The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Intra Block Copy (IntraBC) mode is a very efficient coding tool for the screen content coding (SCC) extension in High Efficiency Video Coding (HEVC) due to the frequently occurrences of repeating patterns and noiseless characteristics of screen content videos. There are local search and hash search for the IntraBC mode to increase coding efficiency. However, the IntraBC mode also brings along...
Name matching is a key component in various applications in our life like record linkage and data mining applications. This process suffers from multiple complexities such as matching data from different languages or data written by people from different cultures. In this paper, we present a new modified Cross-Language Levenshtein Distance (CLLD) algorithm that supports matching names across different...
Conceptual modeling is the abstraction of a simulation model from the part of the real world it is representing; in other words, choosing what to model, and what not to model. This is generally agreed to be the most difficult, least understood and most important task to be carried out in a simulation study. In this tutorial the problem of conceptual modeling is first illustrated through an example...
Teaching students how to code in K-12 classrooms is considered as one of the major keys to promoting engineering education in the future, which can potentially enhance the competency and computational skills of students to adhere better learning outcomes in higher education. The success of promoting coding education or integrating it into school curriculum depends on the perceptions of teachers and...
This paper presents new aspects of using biometric features and patterns for creation of new cryptographic protocols. These protocols are dedicated for secure information sharing and distribution processes. Such algorithms allow protecting confidential data sets, and performing secure operation for different kinds of information. Bio-inspired techniques for securing information will be presented on...
This paper describes a content analysis study that analyzed the subject matter of computing ethics. The purpose of the study was to begin the process of providing a coherent concept of the subject matter of computing ethics. The snapshot presented is based on article titles from four prominent journals with a computing ethics scope. This paper discusses subject matter themes that emerged from the...
In this paper, a new algorithm for visualization of high-multidimensional data is described. The algorithm follows several steps. At first, centers representing several categories are selected, and Euclidean distances between these centers are calculated in a high-dimensional space. Then these centers are placed in a 2-dimensional space in such a way that distances in this 2-dimensional space are...
User interface design is an important component of human-computer interface. User interface continues to evolve and the emphasis is on imparting more control to end-user and at the same time to facilitate ease of use. This paper proposes a framework for design of an adaptive user interface. The adaptive user interface allows automatic generation of elements of the interface such as buttons, text fields,...
Preference (top-k) queries play a key role in modern data analytics tasks. Top-k techniques rely on ranking functions in order to determine an overall score for each of the objects across all the relevant attributes being examined. This ranking function is provided by the user at query time, or generated for a particular user by a personalized search engine which prevents the pre-computation of the...
In this paper, we propose a new class of rateless codes which have improved intermediate performance using batched zigzag decoding over symbol erasure channels. When generating a batch, an encoder shifts selected input symbols before performing bit-wise XOR operation in order to make a batch zigzag decodable. Solving a batch by zigzag decoding algorithm gives improved intermediate performance. We...
The most important skills employers are looking for in engineering are creativity, ability to work in teams and critical thinking. However the most used teaching methods at universities, based on individual assignments or group projects while do address the creativity, fall back on the critical thinking and even in team work skill. Collaborative learning was long suggested as a good alternative for...
In the present paper, we compare low and high mathability level spreadsheet tools. Firstly, we provide proof that the widely accepted and practiced surface approaches are responsible for error-prone spreadsheet documents. In addition to this, we introduce Sprego, and demonstrate that it is a high mathability level method. We provide examples of how spreadsheets are programmable with Sprego, how the...
Modified superdense coding for quantum systems was introduced for two communicating parties. In this paper the algorithm is extended to n parties. Beside the generalization, an analytical approach is also presented to show the performance of the algorithm, along with the comparison of slotted ALOHA systems.
In order to avoid the effect of initial pheromones for Ant Colony Algorithm, Ant Colony Algorithm and Genetic Algorithm are integrated to mine maximum frequent item sets in this paper. First of all, this paper introduces the ideas of Hybrid Ant Colony Algorithm and briefly explains how to process the data of database. In the second place, Ant Colony Algorithm and Genetic Algorithm are designed respectively,...
To store a acquired ECG data huge space is required even if the ECG signal is sampled at lower rate. The relevance of telecardiology is more pronounced in contemporary times for diagnosing heart abnormalities by analyzing ECG signal. Transmission of such huge data for medical purpose is not possible without compression and also it will required more energy for wireless transmission for large amount...
Motivated by applications to distributed storage and computing, the multi-version coding problem was formulated by Wang and Cadambe in [4]. In this problem, a client sequently over time stores v independent versions of a message in a storage system with n server nodes. It is assumed that, a message version may not reach some servers, and that each server is unaware of what has been stored in other...
Computer clusters with coprocessors/accelerators are typically leveraged to parallelize applications for reducing computation time. Given N parallel tasks and M processing cores, the typical strategy is to statically distribute those N tasks among M cores so that each core receives N/M tasks. However, for many sophisticated applications, the processing times of N tasks may vary. In other words, some...
Multiplication is an important mathematical operation in many microprocessor architectures. And, multipliers have evolved dramaticlly after the late 1970s and have gone through tremendous changes with an aim of reducing the area and delay. This paper presents and an extension to Booth-3 multiplication architecture by implementing the partial product matrix in redundant form. It is anticipated that...
An existing storage scheme for a functional test sequence T uses a vector B, called a background vector, to store only the differences between the test vectors of T and B. After selecting B, modifying T based on B reduces the storage requirements of T. This paper describes a storage scheme for a set of test sequences T that uses a test sequence B, called a background sequence, to store only the differences...
Lero's mission is to establish Ireland as a location synonymous with high quality software development through advanced research and smart collaboration, and through our education and outreach programme. An estimated 44,500 job openings are forecast in the ICT sector over the period to 2018. To ensure an adequate ICT skills supply pipeline, informing and effectively engaging relevant stake holders...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.