The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we apply efforts to explore the insights of sustainable development of states and to develop a model based on factor analysis aiming at evaluating sustainability in a qualitative and quantitative method, thus distinguishing more sustainable countries which can help elaborate sustainable development plans, and evaluate the effectiveness of such plans. We use the term Comprehensive Sustainability...
In this paper we describe the second stage of developing new Situation Awareness Training and investigation of its effectiveness on improving cognitive intercommunication with e-learning system. Situation Awareness training enhance of attentiveness as well as increase of exam's GPA and nonverbal intelligence indexes had been observed. Improvement of the exam results, mediated by attention increase,...
Wireless sensor network can deliver environment data in campus area as CO, NO2, HC, particulate matter, temperature, humidity, and luminous intensity to provide accurate realtime data. This realtime environment data is used for environment indexing accurately, and then can be developed in an expert system. This expert system collects input data from the sensor. This expert system will help giving...
This paper presents a derivation of four radix-2 division algorithms by digit recurrence. Each division algorithm selects a quotient digit from the over-redundant digit set {−2, −1, 0, 1, 2}, and the selection of each quotient digit depends only on the two most-significant digits of the partial remainder in a redundant representation. Two algorithms use a two’s complement representation for the partial...
Image inpainting is the meaningful reconstruction of lost, damaged or unwanted portions of an image by using the information from the proper undamaged portions of the same image. Image inpainting is an important process in image pro- cessing and has numerous applications in heritage conservation, restoration of old photographs, removal of occlusions, special effects in photos and so on. Here we replace...
Content-Based Image Retrieval (CBIR), a technique which uses visual contents to search images from large scale image databases according to users interests. In most of image retrieval systems, accurate and partial relevant matching is main issue. Partial duplicate image retrieval is most complicated task as region of interest may undergo occlusion, rotation, scaling and other transformations. Retrieval...
Trust is one of most important factor for selecting suitable trading partner in B2B e-market. There is no such single element on which trust can be measured it is conceptualized in different levels and methods. In this paper we proposed a cognition based trust model to measure trustworthiness of businesses in B2B e-market. This paper reports on design details of our model and empirical validation...
In this paper we propose a method for producing a citation summary of research articles that concentrates on the context of articles which cite the given article. Parameters for citation summary are selected in such a way that, this citation summary can be used to evaluate a qualitative citation index for the research articles. Considering some factors such as, semantic similarity between the citing...
Delay Tolerant Networks(DTNs) is network architecture designed to enable communication even in an unstable network connectivity between end. Nodes can't be pre-selected for a route because they can't know the information of the entire network. Therefore, the relay node should be selected effective to improve network performance. So the movement prediction scheme of the node is needed for this. In...
Based on the vector similarity theory, a new method of node importance ranking is proposed in this paper. The paper introduces four typical evaluation index of the node importance and points out their common faults. And the basic theory and steps of the vector similarity are discusses in detail. Finally, an example shows that the effectiveness and practicality of this method by the comparison of node...
Sparse matrix-vector multiplication (shortly spMV) and transposed spMV (shortly spMTV) are the most common routines in the numerical linear algebra. Sparse storage formats describe a way how sparse matrices are stored in a computer memory. Since the commonly used storage formats (like COO or CSR) are not sufficient for high-performance computations, extensive research has been conducted about maximal...
In this paper, first, we point out that fuzzy integers are not special cases of fuzzy numbers. Then, we define the concept of fuzzy integers, develop the methods for establishing rankings and total orderings on sets of fuzzy integers, and discuss the interrelationships between rankings and total orderings.
The aim of this paper is the simultaneous minimization of model error and model complexity for the Choquet integral. The Choquet integral is a generator function, that is, a parametric function that yields a wealth of aggregation operators based on the specifics of the underlying fuzzy measure (aka normal and monotonic capacity). It is often the case that we desire to learn an aggregation operator...
Nowadays energy efficiency and its various aspects has been taken into consideration significantly. Also, non-linear loads have been increasing tragically while absence of supervision on their harmonic contents are quite obvious. These loads are extensively used in residential and commercial parts. Such a widely use of non-linear loads are in building lighting structure when Compact Fluorescent Lamps...
On behalf of the FGCT 2015 conference, the program committee has the pleasure to welcome the attendees to participate in the Fourth edition of the International Conference on the Future Generation Communication Technologies (FGCT 2015) which is dedicated to addressing the challenges in computing technologies for the new generation.
DNA computing has attracted the eyes of many researchers in recent years to solve NP-complete problems. It over-performs conventional computers due to its inherent massively parallelism nature. But to make it generally applicable, problems those are very much implement able on conventional computers, should also be implement able on a DNA computer. To implement those problems, data structures are...
This paper proposes a novel extension on Non-negative Matrix Factorization (NMF) scheme for the separation of single channel speech mixtures, where we impose a post-sparse model on the original weight matrix derived from a previously proposed coherence-constrained NMF model. The approach considers both the modeling ability of NMF basis functions for each source as well as the ability of these basis...
Recently, Big Data processing is becoming a necessary technique to efficiently store, manage, and analyze massive data obtained by social media contents. NoSQL is one of databases that efficiently handle Big Data compared to the traditional database that has the limitation to manipulate Big Data. Log-structured key/value store, widely used in NoSQL, basically stores data into the disk storage in batch...
Mobile learning is potential and valuable in education. However, most of previous developing strategies of m-learning were analyzed by means of individual knowledge, experience, judgment, and statistic software. Although these methods provide systematic steps for the implementation of m-learning strategies, the correlation between factors cannot be considered thoroughly through the steps, and it is...
Response effect assessment of Internet public opinion is a very important aspect of Internet public opinion response. It can summarize the response and handling works of public opinion and make it clear to the advantages and disadvantages during the process, and then provide guidance to future work. This paper presents assessment program for response effect of Internet public opinion used AHP and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.