The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the past two decades, targeted online advertising has led to massive data collection, aggregation, and exchange. This infrastructure raises significant privacy concerns. While several prominent theories of data privacy have been proposed over the same period of time, these notions have limited application to advertising ecosystems. Differential privacy, the most robust of them, is inherently inapplicable...
Nowadays, many requirements must be fulfilled in relation to the application of agrochemicals in different productive stages of the export fruit in Chile. Agronomists in charge of productive orchards should consult different sources of information before proceeding to apply a certain product. This is based on technical guides and protocols that are also modified from time to time, which implies a...
Many web-based online learning systems focus more on textual and/or image based content delivery without including experiment systems, or if included they are usually operated under pre-defined conditions, such as fixed scenarios and pre-determined delivery orders. These limitations hinder personalized learning and collaboration between students and discourage student engagement. To circumvent these...
A thorough literature research is usually the first step when dealing with a novel topic in science. Regarding the medical domain, a popular starting point for this task is the web based search engine PubMed, which has an index of over 27 million medical publications from the MEDLINE database and other sources. Given certain search terms of interest, e.g. neurodegeneration or the drug FTY 720, results...
In this paper, we present a novel model and visualization approach for heterogeneous sources of data. We represent our data by using a model inspired by STIX. Then, we use clustering algorithms to select interesting information to explore in a visualization panel. The visualization is based on a 3D graph representation that highlights the link between malicious event and allows to focus on relevant...
Dry and wet fingers lead to poor fingerprint quality, which means that it has impact for fingerprint recognition and matching. Recognition methods that are based on the feature of ridge, valley, minutiae or pore are affected by skin conditions. In this paper, we propose a novel dry fingerprint detection method for images with different resolutions using ridge features. The dry fingerprints have vague...
This work proposes a biometrie identification system based on electrocardiographic signal, for online applications. To acquire the signal, the NI MyDAQ and the AD8232 Heart Rate Monitor module were used. Once the signal was digitized, filtering was applied and algorithms to process the signal were designed to detect the fiducial markers of the signal, such as the R peak, the Q wave, the ending of...
We have proposed a new form of action recognition using motion sensors built in mobile and wearable devices. Due to the miniaturization of hardware sensors, action classification through mobile sensors has become a much more attainable task. Using Android and Tizens integrated development environment, we have devised applications for each of these devices to document raw sensor data for analysis....
One of interesting problems, arising with deployment of large-scale systems, is integration of its nodes (systems / devices). In this work, we discus how to apply semantic technologies, as a mechanism to support node integration and facilitate interoperability within the developed ecosystem. We focus on pragmatic aspects of the proposed solution, discussed from the perspective of the Dependable Embedded...
Representing reality in computer graphics requires simulating the appearance of real-world materials. Bidirectional Reflectance Distribution Functions (BRDFs) are commonly used to perform this task, as they represent the appearance of a material through the quotient between the reflected radiance and the incoming irradiance at this point. Acquiring the BRDF of a real material is an expensive task...
One of the biggest problems of today's internet technologies is cyber attacks. In this paper whether DDoS attacks will be determined by deep packet inspection. Initially packets are captured by listening of network traffic. Packet filtering was achieved at desired number and type. These packets are recorded to database to be analyzed, daily values and average values are compared by known attack patterns...
Internet of Things (IoT) refers to interconnectivity of different devices and services through applications, sensors and industrial equipments. A fundamental aspect of this interconnectivity is the transfer of the data from providers to requestors via a data transportation channel. However, the many-to-many relationship between the requestors and providers makes communication management difficult...
In small and home office (SOHO) computer networks, an intrusion detection system can be activated to intercept the possible attack. Network traffic analysis is the basis of attack detection methods. In the intrusion detection process, both hardware and software solutions are available, as well as in systems that are bundled together. Hosting these systems in SOHO networks is usually negligible because...
Prior work showed that in 2001 and 2003, workers in America who used spreadsheets or databases, and who did programming, earned 9 to 13% more than similar workers who did not use spreadsheets nor did programming. Such a fact, if still true, could help motivate workers to do programming and/or to create spreadsheets. This paper presents a study replicating these analyses using 2012 data. The results...
A design methodology is presented for a full-bridge Power Factor Corrector (PFC) converter with two control schemes: the well-known Continuous Current Mode (C.C.M) and Triangular Current Mode (T.C.M). The second one is an extension of the Discontinuous Current Mode (D.C.M). The converter is composed of one high frequency leg and one leg switching at the grid frequency and includes the EMC (common...
Today, people use the internet extensively to meet their information needs, to socialize, to communicate, to handle formal and informal processes. The web-based information networks established for this purpose are growing day by day and reach a larger audience. Facebook, the world's largest social network, has reached 2 billion users. There are social information networks established for different...
In this study, we apply machine learning algorithms to predict technical failures that can be encountered in Oracle databases and related services. In order to train machine learning algorithms, data from log files are collected hourly from Oracle database systems and labeled with two classes; normal or abnormal. We use several data science approaches to preprocess and transform the input data from...
Gender recognition from facial images has become one of challenging research problem in computer vision, security, verbal-nonverbal communication and human computer interaction applications nowadays. Because facial images include many information such as gender, facial expressions, age, ethnic origin in computer-aided applications, the success rate of the gender recognition depends on quality of facial...
According to the needs of users, Home Service Robots gradually work outside. As a result, new requirements for the detection and recognition performance of Home Service Robots are put forward. Compared with indoor environment, outdoor environment is more complex, which brings difficulties to detect objects. But extracting features by Histogram of Oriented Gradient (HOG) method can not work well in...
When shopping in a big supermarket, customers often encounter two inconvenient places. The first problem is that it is difficult to find the target goods. The second problem is that the checkout process takes a long time. In this paper, Radio Frequency Identification and two-dimensional code technology are used to solve these two problems. The intelligent supermarket system mainly contains the following...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.