The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, a path planning of grid method based on RFID technology is presented. In the traditional sense, the grid method adopts the random searching, and uses the continuous subdivision of the grid to obtain the optimal path, so it would increase the difficulty of the path planning. Here, the grid method based on RFID technology is applied to achieve the optimal path planning globally via RFID...
Any adaptive traffic control system applied for an entire network must be flexible, in order to adjust the signalling times for each junction according with real traffic data, according to a macroscopic vision. Also, it must be network synchronized, in order for each signalling time modification to be correlated with the other junctions in the network. The system must also be able to properly respond...
Given a common dataset, two methods operating on that dataset and reported equal-error rate (EER) for each method, then we can estimate whether the two methods differ significantly at the threshold leading to the EER. This enables the calculation of a boundary on the significance for methods where the significance was not reported in the original paper or to compare new methods to older ones by evaluating...
Online social systems have emerged as a popular medium for people in society to communicate with each other. Among the most important reasons why people communicate is to share emotional problems, but most online social systems are uncomfortable or unsafe spaces for this purpose. This has led to the rise of online emotional support systems, where users needing to speak to someone can anonymously connect...
Nowadays, web applications play an important role for many organizations, and there are many technologies variable in the market and each technology have its own advantage, so choosing the technologies is one important factor. This research studies of performance processing speed of two common technologies for developing web applications namely PHP and ASP.NET. These technologies run on environment...
This paper discuss the project results of the centralized storage for the client generated statistical data. The project aims was to fill the following requirements: (1) a new web API where local client statistics can be reported to a highly scalable and redundant central database, (2) to enable a user to easily save/share their connection results on a separate webpage, or with a widget that could...
Ventricular fibrillation (VF) and ventricular tachycardia (VT) are among the life-threatening cardiac arrhythmias and their in-time and accurate detection are very significant. In this paper, the capability of slope to detect cardiac shockable arrhythmias as a feasible time-domain feature of the electro-cardiogram signal (ECG) is discussed. Several slope analysis methods were investigated and an innovative...
Sensus Ekonomi 2016 (SE2016-Economy Census 2016) which will be held in 2016 is an important and massive activity. Badan Pusat Statistik (BPS-Statistics Indonesia) taking main responsibility needs to arrange strategic and appropriate actions for the success of the event. One of the actions that can be used to support SE2016 implementation is by providing information about progress of SE2016. Therefore...
Trending topic is a place where topic that matters in certain region up to the whole world placed on Twitter. Besides directly mentioning other users or using direct messages, riding on a trending topic that Matters in Twitter is another common practice to spam. The ease of use of this technique makes it is very easy to spammers who want to get their messages exposed. On the other side, current condition...
In recent times there has been a decline in the confidence of common people over electronic voting machines (EVMs). More anticipated than what the reality actually is, today's automated vote casting methods have faced immense controversy related to being vulnerable to hacking and questions have been raised about their transparency and security. This paper proposes the design and development of a novel...
Since 1998, SQL injection were started. So many ways of doing SQL injection on different type of database. Attacks are happened on data-driven web application for exploiting the data of the server. Existing IDS base prevention system working on predefine rules. But they are not stable. So, in order to prevent database from SQL Injection Attack, we propose a model, which is implemented with SNORT and...
Performance analysis is critical for ensuring that a computer system operates with desired efficiency. There are many challenges in analyzing the performance of enterprise servers such as the manual steps involved in the process, lack of visual analysis and reporting, time required to analyze related metrics, lack of open source tools for performance analysis of enterprise servers. This paper proposes...
The general state of healthcare in Zambia is poor and this can be attributed to a number of reasons. One of these is the suboptimal management of patient data and information for decision-making. This research paper focuses on the comparison of the performance of the paper-based patient record management systems and the Patient e-Files Online Health Record Management System (OHRMS). The performance...
Measuring strength of passwords is important in order to ensure the security of password-based authentication. Since passwords are still the most widely used method for authentication, there has been a considerable research on passwords and password strength. Yet, studies related to password still lack of access to plaintext passwords that are created under a specific password policy. Our research...
Data Mining is the process of identifying new patterns, insights in data and knowledge discovery, and is at the intersection of multiple research areas, including Machine Learning, Statistics, Pattern Recognition, Databases, and Visualization. With the maturity of databases and constant improvements in computational speed, data mining algorithms that were too expensive to execute are now within reach...
The popularity of computer science classes offered through Massive Open On-line Courses (MOOCs) creates both opportunities and challenges. Programming-based classes need to provide consistent development infrastructures that are both scalable and user friendly to students. The "Heterogeneous Parallel Programming" class offered through Coursera teaches GPU programming and encountered these...
In the last years the volume of data that was generated by the mankind has increased and the complexity of data generated has also increased. Since the computers have evolved and provide more processing power, it is possible to carry out the real-time analysis of big volumes of data. This paper suggests the architecture of a big data processing platform called BigTim, which is able to run clustering...
Gesticulation, together with the speech, is an important part of natural and affective human-human interaction. Analysis of gesticulation and speech is expected to help designing more natural human-computer interaction (HCI) systems. We build the JestKOD database, which consists of speech and motion capture recordings of dyadic interactions. In this paper we describe our annotation efforts and present...
This paper proposes a new system of categorization and classification using data mining techniques based on certain criteria/topics. We describe the design and implementation of proposed system that automatically categorizes a restaurant as being good or bad, using data mining techniques, based on users' reviews. For this study we took a data set consisting of approximately 9,000 reviews for 2,355...
Multimodal biometric verification systems use information from several biometric modalities to verify an identity of a person. The false acceptance rate (FAR) and false rejection rate (FRR) are metrics generally used to measure the performance of such systems. In this paper we propose a novel approach to determine the upper and lower acceptance thresholds in sequential multimodal biometric matching,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.