The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Most algorithms for identifying multiple rumor or infection sources require prior knowledge of the number of sources, or at least an upper bound on the number of sources. In this paper, we consider a deterministic Susceptible-Infected (SI) spreading model in which infection at different source nodes may start at different times. We introduce the concept of a minimal and linear cover of the infection...
An important problem in the field of bioinformaties is to identify interactive effects among profiled variables for outcome prediction. In this paper, a simple logistic regression model with pairwise interactions among a set of binary covariates is considered. Modeling the structure of the interactions by a graph, our goal is to recover the interaction graph from independently identically distributed...
Computing exact nearest and farthest neighbor is a challenging task, especially in the case of high-dimensional data. Several algorithms have been proposed to tackle the nearest neighbor problem. However, not much emphasis has been given on farthest neighbor problem. Most of the previous methods addressing this problem are not efficient when applied to high-dimensional data. In this paper, we present...
For a graph G = (V, E), a subset D of V is a total dominating set of G if every vertex in V has to be adjacent to a vertex of D. Vertex subset D is a disjunctive total dominating set if every vertex of V is adjacent to a vertex of D or has at least two vertices in D at distance 2 from it. The disjunctive total domination problem on G is to find a disjunctive total dominating set D of the minimum cardinality...
Kiwano is a distributed system that enables an unlimited number of avatars interact in the same virtual space. By separating the management of virtual world components -avatars, moving objects from the static décor- we take a novel approach and introduce a neighborhood relation between avatars. In Kiwano we employ Delaunay triangulations to provide each avatar with a constant number of neighbors independently...
The modern world is faced with the issues and concerns of business intelligence. Methodologies and techniques have been developed to facilitate the process of business analysis and comprehension. One such scientific field is focused on achieving the intelligent data before it can be utilized for intelligent analysis. The current size of information is huge and the tasks aimed out of analysis present...
Modeling and Simulation methods have been used to better analyze the behavior of complex physical systems and it is now common to use simulation as a part of the scientific and technological discovery process. Formal M&S proved to be successful in providing a sound base for the development of discrete-event simulation models, improving the ease of model definition and enhancing application development...
The dream of the world as a global village is gradually fulfilling with technology playing a magnificent role. Technologies such as Semantic Web and ontologies have contributed immensely to the realization of this dream — the world as a global village. However, the dream is yet to be fully realized as complexities keep unfolding even in such areas and instances where successes have been recorded....
The aim of this work is to design and implement program, which is able to do basic operations and to interactively create hash tables. It describes principles of hashing, behavior of hash tables with the use of various methods, which deal with conflicts when inserting values into tables and analyzes selected hash functions. It explains testing methods of open addressing and factors that affect efficient...
A novel approach to design capacity-approaching variable-length constrained sequence codes has recently been developed. A critical step in this design process is the construction of minimal sets based on a finite state machine description of the encoders. In this paper we propose three generalized criteria to select the state that will result in construction of the minimal set with the best achievable...
Researching post-quantum cryptography has been an important task in cryptography. The section finding problem on algebraic surfaces (AS-SFP) is considered to be intractable also after building quantum computers. Thus AS-SFP is used as a basis of the security of the Algebraic Surface Cryptosystem (ASC), which is a candidate of post-quantum cryptosystems, and it is important for designing parameters...
Cyber-Physical Systems are embedded computers that control complex physical processes and components while cooperating as agents in distributed networks. Due to the scale and complexity of the interactions that occur within cyber-physical systems, requirements traceability strategies that are accurate and easy to manage are hard to implement and maintain. However, the information traces provide is...
As technology infiltrates every aspect of students' daily lives, game design acquires a bigger and more influential impact on shaping students' personalities and development of learning competencies. Considering the continuously increasing research on the use of educational games in classrooms, the researcher identifies another great interest in the constructivistic perspective of game design for...
Today, the world is moving beyond the imagination of the people, day by day new era in technology comes which create huge impact on their lives. As the invention of the computer takes place, now most of the work is performed with the help of computer. In order to protect the main resource of the people, it is important to make the modification in older technology or create a new one. Level of security...
Parity checking is one of the extensively used approaches for error detection in conventional digital systems. This work presents a 4×4 reversible logic gate (SMS gate) integrated with parity preserving property, which produces all primitive Boolean gates. The hardware complexity in terms of total logic count of SMS gate is 6α+1β only, which found to be minimal compared to all the existing gates....
The basic concept of machine translation is to translate one human language to another human language. Many translation systems have been built using different approaches which have different accuracy levels. In this paper, a work is being proposed for Syntax Based Machine Translation System from English to Hindi language. The Syntax Based Machine Translation System has the goal of incorporating an...
Human-computer dialogs are an important vehicle through which to produce a rich and compelling form of human-computer interaction. We view the specification of a human-computer dialog as a set of sequences of progressive interactions between a user and a computer system, and mine partially ordered sets, which correspond to mixing dialog initiative, embedded in these sets of sequences—a process we...
Hierarchical clustering has been well-studied in the community of machine learning. Hierarchical clustering algorithms are deterministic, stable, and do not need a pre-determined number of clusters as input. However, they are not scalable for very large data due to their non-linear complexity. In this paper, a new approach is proposed to reduce the complexity of Hierarchical Clustering, improve the...
A critical node (cut vertex) in a wireless sensor network (WSN) is a node which its failure divides the network to disconnected parts. Identification of such nodes is the first step in countering against the threats on WSN reliability. In this paper, we propose the Connected Dominating Set based CUT vertex detection (CDSCUT) approach. We define 5 new rules for deciding about the statuses of nodes...
This paper presents a semi-incremental recognition method for online handwritten mathematical expressions (MEs). The method reduces the waiting time after an ME is written until the result of recognition is output. Our method has two main processes, one is to process the latest stroke, the other is to find and correct wrong recognitions in the strokes up to the latest stroke. In the first process,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.