World Academic Union

Displaying 1-40 of 151 results

  • White Papers // Jun 2014

    Enhance Security in XML Databases: XLog File for Severity-Aware Trust-Based Access Control

    The topic of enhancing security in XML databases is important as it includes protecting sensitive data and providing a secure environment to users. In order to improve security and provide dynamic access control for XML databases, the authors presented XLog file to calculate user trust values by recording users' bad...

    Provided By World Academic Union

  • White Papers // Jun 2014

    Applying Spanning Tree Graph Theory for Automatic Database Normalization

    In knowledge and data engineering field, relational database is the best repository to store data in a real world. It has been using around the world more than eight decades. Normalization is the most important process for the analysis and design of relational databases. It aims at creating a set...

    Provided By World Academic Union

  • White Papers // May 2014

    Frequency- and Content-Based Tag Cloud Font Distribution Algorithm

    The spread of web 2.0 has caused user-generated content explosion. Users can tag resources to describe and organize them. Tag clouds provide rough impression of relative importance of each tag within overall cloud in order to facilitate browsing among numerous tags and resources. The authors' paper is to enrich visualization...

    Provided By World Academic Union

  • White Papers // Apr 2014

    Ontologies for Complex Event Processing

    There is currently a lot of work on systems that can analyze the events, e.g., Complex Event Processing (CEP). In this paper, five ontologies are described, which include the event concepts. The paper provides an overview and comparison of existing event models. The main criteria for comparison are that there...

    Provided By World Academic Union

  • White Papers // Apr 2014

    A Distributed Approach to Extract High Utility Itemsets from XML Data

    In this paper, the authors investigate a new data mining capability that entails mining of High Utility Itemsets (HUI) in a distributed environment. Existing research in data mining deals with only presence or absence of an items and do not consider the semantic measures like weight or cost of the...

    Provided By World Academic Union

  • White Papers // Apr 2014

    Restructuring of XML Documents in the Form of Ontologies

    The intense use of the web has made it a very changing environment, its content is in permanent evolution to adapt to the demands. The standards have accompanied this evolution by passing from standards that regroup data with their presentations without any structuring such as HTML, to standards that separate...

    Provided By World Academic Union

  • White Papers // Mar 2014

    An Adaptive Virtual Desktop Service in Cloud Computing Platform

    Cloud computing is becoming more and more matured over the last few years and consequently the demands for better cloud services is increasing rapidly. One of the research topics to improve cloud services is the desktop computing in virtualized environment. This paper aims at the development of an adaptive virtual...

    Provided By World Academic Union

  • White Papers // Mar 2014

    Mobile Cloud Middleware: A New Service for Mobile Users

    Cloud Computing (CC) and Mobile Cloud Computing (MCC) have advanced rapidly the last few years. Today, MCC undergoes fast improvement and progress in terms of hardware (memory, embedded sensors, power consumption, touch screen, etc.) software (more and more sophisticated mobile applications) and transmission (higher data transmission rates achieved with different...

    Provided By World Academic Union

  • White Papers // Mar 2014

    ATM Service Analysis Using Predictive Data Mining

    The high utilization rate of Automated Teller Machine (ATM) has inevitably caused the phenomena of waiting for a long time in the queue. This in turn has increased the out of stock situations. The ATM utilization helps to determine the usage level and states the necessity of the ATM based...

    Provided By World Academic Union

  • White Papers // Mar 2014

    Migration of the Relational Data Base (RDB) to the Object Relational Data Base (ORDB)

    In this paper the authors propose an approach for translating an existing Relational DataBase (RDB) schema into ORDB. The transition is done with methods that can extract various functions from a RDB which is based on aggregations, associations between the various tables, and the reflexive relationships. These methods can extract...

    Provided By World Academic Union

  • White Papers // Mar 2014

    Design and Implementation of Quantum Cellular Automata Based Novel Adder Circuits

    The most important mathematical operation for any computing system is addition. An efficient adder can be of greater assistance in designing of any arithmetic circuits. Quantum-dot Cellular Automata (QCA) is a promising nanotechnology to create electronic circuits for computing devices and suitable candidate for next generation of computing systems. The...

    Provided By World Academic Union

  • White Papers // Mar 2014

    Enhance the Power of Sentiment Analysis

    Since big data has become substantially more accessible and manageable due to the development of powerful tools for dealing with unstructured data, people are eager to mine information from social media resources that could not be handled in the past. Sentiment analysis, as a novel branch of text mining, has...

    Provided By World Academic Union

  • White Papers // Feb 2014

    MATLAB-Based Graphical User Interface (GUI) for Data Mining as a Tool for Environment Management

    The application of data mining to environmental monitoring has become crucial for a number of tasks related to emergency management. Over recent years, many tools have been developed for Decision Support System (DSS) for emergency management. In this paper a Graphical User Interface (GUI) for environmental monitoring system is presented....

    Provided By World Academic Union

  • White Papers // Feb 2014

    Fault Tolerance in Distributed Database Systems

    Pioneer networked systems assume that connections are reliable, and a faulty operation will be considered in case of losing a connection. Transient connections are typical of mobile devices. Areas of application of data sharing system such as these, lead to the conclusion that network connections may not always be reliable,...

    Provided By World Academic Union

  • White Papers // Feb 2014

    Improvement of Data Transfer over Simple Object Access Protocol (SOAP)

    SOAP is defined by World Wide Web Consortium (W3C) as a simple and lightweight mechanism for exchanging structured and typed information between peers in a decentralized and distributed environment using eXtensible Markup Language (XML) on web services. This paper presents a designed algorithm which involves improvement of transferring data over...

    Provided By World Academic Union

  • White Papers // Feb 2014

    Indoor Localization by Pattern Matching Method Based On Extended Database

    In this paper the authors studied the CSS-based indoor localization system which is easy to implement, inexpensive to compose the systems, additionally CSS-based indoor localization system covers larger area than other system. However, this system has problem which is affected by reflected distance data. This problem in localization is caused...

    Provided By World Academic Union

  • White Papers // Feb 2014

    Big Data Strategy for Telco: Network Transformation

    Big data has the potential to improve the quality of services; enable infrastructure that businesses depend on to adapt continually and efficiently; improve the performance of employees; help organizations better understand customers; and reduce liability risks. Analytics and marketing models of fixed and mobile operators are falling short in combating...

    Provided By World Academic Union

  • White Papers // Feb 2014

    An Experiment of Three-Dimensional Point Clouds Using GoPro

    Construction of geo-spatial information recently tends to develop as multi-dimensional geo-spatial information. People constructing spatial information is also expanding its area to the general public from some experts. As well as, studies are in progress using a variety of devices, with the aim of near real-time update. In this paper,...

    Provided By World Academic Union

  • White Papers // Jan 2014

    Review and Comparison of Associative Classification Data Mining Approaches

    Associative Classification (AC) is a data mining approach that combines association rule and classification to build classification models (classifiers). AC has attracted a significant attention from several researchers mainly because it derives accurate classifiers that contain simple yet effective rules. In the last decade, a number of associative classification algorithms...

    Provided By World Academic Union

  • White Papers // Jan 2014

    A Review: Comparative Analysis of Different Categorical Data Clustering Ensemble Methods

    Over the past epoch a rampant amount of work has been done in the data clustering research under the unsupervised learning technique in data mining. Furthermore several algorithms and methods have been proposed focusing on clustering different data types, representation of cluster models, and accuracy rates of the clusters. However...

    Provided By World Academic Union

  • White Papers // Jan 2014

    Analysis of Diverse Clustering Tools in Data Mining

    Clustering in data mining is an unsupervised learning technique of aggregating the data objects into meaningful groups such that the intra cluster similarity of objects are maximized and inter cluster similarity of objects are minimized. Over the past decades several clustering tools were emerged in which clustering algorithms are inbuilt...

    Provided By World Academic Union

  • White Papers // Jan 2014

    Enhancing Privacy-Preserving Cloud Database Querying by Preventing Brute Force Attacks

    Considering the complexities involved in cloud computing, there are still plenty of issues that affect the privacy of data in cloud environment. Unless these problems get solved, the authors think that the problem of preserving privacy in cloud databases is still open. In tokenization and homomorphic cryptography based solutions for...

    Provided By World Academic Union

  • White Papers // Jan 2014

    Leakage Reduction ONOFIC Approach for Deep Submicron VLSI Circuits Design

    Minimizations of power dissipation, chip area with higher circuit performance are the necessary and key parameters in deep submicron regime. The leakage current increases sharply in deep submicron regime and directly affected the power dissipation of the logic circuits. In deep submicron region the power dissipation as well as high...

    Provided By World Academic Union

  • White Papers // Jan 2014

    Analysis of Users' Behavior on Book Loan Log Based On Association Rule Mining

    In this paper the authors aims to create a model for analysis of student behavior using library resources based on data mining technique in case of Suan Sunandha Rajabhat University. The model was created under association rules, apriori algorithm. The results were found 14 rules and the rules were tested...

    Provided By World Academic Union

  • White Papers // Jan 2014

    Mining Educational Data to Support Students? Major Selection

    In this paper the authors aims to create the model for student in choosing an emphasized track of student majoring in computer science at Suan Sunandha Rajabhat University. This paper is to develop the suggested system using data mining technique to analyze knowledge and conduct decision rules. Such relationships can...

    Provided By World Academic Union

  • White Papers // Jan 2014

    Time Series Regression with Meta-Clusters

    In this paper the authors present a preliminary attempt to apply classification of time series using meta-clusters in order to improve the quality of regression models. In this case, clustering was performed as a method to obtain subgroups of time series data with normal distribution from the inflow into wastewater...

    Provided By World Academic Union

  • White Papers // Jan 2014

    A Multi Cordic Architecture on FPGA Platform

    Co-Ordinate Rotation DIgital Computer (CORDIC) is a unique digital computing unit intended for the computation of mathematical operations and functions. This paper presents a multi CORDIC processor that integrates different CORDIC architectures on a single FPGA chip and allows the user to select the CORDIC architecture to proceed with based...

    Provided By World Academic Union

  • White Papers // Jan 2014

    The Automated Selective Acquisition System

    To support design process for launching the product on time, Reverse Engineering (RE) process has been introduced for quickly generating 3D CAD model from its physical object. The accuracy of the 3D CAD model depends upon the data acquisition technique selected, contact or non-contact methods. In order to reduce times...

    Provided By World Academic Union

  • White Papers // Dec 2013

    Modified Montgomery for RSA Cryptosystem

    Encryption and decryption in RSA are done by modular exponentiation which is achieved by repeated modular multiplication. Hence efficiency of modular multiplication directly determines the efficiency of RSA cryptosystem. This paper designs a modified montgomery modular multiplication in which addition of operands is computed by 4:2 compressors. The basic logic...

    Provided By World Academic Union

  • White Papers // Dec 2013

    New Approach for Constructing a Secure Biometric Database

    The multimodal biometric identification is the combination of several biometric systems; the challenge of this combination is to reduce some limitations of systems based on a single modality while significantly improving performance. In this paper, the authors propose a new approach to the construction and the protection of a multimodal...

    Provided By World Academic Union

  • White Papers // Dec 2013

    A Study on Abnormal Behavior Detection in BYOD Environment

    Advancement of communication technologies and smart devices in the recent times is leading to changes into the integrated wired and wireless communication environments. Since early days, businesses had started introducing environments for mobile device application to their operations in order to improve productivity (efficiency) and the closed corporate environment gradually...

    Provided By World Academic Union

  • White Papers // Dec 2013

    An Exploration on Competency-Based Curricula in Integrated Circuit Design

    In this paper the relationships between professional competences and school curriculain IC design industry are explored. The semi-structured questionnaire survey and focus group interview is the research method. Study participants are graduates of microelectronics engineering professional departments who are currently employed in the IC industry. The IC industries are defined...

    Provided By World Academic Union

  • White Papers // Dec 2013

    A Local Invariant Generalized Hough Transform Method for Integrated Circuit Visual Positioning

    In this paper, a Local Invariant Generalized Hough-Transform (LI-GHT) method is proposed for Integrated Circuit (IC) visual positioning. The original Generalized Hough Transform (GHT) is robust to external noise; however, it is not suitable for visual positioning of IC chips due to the Four-Dimensionality (4D) of parameter space which leads...

    Provided By World Academic Union

  • White Papers // Dec 2013

    Evaluating Performance of an Anomaly Detection Module with Artificial Neural Network Implementation

    Anomaly detection techniques have been focused on two main components: data extraction and selection and the second one are the analysis performed over the obtained data. This paper is to analyze the influence that each of these components has over the system performance by evaluating detection over network scenarios with...

    Provided By World Academic Union

  • White Papers // Dec 2013

    Runtime Monitoring Using Policy Based Approach to Control Information Flow for Mobile Apps

    Mobile applications are verified to check the correctness or evaluated to check the performance with respect to specific security properties such as availability, integrity and confidentiality. Where they are made available to the end users of the mobile application is achievable only to a limited degree using software engineering static...

    Provided By World Academic Union

  • White Papers // Dec 2013

    Centralized Peak Consumption Smoothing Revisited for Habitat Energy Scheduling

    Currently, electricity suppliers must predict the consumption of their customers in order to deduce the power they need to produce. It is then important in a first step to optimize household consumptions to obtain more constant curves by limiting peaks in energy consumption. Here centralized real time scheduling is proposed...

    Provided By World Academic Union

  • White Papers // Dec 2013

    Preliminary Evaluation of Passive UHF-Band RFID for Identifying Floating Objects on the Sea

    RFID system is used to identify objects such as passenger identification in public transportation, instead of linear or 2-dimensional barcodes. Key advantages of RFID system are to identify objects without physical contact, and to write arbitrary information into RFID tag. These advantages may help to improve maritime safety and efficiency...

    Provided By World Academic Union

  • White Papers // Dec 2013

    A Proposed Optimized and Efficient Intrusion Detection System for Wireless Sensor Network

    In recent years intrusions on computer network are the major security threat. Hence, it is important to impede such intrusions. The hindrance of such intrusions entirely relies on its detection, which is primary concern of any security tool like Intrusion Detection System (IDS). Therefore, it is imperative to accurately detect...

    Provided By World Academic Union

  • White Papers // Dec 2013

    Scenarios of Societal Security and Business Continuity Cycles

    Societal security, continuity scenarios and methodological cycling approach explained in this paper. Namely societal security organizational challenges ask implementation of international standards BS 25999-2 & global ISO 22300 which is a family of standards for business continuity management system. Efficient global organization system is distinguished of high entity

    Provided By World Academic Union

  • White Papers // Dec 2013

    Flexible Communication Platform for Crisis Management

    In this paper the authors describe the creation of a flexible communication platform for crisis management order to prepare and train members at national level. Topics disaster and emergency management are highly debated among experts. Fast communication will help to deal with emergencies. Problem is with the network connection and...

    Provided By World Academic Union

  • White Papers // Jan 2012

    Factors of Effective Business Software Systems Development and Enhancement Projects Work Effort Estimation

    Majority of Business Software Systems (BSS) Development and Enhancement Projects (D&EP) fail to meet criteria of their effectiveness, what leads to the considerable financial losses. One of the fundamental reasons for such projects' exceptionally low success rate are improperly derived estimates for their costs and time. In the case of...

    Provided By World Academic Union

  • White Papers // Sep 2013

    CMOS-Compatible Plasmonic Nanocircuits for On-Chip Integration

    Silicon photonics is merging as a unified platform for driving photonic based telecommunications and for local photonic based interconnect but it suffers from large footprint as compared with the nanoelectronics. Plasmonics is an attractive alternative for nanophotonics. In this paper, two CMOS compatible plasmonic waveguide platforms are compared. One is...

    Provided By World Academic Union

  • White Papers // Sep 2013

    A Testbed for the Experiments Performed in Missing Value Treatments

    The occurrence of missing values in database is a serious problem for data mining tasks, responsible for degrading data quality and accuracy of analyses. In this context, the area has shown a lack of standardization for experiments to treat missing values, introducing difficulties to the evaluation process among different researches...

    Provided By World Academic Union

  • White Papers // Sep 2013

    Semantic Support for Hypothesis-Based Research from Smart Environment Monitoring and Analysis Technologies

    Improvements in the data fusion and data analysis phase of research are imperative due to the exponential growth of sensed data. Currently, there are developments in the semantic sensor web community to explore efficient methods for reuse, correlation and integration of web-based data sets and live data streams. This paper...

    Provided By World Academic Union

  • White Papers // Sep 2013

    Data Structures and Algorithms of Intelligent Web-Based System for Modular Design

    In recent years, new product development became more and more competitive and globalized, and the designing phase is critical for the product success. The concept of modularity can provide the necessary foundation for organizations to design products that can respond rapidly to market needs. The paper describes data structures and...

    Provided By World Academic Union

  • White Papers // Sep 2013

    Re-Optimization MVPP Using Common Subexpression for Materialized View Selection

    A data warehouses is a repository of information integrated from source data. Information stored in data warehouse is the form of materialized in order to provide the better performance for answering the queries. Deciding which appropriated views to be materialized is one of important problem. In order to achieve this...

    Provided By World Academic Union

  • White Papers // Sep 2013

    A Network Traffic Prediction Algorithm Based On Data Mining Technique

    In this paper the authors predict incoming and outgoing data rate in network system by using association rule discover, which is one of the data mining techniques. Information of incoming and outgoing data in each times and network bandwidth are network performance parameters, which needed to solve in the traffic...

    Provided By World Academic Union

  • White Papers // Sep 2013

    Improving the Performance of Proxy Server by Using Data Mining Technique

    Currently, web usage makes a huge data from a lot of user attention. In general, proxy server is a system to support web usage from user and can manage system by using hit rates. This paper tries to improve hit rates in proxy system by applying data mining technique. The...

    Provided By World Academic Union

  • White Papers // Sep 2013

    Estimation Model of Dry Docking Duration Using Data Mining

    Maintenance is one of the most important activities in the shipyard industry. However, sometimes it is not supported by adequate services from the shipyard, where inaccuracy in estimating the duration of the ship maintenance is still common. This makes estimation of ship maintenance duration is crucial. This paper uses data...

    Provided By World Academic Union

  • White Papers // Aug 2013

    Data Envelopment Analysis with Partially Perfect Objects

    In this paper the authors present a simplified version of Data Envelopment Analysis (DEA) - a conventional approach to evaluating the performance and ranking of competitive objects characterized by two groups of factors acting in opposite directions: inputs and outputs. DEA with a Perfect Object (DEA PO) augments the group...

    Provided By World Academic Union

  • White Papers // Aug 2013

    CScheme in Traditional Concurrency Problems

    CScheme, a concurrent programming paradigm based on scheme concept enables concurrency schemes to be constructed from smaller synchronization units through a GUI based composer and latter be reused on other concurrency problems of a similar nature. This paradigm is particularly important in the multi-core environment prevalent nowadays. In this paper,...

    Provided By World Academic Union

  • White Papers // Jun 2013

    Energy Efficient Clustering and Data Aggregation in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are wireless networks consisting of number of tiny, low cost and low power sensor nodes to monitor various physical phenomena like temperature, pressure, vibration, landslide detection, presence of any object, etc. The major limitation in these networks is the use of non-rechargeable battery having limited power...

    Provided By World Academic Union

  • White Papers // Jul 2013

    Wavelet-Based Data Compression Technique for Wireless Sensor Networks

    In this paper, the authors proposed an efficient data compression strategy exploiting the multi-resolution characteristic of the wavelet transform. They have developed a sensor node called \"Smart Sensor Node; SSN\". The main goals of the SSN design are lightweight, minimal power consumption, modular design and robust circuitry. The SSN is...

    Provided By World Academic Union

  • White Papers // Aug 2013

    Energy Efficient Cooperative Caching in WSN

    Wireless Sensor Networks (WSNs) consist of number of tiny, low cost and low power sensor nodes to monitor some physical phenomenon. The major limitation in these networks is the use of non-rechargeable battery having limited power supply. The main cause of energy consumption in such networks is communication subsystem. This...

    Provided By World Academic Union

  • White Papers // Jun 2013

    Cooperative Energy Efficient Routing for Wireless Sensor Networks in Smart Grid Communications

    Smart grids employ wireless sensor networks for their control and monitoring. Sensors are characterized by limitations in the processing power, energy supply and memory spaces, which require a particular attention on the design of routing and data management algorithms. Since most routing algorithms for sensor networks, focus on finding energy...

    Provided By World Academic Union

  • White Papers // Jan 2014

    Leakage Reduction ONOFIC Approach for Deep Submicron VLSI Circuits Design

    Minimizations of power dissipation, chip area with higher circuit performance are the necessary and key parameters in deep submicron regime. The leakage current increases sharply in deep submicron regime and directly affected the power dissipation of the logic circuits. In deep submicron region the power dissipation as well as high...

    Provided By World Academic Union

  • White Papers // Jun 2013

    A Multi-Agent Framework for Data Mining

    A generic and extendible Multi-Agent Data Mining (MADM) framework, MADMF (the Multi-Agent Data Mining Framework) is described. The central feature of the framework is that it avoids the use of agreed meta-language formats by supporting a framework of wrappers. The advantage offered is that the framework is easily extendible, so...

    Provided By World Academic Union

  • White Papers // Jul 2013

    Preliminary Overview of Data Mining Technology for Knowledge Management System in Institutions of Higher Learning

    Data mining has been integrated into application systems to enhance the quality of the decision-making process. This paper aims to focus on the integration of data mining technology and Knowledge Management System (KMS), due to the ability of data mining technology to create useful knowledge from large volumes of data....

    Provided By World Academic Union

  • White Papers // Jun 2013

    An FPGA Implementation of Intelligent Visual Based Fall Detection

    Falling has been one of the major concerns and threats to the independence of the elderly in their daily lives. With the worldwide significant growth of the aging population, it is essential to have a promising solution of fall detection which is able to operate at high accuracy in real-time...

    Provided By World Academic Union

  • White Papers // Jun 2013

    Game-Tree Simplification by Pattern Matching and Its Acceleration Approach using an FPGA

    In this paper, the authors propose a Connect6 solver which adopts a hybrid approach based on a tree-search algorithm and image processing techniques. The solver must deal with the complicated computation and provide high performance in order to make real-time decisions. The proposed approach enables the solver to be implemented...

    Provided By World Academic Union

  • White Papers // Mar 2014

    An Adaptive Virtual Desktop Service in Cloud Computing Platform

    Cloud computing is becoming more and more matured over the last few years and consequently the demands for better cloud services is increasing rapidly. One of the research topics to improve cloud services is the desktop computing in virtualized environment. This paper aims at the development of an adaptive virtual...

    Provided By World Academic Union

  • White Papers // Feb 2014

    An Experiment of Three-Dimensional Point Clouds Using GoPro

    Construction of geo-spatial information recently tends to develop as multi-dimensional geo-spatial information. People constructing spatial information is also expanding its area to the general public from some experts. As well as, studies are in progress using a variety of devices, with the aim of near real-time update. In this paper,...

    Provided By World Academic Union

  • White Papers // Mar 2014

    Design and Implementation of Quantum Cellular Automata Based Novel Adder Circuits

    The most important mathematical operation for any computing system is addition. An efficient adder can be of greater assistance in designing of any arithmetic circuits. Quantum-dot Cellular Automata (QCA) is a promising nanotechnology to create electronic circuits for computing devices and suitable candidate for next generation of computing systems. The...

    Provided By World Academic Union

  • White Papers // Jan 2014

    Time Series Regression with Meta-Clusters

    In this paper the authors present a preliminary attempt to apply classification of time series using meta-clusters in order to improve the quality of regression models. In this case, clustering was performed as a method to obtain subgroups of time series data with normal distribution from the inflow into wastewater...

    Provided By World Academic Union

  • White Papers // Jan 2014

    A Review: Comparative Analysis of Different Categorical Data Clustering Ensemble Methods

    Over the past epoch a rampant amount of work has been done in the data clustering research under the unsupervised learning technique in data mining. Furthermore several algorithms and methods have been proposed focusing on clustering different data types, representation of cluster models, and accuracy rates of the clusters. However...

    Provided By World Academic Union

  • White Papers // Jan 2014

    Analysis of Diverse Clustering Tools in Data Mining

    Clustering in data mining is an unsupervised learning technique of aggregating the data objects into meaningful groups such that the intra cluster similarity of objects are maximized and inter cluster similarity of objects are minimized. Over the past decades several clustering tools were emerged in which clustering algorithms are inbuilt...

    Provided By World Academic Union

  • White Papers // Dec 2013

    An Exploration on Competency-Based Curricula in Integrated Circuit Design

    In this paper the relationships between professional competences and school curriculain IC design industry are explored. The semi-structured questionnaire survey and focus group interview is the research method. Study participants are graduates of microelectronics engineering professional departments who are currently employed in the IC industry. The IC industries are defined...

    Provided By World Academic Union

  • White Papers // Dec 2013

    A Local Invariant Generalized Hough Transform Method for Integrated Circuit Visual Positioning

    In this paper, a Local Invariant Generalized Hough-Transform (LI-GHT) method is proposed for Integrated Circuit (IC) visual positioning. The original Generalized Hough Transform (GHT) is robust to external noise; however, it is not suitable for visual positioning of IC chips due to the Four-Dimensionality (4D) of parameter space which leads...

    Provided By World Academic Union

  • White Papers // Jan 2014

    A Multi Cordic Architecture on FPGA Platform

    Co-Ordinate Rotation DIgital Computer (CORDIC) is a unique digital computing unit intended for the computation of mathematical operations and functions. This paper presents a multi CORDIC processor that integrates different CORDIC architectures on a single FPGA chip and allows the user to select the CORDIC architecture to proceed with based...

    Provided By World Academic Union

  • White Papers // Nov 2013

    Knowledge Discovery from Production Databases for Hierarchical Process Control

    In this paper the authors give the results of the project that was oriented on the usage of knowledge discoveries from production systems for needs of the hierarchical process control. One of the main project goals was the proposal of knowledge discovery model for process control. Specifics data mining methods...

    Provided By World Academic Union

  • White Papers // Nov 2013

    Architecture of Large-Scale Systems

    Today there are not only software systems running on a single client, but there are also systems running on servers on which multiple clients can access. For the latter there are different requirements, including scalability. In this paper various techniques in relation to large-scale systems are presented. At first, explanation...

    Provided By World Academic Union

  • White Papers // Nov 2013

    The Implementation of the Multi-Agent Classification System (MACS) in Compliance with FIPA Specifications

    In this the paper discusses the implementation of the Multi-Agent Classification System (MACS) and utilizing it to provide an automated and accurate classification of end users developing applications in the spreadsheet domain. However, different technologies have been brought together to build MACS. The strength of the system is the integration...

    Provided By World Academic Union

  • White Papers // Jan 2014

    The Automated Selective Acquisition System

    To support design process for launching the product on time, Reverse Engineering (RE) process has been introduced for quickly generating 3D CAD model from its physical object. The accuracy of the 3D CAD model depends upon the data acquisition technique selected, contact or non-contact methods. In order to reduce times...

    Provided By World Academic Union

  • White Papers // Oct 2013

    Determination and Comparison of Fabric Pills Distribution Using Image Processing and Spatial Data Analysis Tools

    In this paper the authors deal with the determination and comparison of pill patterns in 2 sets of fabric samples which differ in way of pill creation. The first set contains fabric samples with the pills created by simulation on a Martindale abrasion machine, while pills in the second set...

    Provided By World Academic Union

  • White Papers // Oct 2013

    An Educational Data Mining System for Advising Higher Education Students

    Educational data mining is a specific data mining field applied to data originating from educational environments, it relies on different approaches to discover hidden knowledge from the available data. Among these approaches are machine learning techniques which are used to build a system that acquires learning from previous data. Machine...

    Provided By World Academic Union

  • White Papers // Oct 2013

    Augmented Reality on Android

    Augmented Reality (AR) combines real and virtual images for presentation. Augmented reality is interactive in real time and registered in 3D. Augmented reality is an application which combines a live view of real-world environment and computer-generated images. This paper studies and demonstrates an efficient augmented reality development in the mobile...

    Provided By World Academic Union

  • White Papers // Oct 2013

    Recommender Systems Using Ensemble Techniques

    In this paper the authors propose a novel recommender system that uses data mining and multi-model ensemble techniques to enhance the recommendation performance through reflecting the precise user's preference. The proposed model consists of two steps. In the first step, this paper uses logistic regression, decision trees, and artificial neural...

    Provided By World Academic Union

  • White Papers // Oct 2013

    Design and Characterization of CMOS Readout Circuit for ISFET and ISE Based Sensors

    In this paper the authors present the design and characterization of analog readout interface circuits for Ion Sensitive Field Effect Transistor (ISFET) and Ion Selective Electrode (ISE) based sensor. These interface circuits are implemented using MIMOS's 0.35um CMOS technology and experimentally characterized under 24-leads QFN package. The characterization evaluates the...

    Provided By World Academic Union

  • White Papers // Sep 2013

    Optimising Data Transmission in Heterogeneous Sensor Networks

    The transfer rate of messages in distributed sensor network applications is a critical factor in a system's performance. The Sensor Abstraction Layer (SAL) is one such system. SAL is a middleware integration platform for abstracting sensor specific technology in order to integrate heterogeneous types of sensors in a network. SAL...

    Provided By World Academic Union

  • White Papers // Nov 2013

    Using Cloud Computing for E-Government: Challenges and Benefits

    Cloud computing is a style of computing which is formed from the aggregation and development of technologies such as grid computing distributed computing, parallel computing and service-oriented architecture. And its aim is to provide computing, communication and storage resources in a safe environment based on service, as fast as possible,...

    Provided By World Academic Union