Volume 1, Issue 2
مرور بر اساس
ارسال های اخیر
-
A Block-Grouping Method for Image Denoising by Block Matching and 3-D Transform Filtering
(University of Sistan and Baluchestan, 2012-12-01)Image denoising by block matching and threedimensionaltransform filtering (BM3D) is a two steps state-ofthe-art algorithm that uses the redundancy of similar blocks innoisy image for removing noise. Similar ...
-
A Hidden Node Aware Network Allocation Vector Management System for Multi-hop Wireless Ad hoc Networks
(University of Sistan and Baluchestan, 2012-12-01)Many performance evaluations for IEEE 802.11distributed coordination function (DCF) have been previouslyreported in the literature. Some of them have clearly indicatedthat 802.11 MAC protocol has poor ...
-
A Recursive Approximation Approach of non-iid Lognormal Random Variables Summation in Cellular Systems
(University of Sistan and Baluchestan, 2012-12-01)Co-channel interference is a major factor in limiting the capacity and link quality in cellular communications. As the co-channel interference is modeled by lognormal distribution, sum of the co-channel interferences of ...
-
Add-Drop and Channel-Drop Optical Filters Based on Photonic Crystal Ring Resonators
(University of Sistan and Baluchestan, 2012-12-01)Here, we propose an add-drop and a channel drop filter based on two-dimensional photonic crystal all circular ring resonators. These structures are made of a square lattice of silicon rods with the refractive index n1=3.464 ...
-
A Novel Small E–Ring Shaped Monopole Antenna with Dual Band-Notch Function for UWB Wireless Communications
(University of Sistan and Baluchestan, 2012-12-01)This paper presents an E-ring shaped printed monopole antenna for UWB applications with dual notched bands performance. In order to generate single frequency band notch function, we applied a U-ring shaped monopole antenna, ...
-
Watermarking Scheme Based on Multiple Chaotic Maps
(University of Sistan and Baluchestan, 2012-12-01)a watermarking scheme for Grayscale image isproposed based on a family of the chaotic maps and discretecosine transform. Jacobian Elliptic mapis employed to encrypt ofwatermarked logo. Piecewise nonlinear ...
-
Users as the Biggest Threats to Security of Health Information Systems
(University of Sistan and Baluchestan, 2012-12-01)There are a lot of researches in the world about attacks on information systems (IS). Although there have been many attempts to classify threats of IS's especially in Health Information Systems (HIS), it is still necessary ...



