The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Community detection is a fundamental problem in social network analysis. There are a large number of community detection algorithms in the literature. However, many previous algorithms only focus on the structure of the network, and ignore the attributes of the users (e.g., the location attributes of the users). In this paper, we study the community detection problem in the context of location-based...
Social Networking Services rise rapidly in recent years, and gradually penetrate into the user groups all over the world. Sina Microblogging is one of the important applications and has more than 500 million registered users. Huge number of users on the platform and the mass content, provide effective corpus for information mining in groups of users. In this paper, more than 1.6 million user-generated...
GPS-enabled mobile devices such as smart phones and tablets are extremely popular today. Billions of such devices are currently in use. The application and research potentials of these devices are limitless, but how accurate are these devices? The research team used Average Euclidean Error (AEE), Root Mean Square Error (RMSE), and Central Error (CE) to define and calculate the accuracy and precision...
High-dimensional crowdsourced data collected from a large number of users may produc3 rich knowledge for our society but also bring unprecedented privacy threats to participants. Recently differential privacy has been proposed as an effective means to mitigate privacy concerns. However, existing work on differential privacy suffers from the "curse of high-dimensionality" (data with multiple...
In online social networks (OSNs), highly-connected users are generally more capable to trigger viral diffusion. However, recent research demonstrates that ordinary users who only have a few connections can also cause large-scale diffusion. In this paper, we study the relation between the global spreading influence and the local connections of users to theoretically explain this phenomenon. We focus...
Discriminant Neighborhood Embedding (DNE) is one of the most popular methods for dimensionality reduction, which constructs an adjacency graph to preserve the local structure of original data in the subspace. However, there exist two shortcomings, first, DNE just constructs an adjacency graph, which may not achieve the goal of balancing the within-class and between-class samples. Second, DNE cannot...
Sentiment is the only things that separate human and machine. To simulate the feelings for machines many researchers have been trying to create method and automated the process to extract opinion of particular news, product or life entity. Sentiment Analysis (SA) is a combination of opinions, emotions and subjectivity of a text. Currently SA is the most demanding task in Natural Language Processing...
Meeting is a gathering of people to exchange information and plan joint activities for achieving a goal through verbal interactions. In a good meeting, participants' ideas are heard, decisions are made through discussions and activities are focused on desired results. The challenging part is to mine the most relevant interaction pattern from the meeting. Tree structures are not able to capture all...
With the growing interests in social networking, the interaction of social actors evolved to a source of knowledge in which it become possible to perform context aware reasoning. The information extraction from social networking specially Twitter and Facebook is on of the problem in this area. To extract text from social networking, we need several lexical features and large scale word clustering...
Linear (k,n) secret sharing scheme is a class of (k,n) secret sharing, where all the n shares of a secret satisfy a linear relationship. It plays an important role in other cryptographic systems, such as multi-party computation and function sharing schemes. On the other hand, cheating problem in (k,n) secret sharing is an important issue, such that cheaters (dishonest players) submit forged shares...
We explore the problem of Chinese character description and font designing in this paper, a novel dynamic description method for Chinese character was proposed. This method includes a dynamic description algorithm by using stroke-segments-vector, stroke elements and generation algorithm by using feature points and their weights, characteristic expression and weight vector of the feature points. Our...
Recreational nature experiences are rehabilitative for humans. Nature-oriented virtual environments (VEs) might be able to provide similar experiences. A pilot study have shown to increase the enjoyment of an exercise experience for retirement home residents, by augmenting their everyday bike exercise with a custom made recreational VE. This paper proposed a set of guidelines with design considerations...
THESEUS is an energy-efficient routing system for Shared Sensor Networks (SSNs), with the primary goal of extending network lifetime. THESEUS has two features that distinguish it from other works found in the literature. First, it saves SSN nodes energy by using a packet aggregation algorithm, which reduces the number of transmissions. Second, THESEUS balances energy usage in the whole SSN by its...
In this paper, a session resumption-based end-to-end security scheme for healthcare Internet of things (IoT) is pro-posed. The proposed scheme is realized by employing certificate-based DTLS handshake between end-users and smart gatewaysas well as utilizing DTLS session resumption technique. Smartgateways enable the sensors to no longer need to authenticateand authorize remote end-users by handing...
REVERIE (REal and Virtual Engagement in Realistic Immersive Environments) [1] is a multimedia and multimodal framework, which supports the creation of immersive games. The framework supports the creation of games integrating technologies such as 3D spatial audio, detection of the player's body movement using Kinect and WIMO sensors, NPCs (Non-Playable Characters) with advanced AI capabilities featuring...
At present, Regular Android softwa re, injected in malicious code, is nne of the imp ort an t factors of tha i Android vir us run ram pant. Protectin g the And roid software has become a foc us of attent ion in academia and industry. Address ing the safety pro tecti on Issues of the Android soft ware, this paper will present slime new schemes for Androtd scnware security technology to reinforc e j...
In this paper, we propose a two-tier evolutionary game for dynamic spectrum sharing using Licensed Shared Access (LSA) to serve the additional capacity needs of Mobile Network Operators (MNOs). The proposed algorithm ensures fair and demand-driven allocation of spectrum resources to LSA licensees, guaranteeing spectrum availability for licensees unlike previous spectrum sharing techniques. Moreover,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.