The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Community Cyber infrastructure for Advanced Marine Microbial Ecology Research and Analysis (CAMERA) is an eScience project to enable the microbial ecology community in managing the challenges of metagenomics analysis. CAMERA supports extensive metadata based data acquisition and access, as well as execution of metagenomics experiments through standard and customized scientific workflows. Users can...
An algorithm for optimizing the principal component analysis in gesture recognition is proposed, which makes use of covariance between factors to reduce data dimensions. The objectivity and automatization of above manual observation is realized by algorithm. We present an approach for the detection and identification of human gestures and describe a working, near gesture recognition system and then...
Autism spectrum disorder is an inherently complex phenomenon requiring large studies of many different types to further understanding of its causes. The National Database for Autism Research (NDAR) is being constructed to aid in this effort by providing a means for researchers to share and integrate data. An autism ontology drafted by a group at Stanford is being incorporated for use by NDAR to allow...
Authentication by biometric verification is becoming increasingly common in corporate, public security and other such systems. There is scads of work done in the area of offline palmprints like palmprint segmentation, crease extraction, special areas, feature matching etc. But to the best of our knowledge no work has been done yet to extract and identify the right hand of a person, given his/her left...
In this paper, we propose two database updating models for homogeneous and auto configurable sensor network deployed in a truck without base station. In the first model, a virtual base station (VBS) is periodically elected to act as classical base station for a given period of time. VBS election algorithm is based on the remaining energy level of each node at the time of selection of the VBS. The...
Upholding the privacy of data has gathered increased interest in the current industrial scenario. The databases that hold personal information and the individuals' choices of privacy are often subjected to attacks from mischievous sources which try to access undisclosed data. The means used to achieve such ends may be in the form of complex queries that combine sensitive data with the non-sensitive...
The diversity, sophistication and availability of malicious software (malcode/malware) pose enormous challenges for securing networks and end hosts from attacks. In this paper, we analyze a large corpus of malcode meta data compiled over a period of 19 years. Our aim is to understand how malcode has evolved over the years, and in particular, how different instances of malcode relate to one another...
Offline signature verification can be linked as a biometric classifier that categorizes a signature into two classes: genuine and forged. In this paper a contour matching algorithm is proposed that tracks the basic characteristic patterns in a sample signature and verifies it. It capitalizes on the geometrical properties of the signature and takes into account the inevitable intrapersonal variations...
Honeypots have been studied in the network domain for detection and information collection against external threats in the past few years. They lure a potential attacker by simulating resources having vulnerabilities and observing the behavior of a potential attacker to identify him before a damaging attack takes place. A lot of work has been done in the area of privacy and security in databases....
The EROCS technology automatically links unstructured data with relevant structured data from an external relational database. We demonstrate how EROCS can be used for enhancing business intelligence by allowing OLAP tools to analyze structured and unstructured data in a consolidated manner. Our demonstration showcases the use of EROCS in exploiting latent information in customer emails, which helps...
Annotation is the process of supplementing data with additional information that was not part of the actual observation, but reflects post-facto comments and associations made by a user who analyzes the data. While annotation management systems are emerging in the field of relational data, such systems for scientific applications, where there is a wide heterogeneity in the types of annotable data,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.