The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper deals with non-Bayesian parameter estimation under the mean-squared-error (MSE), which is a topic of great interest in various engineering fields. Although the unbiasedness condition is commonly used in non-Bayesian MSE estimation, in many cases biased estimation may result in better performance. However, no method for determining the optimal bias function in general cases is available...
This paper describes a distributed calculation scheme for scoring relationship among documents. This scheme categorizes documents by using an algorithm which calculates a score value for the relationship between a category and a word in a document. The longer calculation time becomes when increasing the number of documents. Therefore, our scheme uses multiple machines. A master node divides a document...
Security doesn't begin and end with the enterprise. In a world of uncertainty, with growing turbulence in many regions, it makes sense to ensure our home and office is safe. In our paper we are going to discuss about Cyber Crimes and the use of Free and Open Source Software's to Detoxify Cyber Crime Attacks in an End User Perspective. Protecting our personal Information and Cyber security is a demanding...
For semiconductor manufacturing, EQ (equipment) performance maybe shift to different process level after long idle time. Wafer quality will be ventured into worse condition processing idle recipe. System is thus set up to reduce the potential risk. Long time idle recipe, which idle more than specific idle spec, is under control by setting up Idle Recipe Control (IRC) system. All the process tools...
There exists an identical high rate ordinary convolutional code with a punctured convolutional code. We show a method for obtaining good rate R = (n − 1)/n punctured convolutional codes through the identical codes with the best punctured convolutional codes of rate (n − 1)/n obtained by exhaustive searches for rate 1/2 original codes and puncturing matrices, and the method can find out punctured convolutional...
The demand for two-dimensional source coding and constrained coding has been getting higher these days, but compared to the one-dimensional case, many problems have remained open as the analysis is cumbersome. A main reason for that would be because there are no finite graph representations discovered so far. In this paper, we focus on a two-dimensional finite type constrained system, a set of two-dimensional...
Our previous work [1] defined the notion of perfect location privacy for location-based services (LBS) and demonstrated how it can be achieved under basic user models. In this paper, we extend our work by studying perfect location privacy within a more complex scenario in which a user's movements are dependent upon the time domain. We model a mobile user's path using Markov chains and show that perfect...
We derive a general formula of the minimum achievable rate for fixed-to-variable length coding with a regular cost function by allowing the error probability up to a constant ε. For a fixed-to-variable length code, we call the set of source sequences that can be decoded without error the dominant set of source sequences. For any two regular cost functions, it is revealed that the dominant set of source...
In this paper, a feature selection system is introduced applies the whale optimization algorithm (WOA). WOA is a recently introduced meta-heuristic optimization algorithm that mimics the natural behavior of the humpback whales. The proposed model applies the wrapper-based method to reach the optimal subset of features. This technique was applied to find the best feature subset that maximizes the accuracy...
Undoubtedly, Cloud computing is the ongoing trend that robbed the widespread concern. In fact, it succeeded in discharging users from computational and storage burden to offer them as services following pay-as-you-go principle. The substantial feature of Cloud is the ability to scale up with the rise of users' demands. However, Cloud performance falls into the duty of scaling up to fulfill the user...
Advanced information technology offers greater convenience to the general public. However, information technology can cause failures that have significant negative impacts (e.g., system failures and personal information leaks). To improve this situation, it is important to understand past failures, extract their causes, and define countermeasures. In this paper, we focus on communications networks...
In this paper we present an algebraical approach for the state estimation of discrete event systems, partially observed and modeled by labeled Petri nets. Our estimation approach is based on the on-line observation of firing occurrences of some transitions to determine the set of all possible actual sequences and markings. This approach has been used to minimize the computation time and space for...
Linear Discriminant Analysis (LDA) is a popular technique in pattern recognition. This paper presents a linear discriminant analysis for classification. Firstly, linear discriminant Analysis is introduced. The optimum design procedure is demonstrated in order to calculate the error minimization. Next, linear classifier based on desired outputs is derived to get the desired classification. Also, the...
For arbitrary precision numbers, reciprocal computing algorithms based on Newton iteration is asymptotically the fastest. In this work we provide a refined algorithm based on the Newton reciprocal algorithm by Brent and Zimmermann in their MCA book. The key techniques used in the refinement are D1 balancing, clear specification, remainder operation, and economical multiplication. The refined algorithm...
In online social networks (OSNs), highly-connected users are generally more capable to trigger viral diffusion. However, recent research demonstrates that ordinary users who only have a few connections can also cause large-scale diffusion. In this paper, we study the relation between the global spreading influence and the local connections of users to theoretically explain this phenomenon. We focus...
Generation of finite simple groups by suitable subsets is of great importance and has been studied since the origin of group theory. A finite group G is called (l, m, n)-generated, if it is a quotient groupof the triangle group T(l, m, n) = ‹ x, y, z|xl = ym= zn = xyz = 1 ›. In this article, we study some routines in the computer algebra system GAP - Groups, Algorithms and Programmingto determine...
Location-based social network (LBSN) services are being popular at recent times. These are being manifested as service tools for different purpose of our daily lives. One very important aspect of these LBSNs services is to promote the business and help users to find their desirable location to visit. In this project, our aim is to find out the Foursquare venue popularity in Taiwan and compare its...
Application of e-commerce has become an integral part of marketing due to an increasing diffusion of information and communication technology (ICT) throughout the world including Bangladesh. Due to its growing significance to the economy, it is critical to identify factors affecting customers' intention to use e-commerce in Bangladesh. This study used Technology Acceptance Model (TAM) to determine...
Load testing and cross-browser testing are ones of the web testing types particularly reliant on the support of cloud computing platforms for the implementation of TaaS. The main challenge involved in the composition of heterogeneous web application testing tools is the incompatibility of their inputs and outputs. However, the need to manually configure the tools greatly undermines the convenience...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.