IJMECS Vol. 6, No. 4, Apr. 2014
Cover page and Table of Contents: PDF (size: 123KB)
In this paper, we suggest classifier ensembles that can incorporate Support Vector Machine (SVM) as feature selection method into classifier ensembles models. Consequences of choosing different number of features are monitored. Also, the goal of this research is to present and compare different algorithmic approaches for constructing and evaluating systems that learn from experience to make the decisions and predictions and minimize the expected number or proportion of mistakes. Experimental results demonstrate the effectiveness of selecting features with SVM in various types of classifier ensembles.[...] Read more.
The image compression has for objective to reduce the volume of data required by the encoding of image, for applications of transmission or saving. For this we use the redundancies which exists within an image (a pixel has a good chance of having a luminance close to those of its neighbors) or between successive images in a sequence. We limit ourselves to the exploitation of redundancies within an image and we will work on gray level images of size 512x512. For image coding we chose an encoder based on progressive coding of data, coder is EZW (EMBEDDED WAVELET ZeroTree ENCODING, Shapiro 1993), the basis of this encoder a comparison is made between two types of transforms DWT (DISCREET WAVELETS TRANSFORM) and DCT (DISCRETE COSINE TRANSFORM) just to have the type of transformation that allows us to have a better visual quality of the image after decomposition. . Visual quality image is judged by two important devaluation parameters PSNR and MSSIM.[...] Read more.
Image restoration deals with recovery of a sharp image from a blurred version. This approach can be defined as blind or non-blind based on the availability of blur parameters for deconvolution. In case of blind restoration of image, blur classification is extremely desirable before application of any blur parameters identification scheme. A novel approach for blur classification is presented in the paper. This work utilizes the appearance of blur patterns in frequency domain. These features are extracted in wavelet domain and a feed forward neural network is designed with these features. The simulation results illustrate the high efficiency of our algorithm.[...] Read more.
Now a day’s, it has been a great idea of research on using Wireless Sensor Networks (WSNs) to assist in the initial deployment of sensor nodes. Hole problem in WSNs is the most fundamental Problem in WSNs. Hole means a communication gap in WSNs. Finding an optimal sensor deployment strategy that would minimize the cost, reduce the node failure and also reduce the communication overhead. Then it provides a maximum degree of area coverage with lower cost of deployment of sensor nodes, best possible communication and maintaining the network connectivity. However, it increases the quality of service in WSNs that is extremely challenging. In this article, we present various types of holes, a comparative study of various types of holes and various types of coverage holes. At the end, we proposed an Algorithm to detect hole. In this paper, we aim to give the solution of hole problems of area coverage in WSNs.[...] Read more.
We know various scheduling algorithm like EDF, RMA that are popularly used for sharing a set of serially reusable resources. But for share non preemptable resources those algorithm cannot satisfactorily be used. The main intent of resource access protocol is to schedule, and synchronizes the tasks when many tasks use same resources, means where resource is shared. So here in this paper the traditional techniques of resource access protocol which are used to share critical resources among a set of real time tasks, is discussed. This paper is mainly focusing on the different types of resource access protocols and their comparisons.[...] Read more.
Knowledge is the primary strategic resource of many organizations. Knowledge management system (KMS) is a process of knowledge extraction, storage, transformation, analysis, distribution and deployment. Strategic alliance plays an increasing role to a global scale in technology business competition. Organizations are able to use alliances to respond to new technology and deliver new products more efficiently. The relationship between knowledge management and strategic alliance is identified. Knowledge transfer and selecting suitable partner are critical factors in the success of strategic alliance of an organization. In this paper, a novel framework is proposed for KMS strategic alliance. By applying this framework, strategic alliance will be highly achievable in corporate companies.[...] Read more.
In various dynamic parameters systems that need to be training on-line adaptive control methodology is used. In this paper fuzzy model-base adaptive methodology is used to tune the linear Proportional Integral Derivative (PID) controller. The main objectives in any systems are; stability, robust and reliability. However PID controller is used in many applications but it has many challenges to control of continuum robot. To solve these problems nonlinear adaptive methodology based on model base fuzzy logic is used. This research is used to reduce or eliminate the PID controller problems based on model reference fuzzy logic theory to control of flexible robot manipulator system and testing of the quality of process control in the simulation environment of MATLAB/SIMULINK Simulator.[...] Read more.
IT disaster recovery planning is no longer an option. Reliable IT services have become an integral part of most business processes. To ensure the continued provision of information technology, firms must engage in IT disaster recovery planning. Surprisingly, there is little research on this topic. IT disaster recovery planning has not been fully conceptualized in mainstream IT research. A previously framework for assessing the degree of IT disaster recovery planning. Practitioners can use this study to guide IT disaster recovery planning. Our Disaster Recovery Plan is designed to ensure the continuation of vital business processes in the event that a disaster occurs. This plan will provide an effective solution that can be used to recover all vital business processes within the required time frame using vital records that are stored off-site. This Plan is just one of several plans that will provide procedures to handle emergency situations. These plans can be utilized individually but are designed to support one another. The first phase is a Functional Teams and Responsibilities the Crisis Management Plan. This phase allows the ability to handle high-level coordination activities surrounding any crisis situation. We will also discuss the development, finally maintenance and testing of the Disaster Recovery Plan.[...] Read more.