The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents a variation on the reverse p-median problem that does not require that the facilities are placed as an input to the problem. The variation, which will be referred to as the p-median problem with edge reduction, requires solving the p-median problem and the reverse p-median problem together. This paper presents a series of algorithms for solving the 1- and 2-median problems with...
This paper describes the NIST 2013 Open Handwriting Recognition and Translation evaluation (OpenHaRT'13). A short background leading to the start of OpenHaRT is included. The test designs pertaining to the tasks, the data used, the performance measurements, and the protocols are presented. The participants and their submissions are mentioned followed by the evaluation results and some preliminary...
Current Security Pattern evaluation techniques are demonstrated to be incomplete with respect to quantitative measurement and comparison. A proposal for a dynamic testbed system is presented as a potential mechanism for evaluating patterns within a constrained environment.
Data from affordable body-sensor devices that monitor personal metrics like heart-rate, weight, and movements are changing how athletes train and perform. Existing sport-analytic tools are, however, mostly monolithic proprietary systems where athletes have little control over how their data is used and managed over time. This paper describes Girji, security centered body-sensor data acquisition and...
In the current information age the general subject matter related to anything can be accessed on the Internet. In the academic and scientific organizations it is matter of fact that the scientific and research publications must be plagiarism free. In the present paper, so as to detect plagiarism, we have proposed the continuous trigram methodological concept and its applications for the retrieval...
The problem of compressing a large collection of feature vectors so that object identification can further be processed on the compressed form of the features is investigated. The idea is to perform matching against a query image in the compressed form of the feature descriptor vectors retaining the metric. Specifically, we concentrate on SIFT (Scale Invariant Feature Transform), a known object detection...
Many of today's applications can benefit from the discovery of the most central entities in real-world networks. This paper presents a new technique that efficiently finds the k most central entities in terms of closeness centrality. Instead of computing the centrality of each entity independently, our technique shares intermediate results between centrality computations. Since the cost of each centrality...
In this paper we explore the notion of mobile users' similarity as a key enabler of innovative applications hinging on opportunistic mobile encounters. In particular, we analyze the performance of known similarity metrics, applicable to our problem domain, as well as propose a novel temporal-based metric, in an attempt to quantify the inherently qualitative notion of similarity. Towards this objective,...
Social Networks are the common platform for the present generations to share ideas. The members of these sites have grown to billions in the last decade and much more at present. In this paper, the metrics Page Rank, Path Length, Clustering Coefficient and Vertex Degree for SNWSs are evaluated by users' database of Facebook. The results indicate that the metrics Page Ranking, Path Length and Vertex...
Codes and associated lattices are studied in the lp metric, particularly in the l1 (Lee) and the l∞ (maximum) distances. Discussions and results on decoding processes, classification and analysis of perfect or dense codes in these metrics are presented.
In this paper realization of 2:4 reversible decoder is proposed which can provide active high as well as active low outputs. The proposed decoder uses Feynman and Fredkin gates and has low quantum cost The proposed gate is fist extended to 3:8 decoder followed by an n-input decoder. The theoretical proposition is verified through SPICE simulations. A comparison with existing reversible decoders is...
To propose a new safe and secure mechanism to detect identity crimes, more precisely to identify replica in credit card. The synthetic identity fraud is the practice of reliable but false identities which is easy to make but more complicated to apply on real time. Detection system contains two layers which is communal detection and spike detection. Communal detection finds real social relationships...
The intermittent connectivity between nodes to transfer data is exploited using Disruption tolerant networks (DTNs). DTNs are susceptible to flood attacks which limit the network resources. Various methods were used to defend these attacks based on distributed schemes with certain difficulties to count the packets or duplicates sent by a node. This is due to lack of communication infrastructure. Two...
Dynamic metric is a well-known method to improve performance of WMNs (Wireless Mesh Networks). By quantifying quality of links, and by computing optimal paths based on the values, dynamic metrics enable packets to be forwarded with high-quality links while avoiding low-quality links. ETX [1] would be the best-known dynamic metric, which measures the average retransmission count on a link via periodically...
Testing is a primordial activity that certifies the quality of software, which remains an important issue for the majority of applications. Since testing occurs at the end of the software development life cycle, it is usually rushed and not done in the proper way. In addition, the lack of knowledge about the internal structure and source code of applications decreases considerably the number of options...
In this paper, we present a new approach that allows the detection and segmentation of brain tumors automatically. The approach is based on covariance and geodesic distance. The detection of central coordinates of abnormal tissues is based on the covariance method. These coordinates are used to segment the brain tumor area using geodesic distance for T1 and T2 weighted magnetic resonance images (MRI)...
Among the diverse forms of communication and information networks found in the Web 2.0 environment, social" and "informational" communication networks have been characterized in terms of their network metrics. Although Twitter is partly based on relationships between actors, activity has been shown to reflect characteristics of information networks. This study examines activity in Twitter...
In this paper, we validate and analyze the ability of an agent-based metaheuristic to facilitate the negotiation of consensus among distributed, networked agents. Our metaheuristic is based on the process honeybees use to achieve consensus in selecting a new nest site. We show that our metaheuristic successfully guides systems to a consensus in a high percentage of cases and that the quorum size parameter...
Understanding competition is essential for every firm. Unfortunately, information on who competes with whom is scarce. Traditional research approaches such as surveys and panels are time consuming, expensive, and usually not well applicable to markets with large numbers of consumer durables. Consumer search data from a price comparison site, however, allows for observing consumers search and compare...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.