The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Underwater image segmentation becomes a difficult and challenging task due to various perturbations present in the water. In this paper we propose a novel method for underwater image segmentation based on M-band wavelet transform and human psychovisual phenomenon(HVS). The M-band wavelet transform captures the texture of the underwater image by decomposing the image into sub bands with different scales...
In this paper, we propose intuitionistic linguistic vector (ILV) as a tuple of intuitionistic linguistic numbers (ILNs). ILV can describe information which involves multiple linguistic terms according to different intuitionistic fuzzy values. Similarity measures for ILNs and ILVs are also given. The novel concepts are used to construct a classification algorithm (Intuitionistic Fuzzy Linguistic Vector...
In the world of education, the success of knowledge sharing will help students in realizing and developing their potential. Sharing knowledge is the most important and influential process in knowledge management. The importance of knowledge management can produce value that can be used to make decisions or take action. This study aims to analyze individual and technological factors on knowledge sharing...
Providing feedback to learners on their writing assignments is one of the most important and time-consuming tasks that a supervisor performs. In e-Education environments, especially in the case of distance learning, giving feedback becomes more challenging because there are often no opportunities for face-to-face interaction. Typically, a supervisor provides comments to learners in written form via...
In this paper we present the report on the design and development of a platform for the inter-generational exchange of favors. This platform was designed using participatory design approach during a 24-hour hackathon by a team consisting of younger programmers and older adults. The findings of this report show that inter-generational cooperation in which the older adults serve as representatives of...
We develop an extension of the Karhunen-Loe've transform (KLT) that provides better associated accuracy than that of the original KLT and its known generalizations. It is achieved via a special structure of the proposed transform which contains more parameters to optimize than those in the known transforms. Its specific feature is an auxiliary signal w used to improve the transform performance. In...
Modern teaching methods, including the need to use information technology in teaching, are receiving increasingly more attention in higher education pedagogy. The purpose of this paper is to provide an overview of the technology mentoring programme that was launched in the University of Tartu and to categorise the reasons why 15 university teachers who specialise in the field of education decided...
The objective of this article is to demonstrate the importance of the Systems and Technologies of Information and Communication (STIC) in the police forces, in general, and, in the European Gendarmerie, in particular. In fact, the new challenges related to the integration of STIC into the security management promoted by the police forces amplify the technological process, requiring a greater revision...
Information technology and social media networks have tremendously changed the landscapes of education and learning. This study was conducted to assess medical sciences students' preferences and usage of information technology and social media networks in learning. The study was an observational cross-sectional questionnaire-based. The questionnaire was completed by 200 students. The response rate...
Graph algorithms play an important role in several fields of sciences and engineering. Prominent among them are the All-Pairs-Shortest-Paths (APSP) and related problems. Indeed there are several efficient implementations for such problems on a variety of modern multi- and many-core architectures. It can be noticed that for several graph problems, parallelism offers only a limited success as current...
The extremely fast grow of Internet Services, Web and Mobile Applications and advance of the related Pervasive, Ubiquity and Cloud Computing concepts have stimulated production of tremendous amounts of data partially available online (call metadata, texts, emails, social media updates, photos, videos, location, etc.). Even with the power of today's modern computers it still big challenge for business...
An individual who re-registers an expired domain implicitly inherits the residual trust associated with the domain's prior use. Adversaries can, and increasingly do, exploit these ownership changes to undermine the security of both users and systems. In fact, many seemingly disparate security problems share a root cause in residual trust abuse. As we enter the dawn of the dead domain, new techniques...
Packet integrity or modification attacks commonly happen in Opportunistic Networks (OppNets). In this paper, we propose a technique that uses Merkle trees to protect the integrity of the packets transferred in a network. When adopting the technique in an OppNet, nodes will be able to verify that data transferred from node to node is received unchanged and in its original state. Using a solid trust...
Google Classroom is a free web-based platform which becomes an important and popular course management application in higher education. It saves time and paper and makes it easy to create classes, distribute assignments, communicate, and stay organized. Teachers can create assignments, send announcements, and start class discussions instantly, as students can share resources with each other and interact...
Advanced information technology offers greater convenience to the general public. However, information technology can cause failures that have significant negative impacts (e.g., system failures and personal information leaks). To improve this situation, it is important to understand past failures, extract their causes, and define countermeasures. In this paper, we focus on communications networks...
Online auction is a popular electronic marketplacethat allows buyers and sellers to purchase and sell productsin an efficient way. In spite of popularity of online auctions, there are many fraudulent bidding or selling behaviours that canoccur during an auction (e.g., shill bidding, bid shielding, etc.).Among auction fruads, shill bidding is one of the hardest typesof auction fraud to detect. Researchers...
In online social networks (OSNs), highly-connected users are generally more capable to trigger viral diffusion. However, recent research demonstrates that ordinary users who only have a few connections can also cause large-scale diffusion. In this paper, we study the relation between the global spreading influence and the local connections of users to theoretically explain this phenomenon. We focus...
Location-based social network (LBSN) services are being popular at recent times. These are being manifested as service tools for different purpose of our daily lives. One very important aspect of these LBSNs services is to promote the business and help users to find their desirable location to visit. In this project, our aim is to find out the Foursquare venue popularity in Taiwan and compare its...
In our previous work, well balanced pseudo random signed binary sequence generated by using trace function and Legendre symbol has been researched. Our previous sequence generated by applying primitive polynomial over odd characteristic field Fp, trace function and Legendre symbol. The important features such as period, periodic autocorrelation, and cross-correlation have already been well discussed...
Information-Centric Networking (ICN) has emerged as a promising way for the efficient content delivery over the Internet, and it can be seen as a super large-scale caching distributed system. However, as one of the most important problems, the cache consistency issue, which refers to whether cached contents in routers are outdated, is still not investigated thoroughly in ICN. Thus, in this paper,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.