41
41
Apr 28, 2020
04/20
by
Center for Accessible Technology in Sign
movies
eye 41
favorite 0
comment 0
ASL vocabulary
Topic: algorithm
Canada's own Tori and James (phlux) Brine, producing great sounding electronic music for the masses! We started this project in the late 1998. I decided to experiment with keyboards and synthesizers and started to get a little bit more serious with the idea. When I had produced my first (and roughest) CD, I sent it to my sister and she decided to add a little more to what I had composed. Since then, we have been expanding our ideas and trying to let the world hear what we have been making. I...
Topic: Algorithm
Estimating the frequencies of signals in a noisy environment has numerous applications in digital signal processing. In December 1980, Golub and Van Loan proposed a spectral estimator called the Total Least Squares (TLS) technique which is a refinement of the Least Squares (LS) technique. In this thesis, we first describe the origin of the TLS technique and its applications to frequency estimation. Furthermore, we present a numerical implementation for resolving two damped / undamped...
Topics: TLS Algorithm, Constrained TLS Algorithm, Linear Constraint TLS Algorithm, Recursive TLS Algorithm
This article proposes tuning of PID controllers through optimization techniques known as collective intelligence algorithms: the colony of ants and cuckoo search, applied to the temperature control of a PCT-2 plant. The dynamic behavior analysis of the controllers tuned by the application of collective intelligence algorithms were performed in comparison to a controller tuned by the genetic algorithm method and a controller designed with the PID tuner tool, obtaining favorable results in the...
Topics: Bio-inspired algorithm, Chromosomes, Controllers, Genetic algorithm, Intelligence algorithm, PID...
158
158
Nov 17, 2015
11/15
by
Florentin Smarandache
texts
eye 158
favorite 0
comment 0
This chapter further extends the results obtained in chapters 4 and 5 (from linear equation to linear systems). Each algorithm is thoroughly proved and then an example is given. Five integer number algorithms to solve linear systems are further given.
Topics: Algorithm, functions
178
178
Sep 9, 2017
09/17
by
Avinash Ray
texts
eye 178
favorite 0
comment 0
In current scenario the entire world is moving towards digital communication for fast and better communication. But in this a problem rises with security i.e. when we have to store information (either data or image) at any casual location or transmit information through internet. As internet is an open transmission medium, security of data becomes very important. To defend our information from piracy or from hacking we use a technique and i.e. known as Encryption Technique. In this paper, we...
Topic: Genetic Algorithm
These days, Signature based Network Intrusion Detection Systems (NIDS), which apply a set of rules to identify hostile traffic in network segments are quickly updated in order to prevent systems against new attacks. The objective of an attacker is to find out new evasion techniques to stay unseen. Unfortunately, majority of the existing techniques are based on the ambiguities of the network protocols. As a result of the emergence of the new evasion techniques, NIDS system may fail to give the...
Topics: NIDS, Evasion, Apriori Algorithm, Adaboost Algorithm, Snort
146
146
Apr 2, 2014
04/14
by
RUTUJA R. PATIL & P. R. DEVALE
texts
eye 146
favorite 0
comment 0
These days, Signature based Network Intrusion Detection Systems (NIDS), which apply a set of rules to identify hostile traffic in network segments are quickly updated in order to prevent systems against new attacks. The objective of an attacker is to find out new evasion techniques to stay unseen. Unfortunately, majority of the existing techniques are based on the ambiguities of the network protocols. As a result of the emergence of the new evasion techniques, NIDS system may fail to give the...
Topics: NIDS, Evasion, Apriori Algorithm, AdaBoost Algorithm, Snort
23
23
Mar 31, 2021
03/21
by
Reem Razzaq Abdul Hussein, Salih Mahdi Al-Qaraawi, Muayad Sadik Croock
texts
eye 23
favorite 0
comment 0
In this paper, we introduce two types of hybridization. The first contribution is the hybridization between the Viterbi algorithm and Baum Welch in order to predict crime locations. While the second contribution considers the optimization based on decision tree (DT) in combination with the Viterbi algorithm for criminal identification using Iraq and India crime dataset. This work is based on our previous work [1]. The main goal is to enhance the results of the model in both consuming times and...
Topics: Baum Welch algorithm, Decision tree, Hybridization, Viterbi algorithm
105
105
Aug 22, 2016
08/16
by
ICGST LLC
texts
eye 105
favorite 0
comment 0
Abstract: Scheduling is the process of allocating tasks to resources in order to optimize some objective function. There have been many algorithms used to schedule tasks on their resources .One of these scheduling algorithms is the Enhanced Max-min task scheduling algorithm which selects a task with average execution time(average or nearest greater than average) and assigns it to a corresponding resource producing minimum completion time. A drawback of this algorithm is that when some average...
Topics: Scheduling, Max – min algorithm, Improved Max-Min Algorithm, Enhanced Max-min Task Scheduling...
Journal of Research of the National Bureau of Standards
Topics: Edmonds maximum matching algorithm, efficient algorithm, graph G
In future space missions it is planned that an unmanned robot will be sent to explore the other planets' surface. Control of the vehicle from earth is unrealistic because of the long delay time in the transmission of data, From a gross knowledge of the terrain a global routing algorithm can be used to find an optimal path from one point to another. A survey was undertaken to find an algorithm best suited for this use. Dynamic programming was selected and in combination with Lim's path-finding...
Topics: unmanned robot, path-finding algorithm, global routing algorithm
The advancement of social media plays an important role in increasing the population of youngsters on the web. And it has become the biggest medium of expressing one’s thoughts and emotions. Recent studies report that cyberbullying constitutes a growing problem among youngsters on the web. These kinds of attacks have a major influence on the current generation’s personal and social life because youngsters are ready to adopt online life instead of a real one, which leads them into...
Topics: Artificial Intelligence, cyber bullying, machine learning, naïve Bayes algorithm, decision tree...
93
93
texts
eye 93
favorite 0
comment 0
The scope of this work extends to system components (for example service providers, networks, servers, hosts, applications, processes and personnel) which are used to exchange PIN-related data. The PIN Guidelines in this document encompass PIN security within any one system or sub-system and between systems. This process designs 10 digit keypad with random RGB color SCHEME using a Fast Finite-State Algorithm for Generating RGB Palettes of Color. In this work, we propose a color finite-state LBG...
Topics: Palettes, Color quantization, LBG algorithm, finite-state algorithm
56
56
Mar 21, 2017
03/17
by
ICGST LLC
texts
eye 56
favorite 0
comment 0
Abstract: The process of assigning tasks to resources with the aim of optimizing some objective is known as scheduling. Many algorithms are used to schedule tasks on their resources. One of these algorithms is the MASA scheduling algorithm which depends on max-min scheduling algorithm. A drawback of the max-min scheduling algorithm is that; the execution of tasks with maximum execution time first, increases the makespan, and leads to a delay in executing tasks with minimum execution times. The...
Topics: Distributed system Scheduling, Scheduling algorithm, Max – min algorithm, Minimum Average...
101
101
Oct 9, 2015
10/15
by
Gragg, William B.;Ammar, Gregory S.
texts
eye 101
favorite 0
comment 0
Title from cover
Topic: EXPERIMENTAL DATA.,ALGORITHM.
In this paper, the shortest path for Unmanned Aerial Vehicles UAVs is calculated with two dimensional 2D path planning algorithms in the environment including obstacles and thus the robots could perform their tasks as soon as possible in the environment. The aim of this paper is to avoid obstacles and to find the shortest way to the target point. Th e simulation environment was created to evaluate the arrival time on the path planning algorithms A and Dijkstra algorithms for the UAVs. As a...
Topics: Electrical Engineering, UAV, path planning, A* algorithm, Dijkstra algorithm
Introduction. The estimation of efficiency of methods and algorithms for solving optimization problems with a vector criterion and a set of nonlinear constraints is considered. The approach that allows proceeding to an optimization problem with a single objective function (i.e., an unconditional optimization problem) after equivalent transformations is described. However, the objective function obtained in this way has properties (nonlinearity, multimodality, ravine, high dimension) that do...
Topics: combination, hybrid, bio-inspired algorithm, swarm intelligence, gradient-based algorithm, gravity...
Distributed decision problems arise whenever two or more sensors and their associated computers must work cooperatively to make a decision about a commonly observed event. Typical examples are in target detection and classification. The problem is usually characterized by a limited bandwidth of the communication link between the sensors. This thesis develops and evaluates an algorithm for distributed decision and compares it to a non- distributed or centralized form of the algorithm. Analysis...
Topics: Electrical and computer engineering, Centralized decision algorithm, Distributed decision algorithm...
The method in which the visual information is encrypted by the process of encryption and those encrypted images are decrypted via sight reading is said to be called as visual cryptography or it is a method to hide the picture or an image into non-identical number of shares (different shares) and they are distributed to different set of participants. There are two sets of participants namely qualified and unqualified. The qualified set will combine with the participants of non-qualified set in...
Topics: GAS Algorithm, Stamping Algorithm, Pixel Expansion, Shares., Information Technology
94
94
Nov 18, 2015
11/15
by
S. Bhattacharya, F. Smarandache, M. Khoshnevisan
texts
eye 94
favorite 0
comment 0
In this paper we have proposed a semi-heuristic optimization algorithm for designing optimal plant layouts in process-focused manufacturing/service facilities. Our proposed algorithm marries the well-known CRAFT (Computerized Relative Allocation of Facilities Technique) with the Hungarian assignment algorithm. Being a semi-heuristic search, MASS can be potentially more efficient in terms of CPU engagement time as it can converge on the global optimum faster than the traditional CRAFT, which is...
Topics: algorithm, pure heuristic
The method in which the visual information is encrypted by the process of encryption and those encrypted images are decrypted via sight reading is said to be called as visual cryptography or it is a method to hide the picture or an image into non-identical number of shares (different shares) and they are distributed to different set of participants. There are two sets of participants namely qualified and unqualified. The qualified set will combine with the participants of non-qualified set in...
Topics: GAS Algorithm, Stamping Algorithm, Pixel Expansion, Shares., Information Technology
Naval Postgraduate School
234
234
Dec 7, 2012
12/12
by
Gragg, William B.;Ammar, Gregory S.
texts
eye 234
favorite 0
comment 0
Title from cover
Topics: EXPERIMENTAL DATA., ALGORITHM.
20
20
Apr 9, 2021
04/21
by
Tejaswini R. Murgod, S. Meenakshi Sundaram
texts
eye 20
favorite 0
comment 0
The demand for underwater communication is growing at a faster pace since few decades. Maximizing the communication performance and building efficient network architecture for underwater communication is a challenging task. Due to the reduced bandwidth, high error rate, noise, propagation delay, water currents and increased cost in the network topology, the existing communication techniques are not feasible for underwater communication. Research in high speed underwater transmission technology...
Topics: Cross layer design, Localization algorithm, Routing algorithm, Underwater communication
In a world where the algorithm can control the lives of society, it is not surprising that specific complications in determining the fairness in the algorithmic decision will arise at some point. A framework was proposed for defining a fair algorithm metric by compiling information and propositions from various papers into a single summarized list of fairness requirements (guideline alike). The researcher can then adopt it as a foundation or reference to aid them in developing their...
Topics: Algorithmic discrimination, Fair algorithm, Fairness in algorithm, Fairness pattern
In this paper, a hybrid of Bat-Inspired Algorithm (BA) and Genetic Algorithm (GA) is proposed to solve N-queens problem. The proposed algorithm executes the behavior of microbats with changing pulse rates of emissions and loudness to final all the possible solutions in the initialization and moving phases. This dataset applied two metaheuristic algorithms (BA and GA) and the hybrid to solve N-queens problem by finding all the possible solutions in the instance with the input sizes of area 8*8,...
Topics: Bat algorithm, Genetic Algorithm, Microbat, N-Queens problem, Pulse rate
The method in which the visual information is encrypted by the process of encryption and those encrypted images are decrypted via sight reading is said to be called as visual cryptography or it is a method to hide the picture or an image into non-identical number of shares (different shares) and they are distributed to different set of participants. There are two sets of participants namely qualified and unqualified. The qualified set will combine with the participants of non-qualified set in...
Topics: GAS Algorithm, Stamping Algorithm, Pixel Expansion, Shares, Information Technology
Cloud is a new age technology used to connect to applications and data from anywhere round the globe via the internet. Anything and everything ranging from mobile phones to servers can be connected to the cloud. This has resulted into companies providing a large range of services to consumers. Upcoming businesses can now focus on its major purpose and not have to install their own servers. They can easily outsource it to these cloud providers saving them from a lot of capital investment. With...
Topics: Virtualization, Virtual Machine, K-Mean Clustering, Migration, Load Balancing Algorithm, Skewness...
A DC motor is applied to delicate speed and position in the industry. The stability and productivity of a system are keys for tuning of a DC motor speed. Stabilized speed is influenced by load sway and environmental factors. In this paper, a comparison study in diverse techniques to tune the speed of the DC motor with parameter uncertainties is showed. The research has discussed the application of the feed-forward neural network (FFNN) which is enhanced by a sine tree-seed algorithm (STSA)....
Topics: DC motor, Feed-forward neural network, Sine cosine algorithm, Sine tree-seed algorithm, Tree-seed...
This paper proposes an approach based on Bacterial Foraging Algorithm (BFA) for optimal placement of Distribution Generations (DGs). The optimal sitting and sizing of distributed generation is formulated as a multi-objective function including the network power losses minimization and voltage profile improvement. BFA algorithm has been employed to optimize the problem. To demonstrate the effectiveness of the proposed approach, it has been applied to 33 and 69 bus systems. The results of the...
Topics: Distributed Generation, Optimal Placement, Bacterial Foraging Algorithm (BFA), Genetic Algorithm...
In the last few years, there has been explosive growth in the application of meta-heuristics algorithm for solving Sudoku puzzles in computer science. In this paper we present a hybrid genetic algorithm (HGA) that uses a “random” technology to improve the performance of genetic algorithm. We also show the performance of the algorithms for solving Sudoku puzzles with 46 different examples. The experimental results indicate that HGA is able to produce very competitive results with respect to...
Topics: Sudoku, Hybrid Genetic Algorithm, Metaheuristics Algorithm, Optimization, Random Search Strategy
Quadrotor control is needed so that the quadrotor can float close to the stationary state. For that we need control techniques. One control technique that can be designed and implemented in quadrotor is PID control. PID parameter tuning using the Genetic Algorithm technique can speed up the manual tuning process. The weakness in the application of the Genetic Algorithm rule is that it often rejects important information found in other individuals and causes premature convergence, especially at...
Topics: PID, quadrotor, genetic, algorithm
Journal of Research of the National Bureau of Standards
Topics: Matrix, block, rank, algorithm
Compleat Guide to Locksmith Parameters
Topics: algorithm, alg, nibbles, nibble, locksmith, parms, algorithms, track, parm, user, algorithm...
20
20
Jun 21, 2021
06/21
by
Hamizan Suhaimi, Saiful Izwan Suliman, Ismail Musirin, Afdallyna Harun, Roslina Mohamad, Murizah Kassim, Shahrani Shahbudin
texts
eye 20
favorite 0
comment 0
Network security is an important aspect in maintaining computer network systems and personal information from being illegally accessed by third parties. The major problem that frequently occurs in computer network systems is the failure in detecting possible network-attacks. Apart from that, the process of recognizing the type of attack that occurs is very crucial as it will determine the elimination process that should take place to counter the intrusion. This paper proposes the application of...
Topics: Computer network systems, Genetic algorithm, Immune-genetic algorithm, Intrusion detection system
Electricity supply do not always satisfy customers' demand, which results in peak demand periods. When demand is at its peak, electricity providers have to react to meet the demand and avoid interruptions by boosting the capacity which is costly and not always possible. In addition to fluctuation in demand, price of electricity production changes continuously due to the variation in resources used for production over periods. Yet, the consumers pay the same price for the electricity unit both...
Topics: Real time pricing algorithm, Distributed algorithm, Smart grids, Matlab, Mechanical Engineering
Electricity supply do not always satisfy customers' demand, which results in peak demand periods. When demand is at its peak, electricity providers have to react to meet the demand and avoid interruptions by boosting the capacity which is costly and not always possible. In addition to fluctuation in demand, price of electricity production changes continuously due to the variation in resources used for production over periods. Yet, the consumers pay the same price for the electricity unit both...
Topics: Real time pricing algorithm, Distributed algorithm, Smart grids, Matlab, Mechanical Engineering
83
83
software
eye 83
favorite 0
comment 0
This CD includes manuals, lectures, source code, and a digital copy of the complete book to go along with the book.
Topics: The Algorithm Design Manual, programming, CD-ROM, book, digital, algorithm, cd
212
212
Nov 2, 2015
11/15
by
Octavian Cira, Florentin Smarandache
texts
eye 212
favorite 0
comment 0
The first prime number with the special property that its addition with its reversal gives as result a prime number too is 299. The prime numbers with this property will be called Luhn prime numbers. In this article we intend to present a performing algorithm for determining the Luhn prime numbers.
Topics: Luhn prime numbers, algorithm
In Path Finding Visualization Using A star and Dijkstra’s algorithm there are a set of rules and we discover the shortest direction from supply to destination. A famous person algorithm is an informative algorithm in comparison to others that means its going to handiest use the course which has the possibility of the usage of the shortest and the maximum green course. After finding the course we use Manhattan technique to attract the direction. The algorithm uses the formula f n =g n h n f n...
Topics: Path Finding Visualization, Shortest path, A star algorithm, Dijkstra’s algorithm
Cryptography, which involves the use of a cipher, describes a process of encrypting information so that its meaning is hidden and thus, secured from those who do not know how to decrypt the information. Cryptography algorithms come with the various types including the symmetric key algorithms and asymmetric key algorithms. In this paper, the authors applied the most commonly used algorithm, which is the RSA algorithm together with the Chaos system and the basic security device employed in the...
Topics: cryptography, encryption algorithm, chaos, RSA algorithm, Data Encryption Standard (DES)
Multicast services are increased in exponential manner in these last few years and in particular in the field of multimedia services. Multicast can reduce resources allocation and enhance network performances in terms of QoS, especially in a wireless platforms where the bandwidth is a precious resource. The problem of multicast routing can be reduced to the problem of finding a spanning tree capable to distribute network flow among multicast sources and destinations. It has been established...
Topics: Scalable Algorithm, Multicast routing, heterogeneous platforms, Genetic Algorithm, Simulated...
120
120
Nov 20, 2015
11/15
by
Florentin Smarandache
texts
eye 120
favorite 0
comment 0
The Japanese company Nikoli has popularized this game in 1986 under the name of sudoku, meaning “single number”.
Topics: sudoku, Group-Permutation Algorithm
Ho's Algorithm is reviewed and demonstrated with analytic examples. A digital computer program is developed to implement the algorithm for single-input, single-output systems and used to identify linear continuous and stationary systems which are driven with a unit step as the test input. Discrete realization of the continuous systems is obtained using the measured output-samples, to a step input, directly in the algorithm.
Topics: identification, algorithm, linear systems
This image is based on a fractal curve.
Topics: fractal, curve, design, algorithm
Radiative and physical characteristics of subtropic and Arctic shiptracks are compared through the use of AVHRR satellite data and an algorithm developed at the Naval Postgraduate School. Examination of channels 1 and 3 albedos within each region indicate the average subtropic shiptrack brightness is greater than that for Arctic tracks. Arctic shiptracks, however, tend to be brighter than their environment compared to subtropic shiptracks. Subtropic shiptracks tend to be wider and longer than...
Topics: shiptrack, algorithm, albedo, AVHRR
Wide Area Information Servers Project Documentation, Scanned and uploaded in 2013.
Topics: WAIS, Internet History, Algorithm
Topics: warcarchives, russian, algorithm, language
26
26
Aug 14, 2021
08/21
by
Ashur Cherry
texts
eye 26
favorite 0
comment 0
Greatest Common Divisor - Euclid’s Algorithm • Languages: Syriac • Author: Ashur Cherry (Toronto, Canada)
Topics: Algorithm, Greatest Common Divisor - Euclid’s Algorithm, Euclid’s Algorithm, Euclid,...
Recent e-commerce website does not assure shopping within a stipulated budget. Many a times when our basket/cart contains multiple products our budget gets collapsed. This somewhere affects customer shopping experience. Hence in this research we propose a methodology where a different combination of products, that customer wants to purchase is made. Then these combinations or these baskets are further evaluated based on customer's given budget. While suggesting readymade baskets to customer, we...
Topics: Real-time Database, Data Synchronization, Product Ranking algorithm, Basket Ranking Algorithm,...