The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Staying informed about security vulnerabilities, work-arounds and the availability of patches regarding the components of a given system is crucial to ensure system security. Several channels can be used to the monitor the new vulnerabilities publications, but these channels are scattered. We propose in this paper a vulnerability monitoring system based on twitter analysis that aggregates and analyses...
This paper presents an overview and the first results of the FP7 MULTISENSOR project, which deals with multidimensional content integration of multimedia content for intelligent sentiment enriched and context oriented interpretation. MULTISENSOR aims at providing unified access to multilingual, multimedia and multicultural economic, news story material across borders in order to support journalism...
We present IBM System G Social Media Solution, which includes a suite of applications designed for in-context monitoring, exploration, and analysis of social multimedia content as well as related people and network dynamics. Each individual application focuses on a unique aspect of social media data analysis in relevant context; collectively, they provide a comprehensive set of tools for exploring...
Modern people are concerned with healthy eating habits; however, sustaining these habits often requires vigilant self-monitoring and strong will. In a related work, a social media system was proposed that enables people to begin eating naturally meals without conscious effort. The system used the concept of expectation assimilation, that is, it converted others' evaluations of healthfulness into those...
The article is devoted to design and study of the method of indirect control of the parameters of liquid technological media in the form of water solutions of glycerin, saccharose, NaCl subject to ultrasonic action. The base of developed method is the revealed before dependences of the electric parameters of the piezoelectric transducer of the ultrasonic vibrating system on physical characteristics...
A key feature of Cloud computing is its agility and flexibility to support the scalability needs of business solutions. Currently, the agility is only limited to the scalability of the compute, memory and storage. To improve an application's agility, we need to monitor & measure solution level metrics and associate the performance of the metrics to the business agility needs of the solution...
The article is devoted to the study of integral criterion of indirect estimation of the parameters of the technological media. Carried out researches show, that integral criterion obtained by integration of current envelope flowing through the ultrasonic vibrating system, which is received at the adjustment of frequency of the ultrasonic generator near resonance frequency of the radiator, depends...
This paper presents an architecture for monitoring the presentation of multimedia declarative applications, providing feedback about variables states, object properties, media presentation times, among others. Monitoring tools that follow the proposed architecture are able to detect if visual problems are being caused by programming errors or by player malfunctioning. The architecture presents a communication...
IPTV is a method of delivering TV content to endusers that is growing in popularity. It is a paid service, hence the implications of poor video quality may ultimately be a loss of revenue for the provider. Consequently, it is vital to provide service monitoring and reconfiguration mechanisms to ensure quality requirements set out in service level agreements are upheld. This paper describes our experience...
In HDDs, during write operation, the transducer head flies over the media with no continuous monitoring on the adequacy of its flying height against sudden incidents. If the head hits an asperity or a lubricant spill drops from the head, the head momentarily oscillates around its intended fly height. This can compromise the data being written. Only by issuing a read command can the drive evaluate...
Gangs utilize social media as a way to maintain threatening virtual presences, to communicate about their activities, and to intimidate others. Such usage has gained the attention of many justice service agencies that wish to create better crime prevention and judicial services. However, these agencies use analysis methods that are labor intensive and only lead to basic, qualitative data interpretations...
several methods of Statistical Process Control (SPC) are used to analyze process measurements with the purpose to detect faults that affect the process stability. SPC has a major drawback because it indicates the presence of faults without explaining which ones and where are the faults. In practical applications, SPC just analyses univariate signals limiting the study of multiple measures. Nowadays,...
Wireless sensor networks (WSNs) have become an effective technique in monitoring water, oil, and gas pipelines. Wireless sensor nodes have played a greater role in multidimensional applications such as tactical monitoring, weather monitoring, and battlefield detecting. Combined wireless nodes create a network in a distributed manner. They can provide accurate results in both aboveground and underground...
Privacy and security are the main concern of any social media network sites such as Facebook, Twitter, and Linked In etc. The primary purpose of these sites is to allow people to share interests, activities, real-life connections. Lack of attention to privacy and security on social media does seem to be odds with the belief as individual responsibility. Network virtualization, media independence and...
This paper proposes a smart, easy-deployed remote monitor system based on Android system. Different from normal monitor system, what you need to deploy the monitor system are only a camera, a PC with Linux system and an Android smart phone, which is commonly held by people. The system is based on the open-source library live555, FFmpeg and x264, thus it is readily extendable. In this system, the video...
Effective and efficient behavioral interventions are important and of high interest today. Due to shortcomings of related approaches, we introduce MobileCoach (mobile-coach.eu) as novel open source behavioral intervention platform. With its modular architecture, its rule-based engine that monitors behavioral states and triggers state transitions, we assume MobileCoach to lay a fruitful ground for...
Natural and man-made disasters are an inevitable part of our lives. Therefore, emergency management strategies are developed to mitigate the impact of these unfortunate events. The introduction of social media into the domain of emergency management may bring several benefits. For instance, governments disseminate information regarding an incident to the community, citizens communicate their current...
People are increasingly becoming health-conscious and therefore prefer monitoring their health conditions for various reasons (e.g., sports, medical health). Similarly, patients are also keen to utilize bio-sensors that are readily available in the market. As a result, patient driven health care systems are gradually becoming popular among the medical professionals. A patient-driven medical health...
Data analysis of social media postings can provide a wealth of information about the health of individual users, health across groups, and even access to healthy food choices in neighborhoods. In this paper, we analyze Twitter postings of 140 characters or less, known as tweets, to infer user health status over time. Tweets and in turn their users' health are scored according to semantic analysis,...
Natural disasters can have a devastating effect on critical infrastructures, especially in case of cascading effects among multiple infrastructures such as the electric power grid, the communication network, and the road network. While there exist detailed models for individual types of infrastructures such as electric power grids, these do not encompass the various interconnections and interdependencies...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.