Results (43)
Search Parameters:
Keyword: SimilarityStudent’s Belief Detection and Segmentation for Real-Time: A Case Study of Indian University
This paper has explored the technology beliefs of university students considering four parameters. We have proposed an automatic belief identification system for academic institutions. For this, we used two different clustering algorithms to segment the student group with different beliefs about the technology. In the Hierarchical Clustering (HC), the Agglomerative approach was followed. The beliefs…
Read MoreEvaluation of Disadvantaged Regions in East Java Based-on the 33 Indicators of the Ministry of Villages, Development of Disadvantaged Regions, and Transmigration Using the Ensemble ROCK (Robust Clustering Using Link) Method
East Java province is a large province in Indonesia, in which Surabaya is the second largest metropolitan city after Jakarta. Various problems of development inequality in East Java have caused East Java to be defined as a disadvantaged area in 2015. The determination of disadvantaged regions is carried out every 5 years using 6 criteria…
Read MoreDetermination of ERP Readiness Assessment using Agile Parameters: A Case Study
At present, in the era of digitization the organizations need Enterprise Resource Planning (ERP) systems to have the ability adapt to changes with rapid response in order to increase the competitive advantage. The fact, many companies have failed to implement ERP which is proven to be not go live on time, so that the implementation…
Read MoreCorrelation-Based Incremental Learning Network for Gas Sensors Drift Compensation Classification
A gas sensor array is used for gas analysis to aid in an inspection. The signals from the sensor array are fed into machine learning models for learning and classification. These signals are characterized by time series fluctuating according to the environment or drift. When an unseen pattern is entered, the classification may be incorrect,…
Read MoreApplication of EARLYBREAK for Line Segment Hausdorff Distance for Face Recognition
The Hausdorff distance (HD) is defined as MAX-MIN distance between two geometric objects for measuring the dissimilarity between two objects. Because MAX-MIN distance is sensitive with the outliers, in face recognition field, average Hausdorff distance is used for measuring the dissimilarity between two sets of features. The computational complexity of HD, and also average HD,…
Read MoreAuthor Identification for Marathi Language
This is era of new technology; most of information is collected from internet, web sites. Some people uses data from research papers, thesis, and website as it is and publish as their own research without giving proper acknowledgement. This term is known as plagiarism. There are two types of plagiarism detection methods, i) Extrinsic plagiarism…
Read MoreMultiscale Texture Analysis and Color Coherence Vector Based Feature Descriptor for Multispectral Image Retrieval
Content Based Image Retrieval (CBIR) for remote sensing image data is a tedious process due to high resolution and complexity of image interpretation. Development of feature extraction technique is a major portion to represent the image content in an optimal way. In this paper, we propose a feature descriptor which combines the color coherent pixel…
Read MoreSpiral Curve for Revocable Touchless Fingerprint Template Securisation
Fingerprint data is really protected by cancelable fingerprint template because it can be revoked when compromise and a new one can be reissued. We develop a touchless cancelable fingerprint template whose algorithm was published in our previous work. We implement here the algorithm and conducted several tests on several databases to confirm the stability of…
Read MoreLogic Error Detection System based on Structure Pattern and Error Degree
The importance of programming skills has increased with advances in information and communication technology (ICT). However, the difficulty of learning programming is a major problem for novices. Therefore, we propose a logic error detection algorithm based on structure patterns, which are an index of similarity based on abstract syntax trees, and error degree, which is…
Read MoreStudy and Implementation of Various Image De-Noising Methods for Traffic Sign Board Recognition
The problem of recognizing traffic sign boards in a correct fashion is one of the major challenges since there is an alarming rate of increase in the number of road accidents happening because of incorrect interpretation of traffic sign boards in bad weather conditions. In this paper, a comparative analysis of various noise removal techniques…
Read MoreQuantitative Traffic Congestion Analysis Approach in Ahmedabad
This study is the extension of the previous study about “Traffic Service Quantitative Analysis Method under Developing Country” in 2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI). In the previous study, it is introduced how to make quantitative calculation for traffic congestion by traffic parameters and its characteristics curve such as traffic…
Read MoreMultiple Social Metrics Based Routing Protocol in Opportunistic Mobile Social Networks
In Opportunistic Mobile social networks (OMSNs), the social characteristics and behavior of humans carrying mobile devices are exploited to improve information provision and data routing in the network. Social-based routing algorithms attempt to exploit users’ social features such as similarity, centrality and betweenness, singularly or combined, to select a suitable relay node among neighbors. However,…
Read MoreComputational Techniques to Recover Missing Gene Expression Data
Almost every cells in human’s body contain the same number of genes so what makes them different is which genes are expressed at any time. Measuring gene expression can be done by measuring the amount of mRNA molecules. However, it is a very expensive and time consuming task. Using computational methods can help biologists to…
Read MoreCommunity Detection in Social Network with Outlier Recognition
Exploring communities and outliers in Social Network is based on considering of some nodes have overlapped neighbor node within the same group as well as some nodes have no any link to the other node or have no any overlapped value. The existing approaches are based on the overlapping community detection method were only defined…
Read MoreSoft Handoff Evaluation and Efficient Access Network Selection in Next Generation Cellular Systems
The increased motivation (by service providers) to offer user-centric and seamless communication services – that satisfies users’ quality of experience (QoE), has manifested a myriad of challenges in the field of wireless communication; and given the increased traffic capacity and sudden explosion of cellular devices, communication systems are constantly threatened by performance related issues –…
Read MoreA comparative study for using the LBC format for compressing static medical images
This paper is an extension of work originally presented at conference Applied Machine Intelligence and Informatics (SAMI), 2017 IEEE 13th International Symposium. The article performs a comparative study between the image compression technique Local Binary Compressed format (LBC) proposed by the authors and the standard image compression techniques used today (BMP, JPEG, PNG and GIF).…
Read MoreComputer Aided Classification using Support Vector Machines in Detecting Cysts of Jaws
Jaw cyst is one of the most common pathology observed in the field of dentistry. Early detection of the cystic lesion will help the surgeons to take appropriate therapeutic measures after a thorough diagnostic procedure. One of the challenging task for surgeons is to differentiate the cysts from the other pathologies. The appearance of these…
Read MoreFrame Filtering and Skipping for Point Cloud Data Video Transmission
Sensors for collecting 3D spatial data from the real world are becoming more important. They are a prime research area topic and have applications in consumer markets, such as medical, entertainment, and robotics. However, a primary concern with collecting this data is the vast amount of information being generated, and thus, needing to be processed…
Read More
