189 research outputs found

    Automatic identity recognition systems : a review

    Get PDF
    Rapidly changed computer technology and fast growth of communication ways, makes everyday work easy and managed. Technology takes place everywhere, in business, education, market, security... etc. However, communication between human and these technologies become the main concern of many research areas, especially for developing automatic identity recognition systems. However, biometric technologies are among the most important technologies used in this area. Biometric technology refers to the automatic identity recognition using physical or behavioral traits associated with him/her. Using biometrics, it is possible to establish physiological-based systems that depend on physiological characteristics such as fingerprint, face recognition, DNA... etc, or behavioral-based systems that depend on behavioral characteristics such as gait, voice ...etc, or even combining both of them in one system. Therefore, biometrics technologies can be excellent candidates for developing intelligent systems such as speaker identification, facial recognition, signature verification...etc. In addition, biometric technologies are flexible enough to be combined with other tools to produce more secure and easier to use verification system

    Issues in location-based multicast routing in manets

    Get PDF
    Mobile Ad Hoc Networks (MANETs) are an autonomous system of a set of mobile nodes connected by shared wireless links, forming a temporary network without relying on any infrastructure. MANETs characteristics include self-organizing, self-configuring, multihop communication, continuous mobility and strict resource limitation. These characteristics coupled with the characteristics of the wireless communication medium make routing protocols one of the major issues to consider in MANET

    Review of multicast QoS routing protocols for mobile ad hoc networks

    Get PDF
    A Mobile Ad hoc NETwork (MANET) is consisting of a collection of wireless mobile nodes, which form a temporary network without relying on any existing infrastructure or centralized administration. Since the bandwidth of MANETs is limited and shared between the participating nodes in the network, it is important to efficiently utilize the network bandwidth. Multicasting can minimize the link bandwidth consumption and reduce the communication cost by sending the same data to multiple participants. Multicast service is critical for applications that need collaboration of team of users. Multicasting in MANETs becomes a hot research area due to the increasing popularity of group communication applications such as video conferencing and interactive television. Recently, multimedia and group-oriented computing gains more popularity for users of ad hoc networks. So, effective Quality of Service (QoS) multicasting protocol plays significant role in MANETs. In this paper, we are presenting an overview of set of the most recent QoS multicast routing protocols that have been proposed in order to provide the researchers with a clear view of what has been done in this field

    Arabic automatic continuous speech recognition systems

    Get PDF
    MSA is the current formal linguistic standard of Arabic language, which is widely taught in schools and universities, and often used in the office and the media. MSA is also considered as the only acceptable form of Arabic language for all native speakers [I]. As recently, the research community has witnessed an improvement in the performance of ASR systems, there is an increasingly widespread use of this technology for several languages of the world. Similarly, research interests have grown significantly in the past few years for Arabic ASR research. It is noticed that Arabic ASR research is not only conducted and investigated by researchers in the Arab world, but also by many others located in different parts of the \vorld especially the western countries

    Multicast security : issues and solutions

    Get PDF
    The rapid growth of multicast communications has lead to wide use of the Internet for both individual and commercial distributed applications. Multicast communication is defined as an efficient way to distribute rich media to multiple users or participants simultaneously over the Internet. This is efficient in many applications including Internet video transmissions, news feeds, stock quotes, software updates, live multiparty conferencing, online video games and shared whiteboards. Thus, the need for secure transmission of multicast streams is considered as an important issue. However, potential security threats to multicast communications are similar to those encountered in unicast transmissions. These threats include the unauthorized creation, alteration ,destruction and illegitimate use of data. In case of multicast traffic, the inherent broad scope of a multicast session, the potential for attacks may be greater than that countered in unicast traffic. It is required to secure these services while maintaining the trade-off between efficiency and performanc

    Interactive voice response technology for telephony system

    Get PDF
    Speech is tbe primary means of communication between people. For reasons ranging from technology curiosity about the mechanism for mechanical realization of human speech capabilities. To the desire to automate simple tasks inherently requiring human-machine interactions. There have been many interesting advances and developments since the invention of the first speech recognizer at Bell Labs in the early 1950's. Besides inventing useful automated speech recognizers, scientislS and researchers' contribUlions were to produce emeienl algorilhms lhal help 10 pnxlucc beller quality aulomated speech recognition systems. and improve lhe accuracy and malching standanrd in order to make the syslems more usefu

    Robust image watermarking scheme by discrete wavelet transform

    Get PDF
    This paper proposes a robust digital image watermarking techniques by using discrete wavelet transform. The watermark is embedded in 2-level diagonal coefficient to achieve high performance in term of imperceptibility. The watermark is embedded by selecting a seed that generating pseudorandom noise sequence. Then the Watermark is extracted back by using the same pseudorandom noise sequence seed in the embedding. The experimental results show that the proposed algorithm provides good level of imperceptibility. Moreover, the watermarked image is robust against several attacks

    Classifications of multicast routing In mobile ad hoc networks

    Get PDF
    Multicasting is a useful communication scheme that facilitates group communication. Multicasting can improve the efficiency of the wireless link when sending multiple copies of messages. Multicast is a relatively unexplored research area, when it is compared with Unicast [I]. Over the past few years, several multicast routing protocols have been proposed for Ad-Hoc networks. In this chapter, we first provide a classification approach of the multicasting techniques in mobile Ad-Hoc networks, followed by the description of theexisting approaches that support QoS in mobile Ad-Hoc networks using multicasting scheme. We concentrate on hierarchical multicast routing protocols and position-based protocols, because of its relationship to our research. We will highlight their advantages and outline their limitation

    Qualitive study on multicast routing protocols in manets

    Get PDF
    MANETs are considered for many commercial applications, including home networks,nomadic computing, community networks and emergency response networks. Also, there are many applications of MANETs that involve point-to-multipoint or multipoint-to-multipoint communication patterns. Disaster recovery, search and rescue, military applications, videoconferencing or class room settings, public events, interactive television, temporary offices and multi-partiy gaming are common examples of these application [1]. As a consequence, multicast routing has received significant attention over the recent day
    • โ€ฆ
    corecore