The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The focus of this paper is on detecting overlapping communities for the directed graphs by implementing a new algorithm and analyzing it with various performance metrics. The algorithm aims at finding core nodes for the directed graph which are subset of communities and have higher contact frequency. These are then extended to find communities using compactness measurement (CM). The compactness of...
Welcome to the 2017 International Conference on Computer, Information and Telecommunication Systems (CITS 2017). This year's conference marks the sixth CITS, which is being held on annual basis.
This study presents a novel approach to extracting discriminative texture features of a liver tumor in computed tomography (CT) scans, which are used to combine with medical records for survival prediction. The liver region is first located using an image segmentation method. A pre-learned tumor classifier follows to segment the tumors in the liver region. Next, two sets of feature points are detected:...
Despite the widespread adoption of mobile phones, some remote, rural areas still lack cellular connectivity primarily due to the high cost of traditional base station deployments. Software-defined base station implementations have recently been able to drastically reduce the cost of hardware. However, covering the operating costs remains an issue, particularly in small communities. In this paper,...
From process formulation, welding production to quality inspection, welding quality management needs the cooperation of many departments. In actual production, the repeated works, omissions, and other problems of the establishment of welding procedure specification (WPS) occur from time to time. Dynamic changes of welding current and voltage signals can reflect the performance of electric arc; unstable...
Conspiracy Number Search (CNS) is a MIN/MAX tree search algorithm, trying to guarantee the accuracy of the MIN/MAX value of a root node. It suffers from a low efficiency because of its slow convergence and a big cost of computing conspiracy numbers. However, the conspiracy number is still a promising concept for measuring the “stability”, which can be used to analyze game progress patterns. In this...
A method of blind signal separation based on second order statistic analytic equations is provided for a single sensor. This method takes second order statistics equations as restrictive conditions to construct blind separation criterion, then traditional blind separation methods are used to separate source signals through iterative optimization of genetic algorithm. In theory, not only can the coherent...
while e-commerce has grown quickly in recent years, more and more people are used to utilize this popular channel to purchase products and services on the Internet. Therefore, it becomes very important for shopping sites to predict precisely which items their customers would buy so as to increase sales or improve customer satisfaction. Traditional algorithms such as Collaborative Filtering, has been...
Network lifetime is of great importance in WBANs that significantly influences the network performance and user experience. Among all the solutions to extend the network lifetime, relay mechanism plays a crucial role. However, previous works only concentrate on energy efficiency of sensor nodes regardless of energy storage diversity among sensor nodes, which may severely limit the performance of enhancing...
The intermodulation interference of communication radio affect the normal communication, in which the third-order intermodulation interference can not be avoided. In this paper, the signal characteristics of the third-order intermodulation interference are studied, and the envelope expression of the third-order intermodulation products of different modulation styles and the mathematical expression...
In this paper, we propose a chaotic convolutional encryption scheme based on multiple chaos mapping. The scheme employs the characteristics of pseudo randomness and sensitivity to initial conditions of chaos mapping. It generates time-varying state transition matrix through modulo-two adder between multiple chaos sequences and input data as well as the state values of status registers in convolutional...
With the popularity of smart devices in a variety of actions to drive more usage of wireless broadband networks. OTT refers to delivery of video, audio and other media over the Internet. The video-related applications and services are major challenges that impact the network performance in the future. It is important to achieve network and service traffic offloading to overcome high-speed, real-time,...
Ubiquitous in-network caching is one of the important aspects of the Information-Centric Networking (ICN), which has been a hot topic of ICN research. Many works have tried to propose better caching schemes to solve the drawbacks of the default en-route scheme, but most of them are insufficient to improve performance of entire network for just considering single layer optimization factor. Also considering...
In respect of the problems of complex changing of targets and background in moving target tracking, we utilize feature point detection method under low-rank sparse decomposition to track the moving target. First, for video sequence image, we adopt RPCA (Robust Principal Component Analysis) algorithm to conduct low-rank sparse decomposition, thereby extracting the foreground of the target; then SURF...
The design of routing protocol in mobile social delay tolerant networks is a tricky issue due to lack of stable end-to-end path, frequent link disconnection and changeable network topology. This paper proposes a novel routing algorithm based on dynamic topological potential and social relationship (DTPSR) between nodes for mobile social delay tolerant networks. In DTPSR, we define three metrics to...
Heterogeneous System Architecture (HSA) is a newly arising heterogeneous multiprocessor platform which may improve the heavy data transmission between CPU and GPU in traditional heterogeneous multiprocessor platforms through shared virtual memory. However, as other heterogeneous multiprocessor platforms, it is complex and error-prone to write HSA programs. Therefore, we design and implement a translation...
The random nature of network topology is a major challenge while developing new routing protocol for Opportunistic Networks (OppNets). Additionally, other factors like intermittent connections, limited bandwidth etc. further restrict the performance of existing routing protocols. In this paper, an advanced context aware routing protocol called GAP is proposed. The proposed protocol efficiently combines...
With the rapid development of Internet of things, Wireless Sensor Networks (WSN) has received growing interests. As the virtual backbone of WSN, connected dominating set (CDS) plays an important role in supporting data communication, reducing routing overhead and enhancing the scalability of the network. Attribute to the rapid development of microprocessor and electronic technology, communication...
It was analyzed the most frequent security algorithms used for information security to mitigate the integrity, confidentiality and availability of the information. The objective is to have an approach on security algorithms and define a quantitative algorithm using flowchart techniques for a process of Ecuador civil registry database. The deductive method was used to analyze the information of the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.