The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Abstract-Cyber-bullying has recently been reported as one that causes tremendous damage to society and economy. Advances in technology related to web-document annotation and the multiplicity of the online communities renders the detection and monitoring of such cases rather difficult and very challenging. This paper describes an online system for automatic detection and monitoring of Cyber-bullying...
The human immune system is incredibly efficient at identifying self- and non-self entities in our bodies. A non-self entity (malicious), once identified, is attacked by particular types of cells to remove the intruder before it can cause damage. Our immune system has components that identify not only non-self entities but also recall old entities that may not have been encountered for a very long...
The bank client identity verification system developed in the course of the IDENT project is presented. The total number of five biometric modalities including: dynamic signature proofing, voice recognition, face image verification, face contour extraction and hand blood vessels distribution comparison have been developed and studied. The experimental data were acquired employing multiple biometric...
Cloud computing and Internet of Things (IoT) are computing technologies that provide services to consumers and businesses, allowing organizations to become more agile and flexible. The potential business values that cloud consumers can achieve depend a lot on the quality of service in the provided cloud services. Therefore, ensuring the quality of service through service-level agreements (SLA) for...
Organizations are exposed to various cyber-attacks. When a component is exploited, the overall computed damage is impacted by the number of components the network includes. This work is focuses on estimating the Target Distribution characteristic of an attacked network. According existing security assessment models, Target Distribution is assessed by using ordinal values based on users' intuitive...
We applied a speech-to-text recognition (STR) and computer-aided translation (CAT) systems to support multi-lingual communications students participating in cross-cultural learning project. The participants were engaged in interactions and information exchanges in order to learn and understand cultures and traditions of their peers. Their communications were carried out in their native languages on...
Diabetes management is a complex and a sensible problem as each diabetic is a unique case with particular needs. The optimal solution would be a constant monitoring of the diabetic's values and automatically acting accordingly. We propose an approach that guides the user and analyses the data gathered to give individual advice. By using data mining algorithms and methods, we uncover hidden behaviour...
Database driven IP geolocation is a convenient and common way to determine geographic location of an IP address. However, the underlying problem is that it is often difficult for users to determine which provider is reliable enough to meet their own scenarios. In this paper, we tackle this challenge in a data fusion perspective. We first evaluate the consistency degree of data entries among 5 free...
In this paper, we introduce a pruning algorithm which removes aged user ratings from the rating database used by collaborative filtering algorithms, in order to (1) improve prediction quality and (2) minimize the rating database size, as well as the rating prediction generation time. The proposed algorithm needs no extra information concerning the items' characteristics (e.g. categories that they...
Models are the cornerstone of Model-Driven Engineering (MDE). Their size is constantly growing, becoming one of the main problems when it comes to manipulating them, via model-to-model transformations, model-to-text transformations or simply parsing them. In this paper we propose a way of distributing Ecore models representing them as JSON and URLs as identifiers, since HTTP is one of the most successful...
Captology is an acronym, derived from Computer As Persuasive TechnOLOGY, where the instance persuasive, (lat. persuasibilibus - enticing), refers to the convincing persuasion caused by computer technology. Transitive and interactive technologies as intelligent systems, have imposed, by their persuasivity, “the cult of information”, after which the information became type of goods that as utilitarian...
The article treats with the integration of an elaborate Lexicon Extended Language which is denoted all in the interconnected reuse process. The eLEL is a lexicon rich in information and allows to describe a software component such as: its identification, its notion, its behavior and its different characteristic. From this lexicon, we proposed a reused environment that included three processes, namely...
Intrusion detection in computer networks is a important topic in information security. Due to numerous cases of security breaches that caused economic and social losses in recent years, this topic has been the subject of several studies in order to mitigate problems related to network intrusion and computer attacks. Information security systems have been using different techniques for network intrusion...
In this study is explored the changing path of e-Learning discipline since its appearance to nowadays. E-Learning has evolved in different ways in different sectors therefore it might have different implications in certain periods of time in certain sector. A small number of things have changed in the last half century as much as the way we learn. Consequently, a significant research is going on throughout...
We optimize and compare the performance of different deep learning architectures for awareness on a sidewalk using small form factor devices such as Raspberry Pi 3. Our main objective is to find deep learning architecture that is complex enough to accurately classify a set obstacles on the sidewalk. Out selection criteria are: minimum number of parameters, lower power consumption, and robustness against...
Differential privacy is a formal mathematical standard for quantifying the degree of that individual privacy in a statistical database is preserved. To guarantee differential privacy, a typical method is adding random noise to the original data for data release. In this paper, we investigate the basic conditions of differential privacy considering the general random noise adding mechanism, and then...
In this paper, synthesising tango choreographies from tango dances is aimed. This system takes tango dance patterns performed by human dancers as input and produces choreographies that are represented in 3 dimensional virtual environment. Dance figures obtained by motion capture system are segmented automatically and analyzed with regard to weight center to form the dance database. Choreographies...
Parking in modern world is always a subject of concern and isn't a task to be ignored as it was in old days. With modernization and introduction of digital devices, machines have taken a very important and irreplaceable role in human life. Parking nowadays is also done with the help of much advanced and sophisticated systems. The problem with most of these system is that they need a very high capital...
NewsOne is a dedicated platform that aggregates all the latest news updates from multiple national and international resources and summarizes them to present in a short and crisp words. This online platform provides a service oriented interaction among the users from across web. The main motto of this application is to access the news fast. It will bring news directly without wasting any time for...
SIFT-based identification techniques have been broadly criticised in biometrics due to its high false matching rate. To overcome this weakness, a new method for SIFT-based palmprint matching, called the Self Geometric Relationship-based matching (SGR-Matching) is presented. While existing matching techniques consider only the relationship between the SIFT-points of the query image on one hand and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.