1 - 10
results out of
In the recent era of computer electronic communication we are currently facing the critical impact of Deception which plays its vital role in the mode of affecting efficient information sharing system. Identifying Deception in any mode of communication is a tedious process without using the proper tool for detecting those vulnerabilities. This paper deals with the efficient tools of Deception detection in which combined application implementation is our main focus rather than with its individuality. We propose a research model which comprises Fuzzy logic, Uncertainty and Randomization. This paper deals with an experiment which implements the scenario of mixture application with its revealed results. We also discuss the combined approach rather than with its individual performance.
This paper presents the comparison of Texture classification algorithms based on Gabor Wavelets. The focus of this paper is on feature extraction scheme for texture classification. The texture feature for an image can be classified using texture descriptors. In this paper we have used Homogeneous texture descriptor that uses Gabor Wavelets concept. For texture classification, we have used online texture database that is Brodatz’s database and three advanced well known classifiers: Support Vector Machine, K-nearest neighbor method and decision tree induction method. The results shows that classification using Support vector machines gives better results as compare to the other classifiers. It can accurately discriminate between a testing image data and training data.
Selection of tender is a multi-criteria decision making process in which project performance is influenced by time, cost and quality. The appropriate tender selection can ensure a smooth delivery process and eliminate several complexities during construction. In this paper, the evidential reasoning (ER) approach which is capable of processing both quantitative and qualitative data is applied to find out the influencing factors as a means of solving the tender evaluation problem. The process of building a multiple criteria decision model of a hierarchical structure is presented, in which both quantitative and qualitative information is represented in a unified manner. By using a case study of Bangladesh the tender evaluation problem is then fully investigated using the ER approach. Finally we show the rank of influencing factors of best tender.
Rhamnolipid as a potent natural biosurfactant has a wide range of potential applications, including enhanced oil recovery, biodegradation, and bioremediation. Observation of tensio-active indicated that biosurfactants were produced by the newly isolated and promising strain Pseudomonas putida. The biosurfactants were identified as rhamnolipids, the amphiphilic surface-active glycolipids usually secreted by Pseudomonas sp. In addition, the ability to generate rhamnolipids by placement of the right microbes might help overcome rhamnolipid adsorption during flow through reservoir rocks and the resultant degradation that would decrease the rhamnolipid concentrations. Their production was observed when the strain was grown on soluble substrates, such as glucose or on poorly soluble substrates. Maximum value 1.13 mg/ ml was occurred on the second day. Production of biosurfactants depends on the nutrient media. The surface tension was decreased with increasing time and growth.
Pressure and Temperature in different metals including radioactive materials behind converging shock waves, is simulated using generalized form of equation of state. Tait’s equation of state of metals, is valid for pressures of the range of few mega bars and takes into account only elastic pressures. At such high pressures, metal undergo phase change and normal equation of state no more is valid. At such pressures, temperature in metals becomes very high and thermal and excitation pressures dominate over elastic pressure. It is observed that as shock approaches the center of sphere, excitation pressure dominates elastic as well as thermal pressure.
Applications in location-based services rely on the efficient management of large scale moving objects, and one of the most important operations is real-time continuous query over moving objects, such as monitoring the objects of a certain region. In order to satisfy the high throughput and handle real-time updates and queries, it is a good choice to introduce multi-core parallel processing and managing spatial indices in main memory. In this paper, we propose a new scheme of processing continuous query on a novel spatial index based on uniform grid which is proved to be a good indexing scheme in main memory. The novelty of our index is to manage query region as the partition in the spatial index, which unified the index updating and query processing. Our experiments indicate that this sophisticated approach has better performance especially when the query is rather stationary.
Quality of clustering is an important issue in application of clustering techniques. Most traditional cluster validity indices are geometry-based cluster quality measures. This work proposes a cluster validity index based on the decision-theoretic rough set model by considering various loss functions. Real time retail data show the usefulness of the proposed validity index for the evaluation of rough and crisp clustering. The measure is shown to help determine optimal number of clusters, as well as an important parameter called threshold in rough clustering. The experiments with a promotional campaign for the retail data illustrate the ability of the proposed measure to incorporate financial considerations in evaluating quality of a clustering scheme. This ability to deal with monetary values distinguishes the proposed decision-theoretic measure from other distance-based measures. Our proposed system validity index can also be efficient for evaluating other clustering algorithms such as fuzzy clustering.
The increasing nature of World Wide Web has imposed great challenges for researchers in improving the search efficiency over the internet. Now days web document clustering has become an important research topic to provide most relevant documents in huge volumes of results returned in response to a simple query. In this paper, first we proposed a novel approach, to precisely define clusters based on maximal frequent item set (MFI) by Apriori algorithm. Afterwards utilizing the same maximal frequent item set (MFI) based similarity measure for Hierarchical document clustering. By considering maximal frequent item sets, the dimensionality of document set is decreased. Secondly, providing privacy preserving of open web documents is to avoiding duplicate documents. There by we can protect the privacy of individual copy rights of documents. This can be achieved using equivalence relation.
The problem of improving the voltage profile and reducing power loss in electrical networks is a task that must be solved in an optimal manner. Therefore, placement of FACTS devices in suitable location can lead to control in-line flow and maintain bus voltages in desired level and reducing losses is required. This paper presents one of the heuristic methods i.e. a Genetic Algorithm to seek the optimal location of FACTS devices in a power system. Proposed algorithm is tested on IEEE 30 bus power system for optimal location of multi-type FACTS devices and results are presented.
Attacks on the nation’s computer infrastructures are becoming an increasingly serious problem. Firewalls provide a certain amount of security, but can be fooled at times by attacks like IP spoofing and the so called authorized users. So an intelligent system that can detect attacks and intrusions is required. The tool GRANT (Global Real-time Analysis of Network Traffic) being a Linux based Intrusion Detection System(LIDs), takes the advantage of the security of a Linux box and secures the other nodes in the perimeter of the network. It is capable of detecting intrusions and probes as and when they occur and capable of responding to “already” successful attacks, thus causing minimal or no damage to the entire network. For better performance, this Linux Intrusion Detection System should be part of a defense in depth strategy such as Firewall and Intrusion Prevention.