The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Online social networks are highly dynamic and sparse. One of the main problems in analyzing these networks is the problem of predicting the existence of links between users on these networks: Link prediction problem. Many researches have been conducted to predict links using variety of techniques like the decision tree and the logistic regression approaches. In this work, we will illustrate the use...
With the increase number of wireless standards and the number of wireless enabled devices ranging from smart cell phones to notebooks, the new concept of Internet of Things where every tangible “Thing” will have an IP address and wireless connectivity is around the corner. In addition, there is a great interest of Cyber-Physical System interconnecting city's infrastructure together though wireless...
The purpose of this paper is to provide an overall security perspective of Cloud computing with the aim to highlight the problem from the cloud stakeholders' perspective, and the cloud service delivery models perspective. The paper aims also to introduce the mechanisms used to secure cloud computing applications as well as to compare some providers of cloud computing field with each other in general...
The excess in the use of a technology always opens new challenges for its implementers due to the security issues they start facing, and thus the role of the researchers begins. The increase in the trend of Wireless Sensor Networks (WSNs) usage has given birth to many security threats. Many research firms, universities have pitched in to this area of research and as a result many Wireless Network...
Mastery of the soft skills is an important part of an engineer's training, and engineering schools have been trying to include the instruction of both written and oral communication skills in the curriculum, either as stand-alone subjects or as modules integrated into one or more engineering courses. This paper describes a new stand-alone seminar subject on public speaking that piloted at the Massachusetts...
A thermal imaging based noncontact respiration rate monitoring approach is developed. The approach identified and tracked the face region in the image. The two corners where the eyes and nose meet were detected by selecting the two highest temperature regions within the face. From these sites, the nose and the nostril were identified. A respiration region of interest (ROI) was specified under the...
Large enterprises essentially require a reliable infrastructure that can store, retrieve and analyze the massive volumes of high dimensional data. Knowledge Discovery in Databases (KDD) through Data Mining (DM) presents a powerful tool for storing and retrieving data in a manner that optimizes performance as well as resources. This work presents the application of Time Series Data Mining Algorithm...
With the advent of multicore general public systems, a new perspective of parallel processing is available to application developers. Adapting old sequential applications to performance of parallel systems proves imperative. The Task Parallel Java compiler (ParaTask) is a solution for the development of object-oriented parallel applications, based on the concept of different types of tasks. It is...
Clustering is a well studied problem in data analysis and data mining. It has many areas of applications and it is used as a preprocessing step before other data mining tasks such as classification and association analysis. Discovering clusters of arbitrary shapes is a challenging task. Even though density based clustering algorithms manage to detect clusters with different shapes and sizes in large...
The purpose of this paper is to discuss a planar antenna miniaturization while enforcing adaptation. The techniques used for the process are the inserting notches method to adapt the antenna and structuring form method to minimize its size.
In this paper, we focus on a case concentrates on the use of email materials as supplements in the traditional classroom and in open and distance training and education. We describe how the interactive classification system based on thesaurus can simplify this task. This system provides the functions to index, classify and retrieve a collection of email messages based on user profiles. By automatically...
Modern computation systems are inherently heterogeneous and many of them are characterized by a hierarchical organization. In this paper, we present a novel algorithm for Directed Acyclic Graphs (DAGs) scheduling on heterogeneous platforms composed of a set of processors grouped in a cluster of clusters (multi-clusters environments). Our main objective here is to develop an algorithm taking into account...
In a communication network with a source node, a multicast tree is defined as a tree rooted at the source node and all its leaves being recipients of the multicast originating at the source. Tree or bandwidth cost is normally measured by its utilization of tree links along with Quality of Service (QoS) measures such as delay constraint, end-to-end delay etc. However, if nodes are allowed to join or...
In recent years, with continuous tense situation in the South China Sea, the South China Sea issue presents the international and multilateral trend. The South China Sea issue intensified not only for China - ASEAN economic development impact, but also a direct threat to the security of the South China Sea, as the territorial or strategic resources security, and the South China Sea International Channel...
IP Traceback is a fundamental mechanism in defending against cyber-attacks in particular the denial of service (DoS) attacks. Many schemes have been proposed in the literature; in particular, Probabilistic Packet Marking (PPM) schemes were in the center of the researchers' attention given their scalability and thus their ability to trace distributed attacks such as distributed denial of service attacks...
The performance of disk I/O for large data transfer is driven by compression ratio. In this paper, we studied and explored the compression of large column-store databases and proposed the organization of the compressed data on the concept of dictionary encoding logical compression scheme in matrix form. Our experiment shows that with proposed compression algorithm, TPC-H query performance may improve...
The aim of this study was to design an expert system to predict the Non-Dipping or Dipping pattern by using several basic clinical and laboratory data through an artificial intelligence algorithm. Data Mining is a technique which extracts information from data sets by using a combination of both statistical analysis methods and artificial intelligence algorithms. Also in this study, the decision tree...
Assessment of student learning requires the use of techniques for measuring student achievement. Assessment is more than a collection of techniques, however. It is a systematic process that plays a significant role in effective teaching. It begins with the identification of learning goals, monitors the progress students make toward those goals, and ends with a judgment concerning the extent to which...
In this article, an enhancement to the novel Geographic Midpoint (GMP) routing algorithm is introduced. The proposed enhancement improves the original algorithm to be more efficient in providing the targeted route by considering distance variations of links to be connected. A number of direct applications like the solution of the Monitoring-Trail (m-trail) design, which is used in fault localization...
To reduce the amount of computation time between tools and blank models in five-axis CNC machining process simulation, this paper presented a new cutting algorithm using improved Voxel model and tool revolving body. This algorithm is simple and clear with reliable calculation rate. By using the improved Voxel model, this paper showed a way to solve the problems that the classic voxel model cost too...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.