Results (215)
Search Parameters:
Keyword: AlgorithmsEKMC: Ensemble of kNN using MetaCost for Efficient Anomaly Detection
Anomaly detection aims at identification of suspicious items, observations or events by differing from most of the data. Intrusion Detection, Fault Detection, and Fraud Detection are some of the various applications of Anomaly Detection. The Machine learning classifier algorithms used in these applications would greatly affect the overall efficiency. This work is an extension of…
Read MoreSurvey on Semantic Similarity Based on Document Clustering
Clustering is a branch of data mining which involves grouping similar data in a collection known as cluster. Clustering can be used in many fields, one of the important applications is the intelligent text clustering. Text clustering in traditional algorithms was collecting documents based on keyword matching, this means that the documents were clustered without…
Read MoreApplication of Open-Source Optimization Library “Extremum” to the Synthesis of Feedback Control of a Satellite
Current work demonstrates how open-source optimization library ”Extremum” (OSOL Extremum) can be used to build feedback controller of a satellite. Proposed software was developed to as an attempt to eliminate current problems that are present in scientific area: black-box effect (i.e. there is no opportunity to explore source code, modify it, or simply verify), no…
Read MoreMultiple-Optimization based-design of RF Integrated Inductors
In this paper, a multiple-objective Metaheuristics study is discussed. Initially, three mono-objective metaheuristics will be explored in order to design and optimize Radio-Frequency integrated inductors. These metaheuristics are: An evolutionary algorithm called The Differential Evolution (DE), An algorithm supported on Newton’s laws of gravity and motion called the Gravitational Search Algorithm (GSA) and, finally, A…
Read MoreA Fuzzy-Based Approach and Adaptive Genetic Algorithm in Multi-Criteria Recommender Systems
Recommender Systems (RSs) are termed as web-based applications that make use of filtering methods and several machine learning algorithms to suggest relevant user objects. It can be said that some techniques are usually adopted or trained to develop these systems that generate lists of suitable recommendations. Conventionally, RS uses a single rating approach to preference…
Read MorePrototype of a Security Architecture for a System of Electronic Voting for the Ecuador
To be able to perform a better voting system, it is important to go to ICT and its various platforms designed for electoral purposes, which are being used in several countries in Latin America. In Ecuador are being used digital mechanisms during the process, but with certain errors and he is being considered to implement…
Read MorePredictive Modelling of Student Dropout Using Ensemble Classifier Method in Higher Education
Currently, one of the challenges of educational institutions is drop-out student issues. Several factors have been found and determined potentially capable to stimulate dropouts. Many researchers have been applied data mining methods to analyze, predict dropout students and also optimize finding dropout variables in advance. The main objective of this study is to find the…
Read MoreAn Immutable Algorithm Approach to Improve the Information Security of a Process for a Public Organization of Ecuador
Currently, information security is among the main characteristics that must be achieved within the security of private and public organizations worldwide. For this reason, globally recognized algorithms such as the AES, IDEA, RC5, DES, RSA are researched with the aim of identifying the most suitable and obtaining a greater degree of security and speed of…
Read MoreConversion of 2D to 3D Technique for Monocular Images using Papilio One
A 3D image adds realism in viewing experience and can assist in simplifying the graphical displays. A Third dimension supplement to the input can improve pattern recognition, and can be used for 3D scene reconstruction and robot navigation. Recently popularity of 3D hardware is also increased which makes it a hot topic. The production of…
Read MoreMultiple Social Metrics Based Routing Protocol in Opportunistic Mobile Social Networks
In Opportunistic Mobile social networks (OMSNs), the social characteristics and behavior of humans carrying mobile devices are exploited to improve information provision and data routing in the network. Social-based routing algorithms attempt to exploit users’ social features such as similarity, centrality and betweenness, singularly or combined, to select a suitable relay node among neighbors. However,…
Read MoreFeature Selection for Musical Genre Classification Using a Genetic Algorithm
Music genre classification is an important multimedia research domain, including aspects of music piece representation, distances between genres, and categorization of music databases. The objective of this study was to develop a model for automatic classification of musical genres from audio data by using features from low-level time and frequency domains. These features can highlight…
Read MoreInsight into the IEEE 802.1 Qcr Asynchronous Traffic Shaping in Time Sensitive Network
TSN is an attractive solution for latency-critical frame transmission built upon IEEE 802 architecture. Traffic scheduling and shaping in TSN aim to achieve bounded low latency and zero congestion loss. However, the most widespread solution (i.e. Time-Aware Shaper) requires a networkwide precision clock reference and only targets on cyclical traffic flows. This paper focuses on…
Read MoreLow Contrast Image Enhancement Using Convolutional Neural Network with Simple Reflection Model
Low contrast images degrade the performance of image processing system. To solve the issue, plenty of image enhancement methods have been proposed. But the methods work properly on the fixed environment or specific images. The methods dependent on fixed image conditions cannot perform image enhancement properly and perspective of smart device users, algorithms including iterative…
Read MoreA Proposed Architecture for Parallel HPC-based Resource Management System for Big Data Applications
Big data can be considered to be at the forefront of the present and future research activities. The volume of data needing to be processed is growing dramatically in both velocity and variety. In response, many big data technologies have emerged to tackle the challenges of collecting, processing and storing such large-scale datasets. High-performance computing…
Read MorePID-Type FLC Controller Design and Tuning for Sensorless Speed Control of DC Motor
This article examines the use of non-ideal current and voltage sensors for sensorless speed control for a fixed field DC motor. A PID type speed controller with KF estimator was applied to control the DC motor and IAE, settling time, and peak overshoot were taken as performance indices. However, KF facilitated the noise reduction. After…
Read MoreReal Time Eye Tracking and Detection- A Driving Assistance System
Distraction, drowsiness, and fatigue are the main factors of car accidents recently. To solve such problems, an Eye-tracking system based on camera is proposed in this paper. The system detects the driver’s Distraction or sleepiness and gives an alert to the driver as an assistance system. The camera best position is chosen to be on…
Read MoreMachine Learning Applied to GRBAS Voice Quality Assessment
Voice problems are routinely assessed in hospital voice clinics by speech and language therapists (SLTs) who are highly skilled in making audio-perceptual evaluations of voice quality. The evaluations are often presented numerically in the form of five-dimensional ‘GRBAS’ scores. Computerised voice quality assessment may be carried out using digital signal processing (DSP) techniques which process…
Read MoreComputational Techniques to Recover Missing Gene Expression Data
Almost every cells in human’s body contain the same number of genes so what makes them different is which genes are expressed at any time. Measuring gene expression can be done by measuring the amount of mRNA molecules. However, it is a very expensive and time consuming task. Using computational methods can help biologists to…
Read MoreA Novel Fair and Efficient Resource Allocation Scheduling Algorithm for Uplink in LTE-A
With the introduction of new services and new more sophisticated mobile devices the radio network operators are faced with new challanges to increase the system performance. The most recent standards introduced by 3GPP for the new architectures of the Long Term Evolution network address these issues and outline possibilities for optimizing network performance and user…
Read MoreA Comparative Study of a Hybrid Ant Colony Algorithm MMACS for the Strongly Correlated Knapsack Problem
Metaheuristic hybridization has recently been widely studied and discussed in many research works as it allows benefiting from the strengths of metaheuristics by combining adequately the different algorithms. MMACS is a new hybrid ant colony optimization algorithm based on the foraging behavior of ants. This algorithm presents two hybridization levels. The first hybridization consists in…
Read MoreEmotional Impact of Suicide on Active Witnesses: Predicting with Machine Learning
Predicting the impact of suicide on incidental witnesses at an early stage helps to avert the possible side effect. When suicide is committed in public, incidental observers are left to grapple with it. In many cases, these incidental witnesses tend to experience the emotional side effect with time. In this study, we employed a Machine…
Read MoreNemoMap: Improved Motif-centric Network Motif Discovery Algorithm
Network motif analysis has several applications in many different fields such as biological study and social network modeling, yet motif detection tools are still limited by the intensive computation. Currently, there are two categories for network motif detection method: network-centric and motif-centric approach. While most network-centric algorithms excel in enumerating all potential motifs of a…
Read MoreEvolving AL-FEC Application on 5G NGMN-Edge Computing Systems
Fifth generation of mobile networks (5G) comes to cope with the context of the new mobile telecommunications era. Edge computing is a new collaborative technology under standardization utilizing end-user devices or near-end-user edge devices to operate processing, communication, or control operations. The achievement of efficient error control is a very critical aspect in the successful…
Read MoreDesign of smart chess board that can predict the next position based on FPGA
The abilities of human brain to discover solutions for many problems is a great gift that motivate the scientists to develop the revolution of the artificial intelligence and using it in many areas. This paper proposed an intelligent chessboard which works in a way that similar to the human brain that predicts the next positions…
Read MoreA Method for Generating, Evaluating and Comparing Various System-level Synthesis Results in Designing Multiprocessor Architectures
Multiprocessing can be considered the most characteristic common property of complex digital systems. Due to the more and more complex tasks to be solved for fulfilling often conflicting requirements (cost, speed, energy and communication efficiency, pipelining, parallelism, the number of component processors, etc.), different types of component processors may be required by forming a so…
Read More
