189 research outputs found
Automatic identity recognition systems : a review
Rapidly changed computer technology and fast growth of communication ways, makes everyday work easy and managed. Technology takes place everywhere, in business, education, market, security... etc. However, communication between human and these technologies become the main concern of many research areas, especially for developing automatic identity recognition systems. However, biometric technologies are among the most important technologies used in this area.
Biometric technology refers to the automatic identity recognition using physical or behavioral traits associated with him/her. Using biometrics, it is possible to establish
physiological-based systems that depend on physiological characteristics such as fingerprint, face recognition, DNA... etc, or behavioral-based systems that depend on behavioral characteristics such as gait, voice ...etc, or even combining both of them in one system. Therefore, biometrics technologies can be excellent candidates for developing intelligent systems such as speaker identification, facial recognition, signature verification...etc. In addition, biometric technologies are flexible enough to be combined with other tools to
produce more secure and easier to use verification system
Issues in location-based multicast routing in manets
Mobile Ad Hoc Networks (MANETs) are an autonomous system of a set of mobile nodes connected by shared wireless links, forming a temporary network without relying on any
infrastructure. MANETs characteristics include self-organizing, self-configuring, multihop communication, continuous mobility and strict resource limitation. These characteristics coupled with the characteristics of the wireless communication medium make routing protocols one of the major issues to consider in MANET
Review of multicast QoS routing protocols for mobile ad hoc networks
A Mobile Ad hoc NETwork (MANET) is consisting of a
collection of wireless mobile nodes, which form a temporary
network without relying on any existing infrastructure or
centralized administration. Since the bandwidth of MANETs is
limited and shared between the participating nodes in the
network, it is important to efficiently utilize the network
bandwidth. Multicasting can minimize the link bandwidth
consumption and reduce the communication cost by sending the
same data to multiple participants. Multicast service is critical for
applications that need collaboration of team of users.
Multicasting in MANETs becomes a hot research area due to the
increasing popularity of group communication applications such
as video conferencing and interactive television. Recently,
multimedia and group-oriented computing gains more popularity
for users of ad hoc networks. So, effective Quality of Service
(QoS) multicasting protocol plays significant role in MANETs.
In this paper, we are presenting an overview of set of the most
recent QoS multicast routing protocols that have been proposed
in order to provide the researchers with a clear view of what has
been done in this field
Arabic automatic continuous speech recognition systems
MSA is the current formal linguistic standard of Arabic language, which is widely taught in schools and universities, and often used in the office and the media. MSA is also considered as the only acceptable form of Arabic language for all native speakers [I].
As recently, the research community has witnessed an improvement in the performance of ASR systems, there is an increasingly widespread use of this technology for
several languages of the world. Similarly, research interests have grown significantly in the past few years for Arabic ASR research. It is noticed that Arabic ASR research is not only conducted and investigated by researchers in the Arab world, but also by many others located
in different parts of the \vorld especially the western countries
Multicast security : issues and solutions
The rapid growth of multicast communications has lead to wide use of the Internet for both individual and commercial distributed applications. Multicast communication is defined
as an efficient way to distribute rich media to multiple users or participants simultaneously over the Internet. This is efficient in many applications including Internet video transmissions, news feeds, stock quotes, software updates, live multiparty conferencing, online video games and shared whiteboards. Thus, the need for secure transmission of multicast streams is considered as an important issue. However, potential security threats to multicast communications are similar to those encountered in unicast transmissions. These threats include the unauthorized creation, alteration ,destruction and illegitimate use of data. In case of multicast traffic, the inherent broad scope of a multicast session, the potential for attacks may be greater than that countered in unicast traffic. It is required to secure these services
while maintaining the trade-off between efficiency and performanc
Interactive voice response technology for telephony system
Speech is tbe primary means of communication between people. For reasons ranging from technology curiosity about the mechanism for mechanical realization of human speech
capabilities. To the desire to automate simple tasks inherently requiring human-machine interactions. There have been many interesting advances and developments since the
invention of the first speech recognizer at Bell Labs in the early 1950's. Besides inventing useful automated speech recognizers, scientislS and researchers' contribUlions were to produce emeienl algorilhms lhal help 10 pnxlucc beller quality aulomated speech recognition systems. and improve lhe accuracy and malching standanrd in order to make the syslems more usefu
Robust image watermarking scheme by discrete wavelet transform
This paper proposes a robust digital image
watermarking techniques by using discrete wavelet transform.
The watermark is embedded in 2-level diagonal coefficient to
achieve high performance in term of imperceptibility. The
watermark is embedded by selecting a seed that generating
pseudorandom noise sequence. Then the Watermark is
extracted back by using the same pseudorandom noise
sequence seed in the embedding. The experimental results
show that the proposed algorithm provides good level of
imperceptibility. Moreover, the watermarked image is robust
against several attacks
Classifications of multicast routing In mobile ad hoc networks
Multicasting is a useful communication scheme that facilitates group communication. Multicasting can improve the efficiency of the wireless link when sending multiple copies of messages. Multicast is a relatively unexplored research area, when it is compared with Unicast [I]. Over the past few years, several multicast routing protocols have been proposed for Ad-Hoc networks. In this chapter, we first provide a classification approach of the
multicasting techniques in mobile Ad-Hoc networks, followed by the description of theexisting approaches that support QoS in mobile Ad-Hoc networks using multicasting scheme.
We concentrate on hierarchical multicast routing protocols and position-based protocols, because of its relationship to our research. We will highlight their advantages and outline their limitation
Qualitive study on multicast routing protocols in manets
MANETs are considered for many commercial applications, including home networks,nomadic computing, community networks and emergency response networks. Also, there are
many applications of MANETs that involve point-to-multipoint or multipoint-to-multipoint communication patterns. Disaster recovery, search and rescue, military applications, videoconferencing or class room settings, public events, interactive television, temporary offices
and multi-partiy gaming are common examples of these application [1]. As a consequence, multicast routing has received significant attention over the recent day
- โฆ