The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In a data exchange system the correctness of the system depends on data exchange semantics. This can be well verified by using query answering. In the close world assumption (CWA) two types of answers are obtained, one is certain answer, which ignores the null values, another is maybe answer, which considers the null values. In this thesis, we give a procedure for computing a finite representation...
Finding desire information from a large text database is one of the most important issues of modern information processing systems. In this regard different types of searching techniques are used. Though some of them are vary useful, they frequently fail to show appropriate performance when a user enters misspelled data as searching keyword. In this paper we have developed an efficient search suggestion...
We introduce a facial expression recognition method, which incorporates a weight to the Local Binary Pattern (LBP), and generates solid expression features. Furthermore, we use Adaboost to select a small set of prominent features, which is used by the Support Vector Machine (SVM) to classify facial expressions efficiently. Experimental results demonstrate that our method outperforms the state-of-the-art...
Given a set of n points in the plane, the problem of computing the circular ordering of the points about a viewpoint v and efficiently maintaining this ordering information as v moves is well defined in computer graphics and animation. Each of the unique circular ordering in respect to v is called as view. In this paper, our task is to generalize this idea for 3D point set and to propose a kinetic...
Classroom teaching has always been a face to face interaction between students and teachers and here in the proposed system we would like to preserve this aspect of teaching with help of information and communication technology. We like to bring this quality along with the concept of geographical independence in a distributed system. Teleteaching as in any collaborative system is difficult to model...
Binary Decision Diagram has a great impact on the Boolean function manipulation for its compressed and canonical presentation. In switching function organization ROBDD (Reduced Ordered Binary Decision Diagram) with a fixed variable ordering plays a significant role for its distinctiveness. Combination of multiple functions using switching operations has more redundant states. For removing these redundant...
For many years the only known passive circuit elements were resistor, inductor and capacitor. In 1971, Leon Chua showed using argument that there should exist another passive element which he named memristor. It is basically a resistor whose resistance increases when current flows through it from one direction and decreases when current flows from the other direction. After 37 years researchers of...
This paper presents a prototype implementation of an intelligent system called safe system that monitors container security in the port logistics. Logistics supports in the port require safe container status. The main focus of our contribution is to design a system that supports RFID (Radio Frequency Identification) Readers of all types (such as Reader Protocol complaint and vendor provided Readers),...
Internet has gained huge popularity over the last decade. It offers its users reliable, efficient and exciting online services. However, the users reveal a lot of their personal information by using these services. Websites that collect information state their practices with data in their privacy policies. However, it is difficult to ensure if the policies are enforced properly in their practices...
Automated Essay Grading (AEG) is a very important research area in educational technology. Latent Semantic Analysis (LSA) is an information retrieval technique used for automated essay grading. LSA forms a word by document matrix and then the matrix is decomposed using Singular Value Decomposition (SVD) technique. Existing AEG systems based on LSA cannot achieve higher level of performance to be a...
The increased prevalence of mobile phones provides exciting opportunities for the growth of mobile banking (m-banking). This article reviews the emerging research literature on m-banking. It presents a classification framework for m-banking research based on 65 m-banking articles published between 2000 and mid-2010 in Information Systems (IS), technology innovation, management, and marketing journals,...
In this paper the authors have shown the ebb and flow of subscribers of different cell operators in Bangladesh based on their call rate, network, and other external facilities and suggests a new approach for the constituency of these operators to find out how all the operators can ensure customer satisfaction. Performance of a cellular system mainly depends on circuit merits (CM) of voice quality,...
Over the last decade many but totally different Total Cost of Ownership reports were generated for a same system. It was even more puzzling since most of the times these reports were sponsored by the vendors themselves. There is more or less a war between Windows and Linux about which one has the best TCO. It is highly likely that the generated TCO is based on vendors' feelings for their operating...
Skyline queries have recently attracted a lot of attention for its intuitive query formulation. It can act as a filter to discard sub-optimal objects. However, a major drawback of skyline is that, in datasets with many dimensions, the number of skyline objects becomes large and no longer offer any interesting insights. To solve the problem, recently k-dominant skyline queries have been introduced,...
Classification rules are the interest of most data miners to summarize the discrimination ability of classes present in data. A classification rule is an assertion, which discriminates the concepts of one class from other classes. The most classification rules mining algorithm aims to providing a single solution where multiple solutions exist. Moreover, it does not guarantee the optimal solution and...
Data mining is the process of extracting non-trivial patterns from large volume of data. It generates insight and turns the data into valuable information. A critical yet common flaw when performing data mining is to ignore the geographic locations from where the data is taken. When this geospatial attribute of the data is taken into consideration, the process is known to be geospatial data mining...
Different approaches have been proposed for digital display of bangla numerals and also characters. But a complete and accurate scheme not has been done yet. We approach a complete low cost and fair design to display bangla numerals, bangla characters (vowel, consonant and shortened form of these characters), also English and Arabic numerals and all English character's represented as 120 character...
Automated Theorem Proving systems are enormously powerful computer programs capable of solving immensely difficult problems. The extreme capabilities of these systems lie on some well-established proof systems. Semantic tableau is such a proof system used to prove the validity of a formula by contradiction and can produce a counterexample if it fails. It can also be used to prove whether a formula...
It is important to study the neural network (NN) when it falls into chaos, because brain dynamics involve chaos. In this paper, the several chaotic behaviors of supervised neural networks using Hurst Exponent (H), fractal dimension (FD) and bifurcation diagram are studied. The update rule for NN trained with back-propagation (BP) algorithm absorbs the function of the form x(1-x) which is responsible...
Flexible manipulator systems exhibit many advantages over their traditional (rigid) counterparts. However, they have not been favored in production industries due to its obvious disadvantages in controlling the manipulator. This paper presents theoretical investigation into the dynamic modeling and characterization of a constrained two-link flexible manipulator, by using finite element method. The...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.