Volume 4 Number 3 August 2013

    
Hybrid Hidden Markov Models and Genetic Algorithm for Robust Automatic Visual Speech Recognition

Amina Makhlouf, Lilia Lazli, Bachir Bensaker

https://doi.org/

Abstract In this paper, we investigate the performance of an Automatic visual speech recognition system (AVSR) using the Hidden Markov Model (HMM) which is optimized by a Genetic Algorithm (GA). The search through the space of HMM structures is combined with optimization of emission and transition probabilities using the Baum-Welch algorithm in the training process. Compared with a HMM-based system, we... Read More


An Extension of PROMETHEE with Evidential Evaluations

Hammadi Abdennadher, Mohamed Aymen Boujelben, Sarah Ben Amor

https://doi.org/

Abstract We consider ranking problems where the actions are evaluated on a set of ordinal criteria and where the evaluations are imperfect and represented by basic belief assignments (BBAs). In this paper, a model inspired by PROMETHEE is proposed within this context. The notions of ascending and descending belief functions are used in order to compare the alternatives on each criterion.... Read More


Novel Scheme for Labeling XML Trees based on Bits-masking and Logical Matching

Taher Ahmed Ghaleb, Salahadin Mohammed

https://doi.org/

Abstract The eXtensible Mark-up Language rapidly has become a very powerful standard for the data exchange. Labeling schemes have been introduced to optimize data retrieval and query processing on XML database documents. This is done by providing labels that hold information about XML tree nodes. In this paper we introduce a novel labeling scheme XDAS whose labeling technique is inspired by... Read More


Understanding the Overhead of Large Layer 2 Data Center Networking: Measurement and Analysis of TRILL as an Example

Chunyang Lu, Zhixiong Jiang, Jinping Yu, Gan Zhang, Mingfu Li, Wei Liang, Jingping Bi

https://doi.org/

Abstract Highly virtualized data center have placed many new and unique requirements on the networking fabric. Conventional network protocols limit the scale, latency, throughput of cloud networks. To solve these problems, the large layer 2 technology is proposed. The large layer 2 technology such as TRILL and SPB has obvious advantages in scalability, convergence and resource utilization compared with the traditional... Read More