The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Due to massive growth in digital media for communication, the number and size of videos being generated and accumulated is increasing and hence searching desired content from the video is becoming more complex. As text in videos provide additional information on the content of the videos, methods for text based retrieval is desired. This paper presents an approach to retrieve video clips having similar...
Crime pattern theory emphasize how crime appear from Spatio-temporal method. To get knowledge on crimes, it has to be studied in terms of space and time. Crime patterns and crime related activities research those spatio (location) distribution of crimes, omitting the temporal (time) dimensions. Exactly separation of crimes by space and time, example hour of a specific day, day of a specific week,...
The blockchain has fueled one of the most enthusiastic bursts of activity in applied cryptography in years, but outstanding problems in security and privacy research must be solved for blockchain technologies to go beyond the hype and reach their full potential. At the first IEEE Privacy and Security on the Blockchain Workshop (IEEE S&B), we presented peer-reviewed papers bringing together academia...
This paper presents a comparative study of four steganalysis techniques for speech/audio files. The Mel-Frequency Cepstral Coefficients (MFCCs) are used for the acoustical analysis of the audio files. The following steganalyzers are assessed: Support Vector Machines (SVMs), Gaussian Mixture Models (GMMs), Deep Belief Networks (DBNs) and Recurrent Neural Networks (RNNs). These steganalysis methods...
We demonstrate DANCE, a system that assists domain experts in the efficient resolution of integrity constraints violation. DANCE is demonstrated on the UEFA Champions League database, employing the ICDE'17 audience for effective data cleaning.
Oracle's Real Application Cluster (RAC) allows multiple database instances to run on different server nodes in a cluster against a shared set of data files. A critical aspect of an Oracle RAC system is that of instance recovery. When a node suffers from a hardware failure, or a database instance suffers from a software failure, instance recovery is performed by a surviving instance to ensure that...
In this paper, we address the problem of sampling from a set and reconstructing a set stored as a Bloom filter. To the best of our knowledge our work is the first to address this question. We introduce a novel hierarchical data structure called BloomSampleTree that helps us design efficient algorithms to extract an almost uniform sample from the set stored in a Bloom filter and also allows us to reconstruct...
This paper explores the causality and responsibility problem (CRP) for the non-answers to probabilistic reverse skyline queries (PRSQ). Towards this, we propose an efficient algorithm called CP to compute the causality and responsibility for the non-answers to PRSQ. CP first finds candidate causes, and then, it performs verification to obtain actual causes with their responsibilities, during which...
Here, we have focused to process inconsistent data through imprecise queries from a database which consists of neutrosophic and vague set. Neutrosophic set is based on truth, indeterminacy and false membership values where as vague set is based on truth and false membership value. Firstly, we have applied two different similarity measure formulas to measure closeness of two neutrosophic data and vague...
Fault localization is very important to both researchers and practitioners. Running tests is a useful approach to identify the fault location. Researchers have studied how to automatically identify faults in database applications [1], [2], [3]. However, those research considers the entire SQL statement as one line of code, indicating that the whole SQL statement contains errors. Little attention has...
In this paper, we have proposed a smart ration card using Radio frequency identification (RFID) technique, biometrics and SMS gateway to prevent the ration forgery. In this system, a RFID tag is used that carries family member details and the customer needs to show this tag at the ration shop. The user will also have to provide thumb impression on the biometric machine. If the user is found authentic...
Identification and apprehension of criminals by matching facial sketches with photographic faces is one of the major law enforcement applications of the modern world. Majority of the crime occur where there will not be any information available regarding the suspect. In such situation, forensic sketch artist who usually deals with the eyewitness of the crime or victim in order to draw the sketch that...
A knowledge about test activity is valuable information. To store and share the knowledge across software development projects is a key to achieve effective and efficient test activity. We have built a knowledge database about test types to reuse in new projects. However, the intentions of the test types are often misinterpreted when they are reused because of inappropriate descriptions of the test...
Source code reuse is a common practice in software development. Since industrial developers may accidentally reuse source files developed by open source software, clone detection tools are used to detect open source files in their closed source project. To execute a clone detection, developers need a database of existing open source software. While a web-service providing clone detection using a centralized...
A modern development in time and technology requires faster information broadcasting. United, personalized, intelligent information applications are more significant in business and private lives. Such appliances are cell phones, two-way pagers, personal organizers, screen phones, etc. An ACC (Android College Campus) is an application to access the organization and particularly by students well over...
The main aim of recognising gestures is to build a system that can identify human gestures that are specific and then to use them to put forth desired information to the device. By using mathematical algorithms, human gestures can be interpreted. This is referred to as Gesture Recognition. Mudra is an expressive form of gesture that is mainly used in Indian classical dance form where the gesture is...
Information retrieval and integration of web data is recent trend in today's world of technology. Huge amount of data is available in online repositories but most of it is hidden under deep web interfaces. As deep web is growing at a very fast rate it is becoming difficult to efficiently locate the deep-web interfaces and retrieving the required data. The large volume of web resources and the dynamic...
Networked Virtual Environments (NEV) are sets of disjointed virtual worlds which are topographically set apart from the users yet connected through the communication network to give them the illusion of being in the same virtual location. NVEs are increasingly receiving consideration from business and research point of view. Contrasted with various sorts of possible applications, NVEs require a high...
We present a set of protocols for creating a secure processing tree used for completing a task without divulging critical information. We analyze the information that is exchanged during the protocols and the effect of compromising participants.
Mobile phones are widely used in our day-to-day life. It's not only used by a common man but also used by antisocial elements and that's why it's not a surprise that today in almost every case the first step towards solving a Crime is to analyze the Call Records of the Suspects. Today in almost all the criminal cases, analysis of Mobile Phone calls of suspect's plays an important role in investigation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.