The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper introduces description-based associated sets of distance functions, where members are topological structures helpful in pattern analysis and machine intelligence. An associated set of a function is a collection containing members with one or more common properties. This study has important implications in discerning patterns shared by members of an associated set. The focus in this paper...
Modern information systems are characterized by the distribution of information and services among several autonomous heterogeneous entities. A major requirement for the success of such systems is that participating entities cooperate by sharing parts of their local knowledge. This paper presents a novel approach for modeling and enhancing cooperation in distributed information systems, which combines...
The problem of building Recommender Systems has attracted considerable attention in recent years, but most recommender systems are designed for recommending items for individuals. In this paper we develop a content based group recommender system that can recommend TV shows to a group of users. We propose a method that uses decision list rule learner (DLRL) based on Ripper to learn the rule base from...
Recommender systems are traditionally of following three types: content-based, collaborative filtering and hybrid systems. Content-based methods are limited in their applicability to textual items only, whereas collaborative filtering due to its accuracy and its black box approach has been used widely for different kinds of item recommendations. Hybrid method, the third approach, tries to combine...
Web services have been attracting many attentions in both research and industry communities due to their potential of being invoked automatically based on users requests. In order to make this potential practical, there are two tasks needed to be fulfilled including (i) automatic discovery and composition of appropriate services and (ii) automatic invocation of sequenced services to achieve the desired...
In [6, 9] the authors have shown how to combine propositional BDI logics using Gabbay’s fibring methodology and in [11, 10] they outlined a tableaux proof procedure for the fibred BDI logic. In this paper we provide a proof related to completeness preservation of the combined BDI logic in the presence of interaction axioms of the form □1ϕ⇒□2ϕ in terms of canonical models. To...
This Paper outlines a logic based formal approach to represent and reason about the DNSSEC (Domain Name System Security Extensions) protocol. DNSSEC provides security services to the existing DNS protocol mainly through public key cryptography. But, it is well known that even the use of the most perfect cryptographic tools does not always ensure the desired security goals. This situation arises because...
Privacy has become a crucial issue in the online services realm. P3P policy, which is a privacy policy, enables websites to express their privacy practices so that users can be well-informed about the data collection and its usage. Besides, this privacy policy can be checked against its users’ privacy preferences to help decide whether or not the service should be used. However, the interpretation...
The inexpressive Description Logics in the family have been successful mainly due to their tractability of standard reasoning tasks like subsumption, adoption in modeling of biomedical ontologies, and standardization as an OWL 2 EL profile. This paper proposes two enhanced subsumption algorithms that not only test whether a particular subsumption holds but also give a numeric indicator...
This paper proposes a novel approach called Fuzzy-based Trusted Ant Routing (FTAR) using fuzzy logic and swarm intelligence to select optimal path by considering optimization of multiple objectives. It retains the advantages of swarm intelligence algorithm and ensures trusted routing protocol by implementing fuzzy logic. It uses trust-evaluation scheme using dropped packet and Time-Ratio parameters...
Nearest neighbor classifiers require a larger training set in order to achieve a better classification accuracy. For a higher dimensional data, if the training set size is small, it suffers from the curse of dimensionality effect and performance gets degraded. Partition based pattern synthesis is an existing technique of generating a larger set of artificial training patterns based on a chosen partition...
This paper presents an efficient hybrid method, namely fuzzy particle swarm optimization (MFPSO) to solve the fuzzy clustering problem, especially for large sizes. When the problem becomes large, the FCM algorithm may result in uneven distribution of data, making it difficult to find an optimal solution in reasonable amount of time. The PSO algorithm does find a good or near-optimal solution in reasonable...
Mobile communication devices are gaining even faster acceptance than the proliferation of web in 1990’s. Mobile communication spans a wide variety of protocols ranging from phone calls, text messages/SMS, e-mail data, web data, to social networking. Characterization of users is an important issue in the design and maintenance of mobile services with unprecedented commercial implications. Analysis...
Information abundance induced due to the ambiguous queries demands soft computing strategies. This problem can be addressed by Search Results Clustering. This paper presents a novel approach to the web search results clustering based on association rules using the Snowball technique. Association rule mining is employed on terms extracted from title and snippet of the search results. The detailed algorithm...
In this paper, we present an efficient method for recognition of basic characters (vowels) of handwritten Kannada text, which is thinning free and independent of size of handwritten characters. Crack codes and Fourier descriptors are used for computing features. The recognition accuracy has been studied by comparing the performances of well known K-NN and SVM classifiers. Five-fold cross validation...
Automated understanding of mathematical expressions (MEs) is currently a challenging task due to their complex two- dimensional (2D) structure. Recognition of MEs can be online or offline and in either case, the process involves symbol recognition and analysis of 2D structure. This process is more complex for offline or printed MEs as they do not have temporal information. In our present work, we...
In this paper, we propose a novel wavelet based PCA-LDA approach for content Based Image Retrieval. The color and texture features are extracted based on the co-occurrence histograms of wavelet decomposed images. The features extracted by this method form a feature vector of high dimensionality of 1152 for the color image. A combination of Principal Component Analysis (PCA) and Linear Discriminate...
Forensic analysis of printed documents is a multi objective activity with intrinsic data as inputs which demands efficient techniques. Recent trends suggest the need for good preprocessors and post analysing tools which characterize printed text for identification of print technology. Each printing technology differs in their process of placing marking material on the target. The paper focuses on...
Pen based inputs are natural for human beings. A hand-drawn shape (symbol) can be used for various purposes, like, a command gesture, an input for authentication purpose, etc. Shape of a symbol is invariant to scale, translation, mirror-reflection and rotation of the symbol. Moments, like Zernike moments are often used to represent a symbol. Descriptors based on Zernike moments are rotation invariant,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.