Feature extraction is the first and foremost activity in object recognition and detection processing. It reduces the amount of data by representing the image in the form of distinctive, representative interest points....
详细信息
Feature extraction is the first and foremost activity in object recognition and detection processing. It reduces the amount of data by representing the image in the form of distinctive, representative interest points. This paper deals with the extraction of global features from the pre-processed images. Geometric Moment invariant produces a set of seven normalized moment invariants that are invariant under shifting, scaling and rotation. Geometric Moment invariant is widely used to extract global features for pattern recognition due to its discrimination power and robustness. After the feature extraction is done the dimensionality of the feature is reduced using the concept of Principal Component Analysis. Finally, the reduced feature vector is used for the recognition of object using the Nearest Neighbor.
Skin analysis is one of the most important procedures before medical cosmetology. Most conventional skin analysis systems are semi-automatic. They often require human intervention. In this study, an automatic facial s...
详细信息
High speed networks provide real-time variable bit rate (VBR) service with diversified traffic flow characteristics and quality requirements. The VBR traffic has stringent delay and packet loss requirements. The burst...
详细信息
High speed networks provide real-time variable bit rate (VBR) service with diversified traffic flow characteristics and quality requirements. The VBR traffic has stringent delay and packet loss requirements. The burstiness of the correlated traffic makes dynamic management highly desirable to satisfy the Quality of Service (QoS) requirements. Buffer management in queueing systems plays important role towards effective control of QoS for various types of applications. In this paper, ADaptive Partial Buffer Sharing (ADPBS) scheme for priority queueing system is proposed and analyzed. The input to the queue has been taken using auto-regressive (AR) process of order 2 for MPEG-encoded VBR video traffic. The results of simulations indicate that dynamically controlled threshold in ADPBS contributes in reducing the packet loss of different priority classes as compared with static partial buffer sharing queue and first-in first-out queue based on threshold control parameters and the traffic type.
Ant-based techniques are designed to take biological inspirations on the behavior of these social insects. Data clustering techniques are classification algorithms that have a wide range of applications, from Biology ...
详细信息
Ant-based techniques are designed to take biological inspirations on the behavior of these social insects. Data clustering techniques are classification algorithms that have a wide range of applications, from Biology to Image processing and Data presentation. Since real life ants do perform clustering and sorting of objects among their many activities, we expect that a study of ant colonies can provide new insights for clustering techniques. The aim of clustering is to separate a set of data points into self-similar groups such that the points that belong to the same group are more similar than the points belonging to different groups. Each group is called a cluster. Data may be clustered using an iterative version of the Fuzzy C means (FCM) algorithm, but the draw back of FCM algorithm is that it is very sensitive to cluster center initialization because the search is based on the hill climbing heuristic. The ant based algorithm provides a relevant partition of data without any knowledge of the initial cluster centers. In the past researchers have used ant based algorithms which are based on stochastic principles coupled with the k-means algorithm. The proposal in this work use the Fuzzy C means algorithm as the deterministic algorithm for ant optimization. The proposed model is used after reformulation and the partitions obtained from the ant based algorithm were better optimized than those from randomly initialized hard C Means. The proposed technique executes the ant fuzzy in parallel for multiple clusters. This would enhance the speed and accuracy of cluster formation for the required system problem.
We propose a fully discrete fast Fourier-Galerkin method for solving an integral equation of the first kind with a logarithmic kernel on a smooth open arc,which is a reformulation of the Dirichlet problem of the Lapla...
详细信息
We propose a fully discrete fast Fourier-Galerkin method for solving an integral equation of the first kind with a logarithmic kernel on a smooth open arc,which is a reformulation of the Dirichlet problem of the Laplace equation in the *** optimal convergence order and quasi-linear complexity order of the proposed method are established.A precondition is *** this method with an efficient numerical integration algorithm for computing the single-layer potential defined on an open arc,we obtain the solution of the Dirichlet problem on a smooth open arc in the *** examples are presented to confirm the theoretical estimates and to demonstrate the efficiency and accuracy of the proposed method.
The proposed work presented a modified MAX-MIN Ant System (MMAS) algorithm to solve the routing problem, in which known demand are supplied from a store house with parallel routes for new local search. Routing Problem...
详细信息
The proposed work presented a modified MAX-MIN Ant System (MMAS) algorithm to solve the routing problem, in which known demand are supplied from a store house with parallel routes for new local search. Routing Problem is an optimization problem and solved to nearly optimum by heuristics. The objective of routing issues is to use a fleet of vehicles with specified capacity to serve a number of users with dissimilar demands at minimum cost, without violating the capacity and route length constraints. Many meta-heuristic approaches like Simulated Annealing (SA), Tabu Search (TS) and An Improved Ant Colony System (IACS) algorithm are compared for the performance result analysis. The well-founded theory of fuzzy sets is a special way to model the uncertainty. The rules in a fuzzy model contain a set of propositions, each of which restricts a fuzzy variable to a single fuzzy value by means of the predicate equivalency. That way, each rule covers a single fuzzy region of the fuzzy grid. The proposed system of this thesis extends this structure to provide more general fuzzy rules, covering the input space as much as possible. In order to do this, new predicates are considered and a Max-Min Ant System is proposed to learn such fuzzy rules.
In this paper we discuss various machine learning approaches used in mining of data. Further we distinguish between symbolic and sub-symbolic data mining methods. We also attempt to propose a hybrid method with the co...
详细信息
In this paper we discuss various machine learning approaches used in mining of data. Further we distinguish between symbolic and sub-symbolic data mining methods. We also attempt to propose a hybrid method with the combination of Artificial Neural Network (ANN) and Cased Based Reasoning (CBR) in mining of data.
Wireless Mesh Networks (WMNs) are a radio-based network technology that has gained considerable importance in network research community. It is a multi-hop wireless access network where nodes can act both as a host as...
详细信息
Wireless Mesh Networks (WMNs) are a radio-based network technology that has gained considerable importance in network research community. It is a multi-hop wireless access network where nodes can act both as a host as well as a router. One of the factors that influence the performance of WMNs is the underlying routing protocol used. Since implementation of wireless routing protocols in a real test bed is difficult, hence, simulation environment is being considered for performance evaluation of a routing protocol in a wireless scenario. Recently, a new network simulator called NS-3, which is in its developing stage, demands a great potential (as claimed by the developers group) for performance analysis of different routing protocols. In this paper, we aim to implement and analyze the performance of Ad hoc On-Demand Distance Vector (AODV) routing protocol in NS-3, which is one of the candidate routing protocol proposed by IETF group for WMNs. For this, we have implemented AODV in NS-3.6 and extensive simulations have been carried out for calculation of Throughput, Packet Delivery Ratio (PDR), and Normalized Routing Overhead (NRO).
Peer-to-Peer (P2P) network allow peer to distribute and obtain a file to be shared cooperatively. The successful growth of P2P network and its application is plagued by two important problems like Free Rider and Trage...
详细信息
Peer-to-Peer (P2P) network allow peer to distribute and obtain a file to be shared cooperatively. The successful growth of P2P network and its application is plagued by two important problems like Free Rider and Tragedy of commons, i.e. some selfish peers only download files without sharing its resources. This paper investigates the Free Rider and Tragedy of Common problem and encourages a peer to participate by proposing a trust agent based incentive mechanism. After applying this system theoretically, it improves the performance of the P2P system. Result obtained shows significant improvement which concludes that the proposed incentive mechanism will reduce the impact of Free Rider problem and effectively achieve fair sharing in P2P system.
Divisible load applications have such a rich source of parallelism that their parallelization can significantly reduce their total completion time on cloud computing environments. However, it is a challenge for cloud ...
详细信息
ISBN:
(纸本)9781424459421;9781424459438
Divisible load applications have such a rich source of parallelism that their parallelization can significantly reduce their total completion time on cloud computing environments. However, it is a challenge for cloud users, probably scientists and engineers, to develop their applications which can exploit the computing power of the cloud. Using MapReduce, novice cloud programmers can easily develop a high performance cloud application. To examine the performance of programs developed by this approach, we apply this pattern to implement three kinds of applications and conduct experiments on our cloud test-bed. Experimental results show that MapReduce programming is suitable for regular workload applications.
暂无评论