Web Page Recommendation Approach Using Weighted Sequential Patterns and Markov Model
|
|
- Matthew Prosper Wilkins
- 5 years ago
- Views:
Transcription
1 Global Journal of Computer Science and Technology Volume 2 Iue 9 Verion.0 April 202 Type: Double Blind Peer Reviewed International Reearch Journal Publiher: Global Journal Inc. (USA) Online ISSN: & Print ISSN: Web Page Recommendation Approach Uing Weighted Sequential Pattern and Markov Model By K. Suneetha & Dr.M.Uha Rani Sree Vidyanekethan Engineering College/JNTU Abtract - Web page recommendation aim to predict the uer navigation through the help of web uage mining technique. Currently, reearcher focu their attention to develop a web page recommendation algorithm uing the well known pattern mining technique. Here, we have preented a web page recommendation algorithm uing weighted equential pattern and markov model. To mine the weighted equential pattern, we have modified the prefixpan algorithm incorporating the weightage contraint uch a, pending time and recent viiting. Then, the weighted equential pattern are utilized to contruct the recommendation model uing the Patricia trie-baed tree tructure. Finally, the recommendation of the current uer i done with the help of markov model that i the probability theory enabling the reaoning and computation a intractable. For experimentation, the ynthetic dataet i utilized to analyze the performance of W-Prefixpan algorithm a well a web page recommendation algorithm. From the reult, the memory required for the W-prefixSpan algorithm i le than 50% of memory needed for PrefixSpan algorithm. Keyword : Web page recommendation, Weighted equential pattern, Prefixpan, Patricia-trie, Markov model. GJCST Claification: I.5.m Web Page Recommendation Approach Uing Weighted Sequential Pattern and Markov Model Strictly a per the compliance and regulation of: 202. K. Suneetha & Dr.M.Uha Rani. Thi i a reearch/review paper, ditributed under the term of the Creative Common Attribution-Noncommercial 3.0 Unported Licene permitting all non-commercial ue, ditribution, and reproduction inany medium, provided the original work i properly cited.
2 Web Page Recommendation Approach Uing Weighted Sequential Pattern and Markov Model K. Suneetha α & Dr.M.Uha Rani σ Abtract - Web page recommendation aim to predict the uer navigation through the help of web uage mining technique. Currently, reearcher focu their attention to develop a web page recommendation algorithm uing the well known pattern mining technique. Here, we have preented a web page recommendation algorithm uing weighted equential pattern and markov model. To mine the weighted equential pattern, we have modified the prefixpan algorithm incorporating the weightage contraint uch a, pending time and recent viiting. Then, the weighted equential pattern are utilized to contruct the recommendation model uing the Patricia trie-baed tree tructure. Finally, the recommendation of the current uer i done with the help of markov model that i the probability theory enabling the reaoning and computation a intractable. For experimentation, the ynthetic dataet i utilized to analyze the performance of W-Prefixpan algorithm a well a web page recommendation algorithm. From the reult, the memory required for the W-prefixSpan algorithm i le than 50% of memory needed for PrefixSpan algorithm. Keyword : Web page recommendation, Weighted equential pattern, Prefixpan, Patricia-trie, Markov model. I. Introduction S equential pattern mining, an advance of aociation rule mining, i an imperative ubject of data mining, often applied for extracting the ueful information [9]. Sequential pattern mining algorithm deal with the problem of determining the frequent equence in a given databae [6]. Sequential pattern i a equence of itemet that often occur in a pecific order and thu, all item in the ame itemet are expected to encompa the ame tranaction time value or within a time gap. Each equence have a temporally ordered lit of event, wherein each event i a compilation of item (itemet) occurring imultaneouly. The temporal ordering among the event i induced by the abolute timetamp aociated with the event [0]. Generally, all the tranaction of a cutomer are collectively viewed a a equence, called cutomer - equence, where each Author α : Sr. Lecturer Dept. of MCA, SVEC, Tirupati Andhrapradeh, INDIA umauni.k@gmail.com Author σ : Aoc.Profeor & HEAD, Dept. of Computer Science, SPMVV, Tirupati, Andhrapradeh, INDIA muha_rohan@yahoo.com tranaction i repreented a an itemet in that equence and all the tranaction are cheduled in a particular order baed on the tranaction-time [8]. Recently, there ha been a ubtantial interet in uing equential mining approache to contruct web page recommendation ytem. Here, we have preented a web page recommendation algorithm uing weighted equential pattern and markov model. The overall proce of page recommendation baed on Web uage mining conit of three phae: data preparation, mining of weighted equential pattern and recommendation. Data preparation: Thi tep conit of, (i) identifying the different uer eion from the uually very poor information available in web log file and (ii) recontructing the uer navigation path within the identified eion. Mining of weighted equential pattern: The traditional equential pattern mining problem i extended by allowing a weight to be aociated with each page in a uer eion to reflect interet of each page within the uer eion. In turn, thi provide with an opportunity to aociate a weight parameter with each page in a reulting equential pattern, which called a weighted equential pattern (WSP). Recommendation: After mining the weighted equential pattern, the patricia-baed tree i contructed. From the Patricia tree, a recommendation model i developed baed on markov model for prediction of uer to find web page they want to viit. II. Related work Literature preent a lot of web page recommendation algorithm baed on web ued mining, collaborative filtering, and rule-baed filtering. Here, we portray ome recent work preented in the literature for web page recommendation. Forati, R et al [3] have developed an effective and calable approach to deal with the web page recommendation problem. Here, a ditributed learning machine ha been employed to learn the performance of previou uer and to cluter the page baed on learned pattern. Dealing with unviited or recently added page wa one of the difficult and challenging tak in recommendation ytem. A they would never be April 202 Global Journal of Computer Science and Technology Volume XII Iue IX Verion I 202 Global Journal Inc. (US)
3 Web Page Recommendation Approach Uing Weighted Sequential Pattern and Markov Model April Global Journal of Computer Science and Technology Volume XII Iue IX Verion I recommended, it i indipenable to provide a chance for thee eldom viited or recently added page to be incorporated in the recommendation et. By conidering thi problem, a Weighted Aociation Rule mining algorithm ha been preented for the recommendation purpoe. Alo, a HITS algorithm ha been exploited to extend the recommendation et. Furthermore, they have analyzed the propoed algorithm under variou etting, and revealed the efficiency of thi approach in enhancing the overall quality of web recommendation. Yicen Liu et al [5] have introduced an automatic tag recommendation algorithm that ha been employed in the large-cale and real-time data proce uccefully and efficiently. Mot of the prior reearche on tag uggetion have focued on initially, dicovering the relationhip between teting and training data and then, aigning the top ranked tag of the mot related training data to the teting object. But, they not paid any attention in determining the internal relationhip between the tag and weblog. In their current reearch, more than 43% of tag, which have been labeled by weblog uer, have really been employed in the body of the text. In the meantime, the term frequency ditribution, the paragraph frequency ditribution, and the firt occurrence poition of tag were diimilar from the one of non-tag in the text. A well, the tag of a weblog have been aigned in two tep. Initially, ome probability ditribution of the word attribute have been trained through the labeled training weblog, and ome keyword of a teting weblog have been extracted a one part of the tag baed on the probability ditribution. Subequently, with the aid of Latent Semantic Indexing (LSI) model, the other part of the tag have been obtained from the firt part one. Experiment conducted on an extenive tagging dataet of weblog 2 have confirmed that the average tagging time for a new weblog wa le than 0.02 ec, and more than 74% of teting weblog have been properly labeled by mean of the top 5 tag. An approach for recommendation of unviited page ha been preented by Forati, R et al []. They have focued on the recommender ytem baed on the uer navigational pattern and provided proper recommendation to cater to the current need of the uer. The group of uer with analogou browing pattern ha been identified by employing an offline data preproceing and clutering technique. The experiment conducted on real uage data from a commercial web ite have demontrated a coniderable enhancement in the recommendation efficiency of the propoed ytem. Web Peronalization i viewed a an application of data mining and machine learning approache to create model of uer behavior that can be applied to the tak of forecating the uer need and adapting future interaction with the eventual goal of enhanced uer atifaction. An extenive overview of intelligent method for Web Peronalization ha been preented by Sarabjot Singh Anand and Bamhad Mobaher [2]. They have tudied the tate-of-the-art in Web peronalization. Initially, a depiction of the peronalization proce and a claification of the current technique to Web peronalization have been preented. Alo, they have dicued the different ource of data available to peronalization ytem, the modeling technique utilized, and the current technique to analyze thee ytem. Numerou challenge faced by the reearcher in developing thee ytem and alo the olution to thee challenge propoed in literature have been decribed. They have concluded with a dicuion on the open challenge that mut be addreed by the reearch community if thi technology i to create a poitive impact on uer atifaction with the Web. Due to the increaing number of Web ite uch a e-buinee contain a huge number of page, uer find it very hard to wiftly reach their own target page. Thu, Hirohi Ihikawa et al [5] have propoed two approache to Web uage mining a a key olution to thee problem. Firt of all, an efficient recommendation ytem called the L-R ytem ha been depicted, which create uer model through claifying the Web acce log and by mining acce pattern baed on the tranition probability of page accee, and then, recommend the ignificant page to the uer baed on both the uer model and the Web content. The prototype ytem ha been analyzed and obtained the poitive effect. Secondly, another approach ha been employed for creating uer model that cluter the Web acce log baed on the acce pattern. Moreover, the uer model ait to find the unexpected acce path correponding to ill-formed Web ite deign. In addition, Daniel Mican and Nicolae Tomai [2] have propoed WRS, architecture for robut web application. Within the tructure, uage data wa being implicitly obtained by data collection ub-module. Here, the uage data ha been extracted, online and in real time, via a proactive technique. They have efficiently exploited aociation rule mining among both frequent and infrequent item for ucceful pattern dicovery. Thi wa due to the fact that the pattern dicovery module tranactionally procee uer' eion and employ incremental torage of rule. Alo, they have proved that the Wie Recommender Sytem (WRS) ha been traightforwardly implemented within any web application, becaue of the efficient integration of the three phae into an online tranactional proce. 202 Global Journal Inc. (US)
4 Web Page Recommendation Approach Uing Weighted Sequential Pattern and Markov Model III. Propoed algorithm to web page recommendation baed on weighted equential acce pattern Web page recommendation i ignificant reearch over the pat decade due to it real world application. With the intention of real world applicability, we have developed an approach for web page recommendation uing weighted equential pattern and markov model. Here, the traditional equential pattern mining algorithm i modified ignificantly by incorporating the ignificant meaure to mine more ueful pattern. Then, the markov model decribed in [4] i ued to recommend the web page. The block diagram of the propoed approach for web page recommendation i given in Figure. The important tep for generating recommendation to the uer i a follow, Data Preproceing W-PrefixSpan for mining of weighted equential web acce pattern Building Pattern tree model Generation of recommendation uing markov model Block diagram Uer Web page recommendation Matching Markov model Hitoric Data Data Preproceing W_ Prefix pan for Weighted equential Fig. : Block diagram of the propoed approach to web page recommendation a) Data Preproceing Thi ection decribe the preproceing tep of web log file that i the input of the propoed web page recommendation approach. In general, the web log file conit of, IP addre, acce time, HTTP requet method ued, URL of the referring page and brower name (for an example, Web erver log file: [23/Feb/202:08:7:25] GET / HTTP/. IE/7.0 Window 07 ). The initial proce of the propoed web page recommendation approach i to preproce the R Tree Contruction web log file uch a way that the mining proce hould be applied. Here, we make ue of the equential pattern mining proce o there i a need to convert the web log file into the equential databae that hould be in the proper format to mine the weighted equential pattern. Uer Identification: Uer identification i an important tep for contructing the equential databae. IP addre and uer eion are utilized here to track a unique uer from the web log file. Unique IP addre i a new uer but at the ame time, the uer eion hould be fixed for particular time period. If the uer eion i reached to a particular duration for the ame IP addre, then the new eion i acted like new uer. Baed on thi, uer tranaction i formed from the web log file. Weighted Sequential databae generation: Once the uer tranaction are identified, the weighted equential databae i generated including the equence of web page viited by the uer, time pent by the uer on correponding web page and it recent information. Let aume the web log databae D having IP addre, acce time, HTTP requet method ued, URL of the referring page and brower name. After applying the data preproceing tep, we generate the weighted equential databae that i repreented a follow, W in which, i belong to the et of uer and j ignifie the et of page viited by the correponding uer. Here, every element of w contain three tuple w = ( p,, r ) in which the firt tuple belong to the web page, the econd one belong to the time pent within that page and the third one belong to whether it recent one or not. For example, w (, = p 20, 0) i a tuple, which denote that the uer pent 20 econd on page p and 0 ignifie that the page p i not recently acceed by the uer. b) W-Prefixpan for Mining of Weighted Sequential Web Acce Pattern Once the weighted equential databae i contructed, the mining procedure i carried out to find the intereting equential pattern. Here, PrefixSpan [7] i modified a W-PrefixSpan (Weighted-PrefixSpan) by incorporating the pending time and recent view into the mining procedure. The weightage meaure aumed in the propoed W-PrefixSpan algorithm i pending time and recent view. The two apect taken for providing the weightage of the equential pattern are, Spending time: One of the field in the web log data i the duration of the web page which i viewed by the uer. Generally, time pent by the uer within a particular page i neceary to identify the importance of web page. From the web page which having long duration, we can conclude that thi particular web page ha been referred by the uer in a long occaion 202 April 3 Global Journal of Computer Science and Technology Volume XII Iue IX Verion I 202 Global Journal Inc. (US)
5 Web Page Recommendation Approach Uing Weighted Sequential Pattern and Markov Model April Global Journal of Computer Science and Technology Volume XII Iue IX Verion I becaue of it worth. Thu, the pending time i an important meaure for the reearcher who are attempting to identify the interet of the uer. So, if we incorporate the time duration into the mining of equential pattern, the intereting relationhip can be found out from the mined equential pattern that can be effectively applied to web page recommendation proce. Recent view: Another ignificant meaure taken for equential pattern mining i recent view that decribe whether the page i acceed recently or not. The reaon behind taking the recent view for mining the equential pattern i that the more importance hould be given for the web page which are acceed recently than the older one. The behavior of the uer urely vary depend on the time o the recent behavior of the uer i ignificant for finding the equence analyi. With the intention of behavior variation over time, the recent view i alo incorporated into the equential pattern mining algorithm to achieve a ubet of more intereting equential pattern (SR-Pattern). W-PrefixSpan algorithm: In thi ection, we decribe an efficient algorithm, W-PrefixSpan, for mining all the SR- pattern from weighted equence databae. The W-PrefixSpan algorithm i developed by modifying the eminent PrefixSpan algorithm, which ue the pattern growth methodology for mining the frequent equential pattern recurively. Let W = p,, r ), ( p,, r ), ( p,, r ) be ( n n n a data equence of weighted databaew, where p i web page, i a pending time and r ignifie the recent view. A equence W = ( p,, r), ( p2, 2, r2 ), ( p m, m, r m ) i aid to be a ub equence of W only if, () W i a ubequence of W, W W (2) t < t < < t 2 m where, t i the time at which p occurred in W, r m. A equence i aid to be SR equence W if and only if, () W i a ubequence of W, (2) the W-upport hould be atified. At firt, the weighted equential databae W i given to the propoed W-PrefixSpan algorithm that dicover the -length weighted equential pattern from the weighted equential databae by canning the databae once. The -SR pattern (pending time with recent view) which atify the predefined upport threhold are mined from the equential databae by imply canning the databae. The W-upport for the - length pattern i computed a follow, W _ up( p) N N p T I = i= N p T i= ( i) * R( i) R( i) Where, N Number of uer tranaction in the weighted equential databae NT Number of tranaction that contain the web page p, R(i) recent information N = T i I ( i) MT i= i i= Where, M T Total number of web page in one tranaction, i pending time Then, the projection databae i formed by projecting the collection of potfixe of mined -SR equence. In projection databae, ' n ' dijoint ubet are generated if the mined -SR pattern contain ' n ' number of equence. Then, the 2-length SR-pattern are mined from the projected databae by computing the weighted upport on the projected databae. Again, the projected databae i formed with the help of mined 2-SR pattern and thi proce i repeated recurively until all SR equential pattern are mined. The following provide a detailed explanation of the important tep involved in the propoed W-PrefixSpan algorithm. Input : A weighted equence databaew, and the minimum upport threhold min_w _ up. Output : The complete et of weighted-equential pattern β. Method : Call W-PrefixSpan (, 0, W ). Subroutine : W-PrefixSpan ( α,l, W α ) Parameter:α : SR-equential pattern; l : the length of α ; W α : the α -projected databae, if α ; otherwie, the weighted equence databae W. Method:. Scan W α once, find the et of SR- pattern uch that a) ' ' can be aembled to the lat element of α to form a SR-equential pattern; or b) can be appended to α to form a SRequential pattern. 2. For each SR- web page, append it to α to form a SR-equential pattern α '. 5. For each α ', contruct α' -projected databaew α, and call PrefixSpan ( α', l +, W ). α 202 Global Journal Inc. (US)
6 Web Page Recommendation Approach Uing Weighted Sequential Pattern and Markov Model c) Building of Pattern Tree Model Once we mine the weighted equential pattern, the pattern tree i contructed uing the procedure defined in [4, 3]. Initially, trie-baed data tructure given in [] i ued to contruct the pattern tree for web page recommendation. Later, the modification wa done by [4, 3], who utilized the patricia-baed data tructure for web page recommendation due to the advantage of particia tructure over the trie tructure. Here, the procedure defined in [4, 3] i applied to the propoed approach for contructing tree tructure. The method for contructing the pattern tree in the propoed web page recommendation approach i a follow: ) Generate an empty root node, 2) Add the mot ub pattern in the SR-equential pattern et into a node next to the root node, 3) Inert the potfixe of pattern into child node only if the current pattern to be inerted i a uper pattern of inerted pattern, 4) Otherwie, current pattern i inerted into the node next to the root node, and 5) Step 3 and tep 4 i repeated for every pattern in the mined SR-pattern et. d) Generation of Recommendation Uing Markov Model Thi ection decribe the markov model utilized for web page recommendation. Here, we make ue of the markov model decribed in [4] that i ued in the identication of the next page to be acceed by the Web ite uer baed on the equence of previouly acceed page. Here, whenever a new uer come to get the recommendation, the equence path of the new uer i matched with the patricia-trie tructure. Then, the ubequent web page whether it may be from ame node or from it child node i retrieved. Now, the equence path of the new uer i ued to find the accurate recommendation uing the probability definition ued in the previou work [4]. Let the input equence viited by the uer be,, 2, n. At firt, the equence,,, 2, n i matched with the patricia-trie tructure that can provide the matched reult like,, 2, n, n +, k,, 2, n, n +, l and, 2, n, n +, m. Every equence ha the weighted upport value that i given in the node of contructed tree. Then, the probability of computation i carried out to find the mot important equence for the uer. The following equation provide the probability of etimated value for the matched reult. () n+ n (2) n+ n (3) n+ { n+ 2 n n+ m 2 n = { P( n+ = (, 2, n, n+, k ), 2, )} = { P( n+ = (, 2, n, n+, l ), 2, )} = P( = (,,,, ),, )} Thi probability, pro( n+ ), i etimated by uing all equence of all uer in tree tructure contructed from the weighted equential databae W. i j P( n = (, 2, n, n+, W _ up(, 2, n) W _ up(,,,, ) 2 n+ ),, + m 2 n = n Then, the final recommendation i baed on the following equation: () (2) (3) arg max{,, } IV. n+ = n+ n+ n+ m Reult and dicuion Thi ection preent the reult obtained from the experimentation and it detailed dicuion about the reult. The propoed approach of web page recommendation i experimented with the ynthetic dataet and the reult i evaluated with the preciion, applicability and hit ratio. a) Experimental Set Up and Dataet Decription The propoed web page recommendation approach i implemented in Java (jdk.6). Here, the ynthetic dataet i generated a like the ame format of real dataet and the performance of the propoed approach i evaluated with the evaluation metric. The generated ynthetic dataet i divided into two part uch a, Training dataet (It i ued for building the pattern tree model and tet dataet (It i ued for teting the web recommendation approach). b) Performance of the W-Prefixpan Algorithm Here, the performance of the W-prefixSpan algorithm i analyzed with the execution time, memory uage and pattern mined. At firt, the training data i given to the prefixspan and W-prefixSpan algorithm to mine the equential pattern and then, the mining performance of the algorithm are analyzed. The value obtained from the experimentation are plotted a graph, hown in figure 2, 3 and figure 4. Fig. 2 : Computation time ) April Global Journal of Computer Science and Technology Volume XII Iue IX Verion I 202 Global Journal Inc. (US)
7 Web Page Recommendation Approach Uing Weighted Sequential Pattern and Markov Model Reference référence referencia April Global Journal of Computer Science and Technology Volume XII Iue IX Verion I Fig.3: Memory uage Fig.4 : Number of pattern mined The figure 2 how that the execution time of the W-prefixSpan algorithm i.5 Sec that i le compared with the time taken of the PrefixSpan algorithm. In memory uage, the W-prefixSpan algorithm needed only le than 50% memory compared with Prefixpan algorithm. Figure 4 how that number of pattern mined uing W-Prefixpan i high compared to Prefixpan algorithm. V. Concluion We have propoed a web page recommendation algorithm uing weighted equential pattern and markov model. Here, we have preented W-PrefixSpan algorithm that i developed by incorporating the weightage contraint uch a, pending time and recent viiting with the prefixpan algorithm. The mined weighted equential pattern are then utilized to contruct the recommendation model uing the patricia trie-baed tree tructure. At lat, markov model-baed recommendation i carried out for the current uer by matching the viiting path with the tree and markov model. The experimentation i done with the help of ynthetic dataet and the performance of W-Prefixpan algorithm a well a web page recommendation algorithm i analyzed. From the reult, the memory required for the W-prefixSpan algorithm i le than 50% of memory needed for PrefixSpan algorithm.. Baoyao Zhou, Siu Cheung Hui, Kuiyu Chang, "An Intelligent Recommender Sytem uing Sequential Web Acce Pattern", in proceeding of IEEE Conference on Cybernetic and Intelligent Sytem, Daniel Mican, Nicolae Tomai, "Aociation-Rule- Baed Recommender Sytem for Peronalization in Adaptive Web-Baed Application", Proceeding ICWE'0 Proceeding of the 0th international conference on Current trend in web engineering, pp.85-90, Forati, R., Meybodi, M.R., Rahbar, A. "An efficient algorithm for web recommendation ytem", IEEE/ACS International Conference on Computer Sytem and Application, pp , Faten Khalil, Jiuyong Li, Hua Wang, "Integrating Recommendation Model for Improved Web Page Prediction Accuracy", in Proceeding of the thirtyfirt Autralaian conference on Computer cience, Vol. 74, Hirohi Ihikawa, Manabu Ohta, Shohei Yokoyama, Junya Nakayama, Kaoru Katayama, "On the Effectivene of Web Uage Mining for Page Recommendation and Retructuring, Proceeding Revied Paper from the NODe 2002 Web and Databae-Related Workhop on Web, Web- Service, and Databae Sytem, pp , Jatin D Parmar and Sanjay Garg, "Modified Web Acce Pattern (mwap) Approach for Sequential Pattern Mining", Journal of computer Science, Vol. 6, No.2, pp.46-54, June Jian Pei, Jiawei Han, Mortazavi-Al B., Pinto H., Qiming Chen, Dayal U., Mei-Chun Hu, "PrefixSpan,: mining equential pattern efficiently by prefix-projected pattern growth", in Proceeding of 7th International Conference on Data Engineering, Qiankun Zhao and Sourav S. Bhowmick, "Sequential Pattern Mining: A Survey", Technical Report, CAIS, Nanyang Technological Univerity, Singapore, No.8, Sizu Hou, Xianfei Zhang, "Alarm Aociation Rule Baed on Sequential Pattern Mining Algorithm", In proceeding of the Fifth International Conference on Fuzzy Sytem and Knowledge Dicovery, vol. 2, pp , Shandong, Salvatore Orlando, Raffaele Perego and Claudio Silvetri, "A new algorithm for gap contrained equence mining", In Proceeding of the ACM Sympoium on Applied Computing, pp , Nicoia, Cypru, C.P. Sumathi,R. Padmaja Valli,T. Santhanam, "Automatic Recommendation of Web Page in Web 202 Global Journal Inc. (US)
8 Web Page Recommendation Approach Uing Weighted Sequential Pattern and Markov Model Uage Mining", (IJCSE) International Journal on Computer Science and Engineering Vol. 02, No. 09,pp , Sarabjot Singh Anand, Bamhad Mobaher, "Intelligent Technique for Web Peronalization", ITWP 2003, LNAI 369, pp. -36, Springer-Verlag Berlin Heidelberg, Utpala Niranjan, R. B. V. Subramanyam and V. Khanaa, "Developing a Web Recommendation Sytem Baed on Cloed Sequential Pattern", Communication in Computer and Information Science, Vol. 0, no., pp. 7-79, Utpala Niranjan, R.B.V. Subramanyam, V.Khana, "An Efficient Sytem Baed On Cloed Sequential Pattern for Web Recommendation", IJCSI International Journal of Computer Science Iue, Vol. 7, Iue 3, No 4, May Yicen Liu, Mingrong Liu, Xing Chen, Liang Xiang, Qing Yang "Automatic Tag Recommendation for Weblog", International Conference on Information Technology and Computer Science, pp , April Global Journal of Computer Science and Technology Volume XII Iue IX Verion I 202 Global Journal Inc. (US)
9 Web Page Recommendation Approach Uing Weighted Sequential Pattern and Markov Model April 8 Global Journal of Computer Science and Technology Volume XII Iue IX Verion I 202 Thi page i intentionally left blank 202 Global Journal Inc. (US)
LinkGuide: Towards a Better Collection of Hyperlinks in a Website Homepage
Proceeding of the World Congre on Engineering 2007 Vol I LinkGuide: Toward a Better Collection of Hyperlink in a Webite Homepage A. Ammari and V. Zharkova chool of Informatic, Univerity of Bradford anammari@bradford.ac.uk,
More informationLaboratory Exercise 6
Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each type of circuit will be implemented in two
More informationDAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications
DAROS: Ditributed Uer-Server Aignment And Replication For Online Social Networking Application Thuan Duong-Ba School of EECS Oregon State Univerity Corvalli, OR 97330, USA Email: duongba@eec.oregontate.edu
More informationData Mining with Linguistic Thresholds
Int. J. Contemp. Math. Science, Vol. 7, 22, no. 35, 7-725 Data Mining with Linguitic Threhold Tzung-Pei Hong Department of Electrical Engineering National Univerity of Kaohiung Kaohiung, Taiwan, R.O.C.
More informationKeywords Cloud Computing, Service Level Agreements (SLA), CloudSim, Monitoring & Controlling SLA Agent, JADE
Volume 5, Iue 8, Augut 2015 ISSN: 2277 128X International Journal of Advanced Reearch in Computer Science and Software Engineering Reearch Paper Available online at: www.ijarce.com Verification of Agent
More informationAnalyzing Hydra Historical Statistics Part 2
Analyzing Hydra Hitorical Statitic Part Fabio Maimo Ottaviani EPV Technologie White paper 5 hnode HSM Hitorical Record The hnode i the hierarchical data torage management node and ha to perform all the
More informationA Fast Association Rule Algorithm Based On Bitmap and Granular Computing
A Fat Aociation Rule Algorithm Baed On Bitmap and Granular Computing T.Y.Lin Xiaohua Hu Eric Louie Dept. of Computer Science College of Information Science IBM Almaden Reearch Center San Joe State Univerity
More informationDistributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router
Ditributed Packet Proceing Architecture with Reconfigurable Hardware Accelerator for 100Gbp Forwarding Performance on Virtualized Edge Router Satohi Nihiyama, Hitohi Kaneko, and Ichiro Kudo Abtract To
More informationAn Approach to a Test Oracle for XML Query Testing
An Approach to a Tet Oracle for XML Query Teting Dae S. Kim-Park, Claudio de la Riva, Javier Tuya Univerity of Oviedo Computing Department Campu of Vieque, /n, 33204 (SPAIN) kim_park@li.uniovi.e, claudio@uniovi.e,
More informationA Fast Association Rule Algorithm Based on Bitmap Computing with Multiple Minimum Supports using Maximum Constraints
A Fat Aociation Rule Algorithm Baed on Bitmap Computing with Multiple Minimum Support uing Maximum Contraint Jyothi Patil, and Dr. V.D.Mytri Abtract Mining aociation rule from databae i a timeconuming
More informationA Multi-objective Genetic Algorithm for Reliability Optimization Problem
International Journal of Performability Engineering, Vol. 5, No. 3, April 2009, pp. 227-234. RAMS Conultant Printed in India A Multi-objective Genetic Algorithm for Reliability Optimization Problem AMAR
More informationCSE 250B Assignment 4 Report
CSE 250B Aignment 4 Report March 24, 2012 Yuncong Chen yuncong@c.ucd.edu Pengfei Chen pec008@ucd.edu Yang Liu yal060@c.ucd.edu Abtract In thi project, we implemented the recurive autoencoder (RAE) a decribed
More informationService and Network Management Interworking in Future Wireless Systems
Service and Network Management Interworking in Future Wirele Sytem V. Tountopoulo V. Stavroulaki P. Demeticha N. Mitrou and M. Theologou National Technical Univerity of Athen Department of Electrical Engineering
More informationA Basic Prototype for Enterprise Level Project Management
A Baic Prototype for Enterprie Level Project Management Saurabh Malgaonkar, Abhay Kolhe Computer Engineering Department, Mukeh Patel School of Technology Management & Engineering, NMIMS Univerity, Mumbai,
More informationMulti-Target Tracking In Clutter
Multi-Target Tracking In Clutter John N. Sander-Reed, Mary Jo Duncan, W.B. Boucher, W. Michael Dimmler, Shawn O Keefe ABSTRACT A high frame rate (0 Hz), multi-target, video tracker ha been developed and
More informationPerformance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks
Performance of a Robut Filter-baed Approach for Contour Detection in Wirele Senor Network Hadi Alati, William A. Armtrong, Jr., and Ai Naipuri Department of Electrical and Computer Engineering The Univerity
More informationAUTOMATIC TEST CASE GENERATION USING UML MODELS
Volume-2, Iue-6, June-2014 AUTOMATIC TEST CASE GENERATION USING UML MODELS 1 SAGARKUMAR P. JAIN, 2 KHUSHBOO S. LALWANI, 3 NIKITA K. MAHAJAN, 4 BHAGYASHREE J. GADEKAR 1,2,3,4 Department of Computer Engineering,
More informationLecture 14: Minimum Spanning Tree I
COMPSCI 0: Deign and Analyi of Algorithm October 4, 07 Lecture 4: Minimum Spanning Tree I Lecturer: Rong Ge Scribe: Fred Zhang Overview Thi lecture we finih our dicuion of the hortet path problem and introduce
More informationThe Association of System Performance Professionals
The Aociation of Sytem Performance Profeional The Computer Meaurement Group, commonly called CMG, i a not for profit, worldwide organization of data proceing profeional committed to the meaurement and
More informationImage authentication and tamper detection using fragile watermarking in spatial domain
International Journal of Advanced Reearch in Computer Engineering & Technology (IJARCET) Volume 6, Iue 7, July 2017, ISSN: 2278 1323 Image authentication and tamper detection uing fragile watermarking
More information3D SMAP Algorithm. April 11, 2012
3D SMAP Algorithm April 11, 2012 Baed on the original SMAP paper [1]. Thi report extend the tructure of MSRF into 3D. The prior ditribution i modified to atify the MRF property. In addition, an iterative
More informationHow to. write a paper. The basics writing a solid paper Different communities/different standards Common errors
How to write a paper The baic writing a olid paper Different communitie/different tandard Common error Reource Raibert eay My grammar point Article on a v. the Bug in writing Clarity Goal Conciene Calling
More informationCombining Web Usage Mining and Fuzzy Inference for Website Personalization
Combining Web Uage Mining and Fuzzy Inference for Webite Peronalization Olfa Naraoui and Chritopher Petene Dept. of Electrical and Computer Engineering 206 Engineering Science Bldg. The Univerity of Memphi
More informationKey Terms - MinMin, MaxMin, Sufferage, Task Scheduling, Standard Deviation, Load Balancing.
Volume 3, Iue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Reearch in Computer Science and Software Engineering Reearch Paper Available online at: www.ijarce.com Tak Aignment in
More informationEdits in Xylia Validity Preserving Editing of XML Documents
dit in Xylia Validity Preerving diting of XML Document Pouria Shaker, Theodore S. Norvell, and Denni K. Peter Faculty of ngineering and Applied Science, Memorial Univerity of Newfoundland, St. John, NFLD,
More informationANALYSIS OF THE FIRST LAYER IN WEIGHTLESS NEURAL NETWORKS FOR 3_DIMENSIONAL PATTERN RECOGNITION
ANALYSIS OF THE FIRST LAYER IN WEIGHTLESS NEURAL NETWORKS FOR 3_DIMENSIONAL PATTERN RECOGNITION A. Váque-Nava * Ecuela de Ingeniería. CENTRO UNIVERSITARIO MEXICO. DIVISION DE ESTUDIOS SUPERIORES J. Figueroa
More informationReporting Checklist for Nature Neuroscience
Correponding Author: Manucript Number: Manucript Type: Jeremy Elman NNBC48172A Brief Communication Reporting Checklit for Nature Neurocience # Figure: 2 # Figure: 5 # Table: 6 # Video: 0 Thi checklit i
More informationHassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem,
COMPETITIVE PROBABIISTIC SEF-ORGANIZING MAPS FOR ROUTING PROBEMS Haan Ghaziri AUB, OSB Beirut, ebanon ghaziri@aub.edu.lb Abtract In thi paper, we have applied the concept of the elf-organizing map (SOM)
More informationPerformance Evaluation of search engines via user efforts measures
IJCSI International Journal of Computer Science Iue, Vol. 9, Iue 4, No, July 01 www.ijcsi.org 437 Performance Evaluation of earch engine via uer effort meaure Raeh Kumar Goutam 1 and Sanay K. Dwivedi 1
More informationTrainable Context Model for Multiscale Segmentation
Trainable Context Model for Multicale Segmentation Hui Cheng and Charle A. Bouman School of Electrical and Computer Engineering Purdue Univerity Wet Lafayette, IN 47907-1285 {hui, bouman}@ ecn.purdue.edu
More informationHow to Select Measurement Points in Access Point Localization
Proceeding of the International MultiConference of Engineer and Computer Scientit 205 Vol II, IMECS 205, March 8-20, 205, Hong Kong How to Select Meaurement Point in Acce Point Localization Xiaoling Yang,
More informationxy-monotone path existence queries in a rectilinear environment
CCCG 2012, Charlottetown, P.E.I., Augut 8 10, 2012 xy-monotone path exitence querie in a rectilinear environment Gregory Bint Anil Mahehwari Michiel Smid Abtract Given a planar environment coniting of
More informationUniversität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart.
Univerität Augburg à ÊÇÅÍÆ ËÀǼ Approximating Optimal Viual Senor Placement E. Hörter, R. Lienhart Report 2006-01 Januar 2006 Intitut für Informatik D-86135 Augburg Copyright c E. Hörter, R. Lienhart Intitut
More informationStochastic Search and Graph Techniques for MCM Path Planning Christine D. Piatko, Christopher P. Diehl, Paul McNamee, Cheryl Resch and I-Jeng Wang
Stochatic Search and Graph Technique for MCM Path Planning Chritine D. Piatko, Chritopher P. Diehl, Paul McNamee, Cheryl Rech and I-Jeng Wang The John Hopkin Univerity Applied Phyic Laboratory, Laurel,
More informationA System Dynamics Model for Transient Availability Modeling of Repairable Redundant Systems
International Journal of Performability Engineering Vol., No. 3, May 05, pp. 03-. RAMS Conultant Printed in India A Sytem Dynamic Model for Tranient Availability Modeling of Repairable Redundant Sytem
More informationRefining SIRAP with a Dedicated Resource Ceiling for Self-Blocking
Refining SIRAP with a Dedicated Reource Ceiling for Self-Blocking Mori Behnam, Thoma Nolte Mälardalen Real-Time Reearch Centre P.O. Box 883, SE-721 23 Väterå, Sweden {mori.behnam,thoma.nolte}@mdh.e ABSTRACT
More informationUC Berkeley International Conference on GIScience Short Paper Proceedings
UC Berkeley International Conference on GIScience Short Paper Proceeding Title A novel method for probabilitic coverage etimation of enor network baed on 3D vector repreentation in complex urban environment
More informationDesign of a Stewart Platform for General Machining Using Magnetic Bearings
eign of a Stewart Platform for eneral Machining Uing Magnetic earing Jeff Pieper epartment of Mechanical and Manufacturing Engineering Univerity of algary algary lberta anada N N4 pieper@ucalgary.ca Preented
More information( ) subject to m. e (2) L are 2L+1. = s SEG SEG Las Vegas 2012 Annual Meeting Page 1
A new imultaneou ource eparation algorithm uing frequency-divere filtering Ying Ji*, Ed Kragh, and Phil Chritie, Schlumberger Cambridge Reearch Summary We decribe a new imultaneou ource eparation algorithm
More informationUsing Mouse Feedback in Computer Assisted Transcription of Handwritten Text Images
2009 10th International Conference on Document Analyi and Recognition Uing Moue Feedback in Computer Aited Trancription of Handwritten Text Image Verónica Romero, Alejandro H. Toelli, Enrique Vidal Intituto
More informationAspects of Formal and Graphical Design of a Bus System
Apect of Formal and Graphical Deign of a Bu Sytem Tiberiu Seceleanu Univerity of Turku, Dpt. of Information Technology Turku, Finland tiberiu.eceleanu@utu.fi Tomi Weterlund Turku Centre for Computer Science
More informationelse end while End References
621-630. [RM89] [SK76] Roenfeld, A. and Melter, R. A., Digital geometry, The Mathematical Intelligencer, vol. 11, No. 3, 1989, pp. 69-72. Sklanky, J. and Kibler, D. F., A theory of nonuniformly digitized
More informationA CLUSTERING-BASED HYBRID REPLICA CONTROL PROTOCOL FOR HIGH AVAILABILITY IN GRID ENVIRONMENT
Journal of Computer Science 10 (12): 2442-2449, 2014 ISSN: 1549-3636 2014 R. Latip et al., Thi open acce article i ditributed under a Creative Common Attribution (CC-BY) 3.0 licene doi:10.3844/jcp.2014.2442.2449
More informationImplementation of a momentum-based distance metric for motion graphs. Student: Alessandro Di Domenico (st.no ), Supervisor: Nicolas Pronost
Implementation of a momentum-baed ditance metric for motion graph Student: Aleandro Di Domenico (t.no 3775682), Supervior: Nicola Pronot April 3, 2014 Abtract Thi report preent the procedure and reult
More informationKeywords: Defect detection, linear phased array transducer, parameter optimization, phased array ultrasonic B-mode imaging testing.
Send Order for Reprint to reprint@benthamcience.ae 488 The Open Automation and Control Sytem Journal, 2014, 6, 488-492 Open Acce Parameter Optimization of Linear Phaed Array Tranducer for Defect Detection
More informationLaboratory Exercise 6
Laboratory Exercie 6 Adder, Subtractor, and Multiplier a a The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each b c circuit will be decribed in Verilog
More informationAN INTELLIGENT SCHEME FOR FACIAL EXPRESSION RECOGNITION
AN INTELLIGENT SCHEME FOR FACIAL EXPRESSION RECOGNITION A. Raouzaiou, S. Ioannou, K. Karpouzi, N. Tapatouli, S. Kollia 1, R. Cowie 2 1 Department of Electrical and Computer Engineering National Technical
More information(12) Patent Application Publication (10) Pub. No.: US 2003/ A1
US 2003O196031A1 (19) United State (12) Patent Application Publication (10) Pub. No.: US 2003/0196031 A1 Chen (43) Pub. Date: Oct. 16, 2003 (54) STORAGE CONTROLLER WITH THE DISK Related U.S. Application
More informationIMPROVED JPEG DECOMPRESSION OF DOCUMENT IMAGES BASED ON IMAGE SEGMENTATION. Tak-Shing Wong, Charles A. Bouman, and Ilya Pollak
IMPROVED DECOMPRESSION OF DOCUMENT IMAGES BASED ON IMAGE SEGMENTATION Tak-Shing Wong, Charle A. Bouman, and Ilya Pollak School of Electrical and Computer Engineering Purdue Univerity ABSTRACT We propoe
More informationOperational Semantics Class notes for a lecture given by Mooly Sagiv Tel Aviv University 24/5/2007 By Roy Ganor and Uri Juhasz
Operational emantic Page Operational emantic Cla note for a lecture given by Mooly agiv Tel Aviv Univerity 4/5/7 By Roy Ganor and Uri Juhaz Reference emantic with Application, H. Nielon and F. Nielon,
More informationSee chapter 8 in the textbook. Dr Muhammad Al Salamah, Industrial Engineering, KFUPM
Goal programming Objective of the topic: Indentify indutrial baed ituation where two or more objective function are required. Write a multi objective function model dla a goal LP Ue weighting um and preemptive
More informationA DIVISIVE HIERARCHICAL CLUSTERING- BASED METHOD FOR INDEXING IMAGE INFORMATION
A DIVISIVE HIERARCHICAL CLUSTERING- BASED METHOD FOR INDEXING IMAGE INFORMATION ABSTRACT Najva Izadpanah Department of Computer Engineering, Ilamic Azad Univerity, Qazvin Branch, Qazvin, Iran In mot practical
More informationA User-Attention Based Focus Detection Framework and Its Applications
A Uer-Attention Baed Focu Detection Framework and It Application Chia-Chiang Ho, Wen-Huang Cheng, Ting-Jian Pan, Ja-Ling Wu Communication and Multimedia Laboratory, Department of Computer Science and Information
More information(12) Patent Application Publication (10) Pub. No.: US 2011/ A1
(19) United State US 2011 0316690A1 (12) Patent Application Publication (10) Pub. No.: US 2011/0316690 A1 Siegman (43) Pub. Date: Dec. 29, 2011 (54) SYSTEMAND METHOD FOR IDENTIFYING ELECTRICAL EQUIPMENT
More informationOn successive packing approach to multidimensional (M-D) interleaving
On ucceive packing approach to multidimenional (M-D) interleaving Xi Min Zhang Yun Q. hi ankar Bau Abtract We propoe an interleaving cheme for multidimenional (M-D) interleaving. To achieved by uing a
More informationIntegrated Single-arm Assembly and Manipulation Planning using Dynamic Regrasp Graphs
Proceeding of The 2016 IEEE International Conference on Real-time Computing and Robotic June 6-9, 2016, Angkor Wat, Cambodia Integrated Single-arm Aembly and Manipulation Planning uing Dynamic Regrap Graph
More informationApplication of Social Relation Graphs for Early Detection of Transient Spammers
Radolaw rendel and Henryk Krawczyk Application of Social Relation raph for Early Detection of Tranient Spammer RADOSLAW RENDEL and HENRYK KRAWCZYK Electronic, Telecommunication and Informatic Department
More informationA Novel Feature Line Segment Approach for Pattern Classification
12th International Conference on Information Fuion Seattle, WA, USA, July 6-9, 2009 A Novel Feature Line Segment Approach for Pattern Claification Yi Yang Intitute of Integrated Automation Xi an Jiaotong
More informationLaboratory Exercise 6
Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each circuit will be decribed in Verilog and implemented
More informationArchitecture and grid application of cluster computing system
Architecture and grid application of cluter computing ytem Yi Lv*, Shuiqin Yu, Youju Mao Intitute of Optical Fiber Telecom, Chongqing Univ. of Pot & Telecom, Chongqing, 400065, P.R.China ABSTRACT Recently,
More informationESRP Storage Program EMC Celerra NX4 (500 User) Mailbox Resiliency Storage Solution for Microsoft Exchange 2010
ESRP Stor Program EMC Celerra NX4 (5 Uer) Mailbox Reilie Stor Solution for Microoft Exchan 21 Teted with: ESRP Stor Verion. Teted Date: 6/25/21 EMC Corporation Corporate Headquarter Hopkinton, MA 1748-91
More informationLaboratory Exercise 6
Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each circuit will be decribed in VHL and implemented
More informationAalborg Universitet. Published in: Proceedings of the Working Conference on Advanced Visual Interfaces
Aalborg Univeritet Software-Baed Adjutment of Mobile Autotereocopic Graphic Uing Static Parallax Barrier Paprocki, Martin Marko; Krog, Kim Srirat; Kritofferen, Morten Bak; Krau, Martin Publihed in: Proceeding
More information1 The secretary problem
Thi i new material: if you ee error, pleae email jtyu at tanford dot edu 1 The ecretary problem We will tart by analyzing the expected runtime of an algorithm, a you will be expected to do on your homework.
More informationSLA Adaptation for Service Overlay Networks
SLA Adaptation for Service Overlay Network Con Tran 1, Zbigniew Dziong 1, and Michal Pióro 2 1 Department of Electrical Engineering, École de Technologie Supérieure, Univerity of Quebec, Montréal, Canada
More informationA Load Balancing Model based on Load-aware for Distributed Controllers. Fengjun Shang, Wenjuan Gong
4th International Conference on Machinery, Material and Computing Technology (ICMMCT 2016) A Load Balancing Model baed on Load-aware for Ditributed Controller Fengjun Shang, Wenjuan Gong College of Compute
More informationPlanning of scooping position and approach path for loading operation by wheel loader
22 nd International Sympoium on Automation and Robotic in Contruction ISARC 25 - September 11-14, 25, Ferrara (Italy) 1 Planning of cooping poition and approach path for loading operation by wheel loader
More informationEvolution of Non-Deterministic Incremental Algorithms. Hugues Juille. Volen Center for Complex Systems. Brandeis University. Waltham, MA
Evolution of Non-Determinitic Incremental Algorithm a a New Approach for Search in State Space Hugue Juille Computer Science Department Volen Center for Complex Sytem Brandei Univerity Waltham, MA 02254-9110
More informationDWH Performance Tuning For Better Reporting
DWH Performance Tuning For Better Sandeep Bhargava Reearch Scholar Naveen Hemrajani Aociate Profeor Dineh Goyal Aociate Profeor Subhah Gander IT Profeional ABSTRACT: The concept of data warehoue deal in
More informationModelling the impact of cyber attacks on the traffic control centre of an urban automobile transport system by means of enhanced cybersecurity
Modelling the impact of cyber attack on the traffic control centre of an urban automobile tranport ytem by mean of enhanced cyberecurity Yoana Ivanova 1,* 1 Bulgarian Academy of Science, Intitute of ICT,
More informationA TOPSIS based Method for Gene Selection for Cancer Classification
Volume 67 No17, April 2013 A TOPSIS baed Method for Gene Selection for Cancer Claification IMAbd-El Fattah,WIKhedr, KMSallam, 1 Department of Statitic, 3 Department of Deciion upport, 2 Department of information
More informationA Hybrid Deployable Dynamic Traffic Assignment Framework for Robust Online Route Guidance
A Hybrid Deployable Dynamic Traffic Aignment Framework for Robut Online Route Guidance Sriniva Peeta School of Civil Engineering, Purdue Univerity Chao Zhou Sabre, Inc. Sriniva Peeta School of Civil Engineering
More information/06/$ IEEE 364
006 IEEE International ympoium on ignal Proceing and Information Technology oie Variance Etimation In ignal Proceing David Makovoz IPAC, California Intitute of Technology, MC-0, Paadena, CA, 95 davidm@ipac.caltech.edu;
More informationSoftware Agent (SA) to guarantee QoS for multi constrain applications in all-ip networks
Software Agent (SA) to guarantee QoS for multi contrain application in all-ip network Kazi Khaled Al-Zahid and Mituji Matumoto GITS, Waeda Univerity 94 Waeda Univ. Bldg. A-308, 1011Okuboyama Nihitomida
More information3D MODELLING WITH LINEAR APPROACHES USING GEOMETRIC PRIMITIVES
MAKARA, TEKNOLOGI, VOL. 9, NO., APRIL 5: 3-35 3D MODELLING WITH LINEAR APPROACHES USING GEOMETRIC PRIMITIVES Mochammad Zulianyah Informatic Engineering, Faculty of Engineering, ARS International Univerity,
More informationnp vp cost = 0 cost = c np vp cost = c I replacing term cost = c+c n cost = c * Error detection Error correction pron det pron det n gi
Spoken Language Paring with Robutne and ncrementality Yohihide Kato, Shigeki Matubara, Katuhiko Toyama and Yauyohi nagaki y Graduate School of Engineering, Nagoya Univerity y Faculty of Language and Culture,
More informationCourse Project: Adders, Subtractors, and Multipliers a
In the name Allah Department of Computer Engineering 215 Spring emeter Computer Architecture Coure Intructor: Dr. Mahdi Abbai Coure Project: Adder, Subtractor, and Multiplier a a The purpoe of thi p roject
More informationResearch Article Longest Path Reroute to Optimize the Optical Multicast Routing in Sparse Splitting WDM Networks
International Optic Volume 0, Article ID 9, page http://dxdoiorg/0/0/9 Reearch Article Longet Path Reroute to Optimize the Optical Multicat Routing in Spare Splitting WDM Network Huanlin Liu, Hongyue Dai,
More informationMulticlass Road Sign Detection using Multiplicative Kernel
Proceeding of the Croatian Computer Viion Workhop, Year 1 Multicla Road Sign Detection uing Multiplicative Kernel Valentina Zadrija Mireo d. d. Zagreb, Croatia valentina.zadrija@mireo.hr Siniša Šegvić
More informationParallel MATLAB at FSU: Task Computing
Parallel MATLAB at FSU: Tak John Burkardt Department of Scientific Florida State Univerity... 1:30-2:30 Thurday, 07 April 2011 499 Dirac Science Library... http://people.c.fu.edu/ jburkardt/preentation/...
More informationNew Structural Decomposition Techniques for Constraint Satisfaction Problems
New Structural Decompoition Technique for Contraint Satifaction Problem Yaling Zheng and Berthe Y. Choueiry Contraint Sytem Laboratory Univerity of Nebraka-Lincoln Email: yzheng choueiry@ce.unl.edu Abtract.
More informationAdvanced Encryption Standard and Modes of Operation
Advanced Encryption Standard and Mode of Operation G. Bertoni L. Breveglieri Foundation of Cryptography - AES pp. 1 / 50 AES Advanced Encryption Standard (AES) i a ymmetric cryptographic algorithm AES
More informationDomain-Specific Modeling for Rapid System-Wide Energy Estimation of Reconfigurable Architectures
Domain-Specific Modeling for Rapid Sytem-Wide Energy Etimation of Reconfigurable Architecture Seonil Choi 1,Ju-wookJang 2, Sumit Mohanty 1, Viktor K. Praanna 1 1 Dept. of Electrical Engg. 2 Dept. of Electronic
More informationIncreasing Throughput and Reducing Delay in Wireless Sensor Networks Using Interference Alignment
Int. J. Communication, Network and Sytem Science, 0, 5, 90-97 http://dx.doi.org/0.436/ijcn.0.50 Publihed Online February 0 (http://www.scirp.org/journal/ijcn) Increaing Throughput and Reducing Delay in
More informationTemporal Abstract Interpretation. To have a continuum of program analysis techniques ranging from model-checking to static analysis.
Temporal Abtract Interpretation Patrick COUSOT DI, École normale upérieure 45 rue d Ulm 75230 Pari cedex 05, France mailto:patrick.couot@en.fr http://www.di.en.fr/ couot and Radhia COUSOT LIX École polytechnique
More informationMarkov Random Fields in Image Segmentation
Preented at SSIP 2011, Szeged, Hungary Markov Random Field in Image Segmentation Zoltan Kato Image Proceing & Computer Graphic Dept. Univerity of Szeged Hungary Zoltan Kato: Markov Random Field in Image
More informationTesting Structural Properties in Textual Data: Beyond Document Grammars
Teting Structural Propertie in Textual Data: Beyond Document Grammar Felix Saaki and Jen Pönninghau Univerity of Bielefeld, Germany Abtract Schema language concentrate on grammatical contraint on document
More informationPolicy-based Injection of Private Traffic into a Public SDN Testbed
Intitut für Techniche Informatik und Kommunikationnetze Adrian Friedli Policy-baed Injection of Private Traffic into a Public SDN Tetbed Mater Thei MA-2013-12 Advior: Dr. Bernhard Ager, Vaileio Kotroni
More informationNearly Constant Approximation for Data Aggregation Scheduling in Wireless Sensor Networks
Nearly Contant Approximation for Data Aggregation Scheduling in Wirele Senor Network Scott C.-H. Huang, Peng-Jun Wan, Chinh T. Vu, Yinghu Li and France Yao Computer Science Department, City Univerity of
More informationSecurity Analysis of the Efficient Chaos Pseudo-random Number Generator Applied to Video Encryption
Journal of Electronic Teting (2018) 34:709 715 http://doi.org/10.1007/10836-018-5767-0 Security Analyi of the Efficient Chao Peudo-random Number Generator Applied to Video Encryption Dragan Lambić 1 Alekandar
More informationDigifort Standard. Architecture
Digifort Standard Intermediate olution for intalling up to 32 camera The Standard verion provide the ideal reource for local and remote monitoring of up to 32 camera per erver and a the intermediate verion
More informationA METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS
Vietnam Journal of Science and Technology 55 (5) (017) 650-657 DOI: 10.1565/55-518/55/5/906 A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS Nguyen Huu Quang *, Banh
More informationTexture-Constrained Active Shape Models
107 Texture-Contrained Active Shape Model Shuicheng Yan, Ce Liu Stan Z. Li Hongjiang Zhang Heung-Yeung Shum Qianheng Cheng Microoft Reearch Aia, Beijing Sigma Center, Beijing 100080, China Dept. of Info.
More informationarxiv: v1 [cs.ds] 27 Feb 2018
Incremental Strong Connectivity and 2-Connectivity in Directed Graph Louka Georgiadi 1, Giueppe F. Italiano 2, and Niko Parotidi 2 arxiv:1802.10189v1 [c.ds] 27 Feb 2018 1 Univerity of Ioannina, Greece.
More informationThe norm Package. November 15, Title Analysis of multivariate normal datasets with missing values
The norm Package November 15, 2003 Verion 1.0-9 Date 2002/05/06 Title Analyi of multivariate normal dataet with miing value Author Ported to R by Alvaro A. Novo . Original by Joeph
More informationESRP Storage Program EMC Celerra NS-120 (1,500 User) Mailbox Resiliency Storage Solution for Microsoft Exchange 2010
ESRP Stora Program EMC Celerra NS-12 (1, Uer) Mailbox Reilien Stora Solution for Microoft Exchan 21 Teted with: ESRP Stora Verion 3. Teted Date: 3/2/21 EMC Corporation Corporate Headquarter Hopkinton,
More informationShortest Paths with Single-Point Visibility Constraint
Shortet Path with Single-Point Viibility Contraint Ramtin Khoravi Mohammad Ghodi Department of Computer Engineering Sharif Univerity of Technology Abtract Thi paper tudie the problem of finding a hortet
More informationComputer Arithmetic Homework Solutions. 1 An adder for graphics. 2 Partitioned adder. 3 HDL implementation of a partitioned adder
Computer Arithmetic Homework 3 2016 2017 Solution 1 An adder for graphic In a normal ripple carry addition of two poitive number, the carry i the ignal for a reult exceeding the maximum. We ue thi ignal
More informationMinimum congestion spanning trees in bipartite and random graphs
Minimum congetion panning tree in bipartite and random graph M.I. Otrovkii Department of Mathematic and Computer Science St. John Univerity 8000 Utopia Parkway Queen, NY 11439, USA e-mail: otrovm@tjohn.edu
More informationAN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROBLEM
RAC Univerity Journal, Vol IV, No, 7, pp 87-9 AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROLEM Mozzem Hoain Department of Mathematic Ghior Govt
More information