The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we consider a Device-to-Device (D2D) cellular network in which idle users can work as relays between cell users and the base station to improve their data rate. The relaying induces a cost for the User Equipment Relays (UER), that should be compensated with a payment from the mobile operator so that UERs accept to offer the service. The problem hence arises for the operator to match...
Mobile symptom reporting apps can conveniently gather health-related information at low cost from day to day, fundamentally altering the relationship between patients, health data, and care providers. However, current mobile systems face a difficult trade-off between the quality of the information they collect and the burden placed on patients. In this paper, we propose an algorithm for adaptive system...
The increasing number of training algorithms along with their convincing results will make this question that which algorithm will be more efficient. This study aims to perform some widespread tests on some well-known training algorithms (Levenberg - Marquardt, Resilient back propagation and Scaled conjugate gradient) to evaluate their performance for scene illumination classification. The results...
Low-power wireless networks play an important role in the Internet of Things. Typically, these networks consist of a very large number of lossy and low-capacity devices, challenging the current state of the art in protocol design. In this context the Trickle algorithm plays an important role, serving as the basic mechanism for message dissemination in notable protocols such as RPL and MPL. While Trickle's...
Wireless sensor networks require communication protocols for efficiently propagating and maintaining data in a distributed fashion. Ideally, a communication protocol is able to disseminate data quickly to all nodes in the network using as few transmissions as possible, while distributing transmission load fairly. In the context of wireless sensor networks the Trickle algorithm is a popular protocol...
Serial execution of K-means algorithm on large dataset takes more execution time and does not give accurate results. Parallel processing is one of the ways to improve the performance of K-Means algorithm. But the execution time and accuracy is largely dependent on selection of initial cluster centers. In this paper, parallel processing of K-Means is proposed using an initialization method to originate...
Reliable extraction/segmentation of text lines, words and characters is one of the very important steps for development of automated systems for understanding the text in low resolution display board images. In this paper, a new approach for segmentation of text lines, words and characters from Kannada text in low resolution display board images is presented. The proposed method uses projection profile...
In this study, ABC (Artificial Bee Colony) and BGA (Binary Genetic Algorithm) algorithms are used to synthesis of the four-bar mechanisms for path generating. The main goal is to extract the optimized dimension of mechanism links to transmit coupler point in the desired path with minimum error. In addition, the object mechanism has dimensional limitations such as the crank link should rotate 360 degree...
The elevator technologies are developed to serve the requested passenger's floors with high consideration of passengers' satisfaction and elevator optimal performance. Responding to the issue, this paper focuses on development of an elevator group controller based on fuzzy algorithm. By introducing a fuzzy controller in an elevator system, this system is developed to manage the required passenger...
the Voronoi Diagram (VD) is defined as a rediscovered mathematical concept from the 19th century. It is one of the most fundamental and useful constructions, defined by irregular lattices. The objectives are: i) to study three construction algorithms of VD, which are the divide-and-conquer algorithm, the half-plane intersection algorithm, and the incremental algorithm; ii) to apply the three VD algorithms...
The demand for adequate security to electronic data system grows high over the decades. As the security issue also impact on the performance analysis of the wireless network, data encryption is necessary for sending and receiving information secretly over the network. Since 1970s, data encryption standard (DES) has received a substantial amount of attention from academic cryptanalysts. However, in...
With the increasing complexity of the Grid based application workflows, the workflow design process is also getting more and more complex. Many workflow design tools provide mechanism to ease the workflow design process and to make the life easier for a workflow designer. In this paper, we present a provenance based workflow design suggestion system for quick and easy creation of the error-free workflows...
Deadlock is one of the most important problems in distributed and centralized systems. Many algorithms are introduced for the detection of deadlock; however some of them suffer from increasing the number of processes, while the others take long processing time. This paper studies the impact of deadlock detection on the overall performance of deadlock handling. Network performance largely relies on...
This paper presents an efficient SVD based image Steganography approach. This approach aims at increasing the fidelity of the images after data embedding. Rather than embedding data in the singular values of the images, the image Left singular vectors are used for this purpose. The objective of this approach is to reduce the embedding errors as well as to maintain the image fidelity. Several solutions...
Due to the growing application of peer-to-peer computing, the distributed applications are continuously spreading over extensive number of nodes. To cope with this large number of participants, various cluster based hierarchical solutions have been proposed. Cluster based algorithms are scalable by nature. Several of them are quorum based solutions. All of these solutions exploit the idea of coordinator/leader...
In this paper an attempt has been made to evaluate the detection ability of mono-alphabetic sequences for the application to high resolution radar in presence of high dense additive noise environment. The performance of these sequences is evaluated in terms of their noise robustness, multiple target discrimination through coincidence detection and range resolution ability. Asymptotic figure of merit...
DNA self-assembly is an emerging technique in DNA nanotechnology that holds promise for high impact applications such as in the synthesis of DNA-based nanodevices in medicine, robotics and electronics. Recent advancements in technologies and ideas have spurred new growth in the area. The most significant challenge faced by designers in the field is the lack of algorithmic and software options to aid...
Segmenting homogeneous regions or objects in an image are very much demanding but challenging. Pattern based object segmentation using split and merge (PSM) was proposed to overcome the problems of basic split and merge (SM) algorithm, which is unable to segment properly all types of objects in an image due to huge variations among the objects in size, shape, intensity and orientation. Though the...
Recently association rule mining algorithms are using to solve data mining problem in a popular manner. Rule based mining can be performed through either supervised learning or unsupervised learning techniques. Among the wide range of available approaches, it is always challenging to select the optimum algorithm for rule based mining task. The aim of this research is to compare the performance between...
This paper introduces a revisited hybrid algorithm for function approximation. In this paper, a simple and fast learning algorithm is proposed, which automates structure and parameter identification simultaneously based on input-target samples. First, without need of clustering, the initial structure of the network with the specified number of rules is established, and then a training process based...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.