The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Lately, ZigBee has been attracting attention as a short-range wireless communication standard. In a ZigBee network, it is necessary to suppress the packet transfer load because ZigBee needs to operate with low power consumption and within narrow communication bandwidth. On the other hand, in typical environments in which ZigBee is utilized, such as a smart home network, it generally coexists with...
In various applications where the problem domain can be modeled into graphs, the shortest path computation in the graph is an indispensable challenge. In applications like online social networks and shortest route computation problems, the size of the graph is so large; the number of nodes have become close to hundreds of billions. Shortest path graph algorithms like SSSP (Single Source Shortest Path)...
Security is still the main obstacle that is preventing businesses from moving towards the Cloud, which makes choosing the right Cloud service provider CSP a critical decision. We propose in this paper a methodology for evaluation and selection of Cloud security services based on a Multi-Criteria Analysis (MCA) process using a set of evaluation criteria and quantitative metrics. We then give a general...
We present the architecture and partial proof of concept implementation of distributed responder ARP (DR-ARP), a software defined networking (SDN) enabled enhancement of the standard address resolution protocol (ARP). It is intended to improve network security and performance by exerting much greater control over how ARP traffic flows through the network as well as over what actually delivers the...
There is a national initiative to incorporate integrated science, technology, engineering, and math (STEM) in K-16 classrooms. This study quantified student learning outcomes related project-based STEM guitar building curriculum implemented in institutions serving students grades 6–8, 9–12, and at the college level. Faculty participants were provided with tools and training needed to implement STEM...
The Common Core standards recommend an integration of nonfiction literature into the K-12 curriculum. Anecdotal evidence, however, indicates that students are not receptive to reading nonfiction or informational material. Therefore, the first objective of this project is to examine the extent to which K-12 students, divided across gender, grade level, and school type prefer reading fiction over nonfiction...
This research posits that high quality small group work demands collective construction of a “triple problem solving space” such that engagement occurs along cognitive, social/relational as well as affective dimensions. Pre- and post-survey data and learning outcomes were gathered from introductory biology classes in which small groups of students worked on 3 engineering design tasks. Results highlight...
This paper deals with an extended framework of the distributed asymptotic agreement problem by allowing the presence of unilateral interactions (optimistic or pessimistic) in place of bilateral ones, for a large class of nonlinear monotone time-varying networks. In this original setup we firstly introduce notions of unilateral optimistic and/or pessimistic interaction, of associated bicolored edge...
Students Performance can be measured under various categories like Success Rate, Academic Performance, Placement and Higher Studies and Professional Activities. Among these, Academic Performance paves the vital role in assessing their career upliftment. It is meant to be one of the key factors for assessing the departmental as well as institutional strength. The assessment can be undergone in two...
The current information age has witnessed massive increase in the number of web based documents and services. Due to this explosive growth of online content, automated search engine programs are used to search and categorize billions of webpages and show only the most relevant pages for the search query submitted by the user. Search engines employ combination of automated algorithms, manually edited...
Gravitational search algorithm is a nature inspired optimization algorithm, inspired by newton's law of gravity and law of motion. In this paper, a new variant of Gravitational search algorithm is presented. The exploration and exploitation capability of GSA is balanced by splitting the whole swarm into two groups. The search process is modified so that one group better exploits and one group becomes...
The continuous evolution of the telecommunication network architecture has made their network functions to become more available and utilizable. With SDN/NFV network service providers can program their own network functions on the standard commercial hardware platform. SDN/NFV enable more efficient utilization of resources and better service agility. It supports new network services faster and less...
Sampling through crawling is an important research topic in social network analysis. However there is very little existing work on sampling through crawling in directed networks. In this paper we present a new method of sampling a directed network, with the objective of maximizing the node coverage. Our proposed method, Predicted Max Degree (PMD) Sampling, works by predicting which k open nodes are...
We introduce a powerful technique to make classifiers more reliable and versatile. Background Check equips classifiers with the ability to assess the difference of unlabelled test data from the training data. In particular, Background Check gives classifiers the capability to (i) perform cautious classification with a reject option, (ii) identify outliers, and (iii) better assess the confidence in...
Detection of string and column delimiters is a critical first step in the automated ingestion of files containing tabular data. In this paper we present an algorithm that uses a logistic-regression classifier to evaluate whether a particular choice of delimiters is correct. The delimiter choice that is given the highest score by the classifier is chosen as the one most likely to be correct. The algorithm...
The Malaysian education system is now focusing on the Technical and Vocational Education and Training (TVET) as the Government is now concentrating on minimizing the number of job finders. TVET program is a good initiative to promote high-skilled workers. In order to achieve this aim, the trainer or TVET teachers need to be equipped with skill and knowledge on specific field. Thus, this paper investigates...
A signed graph (sigraph) is a graph where each edge receives positive or negative sign. In this paper, we report our investigation on a new signed graph (S)2 called 2-path sigraphs of a given sigraph S defined as that sigraph whose vertex set is the vertex set of S and two vertices in (S)2 are adjacent if there exist a path of length two between them in S and negatively signed if all the paths of...
To cope with the significant computational complexity introduced by High Efficiency Video Coding (HEVC) standard, several parallelization schemes are introduced, such as Tiles, Wavefront parallel processing(WPP) and Dependent slice segments. These coding structures make multi-core processing possible. In this paper, we analyzed the degree of parallelism WPP can achieve and then proposed a multi-threaded...
How to make a decision is a critical problem in speaker verification system and it directly affects the final verification results. This paper describes a new efficient threshold setting method that performs speaker verification system with I-vector technique. Unlike typical system under laboratory, it is difficult to obtain a large number of data to fully estimate the speaker recognition threshold...
This work presents a new approach to prediction of human control error in unstable systems. We consider virtual inverted pendulum (stick) as a characteristic example of such system. The proposed approach is based on applying classification via machine learning to distinguish between the samples of human control corresponding to successful balancing and critical control errors (resulting in stick fall)...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.