The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Online social networking sites are a popular medium to exchange information among individuals. For measurement and analysis of social networking sites, we can assume it as a huge graph, where nodes represent users while edges represent links among users. Millions of nodes make the study of social network complex to analyze, so we narrow down by considering ego network rather than considering whole...
In this paper VHDL (Very high level Hardware Description Language) is used to design and implement a Two Dimensional Reconfigurable Cache memory (cache size and associativity) using FPGA(Field-Programmable Gate Array). In this design the cache memory architecture allows to change the memory organization and size of its memory by using a cache size controller unit and way controller unit, to improve...
Light detection and ranging (LIDAR) is a technology of remote imaging technologies. Currently, it is the most important technology for accruing elevation points with a high density in the form of digital elevation model (DEM) construction. However, the high-density data leads to time and memory consumption problems during data processing. In this paper, we depend on radial basis function (RBF) with...
Finding an optimal block size for a given sparse matrix forms an important problem for storage formats that partition matrices into uniformly-sized blocks. Finding a solution to this problem can take a significant amount of time, which, effectively, may negate the benefits that such a format brings into sparse-matrix computations. A key for an efficient solution is the ability to quickly iterate,...
The aim of this work is to design and implement program, which is able to do basic operations and to interactively create hash tables. It describes principles of hashing, behavior of hash tables with the use of various methods, which deal with conflicts when inserting values into tables and analyzes selected hash functions. It explains testing methods of open addressing and factors that affect efficient...
Targeted attacks are a significant problem for governmental agencies and corporations. We propose a MinHash-based, targeted attack detection system which analyzes aggregated process creation events typically generated by human keyboard input. We start with a set of malicious process creation events, and their parameters, which are typically generated by an attacker remotely controlling computers on...
This paper will help the linguists find an easy method to facilitate the creation of a standard Arabic historical dictionary in order to save time and to be up to date with the other languages. In this method, we propose a platform of Automatic Natural Language Processing (ANLP) tools which permits the automatic indexing and research from Arabic texts corpus. Some pretreatments are done before the...
This paper introduces a family of RoShamBo games, denoted by RSB(n,b,s,r) which means that n players simultaneously show a move among b possible moves with possible s winning regulations, at each round out of r round matches in total. The player who wins more after r rounds wins. A game informatical analysis of RSB(n,b,s,r) using game refinement measure is carried out, while experiments have been...
An extremely scalable linear-algebraic algorithm was developed for quantum material simulation (electronic state calculation) with 108 atoms or 100-nm-scale materials. The mathematical foundation is generalized shifted linear equations ((zB — A)x = b), instead of conventional generalized eigenvalue equations. The method has a highly parallelizable mathematical structure. The benchmark shows an extreme...
In this paper, a novel graphics processing unit (GPU) implementation of the Correction Function Method (CFM) is applied to an electrostatic problem with curved surface charge distributions. The CFM is a highly accurate method in which curved surface charge distributions are immersed in a regular grid, without modifying the linear system's matrix. The CFM is shown to be an excellent candidate for parallelization,...
Preserving important troubleshooting experience gained in industrial practice, often referred to as “tribal knowledge”, and making it readily available to be re-applied in similar situations represent a serious challenge for many companies in heavy industry. The solution is very often tied to building mental models to capture and express key latent cognitive variables. In this paper, we first attempt...
With the construction and development of power system acquisition, lots and lots of electric power data have been accumulated, and the era of electric power big data is coming. Although Hadoop can share pressure through lateral expansion of common computers to obtain efficient processing performance, simple progressive scanning has been unable to meet the performance requirements when each computer...
Providing questions with unique sequence helps to encourage participants integrity in an examination. In this study, Secure Hash Algorithm (SHA) 2 and 3 have been proposed and evaluated in a question shuffling problem for computer based test. Two strategies were tested to use the hash algorithms. The first utilized a few of the most significant digits of the hash value and the second treated all digits...
Searching is a prime operation in computer science and numerous methods has been devised to make it efficient. Hashing is one such searching technique with objective of limiting the searching complexity to O (1) i.e. finding the desired item in one attempt. But achieving complexity of O (1) is quite difficult or usually not possible. This happens because there is no perfect mapping function for insertion...
A number of approaches have been developed for image steganography till date but none have used quadtree partition scheme. The quadtree partition is used to divide the image on the basis of variations among the pixel values and therefore we can identify the fine grained and coarse grained areas inside the image. It is very much comfortable and effective to hide something in the roadside scrub rather...
Structural analysis of networks has attracted a lot of attention from researchers. While previous studies have devised structural indices for quantitatively describing network structures, they mostly focus on specific structural characteristics and the structural information provided by them is often fragmental. This paper proposes methods for representing and analyzing structural characteristics...
The construction of large-scale, low-latency networks becomes difficult as the number of nodes increases. In general, the way to construct a theoretically optimal solution is unknown. However, it is known that some methods can construct suboptimal networks with low-latency. One such method is to construct large-scale networks from optimal or suboptimal small networks, using the product of graphs....
Finding quantitative measures for describing and characterizing the structural properties of networks is a research topic with ongoing interest. These measures are called graph invariants and are usually referred to as topological indices. The oldest topological index is the Wiener index, it has been extensively studied in many applications such as chemical graph theory, complex network, social networks,...
Coronary artery disease is one of the major causes of death throughout the world. An effective method for diagnosing this disease is X-ray angiography. The images are usually of poor quality and low contrast. This is due to non-uniform illumination, appearance of other body organs and artifacts, low SNR values, etc. Accurate segmentation of arteries is a challenging and important task. In this paper...
Many approaches to solve the problem of scene character recognition utilize local features such as histograms of oriented gradients (HoG), SIFT, Shape Contexts (SC), Geometric Blur (GB), etc. An issue associated with these methods is the ad hoc rasterization of the local features into a single vector which perturbs the global spatial correlations that carry crucial information for recognition. To...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.