Results (215)
Search Parameters:
Keyword: AlgorithmsNemoSuite: Web-based Network Motif Analytic Suite
Biological networks represent biological systems, and various graph analysis algorithms have been applied to solve various real-world problems. Network motif analysis, as one of network analyses, is detecting frequently and uniquely over-occurring subgraph patterns in a network. The detection process requires high computational resources, and various tools have been developed to provide efficient solutions. However,…
Read MoreParameter Estimation for Industrial Robot Manipulators Using an Improved Particle Swarm Optimization Algorithm with Gaussian Mutation and Archived Elite Learning
This work presents the analysis and formulation for optimizing the dynamic model and parameter estimation of all the six joints of a 6DOF industrial robot manipulator by utilizing swarm intelligence to optimize two excitation trajectories for the first three links at the arm and the last three links at the wrist of the robot manipulator.…
Read MoreHandling Priority Data in Smart Transportation System by using Support Vector Machine Algorithm
In an intelligent transportation system (ITS), time is a big challenge since processing a huge amount of data in a short time is very difficult, especially when the processed data is heterogeneous, consisting of a mixture of emergency data, normal data, and noise. In an ITS, an ambulance is one of the priority vehicles, and…
Read MoreRecommendation System for SmartMart-A Virtual Supermarket
The current online shopping system does not provide the actual shopping experience to the users where they scroll through the web pages and select an item to purchase, which becomes monotonous soon and lacks the shopping experience. This paper describes the development of the SmartMart, a 3D shopping mart where the user can navigate around…
Read MoreThe Design of a Hybrid Model-Based Journal Recommendation System
There is currently an overload of information on the internet, and this makes information search a challenging task. Researchers spend a lot of man-hour searching for journals related to their areas of research interest that can publish their research output on time. In, this study, a recommender system that can assist researchers access relevant journals…
Read MoreDevelopment of Secondary Processing Data Methods under Single Point Thunderstorm Activity Monitoring
Forecasting the occurrence and development of thunderstorms near insured mobile objects, such as aircraft carriers, oil tankers, requires the usage of appropriate single-point monitoring systems (SPMS) of thunderstorm activity. These systems must be small and included in the equipment of the objects. A SPMS based on EH location finder meets the requirements of small dimensions.…
Read MoreCognitive Cybernetics in the Foresight of Globalitarianism
This paper presents the results of the research conducted with the help of cognitive cybernetics about the “mass” factor from the theory of totalitarianism. According to the expert system model, “big data” analysis sought to discover knowledge for assessing the future status of digital social connectivity. Originally developed models and methods of cognitive and computer…
Read MoreAutomatic Stochastic Dithering Techniques on GPU: Image Quality and Processing Time Improved
Dithering or error diffusion is a technique used to obtain a binary image, suitable for printing, from a grayscale one. At each step, the algorithm computes an allowed value of a pixel from a grayscale one, applying a threshold and, therefore, causing a conversion error. To obtain the optical illusion of a continuous tone, the…
Read MoreAccelerating Decision-Making in Transport Emergency with Artificial Intelligence
The paper addresses speeding up meetings in a networked environment during rescue works in a transport emergency. Several groups of representatives of various services and observers participate in those meetings. The number of wrong decisions tends to increase because remote participants cannot understand each other quickly. First, the meetings must be efficiently held to avoid…
Read MoreIntrusion Detection and Classification using Decision Tree Based Key Feature Selection Classifiers
Feature selection method applied on an intrusion dataset is used to classify the intrusion data as normal or intrusive. We have made an attempt to detect and classify the intrusion data using rank-based feature selection classifiers. A set of redundant features having null rank value are eliminated then the performance evaluation using various feature selection…
Read MoreVietnamese Text Classification with TextRank and Jaccard Similarity Coefficient
Text classification is considered one of the most fundamental and essential problems that deal with automatically classifying textual resources into pre-defined categories. Numerous algorithms, datasets, and evaluation measurements have been proposed to address the task. Within the era of information redundancy, it is challenging and time-consuming to engineering a sizable amount of data in multi-languages…
Read MoreThe Contribution of Wind Energy Capacity on Generation Systems Adequacy Reliability using Differential Evolution Optimization Algorithm
Currently, increasing penetration of the Wind Energy Conversion System (WECs) in Power generation systems has influenced the supply of electrical power reliability for the consumer in comparison with other traditional sources. In this paper, the performance and efficiency of a new optimization approach referred to as the “Differential Evolution Optimization Algorithm” (DEOA) to measure the…
Read MoreDense Deep Neural Network Architecture for Keystroke Dynamics Authentication in Mobile Phone
The ever-growing technology in mobile smartphones has enabled users to store sensitive and private information; as a result, it required the need for an improved security system. Previous approaches heavily relied on shallow machine learning algorithms that require feature extraction which is time consuming, laborious and can cause, resulting in poor authentication. In this paper,…
Read MoreA Toolkit for the Automatic Analysis of Human Behavior in HCI Applications in the Wild
Nowadays, smartphones and laptops equipped with cameras have become an integral part of our daily lives. The pervasive use of cameras enables the collection of an enormous amount of data, which can be easily extracted through video images processing. This opens up the possibility of using technologies that until now had been restricted to laboratories,…
Read MoreApplications of the Heuristic Optimization Approach for Determining a Maximum Flow Problem Based on the Graphs’ Theory
In the present paper, a universal approach for determining the maximum flow problem in directed graph for solving different problems is applied. It can be considered as a heuristic and it can be used as a denomination for analyzing an arbitrary system with a mathematical description as a directed graph. The physical nature of the…
Read MoreSupervised Learning Techniques for Stress Detection in Car Drivers
In this paper we propose the application of supervised learning techniques to recognize stress situations in drivers by analyzing their Skin Potential Response (SPR) and the Electrocardiogram (ECG). A sensing device is used to acquire the SPR from both hands of the drivers, and the ECG from their chest. We also consider a motion artifact…
Read MoreFeature Extractors Evaluation Based V-SLAM for Autonomous Vehicles
Visual Simultaneous Localization and Mapping known as V-SLAM, is an essential task for autonomous vehicles. It can be carried out using several sensors, in particular with on board cameras. To locate a vehicle, SLAM algorithms are based on two main tasks. The first task (front-end kernel) is intended to process images in order to provide…
Read MoreNature Inspired and Transform Based Image Encryption Techniques: A Comparative Study
In this paper, performances of two variations of chaos based algorithms are compared. First algorithm is a self-adaptive color image encryption algorithm is proposed based on Radial Hilbert Transform and chaos. This technique uses chaotic random phase masks operated on the transformed pixels to increase the randomness in confusion and diffusion operations. Also, a random…
Read MoreInnovative Solution for Parking-Sharing of Private Institutions Using Various Occupancy Tracking Methods
This work presents an innovative solution for parking-sharing of private institutions based on daily occupancy patterns and using different real time tracking methods of vacant parking slots. The research objective consists in finding the most accurate cars detection method, for determining of vacant parking slots and updating them on application web page. Beside the technical…
Read MoreStudent’s Belief Detection and Segmentation for Real-Time: A Case Study of Indian University
This paper has explored the technology beliefs of university students considering four parameters. We have proposed an automatic belief identification system for academic institutions. For this, we used two different clustering algorithms to segment the student group with different beliefs about the technology. In the Hierarchical Clustering (HC), the Agglomerative approach was followed. The beliefs…
Read MorePrototype for the Management of Engineering Companies and the ICT to Improve the Quality of Services
Information on alternative technologies or new prototypes was analyzed to help improve the quality of business management services. The problem is the lack of application of new technologies that improve the quality of service and reduce disagreements in the management of organizations. The objective is to present a prototype for the management of engineering and…
Read MoreButterfly Life Cycle Algorithm for Measuring Company’s Growth Performance Based on BSC and SWOT Perspectives
Previous study of butterfly life-cycle algorithms (BLCA) has been done to construct a novel algorithm by impersonating the life-cycle of a real butterfly. The algorithm was tested in measuring the company’s growth performance using a balanced scorecard (BSC) strategic planning model. This paper is proposed to continue the previous study by expanding the concept in…
Read MoreInterpretation of Machine Learning Models for Medical Diagnosis
Machine learning has been dramatically advanced over several decades, from theory context to a general business and technology implementation. Especially in healthcare research, it is obvious to perceive the scrutinizing implementation of machine learning to warranty the rewarded benefits in early disease detection and service recommendation. Many practitioners and researchers have eventually recognized no absolute…
Read MoreBayes Classification and Entropy Discretization of Large Datasets using Multi-Resolution Data Aggregation
Big data analysis has important applications in many areas such as sensor networks and connected healthcare. High volume and velocity of big data bring many challenges to data analysis. One possible solution is to summarize the data and provides a manageable data structure to hold a scalable summarization of data for efficient and effective analysis.…
Read MoreShape Optimization of Planar Inductors for RF Circuits using a Metaheuristic Technique based on Evolutionary Approach
In this article, we concentrate on the use of a metaheuristic technique based on an Evolutionary Algorithm (EA) for determining the optimal geometrical parameters of spiral inductors for RF circuits. For this purpose, we have opted for an optimization procedure through an enhanced Differential Evolution (DE) algorithm. The proposed tool allows the design of optimized…
Read More
