The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Our research is initially motivated by a conversation we had with a group of cyber security analysts that are responsible for monitoring enterprise security at a large corporation who were experiencing day-to-day operational burdens. As a result, this paper focuses on the design and implementation of an Intelligent Cyber Security Assistant (ICSA) architecture that would provide intelligent assistance...
Cyber systems have become ubiquitous and indispensable in our daily life, and the extent of our dependence on them has increasingly grown in all fields including: education, business, industry and government. Those systems make intensive use of data and information and are therefore exposed to more potential cyber attacks. Thereby, the need for reliable approaches to protect them has increased. One...
This paper evaluates a mechanism for applying machine learning (ML) to identify over-constrained IaaS virtual machines (VMs). Herein, over-constrained VMs are defined as those who are not given sufficient system resources to meet their workload specific objective functions. To validate our approach, a variety of workload-specific benchmarks inspired by common Infrastructure-as-a-Service (IaaS) cloud...
With the advance of modern technologies, computer-based systems for animals are gaining popularity. In particular, there is an explosion of products and gadgets for pets: wellness monitoring applications (e.g., FitBark and PetPace), automatic food dispensers, cognitive enrichment apps, and many more. Furthermore, the discipline of Animal-Computer Interaction has emerged, focusing on a user-centric...
The allocation of common-pool resources is an important topic in technical and socio-technical systems, and when left unmanaged, such systems often collapse to highly unequal and unsustainable outcomes. Recent work has highlighted a role for electronic institutions in managing such resources, to ensure socially-beneficial outcomes in the long term. However, open self-organising multi-agent systems...
This paper identifies that the anycast communication pattern is needed in the Machine Type Communications (MTC), where there could be multiple MTC devices being deployed in the same area for the same type of data, the client only cares about the data being retrieved but not where the data comes from. Currently the MTC server can provide such anycast service, but with large signaling overhead and bandwidth...
Nowadays the adoption of IoT solutions is gaining high momentum in several fields, including energy, home and environment monitoring, transportation, and manufacturing. However, cybersecurity attacks to low-cost end-user devices can severely undermine the expected deployment of IoT solutions in a broad range of scenarios. To face these challenges, emerging software-based networking features can introduce...
In the era of Industry 4.0, Navantia is creating a Cyber-Physical System (CPS) for enabling automatic event detection in their pipe workshops. The enhanced identification of the numerous pipes of a shipyard and their traceability, from their origin and through their life-cycle, increase productive capacity and efficiency in the processes. The CPS proposed is able to transmit signals periodically,...
Two different approaches of implementing Fast track analysis for attendance management system has been designed and analyzed. The first design is applying data access through card reader and the data is being saved in the memory card. All the data which are representing Student ID are processed by attendance management system for monitoring the attendance student performance. This is done via off-line...
Augmented Reality (AR), Mixed Reality (MR) and Virtual Reality (VR) have an increasing impact on our daily lives. They improve workers' performance in industry and medicine. In addition gaming and entertainment profit from these innovations. The enabling devices are often head-mounted. New intuitive interaction methods must be developed to control application, because conventional input devices such...
Many games use dynamic difficulty adjustment (DDA) to promote the achievement of flow and consequent positive affective states. However, performance based DDA assume a specific ludic attitude: that of the hard-core gamer. An alternative approach is to apply affective computing techniques to monitor players adjust difficulty to achieve the desired affective state directly. Such an emotion-controlled...
This dissertation exploits an Android base application gives clarification to assist parents to pathway their adolescent activity. It was implemented to locate the location based on real time map only when the user is found to be missing or kidnap cases. A parent's tool has to propel a application spot SMS to the child's tool to acquire the spot of the child. On the other side, the child's tool accept...
Byzantine attacks are constant threats in many applications such as disaster management, and battlefield applications. In this paper, we introduce a monitoring scheme in the link state routing protocol to secure the packets' route against Byzantine attacks. The goal of our proposed scheme is to guarantee communication among connected benign nodes in the network. Specifically, each node monitors the...
In a recent study, we have shown that the mixtures of graphene oxide (GO) nanosheets and Pluronic F-127 (PLU) polymers (GO-PLU) exhibit superior antimicrobial activity compared to GO alone on physiologically naïve bacteria challenged with hypoosmotic stress, particularly on Gram-negative species. Further, we have more recently demonstrated that the antibacterial activity of GO (alone) is significantly...
Help between peers, intended to positively influence learning, appears as a suitable activity for inquiry learning. While several studies reveal evidence that effective help-seeking and help-giving behaviors can improve learning, virtual and remote laboratories do not provide sufficient support to enable these social interactions. Based on a set of criteria defined from existing literature, we designed...
Crowd behaviour analysis is a challenging task in computer vision, mainly due to the high complexity of the interactions between groups and individuals. This task is particularly crucial given the magnitude of manual monitoring required for effective crowd management. Within this context, a key challenge is to conceive a highly generic, fine and context-independent characterisation of crowd behaviours...
Low efficiency as a special kind of urban construction land, which inhibits the blind expansion of urban boundaries and achieves urban construction land intensive and high efficiency. In this paper, the information feature classification of the low-cost land use was carried out by combining the Worldview-2 high resolution remote sensing images in 2011 and 2016, which was located in the central business...
This study aims to assess the effect of calibration relevant to metamemory in English vocabulary learning. The participants of this study consisted of 110 ninth-grade junior high school students from New Taipei City and were divided into high-proficient and low-proficient groups based on their initial test score. Before each English vocabulary test, the students were asked to predict their vocabulary...
Our work aims at helping teachers to monitor learners' engagement during mind mapping activities. The use of mind maps helps students to elaborate cognitive learning strategies like creating and organizing contents. To assess the quality of these mind maps, teachers need tools to understand students' choices and strategies when constructing their mind maps. We have defined in collaboration with teachers...
Nowadays, the developed countries have widely utilized image processing in the Intelligent Transportation System (ITS), medical, biology and other fields. The image quality enhancement is an important task, especially enhancing the resolution of the image from new interpolated pixels. The conventional Bicubic interpolation (BI) algorithm used a square matrix obtained by the original neighbor pixels,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.