The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Despite the fact that cooperative localization approaches stand well in Wireless Sensor Networks (WSNs), they impose challenge of increased energy consumption resulting from the important communication overhead required to accomplish the localization task. In this paper, we developed an Energy Aware Cooperative Localization approach (EACL) based on using a recursive localization system. Obviously,...
Modern methods of a three-dimensional digital model of the surface of objects with high accuracy were presented. The method of solving this problem by modulating the light intensity, which scans the object, was proposed. This allows increasing both the speed and the resolution of the scanner due to reducing degradation of the scanning line and capabilities to accurate reference subject position profile...
Almost all studies on course recommenders in online platforms target closed online platforms that belong to a University or other provider. Recently, a demand has developed that targets open platforms. Such platforms lack rich user profiles with content metadata. Instead they log user interactions. We report on how user interactions and activities tracked in open online learning platforms may generate...
We are living in the 21st century in which technological advances have greatly improved the quality of human lives. However nature keeps presenting its challenges in the form of tsunamis, floods, wild fires, hurricanes, volcanoes, etc. Excellent evacuation route planning is of paramount importance to reduce loss of lives during such disasters. The parameters of finite time lined capacity of evacuation...
Email is a rapid and cheap communication medium for sending and receiving information where spam is becoming a nuisance for such communication. A good spam filtering cannot only be achieved by high performance accuracy but low false positive is also necessary. This paper presents a combining classifiers approach with committee selection mechanism where the main objective is to combine individual decisions...
This paper contains a description of methods and algorithms for solving the generalization problem in intelligent decision support systems. For this purpose the argumentation approach for inductive concept formation is used. The methods for finding the conflicts and the generalization algorithm based on the rough set theory are proposed. It is suggested to use the argumentation, based on defeasible...
Bug triaging and assignment is a time-consuming task in big projects. Most research in this area examines the developers' prior development and bug-fixing activities in order to recognize their areas of expertise and assign to them relevant bug fixes. We propose a novel method that exploits a new source of evidence for the developers' expertise, namely their contributions to Q&A platforms such...
Principal component analysis (PCA) is a commonly used method for feature extraction and dimensionality reduction. This paper proposes PCA based on similarity/correlation criteria instead of covariance to gain low-dimensional features with high performance in text classification. Experimental results have demonstrated the advantages and usefulness of the proposed method in text classification in high-dimensional...
Automatic language identification is a natural language processing problem that tries to determine the natural language of a given content. In this paper we present a statistical method for automatic language identification of written text using dictionaries containing stop words and diacritics. We propose different approaches that combine the two dictionaries to accurately determine the language...
The question how to manage the contradictive requirements of accuracy and compactness in classification systems remains an important question in machine learning and data mining. This paper proposes a approach that belongs to the domain of fuzzy rule-based classification and uses the method of rule granulation for error reduction and the method of rule consolidation for complexity reduction. The cooperative...
In many practical situations, we make predictions based on the measured and/or estimated values of different physical quantities. The accuracy of these predictions depends on the accuracy of the corresponding measurements and expert estimates. Often, for each quantity, there are several different sources of inaccuracy. Usually, to estimate the prediction accuracy, we first combine, for each input,...
In this paper, we propose a fast and economic strategy for the integration of new classes on the fly into evolving fuzzy classifiers (EFC) during data stream mining processes. Fastness addresses the assurance that a newly arising class in the stream can be integrated in a way such that the classifier is able to correctly return the new class after receiving only a few training samples of it. Economic...
The sequential covering strategy has been and still is a very common way to develop rule learning algorithms. This strategy follows a greedy procedure to learn rules, where, after each step one rule is obtained. Recently, we proposed a new sequential covering strategy that allowed the review of previously learned knowledge during the learning process itself. This review of knowledge allowed the algorithm...
The advantages of multi-classification schemes based on decomposition strategies, and especially the One-vs-One framework, have been stressed even for those algorithms that can address multiple classes. However, there is an inherent hitch for the One-vs-One learning scheme related to the decision process: the non-competent classifier problem. This issue refers to the case where a binary classifier...
This work investigates the discriminative power of wavelet decomposition based texture features in forest cover classification. Our texture features are used as inputs in a random forests classifier. The performances of this tree-based ensemble classifier are assessed by classification accuracy as well as classification confidence provided by an unsupervised version of ensemble margin. The effectiveness...
This paper addresses the problem of text normalization, an often overlooked problem in natural language processing, in code-mixed social media text. The objective of the work presented here is to correct English spelling errors in code-mixed social media text that contains English words as well as Romanized transliteration of words from another language, in this case Bangla. The targeted research...
In this paper, a fall alarm and abnormal inactivity detection system is implemented on Raspberry Pi for security surveillance of empty-nesters in real time environment. We propose a novel method for fall alarm with a small amount of computing and we also present an inactivity detection method which we named "inactivity history" method to improve the accuracy of detection and it is a kind...
In recent years, the damage caused by botnets has increased and become a big problem. To solve this problem, we proposed a method to detect unjust C&C servers by using Hayashi's quantification theory class II. This method is able to detect unjust C&C servers, even if they are not included in a blacklist. However, it was predicted that the detection rate for this method decreases with...
In the field of spam detection, concentration methods have been proposed for feature construction in recent years, which convert emails into fixed length feature vectors. This paper presents a novel method aiming to break through the limit of feature vector's length. Specifically, the method uses a fixed-length sliding window to divide each email into several sections. The number of sections depends...
Web attacks that exploit vulnerabilities of web applications are still major problems. The number of attacks that maliciously manipulate parameters of web applications such as SQL injections and command injections is increasing nowadays. Anomaly detection is effective for detecting these attacks, particularly in the case of unknown attacks. However, existing anomaly detection methods often raise false...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.