The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Information and communication technology (ICT) in education has become the strategies of all countries and economies around the world to achieve enriching human resources and rapidly developing economy and society. The purpose of the ICT in education is to cultivate innovative talents and implement the modernization of education. This paper utilizes the assessment results and questionnaire data of...
Understanding the motive profile of users in virtual worlds, computer games or interactive simulation environments promises to complement research on game flow, player experience modelling and game data mining. Traditionally work in these areas examines statistics from users interacting with existing games. This paper takes an alternative approach and explores the design of artificial agents that...
Abstract-The IEEE 802.15.7 standard on visible light communications (VLC) proposes color-shift-keying (CSK) as a way to increase data rate while keeping a constant optical power. In this paper, we propose two algorithms to design codes by finite state machines (FSM) using newly introduced CSK constellations. These codes ensure a constant perceived color eliminating the use of the scrambler proposed...
With virtualization technique, cloud computing is developed rapidly. However, aspects of the collecting of digital proofs for forensics in cloud computing environment, certain guideline is not yet. Therefore, cloud forensic researches in progress for reactivating security incidents in cloud computing. In this paper, we analyze forensic issue, challenges, already proposed forensic model in previous...
Future avionics is no longer mere close electronic systems with the requirement changed, while it is pervasively controlled by dozens of frequent information exchange, open architecture and highly automatic systems. And this transformation has driven major advancements of security in avionics which contains computing security and communication security. Our team is focused on the security of next...
In this paper I discuss a goal-directed framework for reasoning in first-order logic based on conditions. It is proposed an interpretation of these conditions in terms of proof strategies that lead to the generation of automated advice based on a proof plan. The examined framework is compared with the well-known program Symlog.
The Hospital Value-Based Purchasing (VBP) Program is a Center for Medicare and Medicaid Services (CMS) initiative that rewards hospitals with incentive payments for the quality of care they provide to patients with Medicare instead of the quantity of procedures they perform. Although the VBP program has direct implications toward both patients and hospitals, no research has been reported in the literature...
We present results from an experiment in which 44 human subjects each interact with a dynamic system 40 times over a one-week period. For each interaction, a subject is asked to perform a command-following task. For each subject and each interaction, the dynamic system is the same; however, the task (i.e., reference command to be followed) is not necessarily the same. We use the experimental results...
In a previous paper [1] we introduced an optimized version of the K-Means Algorithm. Unlike the standard version of the K-Means algorithm that iteratively traverses the entire data set in order to decide to which cluster the data items belong, the proposed optimization relies on the observation that after performing only a few iterations the centroids get very close to their final position causing...
Military operations heavily rely on tactical data links to exchange command and control data allowing participants to gain an understanding of the operational situation. Since today most operations involve multiple nations cooperating on a mission these tactical data links are standardised e.g. as a NATO STANAG. However these standards are very complex and regularly updated to reflect technological...
Traditional Braille is a 6-dot code that can represent maximum 64 unique symbols with each braille cell. This is grossly insufficient to represent even ordinary English text (comprising 26 small letters, 26 capital letters, 10 digits, and 14 basic punctuations) — let alone math and science symbols. Thus a braille user has to enter 2 (and sometime 3 or 4) braille cells to enter one character or symbol...
Object instance recognition enables the realization of many potential applications, such as information retrieval, scene understanding and human computer interaction. However, it is still a challenging problem in computer vision. The appearance of an object is affected by variations in illumination, viewpoint and occlusion. In this contribution, we propose an object instance recognition method based...
A considerable amount of attributes in real datasets are not numerical, but rather textual and categorical. We investigate the problem of identifying outliers in categorical and textual datasets. We propose a clustering-based semi-supervised outlier detection method which basically represents normal and unlabeled data points as a bipartite graph. We leverage the existing free of parameters clustering...
We have investigated the effect of normalizing Japanese orthographical variants into a uniform orthography on statistical machine translation (SMT) between Japanese and English. In Japanese, 10% of words have reportedly more than one orthographical variants, which is a promising fact for improving translation quality when we normalize these orthographical variants. However, the results show that SMT...
This paper introduces a family of RoShamBo games, denoted by RSB(n,b,s,r) which means that n players simultaneously show a move among b possible moves with possible s winning regulations, at each round out of r round matches in total. The player who wins more after r rounds wins. A game informatical analysis of RSB(n,b,s,r) using game refinement measure is carried out, while experiments have been...
Chinese text categorization, which is a key technology of massive Chinese text data processing, has been applied to information retrieval, document management, text filtering, etc. However, the categorization accuracy has been the major difficulties faced by the application upgrade. To improve the performance of the Chinese text categorization, feature selection, as an important and indispensable...
There are different opinions on the names and quantity of semantic roles. In order to analyze the deep meaning of human language, we did two parts of tasks based on Chinese Semantic Dependency Graph Bank, which is a corpus analyzed by semantic dependency graph (SDG). After calculating the frequency of each role, we normalized the roles' names and distinguished the differences between each other. There...
Electrophysiology has recently evolved into an interactive, high-throughput endeavor. Recording from dozens to hundreds of electrodes is today routine; novel means of manipulating the system in real time, through electrical stimulation, optogenetics or sensory manipulation are allowing us to decipher neural circuit function at an unparalleled rate. To contribute to the wide dissemination of such techniques,...
There is a high demand for underwater communication systems due to the increase in current human underwater activities. Bathymetric data is a depth value of reservoir or inland water bodied. Bathymetric data is useful for hydrographical survey, volume calculation and 3D graph generation using interpolation techniques. Depth sensor captures a depth data values from the water source and these values...
The research aims at the development of a method of continuous identification of computer network users during their professional activity by means of data received from standard peripherals (keystroke dynamics, facial images registered by a web camera, mouse dynamics). A new method of identification is proposed. A natural experiment evaluating the reliability of the proposed method has been carried...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.