849 research outputs found

    Searching of images stored in a database using content and pixel based methods

    Get PDF
    In the paper we consider combined pixel and content based searching of images. We propose an application of Stone’s method of progressive wavelet correlation using Fourier methods for pixel-based searching of images stored in a database. The proposed interface between the Matlab work-space and the database is described. The Oracle Database and the IBM QBIC are used for investigation purposes

    Improving the Wholesales Trough Using the Data Mining Techniques

    Get PDF
    Abstract. This paper describes the practical use of data mining techniques in wholesales though concrete steps of developing the distribution network. We are choosing a number of techniques for solving the problem through analyzing the specifics of the market situation, defining the business problem, and setting up its model. The cluster analysis enables us to group the data according to similarities of the market segmentation, product categories, regions and groups by turnover, while with the decision trees we are separating the big data collection into consecutive groups. Using these techniques we gain knowledge and have the opportunity to predict the future trends with high probability and on this basis to make a more precise and trustworthy business decision

    Application of the Progressive Wavelet Correlation in Image Retrieving

    Get PDF
    In the paper we apply progressive wavelet correlation along with Fourier methods for searching and retrieving images stored in a database. The searching consists of three incremental steps, each of which quadruples the number of correlation points. The process can be halted at any stage if the intermediate results indicate that the correlation will not result in a match. We perform a series of image search experiments that cover the following scenarios: (A) the given image is present in the database; (B) copies of the given image are present but with different names; (C) similar (but not identical) images are present; and (D) the given image is not present. Experiments are performed with data bases up to 1000 images, using the Oracle database and the Matlab component Database Toolbox for operations with databases

    Efecto de la comunicación en las redes sociales y el riesgo percibido en el valor de marca de destino desde la perspectiva del consumidor

    Get PDF
    El valor de marca en el contexto digital y el riesgo percibido son las piezas clave de esta tesis doctoral en la que se investiga el efecto del contenido generado por el usuario (User generated content) y el contenido generado de la empresa (Firm generated content) en el valor de marca de destinos turísticos (CBDBE – Customer based destination brand equity) y el efecto moderador del riesgo percibido en las relaciones del valor de marca. De forma específica, la tesis plantea que la comunicación en las redes sociales influye en las dimensiones del valor de marca, y éstas sobre las respuestas hacia la marca. Asimismo, se propone el efecto moderador del riesgo percibido en la relación comunicación-valor de marca, y en la relación valor de marca-respuesta del consumidor.Brand equity in the digital context and the perceived risk are the key pieces of this doctoral thesis in which the effect of the user generated content and the brand generated content is investigated in context of tourist destinations and the moderating effect of perceived risk in brand equity relationships. Specifically, the thesis states that communication in social networks influences the dimensions of brand equity. Likewise, it is proposed the moderating effect of the perceived risk on the relationship between communication on social media and brand equity

    Performance of the Progressive Wavelet Correlation for Image Retrieval

    Get PDF
    In the paper we present our experience with using progressive wavelet correlation for image retrieval. We perform a series of image search experiments that cover the following scenarios: (A) the given image is present in the database; (B) copies of the given image are present but with different names; (C) similar (but not identical) images are present; and (D) the given image is not present. Experiments are performed with data bases up to 1000 images, using the Oracle database and the Matlab component Database Toolbox for operations with databases

    APPLICATION OF ALUMINUM AND ALUMINUM ALLOYS IN ENGINEERING

    Get PDF
    The paper deals with the considerations related to the basic properties and application of primarily aluminum alloys and composite materials for different purposes with the focus on the automotive industry. Through the description of the basic characteristics of aluminum alloys, the starting points for their application in different technical systems are given. On the other hand, the advantages and disadvantages of the use of certain aluminum alloys, along with the guidance and compounds and elements whose use is further enhanced and enriched by aluminum alloys, are predominantly presented. The application of aluminum alloys in the automotive industry, as well as the particular types of aluminum based materials used for individual aggregates and circuits of motor vehicles, as well as their behaviour in different operating modes are imposed as a key chapter of the work. Ultimately, the advantages that are primarily achieved with the vehicle are obtained by the use of aluminum alloys and composites, with the conclusion that there is still space in the field, further improvement of the characteristics of aluminum alloys, and in the field of expansion of the diapason of their application

    State-of-the-art Survey of Data Hiding in ECG Signal

    Get PDF
    With the development of new communication technologies, the number of biomedical data that is transmitted is constantly increasing. This is sensitive data and therefore it is very important to preserve privacy when transmitting it. For this purpose, techniques for data hiding in biomedical signals are used. This is a comprehensive survey of research papers that covers the latest techniques for data hiding in ECG signal and old techniques that are not covered by the latest surveys. We show an overview of the methodology, robustness, and imperceptibility of the techniques

    IN-CHANNEL MISROUTING SUPPRESSION TECHNIQUE FOR DEFLECTION-ROUTED NETWORKS ON CHIP

    Get PDF
    Deflection routing, where port-contentions in routers are resolved by intentionally misrouting some of packets along unwanted directions instead of storing them, has been proposed as a promising approach for improving power and area efficiency of large-scale networks on chip (NoCs). However, at high network load, when packets are misrouted more frequently, the cost and energy benefits of this simple routing scheme are offset by the performance degradation. To address this problem, we propose a technique that uses small in-channel buffers to capture some of deflected packets before they take a misrouting hop. The captured packets are then looped-back to the routers where they suffered deflection and routed again. To improve the efficiency of this in-channel misrouting suppression scheme we also slightly modify the routing function of the deflection router by restricting the choice of productive directions for misrouted packets. Evaluations on synthetic traffic patterns show that the proposed misrouting suppression mechanism yields an improvement of 36.2% in network saturation throughput when implemented into the conventional deflection-routed network
    corecore