The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Extracting main object from photos is prerequisite for image processing and semantic image understanding in many areas especially in multimedia signal processing at internet. So far, either human interaction in single image or sequence image frames are required for the extraction and most of them still rely on hand-crafted features. In contrast, the proposed work cast the human boundary detection...
In model-driven development, requirements are captured as a specification model, from which a conforming implementation is automatically generated. Model consistency, with respect to requirements, is a primary concern. If the various structural and integrity constraints are inconsistent, then either the model will admit no implementation, or the implementation produced will not behave according to...
This paper aims to develop a decision rule-based model of household car ownership by using household travel survey data. The rough set approach as one of data mining techniques provides an effective tool to model the presented data set with decision rule sets. In this paper, the outputted “if-then” rules show the significant relationships between car ownership type and household characteristics. The...
We introduce a social network analysis method as a new approach to build an Intrusion Detection System (SN-IDS) in ad hoc networks. The SN-IDS utilizes social relations as metrics-of-interest for anomaly detections, which is different from most traditional IDS approaches. To construct proper social networks, we first investigate ad hoc MAC and network layer data attributes and select relevant social...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.