The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper proposes a new training method of a cascade classifier in order to implement on Hadoop MapReduce platform. Learning process of cascade classifier requires many computations whereas the serialized algorithm does not fit to a parallel platform well. The parallelization is achieved by dividing the training into two parts. Before starting learning for adaptation to required false positive rate,...
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
Currently, we are faced with a major problem concerning the use of malicious codes in hacking attacks, which is becoming increasingly intelligent. We became curious about the major factors behind the cyber incident, which prompted us to conduct research about the weighted value of resources that are used to commit malicious acts. The major approach of this paper consists in calculating the weighted...
This paper considers the problem of redundancy minimization which occurs during spatial data visualization. The redundancy has semantic background and appears during the spatial data visualization and a visual analysis by a user. The reason of redundancy is continuous change in the database network geoinformation services structure that allows storing the processes and events of the real world. The...
In our previous work, k-value pseudo random sequence generated by power residue symbol has been researched. The sequence is generated by applying a primitive polynomial over odd characteristics field, trace function, and power residue symbol. The sequence has some important features such as period, periodic autocorrelation, and linear complexity. In this paper, by applying an additional process to...
Vector decomposition problem has been proposed on some supersingular curves whose embedding degree is 2 for example. In order to apply the problem as a trapdoor for some innovative cryptosystems, it is necessary to make pairing-related calculations more efficient. Our previous work has considered an approach for Tate pairing on a supersingular curve of embedding degree 2 over extension field of extension...
In order to narrow the learning divide, mobile learning should be provided to handicapped learners, especially to learners with visual impairment. However, in spite of development of the resolution and screen size of mobile devices, there are still many inconvenient factors. Among recent studies, there is a Proposal of Ahmed Rana and Four Startup Screen operates in mobile devices with touch screen...
The Internet of Things (IoT) is expected to be the future big thing in the mobile communication systems, with IoT services being a key driver for further growth in wireless technologies with Wi- Fi, WiMAX and LTE/LTE-A. Numerous services are envisioned for IoT over wireless networks, including utility meters, vending machines and automotive applications. Urban IoTs, in fact, are designed to support...
This paper addresses an interworking model of transport network controllers including SDN and Non-SDN controllers. It has an overview of recent research and standard activities, classifies types of transport network controllers, and proposes a SDN and Non-SDN interworking model. For verifying the proposed interworking model, it leads to a 3-tiers reference model from the interworking architecture...
It is known that, for teenagers, internet addiction ratio is proportional to smartphone addiction. It means that, for same school age group, the higher internet addiction ratio is, the higher smartphone addiction ratio is. The research purpose of this paper is to investigate correlation of internet addiction and smartphone addiction of teenagers. For this purpose, extensive internet addiction survey...
The purpose of this study is to investigate correlation of internet addiction and school age. For this purpose, extensive and national survey works of NIA(National Information Society Agency of Korea) are analyzed. Based on thorough statistical analysis, it is concluded that there is a meaningful correlation between internet addiction and school age.
Medical diagnoses automation based on huge data is of great significance to doctor-patient contradiction regulation and the optimizing allocation of health resources. This paper presents an intelligent automatic disease diagnosis system. Based on a large number of confirmed disease cases, the method of probability and statistics is used to find the relations between the symptoms and different diseases,...
It is known that man is more immersed in internet use than woman. Actually, internet addiction ratio of man is higher than internet addiction ratio of woman. The research purpose of this paper is to investigate correlation of internet addiction and gender. For this purpose, extensive and national survey works of NIA(National Information Society Agency of Korea) are gathered and analyzed. Based on...
Vehicle analysis has been investigated for decades, which involves license plate recognition, intelligent traffic. Among these applications, vehicle make recognition is a challenging task due to the close appearance between car models. In this paper, we propose an architecture to recognize vehicle make based on convolutional neural network (CNN). The moving car is first localized by frame difference,...
Recently the use of QR code for data coding becomes significantly increasing especially for coding identity, health and other specific data. Since some types of data such as identity, health, etc is private data then it needs to be further authenticated. Furthermore, the owner of the identity should be authenticated as well. Therefore, we have to insert biometric features which will be further authenticated...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.