The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper, presents an Intelligent diagnosis system using Hybrid approach of Adaptive Neuro-Fuzzy Inference System (ANFIS) model for classification of Electrocardiogram (ECG) signals. Feature extraction using Independent Component Analysis (ICA) and Power spectrum, together with the RR interval then serve as input feature vector, this feature were used as input of ANFIS classifiers. six types of...
In the field of pattern recognition multiple classifier systems based on the combination of outputs from different classifiers have been proposed as a method of high performance classification systems. The objective of this work is to develop a fuzzy Gaussian classifier for combining multiple learners, we use a fuzzy Gaussian model to combine the outputs obtained from K-nearest neighbor classifier...
Price index forecasting is one of the most important problems in financial markets. In the past decades the prediction of stock index has played a vital role in the financial situation of several companies which have stocks in the market. In this paper we use Multi Layer Perceptron (MLP) neural network in stock index prediction. Three searching algorithms were used to get the best network architecture...
The performance of a biome??trie verification system is affected by how good each user is represented in the user gallery. Due to the infinite number of pose variations, illumination changes and other intra-class variations in the biome??trie samples, it is impossible to collect all variations in a totally supervised manner. Adaptive biome??trie systems that use semi-supervised learning techniques...
In this paper a new simple efficient algorithm for image descriptor using variance covariance matrix and variance calculations is presented. Also an approach to use this descriptor for image recognition is described. The recognition proceeds by matching individual features to a database of features from known images using a fast nearest-neighbor algorithm. We apply the full search algorithm to detect...
This work presents a break-through feature package for Advanced Intelligent Video Surveillance Systems. The feature package selective ID protection in advanced high performance intelligent video surveillance was designed and implemented with two different approaches: A hardware based-solution, where an additional ILP processor was mounted in the SmartCam core board to execute such special tasks like...
Quality assurance center in Mansoura University has been developing new strategic plans and activities. These plans and activities need to be automated as a part of the whole automation objectives of quality assurance. Process management is the most suitable approach to automate the quality assurance procedures. The system integrates with the University data management systems using a set of web services...
This paper introduces a proposed enhanced model of fuzzy cognitive map (FCM) called dynamic fuzzy cognitive map (DFCM). The aim is to make both of fuzzification mapping and causal relationships between concepts are environment sensitive. Accordingly, knowledge representation and inference process will be more flexible, reliable, and dynamic especially when dealing with complex and dynamic environments...
The multi-objective integer programming problems in large scale are considered time consuming. In the past, mathematical structures were used that can get benefits of high processing powers and parallel processing. The Branch and Bound (B&B) algorithm is one of the most used methods to solve combinatorial optimization problems. A general approach to generate all non-dominated solutions of the...
Pandemic influenza has great potential to cause large and rapid increases in deaths and serious illness. The objective of this paper is to develop an agent-based model to simulate the spread of pandemic influenza (novel H1N1) in Egypt. The proposed multi-agent model is based on the modeling of individuals' interactions in a space-time context. The proposed model involves different types of parameters...
Topological distribution of dielectric materials within a unit cell has a significant effect on how waves propagate through the material. Through topology optimization, the configuration of a periodic material's unit cell can be designed to specification. In many applications, it is desired to have a unit cell with as large a band gap as possible. In this paper we use Genetic Algorithms (GA) to optimize...
The most important measure that must be considered in any software product is its design quality. The design phase takes only 5-10 % of the total effort but a large part (up to 80%) of total effort goes into correcting bad design decisions. If bad design is not fixed, the cost for fixing it after software delivery is between 5 and 100 times or higher. Researches on object oriented design metrics have...
The standard affinity propagation clustering algorithm suffers from one limitation that it is hard to know the value of the parameter ??preference?? which can yield an optimal clustering solution. To overcome this limitation, in this paper we proposes an adaptive affinity propagation method. The method first finds out the range of ??preference??, then searches the space of ??preference?? to find a...
Group key management is an important functional building block for secure multicast architecture. Thereby, it has been extensively studied in the literature. The main proposed protocol is Adaptive Clustering for Scalable Group Key Management (ASGK). According to ASGK protocol, the multicast group is divided into clusters, where each cluster consists of areas of members. Each cluster uses its own Traffic...
The importance of automated negotiation has increased in recent years, because the growing interest in many fields. The aim of such interactions is to reach agreements through exchanging the offers and counteroffers. From these historical offers, mining methods pays special attention for two issues, first because its ability discover and extract knowledge about the opponent preferences, second, its...
This paper presents capacity dimensioning for a hypothetical distribution network in the Danish municipality of Aalborg. The number of customers in need for a better service level and the continuous increase in network traffic makes it harder for ISPs to deliver high levels of service to their customers. This paper starts by defining three levels of services, together with traffic demands based on...
Data hiding is a technology that communicates the secret data by the multimedia carrier, such like image, audio, and video files. A good data hiding scheme can hide huge secret data in the multimedia carrier without degrading the quality of the carrier. In this paper, a high hiding capacity reversible data hiding scheme with low distortion using double-embedding strategies is proposed. The proposed...
The Quran is a significant religious text, followed by the 1.5 billion believers of the Islamic faith worldwide. The text dates to 610-632 CE and is written in Quranic Arabic, the direct ancestor language of modern standard Arabic in use today. This paper presents the Quranic Arabic Dependency Treebank (QADT) and reports on the approaches and solutions used to apply Natural Language Processing to...
In a tightly coupled Next Generation Wireless Network (NGWN), a large number of different radio access technologies (RATs) will be integrated into one common network. These RATs are owned by one operator or multi-cooperative operators. Selecting the most optimal and promising RAT is an important consideration for overall networks stability, resource utilization, operator benefits, user satisfaction,...
In this paper, a centralized hierarchical-based routing protocol, that distributes energy load among sensor nodes based on their residual energy, is proposed. The performance of the proposed protocol is evaluated via intensive simulation. Simulation results show that the proposed protocol outperforms the well-known Base-Station Controlled Dynamic Clustering Protocol (BCDCP) in terms of network lifetime...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.