The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Automated learning systems used to extract useful information from musical scripts, play a major role in optical music recognition. Optical music recognition or OMR has been widely used to extract the musical notations and knowledge from old scripts and thus enclose lot of importance in retrieving historical data. The field of pattern recognition and knowledge representation has to be symmetrically...
Configuration of security controls is either static or event driven (such as an incident or in response to recommendations from a risk assessment exercise) in most organizations. These approaches do not adequately protect the organization because threats to information are ever changing and dynamic in nature. STARTS is a decision support architecture for dynamic security management. It is the first...
In medical applications, detection and outlining of boundaries of organs and tumors are standard requirements, and hence the problem of detection of edges in images is one of important problems in computerized tomography (CT). The process reconstruction of images from projections first and then the detection of edges from the images so reconstructed is computationally expensive. Thus the detection...
An abandoned object detection system is presented and evaluated using benchmark datasets. The detection is based on a simple mathematical model and works efficiently at QVGA resolution at which most CCTV cameras operate. The pre-processing involves a dual-time background subtraction algorithm which dynamically updates two sets of background, one after a very short interval (less than half a second)...
Transportation systems can be represented by graphs with travel weights accorded to each of the edges that represent the roads to be travelled. This paper gives brief introduction of the Euler's path and the description of Chinese postman problem. The said problem is then extended to multi-objective problem by considering multiple weights for each edge. Finally, this paper presents an algorithm to...
A cost-time trade-off bulk transportation problem (BTP) with the objectives to minimize the total cost and duration of the bulk transportation without according priorities to them is considered. The entire requirement of each destination is to be met from a single source only; however a source can supply to any number of destinations subject to the availability of the commodity at it. The Extremum...
Virtualization technologies like VMware and Xen provide features to specify the minimum and maximum amount of resources that can be allocated to a virtual machine (VM) and a shares based mechanism for the hypervisor to distribute spare resources among contending VMs. However much of the existing work on VM placement and power consolidation in data centers fails to take advantage of these features...
We introduce the coupled placement problem for modern data centers spanning placement of application computation and data among available server and storage resources. While the two have traditionally been addressed independently in data centers, two modern trends make it beneficial to consider them together in a coupled manner: (a) rise in virtualization technologies, which enable applications packaged...
Active warehousing has emerged in order to meet the high user demands for fresh and up-to-date information. Online refreshment of the source updates introduces processing and disk overheads in the implementation of the warehouse transformations. This paper considers a frequently occurring operator in active warehousing which computes the join between a fast, time varying or bursty update stream S...
Decimal data processing applications have grown exponentially in recent years thereby increasing the need to have hardware support for decimal arithmetic. In this paper, an improved architecture for efficient Binary Coded Decimal (BCD) addition/subtraction is presented that performs binary addition/subtraction without any extra hardware. The architecture works for both signed and unsigned numbers...
We consider the problem of processing exact results for sliding window joins over data streams with limited memory. Existing approaches deal with memory limitations by shedding loads, and therefore cannot provide exact or even highly accurate results for sliding window joins over data streams showing time varying rate of data arrivals. We provide an exact window join (EWJ) algorithm incorporating...
Colored Petri nets (CPNs) are graphical and mathematical models. They are used for formal specification of the system to be built, for analysis of the specification either by simulation or analysis methods. CPNs have often large state spaces that make them difficult to analyze. One way to address the problem of the state space explosion is to reduce the CPN size and still preserving some of its important...
System of systems (SoS) architecting techniques rely on traditional, static tools that were designed for classical stove-piped systems. There is a need for tools that can capture the complex adaptive nature of such SoS. An architecture search methodology using genetic algorithms and a fuzzy assessor was applied to the conceptual architecture design of a generic smart grid and a set of architectures...
The proof of capacity theorem assumed that the symbols are of infinite time duration. Since the infinite time symbols are not meaningful and is not used in the existing technology, in this paper we decided to prove it over finite time interval. The result shows that the new capacity of a band limited channel explicitly depends on the sample rate. This new approach helps us to show that all shift keying...
This paper presents a technique of determining the optimum number of components in a mixture model. A count of the number of local maxima in the density of the data is first used to obtain a rough guess of the actual number of components. Mutual information criteria are then used to judge if components need to be added or removed in order to reach the optimum number. An incremental K-means algorithm...
Image deblurring and denoising are the main steps in early vision problems. A common problem in deblurring is the ringing artifacts created by trying to restore the unknown point spread function (PSF). The random noise present makes this task even harder. Variational blind deconvolution methods add a smoothness term for the PSF as well as for the unknown image. These methods can amplify the outliers...
This paper presents an optimization of the performance of a recently proposed virtual sliding target (VST) guidance scheme in terms of maximization of its launch envelope for three-dimensional (3-D) engagements. The objective is to obtain the launch envelope of the missile using the VST guidance scheme for different lateral launch angles with respect to the line of sight (LOS) and demonstrate its...
Advances in communication and electronics have enabled the development of low cost low power, multi functional sensor nodes that can be used in many different applications like environmental monitoring, military sensing, healthcare etc. TinySec is a link layer security architecture suitable for nodes where resource limitations severe. In this paper we are proposing an energy efficient security provisioning...
This paper presents multicore implementation of an adaptive correlation tracking technique to track aerial target. The principle novelty of the proposed algorithm is its adaptiveness to changes in target size, illumination and target occlusion, etc during tracking. Tracking window size is adjusted according to the target size and tracking window is displaced depending on the tracking error generated...
As storage deployments within enterprises continue to grow, there is an increasing need to simplify and automate. Existing tools for automation rely on extracting information in the form of device models and workload patterns from raw performance data collected from devices. This paper evaluates the effectiveness of applying such information extraction techniques on real-world data collected over...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.