The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, a generic model for smart house remote control systems is proposed, implemented and tested using the software and hardware simulators presented with it. Smart house systems currently available lack a generic model for neither supporting different remote control modules nor standard testing beds. The comprehensive model presented in this paper supports both web and mobile remote access...
Collaborative filtering has been considerably successful in improving recommender systems both in the literature and commercial applications. Most of the algorithms designed up to now consider users' ratings equally and do not pay attention to the fact that users' interests or requirements might change over the time. In this paper a collaborative filtering based recommender system is designed which...
In recent years, Business Intelligence systems as one of the main applications in Information Technology has developed rapidly and using its tools for being profitable and ensuring organizations' survival has become an inevitable necessity. Business Intelligence is a set of abilities, technologies, tools and strategies that help managers have a better perception of the organizations' conditions and,...
One of the most important and useful things that humanoid soccer robots need is the ability of decision making and choosing the best ability to reach a goal in different situations. This article presents a method for the best performance (action), faster ball possession and better ball control using fuzzy rules and rule-based expert systems. Choosing the best performance based on the field information...
In this paper, a steganographic method is presented for hiding data in images. This method uses the modified least significant bits (MLSB) and modulus function with pixel value differencing (MF&PVD) techniques. Using the proposed method the capacity of the hidden secret data and stego image quality are improved. First, a different value from two consecutive pixels using of the PVD method is obtained...
Social networks are valuable resources for analyzing users' natural behavior. User profile information, social links and interchanging opinions among users in these networks can be used by social analyzers to discover mental and behavioral patterns of users in social networks. In this paper, news agencies are used as the social media to detect effective factors of diffusing contents in public. We...
With more and more textual information making its way on-line, the importance of web page language identification has become more apparent. Up to now, different methods of language identification for text have been proposed and different tools are prepared according to these methods. But no comparison study on the performance of these tools on web pages has been reported yet. Therefor we decided to...
It is evident that information resources on the World Wide Web (WWW) are growing rapidly with unpredictable rate. Under these circumstances, a major challenge in search engines is the ranking operation. Ranking is the process of ordering the returned documents in decreasing order of relevance, that is, so that the “best” answers are on the top. Over the past decade, several studies in field of relevance...
There are different conditions for routing algorithms in wireless sensor networks. In this article, an optimized routing algorithm is provided with two objectives; reliability and energy-balancing in wireless sensor networks. Through creating optimal routes, beside maintening energy balance in network, the algorithm proposed here ensures reliable information and data transmition to base station. In...
Social networks can play a crucial role in a range of diffusion of information and knowledge, from the adoption of political opinions and technologies, to educational and learning usages. Thus knowledge sharing is one of the main purposes of people for using these networks. The main problem regarding to using social networks as a knowledge source is lacking of a criterion for determine validity of...
Social networks represent relationships between people. Communities are groups of people with some common interests or features. In this context, overlapping means a community member could be member of some other communities at the same time. In this paper, we introduce a new framework to enhance the performance of overlapping community detection techniques. In this method, the target network is divided...
Personalization systems are presented to users to improve suggestion when users are surfing on the net. In order to create accurate model from user webpage contents can be used. Recently some researches were done for adding semantic to user behaviors. However, all users don't show all their interest, but the system must scrutinize user behavior and suggest best prediction for his interest. The best...
As the global competition is growing increasingly, it is essential for firms to remain competitive and respond to the rapidly changing. In this case, firms need to establish an effective supply chain management in which supplier selection is one of the most critical activities required to be performed. Supplier selection problem is considered as a multiple-criteria decision making (MCDM) problem including...
Adaptive multi-rate wideband (AMR-WB) speech coding algorithm is standardized by 3rd Generation Partnership Project (3GPP) and third generation/wideband code division multiple access (WCDMA 3G) system and has several applications in mobile communication systems, audio and video teleconferencing, and digital radio broadcasting. To reduce the bit rate in AMR-WB, vector quantization (VQ) technique is...
This paper proposed a model for credit card fraud detection system, which is aimed to improve the current risk management by adding an Artificial Immune System's algorithm to fraud detection system. For achieving to this goal, we parallelize the negative selection algorithm on the cloud platform such as apache hadoop and mapreduce. The algorithm execute with three detectors set. The experiments show...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.