Chemical graph theory has recently gained much attraction among researchers due to its extensive use in mathematical chemistry. In this research article, We have studied the spectral properties such as eigenvalues, en...
详细信息
In this paper, an efficient data hiding technique based on the discrete cosine transform (DCT) of image is proposed. In this technique, the DCT coefficient is quantized using a predefined mathematical operation then t...
详细信息
In this paper, an efficient data hiding technique based on the discrete cosine transform (DCT) of image is proposed. In this technique, the DCT coefficient is quantized using a predefined mathematical operation then the secret bits are embedded in all frequency component of the quantized DCT coefficient using least significant-bit (LSB) to enable a large message capacity. A comparison between the proposed method and other existing methods is introduced. The results demonstrated that the performance of the proposed method is satisfied compared to them.
The Industrial Internet of Things (IIoT) seeks to improve smart factory productivity by leveraging automation and scalability. For automation in industry, optimization, collaboration and protection, and scalability, t...
详细信息
Over the past decade, scheduling in distributed computing system has been an active research. However, it is still difficult to find an optimal scheduling algorithm to achieve load balancing for a specific scientific ...
详细信息
ISBN:
(纸本)9781424437719
Over the past decade, scheduling in distributed computing system has been an active research. However, it is still difficult to find an optimal scheduling algorithm to achieve load balancing for a specific scientific application which is executed in an unpredictable environment. This is due to the complex nature of the application which changes during runtime and due to the dynamic nature and unpredictability of the computational environment. This paper addresses these issues by presenting a Simulated Annealing (SA) approach as an optimizer which is an improved version of EG-EDF with Tabu Search optimizer. Instead of using Tabu Search, this work used SA to optimize the scheduling algorithm. The scheduling algorithms have been evaluated using three main criteria;number of delayed jobs, makespan time and total tardiness. Our results show the improvements to the main criteria mentioned.
Presents corrections to the paper, (Corrections to “Effective Gait Abnormality Detection in Parkinson Patients for Multi-Sensors Surveillance system”).
Presents corrections to the paper, (Corrections to “Effective Gait Abnormality Detection in Parkinson Patients for Multi-Sensors Surveillance system”).
The African continent has long benefited from adopting OSS in its private and public organizations that have changed their way of development, the use and how to acquire proprietary software. This frequency of adaptat...
详细信息
One of the main goals of machine learning is to study the generalization performance of learning algorithms. The previous main results describing the generalization ability of learning algorithms are usually based on ...
详细信息
One of the main goals of machine learning is to study the generalization performance of learning algorithms. The previous main results describing the generalization ability of learning algorithms are usually based on independent and identically distributed (i.i.d.) samples. However, independence is a very restrictive concept for both theory and real-world applications. In this paper we go far beyond this classical framework by establishing the bounds on the rate of relative uniform convergence for the Empirical Risk Minimization (ERM) algorithm with uniformly ergodic Markov chain samples. We not only obtain generalization bounds of ERM algorithm, but also show that the ERM algorithm with uniformly ergodic Markov chain samples is consistent. The established theory underlies application of ERM type of learning algorithms.
Network traffic measurement studies have shown the presence of self-similar behavior in both local area and wide area traffic traces. In this study we investigated the magnitude of the self-similarity behavior of netw...
详细信息
Breakthroughs in technology are making the internet an ever-growing phenomenon, and we have witnessed an enormous growth of blogs in the blogosphere. However, the blogosphere has been crippled by disorganised and unco...
详细信息
In previous work [27], the authors proposed an E-University but they did not take into account some essential parts. In this paper, the system presented in [27] is modified and developed. New critical important items ...
详细信息
In previous work [27], the authors proposed an E-University but they did not take into account some essential parts. In this paper, the system presented in [27] is modified and developed. New critical important items such as security in E-Learning, learning management, business continuity management and science park are added to the proposed university. According to the great development of IT, the current Web-based learning systems need to be as effective as human tutors. Recently, intelligent agents became one of the most interesting subjects of modern information technology. Agent-based technology has been taken as an important approach for developing advanced E-Learning systems. This paper presents architecture for implementing a multi-agent system within the context of a learning environment. The roles of intelligent agents within an E-Learning system, called E-University, are presented. The agents perform specific tasks on the behalf of students, professors, administrators, and other members of the university. Also a group of intelligent agents for learning activities such as user interface agents, task agents, knowledge agents and mobile agents is developed. Using the multi-agent technology in E-Learning system, gives user interaction facility to both users and designers, and adds ability to exchange information between different objects in a flexible way.
暂无评论