The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This work models the traffic congestion minimization as the multicommodity flow problem, which minimizes the amount of vehicles that travels in the same streets. Based on two constructive heuristics proposed in this study (Random Routes and Sorted Routes), we have developed and evaluated four new heuristics, being two local search and two metaheuristics of reactive GRASP. The results have shown that...
A wireless sensor network usually has a large amount of nodes deployed in a area to report ambient reading, to detect abnormal events, or to monitor the region. Each sensor performs several tasks, such as computing, sensing and communicating. A node equipped with multiple sensors is able to participate in many sensing tasks to improve measurement accuracy. However, the contribution a new node can...
Over the past decades the pico/nano-satellite (PNS) has gradually become an important direction of small satellites. As a crucial subsystem of PNS, the attitude determination and control system (ADCS) should pass a full set of strict ground tests before launch. Due to the low cost and short period of PNS manufacturing process, as well as the requirement of “test while designing”, this paper presents...
Introducing the principle of symbolization and conceptualization, we present the algorithm for evolution of language of the machine mind. We verify the algorithm by sequential program in Haskell, introducing intermediate and output forms of language produced in each algorithm step. The output form is a fine-grained parallel and non-redundant structure of the machine mind language in a supercombinator...
Rapid growth in the cache sizes of Chip Multiprocessors (CMPs) to support high performance applications will lead to increase in wire-delays and unexpected access latencies. NUCA architectures help in managing the capacity and access time for such larger cache designs. Static NUCA (S-NUCA) has a fixed address mapping policy whereas dynamic NUCA (D-NUCA) allows blocks to relocate nearer to the processing...
Hierarchical graphs propose an important class of graphs for modeling many real applications in software and information visualization. Actually, the ability to construct area-efficient drawings is essential in many practical visualization applications. In this paper, we consider the problem of the drawing area needed to draw a hierarchical graph in the grid. We applied practical analysis in order...
Every human being has predefined movement in their regular social life. This predefined movement of user is very much useful in cellular network. Using supervise learning methods we can able to find out mobility patterns of mobile users in cellular network, which is useful to divide mobile users in various categories. Based on these categories we can develop algorithms which can help cellular network...
Approximate string matching is the problem of finding all factors of a text t of length n with a distance at most k from a pattern x of length m ≤ n. Fixed-length approximate string matching is the problem of finding all factors of a text t of length n with a distance at most k from any factor of length h of a pattern x of length m ≤ n, where h ≤ m. It is thus a generalisation...
Though multi-agent formation and consensus have been studied intensively recently, very few of the research focuses on their engineering realization using rotor-craft unmanned air vehicle (UAV) as the basic platform. Some assumptions in many theoretical study present challenges in engineering realization, such as the over-simplified dynamic model or sensor model of each agent. In this paper, we present...
As mobiles become a ubiquitous, they are used more and more for operations that may involve sensitive data or huge amounts of money. The mobile is also increasingly being used as the tool of preference for browsing and using the Internet. Hence, new security measures must be developed to support increased functionality of these devices, to protect users in the case of any mishap. Authentication using...
Online signature recognition is one of the important behavioral biometric trait. This signature has information of x, y, z variations, pressure, azimuth of pen tip, altitude of pen tip. This makes online handwritten signature based biometric system more accurate than the static ones. In this paper new set of features are proposed for online or dynamic signature recognition. Geometric centers, Grid...
Cloud computing provides attractive solutions for dispatching services over the Internet. With the increase of more and more Internet users, the job of allocating the resources by the cloud providers has become a challenging task. In this paper, a new technique called Drip Based Resource Allocation (DBRA) is proposed for allocating cloud resources or Physical Machines (PMs) to the incoming jobs using...
Cloud computing is increasingly popular in recent years. As an application of cloud computing, cloud workflow is widely applied in scientific research and commercial field. And the cloud workflow scheduling problem is a major concern of the research on cloud workflow application. To study the state of the art of cloud workflow scheduling, some efforts are made and presented in this paper. Firstly,...
For a long time now, researchers have worked on defining different metrics able to characterize the importance of nodes in networks. Among them, centrality measures have proved to be pertinent as they relate the position of a node in the structure to its ability to diffuse an information efficiently. The case of dynamic networks, in which nodes and links appear and disappear over time, led the community...
This paper presents a new Artificial Bee Colony algorithm for solving the capacitated vehicle routing problem. The main novel characteristic of the proposed approach relies upon an efficient way of coordinating, for each group of bees, a well-defined focus of work. In the algorithm, we provide two specializations namely diversification and intensification where the former is controlled by the employed...
The Game of the Amazons is a two-player abstract territory game. It has attracted attention in game research because of its simple rules and its complexity of play. A number of Amazons-playing programs have emerged in recent years. Different search algorithms are used in Amazons programs. Minimax is one of the most commonly used Amazons search algorithms. It is usually optimized with augmentations,...
The concepts and processes of computer programs and algorithms are often found difficult to learn and teach. However, software visualization is an alternative tool to facilitate learning and teaching of those abstract and dynamic entities. In this study, experiments and interviews were carried out to explore the perceived utility of combining animations and text with audio in software visualization...
As modern computer systems become increasingly complex in infrastructure and usage, the demand for capabilities of detecting anomalous behavior has grown urgent. Although techniques for point anomaly detection have been proposed and adopted in practice, behavior anomaly detection still lacks effective approaches due to its inherent complexities. We present a new anomalous behavior detection model...
Deoxyribonucleic acid (DNA) is a molecule that encodes unique genetic instructions used in the development and functioning of all known living organisms and many viruses. This Genetic information is encoded as a sequence of nucleotides (adenine, cytosine, guanine, and thymine) recorded using the letters A, C, G, and T. DNA querying or alignment of these sequences required dynamic programming tools...
Motivated by the concept of reverse signed domination, we introduce the reverse minus domination problem on graphs and study the problem from the algorithmic point of view. For strongly chordal graphs and distance-hereditary graphs, we show that the reverse minus domination problem can be solved in polynomial time. We also show that the problem is linear-time solvable for trees. For chordal graphs...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.