The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Feature selection is one of the most important pre-processing steps when we consider a data mining, pattern recognition or machine learning problem. Finding an optimal feature subset, among all the combinations, is a NP-Complete problem. Despite lot of research in this domain, feature selection for clustering is still an unsolved issue. In this paper, a binary particle swarm optimization (PSO) algorithm...
Mobile Sensor Networks (MSN) is a collection of mobilizer attached sensor nodes which can move randomly or task specifically. Routing is a basic step for data exchange in MSN. The routing protocols designed for ad hoc networks are suitable to MSN because they support mobility but due to resource constraint nature of MSN these protocols are not used directly. Hence we need new protocols. Zone based...
In this paper, we propose a hierarchical SVM framework for multiclass classification problems. Use of multiple SVMs in a hierarchical structure has been a popular approach to handle multiclass classification by Support Vector Machines which are otherwise known to two-class classifiers. Among commonly-used hierarchical structures, binary tree structured SVM has computational advantages over other techniques...
Topic Modeling has been a useful tool for finding abstract topics (which are collections of words) governing a collection of documents. Each document is then expressed as a collection of generated topics. The most basic topic model is Latent Dirichlet Allocation (LDA). In this paper, we have developed Gibbs Sampling algorithm for Hierarchical Latent Dirichlet Allocation (HLDA) by incorporating time...
The study intends to measure the efficacy of teacher training on techno pedagogy and its effect on students learning in academic subjects like Science, Mathematics and Geography. We randomly selected 10 middle schools (@ 2 schools from 5 districts), observed twenty randomly selected teachers and their students over a 1year period and did a learning achievement tracking of students. Measuring tools...
A synchronized network time is always necessary for scheduling to achieve energy efficiency, data fusion, localization for WSN applications. The major limitation in a WSN is the battery usage and lifetime of the nodes. Due to the power restriction of nodes, efficient routing is very important to save the battery of sensors to enhance the lifetime of the sensor area. The multi-head chain concept is...
A set D ? V of a graph G = (V, E) is called an open neighborhood locating-dominating set (OLD-set) if (i) NG (v) n D ? emptyset for all v ? V, and (ii) NG (u)n D? NG (v)n D for every pair of distinct vertices u, v? V. Given a graph G = (V, E), the Min OLD-set problem is to find an OLD-set of minimum cardinality. The cardinality of a minimum OLD-set of G is called the open neighborhood location-domination...
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
CWSNs provide better bandwidth utilization as compared to a normal wireless sensor network because they use opportunistic spectrum access to transfer data. Opportunistic spectrum access is a very promising and spectrum efficient communication process when there is bur sty traffic in the network. IEEE 802.22 is the first standard based on the concept of cognitive radio. It also helps the network to...
A wireless network contains multiple access points, a long delay during roaming from one access point to another may cause an interruption for streaming real time traffic. Roaming in a wireless local area network (WLAN) generally consists two phases: a) searching for a new best access point and b) performing authentication at new target access point. On account of WLAN architecture, the handoff latency...
To minimize the energy consumption in a wireless sensor network (WSN) is very important task as the sensors are generally very small and have a power battery attached to it which cannot have very large power capacity. In a wireless sensor network any sensor node must be able to retrieve information from any other sensor node in the network, so the connectivity of the network is also very important...
In VLSI physical design, placement is an important stage. Analytical placer minimizes the half-perimeter wire lengh (HPWL) of the circuit as an objective function to place blocks optimally in the chip. This paper introduces a new smooth recursive model for HPWL function which can be used inside the analytical placers. The proposed model is more accurate than widely used log-sum-exponent (LSE)[9],...
Cloud offers various Services to its users. A huge amount of Data is generated everyday while working in Cloud Computing. The data should be stored properly on the cloud servers. In case this data is lost from the server there should be a mechanism to recover this data. One such approach is put forward in this paper. The proposed scheme allows storing the data on the cloud server and the remote server...
In multi-agent planning problem, multiple agents are involved in doing some task to achieve a common goal. At present, major approaches to multi-agent planning are decomposition, heuristic improvement, and joint-action planning. Joint-action is a special case of concurrent actions where, two or more agents perform the same action simultaneously. Joint-action executes if preconditions hold true, but...
Education System comprises of three main phases of functionality: Data collection, data processing and data dissemination. Education system uses Education Management Information System (EMIS) to collect process and disseminate data which lacks application to application data transfer. Moreover direct data transfer requires special arrangement of hardware and software components. In this paper, we...
Cloud computing is recent emerging Internet based technology in IT industry. With rapid development of cloud computing over Internet, security became major issue that garnered attention of researchers from academic as well as industry. Data Security is a great barrier in adaptation of cloud computing. Traditional standard encryption methods provide security to data in storage state and transmission...
Quality is understood by everybody and have the feeling of it, but, it is too difficult in implementing in a system. In Software Engineering, Quality Assurance is a valuable discipline and many standards are also available for it, but, using those standards for creating confidence in the customers' mind is not easy. The e-Governance applications in which software has an important role has the problem...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.