The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Web spam is a big problem for search engine users in World Wide Web. They use deceptive techniques to achieve high rankings. Although many researchers have presented the different approach for classification and web spam detection still it is an open issue in computer science. Analyzing and evaluating these websites can be an effective step for discovering and categorizing the features of these websites...
Point cloud matching is one of the key technologies of optical three-dimensional contour measurement. Most of the point cloud matching without landmark used the iterative closest point algorithm. In order to improve the performance of the iterative closest point algorithm, the two-step iterative closest point algorithm was proposed. The improved algorithm is divided into a rough matching step and...
This paper proposes a cyclic steganographic scheme based on cyclic codes for embedding secret message. This scheme is capable of achieving low complexity and fast embedding time. These are two attractive reasons for this method: first, embedding and secret message extraction can be implemented easily by employing shift registers with feedback connections, and second, because they are rich in coding...
This study proposes a novel coding method, called geometry permutation decoding (GPD). The GPD algorithm provides a two dimension geometry construction and decodes information sequence based on this construction. Majority logic decoding (MLD) algorithm can be used for some specially coding scheme, especially finite geometry codes. MLD algorithms are simple and fast owing to the finite geometry construction,...
Due to their rapid maneuverability and improved personnel safety, unmanned aerial vehicles (UAVs) with vision-based systems have great potential for monitoring and detecting forest fires. In this paper, a novel forest fire detection method utilizing both color and motion features is described for UAV-based forest firefighting applications. First, a color decision rule is designed to extract fire-colored...
This paper proposes a quantum search based algorithm to improve the dynamic maximum network flow problem. First, we convert the time-dependent process into time-independent process. Second, we use the draining algorithm to find out the maximum flow and compare with classical algorithms. Third, the draining algorithm is speed up by utilizing quantum search. Finally, we also provide the analysis of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.