Nothing Special   »   [go: up one dir, main page]

skip to main content
Volume 177, Issue 8April, 2007
Reflects downloads up to 02 Oct 2024Bibliometrics
Skip Table Of Content Section
article
Personalizing learning programs with X-Learn, an XML-based, "user-device" adaptive multi-agent system

In this paper we present X-Learn, an XML-based, multi-agent system for supporting ''user-device'' adaptive e-learning, i.e. e-learning activities which take into account the profile, past behaviour, preferences and needs of users, as well as the ...

article
A (4n-9)/3 diagnosis algorithm on n-dimensional cube network

As a generalization of the precise and pessimistic diagnosis strategies of system-level diagnosis of multicomputers, the t/k diagnosis strategy can significantly improve the self-diagnosing capability of a system at the expense of no more than k fault-...

article
On reliability of the folded hypercubes

In this paper, we explore the 2-extra connectivity and 2-extra-edge-connectivity of the folded hypercube FQ"n. We show that @k"2(FQ"n)=3n-2 for n>=8; and @l"2(FQ"n)=3n-1 for n>=5. That is, for n>=8 (resp. n>=5), at least 3n-2 vertices (resp. 3n-1 edges) ...

article
Exploring confusion in product ciphers through regression analysis

This paper investigates the modelling of confusion in product encryption by statistical means, to support understanding of the avalanche effect of the continuous application of an encryption step or round. To facilitate the modelling, a metric for ...

article
Reversible steganographic method using SMVQ approach based on declustering

Reversible steganography allows an original image to be completely restored after the extraction of hidden data embedded in a cover image. In this paper, we propose a reversible scheme for VQ-compressed images that is based on a declustering strategy ...

article
Lessons learned from the simulation experience of a three-tier multi-hop wireless Internet architecture

The mobile Internet provides mobile nodes with continuous access to the Internet resources. This type of service is guaranteed only if these mobile nodes are one-hop away from the edge of the Internet. Mobile ad hoc networks (MANET), however, enable ...

article
Optimal resilient threshold GQ signatures

GQ signature scheme is widely used in many cryptographic protocols, such as forward-secure signature scheme, identity-based signature scheme, etc. However, there is no threshold version of this important signature scheme in the open literature. We ...

article
On topological properties of the Choquet weak convergence of capacity functionals of random sets

In view of the recent interests in random sets in information technology, such as models for imprecise data in intelligent systems, morphological analysis in image processing, we present, in this paper, some contributions to the foundation of random set ...

article
On the position of intuitionistic fuzzy set theory in the framework of theories modelling imprecision

Intuitionistic fuzzy sets [K.T. Atanassov, Intuitionistic fuzzy sets, VII ITKR's Session, Sofia (deposed in Central Science-Technical Library of Bulgarian Academy of Science, 1697/84), 1983 (in Bulgarian)] are an extension of fuzzy set theory in which ...

article
A preemptive goal programming method for aggregating OWA operator weights in group decision making

This paper reveals that OWA operator weights cannot be aggregated by the weighted arithmetic or geometric average method in group decision making. A preemptive goal programming method (PGPM) is proposed for aggregating OWA operator weights, which is an ...

article
Shape-based image retrieval using support vector machines, Fourier descriptors and self-organizing maps

Image retrieval based on image content has become an important topic in the fields of image processing and computer vision. In this paper, we present a new method of shape-based image retrieval using support vector machines (SVM), Fourier descriptors ...

article
Optimal two-degree-of-freedom fuzzy control for locomotion control of a hydraulically actuated hexapod robot

Locomotion control of legged robots is a very challenging task because very accurate foot trajectory tracking control is necessary for stable walking. An electro-hydraulically actuated walking robot has sufficient power to walk on rough terrain and ...

article
Prediction-based diagnosis and loss prevention using qualitative multi-scale models

A prototype prediction based intelligent diagnostic system that is capable of integrating qualitative and quantitative process models and operational experience in the form of HAZOP result tables is proposed in this paper. The diagnostic system utilizes ...

Comments

Please enable JavaScript to view thecomments powered by Disqus.