The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
One of the important issue in Online Social Networks (OSNs) in recent years is communities detection in such networks. Social Networks depict the interactions between individuals or entities and are represented by a graph of interconnected nodes. The vast amount of data leads to the need of analyzing such social network. Community detection problem can be represented as an optimization problem as...
The investigation of the community structure has recently attracted considerable attention in social networks analysis field. Social Networks defined by the interactions between nodes, they are represented by a graph. The huge data of online social networks need to analyze and discover the hidden relations between nodes. In this research the objective represented the community detection as optimization...
Social networks depict the interactions between individuals or entities and are represented by a graph of interconnected nodes. The study of such graphs leads to understanding of this data and concluding different communities. Among the different clustering algorithms, DBSCAN is an effective unsupervised clustering algorithm which is implemented in this work to emphasize community detection in social...
The objective of this paper is to evaluate a new combined approach intended for reliable CT liver image segmentation, to separate the liver from other organs, and segment the liver into a set of regions of interest (ROIs). The approach combines the level set with watershed approach used as post segmentation step to produce a reliable segmentation result. Features of first order statistics and grey-level...
This paper deals with two dimensional magnetic resonance imaging (MRI) sequence of brain slices which include many objects to identify and estimate the volume of the brain tumors. More than twenty five features based on shape, color and texture was extracted to obtain feature vector for each object to characterize the tumor and identify it. Experimental results show that the accuracy of the estimation...
The scope of this research is to propose a method for determining pairs of corresponding points between medical images, the method is based on the implementation of Particle Swarm Optimization (PSO) used as a function optimizer and Mutual Information used as a similarity measure. Firstly, Landmarks (LMs) were chosen manually specific to Braces Pty Ltd cephalometric analysis and used Thin Plate Spline...
The complexity of business and different variations of service providers inspire the sense of matching of the consumers with the most appropriate products and services. This specific attribute initiates the study of recommender systems, which analysis the patterns of user's interest in items or products and services to suggest personalized recommendations for all these verticals, and also to suit...
The use of computational intelligence systems such as rough sets, neural networks, fuzzy set, genetic algorithms, etc., for predictions and classification has been widely established. This paper presents a generic classification model based on a rough set approach and decision rules. To increase the efficiency of the classification process, boolean reasoning discretization algorithm is used to discretize...
Internet as a tool of transferring data helps more industries to be more effective in their specialization. E-commerce as the next step after internet used for selling and buying. Due to the vast amount of data in this process which makes it hard and time consuming. Therefore recommender system has been introduced. It attempts to predict items or products that a user may be interested in. However,...
Privacy and Security has become an increasingly serious ýproblem for any biometric systems. Template protection, ýwhich mainly prevents from data loss and hacking the stored ýtemplates, is one of the most important issues when considering ýprivacy and security. Cancelable biometrics approach Scheme ýhas been proposed to address this problem. On the other hand ýthe symmetric hash functions might be...
In the present investigation, positions of head landmarks in panoramic x-ray images in relation to cephalometric landmarks were studied. Special landmarks in right and left sides of mandible were manual ly identified and calibrated with reference readings. The measured landmarks are compared for both sides with different panoramic duration times. Results between left and right were compared using...
Discovering the root key bits in the cryptanalysis of 16-rounded Data Encryption Standard (DES-160 is considered to be a hard problem. In this paper we present an approach for cryptanalysis of DES-16 based on Particle Swarm Optimization (PSO) using Known-plaintext attack and some equations that deduced from the relationship between sub-key differences and root key information. In Known-plaintext attack...
This paper presents a secure routing protocol for wireless sensor networks based on the recognized directed diffusion algorithm. The proposed secure routing protocol uses the μTESLA (micro Timed, Efficient, Streaming, Loss-tolerant Authentication) algorithm in order to authenticate acknowledgement messages sent from the sink to the source nodes for confirming delivery of data-event messages. A simulation...
Deformation of normal structures in medical images has usually been considered as undesired and even a challenging issue to be tackled in medical image segmentation and registration tasks. With the objective of improving brain tumor segmentation accuracy in human brain magnetic resonance (MR) images, this paper proposes an approach to extract useful information from the correlation between lateral...
In the past few years, various fragile watermarking systems have been proposed for image authentication and tamper detection. In this paper, we propose a rough k-means (RKM) fragile watermarking approach with a block-wise dependency mechanism which can detect any alterations made to the protected image. Initially, the input image is divided into blocks with equal size in order to improve image tamper...
In this paper, we propose an associative watermarking scheme which is conducted by the concept of Association Mining Rules (AMRs) and the ideas of Vector Quantization (VQ) and Soble operator. Performing associative watermarking rules to the images will reduct the amount of the embedded data, and using VQ indexing scheme can easily recall the embedded watermark for the purpose of image authentication,...
In this paper, we present an approach for the cryptanalysis of four-rounded Data Encryption Standard (DES) based on particle swarm optimization (PSO). It is actually a known ciphertext only attack that aims at deducing optimum keys depending upon their fitness values. The approach finds the best keys through a fitness function called N-gram statistics. The results indicate that the proposed approach...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.