The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This study rewrote a fractional-order particle swarm optimizer algorithmic equation and used an improved uniform design method (IUDM) to find the best combination for parameters of FPSO. Compared to PSO, FPSO makes a high convergence rate. In the improved FPSO, there are 4 parameters to influence effectiveness. Uniform design is an experimental method and suitable for multiple parameters and multiple...
Millions of comments are available on forums, Facebook, Tweeter, YouTube etc. Proper analysis of these huge comments can lead to solve many social, economic, political, business related questions which otherwise are difficult to understand and analyse. Proposed system explores the statistical approach for sentiment analysis of product reviews using expectation maximization algorithm. Systematic mathematical...
Human being normally uses natural language in form of written or spoken in their daily life. It is an entirely concept based on Artificial Intelligence, Computer Science and Linguistic resources. In Indian languages, Gujarati is an Indo — Aryan language with rich and high inflection. In these languages, several words have common root that's need to be reduced by using stemmer. Stemmer is used to reduce...
In various applications where the problem domain can be modeled into graphs, the shortest path computation in the graph is an indispensable challenge. In applications like online social networks and shortest route computation problems, the size of the graph is so large; the number of nodes have become close to hundreds of billions. Shortest path graph algorithms like SSSP (Single Source Shortest Path)...
Sampling through crawling is an important research topic in social network analysis. However there is very little existing work on sampling through crawling in directed networks. In this paper we present a new method of sampling a directed network, with the objective of maximizing the node coverage. Our proposed method, Predicted Max Degree (PMD) Sampling, works by predicting which k open nodes are...
In this paper, we introduce and explore the Frechet metric between the trees. We have used the metric to find similarities between polygons. This approach is used to quantify the quality of image segmentation.
AES represents the algorithm for advanced encryption standard consistof different operations required in the steps of encryption and decryption. The proposed architecture is based on optimizing area in terms of reducing no of slices required for design of AES algorithm in VHDL. This paper presents AES-128 bit algorithm design consist of 128 bit symmetric key. The AES implementation, merging technique...
In the process of analyzing the document images, the text separation from the background plays a vital role. If the quality of document image is good, then text can be separated very easily by applying simple techniques of thresholding. Whereas, in noisy images it requires very accurate analysis. Various thresholding techniques that are available are efficient and produce better results, but they...
In the set of stochastic, indecomposable, aperiodic (SIA) matrices, the class of stochastic Sarymsakov matrices is the largest known subset (i) that is closed under matrix multiplication and (ii) the infinitely long left-product of the elements from a compact subset converges to a rank-one matrix. In this paper, we show that a larger subset with these two properties can be derived by generalizing...
To adapt to the sparsity of some sparse systems in system identification, a novel modified recursive least squares algorithm is proposed. This algorithm utilizes the output error to control the value of forgetting factor, which deals with the contradiction between convergence rate and stationary misadjustment. In addition, through the introduction of zero attractor in parameters' iterations, the proposed...
Recently, a novel nonparallel support vector machine(NPSVM) is proposed by Tian et al, which has several attracting advantages over its predecessors. A sequential minimal optimization algorithm(SMO) has already been provided to solve the dual form of NPSVM. Different from the existing work, we present a new strategy to solve the primal form of NPSVM in this paper. Our algorithm is designed in the...
Nowadays, there are a lot of online repositories containing thousands of very useful educational resources for the educational community. To take full advantage of these resources requires a simple, direct and effective access to those resources that are of interest, therefore, it is necessary that those resources are ordered or ranked based on some criteria? -- that is to say, they have to be classified...
Firstly, the laws of the Instantaneous movement of different particles were analyzed in geometric view in this paper. The important conclusion “In the process of Particle Swarm Optimization (PSO) iteration, the movement diversity will be seriously weaken and the search ability will be greatly reduced as soon as a particle becomes the global optimal particle” was drawn. Then, for the purpose of improving...
Arabic information extraction processes have become a popular area of research. Many methods and approaches have designed and introduced algorithms to solve the problem of morphology and stemming of Arabic language. Each researcher proposed his own standards, testing methodology and accuracy measurements to test his algorithm. Therefore, we cannot make an exact comparison between these algorithms...
This paper presents a method to deliver course rankings that maintain student confidentiality while still allowing students to selectively prove their position in a class to others if they wish. The method's selective anonymity is implemented through a secure hashing algorithm that is designed to protect student privacy even where a student's name, their student ID, their project teams and the student's...
Cryptographic algorithm plays an important role to secure the confidential data while transmitting over the cloud. Modern cryptography offers a variety of encryption scheme for protecting the data. A key used for encrypting the plain text is another vital component on which the secrets depend. Advanced Encryption Standard (AES) algorithm is used in this research. This paper focus on developing a new...
This paper presents a very low power and area efficient ASIC implementation of Advanced Encryption Standard Algorithm (AES). The implementation results of S-Box, MixColumn Transformation and overall AES encryption/ decryption are given in this paper. The AES has been implemented in 90nm standard CMOS library using Synopsys Design Compiler with a core voltage of 1.2V. The power dissipation of S-Box...
Anti Torpedo Defense System (ATDS) is a very vast system with infinite geometrics and corresponding Tactical Solutions. Also, a few geometries do exist, where the Tactical Solution can never be arrived optimally. The Purpose of the system is to analyze the generated Tactical Solution which enhance the ships survivability against enemy Torpedo using the Optimal decoy deployment logic and maximizing...
To represent very large or small values, large range is required as the integer representation is no longer appropriate. These values can be represented using the IEEE-754 standard based floating point representation. This paper presents high speed ASIC implementation of a floating point arithmetic unit which can perform addition, subtraction, multiplication, division functions on 32-bit operands...
Due to the dynamic nature of the web plenty of webpages are deleted and added newly and as the web is large collection of data in form of the webpages or in the group of webpages as websites. So every time a surfer searches the web using the search engine, the data should be fresh and relevant. Due to the large size of web, corresponding to any query made by the user number of pages are being retrieved...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.