon the Next Fetch Predi
Colour is an important feature for object classification in digital video images, where shape-based techniques are not pract
case if real-time processing has to be applied to situations where many candidate shapes can occur. However
We propose a mobile agent based information retrieval system for wireless personal area networks. A shopping complex s
demonstrate the proof of concept. We study a number of ways in which mobile agents can be used to retrieve information
Management Information Systems (MIS) and associated commercial products are now an important part of both enterprise
businesses. MIS products are available for premium prices, but do not always meet business's expectations particularly
This paper suggests that the immune network algorithm based on fuzzy set can effectively be used in tuning of a PID cont
process or nonlinear process. The artificial immune network always has a new parallel decentralized processing
This paper presents the design of a safe, friendly, and living autonomous Interactive Robotic Usher (IRU). IRU is able to ru
achieve specific commands, intelligently interact with humans and environments, move safely and avoid obstacles
Distance Learning has largely benefited from the incredible progress that internetworking technologies have made in the la
applications are nowadays used within distance learning processes, in combination - and sometimes in substitutio
This paper introduces a cascaded RLS-LMS predictor for predictive lossless audio coding applications. In this proposed p
with large order is employed in order to capture the ample tonal and harmonic components of the audio signal
The Diameter-Based AAA (Authentication, Authorization and Accounting) System manages transport connection using two
which are Peer State Machine defined in Diameter Base Protocol [1] and Failover State Machine defined in AAA Transpo
Abstract: The mechanical properties of the skin are known to be age, sex and race dependent and reflect different physiolo
well as skin disorders. Therefore, monitoring alteration in the mechanical properties of the skin may help t
The utility of alarm systems currently used in the operating room is not high. They have low specificity and do not help the
assessing patient threatening situations. For these reasons, there is a continuing interest in developing intellig
There are various Mission Control Centers (MCC) in many countries. But analysis of the existing literature proves absence
structure optimization although optimal structure of MCC could allow to increase profitability of mission cont
Mobile commerce is an exciting and very recent addition to modern business enterprise. M-commerce allows levels of sale
interaction at unprecedented new turn-around times. The technologies for M-commerce are still in their infancy. While n
This paper describes a new model-based approach to recognize occluded curved objects from single range images. Image
on surface curvature detection. Object representation is expressed in terms of an edge-junction graph and a surface-
Iterative decoding of Low Density Parity Check (LDPC) codes using the Parity Likelihood Ratio (PLR) algorithm have been
efficient compared to conventional Sum Product Algorithm (SPA). However, the nature of PLR algorithm tends to put nu
A multi-channel auto-gain controllable receiver module for a 40Mbit/s LED based non-directed infrared wireless link is impl
photodiode array followed by multi-channel transimpedance-summer architecture, band-pass filter, AGC, with EM shieldin
A perfect sequence, whose out-of-phase periodic auto- correlation function takes zero, can be successfully applied for com
processings. This paper makes clear the construction of a multi-dimensional perfect sequence, which is genera
Inspired by the analogy between computer-based visual systems and their biological counterparts, we propose to take adv
concepts borrowed from the field of biological vision and not recognized yet in today’s engineering systems. What
ABSTRACT This paper presents computerized analysis of wounds(injuries) in which different edge detection techni
performance evaluation is done . Parameters for performance evaluation are Edge Detection Error Ratio (EDER).
ABSTRACT This paper presents computerized analysis of wounds(injuries) in which different edge detection techniques
Prewit, Robert , Laplacian. Their performance evaluation is done. Parameters for performance evaluation are E
E-commerce systems, which support information security functions, should have cryptographic functions for information in
communicate securely, including management of cryptographic keys and recovery of lost keys. In this paper, we pre
Abstract: The had been over the years a lot hues generated by the menace of malaria attack, especially in Africa. Many co
held and countless papers have been published on the matter. But little or no resultant effect had been felt. This
In this study, we deal with a mobile robotΤs navigation in an unknown but static terrain. The terrain model, two dimensiona
obstacles, is not known a priori, but robot is equipped with a number of proximity sensors and the navigation pat
A quantitative approach to determination of depth profiles of optical properties of Si-implanted SiO2 films based on spectro
is presented. From the SE measurements, the depth profiles of the complex refractive index of SiO2 films
Remote sensing has played an increasing role in the routine monitoring of oil pollution and in support of the operational res
pollution incidents. This study develops the technique of optical measurement for the detection of oil in the M
In this paper we examine the application of hierarchical fuzzy control and evolutionary algorithms to find closed-loop contr
optimal control problem arising from semi-discretisation of a linear parabolic tracking problem with boundary
As a result of enormous competition in the system-on-chip industry, the current trends of system level design flows focus o
tools construction and verification, behavioral modeling and code generation. This paper presents a design me
Turbo codes have become part of the third generation W-CDMA systems because of their extraordinary coding performan
implementation in commercial systems suffers from power, latency and complexity limitations. Here, we address new optim
The IIR filter design under the mixed-criterion of H2 norm and ∞ norm is proposed in this paper, and genetic algorith
realize the filter design based on such criterion. By this approach, the disadvantage of other conventional
In this paper, we introduce a new panoramic movie system that can capture and play 360 degree viewing angle. The syst
movie by using four wide-angle video cameras, and then the video streams are encoded as a single stream of common vi
Abstract – In this paper auto-tuning scheme of PID controller based on the reference model has been studied by im
process. Up to this time, many sophisticated tuning algorithms have been tried in order to improve the PID controll
Abstract – In this paper auto-tuning scheme of PID controller based on the reference model has been studied by im
process. Up to this time, many sophisticated tuning algorithms have been tried in order to improve the PID controll
Abstract – In this paper auto-tuning scheme of PID controller based on the reference model has been studied by im
process. Up to this time, many sophisticated tuning algorithms have been tried in order to improve the PID controll
Russian-Ukraine spacecraft “Ocean-O” (S/C) was launched on July, 17, 1999. S/C is controlled from Missio
Modeling (MCC-M), town Korolev, Moscow region. Purpose of the S/C “Ocean-O” is operative reception of
Russian-Ukraine spacecraft “Ocean-O” (S/C) was launched on July, 17, 1999. S/C is controlled from Missio
Modeling (MCC-M), town Korolev, Moscow region. Purpose of the S/C “Ocean-O” is operative reception of
Fingerprint is the most vital & unique biometric feature used for personal identification. The manual fingerprint verification i
consuming & incapable of meeting the increasing performance requirements of today’s e-commerce & other a
Fingerprint is the most vital & unique biometric feature used for personal identification. The manual fingerprint verification i
consuming & incapable of meeting the increasing performance requirements of today’s e-commerce & other a
This paper presents a method to determine an accurate position by using a low cost GPS receiver and proposes a fuzzy s
in GPS positioning. At first the fixed position parameters, such as DOP (Dilution of Precision) and SNR (Signal
A wavelet based technique for multiple point targets detection in InfraRed image sequences in presence of clutter is prop
approaches assume target of several pixels size or of Gaussian shape with variance of 1.5 pixel. We develop de
Our main goal is the interrelation amongst the new metadata paradigm - the XML family - and the Workflow Process Autom
and interaction with database legacy systems. We intend to answer two fundamental subjects: the granularity o
In this paper the power conversion efficiency of airborne parametric array is studied and an explicit expression of the relati
power conversion efficiency and the primary wave power, primary wave frequency, and secondary frequency is ded
Automotive powertrain system consists of several interactive and coupled nonlinear systems. This research focuses on the
Gasoline Direct Injection (GDI) engine, transmission and emission aftertreatment systems. The goal is to design an opt
This paper presents a method to determine an accurate position by using a low cost GPS receiver and proposes a adaptiv
better accuracy in GPS positioning. At first, we introduce the GPS system errors. Then measuring the errors of posit
Threat diagnostic, using AND/OR tree and risk analysis, is a mechanism to protect mobile agents against malicious host a
based on analyzing the probable causes of mobile agent failure to perform its intended function. It uses the symp
In this paper, we propose an effective post-processing algorithm with low computational complexity for removing coding ar
degrade visual quality of the decompressed images. The proposed method is based on a fuzzy model and recursive f
Video downsizing transcoding is a common technique for adapting the bitrate or spatial/temporal resolution of a compresse
transmission bandwidths or receiving devices. In arbitrary downsizing video transcoding, although the transc
In arbitrary downsizing video transcoding,although the transcoder can adjust the size of a pre-coded video to meet the req
transmission channels or receiving devices, there is however no model to illustrate the relation between bitra
The article presents some problems of optical wireless link (OWL) reliability. The influence of atmosphere on OWL reliabilit
link models from which it is possible to determine a dependability of characteristics. A summary of basic
-The paper analyze the characteristic of Parallel Computing Model of BSP and NOWS, Research on Parallel Computing M
NOWS fit Environment. Indicate: some algorithm that designed rationalization parallel computing, acquire an approximatel
As E-activities begin to acquire a more sure footing in today’s society, more and more groups, organizations and in
contributing to determining its safety and security. But safety and security of any scale will not endure the test of ti
In this study, a robust adaptive fuzzy control (RAFC) system is proposed. The RAFC system is comprised of a computation
controller. The computation controller containing a neural-network-estimator is the principal controller and th
This paper is concerned with the problem of robust output tracking of single-input and single-output nonlinear systems with
uncertainties. Based on Lyapunov method and input/output linearization approach for nonlinear state feedback synthe
Robust tracking and disturbance rejection problem, which is commonly referred as the robust servomechanism problem, is
hybrid systems. The necessary and sufficient conditions for the existence of a solution to this problem are presen
Abstract A template-based vision system for the 100% inspection of wafer die surfaces has been developed. Design goals
for the detection of flaws as small as two thousandths of an inch on parts up to 8-inch wafer size. Each die is
AR modeling is commonly used in modeling various signals. The sample size of the signals used for AR modeling as well a
chosen based on prior knowledge or experience with those signals. In this paper we estimate the optimal AR order
The advent of the world wide web (www) and hypertext transfer protocol (http) has greatly changed the use of Internet. It h
will remain for several years, one of the fastest and easiest ways to share documents and exchange information
Companies across the world are turning to mobile commerce because mobility brings competitive advantages through per
flexitbility and streamlined processes enabling comapanies to enhance revenue generation. Therefore success in the
Electronic business is rapidly popularized and extended through Internet. Internet has many security weaknesses, so we n
such Intrusion Detection System that minimizes the damage of hacking and responds the intrusion dynamically.
With regard to nonlinear plants in process control, generalized predictive control strategy based on neural-network is analy
applications, a simplified algorithm is presented with an adaptive tuning coefficient and non-derivative opt
Our contribution highlights the statistical properties and biological interpretation of the basis vectors (filters) that result from
independent component analysis (ICA) to feature extraction from patches of natural images. The consis
Electronic governance offers an opportunity for governments to re-invent themselves, get closer to the citizenry and forge
partnerships with diverse communities of interest, practice expertise, conviction and inter-dependence within t
Electronic governance offers an opportunity for governments to re-invent themselves, get closer to the citizenry and forge
partnerships with diverse communities of interest, practice expertise, conviction and inter-dependence within t
Abstract: In this work, gate dielectric degradation under dynamic Fowler-Nordheim (FN) stress is studied. A novel interface
technique, direct-current current-voltage (DCIV) technique, is used to measure the interface trap generation cause
This paper describes a Genetic Algorithm based approach to classify textures at multiple scales using Wavelet Transform.
significant dominant frequency channel such as random texture or where multiple textures have similar dominant fre
In modern radar systems, digital pulse compressor (DPC) is becoming more common with the development of digital signa
DPC is implemented using finite impulse response (FIR) filter algorithm in time domain or fast Fourier transform (F
Generally, mobile device must be light and small to make it more portable. So, mobile devices may have fewer resources a
power. When we design protocols for mobile communication environments, we should minimize the computational amoun
Those in the world of Automation and Control, and especially those like me that are at the stepping stones get baffled by th
of controllers available; getting even more astounding if you add the constellation of communication componen
The Multimedia Messaging Center, which consists of a Web Application and a Meeting Server, is an innovative solution th
versatility and flexibility for wide area network based interactive multipoint/multimedia distance collaboration and
The automatic controls of some industrial processes have not been completed because it is difficult to find their amenable
the mathematical models are too complicated to be used. The Intelligent Fuzzy Control makes it be possible to
In nondestructive material evaluation technique, ultrasonic echoes exhibit critical time and frequency information. A time-fr
provide an effective tool to obtain frequency dependent ultrasonic characteristics related to certain mat
Authentication is an important issue in E-Commerce. This paper describes a method of providing a trusted path between a
using an access control processing technique. The method of providing a trusted path between a user and a system incl
Wavelets are being utilized in various communications applications either as an alternative to short time Fourier transform
non-stationary data or as a new tool to bridge between time domain and frequency domain analysis. A wavele
In this paper, we present a novel unequal loss protection (ULP) algorithm for robustly transporting data-partitioned MPEG-
erasure networks. To minimize the overall distortion in a frame, a redundancy-distortion optimization scheme
We present in this paper a system for image indexing and retrieval through speech annotation made directly on a digital ca
are based on a pre-defined structured syntax and transcribed by an automatic speech recognition engine. N-best
A task is core when its outcome directly affects the competitive advantage of the company in its targeted markets. In any g
business, one company's core may well be another company's context. Outsourcing the context and enhancing the core
In this paper, a video object segmentation algorithm with robust reference frame generation has been proposed. This algo
approach for obtaining a reference background frame in order to improve the results of change detection and also s
In this paper, a new method for perceptual video quality evaluation is proposed. The method is based on multi-feature of v
various coding artifacts. A radial basis function neural network is used to give discrimination. The proposed me
The study aims at identifying effects of different coding artifacts towards video quality in various situations, via comprehens
test results. It confirms that each coding artifact factor (e.g., blockiness or edge damage) may play diffe
Leveraging the Internet, e-commerce marketplace, including business-to-consumer (B2C) and business-to-business (B2B
greatly in recent years. For small or medium-size enterprises which hope to operate online shops, it is difficult an
Recently, the number of Korea wireless mobile terminal users surpassed the thirty million mark. This drastic increase in wi
communication necessitates a component called security. As a solution for security in the wireless environment, wireless
- This paper presents our recent work in developing a system for transcription of polyphonic piano music. Our goal is to bu
automatically transcribe polyphonic piano music from the audio signal, discovering notes, their onsets and o
Biological sequences, i.e., DNA, RNA and proteins, are coded by strings called primary structures. During the last decades
complexity of these primary structures is growing exponentially. Analyzing this huge volume of data to extract p
{\em Abstract: -} We describe here a graph partitioning system that aims at producing naturally unbalanced multiway parti
This system makes use of ideas of 2-phase FM (coarsening,partitioning,refinement), multilevel refinement and
The ubiquity of the Internet has brought about an increasing amount of multi-formatted Web documents. If images in a We
classiffied by which have particular information or not, then it would be very useful for analysis and multi-formattin
A mathematical model, which describes the control of the development and growth of a healing unit, is presented. The rep
injured tissue, which is controlled by a negative feedback mechanism, is modeled in one-dimensional geometry. T
In this work, we present a multiple window Evolutionary Spectral analysis on a non-rectangular time-frequency lattice base
Gabor expansion. The traditional Gabor expansion uses a fixed, and rectangular time-frequency plane tiling
Passive stereo vision is a well known approach for recovering 3D information from two or more video images. The key task
correspondence problem. It consists of identifying features in the left and right images that are projections of the
Abstract: - This paper proposes a new multistage technique of algebraic codebook in CELP coders called Trellis Search in
Coded Quantization (TCQ). This search technique is implemented into the fixed codebook of the standard G.729
Abstract: - In this paper we suggest a strategy for the systematic determination of a base of models for the representation
linear systems. This strategy is based on a numerical data classification approach and it is divided into
Fingerprint image segmentation is one of the most important steps in automatic fingerprint identification, and it heavily influ
of fingerprint identification system. Minutiae are local discontinuities in the fingerprint pattern which
In this paper, we describe an efficient and flexible generation scavenging garbage collector toolkit. Our methodology excee
cost associated with any single operation is bounded by small time constant. The collector maintains several
The model adaptation scheme PMC plays an important role in robust speech recognition. However, There are still some op
PMC: how to get the model of convolutive noise, how to work efficiently in low SNR, etc. In this paper, the innovation
The formation of fruiting bodies by myxobacteria colonies involves altruistic suicide by many individual bacteria and is thus
exploitation by cheating mutants. We report results of simulations that show how in a structured environment with
Facing the development of microarray technology, clustering is currently a leading technique to gene expression data anal
propose a novel algorithm called repulsive clustering, which is developed for the use of gene expression data
In this paper we study the dependencies between bid or ask orders and realized stock transactions. The stock price is con
where the maximum bid price and the minimum ask price coincide. Using information from the order book of the Frenc
In parametric speech coding, the accuracy of parameter quantization has a significant effect on speech quality. In this pap
and high-fidelity multi-mode quantization approach that combines the beneficial features of predictive vec
Conformance Testing is based on Abstract Test Suites (ATSs) and Protocol Implementation Conformance Statement (PIC
Standardized ATSs are usually written in the Tree and Tabular Combined Notation (TTCN). However, TTCN has some ser
Array Management Database (AMANDA) is a relational database designed and developed as a tool for the management a
obtained from microarray experiments. The data base it is also a laboratory information management system as it is able t
In this paper we develop a contingent claims framework for determining the financial value of professional football players.
seen as real assets and this methodology can be used in the football industry, insurance industry and the
- Due to decreasing device sizes and increasing clock speed, the interconnect delay is the dominant factor in clock skew. T
extracted as RC component in available EDA tools. In this paper, we model the interconnect as RLC for systems run
A distributed expert system has been proposed for the smart house control. Its configuration is mainly based on the use of
connected by means of a CAN network. This kind of systems permit the implementation of highly flexible control sys
In the last fifteen years, the automatic payment in Portugal has showed periods of very strong growth. In fact, the present P
system has a capacity of more than 90.600 point-of-sale machines, where it is allowed to buy and pay any ser
Temporal representation and reasoning has been implemented so far to many areas including medical applications. Mining
temporal patterns plays an important role in medical diagnostics. Temporal scenarios of different diseases, therap
This work presents the development of an automatic recognition system of infant cry, with the objective to classify two type
pain. In this study, we used acoustic characteristic obtained by means of the Linear Prediction and Intensity
Assessment of Role of Exclusion and Partition in HPLC of Macromolecules by Computer Processing of Experimental Data
Institute of Informatics, Slovak Academy of Sciences, 842 37 Bratislava, Slovakia, and Dušan Berek, Laborato
Content-based information retrieval is becoming increasingly important for audio document collections. We present a segm
discreetly sampled music documents that employs similarities in the frequency domain between small time slices.
Electronic commerce business to business using mobile agents is one of the most important future promise and also one g
mobility code. As we will show later, classic commerce model and electronic commerce model both introduce advantage
The problem of profiling and filtering the Web content is important particularly for the mobile applications where wireless ne
terminal size are limited comparing to the Internet access from the PC. Dealing with uncertainty when so
Generating a Surface of a desired shape as a single patch is computationally complicated and inefficient. We need to us
patches approximating small portions of the given/probable surface. For generating the surface as a patchwork
Abstract. Software agents are automating many tasks that used to be done by people. As agents begin to address more c
human life, they will need to develop an understanding of dominance hierarchies that people understand intuitively. Tur
In this paper we present an adaptive Block Oriented Model (BOM) realization for speech coding. The proposed structure h
property and speech frame based coefficient identification that can be utilized in speech coding.
We present in this paper a comparison of audio signal codings that we have developed in order to study xiphoidal sounds.
produced by the lower oesophageal sphincter whose dysfonctionnement can be responsible for the gastro-eosophageal re
Evidence for chaos in the brain has been provided using CA3 slices of the rat hippocampus. It has also been reported that
developed on the basis of physiological knowledge reproduces complex activity including chaos. Complex CA3 activi
Computer models show that sympatric speciation is possible given a simple and intuitive set of assumptions. Hard evidenc
sympatric speciation is at most a rare occurrence. Previous models assume unrealistic small overlaps between feeding ni
In this paper, we have highlighted the importance of the wheeled mobile robot (WMR) model for designing control strategie
differential model has been used as reference model in order to design the control algorithm. After the control
Many mobile operators around the world will implement 3G systems over the next few years and will gain a competitive ad
marketplace as a result. The question will be whether the operators can move to 3G economically, with a cost base that su
The effectiveness of metasearch data fusion procedures crucially depends on properties of common documents distributio
neither how different search engines assign relevance scores nor the similarity of these assigments, common documents
The purpose of this work is to present a methodology for the decision fuzzy making in applications on the industry producti
fuzzy process is divided in two levels. In the first one, a formal net is held responsible for the transition
Abstract: - The classical definitions of producer’s and consumer’s risks assume fixed values of the proportion defective. G
suggest that these risks should instead be defined to allow proportion defective to be a random variable [4]. T
Sound quality is a relevant key factor in the restoration of theatres. Italian theatres, especially Opera Houses, are usually c
horse-shoe shape. In this paper, an innovative technology has been carried out, in order to predict an
This paper deals with an important aspect of user immersion in interactive virtual environments. Problems with virtual objec
sound sources and listener in virtual scenes are discussed. Three different methods of detecting sound source ob
The majority of Russian enterprises has been using the cost-based pricing till now. Obviously there are modern ways, that
because knowing buyer’s needs you will sell more. But it is not right practice to move from cost-based practice to
This paper presents the developments made in the Technological Development and Research Program from Brasilia Ener
the same subject of this paper. This project has set up a set of procedures that were introduced into computer packages,
We are building a set of middleware Web Services to support a digital library, offering improved scalability, reliability and in
describes one module of this overall middleware related with the conception and implementation of a
The whole question of consciousness,awareness and depth of anaesthesia is both timely,little understood and deeply chal
underlying neural pathway mechanisms/dynamics are necessary for understanding the interactions involved and their
The retrieval of information in a standard database can be obtained in different way and in some cases a lot of steps occur
information. More difficult exist when we are looking for a pictorial information in a database. This paper
: In this study we report the results of automatic emotion recognition experiment performed on spontaneous emotional utte
sequences for three emotions: anger, happiness and sorrow. Bayesian classifier and radial basis function networks t
In this paper, we propose two algorithms. The first supports Enhanced Best effort Quality of service Routing with Multiple a
(EBQRMPM). The second supports Enhanced Best effort Quality of service Routing with Multiple Metrics (EBQRMM
One of the most common things we use the Internet for is to read the news. But there is so much news catering for so man
gets confusing and difficult to read what you want to read about. This system uses an Intelligent Agent to gues
The paper presents a traffic simulator intended to be used in Bucharest, Romania, in order to solve usual traffic problems a
management performances with the same basic route network. The simulator makes short time traffic predi
This paper proposes the application of Genetic Learning as a procedure for the optimal design and training of neuro-fuzzy
learning procedure has been implemented, hybridization between Genetic Algorithms (GA) and the traditional local s
In this paper we describe a real time facial features tracker applied to the detection of some basic drowsiness behaviours i
camera. It uses stochastic colour segmentation to robustly track a person’s skin and some facial features
Need for deterministic performance and network redundancy have been the most challenging issues to be solved before g
base for process control networks. This paper introduces Fault-Tolerant Ethernet (FTE), a protocol that makes it po
In this paper, we present the FPGA realization of fuzzy based subway train braking system on Altera FLEX10K device to p
increased speed of convergence of the network. The fuzzy based subway train braking system is comprised of fuzzif
The objective at this paper was to delineate a diagnosis system that translates the interactive effect of the calcium and of t
on nonheme-iron absorption from a meal. It was used the fuzzy arithmetic mean, an extension of the arithm
Abstract - The application of fuzzy control methods in systems with highly non-linear dynamics has proved successful in m
can be found in lots of consumer electronics devices and especially in the field of air conditioning and heat
This paper deals with the general problem of designing hardware architectures for mobile robots. In particular, four differen
robots have been studied. An architecture for an industrial forklift, used in the automation of manageme
The aim of this paper is to present a recently developed methodology for the prediction of the harmonic response of arbitra
musical interest. The accurate prediction of the input and radiation spectra of the resonating air-column repr
We propose a new HTML page transcoding technique for hand-held devices connected to the wireless Internet in order to
of original web pages designed for desktop computers in wired network. Our approach is based on the observation t
'Free will' and its corollary, the concept of individual responsibility are keystones of the justice system. This paper shows th
physics that disallows time reversal, the concept of 'free will' is undermined by an integrated criminal j
This paper presents the application of hybrid direct adaptive fuzzy control techniques to a missile autopilot design. The pro
is to augment existing conventional controller with a fuzzy model reference learning controller (FMRLC). T
Hybrid cryptographic security protocols find applications in many areas of communications, none more demanding than in
sector. In recent years a number of hybrid cryptographic security protocols have been proposed for use with 3G mobil
With the migratory awakening of the Soviet Jewish population shortly after the events of 1989, Yitshak Shamir, the then Pr
affirmed that "a great immigration requires a large Israel". This declaration has underlined the permanence o
Control flow monitoring using a watchdog processor is a well-known technique to increase the dependability of a microproc
approaches embed reference signatures for the watchdog processor into the processor instruction stream creating not
Hough transform is one of the most common methods for detecting shapes (lines, circles, etc.) in binary or edge images. It
to detect discontinuous patterns in noisy images, but it requires a large amount of computing power. This
The War of Attrition model of John Maynard Smith predicts a single, mixed evolutionarily stable strategy (ESS) for animal c
settled by conventional displays with no assessment of the opponent's fighting ability. We test the predictions o
In the design of concert hall and opera houses, many acoustical parameters should be xonsidered in order to properly calc
in audience area. Diffusion, scattering, sound insulation should be considered, as well as the correct charact
We present a method for estimating the instantaneous frequency of a signal. This method involves the calculation of a time
density of the signal, then obtaining an instantaneous frequency estimate from this joint density. Time-frequency e
The paper describes some important aspects of the application of intelligent agent technology to bioinformatics domains. T
oriented approach to developing software systems in bioinformatics are discussed: the characteristics of bioi
This article presents the developments made on Technology Development and Research Program from The Brasilia Powe
same title of this paper. This project has developed an automatic analysis methodology and a computer package, aiming
Most operators will aggressively deploy Third Generation networks (3G) on their markets focusing on Wireless Multimedia
will result from regulatory demands or from being in a very competitive market where quick 3G rollout is seen
We present a multi-window method for obtaining the time-frequency spectrum of non-stationary signals such as speech an
based on optimal combination of evolutionary spectra that are calculated by using multi-window Gabor expansion. T
In this paper, a low delay 16 kb/s wideband speech coder with a buffering delay of 1.25 ms is introduced. This coder is bas
G.728 LD-CELP standard for narrowband speech signals. Our main goal is to reduce the implementation complex
This paper describes a computer-based system for visualisation of the human vocal tract shapes during vowel articulation.
assumption that the speech production process is an autoregressive (AR) model, the system estimates the vocal tract sha
This paper describes a computer-based system for visualisation of the human vocal tract shapes during vowel articulation.
assumption that the speech production process is an autoregressive (AR) model, the system estimates the vocal tract sha
With the technological advancements in computer technology, the making of the real-time computer-aided interactive mus
However, due to lack of comprehensive software, such form of artistic expression still proves to be a daunting t
Providing security services to the society is a difficult task. The main problems stem from the fact that predicting the occure
has become more difficult and the threats are no longer one-dimensional, i.e. purely military. Thus, dif
In large-scale power systems, generating plants provide energy to consumers through exceedingly flexible and dynamic ne
electrical energy is maintained in high quality and the voltage profile is kept within acceptable limits by the ut
We study the opportunities for parallelism for the simulation of surface reactions. We introduce the concept of a partition an
simulation methods based on Cellular Automaton using partitions. We elaborate on the advantages and disadvantages o
Since Human Genome is sequenced, the Genome Annotation (i.e., the computer-based predictions addressed to the expe
for the protein-coding and regulatory gene regions), becomes a challenge of bioinformatics. With this in mind, we ha
Since Human Genome is sequenced, the Genome Annotation (i.e., the computer-based predictions addressed to the expe
for the protein-coding and regulatory gene regions), becomes a challenge of bioinformatics. With this in mind, we ha
In this paper we study the dependencies between bid or ask orders and realized stock transactions. The stock price is con
where the maximum bid price and the minimum ask price coincide. Using information from the order book of the Frenc
Mathematical models of viral dynamics are useful for describing viral progression upon infection and viral decline after drug
models including intracellular delays and pharmacological delays appear to be a more accurate representation of
Rendering document images for scanning and printing applications typically involves binarization via adaptive thresholding
dropout. While bitonal rendering is often adequate, there are cases where multi-level rendering is required t
In this paper, we extend the method introduced by Bowles and Peláez (1995) for the risk ranking in Failure Mode and Effe
method is called as multi-ranking method allows combination of both the quantitative method (numeric ranking a
The aim of this paper is to review and discuss possible ways of describing the content of musical files in the context of a sp
application (a tool for content-based management and edition of samples and short audio phrases). Available or fe
We present numerical and experimental evidence of noise-induced synchronization (NIS) and coherence resonance (CR)
These two constructive effects of noise are realized in one experimental laser system, and for weak noise intensities t
Abstract: - The electroencephalogram (EEG) is frequently altered in cirrhotic patients. We therefore undertook a study aim
features and the prognosis of cirrhotic subjects followed up during the time course of their illness. The stu
The purpose of this paper is to compare the characteristics of EEGs, which typically exhibit non-stationarity and long-range
calculating its scaling exponents in between sleep apnea and the normal conditions. Detrended fluctuation analysi
Failure of mechanical controllers onboard a satellite is a well known phenomenon that has already been disastrous for sev
the case studied here, we take as an example the mini-satellite UoSat-12 built by SSTL at University of Surrey
An HIV-1 model involving the dynamics of HIV-1 and CD4 and CD8 lymphocytes in human blood is considered. A feedbac
the geometric nonlinear control theory, and a discrete-time version of that control is analyzed. Results obtained in c
ABSTRACT This paper presents computerized analysis of wounds(injuries) in which different edge detection techni
Sobel, Prewit, Robert , Laplacian. Their performance evaluation is done. Parameters for performance evaluation are
A single-channel speech enhancement technique using a combination of “Wiener filtering” and spectral subtraction in the w
proposed and evaluated. In particular, the technique was compared to several other common enhancement methods such
The aim of this paper is to describe the wavelets-projection methods for computing dynamic equilibria in macroeconomic m
families of orthogonal basis functions with special properties, particularly useful for solving functional systems
The Forward Problem in EEG consists on finding the scalp potential due to current sources within the brain. Electrical activ
governed by the laws of electromagnetics. Thus, to solve the problem, Maxwell Equations must be solved in a vol
Operational risk in banking and finance has been worrying international supervision organizations. This can be partially ex
the significant losses that occurred recently do not fit into other types of financial risks for which seve
- The paper is concerned with development of optimal chemotherapy protocols which take into account both action of seve
evolution of drug resistance. First, a biological background is given. Subsequently, the developed technique is presen
This paper proposes a new output-based method for assessing speech quality and evaluates its performance. The measu
the output speech to an artificial reference signal representing the closest match from an appropriately formulated
The unpredictable behavior of conventional caches presents several problems when used in real-time multitask systems. I
effects in the Worst Case Execution Time and it introduces additional delays when different tasks compete for
- This paper proposes a simple pitch detection method using the parallel connected comb filters. We can know the pitches
detecting the smaller outputs in twelve comb filters connected in parallel. Each comb filter has zero points cor
A new pitch estimation method for song sounds using twelve comb filters and singular value decomposition (SVD) process
method is based on the ability of a comb filter, corresponding to one tone, to eliminate the tone's pitch and harm
The musical creation is examined and compared with an engineering project. The two works proceed in a similar manner,
gives rise to a project and finally to the completed work. The composer’s path is thus similar to that of any
- Power systems are spread over a large area of land, and their operation constantly undergoes changes due to componen
laws, operational mishaps, or natural disasters. Consequently, power systems can be classified as spatial, tempora
The application of KDD (Knowledge Discovery in Databases) techniques to the analysis of stock market data has been val
method for the identification of high performing stocks. Using a database of firm fundamental information for the
Records of brain electrical activity from intracranial EEG are analyzed to predict the epileptic seizure onset. We present a m
evolution of the accumulated energy, but using wavelet analysis. This mathematical tool allows to analyze the
The concentration of circulating blood elements shows a remarkable temporal variability. In this paper the hematocrit time
a stochastic process. Several methods for estimating the parameters of the stochastic model are compared. A
There has been a lot of interest in applying modelling techniques cancer statistics for a variety of analytical reasons. Hauku
applied linear, log-linear and non-linear regression to the problem of predicting incidence rates. In thi
Among Geographic Information Systems functionality is the retrieval of spatial data by using various spatial operators. The
about the definition of new spatial operators that are based on projective and affine geometric invariant
Protein-protein interactions are essential to all cellular processes. Given the recent increase in protein structural informatio
proteins, the need to understand protein-protein interactions from a computational approach is increasi
This paper presents an account of the use of syllable structure as the basis for a novel approach to speech recognition. T
serial organization of more conventional phonetic segments, and their use in speech recognition systems. It
Internet has opened traditional process control networks. In most of the cases, system maintenance people can do their w
Private Networks (VPN) and other securing mechanisms, and the production process can be observed via web browsers
The paper presents the general framework of a special object-oriented query language which incorporates the concept of d
number of questions both for the language and its data model (the so-called stack-based approach) are covered, a
Sign languages are the basic means of communication between hearing impaired people. The work presented in this pape
work, aiming at developing a system that could recognize and translate isolated and continuous Greek Sign Language
There is an increasing demand for the low-cost and high-efficient speech coders used in personal multimedia communicat
applications. In this paper we present the general aspects of ITU-T recommendation G.729 8 kb/s CS-ACELP coding sc
This paper presents an intelligent User Manager Agent System (UMAS) that has a capability of controlling users’ requests
resources. In performing the tasks, UMAS requires several sets of training data for decision-making process in w
Synthetic aperture techniques have been of interest to the sonar imaging community, but suffer from the problems of main
and a slow mapping rate. The need for rigorous and accurate platform trajectory monitoring often increases the
In this paper, an algorithm is proposed for Harmonic/stochastic decomposition of the signal for synthesis speech. This Algo
representation the periodic portion (Voicing, pitched ) of speech by a sinusoidal model and the stochastic portion
Abstract: - Speaker indexing can broadly be divided into two problems: Locating the points of speaker change (Segmentat
speaker in each segment (Labeling). An important obstacle, in the speaker tracking, is the corruption of the sp
In the DNA sequences of human, genes are about 3%, and the others are repeat sequences. More and more experiments
sequences should influence the expression of genes. Microsatellites, one kind of repeat sequences, are tandem repeatin
Speech recognition over different transmission channels will set demands on the parametric encoded/decoded speech. Th
types of noise have been studied a lot and the effects of the parametrization process in speech has been known to c
An algorithm for detecting spikes in electroencephalograms of epileptic patients is introduced. It is based on a multiresoluti
a Daubechies wavelet. The results obtained from two patients implanted with depth electrodes are shown.
The segmentation of clients in a specific market is very useful to identify different groups of them that let develop specific m
better suit the demand and to get a higher market share. This item is specially relevant when a new produc
This article describes some preliminary investigations into the statistical properties of the transcribed dialogues that were c
National Corpus of English. Our aim has been to look for evidence of linguistic structure which could
The objective of the study is to compare the methods of Monsen and Hallberg/Hulthen to calculate the nonheme-iron abso
Transversal retrospective study of case used an accidental sample with 72 meals. The calculation of nutrients was m
We analyze sleep EEG-data using two analytical methods – the first is based on Higuchi’s fractal dimension of the signal a
symbolic method applied to signal’s derivative. We demonstrate that the fractal dimension method differentiate bet
The worldwide eruption of controversy over Bjørn Lomborg’s book, The Skeptical Environmentalist [1], focuses debate on
environmental quality, use of the scientific method, economic versus engineering frameworks of analysis, validity
Abstract: - This work presents some performance results of the utilization of the IDEA cryptographic algorithm with OPC st
interfaces. The application developed in this paper uses the OPC standard, furnished by the OPC Foundation, a
The thermal inactivation parameters of cod pepsin, cod pepsinogen and porcine pepsinis were compared at pH 2, 40-65oC
and cod pepsin were less stable than porcine pepsin mainly as a result of large value of activation entropy.
We describe a pitch tracking method based on a time delay estimation technique. Given two frames of voiced speech and
run a linear regression on the unwrapped phase of the quotient of the spectrum of both frames. A weighted linea
Since September 11th there has been a rise in jingoism within Canada. There has been wide support for Canadian partici
terrorism and enthusiasm for Canada’s role in ‘offensive’ operations in Afghanistan, rather than a continuation of
This paper deals with transport process automation of industrial plants with industrial forklifts. In particular, a forklift has be
based on external and internal sensors. A specific hardware architecture have been implemented and t
In this paper, a method is developed to minimize the expected warranty servicing cost per item sold. In this method, to be
replace a failed item. These kinds of items work in multi-state deteriorating and they may fail in every state.
This paper presents an intelligent User Manager Agent System (UMAS) in which it has a capability of making a manageme
the network load with the users’ requests for accessing network resources. A conventional users’ request for acc
The aim of this paper is discussing possible ways of describing some music constructs in a dual context: that of a specific
tool for content-based management and edition of samples and short audio phrases), and that of the current
New topological valence charge-transfer indices are applied to the calculation of dipole moments. The algebraic and vecto
transfer indices are defined. The combination of the charge-transfer indices allows the estimation of the dipole mom
This paper presents a new approach to robustly track a robot’s location in indoor environments using a partially observable
model is constructed from topological representation of the environment, plus actuator an sensor characteristics
The objective of this work is to build a gateway to allow a Z39.50 distributed search system to have a friendlier web based
achieve this, a conversion between MARC and XML is done, using the Dublin Core profile to do the translation. Th
We discuss the digital disorder of Davydov beta kinks introduced by Rosu and Canessa a decade ago [Phys. Rev. E 47, R
digitally-disordered Davydov beta kinks display self-organized features, i.e., power law correlations both in time and s
Within restricted response time, in order to track pulse train of Radar and predict the next pulse time, we propose the Neur
structure. This Dynamic structure consists of basic structures. And it is a variable structure in that the
To support fault-tolerance in distributed computing system, a recovery technique using multi-agent is suggested in [1]. How
system using multi-agent doesn¡¯t support fault-tolerance of multi-agent. Agent failures may lead to inconsist
Abstract This paper presents an alternative formulation and new algorithms for computation of the nonlinear magnetizing c
Switched Reluctance Motors (SRMs). In this paper Frohlich’s equations are reviewed which are used for modeling non-
Abstract. This note focuses on three major concepts: First, application of quadratic stabilisation of linear system with norm-
uncertainty in the state matrix. The desired stabilizing law is constructed by applying an algorithm based o
Wavelets technique is applied for solving of the 2D (-or 3D) Dirichlet, Neumann or mix boundary problems when scattering
conducting (-or dielectric) cylinders with complicated cross sections, screens and bodies of revolution. The deve
Partition functions Z(x) of statistical mechanics are generally approximated by integrals. The approximation fails in small ca
temperature, when the ratio $x$ between the energy quantum and thermal energy is larger or equal to unity.I
Failure of mechanical controllers onboard a satellite is a well known phenomenon that has already been disastrous for sev
the case studied here, we take as an example the mini-satellite UoSat-12 built by SSTL at University of Surrey
We present in this paper computation algorithms for the structural decomposition of general linear multivariable singular sy
decomposition has a distinct feature of capturing and displaying all the structural properties, such as the fin
In many technological applications it is important to mix and heat an electro-conductive liquid. In practice, such processes
of various magnetic fields acting upon the liquid.The distribution of electromagnetic fields, forces an
In this paper, we will show that a simple one dimension nonlinear map allows generating binary sequences that have bette
then classical pseudo random ones. Using performance criterion that is suitable for CDMA application, the perf
The performance of xDSL-systems is determined by the existing crosstalk interference. xDSL-systems are optimised to the
interferences in a cable bundle. The crosstalk interference leads to unwanted restrictions in the number of xDSL-sys
: In converters system, the supply voltage can be in unbanlanced condition for some reasons, and noncharacteristic harmo
both DC and AC side. This paper proposes an analytical method for calculating the harmonic currents of DC and
This paper presents the developments made in the Technological Development and Research Program from Brasilia Ener
the same subject of this paper. This project has set up a set of procedures that were introduced into computer packages,
This paper presents a new and efficient way of implementing quadratic programming to solve the Dynamic economic dispa
economic dispatch is an extension of the conventional economic load dispatch, problem that takes into consideration o
In this paper, numerical and experimental techniques for elastic impact analyses between two vibrating beams are present
sensor developed for measurements of elastic impact forces and the designed vibration exciter are also discussed
The pathways that exist in porous membranes used to deliver drugs form fractal percolating paths. For a homologous seri
fractal dimension D is calculated as a model for transdermal-delivery drugs. Our program TOPO is used for th
We use the projective limit construction to examine the connections between one- and two-sided shifts and the dynamics o
in one variable and quadratic Henon mappings.
Electrical utilities need to use their equipment closer to their design limits and require extending their operating life through
monitoring systems. Data interpretation is of high importance to infer the state of the equipment and is
We consider the machine setup problem of printed circuit board (PCB) assembly as a combination of a job grouping proble
problem. We formulate the problem as a MIP-model, where the objective is to minimize the weighted sum of the numbe
Abstract – This paper deals with the problem of chose local control actions in power systems. The planning scenario is co
the study is to determine the most effective actions to lead the system to a better operating point. The too
Traditionally, crude oil flow metering is an important process; it has economic impact on oil producers and oil buyers. The m
current flow metering techniques that involve mechanical wetted moving or rotating components is the continuous
Olfactory sensors have been attractive for scientific research and industrial applications. In this paper a new type of olfacto
compact size and passive fiber optic components “Fiber Bragg Gratings Technology” is introduced and its math
At present the problem of dynamic characteristics identification (DChI), alternating pressure transducers (APT) is extremel
transducers reasons for that: of creation mechanical tested signals difficulties, closed to its characteristics,
There are various Mission Control Centers (MCC) in many countries. But analysis of the existing literature proves absence
structure optimization although optimal structure of MCC could allow to increase profitability of mission cont
Micro opto-electronic device (MOED) are proposed for 2-D optical cross-connect. The MOED consists of an array of contro
beam splitters (PBS). The control unit of MOED is a optp-electronic unit (OECU). The proposed device will eithe
A new modification of the method of discrete sources are applied for solving a 2D scattering problems by metal or dielec
covered with dielectric layer. The developed method. The problems of accuracy, choosing auxiliary contour
A number theoretical model of 1/f noise found in phase locked loops is developed. Oscillators from the input of the non line
stage are shown to lock their frequencies from continued fraction expansions of their frequency ratio, an
Monitoring oil fields reservoirs for optimizing the production have been satisfied by wellhead sampling and test separator m
and research work have been taking place to develop smaller size and lower cost multiphase flow meters that im
Partial discharges are caused by various defects such as voids, shield protrusions, contaminants, advanced stages of wat
the main cause of breakdown in insulation materials. Partial discharge (PD) location is a powerful and useful to
Abstract: This paper deals with the heat generated by ohmic losses in dielectric insulation of the electrical devices. A des
solution of coupled electric and heat dissipation problems in high-voltage (HV) insulation formed by so
Abstract:-We consider the Cauchy problem for higher order linear parabolic equations in a layer.We establish new a priori
to this problem in general anisotropic Hölder norms, under the assumption that the coefficients and the in
On the Cauchy Problem for Higher Order Parabolic Equations Martín López Morales. Monterrey Institute of Technology. C
Mexico. (Abstract ) In the present work we consider the Cauhy problem for higher order li
E.I.Verriest and F.L.Lewis have presented in [1]a new method to approach the minimum-time control of linear continous-tim
Bang-Bang control. Their method relied on the optimization of a cost including time energy and precisions terms
Parsing a Spice netlist is the first step of all circuit simulation programs. This part is usually done by low-level coding techn
language. The aim of this paper is to show the usefulness of functional programming techniques to the ne
Russian-Ukraine spacecraft “Ocean-O” (S/C) was launched on July, 17, 1999. S/C is controlled from Mission Control Cent
M), town Korolev, Moscow region. Purpose of the S/C “Ocean-O” is operative reception of Earth and World ocean remote
The method of the processing of the short reactions data by means of uneven weighing is described. The methods of para
analysis are taken as a basis. The comparison of the methods, resolutions is given. There is also a discussion of real
Based on a mathematical analysis involving Radon measure explicit formulars of continuous (integral) wavelet transformat
further used to direct how to use rotational wavelets in edge detection.
In this paper, we consider a discrete-time multiserver queueing system with infinite buffer size, geometric service times and
first-served) queueing discipline. A relationship between the probability distributions of the system contents
This paper presents a numerically stable integral equation methodology for the full-wave electromagnetic analysis of the th
interconnect networks, integrated passives and power distribution grids used in high-speed digital and mixed-signal
In this paper the ideas of Rota and Ramanujan are shown to be central to understanding problems in additive number theo
methods are two different facets of the same theme of interplay between probability and Fourier series used to
Abstract:-In previous papers, [1]the existence of an additional energy to the electromagnetic has been described and desig
[fluidice//traction fluidice]. This living energy operates to transduce information into the electromagnetic, molecular cont
Russian-Ukraine spacecraft “Ocean-O” (S/C) was launched on July, 17, 1999. S/C is controlled from Mission Control Cent
M), town Korolev, Moscow region. Purpose of the S/C “Ocean-O” is operative reception of Earth and World ocean remote
Properties of the total and conditional entropy are studied. The theorems that have been proved state the necessary and s
the total and conditional entropy maximum of the special type functions, namely, D-functions. A procedure for
To be send later.
The aim of this paper is to develop a new approach for a solution of the continuous-time Hinf model matching problem with
by using Linear Matrix Inequalities (LMIs). The main contribution is to reformulate the continuous-time Hinf
The aim of this paper is to develop a new approach for a solution of the discrete-time Hinf model matching problem with a
using Linear Matrix Inequalities (LMIs). The main contribution is to reformulate the discrete-time Hinf mod
We discuss brief\mbox{}ly how the recently uncovered time asymmetric solutions to linear ordinary differential equations ca
framework to address the 1/f noise problem. We also point out its relevance in the theory of prime numbers.
Abstract:- A probabilistic performance analysis is one of the key tools that will be used to assess the acceptance of the pro
high-level radioactive nuclear waste in Japan. We present an integrated tool to determine the uncertainty
Not yet writen
The Wavelet solution for boundary-value problems is relatively new and has been mainly restricted to the solutions in data
processing and recently to the solution of differential equations with periodic boundary conditions. This paper i
New elliptic cylindrical wavelets are introduced, which exploit the relationship between analysing filters and Floquet's soluti
equations. It is shown that the transfer function of both multiresolution filters is related to the s
The method of the processing of the short reactions data by means of uneven weighing is described. The methods are us
dynamic characteristics' pressure sensors on the basis of the reactions to impulsive and multistage influences.