The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Limiting mobile phone usage while maintaining a viable communication link for the emergency services can be crucial for secure facilities such as prisons. This paper presents the design of an inductive frequency selective surface (FSS) with a pass-band operating from 380 to 420 MHz covering the TETRA frequency band used by emergency services in Europe. The FSS is designed to attenuate signals in the...
Forensic analysis of digital images for tampering detection is a challenging task, if the information regarding them are not available. This scenario in which the prior original image information are not known is called blind/passive/non-reference. So, the forensic examiner have to look for trails of tampering by studying the artifacts that might have crept into the image editing processes or the...
This paper discusses methods to identify individualusers across their digital devices as part of the ICDM 2015 competition hosted on Kaggle. The competition's data set and prize poolwere provided by http://www.drawbrid.ge/ in sponsorship withthe ICDM 2015 conference. The methods described in this paperfocuses on feature engineering and generic machine learningalgorithms like Extreme Gradient Boosting...
In batch systems monitoring information at the level of individual jobs is crucial to optimize resource utilization and prevent misusage. However, especially the usage of network resources is difficult to track. In order to understand usage patterns in modern computing clusters, a more detailed monitoring than existent solutions is required. A monitoring on job level leads to dynamic graphs of processes...
Customers may interact with a retail store through many channels. Technology now makes it is possible to track customer behavior across channels. We propose a system where items are recommended based on learning channel specific similarities between customers and items. This is done by treating recommendations as a learning to rank problem and minimizing rank loss with surrogate loss functions. We...
Multi-focus image fusion is used to collect useful and necessary information from input images with different focus depths in order to create an output image that ideally has all information from input images. In this article, an efficient, new and simple method is proposed for multi-focus image fusion which is based on correlation coefficient calculation in the discrete cosine transform (DCT) domain...
The IEEE International Conference on Healthcare Informatics 2015 (ICHI 2015) announced a challenge in healthcare domain that concerns the quality of health inquiries on social media. The problem of the challenge is to reduce the repetition of posts for patient support forums. This problem gradually becomes hard to control due to the increase of forum users and lack of research within the forum's older...
Estimation of data veracity is recognized as one of the grand challenges of big data. Typically, the goal of truth discovery is to determine the veracity of multi-source, conflicting data and return, as outputs, a veracity label and a confidence score for each data value, along with the trustworthiness score of each source claiming it. Although a plethora of methods has been proposed, it is unlikely...
We evaluate the volume of metric balls in complex Grassmann manifolds. The ball is defined as a set of hyperplanes of a fixed dimension with reference to a center of not necessarily the same dimension. The normalized volume of balls corresponds to the cumulative distribution of quantization error for uniformly-distributed sources, a problem notably related to rate-distortion analysis, and to packing...
The most popular metric distance used in iris code matching is Hamming distance. In this paper, we improve the performance of iris code matching stage by applying adaptive Hamming distance. Proposed method works with Hamming subsets with adaptive length. Based on density of masked bits in the Hamming subset, each subset is able to expand and adjoin to the right or left neighbouring bits. The adaptive...
In this work we propose a design for a new distributed modular monitoring system framework, which allows combining both monitoring tasks (supercomputer health and performance monitoring) in one monitoring system. Our approach allows different part of monitoring system to process only the data needed for the task assigned to this part. Another feature of our framework is the ability to calculate performance...
In typical settings for Wireless Sensor Networks (WSNs), a potentially large set of nodes operates under strict requirements concerning energy consumption and packet delivery success. If non-reliable or even malicious nodes participate, standard protocols can suffer in performance which may result in a limited functionality of the whole network. This paper addresses this issue by establishing end-to-end...
In the realm of cyber security, recent events have demonstrated the need for a significant change in the philosophies guiding the identification and mitigation of attacks. The unprecedented increase in the quantity and sophistication of cyber attacks in the past year alone has proven the inadequacy of current defensive philosophies that do not assume continuous compromise. This has given rise to new...
We are investigating ways of evaluating research impact as soon as possible after publication. Traditionally, the research impact or importance of academic journals has been evaluated using citation relations, such as the impact factor and the citation half-life. However, these citation-based methods require long periods to evaluate research impact and therefore are not suitable for evaluating the...
Coping with multiple false identities, also known as a Sybil attack, is one of the main challenges in securing structured peer-to-peer networks. Poisoning routing tables through these identities may make the process for storing and retrieving resources within a DHT (Distributed Hash Table) extremely difficult and time consuming. We investigate current possible countermeasures and propose a novel adaptive...
Image quality assessment (IQA) plays an important role in many applications such as image compression and transmission. In this paper a full referenced IQA (FR-IQA) model has been proposed which is based upon transformation based technique. Singular value decomposition (SVD) has been used to determine the basis vectors that best describe the input image signal. In contrast to other transformation...
For collaborative learning to be successful, the instructor must carefully plan the formation of student groups. Typically, a teacher uses a set of conditions inferred from certain student parameters such as individual proficiency, learning and thinking styles, team-related traits and personality traits. While all of these parameters are instructor-driven, it is also favorable to get the teammate...
Nowadays, there are a lot of online repositories containing thousands of very useful educational resources for the educational community. To take full advantage of these resources requires a simple, direct and effective access to those resources that are of interest, therefore, it is necessary that those resources are ordered or ranked based on some criteria? -- that is to say, they have to be classified...
This paper shows a framework for a PNBMT (place/transition net-based mutation testing technique) that consists of three tools, that is, a mutant PN generator, a negative test case generator, and a mutation analyzer.
To meet the challenge of the ever-growing traffic volume in current wireless communications, ultra-dense network (UDN) deployment with high system capacity has attracted wide attention in recent years. However, existing researches on UDN mainly focus on system throughput while ignore energy efficiency (EE). Therefore, we will analyze the UDN performance including not only system throughput but also...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.