The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We herein tackled concurrent design of machines layout and automated guided vehicle (AGV) planning in a workshop, and proposed a co-evolutionary framework for the whole design with tandem AGVs system. Our objective is to reduce the material transporting costs in the manufacturing process and realize the flexible reconfigurable. Firstly, we divide the whole workshop into several regions (or groups),...
Urdu text detection and extraction from videos especially from news feed is a challenging task. The main challenge is to design a robust algorithm that can accurately detect and localize Urdu text regions in videos. Urdu language is originated from oriental languages like Arabic, Persian and Turkish, so alphabets of these languages are very similar. Due to the similarities of basic alphabets and writing...
Crime pattern theory emphasize how crime appear from Spatio-temporal method. To get knowledge on crimes, it has to be studied in terms of space and time. Crime patterns and crime related activities research those spatio (location) distribution of crimes, omitting the temporal (time) dimensions. Exactly separation of crimes by space and time, example hour of a specific day, day of a specific week,...
Mining high utility itemsets from a transactional database refers to the discovery of itemsets with high utility like profits. Although a number of relevant approaches have been proposed in recent years, but they incur the problem of producing a large number of candidate itemsets for high utility itemsets. Such a large number of candidate itemsets degrades the mining performance in terms of execution...
Keyword search query processing is considered as the most promising way of information retrieval over XML data in present days as it relieves user from understanding complex schemas of XML document and writing difficult queries using XPath and XQuery. Till date various query processing techniques have been proposed to get meaningful results through keyword search using LCA (Lowest Common Ancestor)...
In this paper an area optimized 16-bit booth multiplier is proposed. The proposed architecture is based on parallel prefix Sklansky adders. The architecture is also implemented using Carry Look ahead adder, Kogge Stone adder, Ladner-Fischer adder and Brent Kung adder. The adders are compared in terms of LUTs and power. The approach using Sklansky based 16-bit modified Radix-4 booth architecture is...
Class imbalance of instances is a common problem in the field of data mining and machine learning. A dataset is considered to be imbalanced if one of the classes (further called a minority class or positive class) contains much smaller number of instances than the remaining classes (majority classes or negative class). We describe a new approach to balance data with improved classification. Resampling...
There are many storage structure available to store data in memory of many forms. These structures can be array, class, linked list with its various forms, Tree, Binary Tree, Binary Search Tree (BST), etc. These can be differentiated in two major forms. First one uses continuous memory allocation and the second one can occupy any free memory block by pointed by the other memory locations. An array...
This paper proposes a method for speeding up the estimation of the absolute value of largest eigenvalue of an asymmetric tridiagonal matrix based on Power method. An error analysis shows that the proposed method provide errors no greater than the usual Power method. The proposed method involves the computation of the tridiagonal matrix square under analysis, which is performed through a proposed fast...
Field polynomial division can be found in applications such as error detection and data encoding for digital communication systems. In addition, it implements the extended Euclidean algorithm (EEA), which can be used as the field inversion building block of elliptic curve cryptosystem. The unpredictability of the iterative algorithm of polynomial division in the EEA-Based field inversion results in...
In this paper, a novel algorithm is developed for the design of minimum-phase FIR filters with sparse impulse responses. Traditional minimum-phase FIR filter design approaches are based on autocorrelation sequences of impulse responses and design problems are formulated as a semidefinite program. To achieve sparse designs, l1 norm of filter coefficients is incorporated in the objective function as...
Optimal algorithms of band-limited noise signal detection are synthesized. The decision on the presence or absence of a signal is taken from the result of likelihood functions comparison. The block diagrams of optimal and quasi-optimal detectors are developed. The analytical expressions of probabilistic and power characteristics for different ratios of useful and noise signals are obtained. Curves...
Knowledge acquisition is an iterative process. Most prior work used syntactic bootstrapping approaches, while semantic bootstrapping was proposed recently. Unlike syntactic bootstrapping, semantic bootstrapping bootstraps directly on knowledge rather than on syntactic patterns, that is, it uses existing knowledge to understand the text and acquire more knowledge. It has been shown that semantic bootstrapping...
In this paper, we study the problem of set containment join. Given two collections R and S of records, the set containment join R./S retrieves all record pairs f(r, s)g 2 R S such that r s. This problem has been extensively studied in the literature and has many important applications in commercial and scientific fields. Recent research focuses on the in-memory set containment join algorithms, and...
This paper explores the causality and responsibility problem (CRP) for the non-answers to probabilistic reverse skyline queries (PRSQ). Towards this, we propose an efficient algorithm called CP to compute the causality and responsibility for the non-answers to PRSQ. CP first finds candidate causes, and then, it performs verification to obtain actual causes with their responsibilities, during which...
This paper present and analyze an energy efficient data compression and data aggregation algorithm which results in the whole network lifetime prolonged by about 24%. In this paper, a new idea is proposed for sensor values compression based on a technique that involves feedback mechanism. In this technique, the base node in the sensor network generates Huffman code for the sensor data that needs to...
The cache replacement policy is a major factor which determines the effectiveness of memory hierarchy. The replacement policy affects both the hit rate and the access latency of the cache. It decides the cache block to be replaced to give room for the incoming block. The replacement policy has to be chosen in such a way that the cache misses are reduced. Last level cache misses causes hundreds of...
Millions of comments are available on forums, Facebook, Tweeter, YouTube etc. Proper analysis of these huge comments can lead to solve many social, economic, political, business related questions which otherwise are difficult to understand and analyse. Proposed system explores the statistical approach for sentiment analysis of product reviews using expectation maximization algorithm. Systematic mathematical...
Human being normally uses natural language in form of written or spoken in their daily life. It is an entirely concept based on Artificial Intelligence, Computer Science and Linguistic resources. In Indian languages, Gujarati is an Indo — Aryan language with rich and high inflection. In these languages, several words have common root that's need to be reduced by using stemmer. Stemmer is used to reduce...
Among numerous research centres across the world, has been researching models that accurately denote the PV modules systems and its operation. This context of the paper gives a simplified photovoltaic system, which makes ease for the simulation work on photovoltaic systems in MATLAB/Simulink software and simplified MPPT method for higher power outcome. The purpose of this paper evaluating results...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.