The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, transformation and substitution based symmetric key encryption algorithm is proposed. Strong correlation between the adjacent pixels can be observed in the multimedia images. The encryption can be made effective by changing both position and value of each pixel in the image. In the proposed algorithm, each pixel position is scrambled using discrete radon transformation (DRT) and pixel...
The methods for redundancy detection can be classified as lexical approaches and value based approaches. Lexical approaches discover redundancy among lexically identical expressions. Value based approaches discovers redundancy among expressions computing the same value. This paper studies the practical merits of these approaches by implementing both techniques in the LLVM Compiler framework and doing...
Recommendation System predicts the user's item preferences and is used in many applications like YouTube, online shopping sites, etc. To find the interesting items recommendation systems help the users effectively. Current techniques used in recommendation systems have some problems like Cold start, Pair wise similarity problem and so on. To overcome these problems ontology based recommendation is...
This paper presents the review of certain important and well discussed traditional as well as proposed search algorithms with respect to their time complexity, space Complexity, merits and demerits with the help of their realize applications. This paper also highlights their working principles. As it is well known that every sorted or unsorted list of elements requires searching technique so many...
This paper involves the study of traditional facts about the classical model of cryptography and also surveyed the security protests of encryption schemes. Not only stick to this also gives the computing understanding of the quantum computing schemes of traditional SHORS computation with the old technique demonstration in mathematical view. Here also proposed a novel technique which resembles the...
Now a days people are enjoying the world of data because size and amount of the data has tremendously increased which acts like an invitation to Big data. But some of the classifier techniques like Support Vector Machine (SVM) is not able to handle the huge amount of data due to it's excessive memory requirement and unreasonable complexity in algorithm tough it is one of the most popularly used classifier...
Redundancy elimination is an important compiler optimization, which deals with the elimination of unnecessary reevaluations of the same computation. This optimization requires two passes — one pass to detect the redundant computations and the second pass to eliminate the redundancies. A Simple Algorithm for Global Value Numbering (GVN) (Saleena and Paleri, 2014) is a simple and efficient method for...
In this paper, a knowledge based approach for Word Sense Disambiguation (WSD) in Bengali language has been presented. Bengali WordNet, developed at ISI Kolkata has been used as a knowledge base and the input data set is prepared from the Bengali Text Corpus developed in the TDIL (Technology Development for Indian Language) project of the Government of India. The proposed approach resolute the exact...
Community structure is a feature that reveals the internal organization of the network. The problem of community detection i.e., identifying the densely connected nodes in a network is an important task. There are many methods that can be employed to find communities. We have identified and analyzed seven of the methods of community detection which includes both pioneer methods and state of the art...
An efficiency of Photovoltaic (PV) systems depends upon the maximum power point tracking techniques. It helps to boost output power of PV array by tracking until the maximum power point reach which is depends upon the ambient temperature & solar insolation which is falls on the PV cell. Perturb and observe is inoffensive & efficient MPPT algorithm. However, raise in an insolation (G) then...
R language executes its program on a one core CPU by default, using image processing. R language requires gigantic amount of calculations which are all processed by one core itself. When there is a need to use multiple core present in our platform, special packages in R language are used and executed. Image processing requires a large number of resources and processing all running simultaneously,...
To write data on a disk block or to read data from a disk block, three factors are considered: seek time, rotational delay and actual data transfer time. The seek time is the time taken to move the arm to the proper cylinder and the rotational delay is the time for the proper sector to rotate under the head. The seek time dominates the other two factors by a wide margin. Thus, disk scheduling algorithms...
In the proposed approach, Word Sense Disambiguation (WSD) in Bengali language has been done using unsupervised methodology. This work is consisted of sequential two sub-tasks. First one is grouping of Bengali sentences into a certain number of clusters where a particular cluster contains the sentences of similar meaning and second one is labeling the clusters with its inner meanings with the help...
Generally, the medical datasets are heterogeneous and large dimensional that contains a million of patient records. Extracting information from such datasets is a tedious process, which can be made easier by some of the clustering algorithms available in data mining. In this paper, three clustering algorithms such as Medical Storage Platform for data Mining (MSPM), Homogeneity Similarity based Hierarchical...
Matrix Chain Multiplication is one of the optimization problems widely used in graph algorithms, signal processing and network industry. The Matrix Chain multiplication is the process of multiplying number of nxn matrices cumulatively, where n is the size of the matrix. In this paper, the focus of the work is to accelerate the computation time for matrix chain multiplication with the help of high...
Distributed generation (DG), is being increasingly adapted in distribution network. The advantages of placing DG in the distribution network are loss reduction, backup power supply, and real, reactive power management increase reliability of the network. In this paper Cuckoo Search Algorithm (CSA) has been adapted for optimal sizing and placement of DG for loss minimization Comparisons are made between...
This paper addresses the usefulness of Artificial Bee Colony (ABC) optimization algorithm for assessment of distribution system reliability. The penalty cost functions are formulated which is related to the failure rate and repair time of each distribution segment. And also, satisfy the reliability constraint such as SAIFI, SAIDI, CAIDI and AENS. The finest values of failure rate and repair time cost...
Increase in renewable energy utilization has widened the scope of research in maximizing the efficiency of solar photovoltaic (PV) manufacturing technology, but still the achieved conversion efficiency of solar PV module is not more than 25%. Thus to maximize their operating efficiency and to compete with per unit costs of conventional power, there is need of an efficient and robust maximum power...
The paper proposes wind energy conversion system modeling with the help of MATLAB Simulink for dc microgrid application. For tracking maximum power available in wind energy, MPPT (Maximum Power Point Tracking) technique is used. The proposed system contains the wind energy conversion model, 3-ph diode bridge rectifier model, MPPT controller and DC-DC converter (Buck converter) model. The DC-DC converter...
Owing to the popularity of World Wide Web, many organizations have adapted different strategies to do their business, which enhance the rapid development of E-commerce directly and make the development of web usage mining skills important. It becomes a crucial issue to predict exactly the ways how users and customers browse websites. The result of the prediction can be used in different areas like...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.