The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In recent years, millions of people are connected on social networks. Social networks have become an excellent platform for sharing information and communication that reflects real world relationships. This global use of social networks has made them to be an excellent candidate for using cloud. As a result, numerous access control methods have been proposed to maximize available resources. In addition,...
Entity-Relationship (ER) models are usually used to design a database application in the industry. Therefore, ER models are taught in database courses at many schools offering tertiary education. However, teaching ER modeling effectively is a challenge for the instructors. The research presented in this paper is based on our previous work that had identified frequent modeling errors. This paper identifies...
Representation-based classifiers (RCs) including sparse RC (SRC) have attracted intensive interest in pattern recognition in recent years. In our previous work, we have proposed a general framework called atomic representation-based classifier (ARC) including many popular RCs as special cases. Despite the empirical success, ARC and conventional RCs utilize the mean square error (MSE) criterion and...
Trust fosters cooperation in social interactions. It is widely studied in applied and academic disciplines. However, trust is a hard concept to define. Network analysis of the Web of Science citation databases shows it has multiple meanings and applications even within Computer Science. To date general models of trust are essentially conceptual, whereas workable proposals focus on special situations...
We propose a novel geometric framework for analyzing spontaneous facial expressions, with the specific goal of comparing, matching, and averaging the shapes of landmarks trajectories. Here we represent facial expressions by the motion of the landmarks across the time. The trajectories are represented by curves. We use elastic shape analysis of these curves to develop a Riemannian framework for analyzing...
Improving accuracy of matching fingerprint images acquired from two different fingerprint sensors is an important research problem with several promising studies in the literature. Most of these studies focus on sensor interoperability using fingerprints acquired from different kinds of contact-based sensors. However emerging contactless fingerprint technologies have shown its benefits. This paper...
The growth of the Internet of Things (IoT) creates the possibility of decentralized systems of sensing and actuation, potentially on a global scale. IoT devices connected to cloud networks can offer sensing and actuation as a service enabling networks of sensors to grow to a global scale. But extremely large sensor networks can violate privacy, especially in the case where IoT devices are mobile and...
Frequent sequence mining methods often make use of constraints to control which subsequences should be mined, e.g., length, gap, span, regular-expression, and hierarchy constraints. We show that many subsequence constraints—including and beyond those considered in the literature—can be unified in a single framework. In more detail, we propose a set of simple and intuitive "pattern expressions"...
SQL injection is the most common web application vulnerability. The vulnerability can be generated unintentionally by software developer during the development phase. To ensure that all secure coding practices are adopted to prevent the vulnerability. The framework of SQL injection prevention using compiler platform and machine learning is proposed. The machine learning part will be described primarily...
Walking speed change is one of the most common cofactor that affects the gait signature. The intra-class variations increases by the changes of walking speed and the training data set fails to model the variations. As a consequence, the performance of the gait recognition systems is degraded. Naturally, human reconstruct the model by considering the unaffected body parts to recognize a person when...
To retrain an existing multilayer perceptron (MLP) on-line using newly observed data, it is necessary to incorporate the new information while preserving the performance of the network. This is known as the “plasticitystability” problem. For this purpose, we proposed an algorithm for on-line training with guide data (OLTA-GD). OLTA-GD is good for implementation in portable/wearable computing devices...
In this paper we present a new Smart Online Vehicle Tracking System for Security Applications (AMOTSSA) and we describe how it can be modelled and implemented as a Big data application. In order to model AMOTSSA as a big data application, we argue our design choices that meets its specific data and processing needs and we present a set of data analytic algorithms that would achieve a set of investigation...
Prioritizing a database of items in response to a given query object is a fundamental task in information retrieval and machine learning. We examine a specific realization of this problem in the context of a collection of biomedical articles. Given a query PubMed article, we investigate the problem of identifying and ranking recommended papers that are topically related to the query article. The two...
Although it is possible to design and manufacture MPSoCs with hundreds of processors, there is still a gap in the ability to debug hardware, software, and applications for such chips. Current state-of-the-art works related to MPSoC debugging suffer from poor integration, scalability in data storage, and simple graphical data representation. This work proposes a modular debugging framework to aid the...
Lysine succinylation is one of most important types in protein post-translational modification, which is involved in many cellular processes and serious diseases. However, effective recognition of such sites with traditional experiment methods may seem to be treated as time-consuming and laborious. Those methods can hardly meet the need of efficient identification a great deal of succinylated sites...
Cloud computing enables massive parallelization of execution of large scale simulation experiments but it is complex to do it in a cost-efficient way. We present methodology used to achieve this goal that was devised in the ROUTE-TO-PA project, where we develop a simulator for generalization of the dynamics of preferences observed on the social platform to the entire population. Experimenting with...
We develop a green simulation procedure that reuses simulation outputs of the current experiment to improve the computational efficiency of future experiments. We consider practical situations where idle computational resource is available after delivering a simulation answer within given time limit. When used correctly, such idle resource can be valuable simulation investment that can benefit future...
Modeling and simulation in the aviation community is characterized by specialized models built to solve specific problems. Some models are statistically-based, relying on averages and distribution functions using Monte-Carlo techniques to answer policy questions. Others are physics-based, relying on differential equations describing such phenomena as the physics of flight, communication errors and...
Simulation-based acquisition (SBA) is a robust, collaborative use of modeling and simulation (M&S) technologies that are integrated across acquisition phases and programs. Our research goal is to quantitatively show the benefits from M&S in SBA. To that end, we should consider costs arisen from the use of M&S in SBA, e.g., development costs related with M&S. This paper presents a simulation...
For text-independent short-utterance speaker recognition (SUSR), the performance often degrades dramatically. This paper presents a combination approach to the SUSR tasks with two phonetic-aware systems: one is the DNN-based i-vector system and the other is our recently proposed subregion-based GMM-UBM system. The former employs phone posteriors to construct an i-vector model in which the shared statistics...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.