The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We investigate computational complexity of a task of optimizing multi-machine execution of analytical data processing operations. We concentrate on an example of aggregation queries in Infobright's database engine, which is designed using the paradigms of rough sets and granular computing. The task is to optimize decomposition of data blocks and aggregation groups among machines having access to a...
Temporal functional dependencies (TFDs) add valid time to classical functional dependencies (FDs) in order to express data integrity constraints over the flow of time. If the temporal dimension adopted is an interval, we have to deal with interval-based temporal functional dependencies (ITFDs for short), which consider different interval relations between valid times of related tuples. The related...
Real-time performance is necessary in applications involving on-line handwriting recognition. However, conventional approaches usually wait until the entire curve is traced out before starting the analysis, inevitably causing delays in the recognition process. In regards to the Arabic script, the postponed analysis may be attributed to the cursive and unconstrained nature of the Arabic writing system,...
Business process automation improves organizations' efficiency to perform work. In existing business process management systems, process instances run independently from each other. However, synchronizing instances carrying similar characteristics, i.e., sharing the same data, can reduce process execution costs. For example, if an online retailer receives two orders from one customer, there is a chance...
In this paper, we propose a novel low complexity on-chip ECG data compression methodology targeting remote health-care applications. This is to the best of our knowledge the first attempt for on-chip reliable data compression. The proposed methodology has been implemented targeting Application Specific Integrated Circuit platform at 1MHz at Vdd 1.62V for UMC 130nm technology library with 16 bits system...
Proteins have very important role in cellular processes. Proteins doesn't work alone, rather they interact together to perform various cellular events. Protein protein interaction means physical contact between two or more proteins as a result of certain biochemical events. There are several examples for protein interactions. Cell transduction, cell metabolism, muscle contraction are some of them...
We propose a gender classifier using two types of local features, the gradient features which have strong discrimination capability on local patterns, and the Gabor wavelets which reflect the multi-scale directional information. The Real Ad a Boost algorithm with complexity penalty term is applied to choose meaningful regions from human face for feature extraction, while balancing the discriminative...
Owing to the opportunistic nature of its operation principle, the performance of Dynamic Spectrum Access/Cognitive Radio (DSA/CR) systems depends on the spectrum occupancy pattern of primary systems. DSA/CR systems can monitor periodically the occupancy state of licensed channels in order to gain statistical information on their occupancy patterns, and exploit this information in decision-making processes...
Local features have been widely used in many computer vision related researches, such as near-duplicate image and video retrieval. However, the storage and query cost of local features become prohibitive on large-scale database. In this paper, we propose a representative local features mining method to generate a compact but more effective feature subset. First, we do an unsupervised annotation for...
Big data is a popular term for describing the exponential growth, availability and use of information, both structured and unstructured. Much has been written on the big data trend and its potentiality for innovation and growth of enterprises. The advise of IDC (one of the premier advisory firm specialized in information technology) for organizations and IT leaders is to focus on the ever-increasing...
Threats to modern ICT systems are rapidly changing these days. Organizations are not mainly concerned about virus infestation, but increasingly need to deal with targeted attacks. This kind of attacks are specifically designed to stay below the radar of standard ICT security systems. As a consequence, vendors have begun to ship self-learning intrusion detection systems with sophisticated heuristic...
A considerable number of domains deal with large and complex volumes of temporal data. The management of these volumes, from capture, storage, search, transfer, analysis and visualization, still provides interesting challenges. One critical task is the efficient retrieval of data (raw data or intermediate results from analytic tools). Previous work proposed the TravelLight method which reduced the...
User authentication depends largely on the concept of passwords. However, users find it difficult to remember alphanumerical passwords over time. When user is required to choose a secure password, they tend to choose an easy, short and insecure password. Graphical password method is proposed as an alternative solution to text-based alphanumerical passwords. The reason of such proposal is that human...
This paper introduces the present development and situation of computer games, especially in connect6. Through the regulations of computer games in connect6, it is described that main technologies and principles are existing in the connnect6 game. According to the algorithm and application of other mature computer games, the five steps of connect6 method and skill is improved to be advanced and modified...
Space information system (SIS) is a typical complex system, which challenges traditional modeling methods. Agent-based modeling and simulation (ABMS) can be an appropriate and effective approach to modeling and simulation of SIS. Firstly, the advantages and basic concepts of ABMS are introduced briefly. Secondly, the complexity of SIS is analyzed, and it is concluded that the complexity of SIS results...
Computer-aided drug design techniques are important assets in pharmaceutical industry because of their support for research and development of new drugs. Molecular docking (MD) predicts specific compound's binding modes within the active site of target proteins. Since MD is a time-consuming process, existing approaches reduce the number of receptors or ligands in docking by evaluating only small sets...
This paper presents to the improvement of the Significant Matrix [1] that works along with Genetic Algorithm in feature selection of appropriate data for a decision tree structure. This work proposes the reduction of time that cut off the Genetic Algorithm's work times. The new method is proposed in the name “Significant Matrix 2” which is calculated from the relationship between categorical data...
Testing is an important activity on the project life-cycle. Test suites are generated from system models and can be explicit or not. This generation can follow a hand-crafted approach or an automated one, using strategies such as model-based testing (MBT). The literature acknowledges MBT advantages, but to the best of our knowledge most successful reported experiences are case studies. There are few...
Cloud offers numerous technical middleware services such as databases, caches, messaging systems, and storage but very few business middleware services as first tier managed services. Business middleware such as business process management, business rules, operational decision management, content management and business analytics, if deployed in a cloud environment, is typically only available in...
This paper focus, to reduce the computational complexity in face detection and to improve the accuracy rate of face recognition. Viola jones algorithm is used for the face detection. There exist challenges in pre-processing stages like illumination, noise reduction, low resolution, which has to be faced. These problems can be overcome by hue saturation for illumination, median filters for noise reduction...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.