Designing well-structured websites to facilitate effective user navigation has long been a challenge. A primary reason is that the web developers’ understanding of how a website should be structured can be considerably different from that of the users. While various methods have been proposed to relink webpages to improve navigability using user navigation data, the […]
Latency Equalization using greedy hub selection
In this paper, we design and implement network-based Latency EQualization (LEQ), which is a service that Internet service providers (ISPs) can provide for various interactive network applications. Our LEQ architecture provides a flexible routing framework that enables the network provider to implement different delay and delay difference optimization policies in order to meet the requirements […]
Improving the classification performance
This paper proposes a new attribute construction approach which converts the original data attributes into a higher dimensional feature space to extract more attribute information by a similarity-based algorithm using the classification-oriented fuzzy membership function. Seven data sets with different attribute sizes are employed to examine the performance of the proposed method. The results show […]
Identify the location of fault in Web Application using Enhanced Technique
The proposed system use existing fault localization technique likeTarantula, Ochiai, and Jaccard. These techniques predict the location of a fault by computing, for each statement, the percentages of passing and failing tests that execute that statement. The enhanced source mapping is a new technique to localize faults effectively in web applications written in PHP by […]
TAM: A Tiered Authentication of Multicast Protocol for Ad-Hoc Networks
Ad-hoc networks are becoming an effective tool for many mission critical applications such as troop coordination in a combat field, situational awareness, etc. These applications are characterized by the hostile environment that they serve in and by the multicast-style of communication traffic. Therefore, authenticating the source and ensuring the integrity of the message traffic become […]
A Novel Word Spotting Method Based on Recurrent Neural Networks
Keyword spotting refers to the process of retrieving all instances of a given keyword from a document. In the present paper, a novel keyword spotting method for handwritten documents is described. It is derived from a neural network-based system for unconstrained handwriting recognition. As such it performs template-free spotting, i.e., it is not necessary for […]
Design, Implementation, and Performance of a Load Balancer for SIP Server Clusters
This paper introduces several novel load-balancing algorithms for distributing Session Initiation Protocol (SIP) requests to a cluster of SIP servers. Our load balancer improves both throughput and response time versus a single node while exposing a single interface to external clients. We present the design, implementation, and evaluation of our system using a cluster of […]
Multiple Exposure Fusion for High Dynamic Range Image Acquisition
A multiple exposure fusion to enhance the dynamic range of an image is proposed. The construction of high dynamic range images (HDRIs) is performed by combining multiple images taken with different exposures and estimating the irradiance value for each pixel. This is a common process for HDRI acquisition. During this process, displacements of the images […]
A Distributed Access Control Architecture for Cloud Computing
The large-scale, dynamic, and heterogeneous nature of cloud computing poses numerous security challenges. But the cloud’s main challenge is to provide a robust authorization mechanism that incorporates multitenancy and virtualization aspects of resources. The authors present a distributed architecture that incorporates principles from security management and software engineering and propose key requirements and a design […]
Vehicle Detection in Aerial Surveillance Using Dynamic Bayesian Networks
We present an automatic vehicle detection system for aerial surveillance in this paper. In this system, we escape from the stereotype and existing frameworks of vehicle detection in aerial surveillance, which are either region based or sliding window based. We design a pixelwise classification method for vehicle detection. The novelty lies in the fact that, […]