The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
For modern websites currently available web page segmentation algorithms are not yet of practical use. This is what is observed from recent studies. In this paper, a Webpage Segmenter Using Block Function Tree has been described as a new approach for web page segmentation. It uses the fact that every block in the webpage plays a specific function that web designer designs the block for this function...
To increase the capacity of hard disk drive (HDD) with no significant cost, Seagate announced the world's first Shingled Write Disk (SWD) that employs Shingled Magnetic Recording (SMR) technology in 2014. The main drawback of SMR is that non-sequential write access to the disk is restricted due to overlap in the layout of data tracks. Seagate SWD mitigates these access restrictions by using an internal...
Fourier Transform, a great mathematical tool, has been implemented by using a simple CORDIC algorithm. Here, equation of Fourier Transform has been written and segregated into real and imaginary parts. Basic equations of CORDIC have been twisted and tan of certain angles have been expressed in a special form and fitted into the twisted CORDIC equations. Depending on the logic formed, a CORDIC implementing...
In the past, discussions on the capability of analog or physical computing were only of theoretical interest. Digital computation's 80 year history starts from the Turings original model of computation to ubiquitous modern computational devices. The modern development of analog computation started with almost zero computational framework. Today, we have significant programmable and configurable physical...
The introduction of billions of transisters onto a single chip has resulted in the increase in complexity of the common System-on-Chip(SoC) architecture. The bus based architecture of SoC is limiting, mainly due to scalability issues. The solution for this communication problem is the use of embedded switching network, called Network On Chip(NoC). NoC has inherent redundancy which helps to tolerate...
Searching is a prime operation in computer science and numerous methods has been devised to make it efficient. Hashing is one such searching technique with objective of limiting the searching complexity to O (1) i.e. finding the desired item in one attempt. But achieving complexity of O (1) is quite difficult or usually not possible. This happens because there is no perfect mapping function for insertion...
Advancement in computing technologies and increasing demand of computing resources (such as network, storage, servers, applications etc.) has made cloud computing as main computing basis for small or large IT enterprises. The enterprises which are not able to establish their own infrastructure and resources are taking help of different (Infrastructure as a Service) IaaS service providers on basis...
Recently there has been an evidential growth in E-healthcare services. Every hospital has a variety of similar or dissimilar healthcare services. Selecting the best healthcare service is influenced by many preferences such as doctor's experience, location, feedback on continuity of care, waiting time, cost, hospital facilities, etc. Among the preferences, feedback is more influential. Participant's...
The development of high resolution digital cameras for recording of still images and video streams has had a momentous influence on how communication and entertainment have developed during the recent years. Processing of human faces discovers many applications in various domains like law enforcement, security surveillance etc. A standard face processing system consists of face detection, face recognition,...
A data acquisition system (DAQ) is an electronic system that collects, stores and distributes information for further processing. This paper put together various DDR techniques for synchronized digital data acquisition algorithms and realization with Field Programmable Gate Array (FPGA). The proposed techniques uses Double data rate for high speed data acquisition where data capturing device is source...
Plagiarism is becoming a serious problem for intellectual community. The detection of plagiarism at various levels is a major issue. The complexity of the problem increases when we are finding the plagiarism in the source codes that may be in the same language or they have been transformed into other languages. This type of plagiarism is found not only in the academic works but also in the industries...
In order to improve the cloud computing utilization, an Improved Ant Colony Optimization (IACO) is proposed. The proposed IACO algorithm improves pheromone factors and inspired factors innovatively based on the existent algorithms. Emulation tests are conducted in the CloudSim and the results indicate that IACO is superior to the conventional ACO and the latest IABC in task executing efficiency.
MCrypton is an ultra-lightweight symmetric cryptographic algorithm, which is designed to adapt to the resource constrained computing scenarios, such as RFID tags and sensor networks, etc. With the continuous development of Internet of things (IoT), the application of this kind algorithm becomes increasingly popular, so the implementation security of the algorithm has correspondingly become an imperative...
The paper displays the results of the research of symmetric cryptographic transformations that can be applied while using the quantum computing systems, so to say, in post-quantum period. For this purpose, we carried out the analysis and comparative study of the most common cryptographic algorithms that are standardized at the international and national levels, and also examined their ability to provide...
During the past two decades, game developments have been increasing rapidly. In developing these games, there are various algorithms involved. The objective of this research is to develop an educational game by using the Cellular Automata Algorithm (CAA) to construct areas in the game. It is used for generating a dynamic labyrinth, so that it always changes in every game play. Therefore, it basically...
Factorization is one of the most important problems in the theory of numbers and a modern asymmetric cryptography. Known methods of factorization are quite cumbersome; therefore, require significant computational resources for processing multi-bit numbers. The relevance of the factorization problem is dictated also by uncertainty regarding the theoretical foundation of stability for the disclosure...
Active semi-supervised learning can play an important role in classification scenarios in which labeled data are difficult to obtain, while unlabeled data can be easily acquired. This paper focuses on an active semi-supervised algorithm that can be driven by multiple clustering hierarchies. If there is one or more hierarchies that can reasonably align clusters with class labels, then a few queries...
Transports of heat, fresh water and other things in the ocean have huge effect on the globe climate and resource distribution. Mesoscale eddies play such an important role in the transport process that many researchers want to study the interior structure of ocean mesoscale eddies. However, the eddy is still greatly under observation since the traditional method cannot accomplish persistent and maneuvering...
In allusion to the deficiency of existing methods in moving target detection for transmission lines under complex background, we proposed a method for realizing automatic moving target detection. Adopting the field images with moving target which were taken from the transmission lines anti-theft warning system of a power company in Xinjiang, and choosing the background difference as the object detection...
When dealing with eventually consistent systems, application developers are often required to write their own conflict resolution algorithms. The aim of this work is to provide an abstraction layer for an eventually consistent database, namely CouchDB, and its client side implementation, PouchDB in a manner which makes it easier for software developers to use. This is achieved through a JavaScript...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.