The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the Data mining process the dispensation of in sequence can be done with dissimilar ideas. An optimization is the dilemma of penetrating out the paramount announcement from all the practical solutions. Artificial Bee Colony (ABC) is proposed which is based on intelligent advancement and is defined to get the powerful and reliable solution. Process scheduling algorithm is presented under distributed...
Cloud computing very common technology today and the demands of cloud computing services are increasing day by day and thus data center management. This advance technology has a great effect on environment. The demand of electricity in data centers is increasing globally. Huge data centers consume large amount of power and most of it take place due to task scheduling, virtual machine allocation and...
Clustering is grouping similar data items, features, observations etc. In to cluster. Clustering Problem has been addressed many times as it is one of the important step in data analysis in various application areas. This paper presents an overview of message passing data clustering technique with a goal of providing useful concepts which can be accessible to the community of clustering practitioners...
Images include information about human body which is used for different purpose such as medical examination security and other plans Compression of images is used in some applications such as profiling information and transmission systems. Regard to importance of images information, lossless or loss compression is preferred. Lossless compressions are JPEG, JPEG-LS and JPEG2000 are few well-known methods...
In order to reduce the noise content of the fiber optic gyro (FOG) output signal, and to improve the zero drift index of the FOG, the paper uses the programmable logic device FPGA. The LMS algorithm is analyzed and studied, and it is realized by Verilog language programming. The thought of the paper is based on classical finite state machine. Compared with previous programming algorithms, it has a...
Evolutionary algorithms are efficient algorithms for solving the most complex optimization problems of the current era. Differential Evolution (DE) is a simple population based evolutionary algorithm under this category. As shown in literature, c omparative to exploration of the search space, DE is less capable of exploiting the existing solutions. Therefore, DE is very much expected to skip the true...
Segmentation technique is used for analysis and diagnosis of tumor in MRI Brain image. The paper presents Modified Fuzzy C Means with Optimized Ant Colony Algorithm for segmentation of brain tumors in 3D magnetic resonance images. In this paper, the image segmentation is obtained by using Modified Fuzzy C Means with Optimized Ant Colony Algorithm using Min - Max Ant System. The proposed methodology...
Most steganography algorithms are weak against attacks like visual and statistical but among all steganography algorithms F5 algorithm is more robust and secure. It can be more efficient if we reduce the encryption and decryption time and improve the embedding capacity. In this paper we present a better F5 algorithm with less encryption and decryption time and higher embedding capacity with the help...
In order to approach the true Pareto front as fast as possible and make the distribution of solutions uniform on multi-objective optimization problems, a multi-objective optimization algorithm based on artificial bee colony algorithm has been presented in this paper, named MABC. Firstly, a novel selection scheme, which is used to guide the population evolution towards the true Pareto front and keep...
Security is required in order to defend information from unauthorized person on the network. Therefore, securely exchanging data over the internet is vital. In this context, cryptography is used that transmute facts from its under stable form into an indecipherable form by using various encryption techniques. Play air cipher is the form of block cipher which has no limit on the number of characters...
MapReduce Comes from its simplicity to preparing the input data, the programmer needs only to implement the mapper, the reducer, and optionally, the combiner and the partitioner. All other aspects of execution are handled transparently by the execution framework on clusters ranging from a single node to a few thousand nodes, over datasets ranging from gigabytes to petabytes. However, this also means...
Based on the current situation and existing problems of supply chain's storage optimization management, a new genetic type method with integrated gradient based algorithm method for storage optimization of supply chain is proposed. This method combines the fast convergence and strong ability of local search of gradient method and global search ability of genetic algorithm. The problem of storage optimization...
This paper proposes a new approach to achieve localization for one-dimensional (1D) and two-dimensional (2D) barcodes under the complex background. Most methods may work for a single 1D or 2D barcode or rely on a unique pattern to locate a single 1D or 2D barcode. Now we propose a novel barcode localization algorithm based on GBVS. It can quickly get saliency map on image and let it locates the 1D&2D...
The k Nearest Neighbour (kNN) method is one of the most popular algorithm in clustering and data classification. The kNN algorithm founds to be performed very efficient in the experiments on different dataset. In this paper, we focus on the classification problem. The algorithm is experienced over Leukemia dataset. Initially three feature selection algorithm Consistency Based Feature Selection (CBFS),...
A cyclic redundancy check (CRC) is an error-detecting code commonly used in data communication and storage devices to detect accidental changes to raw data. This paper provides an overview and principle of CRC. Emphasis is placed on the implementation of the CRC algorithm by method of hardware as well as software. It is proved that the implementation method present has high practical value.
Detecting moving objects in videos is an important task in many computer vision applications, including human interaction, traffic monitoring and Structural Health Monitoring. When having a stationary camera, a basic method to detect the objects of interest is background subtraction. However, precise moving object detection using such a method is an extremely difficult task in a varying environment...
Recent advances in development of Wireless Communication in Vehicular Adhoc Network (VANET) has provided emerging platform for industrialists and researchers. Vehicular Ad hoc networks are multi-hop networks with no fixed infrastructure. It comprises of moving vehicles communicating with each other. Inter vehicular communication lies at the core of a number of industry and academic research initiatives...
Impedance of an antenna largely affects the performance of the system. ANN is trained to provide input impedance of a micro strip patch antenna since the impedance computation mathematically requires lot of parameters and is a rigorous task. Training is done through Bayesian Regularization (BR), Levenberg Mar quart (LM) as well as Scaled Conjugate Gradient (SCG) algorithms and the results are then...
Particular Regional Atrophy analysis of structural magnetic resonance image (MRI) of the brain may provide quantitative evidence of different neurodegenerative diseases, which will help to identify the Brain diseases. Multiple sclerosis (MS) is one of the most common diseases which affect white matter. Multiple sclerosis is a chronic idiopathic disease resulted in multiple areas of inflammatory demyelization...
For single fault diagnosis strategy is easy to fail when applied to multiple fault system, a discrete differential evolution algorithm (DDE) based on a hybrid strategy is proposed firstly in order to generate the minimal hitting set. Redefine the meaning of the individuals of population, Hybrid differential strategies and random changes in the scaling factor are introduced, thus the contradictory...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.