The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Maximal frequent itemset is the largest frequent itemset in a database which is not covered by other itemsets. All frequent itemsets can be built up from maximal one. Moreover, it is possible to focus on any part of the maximal frequent itemset to supervise Data Mining. Bees' Algorithm is simple, robust and population-based stochastic optimization algorithm which is based on bees' natural foraging...
One of the important trends which is supposed to have more attention in the system of cognitive radio is wireless security models. Security requirements for CRNs are the same as the general wireless networks, taking into consideration that the frequency band changes dynamically adding a specific feature when we deal with security of CRNs. A new category of security issues and challenges have been...
The Artificial Fish Swarm Algorithm (AFSA) is a swarm-based metaheuristic algorithm which mimics the conduct of a group of fish in nature. In this paper, we proposed an improved AFSA algorithm for solving the Flexible Job Shop Scheduling Problem (FJSSP). The improvement is based on Variable Neighborhood Descent (VND) strategy which is performed on AFSA by different neighborhood structures to improve...
The color reduction or color quantization is needed for many reasons such as, to compress the high-resolution images which take a lot of the disk space and to easily view the images on the screens that do not support a large number of color ranges (low-resolution Screens). Color quantization generates a new image, which has less number of colors, but the difference between the Quantized Image and...
Based on the parametric identification method and radial basis function networks, the meshfree approach to the solution of inverse coefficient problems of mathematical physics is proposed. For regularization of the solution, an iterative method is used where the number of iterations, determined by the norm of the residual, plays the role of the regulator. The effectiveness of the approach is confirmed...
In this paper, new encryption algorithm for audio file is proposed based on a combination between block cipher and chaotic maps. The proposed algorithm encrypts and decrypts a block size of 625(25 × 25) bytes. Each block is inputs into three sages: Permutation stage, Xor adding stage, Substitution stage. In Permutation stage the audio block is permuted using chaotic Tent map. Then the resulted block...
A modern encoding algorithm in image processing is presented, this algorithm depends on Elementary Cellular Automata (ECA) and a combination of (2D, 3D) chaotic system. First, Arnold Cat Map (ACM) is utilized as a preprocessing for image shuffling and substitution. After that, 2D Duffing map is utilized to obtain the initial condition of the ECA. Next, Bogdanov map and the eight ECA rules along with...
In this search; Bayesian analysis of the two parameter Lomax distribution reliability has been considered, and the estimation has been obtained under logarithm loss function for three different prior distributions (Quasi distribution, Exponential distribution and Gamma distribution). they has been made under complete data analyses. The simulation study has been conducted to compare by mean squared...
The increase of the web 2.0 applications and the Spread of mobile devices in the institution of higher education and increasing users lead to slow wireless connection. Moreover, the uses of different web 2.0 application lead to the consumption more bandwidth where the web 2.0 has inspired intense and growing interest, particularly as social networks, search engines, multimedia, markets and news, education,...
The structure of community represents the latent social context of user activities and has important implementations in the field of collaborative filtering in recommendation systems, in particular; when the recommended items can be inferred based on all users' interests within a community. The important issue when there are some social networks which have no ability to division due to high connectivity...
For over a century, fingerprints (FP) have been considered one of the most highly used methods for human recognition; automated biometric systems have only been available in recent years. FP recognition is becoming indispensable part of many identification systems in the world. This research present a proposed authentication system based on FP as biometric type and some of static credential personal...
This work considers the issue that (national) internet service providers (ISPs) need to be capable to deliver increasingly more demanding services with higher quality standards. For this purpose, a general framework for enhancing QoE through better configuration of QoS parameters and end users' feedback measurement has been proposed. The proposed framework includes two main parts: the QoS part and...
The main design principle of Information-Centric Networking (ICN) is the name based routing, that makes users able to ask for a data object by only using its name, and makes the network deliver data to users from a nearby cache if in-network caching is available. Software-Defined Networking (SDN) decouples the control layer from the data layer, so that the complexity, and network control and management...
The detection and matching of logos have widely attention for the document images retrieval projects. In this paper an automatic effective logo matching has been developed and applied to different Arabic documents. The proposed technique based on matching between logos by using two types of significant features. The first is region based feature which represent the global features of an object. This...
In this research the security issues are discussed for securing big data. Encryption algorithms play an essential part to secure information. This paper demonstrates analysis of well-known block cipher CAST-256 and its modified version using modified S-Box and key generator. In this research the implementation of the modified CAST cryptography algorithm was discussed. It was worked dynamically on...
For secure data transmission over internet, it is important to transfer data in high security and high confidentiality, information security is the most important issue of data communication in networks and internet. To secure transferred information from intruders, it is important to convert the information into cryptic format. Different methods used to ensure data security and confidentiality during...
Search on the web is a delay process and it can be hard task especially for beginners when they attempt to use a keyword query language. Beginner (inexpert) searchers commonly attempt to find information with ambiguous queries. These ambiguous queries make the search engine returns irrelevant results. This work aims to get more relevant pages to query through query reformulation and expanding search...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.