The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The research presented in this paper offers a way of supporting the security currently in place in critical infrastructures by using behavioural observation to add to the Defence in Depth (DiD). Our approach is proactive and continually looks to identify patterns or behaviour, which is out of place in the ordinary operations of the infrastructure. As this work demonstrates, applying behavioural observation...
This paper shows the application of statistics techniques, simulation and optimization methods for data - based scheduling production. The software of this methods, allows us to analyze the process construction rules for many variants reflecting a variety of combination other factors. For the analysis of the production process the greedy randomized adaptive search procedure (GRASP) and simulation...
Mathematical analysis of existing data mining methods is not straightforward and in many cases it is not possible. Therefore, simulated data plays a central role in validation of data mining results in a given situation, i.e., noise, missing value and multicollinearity levels. This paper proposes a longitudinal binary data simulation focusing on presentation of the major challenge of infusing user-defined...
A reversible data hiding method is widely used in medical application and military application which do not allow distortion of image after data extraction. Conventional method modify pixel value adaptively based on statistics of neighbor pixels. Although the conventional method achieves high capacity, it makes significantly distorted stego image. Significant distortion of stego image is not acceptable...
In order to improve the quality of H.264 video transmission in wireless networks, a data hiding based adaptive error recovery approach is proposed in this paper. With this approach, the important data for each macroblock (MB) of the H.264 intra-coded I frame are extracted adaptively at the encoder and embedded into the RTP header of the next frame. At the decoder, if the important data for a corrupted...
As high performance computing approaches exascale, CPU capability far outpaces disk write speed, and in situ visualization becomes an essential part of an analyst's workflow. In this paper, we describe the ParaView Coprocessing Library, a framework for in situ visualization and analysis coprocessing. We describe how coprocessing algorithms (building on many from VTK) can be linked and executed directly...
Reversible data hiding can be classified into two major research branches, one is by use of the histogram of original image, named the H scheme, and the other is by manipulating pixel relations between adjacent pixels, called the difference expansion (DE) scheme. Both schemes have their own advantages and drawbacks, but the inherent characteristics of original image are seldom considered in existing...
Digital watermarking has been an effective means for copyright protection and digital rights management (DRM). One of the current trends for researches in this field would focus on reversible data hiding. Considering the ease of implementation and employing the inherent characteristics of original images, we propose our reversible data hiding algorithm with the rhombus relationships of original pixels...
In order to decrease the number of misclassification of attacks, the application of data mining technology on the intrusion detection was studied in depth. Firstly, the study background was introduced, and then the basic theory of intrusion detection system was analyzed, and then the basic theory of data mining technology was discussed and the mode of data mining was established, and the algorithm...
Traditional rough set of noise data, the lack of adaptability, lack of flexibility or robustness, for the engineering data can not distinguish between equivalence classes of edge region of overlap with the collection, resulting in loss of many valuable engineering information. Strong noise in the actual engineering data over-fitting due to reduced ability to distinguish the object, its limitations...
In this work is proposed the design of a system to create and handle Electric Vehicles (EV) charging procedures, based on intelligent process. Due to the electrical power distribution network limitation and absence of smart meter devices, Electric Vehicles charging should be performed in a balanced way, taking into account past experience (spread in a social network). In order to allow information...
Data mining is an important tool in knowledge discovery. It aims at discovering the valuable patterns hidden in large volume of data. In a distributed environment, the main problem we need to consider for data mining is how to transfer the minimal amount of data and provide maximum sharing of information with the continued expansion of business scale and constant update of services content. For high-dimensional...
In this foreword, we summarize the IEEE ICDM 2010 Contest: “TomTom Traffic Prediction for Intelligent GPS Navigation”. The challenge was held between Jun 22, 2010 and Sep 7, 2010 as an interactive on-line competition, using the TunedIT platform (http://tunedit.org). We present the scope of the ICDM contest series in general, the scope of this year's contest, description of its tasks, statistics about...
The relationship between parameter configurations of mechanical products are the main design rules that affect their work performance and the major factor that optimize product structure. However, the actual relationship of parameter configurations can't be gotten directly in the design specifications or the manual. Physical experimental methods are difficult to implement due to long cycle and high...
To extract the target location correctly in PHD based multi-target tracking algorithm, an improved peak extraction algorithm was proposed. This new algorithm stemmed from the CLEAN technique in radar signal processing. By finding the highest peak in every iteration, the assumed target was extracted and its corresponding location information was obtained. Simulation results prove the efficiency and...
The following topics are dealt with: language technologies-an infrastructure for information society; networking, grids, middleware and distributed platforms; business intelligence, information systems and databases; knowledge management and collaboration systems; human computer interaction; technology enhanced learning; information technology in business and government; data mining, statistics and...
Space rendezvous is the foundation of space operation and application. In this paper, mission planning of long distance guidance stage for space rendezvous is discussed. Two-impulse rendezvous is solved by analyzing Gauss problem. Based on Battin-Vaughan algorithm, ergodic calculation is performed for different combination of initial position and transfer time. To carry out the mission planning for...
Sound agents is an art installation relating real space and virtual sound space. It follows previous work on virtual agents and autonomous characters in 3D immersive spaces. However in sound agents, each virtual entity will not be a visual character but an invisible sound agent producing music, which will have its own autonomous behavior. Therefore the ambient music is dynamically spatialized in the...
Handover happens among access points which not only belong to the same network, but also belong to various networks. Handover decision algorithm is one of key issues which decides when and how handover happens. In this paper, a novel handover decision algorithm shielding physical realization of various networks is proposed, which uses GRA (Grey Relational Analysis) method and GPS(Global Position System)...
Generally, the environment and enterprises' condition are not stable, in order to promote the enterprises' competitive power, managers must continuously improve the business processes' performance. Based on the simulation method and multi-objective optimization theory, the thesis builds a dynamic multi-objective optimization model for business process optimization. Firstly the framework of optimization...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.