The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Tags can be used to annotate resources on the web. This enables users to share or browse the resources or retrieve them in future. Collaborative Tagging systems or folksonomies have the potential to become an integral part of Web 2.0. Formal Concept Analysis (FCA) is a powerful tool commonly used in Artificial Intelligence, Data Mining and with the Semantic Web. FCA has been used in online document...
“You cut, I choose” is a classical algorithm for fair sharing of resources among two agents which guarantees “envy-freeness”. In a multi-agent scenario, several algorithms were proposed for sharing resources fairly on a Cloud. However, no algorithm has been proposed till now for High Performance Computing (HPC) agents which are computational intensive, where not just the resources are to be fair-shared...
In the medical field, huge data is available, which leads to the need of a powerful data analysis tool for extraction of useful information. Several studies have been carried out in data mining field to improve the capability of data analysis on huge datasets. Cancer is one of the most fatal diseases in the world. Lung Cancer with high rate of accurance is one of the serious problems and biggest killing...
The Max-Log-MAP is a Soft Input Soft Output (SISO) algorithm, which determines the probability of most likely path through the trellis and hence it gives sub optimal performance compared to Log-MAP algorithm. A simple but effective technique to improve the performance of Max-Log-MAP (MLMAP) algorithm is to scale the extrinsic information exchanged between two decoders using appropriate Scaling Factor...
As the syntax based information retrieval yields very low precision, the researchers are moving to the semantic based information retrieval. The great challenge of the information retrieval system is to retrieve the related relevant information from the heterogeneous web resources. This paper aims for the retrieval of the relevant geo-spatial concepts from the geo-spatial ontology which aids application...
The Wireless network plays a significant role in today's life. A handoff is a one of the foremost factors in order to provide continuous connectivity service to the mobile user. A handoff will be taken place by different network in order to maintain connectivity. In the existing system handoff will be measured without usage of relay network. To increase the quality of service within WLAN and WIMAX...
There has been a surge towards physical memory forensics with recent development of valuable tools and techniques in acquisition and analysis. However, most of the research is skewed towards the Operating System architecture with primary focus on processes, threads, kernel modules etc. There has been little research towards retrieval of application level data. Moreover, the research is majorly application...
Steganography is the art of hiding data in a medium without making it apparent that the medium contains a message. Various techniques for Steganography have been proposed in different mediums by researchers. The most commonly used form of Steganography is the LSB (Least Significant Bit) Steganography in which the Least Significant Bit of a byte is changed. Here, we propose a variable higher bit approach...
The main objective of this paper is to identify the semantic roles of arguments in a sentence based on lexicalized features even if less semantic information is available. The semantic role labeling task (SRL) involves identifying which groups of words act as arguments to a given predicate. These arguments must be labeled with their role with respect to the predicate, indicating how the proposition...
Feature Selection extracts the more informative and distinctive features from any dataset to improve the classification accuracy. Evolutionary and swarm intelligent algorithms play a vital role in optimizing the process of FS. Artificial Bee Colony algorithm is a popular swarm intelligent, metaheuristic search algorithm and it has been widely used in solving numerical optimization problems. In our...
Technoeconomics of a business structure exhibit evolving performance attributes as decided by various exogenous and endogenous causative variables. Proposed in this paper is a predictive model to elucidate the forecast performance on such evolving traits in large business structures (like electric power utility companies). The method uses artificial neural network (ANN) based predictive analytics...
Handwritten numeral character recognition has been an intensive research in the field of artificial intelligence since many decades. This paper proposes a radial basis function neural network model for recognizing handwritten numerals. The geometric shape of handwritten numerals is described by computing a feature vector based on the skeleton of the images. The normalized central moment features are...
In Grid computing environment, as the resources are more heterogeneous, geographically distributed, complex and owned by different organizations, they are more prone to failures. Application scheduling in such a environment is very crucial. Generally, during application/job scheduling only performance factor of resources are considered. But if a node with high computational power also have high failure...
Cloud computing is a key computing platform for sharing resources that includes IaaS, Saas, PaaS and business process. This provides many benefits for the users to create and store health care data on the cloud thereby utilizing fewer resources in the client system. The proposed system mainly focuses on health care data security. To reduce the increase in cost of hospitalization, researchers are building...
Cloud computing provides computing, storage and software resources as services to users on-demand over the Internet. Cloud computing has been increasingly gaining popularity due to the benefits such as its access capability from any location, sharing of data across multiple data centers, and the management of data storage by the service providers. Since security is still an unresolved issue in public...
Cloud computing is one of the most useful environment that provides various information services in which required information can be retrieved through many web-based tools and applications. Now the new surge of interest in cloud computing is accompanied with the exponential growth of data sizes. There is a need to find the desired content quickly and efficiently by simply consulting the index. Thus...
Security in cloud computing is considered to be the most challenging research domain where most of the solutions remain vulnerable. Availability of data in cloud to every other components of cloud made it difficult to protect it from external sources. The risk of malicious insiders in cloud and failing of cloud services have received a strong attention from many companies. Security ensures confidentiality,...
A distributed environment is one in which intrusions are prevalent and drastically affect the performance of the networks. Therefore a need for Intrusion Detection Networks arises. Collaborators could be used here to enhance the detection of attacks. But still this concept suffers from lack of trustworthiness in the distributed environment. We introduce Mobile Agents (MA) to handle this problem effectively...
The main objective of the proposed system is to increase the resource utilization and the provider's profit in a cloud environment. While reserving the resources, the users' requests are posted onto the Virtual Machines (VMs), and then these VMs are deployed onto the Physical Machines (PMs). The proposed system uses a Bin-Packing procedure for VM Placement which is used to reduce the number of physical...
Cloud computing allows the cloud customer to hoard their data on the remote store and endow them to utilize the On-demand high quality applications with super colossal computational power. As prodigious amount of data are stored on the cloud, it inevitably acquaint new security hazards such as data integrity, data availability problems in the system. To overcome these issues, we propose an extensible...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.