The concept of matrices was developed to represent complex data into understandable and formattable data. There is a huge number of applications in which matrices are used like classification and data size reduction u...
详细信息
The concept of matrices was developed to represent complex data into understandable and formattable data. There is a huge number of applications in which matrices are used like classification and data size reduction used to store it. matrices are widely used in most cryptographic algorithms. Every image can be represented as a matrix where each pixel value is stored as an element of a matrix. The rotation of the matrix defines that a matrix is rotated in the XY-plane to a certain angle concerning the x-axis about the origin. A rotation matrix is a transformation matrix in linear algebra that is used to make a rotation in Euclidean space. The rotation of the matrix includes transformation such that it requires additional memory for a new transformed value. This paper describes the in-place matrix rotation of square matrix using 45° rotation of information. In-place algorithm alters the input without requiring additional memory. A little amount of additional memory could be needed for the implementation of an in-place algorithm. However, the amount of memory required should be consistent and not dependent on the size of the input. With the help of In-place matrix Rotation (ImR) of the complementary angle, the ImR of 45° is proved. In ImR, the elements change their positions, but the elements remain the same in the matrix. Using ImR is the matrix dimensions are changed with the center fixed to a particular position just by rotating the matrix not transforming the position.
In sensitive areas such as battlefields, a Wireless Sensor Network (WSN) is especially in military and civilian applications and it is of utmost importance to develop security in these networks. In various respects, t...
In sensitive areas such as battlefields, a Wireless Sensor Network (WSN) is especially in military and civilian applications and it is of utmost importance to develop security in these networks. In various respects, this can improve the quality of life. But to be used for protection reasons in multiple situations such as implementation. There is a high risk of being exposed to multiple viruses and hacking attacks. Unauthorized APs for information protection needs to be detected. Any malicious attacks against these networks, Like Sybil Attack leads to breach of security by enacting as a node that illegitimately declares several false identities at the same time. This misleads valid nodes, and they presume each of those identifiers as actual independent nodes by accident. Thus we proposed a machine learning model to detect Sybil attack in network where rawtraffic data has been collected and is used identify authorized and unauthorized APs in an integrated wired/wireless environment.
Robotics is a branch of artificial intelligence. This branch deals with the design, construction, operation and application of robots. Nowadays robots are used in various fields to perform difficult tasks with high pr...
详细信息
ISBN:
(纸本)9781538619605
Robotics is a branch of artificial intelligence. This branch deals with the design, construction, operation and application of robots. Nowadays robots are used in various fields to perform difficult tasks with high precision. In this paper various robotic armmovement techniques are briefly described. User interface, mode of transmission, controller and the limits of each technique is also pointed out. Comparison of various techniques are done and the relatively better technique is suggested.
The pen-based devices are not so common in India and one reason for that is the absence of localized applications. Developing an online handwriting recognition system for Gurmukhi scripts for such devices would play a...
详细信息
The pen-based devices are not so common in India and one reason for that is the absence of localized applications. Developing an online handwriting recognition system for Gurmukhi scripts for such devices would play an important role in making these devices available and usable for the Indian society. Preprocessing will play an important role in increasing the accuracy of such online handwriting recognition system. A model for preprocessing a Gurmukhi stroke is proposed. This model consists of 5 basic algorithms for preprocessing. Prior to these algorithms, a basic step called Stroke Capturing is done, which samples data points along the trajectory of an input device (electronic pen or mouse) while the character is drawn.
The Trivial association rule mining which should be fixed in order to avoid both that early trivial rules is retained and also that interesting rules are not *** fact the situations which use the relative comparison t...
详细信息
The Trivial association rule mining which should be fixed in order to avoid both that early trivial rules is retained and also that interesting rules are not *** fact the situations which use the relative comparison to express association rules are more complete than the situations that generate association rules that use the absolute *** traditional concept of association rule mining will lose some information in generating association *** user does have to determine the degree of support and confidence thresholds before generating association *** our paper,we proposed new approach in finding association *** new approach uses the concept of rough set theory and Bayesian network classification to generate association *** provides a way for decision maker to get more information to generate association rules than traditional *** new approach for revving association rules has the ability to handle the certainty in the classifying process so that we can reduceinformation loss and enhance the result of data *** new algorithm can simulate the value of probability which is based on continuous data set.
暂无评论