The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Attacks authored by state sponsored actors, criminal outfits, ideological enclaves and recreational hackers continue to trouble public and private cyber systems. In order to create and/or maintain an advantage over their adversaries, cyber defenders must pursue novel ways to detect, attribute and respond to offensive operations. Linkography is a topic that has been explored for decades that has found...
In recent years, because of internet technology and the promotion of open science, it has become possible to obtain information about research progress. Nevertheless, many steps must be taken to collect such information exhaustively. Even when one wants to know only a summary, one must expend much time and effort. For this study, we propose a system that collects information about each laboratory,...
In this paper, we propose a new secret sharing method for Chinese characters based on non-negative matrix factorization (NMF). Chinese characters can be regarded as binary images, but traditional NMF is only suitable for gray-level images. Therefore, this paper proposes a modified version of NMF for dealing with Chinese characters in binary images. The modified NMF decomposes a Chinese character into...
In this demo we illustrate the usage of PopperCI [1], a continous integration (CI) service for experiments hosted at UC Santa Cruz that allows researchers to automate the end-to-end execution and validation of experiments. PopperCI assumes that experiments follow Popper [2], a convention for implementing experiments and writing articles following a DevOps approach that has been proposed recently.
Gait analysis helps people understand if they have any abnormalities in walking or helps clinicians assess fall-risk and determine how person's gait is different from previous assessments to understand the effect of medicine or disease progression. Gait analysis conducted in a laboratory environment is expensive and obtrusive that it is not suitable for daily use and therefore we can not get information...
Supercomputing systems are used everywhere today. Starting with their humble beginnings as tools for large scientific simulations, supercomputing systems are used in almost all aspects of our daily lives today from interactions with friends and family to transportation, education, and the general improvement in the quality of our lives. As we move from the current generation of supercomputers to the...
This paper describes the work in progress for education in Electric Power, Control and Energy Systems (EPCES) at undergraduate and graduate levels, initially commencing in high schools. Further, the paper describes a methodology to build a robust pipeline of high school students who go on to choose electric power/control/energy as a field of study as undergraduates. This paper describes the graduate...
Borgs et al. [2016] investigated essential requirements for communities in preference networks. They defined six axioms on community functions, i.e., community detection rules. Though having elegant properties, the practicality of this axiomsystem is compromised by the intractability of checking twocritical axioms, so no nontrivial consistent community functionwas reported in [Borgs et al., 2016]...
The quality of technical education in training of specialists for fuel and energy complex is affected by many factors. To a greater extent, education is determined by the level of technical equipment of laboratories and by methodology of the educational process. This paper is dedicated to the professor's and lecturer's experience of modern educational technology's implementation and training methods...
Laboratory work and experimentation is the most important cornerstone in engineering education. However often times there are not resources enough in the laboratories of industrial automation, or enough time to apply the knowledge acquired in lectures. Therefore, it is necessary to have support systems that enable students to learn in an autonomous way and teach them in the management of physical...
Engineering education impacts very much in the country development in various facets like productivity, services and skilled personnel. It is the engineering institutes responsibility to provide the interactive environment for the all-round development of the students. The students who joins for the engineering education would be differed in their attitudes, back ground knowledge, intellectual levels,...
We present the new results on the methodology applied at the Universidad de Ingeniería y Tecnología (UTEC), Lima, Peru, to train undergrad engineering students to participate in advanced research projects starting at the freshman year. Using this methodology, started in 2013, undergrad students at UTEC start taking mandatory engineering semester projects not related to any specific course but addressed...
Audio signal processing has long been the obvious approach to problems such as microphone array processing, active noise control, or speech enhancement. Yet, it is increasingly being challenged by black-box machine learning approaches based on, e.g., deep neural networks (DNN), which have already achieved superior results on certain tasks. In this talk, I will try to convince that machine learning...
In the realm of cyber security, recent events have demonstrated the need for a significant change in the philosophies guiding the identification and mitigation of attacks. The unprecedented increase in the quantity and sophistication of cyber attacks in the past year alone has proven the inadequacy of current defensive philosophies that do not assume continuous compromise. This has given rise to new...
In recent years, the rapid development of intelligent dietary planning mobile systems, combined with the cloud technology, provides more intuitive and convenient experience for users on the diet recording and suggestion. However, this mobile-cloud structure will cause the privacy issue. Unlike the past researches which mainly focus on the user interface, response speed and suggestion accuracy, we...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.