Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Most human detection algorithms in depth images perform well in detecting and tracking the movements of a single human object. However, their performance is rather poor when the person is occluded by other objects or when there are multiple humans present in the scene. In this paper, we propose a novel human detection technique which analyzes the edges in depth image to detect multiple people. The...
Vojta-therapy is a useful technique for the treatment of physical and mental impairments in humans, and is very effective for children of less than 6 months. During the therapy, a specific stimulation is given to the patient's body to perform certain reflexive pattern movements. The repetition of this stimulation ultimately makes the previously blocked connections between the spinal cord and brain...
Vojta-therapy is a useful technique to treat the disorders in the central nervous and musculoskeletal system. During the therapy, a specific stimulation is given to the patients in order to cause the patient's body to perform certain reflexive pattern movements. The repetition of this stimulation ultimately brings forth the previously blocked connections between the spinal cord and brain, and after...
Power crisis is one of the major problems in Bangladesh which is increasing day by day. Within this situation it is very difficult to provide grid power to any new Base Transceiver Station (BTS) and the possibility of development in power sector is not remarkable in the present years. In that case renewable sources could be the best possible solution for new BTS. As the power of the renewable sources...
Conventional techniques for clinical decision support systems are based on a single classifier or simple combination of these classifiers used for disease diagnosis and prediction. Recently much attention has been paid on improving the performance of disease prediction by using ensemble-based methods. In this paper, we use multiple ensemble classification techniques for diabetes datasets. Three types...
In the past few years, micro-blogging platforms, such as twitter, are becoming most popular online social networks. Different opinions and news can be shared about various aspects and occasions using these micro-blogging platforms. Twitter is therefore considered as a rich source of data and it can be used for different text analysis and decision making tasks. The main focus of sentiment analysis...
Recent estimates suggest that p2p traffic comprises a significant fraction of today's Internet traffic. Previous work has shown that p2p traffic can have a considerable adverse impact on the accuracy (detection and false alarm rates) of Anomaly Detection Systems (ADSs). In this paper, we propose a solution to mitigate this accuracy degradation by identifying novel traffic features which can accurately...
One of the most critical failure modes in a BGA package is the solder interconnect failure (2nd level). Conventionally, the solder damage is due to the mismatch of coefficient of thermal expansion (CTE) between the various package components and the PCB. It is absolutely critical to identify and minimize the BGA damage under thermal cycling to improve the package reliability. In the past, the critical...
The deployment and operation of global network architectures can exhibit complex, dynamic behavior and the comprehensive validation of their properties, without actually building and running the systems, can only be achieved with the help of simulations. Packet-level models are not feasible in the Internet scale, but we are still interested in the phenomena that emerge when the systems are run in...
Graphic processing Units (GPUs) are gaining ground in high-performance computing. CUDA (an extension to C) is most widely used parallel programming framework for general purpose GPU computations. However, the task of writing optimized CUDA program is complex even for experts. We present a method for restructuring loops into an optimized CUDA kernels based on a 3-step algorithm which are loop tiling,...
In this paper, we empirically quantify inherent limitations of merchant switching silicon, which constrain SDNs'innovation potential. To overcome these limitations, we propose a Split SDN Data Plane (SSDP) architecture -- anew switch architecture which allows rapid network innovation by complementing a cost-effective, yet inflexible, front end merchant silicon switch chip with a deeply programmable...
Emergence of peer-to-peer (P2P) networks has provided a new dimension to overlay networks. People can help each other by sharing the contents of which other people may not have strength to purchase. Besides these generous peers, there are some other peers who always try to harm the network by providing harmful data or just block the activities with invalid responses and dropping lookup queries to...
The evolution of cloud computing is driving the next generation of internet services. OpenStack is one of the largest open-source cloud computing middleware development communities. Currently, OpenStack supports platform specific signatures and tokens for user authentication. In this paper, we aim to introduce a cloud platform independent, flexible, and decentralized authentication mechanism, using...
Grid computing has been around for quite a while. It facilitates utilization of distributed resources and has been extremely popular in its implementation. Grids have evolved enough to secure their operational architecture. On the other hand, cloud computing offers more recent alternative in distributed virtualization of resources, providing an on-demand architecture with a simple model for service...
In this paper, we propose a Progressive Differential Thresholding (PDT) framework for coordinated network anomaly detection. Under the proposed framework, nodes present on a packet's path progressively encode their opinion (malicious or benign) inside a packet. Subsequent nodes on the path use the encoded opinion as side-information to adapt their anomaly detection thresholds and in turn improve their...
Image inpainting is a technique used to automatically recover the damaged or missing regions in digital images or used to remove the unwanted objects from images. This paper presents a novel approach for recovering the damaged regions of digital images based on pyramids. The idea is to generate the pyramids of the image to the level where all the damaged pixels are fully eliminated. Then the damaged...
SNOW family is static in nature and it is based on static feedback. It is used to encrypt data from user input form to a binary form for secure communication. All the existing versions of snow family are affected by guess and determine attacks. Modified version of SNOW 2.0 shows more resistance against guess and determine attacks, but there are still some limitations. This paper has proposed a new...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.