The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Web mapping services have been offered by many companies. To choose an appropriate online mapping platform, it is important to be able to quantify and compare the quality of the different platforms, in different geographic areas. Most previous research comparing the quality of online maps has used a manual approach. Manual quality evaluation is labor-intensive and difficult to replicate in new geographic...
This paper describes methods for evaluating automatic speech recognition (ASR) systems in comparison with human perception results, using measures derived from linguistic distinctive features. Error patterns in terms of manner, place and voicing are presented, along with an examination of confusion matrices via a distinctive-feature-distance metric. These evaluation methods contrast with conventional...
Fault localization techniques have been applied to database and data-centric applications that use SQL or SQL-based languages. However, existing techniques can only identify the SQL statements that have faults, but not determine the precise location of the faults within SQL statements. Since SQL statements can be rather complex, programmers are still left with a difficult repair chore. We propose...
For innovation to be successful, it is necessary for the adequate resources to be readily available. Commonly, resource availability results from significant technical, regulatory and scientific investments. Regulatory bodies, like the Federal Communications Commission, have made significant efforts in order to promote innovation. Innovation comes from entities of different sizes and areas of impact,...
One way to make more spectrum available is through white space sharing, where secondary spectrum users are allowed to transmit from any location except inside exclusion zones (EZs) that are drawn around primary spectrum users (PUs). However, EZ boundaries reveal the locations of PUs, and for some devices, location privacy is extremely important. Location privacy can be improved by increasing the area...
Antenna design starts with a desired electrical performance, stating the minimum gain, beamwidth and/or other parameters, across a specified bandwidth. An antenna type is chosen, and then trial-and-error is used to choose the dimensions, usually in conjunction with computer simulation. This paper introduces an antenna design tool called the Antenna Design Software (ADS) which accepts the desired electrical...
This work is dedicated to study the IO characteristics of SQLite transaction in Android platform. We collect the block level IO trace from for six months. We develop an elaborate pattern matching algorithm. It allows us to identify the individual SQLite transactions from the raw IO trace, which is essentially an interleaved mixture of IO requests from concurrently running smartphone applications....
Elasticity is a key component of modern cloud environments and monitoring is an essential part of this process. Monitoring demonstrates several challenges including gathering metrics from a variety of layers (infrastructure, platform, application), the need for fast processing of this data to enable efficient elasticity and the proper management of this data in order to facilitate analysis of current...
This paper discusses two important works. First work deals with extraction of key features from standard face databases. The data mined from the face databases consist of information related to number of facial images, male and female, different facial expressions, different poses, illumination conditions, facial image file format, synthetic faces, masked faces, infrared faces and number of subjects...
Network efficiency and proper utilization of its resources are essential requirements to operate wireless networks in an optimal fashion. Cognitive radio aims to fulfill these requirements by exploiting artificial intelligence techniques to create an entity called cognitive engine. Cognitive engine exploits awareness about the surrounding radio environment to optimize the use of radio resources and...
This paper presents method for acquisition and processing status data of mobile devices. In this research smartphone, tablet PC, VANET or MANET nodes are regarded as mobile devices. The proposed method utilizes gathering information about state of hardware modules and network around the mobile device. Then the acquired information is processed in order to determine the metrics of mobile device which...
With the increasing use of digital technologies, online social networks are emerging as major means of communication. Recently, social networks such as Facebook and Twitter are also being used by consumers, care providers (physicians, hospitals), and government agencies to share health related information. The asymmetric user network and the short message size have made Twitter particularly popular...
Currently, all kinds of Location-based Services (LBS) are gradually demanding more location information of mobile users. The WiFi-based indoor positioning technologies have been investigated intensely. However, both positioning accuracy and stability are often degraded by RSS detection variance between different devices. To solve the two problems, this paper proposes a compensation strategy for RSS...
As the cyber-attack trends are shifted from the volumetric attacks to the multi-layered attacks, it is more difficult for the IT administrators to find those attack attempts within their system and networks. However, vulnerability assessment is not easy due to the complex connections between multi-layered applications, servers, and networks. There are many security functionalities, but it is hard...
Almost all e-commerce websites generates recommendations for their users but most of them are irrelevant. Collaborative filtering is one of the most widely used recommendation generation technique by e-commerce websites. Collaborative filtering generates recommendations for the target user from the collaboration of the other users who have the similar interest derived from their ratings. With the...
This paper addresses the problem of determining whether an observed subject has already been seen in a stream of biometric samples. Given a new sample, unlike the common practice of comparing a related match score to a constant threshold, this work introduces a function which takes as input the match score and the position of that sample in the stream, and produces as output a duplicate/non-duplicate...
For images taken from very different viewpoints, we propose a new feature matching algorithm that provides accurate matches while preserving high matchability. Our method first synthesizes images by simulating the viewpoint changes. It then learns variation of local feature descriptors induced by the viewpoint changes. Finally, we robustly match feature descriptors by measuring the similarity using...
Feature selection from facial regions is a well-known approach to increase the performance of 2D image-based face recognition systems. In case of 3D modality, the approach of region-based feature selection for face recognition is relatively new. In this context, this paper presents an approach to evaluate the discrimination power of different regions of a 3D facial surface for its potential use in...
Shopping of the same or similar types of products as shown in the online TV programs has been highly desired by many people, especially the youth. To meet this eminent market need, we develop a prototype system to enable effortless TV-to-Online (T2O) experience. A key component of this system is the product search that maps specific items embedded in the video into a list of online merchants. The...
Medical Reports are amongst the most intensive and diverse processes in a Hospital Management Information System. In this paper, we propose an efficient and end-to-end framework for generating investigation test reports. The framework involves a novel template designer for result entry, an structured format for storing result entry template and data into XML suitable for lab reports and Electronic...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.