Browsing Scientific Publications in Information and Communication Technology by Document Types "Chapter"
Now showing items 1-20 of 209
-
A Cluster Analysis of Stock Market Data Using Hierarchical SOMs
(Chapter; Peer reviewed, 2016)The analysis of stock markets has become relevant mainly because of its financial implications. In this paper, we propose a novel methodology for performing a structured cluster analysis of stock market data. Our proposed ... -
A general framework for group authentication and key exchange protocols
(Lecture Notes in Computer Science;8352, Chapter; Peer reviewed, 2014)In this paper, we propose a novel framework for group authentication and key exchange protocols. There are three main advantages of our framework. First, it is a general one, where different cryptographic primitives can ... -
A hierarchical learning scheme for solving the Stochastic Point Location problem
(Lecture Notes in Computer Science;7345, Chapter; Peer reviewed, 2012)This paper deals with the Stochastic-Point Location (SPL) problem. It presents a solution which is novel in both philosophy and strategy to all the reported related learning algorithms. The SPL problem concerns the task ... -
A new frontier in novelty detection : Pattern recognition of stochastically episodic events
(Lecture Notes in Computer Science; no. 6591, Chapter; Peer reviewed, 2011)A particularly challenging class of PR problems in which the, generally required, representative set of data drawn from the second class is unavailable, has recently received much consideration under the guise of One-Class ... -
A new paradigm for pattern classification: Nearest Border Techniques
(Lecture Notes in Computer Science;8272, Chapter; Peer reviewed, 2013)There are many paradigms for pattern classification. As opposed to these, this paper introduces a paradigm that has not been reported in the literature earlier, which we shall refer to as the Nearest Border (NB) paradigm. ... -
A novel Border Identification algorithm based on an “Anti-Bayesian” paradigm
(Lecture Notes in Computer Science;8047, Chapter; Peer reviewed, 2013)Border Identification (BI) algorithms, a subset of Prototype Reduction Schemes (PRS) aim to reduce the number of training vectors so that the reduced set (the border set) contains only those patterns which lie near the ... -
A Novel Clustering Algorithm based on a Non-parametric "Anti-Bayesian" Paradigm
(Chapter; Peer reviewed, 2015) -
A Novel Fault-Tolerant Routing Technique for Mesh-of-Tree based Network-on-Chip Design
(Chapter; Peer reviewed, 2018) -
A spatio-temporal probabilistic model of hazard and crowd dynamics in disasters for evacuation planning
(Lecture Notes in Computer Science;7906, Chapter; Peer reviewed, 2013)Managing the uncertainties that arise in disasters – such as ship fire – can be extremely challenging. Previous work has typically focused either on modeling crowd behavior or hazard dynamics, targeting fully known ... -
A Stochastic Search on the Line-Based Solution to Discretized Estimation
(Lecture Notes in Computer Science;7345, Chapter; Peer reviewed, 2012)Recently, Oommen and Rueda [11] presented a strategy by which the parameters of a binomial/multinomial distribution can be estimated when the underlying distribution is nonstationary. The method has been referred to as the ... -
A Study on the Sub-Regionalization of Humanitarian Supply Chain: the IFRC Case
(Chapter; Peer reviewed, 2016)Humanitarian Supply Chain (HSC) performance is a key factor for disaster response. In order to be more responsive, the typical humanitarian supply strategy has evolved from a centralized to a decentralized network, generally ... -
A system-level power saving approach for cellular networks with microcells/picocells
(Chapter; Peer reviewed, 2011)Network power consumption reduction has recently become an active research topic. In this paper, we propose a novel approach to save power consumption of a three-cell microcellular network. When the traffic load in the ... -
A two-armed bandit based scheme for accelerated decentralized learning
(Lecture Notes in Computer Science;6704, Chapter; Peer reviewed, 2011)The two-armed bandit problem is a classical optimization problem where a decision maker sequentially pulls one of two arms attached to a gambling machine, with each pull resulting in a random reward. The reward distributions ... -
A two-armed bandit collective for examplar based mining of frequent itemsets with applications to intrusion detection
(Lecture Notes in Computer Science;6922, Chapter; Peer reviewed, 2011)Over the last decades, frequent itemset mining has become a major area of research, with applications including indexing and similarity search, as well as mining of data streams, web, and software bugs. Although several ... -
A two-armed bandit collective for hierarchical examplar based mining of frequent itemsets with applications to intrusion detection
(Lecture Notes in Computer Science;8615, Chapter; Peer reviewed, 2014)In this paper we address the above problem by posing frequent item-set mining as a collection of interrelated two-armed bandit problems. We seek to find itemsets that frequently appear as subsets in a stream of itemsets, ... -
Accessibility of eGovernment Web Sites: Towards a Collaborative Retrofitting Approach
(Lecture Notes in Computer Science;6179, Chapter; Peer reviewed, 2010)Accessibility benchmarking is efficient to raise awareness and initiate competition. However, traditional benchmarking is of little avail when it comes to removing barriers from eGovernment web sites in practice. Regulations ... -
Achieving Intelligent Traffic-aware Consolidation of Virtual Machines in a Data Center Using Learning Automata
(Chapter; Peer reviewed, 2016) -
Achieving Ultra Energy-efficient and Collision-free Data Collection in Wake-up Radio Enabled mIoT
(Chapter, 2020)To achieve ultra-low energy consumption and decade-long battery lifetime for Internet of things (IoT) networks, wake-up radio (WuR) appears as an eminent solution. While keeping devices in deep sleep for most of the time, ... -
An integrated wireless communication architecture for maritime sector
(Lecture Notes in Computer Science;6886, Chapter; Peer reviewed, 2011)The rapid evolution of terrestrial wireless systems has brought mobile users more and more desired communication services. Maritime customers are asking for the same, such as the concepts of “Broadband at Sea” and “Maritime ... -
An intelligent architecture for service provisioning in pervasive environments
(Chapter; Peer reviewed, 2011)The vision of pervasive environments is being realized more than ever with the proliferation of services and computing resources located in our surrounding environments. Identifying those services that deserve the attention ...