Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
We developed a novel word sense disambiguation algorithm that uses the semantic relations of lexical database Poly-WordNet. The PolyWordNet is a lexical database that organizes multiple senses of a polysemy word in such a way that each sense of the polysemy word is linked with its related words by dividing these related words into verbs, nouns, adverbs and adjectives. Our algorithm does not count...
In this paper, a No-Reference Image Quality Assessment (NR-IQA) algorithm is implemented with the help of Extreme Learning Machine (ELM) using spatial and spectral features. ELMs are single hidden layer feed-forward neural networks that provides optimum solution in a single iteration, hence ELMs can be used for performing classification and regression at high speeds. Proposed NR-IQA algorithm can...
SEPIC-WEINBERG converter is introduced in this paper. This converter is ideal for photovoltaic applications. The suggested converter has efficiency higher than that of regular SEPIC and Weinberg converter. But the SEPIC-WEINBERG converter has similar levels of switch voltage stress as that of the SEPIC. The switching losses are low in the suggested converter. It is of small size and has low current...
Literature shows that knowledge about contextual factors associated with student time to degree and CGPA could play an important role in enabling HEIs to make more accurate and informed decisions that enhance student learning. It is also seen that such knowledge could be discovered using data mining process hidden in past data of students and used for prediction of student performance as part of the...
Digital signal processors (DSPS) fundamentally contains multipliers as its core element. The speed of the multipliers affects the speed of the DSPs. The execution of most DSPs is dependent on its multipliers, and hence need for high-speed multipliers arises. In this digitalization era, it becomes necessary to increase the speed of the digital circuits while reducing on-chip area and memory consumption...
Recommender systems which are based on collaborative filtering are vulnerable to “shilling attacks” due to their open nature. Shillers inject a few unscrupulous “shilling profiles” into the database of ratings for altering the system's recommendation, due to which some inappropriate items are recommended by the system. In this paper, we simulated shilling attacks namely random, average, bandwagon...
Optimal Speech feature extraction which tries to acquire a parametric illustration of an input speech signal plays a vital role in the overall performance of an Automatic Speech Recognition (ASR) system. A good feature extraction technique along with feature selection algorithm should capture the important features of the signal and also should reject some irrelevant features. Feature selection is...
Computational fluid dynamics (CFD) is a simulation tool, that employs applied mathematics and powerful computer to model fluid flow situations to anticipate the mass, momentum and heat transfer and most favorable design in industrial processes. Turbine is a rotary engine actuated by the impulse or reaction of a current of fluid subject to pressure which is made with a series of curved vanes on a central...
About 3.2 million people suffer from sickle-cell disease. Aim of this paper is to detect sickle cell anaemia and thalassaemia. The proposed method involves acquisition of the thin blood smear microscopic images, pre-processing by applying median filter, segmentation of overlapping erythrocytes using marker-controlled watershed segmentation, applying morphological operations to enhance the image, extraction...
In this paper, we analyze the novel MRI image super-resolution reconstruction algorithm based on the image representation and sparse dictionary learning. At present, the high resolution image mainly by improving the precision of hardware devices such as optical devices and sensors to obtain while high precision hardware is expensive, however, people often want to in low economic cost under the premise...
This paper gives the description of the new approach towards the security of ATM (Automatic Teller Machine) systems. The objective of the paper is to know the Enhanced smart ATM security system which is developed using the Embedded system and advanced technologies. In our proposed system RFID card is used as ATM card, IR sensor in order to sense the presence of the card holders and to turn on Fan...
In this paper, using ECC encryption-decryption methodology and the MD5 hash generation algorithm. To develop a more efficient and more secure cryptographic algorithms. It is suitable for all devices due to their confines in memory capacity, computing power, cryptographic support and key sizes. It is lighter and secure encryption system for the secure file transferring system. This paper presents the...
In this paper, we build a cellular automaton model for the stock market to illustrate the complexity in the stock market by introducing variables for reflecting stability of the market. We introduced the concepts of rumor propagation to represent the market dynamics. Using this model, behavior of the market participants and their effect on the market dynamics are analyzed. Various constraints are...
The interactions between Active Queue Management (AQM) algorithms and TCP have been extensively investigated in the last few years. However, majority of the studies are conducted without considering the consequences of different attacks on TCP flows. This research work aims to investigate the performance of TCP flows under Low-Rate Denial-of-Service (LDoS) attacks. In particular, we have performed...
The objective of this study is to unveil the effect of transverse partition height and partition spacing on convective heat transfer inside a ventilated rectangular enclosure. Three numbers of heat sources have been flush mounted on the bottom of the enclosure. The equations of mass, momentum and energy conservation are solved using a control-volume-based technique utilized by Ansys Fluent. A pressure...
With the huge data flow in the E-library, nowadays performance of the e-libraries can't be judged with the correctness of the search results shown to the Learner for a given query but also with the level of acceptance of the Learner. In this paper, we envisage a Personalized E-library, which will not only quench the knowledge thirst of the learner but will also consider his personal choice, competency...
As the attackers nowadays are getting craftier it is deemed important to have a security system which is easy to maintain and economically affordable and gives suitable defense against attacks both known and novel. In this paper, the concept of genetic programming is applied to recreate open network conditions, using records obtained from KDD Cup'99 dataset. Then the newly created records (network...
Big data is a term for massive data sets having large, more varied and complex structure with the difficulties of storing, analyzing and visualizing for further processes or results. Recommendation system provides the facility to understand a person's taste and find new, desirable content for them automatically based on the pattern between their likes and rating of different items. Although people's...
This paper presents an integrated approach to resource utilization and security concern for wireless communication. In wireless communication, during the exchange of data, allocated spectrum and its utilization over a wireless channel plays an important role in providing efficient communication service in such network. In the need towards optimal resource utilization in wireless communication, a spectrum...
All business firms have a huge number of sensitive data that required specific security. Data related to personal information, account related information, debit card details, credit card details, health data in electronic form etc. Firms and business houses generally prefer to store these data on cloud environment as cloud environment delivers huge paybacks like reduced cost and simplicity to access...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.