The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents a simple, efficient and reliable method to obtain extremely fast load flow solutions using Power Perturbation method. The proposed method shows its effectiveness with minimum number of iterations along with high accuracy on conventional load flow methods like N-R (Newton-Raphson) method. The proposed method has been applied on different IEEE 5 bus, 14 bus, 30 bus, 57 bus and 118...
Text Mining is important, emerging, research area, because plenty of text resources growing rapidly through the internet and digital world. In the text data analysis text categorization is one of the vital techniques. Traditional text categorization methods are not able to handle well with learning across different domains. Cross-domain classification is more challenging problem than single domain...
Malicious code detection based on behaviors is the development direction of anti-virus techniques. However, the current detection methods based on this theory expose several problems such as the unclearness of behavior sequence analysis and the high false negatives. For this situation, this paper proposes a malicious code detection method based on least-squares estimation. In this method, it correlates...
Quantum cryptography such as BB84 is a quantum protocol for sharing classical information, but is not a scheme for encrypting quantum information itself. This paper considers that quantum information is encrypted with the quantum circuit of the Even-Mansour cipher. It has been proved that breaking the Even-Mansour cipher requires exponential time in the key length using any classical algorithm. This...
Data has multi-view representations from various feature spaces in real world. Multi-view clustering algorithms allow leveraging information from multiple views of the data and this may substantially improve the clustering result obtained by using a single view. In this paper, we propose a novel algorithm called Collaborative PLSA (C-PLSA) for multi-view clustering, which works on the assumption that...
This paper presents the theory and applications of rectangular based binary image representation (RBIR). An automatic method is proposed to convert original binary image into RBIR. Some applications directly derived from RBIR are introduced. RBIR lossless compression is comparable with the run-length encoding (RLE) compression. Efficient algorithms are proposed for computing the dilation/erosion from...
The authors wish to correct an error made in a publication submitted to the sixth Argentine School of Micro-Nanoelectronics, Technology and Applications (EAMTA 2011). The paper entitled “Analysis of time delay difference due to parametric mismatch in matched filter channels” has a mistake in the results of the theorem proposed.
Musical instruments have evolved manifolds in the past 50 years. From simple percussion and acoustic instruments, they have evolved into their electronic counterparts. With this evolution and the fact that these counterparts are in extensive use these days, comes the need to process these input electric signals using computers to produce the desired results and outputs. The input signals can be processed...
Some quantum key distribution (QKD) technics — BB84, B92 [4], [5] for example — have a gain problem comparing the fnal key to the generated pulses of quantum particles. RUQB [1] technique improves the gain of BB84 by 5.5%, the improvement was achieved by fnding the relationship among the random bits that where initially generated, then exchanging this relationship to aid in recovery of some lost bits...
Groundwater flow simulation has become one of the top international issues in new generation of environmental applications. When managing large-scale groundwater flow problems, the intensive computational ability and large amounts of memory space required for modeling are the main bottlenecks for researchers. In order to solve three-dimensional large-scale groundwater flow problems more rapidly, the...
We present a new concept for quantum computation and algorithms along with its theoretical understanding of quantum physics. We formulates the quantum logic and cognition of mind in general as the eigen value problems with the introduction of cognitive quantum number(CNQ), which interprets that the measurement act in the quantum domain parallels a decision process in domain of logic and it translates...
There are hundreds or thousands of web data sources providing data of relevance to a particular domain on the Web, so how to find a suitable set of sources quickly to integrate from a number of sources is becoming more and more important. Traditional data sources selection methods that are based on data quality do not consider quality characteristics of data sources under the different domains, but...
The object of this paper is to establish a useful mathematical model to predict the method which is used by Lenardo to get the roots of some special three times equation. According to the Mathematical yearbook, there exists no means to work out equations of higher degree during the year 1 AD to 1280AD. Considering the time complexity and solving feasibility with the multi-objective optimization, we...
Ternary perfect sequences, which include the binary perfect sequences as special cases, are introduced. The new notions of elementary transformations on ternary perfect sequences are brought forward. Necessary conditions for ternary perfect sequences with k zero elements are proposed. It is proved that there exist no ternary perfect sequences of even lengths with one zero element, and no ternary perfect...
This paper surveys a short study about using and applying symbolic processing to direct execution of the expectation-maximization algorithm. Formulas are derived in the manner defined by the expectation-maximization algorithm and how there are applied. Symbolic processing uses the set of equations on the same way that describe expectation maximization algorithm without any adaptation and loops of...
A new design code structure for Spectral Amplitude Coding with zero cross- correlation in Optical Code Division Multiple Access (OCDMA) has been proposed in this paper. The proposed code called Modified Zero Cross Correlation Code (MZCC). MZCC code provides much easier code construction, given any number of users K and weights to have minimum code length. MZCC code will be demonstrated using OptiSys...
With the universal presence of short-range connectivity technologies (e.g., Bluetooth and, more recently, Wi-Fi Direct) in the consumer electronics market, the delay-tolerant-network (DTN) model is becoming a viable alternative to the traditional infrastructural model. Proximity malware, which exploits the temporal dimension and distributed nature of DTNs in self-propagation, poses threats to users...
This paper is based on an existing distributed system TRAK for network performance measurement. In TRAK system, SVG is used to draw a series of result line charts, however, it's impossible to display all the data in just one single webpage. In this paper we introduce an improved line simplification algorithm to reduce the result data set without changing the perceptual characteristics of the result...
In computer algebra there are different ways of approaching the mathematical concept of functions, one of which is by defining them as solutions of differential equations. We compare different such approaches and discuss the occurring problems. The main focus is on the question of determining possible branch cuts. We explore the extent to which the treatment of branch cuts can be rendered (more) algorithmic,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.