The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this article a number of engineering alternatives for integrated electronic product description system are analysed. The analysis objective of a set of engineering alternatives is formulated and a detailed description of the solution of the stated objective is presented. The most suitable algorithms in order to accomplish this aim are algorithms based on the use of methods of evolutionary modeling,...
Traditional mining algorithms did not suit mining of global maximal frequent itemsets. Therefore, a new mining algorithm of global maximal frequent itemsets for health big data, namely, NMAGMFI algorithm was proposed. Firstly, the global frequent items were mined. Secondly, local FP-tree was reconstructed by each node. Thirdly, the mining results were combined by the center node. Finally, the global...
In this paper we have proposed an innovative way to modify RSA algorithm in order to improve the security level of this scheme. The two-variable bijective mapping is utilized in this scope. A mathematical background of bijective function is discussed in order to understand the proposed technique. First of all the original RSA algorithm is discussed then the proposed modification methodology is explained...
Nowadays, an efficient image segmentation process as a preprocessing step provides important cues for numerous applications in human pose estimation, computer vision, objects recognition, tracking and image analysis. Many of the existing segmentation algorithms have high computational cost because of the segmentation foreground object from the large and complex-background images. But, some objects...
The paper shows relations between two different frequency representations of n-dimensional signals (n = 1, 2, 3): the Cayley-Dickson Fourier transform and the Hartley transform. The formulas relating the n-D complex Fourier transform and the n-D Hartley transform are presented. New formulas relating the Quaternion and Octonion Fourier transforms and respectively the 2-D and 3-D Hartley transforms...
The aim of this research is to investigate the transportation problem of a plastic packaging industry case study because at present, competition within the plastic packaging business requires good services and on time delivery. Therefore, customer complaints and delayed deliveries are major problems for this industry group and that is why it is required to create more reliability and satisfaction...
In this paper, a flower pollination algorithm (FPA) for the multiple sequence alignment (MSA) problem has been proposed. The FPA is a nature-inspired metaheuristic algorithm based on the pollination process of flowers flowering plants. MSA is an alignment of three or more sequences. MSA is used in many applications such as protein structure prediction, phylogenetic analysis, and genome primer identification...
Data mining is the process of extracting a meaningful information from raw data. Classical data mining algorithms can be used to extract an offline static model for classification problems which has a collected dataset. Unfortunately, Offline algorithms cannot give a solution for nowadays' technologies with streaming data. Streaming algorithms are proposed to deal with data-streams for online learning...
Nowadays the exponential growth of generation of textual documents and the emergent need to structure them increase the attention to the automated classification of documents into predefined categories. There is wide range of supervised learning algorithms that deal with text classification. This paper deals with an approach for building a machine learning system in R that uses K-Nearest Neighbors...
The analysis of data encryption algorithm performance is becoming an increasing concern. Since most of the algorithms are involved in other applications such as banking services, e-government and online applications, implementation issues are practical concerns. Many experiments have been proposed to compare these techniques based on several parameters such as encryption time, decryption time and...
Distributed database technology is supposed to have a remarkable impact on data processing in the next years. This paper overviews Data Fragmentations in distributed database system. We discussed in briefly distributed database environment, fragmentations and distributed databases design. We compared between the horizontal fragmentations, vertical fragmentations, and mixed fragmentations. The Correctness...
Balancing assembly and disassembly on parallel line together will positively affect to remanufacture production systems. In this study, two lines, which is one for assembly and other for disassembly, are considered as parallel line configuration. Parallelization of lines helps decrease the need for workforce significantly. Therefore, we propose heuristic approach based on ant colony optimization (ACO)...
This paper proposes a new keyword extraction method that uses bag-of-concept to extract keywords from Arabic text. The proposed algorithm utilizes semantic vector space model instead of traditional vector space model to group words into classes. The new method built word-context matrix where the synonym words will be grouped into the same class. The evaluation of new approach was conducted using dataset...
According to the wide developments in the area of communications, there is a demand for secure system for data transmissions. In this paper, a Hash system SHA-1 and SHA-2 Processor is designed using Xilinx Spartan-3AN. The implementation of the processor is done by using Multithreading MIPS (Microprocessor without Interlocked Pipelines) single cycle by choosing a certain number of instructions that...
In this work is presented new algorithm, called Truncated Hierarchical SVD (THSVD), aimed at the processing of sequences of correlated images, represented as third-order tensors. The algorithm is based on the multiple calculation of the matrix SVD for elementary tensors (ET) of size 2×2×2, which build the tensor of size N×N×N, when N=2n. The new approach is compared to closest famous hierarchical...
This intensification and diversification in Ant Colony Optimization (ACO) is the search strategy to achieve a trade-off between learning a new search experience (exploration) and earning from the previous experience (exploitation). The automation between the two processes is maintained using reactive search. However, existing works in ACO were limited either to the management of pheromone memory or...
Today, the manipulation on the digital images has become a very easy and professional process using the capabilities of photo editing tools with the wide and rapid development in information technology and computer industry. Image forgery can be used to hide or manipulate important information of official documents, which can be considered as a digital crime. Many algorithms can be used to detect...
Anomaly detection is the process of finding outlying records from a given data set. The aim of this paper is to study a well-known anomaly detection technique on the “Short Message Service Centre” server, used in the telecommunications field to handle and store messages. This server was studied in details, a script was written to gather all the required data that went through a cleaning phase and...
We propose the novel data analysis algorithm which allows to identify exactly the position of a given point as exterior, interior, or boundary relatively to an intersection of the finite number of pattern sets. Due to the special structure of the problem under study, this algorithm can be realized not only by sequential, but also by parallel computing on the basis of appropriate model decomposition.
Graph algorithms play an important role in several fields of sciences and engineering. Prominent among them are the All-Pairs-Shortest-Paths (APSP) and related problems. Indeed there are several efficient implementations for such problems on a variety of modern multi- and many-core architectures. It can be noticed that for several graph problems, parallelism offers only a limited success as current...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.