The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper we develop a network model of international trade which is able to replicate the concentrated and sparse nature of trade data. Our model extends the preferential attachment (PA) growth model to the case of multiple networks. Countries trade a variety of goods of different complexity. Every country progressively evolves from trading less sophisticated to high-tech goods. The probability...
This paper gives an example of a novel simple implementation of the EM algorithm for clustering images. Here we use a simple gray scale color feature to describe an image. When compared to results of other methods using the same simple feature, we found that the proposed method performs well. These comparison results imply that this simple model can be extended to cluster images using more complex...
The aim of this study was to explore how Japanese young adults use social networking sites (SNS) and the social psychological factors that might impact their SNS security settings. A survey (N = 79) was employed to examine usage habits, actual account settings, risk perception and social cognition related to Twitter. Results indicate that there are discrepancies among privacy concerns, usage habits...
Analysis of Collocation is targeted for Natural Language Processing (NLP). From a linguistic perspective, collocation provides us with a way to place words close together in a natural manner. By this approach, we can examine deep structure of semantics through words and their situation. Although there have been some investigation based on co-occurrence, few discussion has been made about conditional...
In the mobile adhoc networks (MANET's) [3] [6], one of the most challenging task is, how to configure a new node so that it can communicate with the already configured nodes in the network. The nodes in the MANET are free to move randomly, so the configuration protocol should be able to manage its configuration along with the mobility. In the MANET's, a centralized server does not exist to manage...
Recently, accidents such that seniors fall down from the bed in care facilities or hospitals are increased. To prevent these accidents, we have developed the awakening behavior detection system using Neural Network. However, fluctuation of brightness quantity in the capturing environment sometimes makes decrease the detection capability. Therefore, to decrease the influence of the quantity, we newly...
We consider the question of how to evaluate popularity of digital contents or goods over a distribution service using Oblivious Transfer (OT) protocol. The popularity of served content is the most important marketing data for data mining and analysis, but the idea of oblivious transfer is too privacy-protecting because the service provider cannot obtain any information about a user's queries. In this...
On and after the Great Eastern Japan Earthquake, various false information and rumor have been spread on Twitter. To cope with this, we proposed the method for automatically assessing the credibility of information based on the topic and opinion classification[16]. The information credibility is assessed calculating the ratio of the same opinions to all opinions about a topic. To identify the topic...
The World Health Organization (WHO) asserts the importance of hand antisepsis education to reduce the risks of global epidemics of influenza, norovirus, etc. To promote hand antisepsis, it is essential to motivate individuals to push the pump of antiseptics containers. We have developed systems to enhance such motivation. It is more important to raise awareness about the need for hand antisepsis than...
Disaster situations require resilient ICT systems in order to provide as good as possible communication conditions in such catastrophic circumstances. The resiliency verification of ICT systems is however difficult, because reproducing large-scale disaster conditions in production networks is impossible without affecting their users. In this paper we present an emulation-based approach for evaluating...
This paper proposes a counseling agent by ELIZA-like but much more human-centered (we call "context? respectful") dialogue, respecting human namely clients' suffering situation/ context. Towards self-awareness of solutions through reflection, this reflection agent can perform context-respectful support. Building up mutual trust or empathizing with the client and keeping it, this agent supports...
In recent years wireless LAN (WLAN) service has been provided in many companies, universities, hotels, coffee shops and even in the street. Thus, the number of WLAN users is growing at a remarkable rate. Kyoto Women's University has offered WLAN service with many access points in centralized control style since 2011 and many people in the university can connect their devices to WLAN. It is useful...
In this paper we study the statistical properties of urban street networks. We show that urban and non-urban street networks can be differentiated through their statistical properties, suggesting at a transition between two phases. We introduce a definition of city boundaries based on the percolation properties of the network in the street intersection density space, through the concept of city condensation...
WLAN (wireless local area network) becomes universal because network technology attains to maturity. To prevent unprivileged access to network resources, authentication is necessary. Conventional authentication mechanisms adopt only users' identities and passwords, and they are regarded as single-factor ones. To enhance security with inexpensive cost, Guo et al. proposed an authentication scheme with...
Adaptivity is a system's ability to respond flexibly to dynamically changing needs. Adaptivity to human needs, wishes and desires-even to those that might be unconsciously present-is a particularly ambitious task. A digital system which is expected to behave adaptively has to learn about the needs and desires to which it shall adapt. Advanced adaptivity requires learning on the system's side. Under...
Combinatorial problems are NP-complete, which means even infinite number of CPUs take polynomial time to search an optimal solution. Therefore approximate search algorithms such as Genetic Algorithms are used. However, such an approximate search algorithm easily falls into local optimum and just distributed / parallel processing seems inefficient. In this paper, this inefficiency is shown by simulation...
One of the main security concerns related to a distributed system is the lack of trust. In this paper, we present a trust ontology methodology based on access control concepts for Multi-Organization Environments (MOE). This ontology will be used to share the trust beliefs between participants and to make equivalence between their trust objectives. How to define this trust relationship, how to understand...
The paper presents a very general and many purpose technique to represent human needs and offers along with a technology to find optimal matches. Moreover, the system is able to learn from its use by collecting user feedback and changing its parameters accordingly. This way, the system adjusts itself to the human expectations and desires and even follows the trend of these desires and expectations.
In this paper, we introduce a refined Educational Data Mining approach, which refrains from explicit learner modeling along with an evaluation concept. We use a Data Mining technology, which models students' learning characteristics by considering real data instead of deriving their characteristics explicitly. It aims at mining course characteristics similarities of former students' study traces and...
The dynamic taint analysis mechanism is used to protect sensitive data in the Android system. But this technique does not detect control flows which can cause an under-tainting problem. This means that some values should be marked as tainted, but are not. The under-tainting problem can be the cause of a failure to detect a leak of sensitive information. To solve this problem, we use a set of formally...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.