The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Several metaheuristic algorithms based on nature-inspired phenomena have been developed to optimize non linear functions. Evolutionary systems, swarming and human immune systems have helped in development of many optimizing algorithms like genetic algorithms, particle swarm optimization and CLONALG. A novel algorithm has been proposed based on the popular belief of reincarnation where human is considered...
PLC's (programmable logic controllers) are the control hubs for a wide variety of automated systems and processes. Advanced control features, network connectivity and device interoperability are all capabilities increasingly demanded in a modern industrial application. To get in-depth knowledge of any system requires thorough studies of the system up to the designing level; this paper provides better...
In this paper the problem of reducing congestion in WDM networks based on unidirectional de Bruijn graphs has been addressed in the presence of node faults. We propose a polynomial time routing algorithm for reducing congestion and analyze its time complexity. Congestion is defined as the maximum of the number of lightpaths propagating through a link over all links in the network. Congestion optimization...
Document clustering is an important tool for applications such as search engines and document browsers. It enables the user to have a good overall view of the information contained in the documents. The well-known methods of document clustering, however, do not really address the special problems of text document clustering: very high dimensionality of the document, very large size of the datasets...
We know that large database contain certain information that must be protected against unauthorized access. One known fact which is very important in data mining is discovering the association rules from database of transactions where each transaction consists of set of items. In this paper we discuss confidentiality issues of a broad category of association rules. Two important terms support and...
The authors present a solution to the following problems related to architectural synthesis. (1) Given an input specification and a performance constraint, determine a lower bound number of resources (active and interconnect) required to execute the data flow graph while satisfying the performance constraint. (2) Determine a lower bound performance for executing an input specification for a given...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.