The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
There have been extensive research to systematically tailor terahertz (THz) plasmonics structures to support strong resonant modes as platforms for designing practical nano and microscale devices with high efficiency and tunability. Here, using a symmetric four-member assembly of plasmonic vee-shaped structures, we introduce a quadratic, multiresonant plasmonic THz antenna to support significant resonant...
Social Networks are evolving rapidly to have a significant number of users using or joining their platforms daily, and a huge volume of information exchange and flow continuously. As human is the center of all information traffic, the information propagation became subjected to the relations and influences between the sources of these information and their followers or fans, these influences might...
We develop an unconditionally stable matrix-free time-domain method for analyzing general electromagnetic problems discretized into arbitrarily shaped unstructured meshes. This method does not require the solution of a system matrix, no matter which element shape is used for space discretization. Furthermore, this property is achieved irrespective of the time step used to perform the time domain simulation...
Digital image contour is rich in image information, many applications are based on accurate tracking of the target contour. Image contour features fuzziness and non-uniformity, so that contour extraction method based on automatic delineation can easily cause inaccurate partition, while manual partition method has poor efficiency and instantaneity. Considering accuracy and efficiency of two-dimensional...
Data mining has gained much importance in the field of research these days. It makes perfect blend for analyzing data of any fields and provide decision based output. Data generation and storage these days are done at high speed. Non stationary systems play holistic role in providing such data. Availability of such data creates scope of analysis for researchers. Such data which are continuous, unbounded,...
This paper firstly shows the uncanny link between Celtic art and fractal images and then describes how an experimental fractal image generation tool can be used to create self-similar patterns that resemble Celtic art. Both Celtic art designs such as the spiral pattern and fractal images contain common features such as self-similarity and scaled repeating images that can be created from iterating...
Due to the gradient-free mechanism, flexibility, high local optima avoidance, and simplicity, meta-heuristics have been reliable alternatives to conventional optimisation techniques over the course of last two decades. This has resulted in the application of such techniques in diverse branches of science and technology. Despite all the successful applications, meta-heuristics are less effective in...
Cuckoo search is a powerful nature-inspired metaheuristics recently introduced by Prof. Xin-She Yang to solve difficult optimization problems. In this paper, we apply this method to solve a very difficult problem: the reconstruction of outline curves of computer fonts with single curves. In particular, we wish to obtain the underlying shape of the outline curves from a set of noisy data points assumed...
The decomposition method in multiobjective evolutionary algorithms (MOEA/D) is an effective approach to evolve solutions along predefined weight vectors for solving multiobjective optimization problems (MOPs). However, obtaining evenly distributed weight vectors for different types of MOPs is a challenge problem especially when the true Pareto fronts (PFs) are unknown before a MOEA/D starts. In this...
In this study, we present a new approach to the problem of face classification, which relies on the linguistic description of the facial features. In this method, face descriptors are represented through the Analytic Hierarchy Process (AHP) and formalized as information granules. Moreover, neural networks are used to construct efficient classifiers. Furthermore, with usage of AHP we realize a transition...
There is high need for data encryption. Accordingly, there are several techniques to encrypt and encode data. Unicode has become a unified global coding system. The special feature of Unicode system is that it can be expanded and it is adopted by many computer fonts' ready-package programs. This research work uses FontCreator program, which adopts unified global coding system, to generate computer...
Red blood cell classification and counting plays a very important role in detecting diseases like iron deficiency anemia, vitamin B12 deficiency anemia etc. In this research we intend to develop a standalone application that can classify the red blood cells into four abnormal types namely elliptocytes, echinocytes, tear drop cells and macrocytes. We will also provide the total red blood cell count...
How can we use information visualization to support retrospective, exploratory analysis of collections of histories for patients admitted to acute care? This paper describes a novel design for visual cohort identification and exploration. We have developed a tool that integrates multiple, heterogeneous clinical data sources and allows alignment, querying and abstraction in a common workbench.
In this paper, we consider a multi-pursuer single-superior-evader pursuit-evasion differential game where the speed of the evader is similar to the speed of each pursuer. A new fuzzy reinforcement learning algorithm is proposed in this work for this game. Each pursuer of the game uses the proposed algorithm to learn its control strategy. The proposed algorithm of each pursuer uses the residual gradient...
Sindhi language is script language like Arabic and Persian. It's origin is 2500 years old and spoken in various countries in Asia. In this paper, we propose an Optical Character Recognition (OCR) system which recognizes handwritten Sindhi numeral expressions (i.e. Sindhi handwritten numeral strings) without using common input devices such as keyboard and storage device memory. Our experiments focus...
An imperative scheme is adopted to model 2D objects by constructing a weighted-spline using a quadratic trigonometric function with well controlled shape influences of parameters. The curve models, constructed through the suggested scheme, own the best possible geometric properties such as convex hull, partition of unity, affine invariance and variation diminishing. The illustration of the method...
The brain tumor tissue detection allows to localize a mass of abnormal cells in a slice of Magnetic Resonance (MR). The automatization of this process is useful for post processing of the extracted region of interest like the tumor segmentation. In order to detect this abnormal growth of tissue in an image, this paper presents a novel scheme which uses a two-step procedure; the k-means method and...
This paper is devoted to extension of the mathematical theory of A-trails and OE-trails for planar graphs. These types of trails imply constructing such trails avoiding intersection of not-passed edges with passed cycles and ensuring absence of intersected transitions at each graph vertex. In terms of cutting process, a planar graph is to be the cutting plan; the process of constructing such a trail...
Now a day's fingerprint database can be stolen. Therefore attacker can track our fingerprints and use them for their purpose. Hence, to provide security to the fingerprints is an important issue. Here, system is designed to provide protection and to maintain the privacy of fingerprints. To provide privacy protection to the fingerprints, system combines two distinct thumbprints into a new virtual Individuality...
In view of today's information available, recent progress in data mining research has lead to the development of various efficient methods for mining interesting patterns in large databases. It plays a vital role in knowledge discovery process by analyzing the huge data from various sources and summarizing it into useful information. It is helpful for analyzing the volumes of data in different domains...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.