The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recently Information Technology is used extensively for wide range of application for example solutions enabled through e-commerce to different web based information system. This usage has lead to development of large textual data base. Mostly this information data is stored in unstructured text. This large data developed has lead to the need of its systematic clustering for easy data retrieval organization...
This paper presents a new approach developed in order to provide a better design solution for the 110–123 kV, SF6 type switches. Having an efficient computer based tool for the design of such important equipment it's always a challenge for any high voltage equipment manufacturer worldwide. We have to mention, in the first part of the paper, the particular technical characteristic of SF6 HV switches...
This paper is devoted to approaches and algorithms for fluid mesh rotation in mechanical models of a living cell. Described algorithms are designed to prevent FEM mesh from twisting and self-intersection in numerical simulation of a rotating fluid mesh, which provide means for modeling a wider range of solid and shell rotations.
A switched supervisory algorithm is proposed, which ensures fixed-time convergence by commutation of finite-time or exponentially stable homogeneous systems of a special class, and a finite-time convergence to the origin by orchestrating among asymptotically stable systems. A particular attention is paid to the case of exponentially stable systems. Performance of the proposed control algorithms is...
Association Rule Mining is the most powerful technique in data mining. Generation of rule involves two phases where first phase finds the frequent itemsets and second phase generates the rule. Many algorithms are specified to find frequent item set from the sequential patterns. There are mainly two approaches for finding frequent item sets. First approach is with candidate sequence generation i.e...
Use of mobile has increased day by day. Nowadays, the mobile users prefer to use smartphones to access all types of mobile Application. These smartphones are converted from phone to smartphone by using inbuilt or downloaded mobile Applications. Generally, users download mobile Applications depending on how many users already have downloaded that Application?, What are the ratings and reviews?, What...
One of the dominant causes of visual impairment worldwide is Cataract. It causes a blurred and foggy vision which can lead to partial or complete loss of eyesight. A protein layer is developed gradually and the lens becomes cloudy over a long period of time which reduces vision and leads to blindness. Early treatment can lessen the difficulties faced by cataract patients and avert visual impairment...
Nowadays, the consumer reviews for various products are playing a very important role not only for consumers but also for the firms. A large collection of consumer reviews is now available on the internet. These reviews are very helpful to get quality information about the products. The consumer reviews are used as a feedback by the firms in their product development strategies and consumer relationship...
For arbitrary precision numbers, reciprocal computing algorithms based on Newton iteration is asymptotically the fastest. In this work we provide a refined algorithm based on the Newton reciprocal algorithm by Brent and Zimmermann in their MCA book. The key techniques used in the refinement are D1 balancing, clear specification, remainder operation, and economical multiplication. The refined algorithm...
This paper presents the development and assessment of a computer organization course for undergraduate students in computer science that has been infused with data security concepts. The infusion gives an opportunity for students to learn essential cybersecurity topics in an introductory computer science course. Specifically, students were introduced to the well-known data encryption algorithm called...
Depth estimation and spatial awareness given a single monocular image is a challenging task for a computer as depth information is not retained when the 3D world is projected onto a 2D plane. Therefore, we must combine our prior knowledge with other monocular cues present in the image, such as occlusion, texture variations, and shadows to understand the depth of the image. In this paper, we present...
This paper proposes an approach of recommending micro-learning path based on improved ant colony optimization algorithm. Micro-learning is a new learning style, which can be used to support learning in short time because of its micro-learning units. Each micro-learning unit consists of a small knowledge unit that can be learned at fragmented time. Meanwhile, micro-learning is more flexible than other...
Meeting is a gathering of people to exchange information and plan joint activities for achieving a goal through verbal interactions. In a good meeting, participants' ideas are heard, decisions are made through discussions and activities are focused on desired results. The challenging part is to mine the most relevant interaction pattern from the meeting. Tree structures are not able to capture all...
Feature selection is the process of selecting a subset of features that provides maximum of the information, present otherwise in entire dataset. The process is very helpful when input for different tasks including classification, clustering, rule extraction and many others, is large. Rough Set Theory, right from its emergence, has been widely used for feature selection due to its analysis friendly...
The opinion mining is very much essential in e-commerce websites, furthermore advantageous with individual. An ever increasing amount of results are stored in the web as well as the amount of people would acquiring items from web are increasing. As a result, the users' reviews or posts are increasing day by day. The reviews toward shipper sites express their feeling. Any organization for example,...
Social Networking sites are the resources which contains huge data. For example, Twitter produces millions of bytes of the data. These data can be used for business or social purpose. Analyzing data from these social networking web sites is one of the new buzzword for many business strategies. Election campaigns, World health issues, Technical concepts, inventions, Entertainment, Natural resources...
Cryptocurrencies have emerged as important financial software systems. They rely on a secure distributed ledger data structure; mining is an integral part of such systems. Mining adds records of past transactions to the distributed ledger known as Blockchain, allowing users to reach secure, robust consensus for each transaction. Mining also introduces wealth in the form of new units of currency. Cryptocurrencies...
Wireless sensor network will become isolated in various associated segments because of the disappointment of some of its hubs, which is known as a “cut”. In this paper, authors acknowledge the issue of distinguishing cuts by the remaining hubs of a wireless sensor network. System proposes an estimation which grants every hub to identify at the time of accessibility to an extremely assigned hub has...
in today's scenarios world is struggling to develop new technologies for handicap people, so that they can also compete in the modern world. The Main existing solutions are prosthetic devices, voice recognition programs, screen readers, and hand gestures recognition, but developing new technologies faces various problems like time, cost and portability. This paper proposes a new perspective by enhancing...
Many colleges have accumulated a large amount of information, such as achievement data and consumption records. According to the above information, we attempt to identify the student group from various aspects. Given this, we can acquire the characteristics of students in different groups. In this way, the college can have a better understanding of students to accomplish the reasonable management...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.