scispace - formally typeset
Search or ask a question
BookDOI

Advances in Computing Applications

TL;DR: This paper proposes an approach to overcome these befalling sundry wait events in the internal database engine through Query and PL/SQL rewrite methodologies, and additional overhauling approaches to increase the data hit ratio.
Abstract: The magnitude of data in the concurrent databases is exponentially escalating with respect to time. This advent conveys a challenge to the database administrators and SQL developers in the arena of performance, due to incessant data accumulation and manipulation. As such, this paper proposes an approach to overcome these befalling sundry wait events in the internal database engine through Query and PL/SQL rewrite methodologies, and additional overhauling approaches to increase the data hit ratio. Our experimental progression and approaches evinced that CPU impact, wait events and other performance bottlenecks are minimized. This paper could serve as tuning tool to boost query as well as database performance by wait event tuning and can also oblige as a utility for database administrators, SQL programmers, database managers and database operators.
Citations
More filters
Journal ArticleDOI
TL;DR: Important aspects of TEs are discussed, such as their structure, importance in the evolution and architecture of the host, and their current classifications and nomenclatures, and current methods and their limitations are addressed.
Abstract: Transposable elements (TEs) are genomic units able to move within the genome of virtually all organisms. Due to their natural repetitive numbers and their high structural diversity, the identification and classification of TEs remain a challenge in sequenced genomes. Although TEs were initially regarded as “junk DNA”, it has been demonstrated that they play key roles in chromosome structures, gene expression, and regulation, as well as adaptation and evolution. A highly reliable annotation of these elements is, therefore, crucial to better understand genome functions and their evolution. To date, much bioinformatics software has been developed to address TE detection and classification processes, but many problematic aspects remain, such as the reliability, precision, and speed of the analyses. Machine learning and deep learning are algorithms that can make automatic predictions and decisions in a wide variety of scientific applications. They have been tested in bioinformatics and, more specifically for TEs, classification with encouraging results. In this review, we will discuss important aspects of TEs, such as their structure, importance in the evolution and architecture of the host, and their current classifications and nomenclatures. We will also address current methods and their limitations in identifying and classifying TEs.

50 citations

References
More filters
Journal ArticleDOI
TL;DR: A brief overview of the field of biometrics is given and some of its advantages, disadvantages, strengths, limitations, and related privacy concerns are summarized.
Abstract: A wide variety of systems requires reliable personal recognition schemes to either confirm or determine the identity of an individual requesting their services. The purpose of such schemes is to ensure that the rendered services are accessed only by a legitimate user and no one else. Examples of such applications include secure access to buildings, computer systems, laptops, cellular phones, and ATMs. In the absence of robust personal recognition schemes, these systems are vulnerable to the wiles of an impostor. Biometric recognition, or, simply, biometrics, refers to the automatic recognition of individuals based on their physiological and/or behavioral characteristics. By using biometrics, it is possible to confirm or establish an individual's identity based on "who she is", rather than by "what she possesses" (e.g., an ID card) or "what she remembers" (e.g., a password). We give a brief overview of the field of biometrics and summarize some of its advantages, disadvantages, strengths, limitations, and related privacy concerns.

4,678 citations


"Advances in Computing Applications" refers background or methods in this paper

  • ...High-Performance SQL [1] explained RBO and CBO level tuning models....

    [...]

  • ...In dynamic scenes, shadow detection can be used for change detection, scene matching, understanding relative object position and size [1, 17]....

    [...]

  • ...Stream ciphers and re-keying approaches [1] capitalize on these algorithms...

    [...]

  • ...The ACM Computing Classification System 2012 is used as knowledgebase for the experiments [1]....

    [...]

  • ...,4,2,0,1] [1] [0,1,2,1,1,0,0,0,1,0,0,4,0,0,1,0,....

    [...]

Journal ArticleDOI
TL;DR: This paper addresses the problem of information fusion in biometric verification systems by combining information at the matching score level by combining three biometric modalities (face, fingerprint and hand geometry).

1,611 citations


"Advances in Computing Applications" refers background or methods in this paper

  • ...from cyberbullying and their communication from explicit messages [13]....

    [...]

  • ...companies like SunPartner Technologies, French Technology company Oledcomm are succeeded to develop sensors that both downloads data and charges battery itself using those light rays [13]....

    [...]

  • ...(3) Further shadows usually degrade the visual quality of the image leading to serious problems in segmentation and object extraction [13, 22]....

    [...]

  • ...marked them for the secure sifting of chat and instant messages [10, 13] which does...

    [...]

  • ...Depending on the properties such as position, intensity and edges which the shadow exhibits, the shadows are classified as cast, self or attached [13, 14]....

    [...]

Journal ArticleDOI
TL;DR: This survey aims at providing multimedia researchers with a state-of-the-art overview of fusion strategies, which are used for combining multiple modalities in order to accomplish various multimedia analysis tasks.
Abstract: This survey aims at providing multimedia researchers with a state-of-the-art overview of fusion strategies, which are used for combining multiple modalities in order to accomplish various multimedia analysis tasks. The existing literature on multimodal fusion research is presented through several classifications based on the fusion methodology and the level of fusion (feature, decision, and hybrid). The fusion methods are described from the perspective of the basic concept, advantages, weaknesses, and their usage in various analysis tasks as reported in the literature. Moreover, several distinctive issues that influence a multimodal fusion process such as, the use of correlation and independence, confidence level, contextual information, synchronization between different modalities, and the optimal modality selection are also highlighted. Finally, we present the open issues for further research in the area of multimodal fusion.

1,019 citations


"Advances in Computing Applications" refers background or methods in this paper

  • ...Shadow detection in static images uses the application domain of 3D analysis of object for the purpose of extraction, light source detection, object shape, illumination and occluders’ geometry [2, 10, 17]....

    [...]

  • ...In dynamic scenes, shadow detection can be used for change detection, scene matching, understanding relative object position and size [1, 17]....

    [...]

  • ...As attocell in indoor navigation has small size so bandwidth reuse is possible which results in high spatial spectral efficiency provided to the users [17]....

    [...]

  • ...From this stable set, connectivity values were selected to give multiple intensities with this selected range [15, 17]....

    [...]

  • ...Self shadows do not create a problem because the objects’ outer boundaries are clearly detectable, which is the basic requirement of shadow detection [14, 17]....

    [...]

Journal ArticleDOI
TL;DR: A prototype biometrics system which integrates faces and fingerprints is developed which overcomes the limitations of face recognition systems as well as fingerprint verification systems and operates in the identification mode with an admissible response time.
Abstract: An automatic personal identification system based solely on fingerprints or faces is often not able to meet the system performance requirements. We have developed a prototype biometrics system which integrates faces and fingerprints. The system overcomes the limitations of face recognition systems as well as fingerprint verification systems. The integrated prototype system operates in the identification mode with an admissible response time. The identity established by the system is more reliable than the identity established by a face recognition system. In addition, the proposed decision fusion scheme enables performance improvement by integrating multiple cues with different confidence measures. Experimental results demonstrate that our system performs very well. It meets the response time as well as the accuracy requirements.

651 citations

Proceedings ArticleDOI
18 Jun 1996
TL;DR: A method for combining classifiers that use estimates of each individual classifier's local accuracy in small regions of feature space surrounding an unknown test sample that performs better on data from a real problem in mammogram image analysis than do other recently proposed CMC techniques.
Abstract: Combination of multiple classifiers (CMC) has recently drawn attention as a method of improving classification accuracy. This paper presents a method for combining classifiers that use estimates of each individual classifier's local accuracy in small regions of feature space surrounding an unknown test sample. Only the output of the most locally accurate classifier is considered. We address issues of (1) optimization of individual classifiers, and (2) the effect of varying the sensitivity of the individual classifiers on the CMC algorithm. Our algorithm performs better on data from a real problem in mammogram image analysis than do other recently proposed CMC techniques.

476 citations


"Advances in Computing Applications" refers background in this paper

  • ...(3) Further shadows usually degrade the visual quality of the image leading to serious problems in segmentation and object extraction [13, 22]....

    [...]

  • ...In Li-Fi, each head light and back light can be turned into Li-Fi transmitter developing an intelligent transport system where cars can talk to each other and also to the traffic signal lights and street lights providing the statistics and position of vehicles [22]....

    [...]

  • ..., trilateral filter [22], can be analyzed for performance....

    [...]

  • ...to semi-honest [22] or semi-honest-but-curious [5] parties which are only partially...

    [...]

  • ...The authors of [22] address the problem of scheduling periodic parallel tasks on a multiresource platform with task of real-time constraints....

    [...]