The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Critical Paths Monitoring is an efficient technique to overcome transistor aging. A methodology to select critical paths to be monitored at design phase is proposed. A spatial correlation approach is used to perform Statistical Timing Analysis at design phase. Critical paths are selected for various aging workload profiles to avoid worst-case assumptions. The results show that up to 16x less paths...
We study a multi-user up-link scenario where an attacker tries to impersonate the legitimate transmitters. We present a new framework for deriving a posteriori attack proba- bilities from the channel observations at the access point, which enables fast intrusion detection and authentication at the physical layer and can be exploited to reduce the security overhead by offloading higher-layer authentication...
This paper presents an improved kernelized correlation filters method for implementation on embedded hardware platforms. A software realization of the improved tracking method is developed and tested. The proposed method implemented on a personal computer platform can easily track any objects in real-time, and the same opportunity exists for the ARM platform (CPU Cortex-A8, frequency 1 GHz), but for...
In this study we address the problem of recovering a clustering of a dataset based on several clusterings provided by different experts. These experts provide clusterings on different levels (coarser or finer than the others). We present an automatic algorithm that combines the information provided by the experts into a single clustering that can be viewed as the average point of the input clusterings...
As Electrocardiogram (ECG) signals is concern, the second lead is most dominant among the twelve leads. Many techniques are available for human authentication purpose but most of them are untrusted and unsecured. Biometric based authentication system is secure, unique and more reliable for an individual. It deals with the human biometric characteristics such as teeth, face, finger, iris, voice, signature...
In this paper, an algorithm for accurate distance estimation of a vehicle to a road side unit (RSU) in urban multipath environments is presented. The algorithm is based on spatial filtering using a uniform circular array (UCA) antenna and a cross correlation based time delay detection. The time base for the cross correlation is built using Global Navigation Satellite System (GNSS) based positioning...
Data collection in wireless networked sensing systems (WNSS) is usually not reliable due to sensor faults and/or security attacks. This makes detection of an event (e.g., structural damage) through data aggregation unreliable. In this paper, we propose a trustworthy and protected data collection (TPDC) framework for event detection in WNSS. This framework facilitates reliable data for aggregation...
Subjective experimental results are widely used as the ground truth in objective Image Quality Assessment (IQA). Specifically, Pairwise Comparison method has superiority over Mean Opinion Scores (MOS), but there is a problem when measuring the consistency between subjective pairwise comparisons and objective quality predictions. In this paper, we first analyze the existing problem of current evaluation...
Photo Response Non-Uniformity (PRNU) noise based source attribution is a well known technique to verify the source camera of an anonymous image or video. Researchers have proposed various counter measures to PRNU based source camera attribution. Forced seam-carving is a recently proposed counter forensics measure that was proposed to defeat PRNU based source attribution by disturbing the alignment...
In this paper, we address the problem of heavy occlusion where the negative samples contaminate the translation model. In this setting, we decompose the task of tracking into translation and scale estimations of objects. We use hierarchical convolutional features to estimate target position and update translation model, and we use HOG features for the scale filter. In addition, we evaluate the translation's...
This paper presents a full-reference image quality estimator based on SIFT descriptor matching over reliability-weighted feature maps. Reliability assignment includes a smoothing operation, a transformation to perceptual color domain, a local normalization stage, and a spectral residual computation with global normalization. The proposed method ReSIFT is tested on the LIVE and the LIVE Multiply Distorted...
The automation and systemisation of the next generation of cognitive assessment approaches have the potential to change how clinicians assess and interact with patients. This may be especially pertinent in the case of delirium, as current methods often rely on the subjective opinion of clinicians and specialists, with potential for the condition to be overlooked or misdiagnosed. Currently, one of...
Due to the advantages of joint level tests, such as low cost and flexibility, it is always desirable to predict the board level pad cratering strength by a joint level test. In order to achieve this objective, the correlation between the joint level and the board level tests must be fully understood. Nevertheless, a precise correlation between the two types of tests for pad cratering evaluation is...
The industrial, scientific and medical band is widely used by different wireless systems. The identification of other wireless technologies in the common environment is one of the keys for correct system coexistence. In this work, a sensing platform for the detection of IEEE 802.11g and IEEE 802.15.4 primary signals in the 2.4 GHz band is proposed. The sensing platform makes use of a combined scheme...
This study presents a new algorithm to adaptively detect change points of functional connectivity networks in the brain. It uses scans from resting-state functional magnetic resonance imaging (rsfMRI) which is one of the major tools to investigate intrinsic brain functionality. Different regions of the resting brain form networks that change states within a few seconds to minutes. The change points...
Most of extant works, focusing on disposing of invalid and erroneous information from certain sensors in a multi-sensor system, generally process the data from the same time point, which leads to incredibility in some certain moment. To solve this problem, this paper proposes a method to detect and order the credibility of every sensor from the perspective of both specific time points and time axis,...
In visual object tracking, exploiting correlation filters to track the target of interest has been flourished, and, by adopting a circulant form of an image or feature descriptors jointed with the convolution theorem, these correlation filter trackers surpass many of the previous state-of-the-art trackers in both tracking speed and stability. Nevertheless, when the appearance of the target object...
In this paper, a novel non-integer times frame rate up-conversion (NIFRUC) algorithm using reliable analysis of time-domain motion information is proposed. The proposed method can realize frame rate up-conversion (FRUC) of any fractional multiples based on double FRUC. In addition, in order to eliminate motion jerkiness and motion blurring, the proposed method makes full use of motion information...
In this short paper we present a socio-technical framework for integrating a security risk escalation maturity model into a security information and event management system. The objective of the framework is to develop the foundations for the next generation socio-technical security information and event management systems (ST-SIEMs) enabling socio-technical security operations centers (ST-SOCs)....
This study aims to generate empirical evidence on the validity and reliability of Perception of Online Collaborative Learning Questionnaire (POCLQ) using Rasch model. The questionnaire was distributed to 32 (N=32) Diploma Hotel Catering students from Politeknik Ibrahim Sultan, Johor (PIS). Data obtained was analysed using WINSTEP version 3.68 software. The finding showed that POCLQ had high reliability...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.