Disjunct Matrices (DM) are a particular kind of binary matrices which have been especially applied to solve the Non-Adaptive Group Testing (NAGT) problem, where the task is to detect any configuration of t defectives ...
详细信息
ISBN:
(纸本)9783030040703;9783030040697
Disjunct Matrices (DM) are a particular kind of binary matrices which have been especially applied to solve the Non-Adaptive Group Testing (NAGT) problem, where the task is to detect any configuration of t defectives out of a population of N items. Traditionally, the methods used to construct DM leverage on error-correcting codes and other related algebraic techniques. Here, we investigate the use of Evolutionary Algorithms to design DM and two of their generalizations, namely Resolvable Matrices (RM) and Almost Disjunct Matrices (ADM). After discussing the basic encoding used to represent the candidate solutions of our optimization problems, we define three fitness functions, each measuring the deviation of a generic binary matrix from being respectively a DM, an RM or an ADM. Next, we employ Estimation of Distribution Algorithms (EDA), Genetic Algorithms (GA), and Genetic programming (GP) to optimize these fitness functions. the results show that GP achieves the best performances among the three heuristics, converging to an optimal solution on a wider range of problem instances. Although these results do not match those obtained by other state-of-the-art methods in the literature, we argue that our heuristic approach can generate solutions that are not expressible by currently known algebraic techniques, and sketch some possible ideas to further improve its performance.
Humans can easily recognize handwritten words, after gaining basic knowledge of languages. this knowledge needs to be transferred to computers for automatic character recognition. the work proposed in this paper tries...
详细信息
ISBN:
(纸本)9781509035199
Humans can easily recognize handwritten words, after gaining basic knowledge of languages. this knowledge needs to be transferred to computers for automatic character recognition. the work proposed in this paper tries to automate recognition of handwritten hindi isolated characters using multiple classifiers. For feature extraction, it uses histogram of oriented gradients as one feature and profile projection histogram as another feature. the performance of various classifiers has been evaluated using theses features experimentally and quadratic SVM has been found to produce better results.
programming learning using the programmable Hardware devices (aka Hardware programming Learning) is a popular approach to motivate and encourage k12 students to carry out the learning by doing. However, most of Hardwa...
详细信息
ISBN:
(纸本)9781538674482;9781538674475
programming learning using the programmable Hardware devices (aka Hardware programming Learning) is a popular approach to motivate and encourage k12 students to carry out the learning by doing. However, most of Hardware packages lack the efficient learning materials or tools withthe simulation and visualization to assist the programming learning, which may lead to that k12 students find it difficult to learn and feel frustrated after the many attempts of try-and-error. therefore, in this preliminary study, a Simulated Blockly-Arduino-based programming Learning Tool, (SimBA-PLT), is designed and developed to facilitate the hands-on programming learning using Arduino-based hardware. In SimBA-PLT, students are able to visually program the blockly-based code to virtually perform the simulation of the Arduino-based hardware in advance. Afterwards, the Arduino-based hardware can be actually controlled by the Arduino-based code translated from the correct blockly-based code for facilitating the hardware programming learning. the learning motivation and performance will be expected to outperform the learning methods without the simulation.
Network Functions Virtualization (NFV) has emerged as a paradigm for efficient, flexible and agile network function provisioning. In such NFV-based networks, ensuring network performance and cost efficiency is an impo...
详细信息
ISBN:
(纸本)9781538636794
Network Functions Virtualization (NFV) has emerged as a paradigm for efficient, flexible and agile network function provisioning. In such NFV-based networks, ensuring network performance and cost efficiency is an important challenge to tackle when network traffic is steered through a chain of virtual network functions (VNF). In this work, we consider the dynamics of traffic demand in different time periods, and multipath routing for minimizing the routing cost in NFV. We focus primarily on optimization models and algorithms for finding a traffic steering solution that effectively splits a demand volume into several flows and selects appropriate links and nodes for these flows. We formulate the problem as a mixed linear integer programming model for obtaining an optimal solution taking into account the dynamics of service demand, multipath routing and service function chaining. For the large scale problem, we propose a heuristic algorithm to find an approximation solution. Particularly, our proposed model and algorithm allows a controller to update a link weight system for effectively steering traffic demand to appropriate nodes in a NFV infrastructure. the evaluation results show that our approach to traffic steering significantly improves a number of major performance metrics including the routing cost, the maximum link utilization, and the accepted demands. In addition, the approximation solution is very close to the optimal solution.
Production and control of accurate surface bring some issues. there are some technological limits of machining, but we have to know how to control these machined surfaces due to functional and life-time properties, wh...
详细信息
Production and control of accurate surface bring some issues. there are some technological limits of machining, but we have to know how to control these machined surfaces due to functional and life-time properties, which are affected mainly by roughness surface. Most important part of system of roughness surface measuring is suppression of nominal shape of scanned profile, its filtration according to standard ISO 4288 and evaluation according to the relevant standards. this article described process of filtration of roughness surface profile. If operator of the measuring instrument omits some important aspects at this stage, we obtain incorrect roughness surface profile, which significantly distorts the results of measurement leading to a rough error. the article is aimed at verifying roughness meters and indicates if a certain amount of data would be lost as if this loss affected the measurement result. Objectively, such a loss of data was simulated in the evaluation by considering every 7th scanned point at constant velocity of measurement.
the aim of the study was to examine the effects of different cognitive styles on the elementary students' learning performance and play behavior in a programming board game. this quasi-experimental design study la...
详细信息
ISBN:
(纸本)9781538674482;9781538674475
the aim of the study was to examine the effects of different cognitive styles on the elementary students' learning performance and play behavior in a programming board game. this quasi-experimental design study lasted two weeks with 3 hours per week. the subjects were 25 field-independent and field-dependent 6th grade students (assessed by the Group Embedded Figures Test) who participated in a learning programming board game course. An ANCOVA (analysis of covariance) and t-test analysis were performed on the definitive test data. Conclusions of the findings are as follows. First, in the programming board game, field-independent learners achieved significantly improved learning outcomes over field-dependent learners. Second, although no significant difference was found in gaming behavior between field-independent and field-dependent learners, the field-independence group demonstrated more learning behavior related to the execution of complex thinking. this study suggests to provide differentiated instruction for learners of different cognitive styles, should be more to enhance the effectiveness of programming performance and positive gaming behavior.
In order to understand the important of object-oriented programming in tertiary level, a propriety game-based learning multiplatform game has been designed and develops as a learning tool to improve the student unders...
详细信息
ISBN:
(纸本)9781538674482;9781538674475
In order to understand the important of object-oriented programming in tertiary level, a propriety game-based learning multiplatform game has been designed and develops as a learning tool to improve the student understanding toward object-oriented programming paradigm such as encapsulation, abstraction, inheritance and polymorphism. the proposed game is a 2D role-playing game in computer and mobile platform that allow players to learn Object-Oriented programming in an interaction way. Players will play along the flow of each game world and they will learn object-oriented programming paradigm subconsciously. Total of 214 undergraduate year one student had been participate to this research to determine the proposed game that design based on game-based learning approach is able to improve their understanding toward object-oriented programming paradigm compare to the traditional teaching and learning method. thus, this paper is a research paper of an academic who worked with game designers, game developer to design and develop a propriety game-based learning game for learning object-oriented programming.
Situation is considered as an important factor in psychological re-search, and the principle of situation research is still being established in recent years. It is important to take situations into consideration in d...
详细信息
the objective of this paper is to report a study for the needs of Muslim women tourist. Past literature indicates that while the statistic of this group of tourists is very encouraging, study to look into the specific...
详细信息
Incomputer networks, Intrusion Detection has become a major concern. In network security, various traditional techniques like intrusion prevention, cryptography and user authentication are unable to detect establishme...
详细信息
ISBN:
(纸本)9781509035199
Incomputer networks, Intrusion Detection has become a major concern. In network security, various traditional techniques like intrusion prevention, cryptography and user authentication are unable to detect establishment of novel attacks. An intrusion detection systemis helpful in detecting an unusual intruder which cracks into the system or genuine user mistreating the system. Intrusion Detection System continually runs in the background and when any suspicious or obtrusive event occurs then it warns the user. To implement these systems various researchers introduced numerous machine learning techniques like Decision Trees, Support Vector Machines, Artificial Neural Networks, Linear Genetic programming, Genetic Algorithms, Fuzzy Inference Systems, Rule Based Approach and their ensemble approaches withthe intent to predict the data either normal or *** this paper genetic programming with K-Nearest Neighbor classifier is proposed so as to build an efficient Intrusion Detection Model. Optimal feature selection task is performed by genetic programming whereas the data mining classifier which performs the classification process is K-Nearest Neighbour. the main aim of genetic programming is to aid K-Nearest Neighbour. the experimental result shows that the validation accuracy for detecting attacks is 99.6%.
暂无评论