The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Data mining techniques is a popular research area. Association rule mining is the technique used to detect rules and patterns. One of the most well-known techniques is the Direct Hashing and Pruning (DHP) algorithm. This algorithm tries to find associations among the various data items in the date warehouse. In this paper, the attempt was made to optimize this algorithm further by changing its data...
SHA-1 remains, till date, the most widely used hash function, in spite of several successful cryptanalytic attacks against it. These attacks, however, remain impractical due to high computation complexity and associated cost. We endeavor to do cost-time product estimation for an attack by the aid of application-specific hardware acceleration. This work proposes an Application-Specific Instruction-set...
The detection of vulnerabilities in computer systems and computer networks as well as the weakness analysis are crucial problems. The presented method tackles the problem with an automated detection. For identifying vulnerabilities the approach uses a logical representation of preconditions and postconditions of vulnerabilities. The conditional structure simulates requirements and impacts of each...
Homomorphic encryption is a novel encryption method for it enables computing over encrypted data. This has a wide range of real world ramifications such as being able to blindly compute a search result sent to a remote server without revealing it's content. In this paper we summarize how SQL queries can be made secure using a homomorphic encryption scheme based on the ideas of Gahi, et al [1]. Gahi's...
In this paper we consider privacy-preserving multimedia content identification for a cloud based Bag-of-Feature (BoF) framework. We analytically model how geometric information can be used as a shared secret and derive the tradeoff between identification capability, privacy and computational load. In addition we suggest a descriptor ambiguization method that introduces uncertainty to the server with...
With the help of location-aware mobile device user can issue a query and obtain information on nearest point of interest as it moves within a spatial network. This evolving computing paradigm offers great level of convenience to information access and usage. Nevertheless, the convenience comes with a price in the form of exposing user private information to potential abuse and misuse. This paper proposes...
Private information retrieval (PIR) protocols allow a user to retrieve a data item from a database without revealing any information about the identity of the item being retrieved. Specifically, in information-theoretic k-server PIR, the database is replicated among k non-communicating servers, and each server learns nothing about the item retrieved by the user. The cost of PIR protocols is usually...
Recently, state-of-the-art recognition accuracies for pose-invariant face recognition have been achieved by using 2D-Warping methods in a nearest-neighbor framework. However, the main drawback of these methods is the high computational complexity. In this paper we address this issue. We use a simple and fast method to get a rough estimate of a 2D-Warping. This estimate can then be used to apply an...
This paper presents a face segmentation technique that works on a hierarchical region-based representation of the image. The algorithm bases its analysis strategy on a reduced set of regions that represent the image content at different scales of resolution. For each region, a set of simple one-class classifiers that rely on different shape, color and texture attributes is evaluated. The outputs of...
In the modern retailing industry, many enterprise resource planning (ERP) systems are considered legacy software systems that have become too expensive to replace and too costly to re-engineer. Countering the need to maintain and extend the business value of these systems is the need to do so in the simplest, cheapest, and least risky manner available. There are a number of approaches used by software...
Highly expressive declarative languages, such as Datalog, are now commonly used to model the operational logic of data-intensive applications. The typical complexity of such Datalog programs, and the large volume of data that they process, call for the tracking and presentation of data provenance. Provenance information is crucial for explaining and justifying the Datalog program results. However,...
Although there is a requirement for English to Indian language translation, there are no proper and enough tools for the translators to use, because of the complexities involved in it. The research in developing Machine translation systems is going on but they are not yet to the stage of product or useful systems development. Major reason is the word level, phrase level and semantic level translation...
Advanced learning technologies integrate questions as a very relevant function in building e-Testing systems and especially in intelligent tutoring systems. Therefore, a huge challenge is the generation of a necessary and relevant assessment content. The existing efforts to realize open source learning materials and establishment of massive open online courses introduce another challenge for realization...
In this paper we consider the problem of comparing complex trees stored in a database. We propose a two-step algorithm which compares two arbitrary trees and returns the difference. We employ the hash value for node comparison since the entities may not have the same properties, and the properties themselves may not be primitive (integer, boolean, etc.). We give a comparison in performance using recursive...
Problem-based learning (PBL) is a way to learn what is needed to solve a problem, how can a solution be obtained quickly, precisely and professionally. To achieve the goal of problem-based learning, problem design and assign same level of problems among the students are important in engineering classroom environment. SQL is a major part in Database course. In problem based e-Learning of SQL, it is...
Segmentation of highly cluttered indoor scenes is a challenging task and should be solved in real time to be efficiently used in such applications as robotics, for example. Traditional segmentation methods are often overwhelmed by the complexity of the scene and require significant processing time. To tackle this problem we propose to use incremental attention-driven segmentation, where attention...
Agent is a computing entity which mimics the behavior of a human being in problem solving strategy. Multi agents systems are the group of agents which have different tasks and work in cooperation, coordination and in communication to each other. Apart from wide applications in software engineering tasks, design, development and testing, it has a vital role in software maintenance also. Few effective...
This article proposes a novel data model for text corpora and discusses the issues on corpus query. First, a formalized definition of the corpus data is presented. Second, a data model is proposed in terms of the relational model, which is also proved to be complete. On this basis, we extend the query semantics of the traditional corpus query that generates KWIC (Keyword in Context) concordances and...
The rapid and disorganized electrical activity that characterizes Atrial Fibrillation generates an increases in both variability and complexity of RR intervals series. Based on these characteristics which are variability and complexity, we have developed an algorithm combining two nonlinear statistical techniques in order to detect the presence of Atrial Fibrillation. These two nonlinear statistical...
We construct the first schemes that allow a client to privately outsource arbitrary program executions to a remote server while ensuring that: (I) the client's work is small and essentially independent of the complexity of the computation being outsourced, and (II) the server's work is only proportional to the run-time of the computation on a random access machine (RAM), rather than its potentially...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.