The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Undesirable emails (spam) are increasingly becoming a big problem nowadays, not only for users, but also for Internet service providers. Therefore, the design of new algorithms detecting the spam is currently one of the research hot-topics. We define two requirements and use them simultaneously. The first requirement is a low rate of falsely detected emails which has an impact on the algorithm performance...
Linguistic word nets usually focus on the semantic content and content relations of nouns while not taking into account to what degree those nouns can also reflect visual impressions in a user specific manner. Recently Color Design SNS like COLOURlovers or Adobe Color CC have gained popularity and the huge corpus of available data allows for gaining new insights into the way user associate color designs...
Accompany with the growth of the speed in network, people's living standard has greatly improved, but the threaten to its information's security has also appeared, as a important branch of information security, steganography is a useful method to protect the secret information safety. In view of the high complexity of current video steganographic algorithms, and combining with the trailing coefficient...
To address the limitation of entity resolution of NoSQL documents, we propose a new parallel NoSQL entity resolution approach with MapReduce. Although current MapReduce framework enables efficient parallel execution of entity resolution, it cannot find duplicates in adjacent block easily. Therefore, we investigate possible solutions called Partition-Sort-Map-Reduce to find duplicates by overlapping...
The routing information is hard to maintain and the energy is limited in highly dynamic wireless sensor network. To solve these problems, energy-saving geographic routing (ESGR) is proposed, which does not maintain the network topology and can save energy. A node broadcast its position information to its neighboring nodes before transmitting data. The neighboring nodes compute the position of the...
The closeness centrality can be considered as the natural distance metric between pairs of nodes in connected graphs. This paper is the initial study of the influence of the closeness centrality of the graph built on the basis of the differential evolution dynamics to the differential evolution convergence rate. Our algorithm is based on the principle that the differential evolution creates graph...
Wireless sensor networks (WSNs) is a key technology which is deployed under the assumption that participating sensors are cooperative in forwarding each other's packets. However, some nodes may behave selfishly by dropping other's packets or refusing to provide services in an attempt to maximize its throughput with minimum expense. In this paper, we present a novel detection scheme based on Dempster-Shafer...
Cloud computing technology is known for its potential advantages which include cost reduction, enhanced flexibility, improved stability and the provision of a proven delivery platform for delivering IT services to its end users. In spite of the numerous benefits, cloud computing does attract security threats and therefore has vulnerabilities. Understanding and mitigating such threats and vulnerabilities...
With the advent of the era of big data, the data scale being processed is more and more large, which brings new challenge to the design of privacy-preserving protocols. For the Private Set Intersection (PSI) problem, when the sizes of sets is large, keeping its efficiency and scalability is becoming very difficult. In addition, elements in these sets are likely to be twodimensional data, which usually...
This paper proposed a new Modified Costas loop to achieve carrier wave synchronization for QPSK with equal prior probability, as the conventional PLL can't make it due to the absence of the carrier partition. Models about phase detector, loop filter, and voltage controlled oscillator are designed in Simulink, and System Generator is also used to generate code automatically and download it into FPGA...
Cloud computing nowadays is adopted by many organizations around the world because of its potential benefits such as cost reduction, high availability and elastic scaling. In spite of all the claimed benefits and to deal with any potential risk and vulnerability of cloud computing, risk management is becoming a critical domain that requires a fundamental review in the business strategies and can be...
In order to enable and support lifelong learning, learners need to be aware of their learning processes. This work proposes a framework for supporting Self-regulation in Seamless Learning scenarios. The framework is based on the Endsley's Model for Situation Awareness. Moreover, the framework is contextualised to a specific class of learning scenarios in order to better explain its potentiality. In...
Multiparty cloud computation can deal with the problem that the traditional homomorphic encryption can't operation on the ciphertexts generated by different users, and the final result is computed by cloud server. The trivial multiparty cloud computation doesn't take the access control to the final result into consideration. In reality, we perhaps do not want all parties to gain the result. In this...
With the fast development in Cloud computing technologies, most computing platforms and stand alone applications are being deployed in Cloud platforms and offered as a service (SaaS). Likewise, Data Mining Frameworks (DMFs) such as Weka and R, are being ported to Cloud platforms, while other frameworks properly designed for Cloud platforms are emerging such as Mahout. For existing DMFs, which were...
Multi-variable data relations can define a partial differential equation, which describes an unknown complex function on a basis of discrete observations, using the similarity model analysis methods. Time-series can form an ordinary differential equation, which is analogously possible to replace by partial derivatives of the same type time-dependent observations. Polynomial neural networks can compose...
Starting from the last century, animals identification became important for several purposes, e.g. tracking, controlling livestock transaction, and illness control. Invasive and traditional ways used to achieve such animal identification in farms or laboratories. To avoid such invasiveness and to get more accurate identification results, biometric identification methods have appeared. This paper presents...
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.