The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Multidimensional complex query searching is difficult in Peer-to-Peer (P2P) overlay networks due to its characteristics of high scalability, dynamicity and decentralized architecture. On the other side, the P2P applications like searching of multimedia contents in social networking or multiplayer games (that combines the search based on the multiple game scenarios) are becoming popular among the end...
Most of existing Business process management (BPM) technologies have their own graphical user interfaces (GUIs), whereas users in different organizations who involved in business processes are more likely to work with a different set of GUIs. Consequently, developers have to build the specific set of GUIs in enterprise application which is appropriate for each business process, and they use BPM API...
In this paper, a hardware implementation of Support Vector Machine (SVM) classifier for acceleration has been proposed based on pipelined adder, in which the speedups outperform other existing architectures. The adder whose critical path has been efficiently shortened by pipeline technology, constituted the main arithmetic elements in SVM processing. Therefore, a higher processing frequency and throughput...
In this document, we propose “A Review of Perceptual Information Fusion”. This paper consists of Human perception, Computer perception, Literature review from much research, including Data Fusion Technique and Neural Networks. In conclusion I will develop these ideas in my research with a view to encourage other researchers in this field.
Depression is a psychological disorder that is difficult to diagnose. Therefore, its early screening and accurate diagnosing are much needed. In this paper, we developed and evaluated a model that uses adolescents depression data for screening and predicting the depression based on boosting with feature selection techniques. These data have been collected from the Center for Epidemiologic Studies...
Train a neural network with large dataset need a long training time. This paper presents a technique to reduce training time by divide a large dataset into n subsets and use those subsets to train multiple neural networks. In final, knowledge of trained networks are combined into a one network. The results from an experiment show that our technique has the same error like a network that trained by...
This paper presents a new method for the vehicle license plate and the frontal mask localization. The proposed license plate localization initializes candidate regions based on maximally stable extremal regions (MSERs). Then, the candidate regions are categorized into three classes of license plate character components, plate background components and the other components by using intensity, size,...
The simulated binary crossover operator is an important variation operator in evolutionary algorithms. The experimental results reported in this work are a detailed study for the distribution index parameter of this operator. The results are for NSGAII algorithm. The results are interesting regarding three metrics: hypervolume, inverted generational distance and spread.
We developed a square wave based artificial neuron to take advantage of inexpensive and readily available Field Programmable Gate Array technologies. While conventional neurons require computationally intensive floating point arithmetic to determine the output, our artificial neuron converts inputs into square waves and the time that these waves require to produce a predetermined bit pattern is used...
This paper presents a modified Adapted Lesk algorithm for word sense disambiguation in Nepali language. We included the synset, gloss, example and hypernym of the context words to form the final collection of context words. The context window contains all the words from the whole sentence except articles, prepositions and pronouns. The collection of words for each sense of a target word is also formed...
The term Cloud Computing is not something that appeared overnight, it may come from the time when computer system remotely accessed the applications and services. Cloud computing is Ubiquitous technology and receiving a huge attention in the scientific and industrial community. Cloud computing is ubiquitous, next generation's in-formation technology architecture which offers on-demand access to the...
In this paper, we propose and investigate a simple, low-complexity and deterministic cooperative protocol that exploits Network Coding (NC) within a wireless network. The scenario under investigation is for Long Term Evaluation Advanced (LTE-A) downlink communication system network, where a source of data sends k stream of packets to a Pico relay which forwards them to two Femto relays via fiber optic...
Cognitive radio (CR) is an upcoming technology that provides viable solution for congested wireless spectrum. The basic idea behind cognitive radio is the utilization of unused frequency bands of primary or licensed users (PU) by secondary or unlicensed users (SU). The unused licensed spectrum is called white space or spectrum hole. CR utilizes these spectrum holes for unlicensed spectrum users. The...
This paper considers natural neurons as a physical communication medium and defines a Time Division Multiple Access (TDMA) communication protocol on top of the physical layer to construct intrabody nanonetworks, each of which networks nanoscale nodes to perform sensing and actuation tasks in the body for biomedical and prosthetic purposes. The proposed protocol, called Neuronal TDMA, leverages a novel...
In next-generation wireless networks, provisioning of IP-based network architecture and seamless transmission services are very important issues for mobile nodes. For this reason, a mobility management mechanism to support global roaming is highly regarded. These technologies bring a broader life by using a global roaming account through the connection of multiple devices or technology to mobile users;...
The Mobile Ad hoc Networks (MANETs) is a collection of wireless devices or nodes that communicate by dispatching packets to one another or on behalf of another device or node, without having any central network authority or infrastructure controlling data routing. In order to communicate each other, the nodes cooperatively forward data packets to other nodes in the network by using the routing protocol...
This study aimed to explore the colour imagery of skin tone and eyeglass frames, and whether this affects the preferences of consumers. Glasses are a focal point on the face and we wished to understand whether the frame colour along with skin tone affects the entire facial image. Many businesses provide suggestions on choosing frames that complement one's skin tone, but what is the basis of these...
Due to a rapid growth of Internet, the number of network attacks has risen leading to the essentials of network intrusion detection systems (IDS) to secure the network. With heterogeneous accesses and huge traffic volumes, several pattern identification techniques have been brought into the research community. Data Mining is one of the analyses which many IDSs have adopted as an attack recognition...
Discretization algorithm is important for data mining preprocessing because it will help the user to easily understand the data, reduce the complexity of data, reduce processing time, and increase efficiency and accuracy of the data. This paper proposes the new discretization algorithm called Class Attribute Interval Average (CAIA). The algorithm uses 2D-quanta matrix table to calculate each of class...
This paper aimed to propose an integrated system architecture particularly in tuna fishery data for all the stakeholders in Indonesia. The architecture can be utilized as means of regulating and monitoring the tuna fishing activities for the government of Indonesia. As for the fishing company, the system architecture can assist in good data management, simplifying the fishing license and trading the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.