The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Many real situations require to find a point to point shortest path having special properties, matching non standard requirements and fulfilling unusual conditions and constraints. It is hard to write a mathematical model for just mentioned problems. One way how to solve this task is to enumerate certain number of shortest paths and to choose from them the most convenient one. There are several k-shortest...
Performance evaluation of parallel applications plays an important role in High Performance Computing (HPC). This is also applied to parallel I/O performance evaluation, which requires understanding the I/O pattern of the application and having knowledge about the performance capacity of the HPC I/O system. In this paper, we present a methodology to evaluate the I/O performance of parallel applications...
With the increase in the number of user reviews on user review sites, useful tools for extracting good and bad points of services so that users can easily and intuitively understand the quality of the services are required. If the annotations are selected from the pre-defined list, there can always be missing keywords. Supervised annotation approaches would suffer from the same problem. In this paper,...
In this paper, we propose a high capacity text steganography method using Huffman compression. The forward email platform is used to hide the secret data. We make use of the number of characters used in email id to indicate the hidden secret data bits. So, to make optimal utilization of number of characters in email ids, the characters added to the email id to indicate the secret data bits are taken...
This paper proposes a fuzzy relational clustering (FRC) to find similar sentences from a set of sentences as well as group them in clusters. For finding similar sentences here FRC used both word-to-word and order similarity. For word-to-word similarity FRC used Jiang and Conrath similarity measure (JnC) with the help of WordNet database. Order similarity is calculated from joint word set. As a sentence...
Data stream mining is an emergent research area that investigates knowledge extraction from large amounts of continuously generated data, produced by non-stationary distribution. Novelty detection, the ability to identify new or previously unknown situations, is a useful ability for learning systems, especially when dealing with data streams, where concepts may appear, disappear, or evolve over time...
Wang et al. proposed a histogram shifting imitation based reversible data hiding scheme in 2013. They used the peak points of image intensity-based segments, instead of utilizing the peak point of an histogram. Their scheme has the limitation of the embedding capacity due to the embedding method. In this paper, we propose an improved data hiding scheme using median edge detection (MED) and hexadecimal...
We investigate the structure of quantizer rules at the local sensors in distributed detection networks, in the presence of eavesdroppers (Eve), under asymptotic regime (number of sensors tending to infinity) for binary hypotheses. These local quantizers are designed in such a way that the confidentiality of sensor data is preserved while achieving optimal detection performance at the fusion center...
Specific sample point was a kind of noise that must be excluded from original data in the process of data mining and machine learning. A new filter method of specific sample points based on partial least-squares analysis was introduced in this paper. Two conceptions of true and false specific sample points were given and their relationship was elaborated in detail. The paper defined the critical value...
This paper deals with autoregressive models of singular spectra. The starting point is the assumption that there is available a transfer function matrix W(q) expressible in the form D-1(q)B for some tall constant matrix B of full column rank and with the determinantal zeros of D(q) all stable. It is shown that, even if this matrix fraction representation of W(q) is not coprime, W(q) has a coprime...
In case that the traffic resource is limited, cross-border traffic has great impact on urban transportation, and it is necessary for us to study characteristics of Lanzhou cross-border traffic network. In this paper, the characteristics of cross-border traffic network are studied from different aspects based on the theory of complex network. Results show that Lanzhou cross-border traffic network has...
After analyzing the curvature expression, the inflection points were given by the known planar cubic Bezier control polygon information. Based on that, we proposed an algorithm that can quickly and accurately obtain the shape characteristic points of curve. Experimental results show that the algorithm is rapid, accurate, and robust.
In the process of data mining, a major obstacle of using mathematical analysis to study the patterns and trends hidden in the data is the specific sample points existed in large-scale data sets. According to the ratio of specific sample points to the sample size, taking into account other factors at the same time, specific sample points may be divided into true and false specific sample points. For...
The paper studies the position calibration of matrix transformation in the plane coordinate system, and it proposes transition matrix which uses different kinds of plane coordinate systems according to the matrix transformation to establish the method of non-redundant equation drawing from the position calibration model in different plane coordinate systems. The paper also expounds the method of solving...
In this paper, we propose a framework for deploying and configuring a set of given sensors in a synthetically generated 3-D terrain with multiple objectives on conflicting attributes: maximizing the visibility of the given terrain, maximizing the stealth of the sensors and minimizing the cost of the sensors used. Because of their utility-independent nature, these complementary and conflicting objectives...
Online consumers are inherently assuming high level of transaction uncertainty since the consequence of the transaction cannot be perfectly predicted. This research explores how two kinds of seller-provided transaction information acquired by utilizing different IT artifacts affect the online consumers' transaction uncertainty. We also further investigate, when the target online sellers hold different...
Based on secondary analysis techniques to identify specific sample point using partial least-squares analysis method, the recognition method of specific sample point of two-dimensional floor plan of ellipse T2 was extended to three-dimensional figure of ellipsoid T2 and high-dimensional space of hyper- ellipsoid T2. Another Identification method of specific sample point making use of hierarchical...
Given the rise of phishing over the past 5 years, a recurring question is why users continue to fall for these scams? Various technical countermeasures have been proposed to try and counter phishing, and none have yet comprehensively succeeded in preventing users from becoming victims. This paper argues that an explicit model of user psychology is required to understand user behaviour in (a) processing...
The new model of teletraffic is proposed. This model has two components. It is shown that it is possible to select the parameters of this model in such way that the conditions of slow growth and fast growth for the first and second components hold and under some common normalization the process of aggregated traffic converges to some limit process which is the sum of stable levy motion and fractional...
This paper introduces an approach to classifying emails into phishing/non-phishing categories using the C5.0 algorithm which achieves very high precision and an ensemble of other classifiers that achieve high recall. The representation of instances used in this paper is very small consisting of only five features. Results of an evaluation of this system, using over 8,000 emails approximately half...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.