There has been a growing interest among the researchers in the area of soft computing assisted material modeling in general and modeling of concrete in particular. Their results look very promising. Concrete is a hete...
详细信息
Adverse drug reaction (ADR) may cost a lot of unnecessary medical resources and leads to extra suffering on patients. To provide the prompt information about ADR and avoid the rate of occurrence of ADR is an important...
详细信息
Microarray is widely used for the cancer research and identifies different expressions for specific genes. We present a computational method for constructing cancer and normal gene regulatory networks from micorarray ...
详细信息
Nosocomial infections or hospital acquired infections are diseases that develop during an admission to hospital and are a consequence of treatment, procedures of treatment or work of hospital staff. These infections a...
详细信息
Notice of Violation of IEEE Publication Principles "Sentence Similarity Computation Based on WordNet and Corpus Statistics," by P. Selvi, and N.P. Gopalan, in the Proceedings of the International Conference ...
Notice of Violation of IEEE Publication Principles "Sentence Similarity Computation Based on WordNet and Corpus Statistics," by P. Selvi, and N.P. Gopalan, in the Proceedings of the International Conference on Conference on Computational Intelligence and Multimedia applications, 2007, vol.1, pp.9-14, 13 Dec. 2007 After careful and considered review of the content and authorship of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles. This paper contains significant portions of original text from the papers cited below. The original text was copied without attribution (including appropriate references to the original author(s) and/or paper titles) and without permission. Further, the expert committee found only one of the two authors, Mr. P. Selvi, in violation of the IEEE Publication Principles. "A Method for Measuring Sentence Similarity and its Application to Conversational Agents," by J. Li, Z. Bandar, D. McLean, and J. O'Shea, in the Proceedings of the 17th International Florida Artificial Intelligence Research Society Conference (FLAIRS 2004), pages 820-825, Miami Beach, FL. AAAI Press. "A Combination-based Semantic Similarity Measure using Multiple Information Sources," by H.A. Nguyen and ***-Mubaid, in the Proceedings of the 2006 IEEE International Conference on Information Reuse and Integration, pp.617-621, 16 Sept. 2006 "Sentence Similarity Based on Semantic Nets and Corpus Statistics," by Y. Li, D. McLean, Z.A. Bandar, J.D. O'Shea, and K. Crockett, in the IEEE Transactions on Knowledge and Data engineering, vol.18, no.8, pp.1138-1150, Aug. 2006 "Semantic Similarity of Short Texts," by A. Islam, D. Inkpen, in Proceedings of the International Conference Measures of text similarity have been used for a long time in applications in natural language processing and related areas such as text mining, Web page retrieval, and dialogue systems. Existing methods for computing sentence simila
This paper is concerned with the problem of estimating the motion of a single camera from a sequence of images, with an application scenario of vehicle egomotion estimation. Egomotion estimation has been an active are...
详细信息
A Wireless Sensor Network (WSN) consists of a large number of randomly deployed sensor nodes. These sensor nodes organize themselves into a cooperative network and perform the three basic functions of sensing, computa...
A Wireless Sensor Network (WSN) consists of a large number of randomly deployed sensor nodes. These sensor nodes organize themselves into a cooperative network and perform the three basic functions of sensing, computations and *** paper proposes a flat-routing technique for such a network consisting of homogenous nodes. It is an energy-efficient data gathering protocol where sensor nodes in the network form an Antchain. The role of Antchain head and Antchain tail for each data gathering process is scheduled by means of a Time Division Multiple Access technique which ensures uniform depletion of energy among sensor nodes. The real advantage comes to light in the event of the death of a node. The proposed algorithm heals the network in such a way that only one node communicates with the base station at the end of the data gathering process. Simulation results indicate that Self-Healing AntChain performs better than other AntChain systems in terms of network lifetime, average energy consumed and aggregated data delivery ratio, in addition to being a highly fault-tolerant, flexible and adaptive system.
The performance of any OCR system heavily depends upon printing quality of the input document. Many OCRs have been designed which correctly identify fine printed documents both in Indian and foreign scripts. But littl...
详细信息
The performance of any OCR system heavily depends upon printing quality of the input document. Many OCRs have been designed which correctly identify fine printed documents both in Indian and foreign scripts. But little reported work has been found on the recognition of the degraded documents. The performance of standard machine printed OCR system working for fine printed documents decreases, if it is tested on degraded documents. The degradation in any document can be of many types. In this paper, we have identified different kinds of degradation available in printed Gurmukhi script. After identifying the different kinds of degradation, problems associated with each kind of degradation have been discussed; some possible solutions have also been discussed. This paper is extremely useful for researchers engaged in recognizing the degraded documents in any script, because same kinds of degradation can be found in most of the scripts of the world
The steganography is the embedding of secret message in the cover image for covert communication. In this paper we present a high capacity data embedding using colour palette decomposition (CPD) in which the payload i...
详细信息
The steganography is the embedding of secret message in the cover image for covert communication. In this paper we present a high capacity data embedding using colour palette decomposition (CPD) in which the payload is embedded into the cover image as an index of shifted centroids which is derived from the clustering of the cover image to derive the stego image. The error control coding is applied to stego image to increase PSNR, capacity and security. It is observed that our algorithm has higher PSNR and capacity in comparison to earlier works
Effective utilization of limited power resources by the sensors is pre-eminent to the wireless sensor networks. Organizing the network into balanced clusters based on assigning equal number of sensors to each cluster ...
Effective utilization of limited power resources by the sensors is pre-eminent to the wireless sensor networks. Organizing the network into balanced clusters based on assigning equal number of sensors to each cluster may have the consequence of unbalanced load on the cluster heads. By-product of this is unbalanced consumption of the energy by the nodes which leads to minimization of network lifetime. We put forth a Sink administered load balanced dynamic hierarchical protocol (SLDHP) to balance the load on the principal nodes. Hierarchical layout of the sensors endows the network with increased lifespan. Outcome of this protocol also includes substantial saving of the energy consumed by the nodes. Simulation results indicate a significant improvement of performance over base station controlled dynamic clustering protocol (BCDCP).
暂无评论