The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the present world, there is a need of emails communication but unsolicited emails hamper such communications. The present research emphasises to build a spam classification model with/without the use of ensemble of classifiers methods have been incorporated. Through this study, the aim is to distinguish between ham emails and spam emails by making an efficient and sensitive classification model...
After passing through many hierarchical management levels, the information tends to distort, which may lead to decreased efficiency, and poor ability to adapt to external changes. We provide a new kind of flat management modes based on mobile Internet. With the mobile social App, the human relations are flattened, which means the information can breakthrough level barriers and be immediately exchanged;...
We propose an effective modified differential evolution algorithm (EMDE) to solve reliability problems in this paper. The proposed algorithm modifies the mutation operator and crossover operator of the original differential evolution algorithm (DE). The modified mutation operator enables all solution vectors to mimic the global best solution vector with linearly increased probability, and the modified...
Smart grid is the new electrical grid that will change forever the way we use energy, thanks to the deployment of sensing and communication technologies. It allows consumers to become more aware and in control of their energy consumption. However, the pervasive communication infrastructure deployed inside the smart grid makes it a target to different types of attacks, which is why security is an essential...
3d Printers create an object by printing thousands of successive thin layers. Each layer is created by the printing tool which moves on the selected paths. The ability to reduce the total length of printing paths results in lower overall time needed for printing process. In this paper there are presented two hybrid algorithms for that purpose, Greedy Two Opt and Greedy Annealing. Both of them based...
Most global optimization problems have some constraints within their solution space and some of them are related to the boundary limitations. Implementation of these restrictions calls a proper method that is readily usable. In the particle swarm optimization (PSO) algorithm, solutions can easily violate of the bounds limitations; therefore, a bound constraint handling (BCH) method affects the algorithm...
This paper proposes a new heuristic called memory search algorithm, extending brute force algorithms, for solving path finding problems. The memory search algorithm, its development and functionality are discussed. A comparison between a genetic algorithm and the memory search algorithm for solving path finding problems is presented. Although genetic algorithms are known to solve complex path finding...
We applied the production smoothing models of inventories taking into consideration the flexible accelerator hypothesis to examine the characteristics of production smoothing and inventory adjustment. Bayesian estimation approach was also developed to approximate the structural parameters of production smoothing models for reliable and efficient inference. A case study in the electronic parts and...
Feature selection techniques are important to select features for good classification results. In this work, Correlation based Feature Selection, Motif Discovery using Random Projection, Hybrid Feature Selection and Convex Hull Feature Selection techniques with Support Vector Machine are compared using the same dataset for network anomaly detection. The performance metrics are number of features,...
The United States electric utility industry is transitioning from a one-way distribution grid to a new power grid that will accommodate bidirectional energy flow. Utility companies desire a solution for electric grid traffic congestion, which will work in synchrony with the industry's transition towards future integrated distribution systems. This report explores Geographic Information Systems (GIS),...
This study was designed to explore the overarching research question “How can we forecast residential solar rooftop adoption?” In order to answer this question, we utilized big data tools to forecast residential solar rooftop adoption likelihood based on both customer demographics and expenditure data. A model was developed utilizing SPSS, Azure, and ArcMap 10.3 software to yield an accurate prediction...
The paper concerns the problem of the allocation of processes in mesh structured systems. The implemented optimization algorithm is based on the idea of Differential Evolution. The algorithm can be tuned along with ten different mutation schemes. The essential aim of the paper is checking these mutation schemes' impact on the efficiency of the considered algorithm. The studies are based on the simulations...
In classical Vehicle Routing Problem, algorithms are developed based on travel distance or travel time estimated from an assumed constant travel speed. However, in city logistics, due to a growing amount of traffic and a limited capacity of the road network, travel speed between two locations no longer remains a constant but location and time dependent. In this paper, we propose a framework to visualize...
Through the processes set out by Learning Analytics, this paper describes a decision making model which supports the managers of higher education institutions at the moment of making academic decisions. In the analysis and requirements phase, the importance of creating and categorizing indicators is presented in detail, thereby facilitating the finding of hidden patterns in the educational information...
Common Spatial Pattern (SP) algorithm has been proved to be effective in Brain Computer Interface (BCI) for extracting features from Electroencephalogram (EEG) signals used in motor imagery tasks, but it is vulnerable to noise and the problem of over-fitting. Many algorithms have been devised to regularize CSP for two class problem, however they have not been effective when applied to multiclass CSP...
Sequences are one of the most important types of patterns which are extracted from datasets and are used to construct association rules. Several sequential pattern mining methods have been proposed in the literature. This paper introduces a novel bit wise approach to compress and represent the sequence database as a 3-dimentional array and use a corresponding mining method to extract frequent sequences...
Urdu Nastaleeq is a highly cursive, context sensitive language, written diagonally from top right to bottom left. This makes it difficult to segment the partial word or a complete word into characters. Further due to stacking of characters, the segmentation at the character level is hard to perform. Some researchers have performed the segmentation and have succeeded to a good extent, but still some...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.