The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Many definitions of fuzzy rough sets exist. Most of them are defined on fuzzy approximation spaces. In this paper, we firstly introduce the notion of picture fuzzy approximation space and functional and set approaches are used. Some new picture fuzzy rough sets are proposed. Presented new basic propositions should be useful for knowledge discovery in the picture fuzzy information systems.
To deal with the problem of large certificate in Public Key Infrastructure, several techniques have been introduced such as Identity-based cryptography, Implicit certificate, Password-based cryptography and recently Certificateless cryptography at Asiacrypt'03. In a certificateless system, only user with her full private key can decrypt the ciphertext while the authority with her master key cannot...
This paper considers the multi-unit resource allocation problem with a few distinct (indivisible and non-shareable) goods (or items, objects), each has a certain amount of copies. Every agent expresses her preference over multisets of goods by mean of utility function. The goal is to distribute goods among agents in such a way that maximizes either utilitarian social welfare or egalitarian social...
In this paper, we propose a novel contents verification method using the distributed redundant image storages and user-based reconstruction algorithm. There are two processes composing in our proposal such as the image dispersion method and the image reconstruction method. In the image dispersion method, the images are dispersed into many information patches and are stored on the distributed storages,...
Recognition of human actions is an intelligent way for human-machine communication and Radial basis function (RBF) models are among the most powerful machines on this task. One prerequisite of using this traditional model is that the movement data must be translated into a vector space via the feature extraction process. Recent development of the convolutional neural networks (CNNs) has been shown...
Mining high utility patterns, the subject of which has attracted many researchers in data mining, is the process of discovering patterns with utility satisfying a minimum predetermined threshold. Many studies have been performed, but finding the suitable minimum utility threshold is problematic, because users cannot predict the appropriate threshold that affects mining performance. To solve this problem,...
Educational data mining has received much attention worldwide due to its significance in the education domain. Among a large number of the educational data mining tasks, early in-trouble student prediction is a popular one. This task focuses on identifying the students who are at risk in their study as soon as possible before the end of the permitted period of study time. For early detection, data...
Extracting and recognizing mathematical expressions of scientific documents are key steps in the process of mathematical retrieval system, where the documents contain different components such as text, tables, figures, and mathematical expressions. There are several methods proposed to handle the components of documents. Those methods have investigated the feature of components based on the segmented...
Gender is one of the most useful facial attributes which are detected from human face images. In this work, we introduce a new gender classification system based on features extracted by Local Phase Quantization (LPQ) operators from intensity and Monogenic images. More detailed, the LPQ features are obtained from the input image (the intensity one) and from three other Monogenic components in the...
This work investigates the anonymous tag cardinality estimation problem in radio frequency identification systems with frame slotted aloha-based protocol. Each tag, instead of sending its identity upon receiving the reader's request, randomly responds by only one bit in one of the time slots of the frame due to privacy and security. As a result, each slot with no response is observed as in an empty...
In multi-proxy multi-signature schemes, an original group of signers can authorize another group of proxy signers under the agreement of all singers both in the original group and proxy group. The paper proposes a new multi-proxy multi-signature based on elliptic curve cryptography. This new scheme is secure against the insider attack that is a powerful attack on the multi-signature schemes.
Attribute-specific models are quite effective in the detection of web attacks. Nevertheless, none of existing attribute-specific models can be applied directly to modern web applications, which are dominant today and which use RESTful URLs. The barrier is that paths and parameters are mixed in URLs so that detection systems cannot identify which programs and attributes are which. To remove this barrier,...
IoT / Cloud / Big data / Mobile (ICBM) is a new technology paradigm that merges IoT, cloud, big data, and mobile technologies. In this study, we designed and implemented a smart farm environment management system that can collect and monitor information on crop growth utilizing ICBM technology. The wireless system proposed in this paper not only collects environmental data from the inside of a vast...
In this paper, we propose a high-altitude platform (HAP)-based free space optical communication (FSO) system using all-optical relaying to connect two ground stations (GSs) via a HAP. Optical detect-amplify-and-forward is carried out at the HAP thanks to the use of an optical hard-limiter and an optical amplifier. In addition, coherent detection is applied at the GS's receiver to improved the receiver...
We have witnessed the exponential growth of 3D GIS applications which vary from 3D urban management, a heritage city, archaeology, flood controlling, planning and designing, and government planning, to name a few. Thanks to the diversity of 3D models that are used to represent objects in reality and spatial database systems that are utilized to store spatial data, designers and developers can explore...
In recent years there have been many proposals for automated applications in vegetable harvesting. There are two major challenges: estimation of yield and harvesting of fruit trees. This research proposes a new algorithm that allows accurate counting of the number of fruits on a tree to accurately estimate the output of a dragon fruit. The algorithm consists of the following main steps: image segmentation,...
In this paper, we revisit multi-party Diffie-Hellman key exchange (DHKE) protocols by using multi-linear mappings and Weil pairings over elliptic curves. We show how to construct a 4-linear Weil pairing and illustrate the approach by examples. Finally, we present several necessary conditions to find a distortion map for a 5-party DHKE protocol.
This article studies the complex staff rescheduling problem arising in the context of Lai Chau hydropower station. Currently, rescheduling task is implemented manually by agreement of switching shifts among workers or by a scheduler. It is a complex and time-consuming operation but obtained schedules have been far below the expectation of the staff as they in general violate working rules and contract...
Many practical networks can be mathematically modeled as graphs. Graph signal processing (GSP), intersecting graph theory and computational harmonic analysis, can be used to analyze graph signals. Just as short-time Fourier transform (STFT) for time-frequency analysis in classical signal processing, we have windowed graph Fourier transform (WGFT) for vertex-frequency analysis in GSP. In this paper,...
In this research, we propose a heterogeneous anomaly-based intrusion detection system (HA-IDS) which is built on both of Field-Programmable Gate Array (FPGA) and Graphics Processing Unit (GPU) platforms. An essential anomaly-based IDS comprises of the two main components: Feature Construction Module (FC) to extract and collect network header information, and Classification Module (CM) to categorize...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.