The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Harn-Ren and Harn-Ren-Lin identity-based multisignature (IBMS) schemes are schemes derived from the RSA and GQ identity-based signature (IBS) schemes respectively. These IBMS schemes were claimed to be efficient based on two metrics - fixed length and constant verification time. This paper shows that both schemes suffer from similar flaws that allow adversaries to manipulate the list of signatories...
Multi-label classification allows an instance to be associated with multiple labels. Compared with other classification tasks, multi-label classification also suffers from the problem of high data dimension. However, the existing dimensionality reduction (DR) methods are not very appropriate for multi-label data. In this paper, we proposed a supervised DR method, named the compressed partial least...
Digital photo management is becoming indispensable for the explosively growing family photo albums due to the rapid popularization of digital cameras and mobile phone cameras. An effective photo management system could accurately and efficiently group all faces of the same person into a small number of clusters. In this paper, we present a novel photo grouping method based on spectral theory. The...
Dementia affects a proportionally large number of the older population, presenting a set of symptoms that cause cognitive decline and negatively affect quality of life. Technology offers an assistive role for some of these symptoms, specifically in addressing forgetfulness. Current works have explored the benefits of reminding technology, which whilst useful is only effective for those who adopt the...
When using diffusion MRI for segmenting the cerebral cortex, the modality of information used and workflow procedural factors can have significant effects on the resulting parcellation. There is as yet no consensus on best practice processing protocols, and no ground truth is available in vivo. Converging indirect evidence has been used to compare parcellation outcomes, including: (1) comparison of...
Differentiating people on the basis of their names has always been a complex issue and our desire for grouping people, in a particular domain, based on their attributes is growing day by day. Despite years of research and a bunch of proposed techniques, the name ambiguity problem remains largely unsolved and the so far proposed techniques have faced one problem or the other. In case of author name...
Recent works have demonstrated that individuals within large flocks respond to a fixed number of nearest neighbors. With this fact, the topological distance neighbors chosen method is proposed. In this paper, results obtained by this method show a better performance in the individual aggregation of a sparsely distributed flock when compared with the results obtained by metric distance method. At the...
This paper investigates the relationship between rhythm metrics and the ability to classify speakers depending on gender and/or social environments that may have been affected by factors such as second language effects and ways of living as expressed through speech. The BBN/AUB (BBN Technologies and American University of Beirut) corpus was used; it contains four subsets of native Levantine dialect...
This work focuses on the analysis of energy-efficient algorithms for online scheduling in the Infrastructure as a Service (IaaS) type of Cloud computing. The scheduling model is based on service levels that guarantee the quality of service. Each service level is associated to a price per unit of job execution time and a slack factor, which determines the deadline for delivering the results. Once a...
This paper focuses on how to maximize accuracy of Cloud service discovery and give enough flexibility to Cloud customers to discover their best suited services from a range of Cloud providers. An ontology-based Cloud service discovery approach is proposed, which works based on modeling semantically enriched Cloud services, ontology reasoning and logic matchmaking. Cloud customers have different preferences...
In order to validate a particular approach to trust modeling, researchers have typically designed simulations in which various multliagent conditions are modeled and tested. Graphs have tracked different measures to demonstrate success of the proposed trust model, including satisfaction of buying agents, profit of selling agents (in e-marketplaces) or the extent to which the simulation matched some...
The proliferation of end-user programmers' code in open source repositories provides opportunities for others to reuse code to solve programming problems, learn new programming techniques and to get inspiration. Unfortunately, code reuse by end-user programmers is low. In this paper, I propose a novel search mechanism called “Behavior-based code search” (BBCS) that assists end-user programmers discover...
In today's highly dynamic economy and society, the performance evaluation of Decision Making Units (DMUs) is of high importance. This study presents an efficient model for analyzing the outputs of performance measurement methodologies by means of trust, which provides explicit qualitative scales instead of representing pure numerical data. The efficiency rate of the current, previous and coming years,...
In this paper, we propose a no reference image quality assessment (NR-IQA) algorithm based on distortion identification (DI) and multi-channel label transfer (LT). First, the distortion type classification is used to obtain the query image's probabilities of belonging to each distortion type. Then, the distortion specific label transfer is implemented in multiple distortion category channels. Based...
Hubs play important roles in scale-free networks. Existing hub search algorithms mostly assume the availability of the global network structure and use a variety of centrality metrics to search the hubs in the network. However, when it is very difficult to obtain the network topology in large-scale networks, how we can search the hubs? In this paper, a hub search method based on sampling with biased...
Nowadays, individuals (customers) are in contact with various organizations to meet their particular needs. As an integrated and unique database is not used in the different organizations, individuals have different identity numbers (IDs) and obviously do not memorize all of them. Also, from the psychological perspective, customers like to use their name as their identity, not a customer number or...
Recommending trusted services to users is of paramount value in service-oriented environments. Reputation has been widely used to measure the trustworthiness of services, and various reputation models for service recommendation have been proposed. Reputation is basically a global trust score obtained by aggregating trust from a community of users, which could be conflicting with an individual's personal...
Image edge detection is one of the most important foundations of image analysis and comprehension. Traditional edge detectors are not robust enough to illumination variations. In last decade, detector based on Phase Congruency (PC) model was proposed and invariant to illumination variations. In this paper, we introduce the quaternion Wavelet Transform to PC model and propose a new edge metric of quaternion...
A demonstration is made of the high-speed real-time image processing capabilities of the SCAMP-5 vision chip. The device provides a software-programmable 256×256 pixel-parallel SIMD processor array. In the example application, the IC can determine dimensions and the location of a single object, at a sustained rate of 100,000fps. At 30,000fps, the chip can return the same metrics from 5 objects. This...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.