The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Car park video surveillance systems present a huge volume of data that can be beneficial for video analytics and data analysis. We present a vehicle state tracking method for long term video surveillance with the goal of obtaining trajectories and vehicle states of various car park users. However, this is a challenging task in outdoor scenarios due to non-optimal camera viewing angle compounded by...
In the era of personalization, being able to determine the risk of individual drivers and hence provide suitable insurance coverage to them would be a logical step. This paper proposes risk scoring for motor insurance using logged data of the drivers that are collected electronically. The proposed method uses machine learning to create a model that can be applied using the logged data. Initial studies...
Twitter mining serves many purposes; information mined from Twitter is used to perform various analyses, of which user trust modelling is among the major studies involved in this area. However, the volume and variety of extracted data from Twitter presents challenges to research works to interpret and acquire meaningful information that can be used to model Twitter user's trust. This paper models...
Having prior road condition knowledge for planned or unplanned journeys will be beneficial in terms of not only time but potentially cost. Being able to obtain real-time information will further enhance these benefits. Current systems rely on huge infrastructure investments by governments to install cameras, road sensors and billboards to keep motorists informed. These efforts can only be, at best,...
With the abundance of mobile wireless devices ranging from notebooks to smart phones, it has become convenient for One-Time Passwords (OTP) mechanism to be used for authentication. OTP are generated for single use purposes only and are generally generated on demand and have a limited usable shelf life. Upon usage, the password will be invalidated on both the client and the server side of the authentication...
There are many data and computation intensive applications that generally require very high performance and a lot of computing resources which lead to the increase in the overall execution time. Parallel computing can improve overall execution time which involves breaking up large program into smaller pieces that can be executing in multi processors system. While, distributed computing offers some...
Multiplayer Online Games (MOG) in-game advertisements require dynamic delivery of large images for potentially hundreds of concurrent users. We present an approach for a scalable advertisement image delivery mechanism using the BitTorrent Peer-to-Peer (P2P) protocol. Simulations were conducted comparing a client-server model and our proposed model, where each MOG player acts as a P2P node in the overall...
Minimizing the turnaround time for job orders on the manufacturing shop floor can raise the utilization and efficiencies of the resources in an organization. In some cases, it can reduce capital expenditure for more machines whilst handling the same amount of work load. The key is to schedule the individual processes in the job order to reduce slack time whilst adhering to the process ordering constraints...
The usage of the Internet has become ubiquitous, even for desktop applications to assume that the computer system it is running on is connected to the Internet. Desktop applications rely on the Internet connectivity for software license authentication and also for maintenance through downloading of software patches. However, the latter can pose an annoyance to the user when he or she is relying on...
With the wide availability of chip multi-processing (CMP), software developers are now facing the task of effectively parallelizing their software code. Once they have identified the areas of parallelization, they will need to know the level of code granularity needed to ensure profitable execution. Furthermore, this problem multiplies itself with different hardware available. In this paper, we present...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.