The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Clustering is an unsupervised learning technique in that there is no explicit demarcation of data as training and test data. Clustering aims to group related records by measuring similarities among the attribute. Major phase of clustering techniques is similarity measurement and it is based on different factors and parameters. The improved Nonnegative Matrix Factorization (NMF) based TCLUST (T-Clustering)...
Mathematical objects of analysis are of two types, numbers and words. Number based calculations are essentially arithmetic operations of addition, subtraction, multiplication and division. Symbol or words based calculations are symbol manipulating algorithms. This paper presents certain elementary manipulating techniques using which one can construct algorithms.
The 21st century has already witnessed remarkable achievements in every area of science and technology. By taking full advantage of new information technologies, the scientific community has an unprecedented opportunity to close the vast `Knowledge Gap'among all people. While radio has played a major role in the welfare of rural community in the yesteryears, followed by television, it is the internet...
An anonymous on demand routing protocol (ANODR) was designed based on the previous studies as the countermeasure for preventing passive attacks. ANODR is a purely on demand routing and identity free routing scheme that sets up an anonymous route as needed in real time. The proposed protocol ensures node privacy, route anonymity and location privacy and is robust against several known attacks. This...
Hand geometry is one among the first biometrics to find practical use across an assortment of real-world security applications. A hand geometry based recognition system works by acquiring the image of a hand to determine the geometry and metrics namely the finger length, width and other attributes. Some of the existing hand geometry biometrics systems measure different parameters for efficient recognition...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.