Learn More
The dynamic nature of grid resources and the demands of users produce complexity in the grid scheduling problem that cannot be addressed by deterministic algorithms with polynomial complexity. One of the best methods for grid scheduling is the genetic algorithm (GA); the simple and parallel features of this algorithm make it applicable to several(More)
Feature weighting is a technique used to approximate the optimal degree of influence of individual features. This paper presents a feature weighting method for Document Image Retrieval System (DIRS) based on keyword spotting. In this method, we weight the features using Weighted Principal Component Analysis (PCA). The purpose of PCA is to reduce the(More)
Feature weighting is a technique used to approximate the optimal degree of influence of individual features. This paper presents a feature weighting method for Document Image Retrieval System (DIRS) based on keyword spotting. In this method, we weight the feature using coefficient of multiple correlations. Coefficient of multiple correlations can be used to(More)
Research has been devoted in the past few years to relevance feedback as an effective solution to improve performance of information retrieval systems. Relevance feedback refers to an interactive process that helps to improve the retrieval performance. In this paper we propose the use of relevance feedback to improve document image retrieval System (DIRS)(More)
Reo is a Coordination Language which is Channel Based that is used in order to connect components and is able to send certain Data through connectors. Most simple Connectors in Reo are Channels. Reo proffers a pattern for composition of Components that can be used as a language for coordinating parallel applications. Reo has been stated crisp for(More)
1 MA graduate in IT, management of information systems, Pouyandegane-danesh non-profit non-governmental higher education institute, Chalus, IRAN. Abstract: Nowadays, different methods are applied for the detection of abnormal attacks on computer networks. In the present study, attempts have been made to minimize errors in intrusion detection and to find its(More)
  • 1