The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Business and Research organizations are continuously generating huge amount of high dimensional data. They need to analyze this data in real-time with minimum cost. Data pre-processing techniques in combination with dimensionality reduction techniques are widely used by researchers to improve the quality of data and reduce the time, cost required to analyze the data. But standard methods are not available...
Data mining (DM) is the process of automated extraction of interesting data patterns representing knowledge, from the large data sets. Frequent itemsets are the itemsets that appear in a data set frequently. Finding such frequent itemsets plays an essential role in mining associations, correlations, and many other interesting relationships among itemsets in transactional database. In this paper an...
We propose a compositional stability analysis framework for verifying properties of systems that are interconnections of multiple subsystems. The proposed method assembles stability certificates for the interconnected system based on the certificates for the input-output properties of the subsystems. The decomposition in the analysis is achieved by utilizing dual decomposition ideas from optimization...
A good description of a class should be accurate and interpretable. Previous works describe classes either by analyzing the correlation of each attribute with the class, or by producing rules as in building a classifier. These solutions suffer from issues in accuracy and interpretability. A description naturally consists of sentences, where each sentence consists of a set of terms. Normally, a sentence...
With the growing reliance on net-centric warfare, understanding the effect of information operations (IO) on the overall mission becomes increasingly important. Traditional information assurance (IA) metrics quantify attributes of the underlying information system, such as the availability, confidentiality, and integrity of critical services and data, without providing mission-level perspective. Meanwhile,...
Given an arbitrary network G of processes with unique IDs and no designated leader, and given a k-dominating set I C G, we propose a silent self-stabilizing distributed algorithm that computes a subset D of I which is a minimal k-dominating set of G. Using D as the set of cluster-heads, a partition of G into clusters, each of radius k, follows. The algorithm is comparison-based, requires O(log n)...
In peer to peer (P2P) systems agent based load balancing is one of the most important problem. P2P systems are characterized by decentralization, scalability and dynamicity, such that they can been seen as instances of complex adaptive systems (CAS). In this paper we present ant-based load balancing algorithm, which effectively balances loads of peers distributed among P2P systems with the help of...
Firewalls remain the main perimeter security protection for corporate networks. However, network size and complexity make firewall configuration and maintenance notoriously difficult. Tools are needed to analyse firewall configurations for errors, to verify that they correctly implement security requirements and to generate configurations from higher-level requirements. In this paper we extend our...
Mining biclusters that exhibit both consistent trends and trends with similar degrees of fluctuations is vital to bioinformatics research. However, existing biclustering methods are not very efficient and effective at mining such biclusters. Most biclustering models, including those used in subspace clustering, define similarity among different objects by distances over either all or only a subset...
In this paper, we have shown that recognition of machine printed characters can be modeled around the geometry of an alphabet. This geometry is used as a basis for recognizing various characters. The present technique can be implemented for any language, provided, the alphabets of the respective language are made up of geometrical shapes, which is typically true.
Video Compression has played an important role in Multimedia data storage and transmission. Video compression techniques remove spatial as well as temporal redundancy using intra-frame and inter-frame coding respectively. A large level of compression can be achieved through inter-frame coding. In this paper, performance of four matching criterion in the temporal coding of video signal, which are Minimum...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.