This paper introduces a complete system for recognition of Farsi Nastaaligh handwritten words using Neural Networks. In preprocessing stage, after connected component specification, new algorithms are applied to find and eliminate ascenders, descenders, dots, and other secondary strokes from the original image. Then by using a segmentation algorithm based on analyzing upper and under contours, […]
STATCOM is one of the most popular devices that been used for voltage stability. There has been no report on the effect of SATCOM control mode on voltage stability. It is very important to understand which parameters and what value of these parameters affect the voltage stability. The results of previous studies have shown that […]
Recently the problem of modulation classification has received much attention in military and commercial applications. Various approaches introduced to solve this problem. Most of these approaches has been based on some special characteristics of received signal which are resolvable for various types of modulations. In this paper modulated signal symbols constellation utilizing TTSAS clustering algorithm and matching […]
The paper investigates the effect of antenna tilting on UMTS network performance. At first radio network planning of UMTS networks based on WCDMA technology is described. Next the dimensioning and detailed planning phases are described. Finally, the effect of antenna tilting on network coverage, capacity and interference is analyzed and based on the results, an […]
Applying intelligent agents in engineering has become one of novel subjects in implementation of distributed systems. Autonomy, Social Ability, Reactivity and Proactiveness are definitive properties of intelligent agents to improve e-government functionalities. The purpose of this paper is to present an agent-based model for e-government. It categorizes the properties of intelligent agents and proposes a framework for improvement […]
In many applications of wireless sensor networks, certain quality of end-to-end parameters is needed. Due to this requirement, supporting quality of service (QoS) in this kind of networks is of great importance. In recent years, multi-path routing technique is proposed as an effective approach to provide QoS. Utilizing multiple paths between senders and receivers, multi-path […]
IEEE 802.11i Sandard have good privacy, integrity and authentication and good management key. However this standard dos not really mention about accessability and protection of management and control frame, so it is vulnerable again DoS attacks and allow a hacker to play different attacks. One type of this threat is due to EAP fames which make heavy traffic on […]
Endpoint detection, which means distinguishing speech and non-speech segments, is considered as one of the key preprocessing operations in automatic speech recognition (ASR) systems. Usually the energy of speech signal and Zero Crossing Rate (ZCR), are used to locate the beginning and ending for an utterance. Both of these methods have been shown to be […]