The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Internet Protocol Security (IPSec) is a standard suite of protocols defined by Internet Engineering Task Force (IETF) to provide security which includes data authentication, integrity, and confidentiality. IPSec provides data security at the IP packet level. IPSec developed for IPv6 as well as for IPv4. IPSec protocol provides an elegant solution to the security problem of IP protocol, at IP layer...
We study the nature of missed collaboration opportunities in evolving collaboration networks. We define a k-way missed collaboration as one in which every (k-1)-subset of the k persons has collaborated but the set of k has not. Representing a collaboration network as a simplicial complex, we model a missed collaboration as a Minimal Non Face (MNF). Focusing on 2-dimensional and 3-dimensional MNFs,...
In this paper, we consider the problems and benefits of developing the infrastructure needed to handle the timing requirements of a real-time industrial control application and the processing of image streams. In particular, this paper explores various application scenarios which can benefit from a real-time control system integrated with images. An experimental test set-up is used to verify the NDDS's...
The National Library of Medicine (NLM) is developing a digital chest X-ray (CXR) screening system for deployment in resource constrained communities and developing countries worldwide with a focus on early detection of tuberculosis. A critical component in the computer-aided diagnosis of digital CXRs is the automatic detection of the lung regions. In this paper, we present a nonrigid registration-driven...
Most of the biometric research being done is for adults and the identification accuracy of newborn are least reported in the literatures. In this paper we propose a novel biometric identification method for newborn babies using their face and soft biometrics. Accurate patient identification (ID) is essential for patient safety, especially with our smallest and most vulnerable pediatric patients. The...
This paper presents our experimental work on designing an automated web-based course feedback system that uses opinion mining to compute the overall feedback score. The system collects user responses through an online form. The online feedback form consists of a set of binary and graded response questions as well as a free-form input text box where a student can write about his overall experiences...
With the innovations and development in sophisticated video editing technology, it is becoming increasingly significant to assure the trustworthiness of video information. Today digital videos are also increasingly transmitted over non secure channels such as Internet. Therefore in surveillance, medical and various other fields, video contents must be protected against attempt to manipulate them....
Abduction, swapping and mix ups are the unfortunate events that could happen to infants while in hospital premises and medical personnel are finding it difficult to curb this unfortunate incidents. Existing biometric and non biometric methods fail to provide enough level of security and research done to solve this problem is minimal. This paper introduces the concept of using ear recognition for identification...
In this paper we study the problem of predicting which genes are likely to have a role in tumor-suppression in lung and colorectal cancer. Mutation frequencies alone cannot serve to differentiate between 'drivers' (mutations that cause cancer) and 'passengers' (mutations that are caused by cancer) some other features must be added. Our hypothesis is that the developmental stage gene expression profile...
In this paper, we address the problem of reducing the occurrence of Human Errors that cause service interruptions in IT Service Support and Delivery operations. Analysis of a large volume of service interruption records revealed that more than 21% of interruptions were caused by human error. We focus on Change Management, the process with the largest risk of human error, and identify the main instances...
Newborn swapping and abduction is a global problem and traditional approaches such as ID bracelets and footprinting do not provide the required level of security. This paper introduces the concept of using face recognition for identifying newborns and presents an automatic face recognition algorithm. The proposed multiresolution algorithm extracts Speeded up robust features and local binary patterns...
Business houses are investing heavily on new generation databases so as to gain competitive edge. As with any development project, a data warehouse also needs testing. The complexity and size of data warehouse systems make comprehensive testing both "more difficult and more necessary". The fact, queries that perform satisfactorily on small datasets may fail miserably in the real life environment...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.