The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The field of Human Action Recognition has expanded greatly in previous years, exploring actions and interactions between individuals via the use of appearance and depth based pose information. There are numerous datasets that display action classes composed of behaviors that are well defined by their key poses, such as ‘kicking’ and ‘punching’. The CONVERSE dataset presents conversational interaction...
Poor sitting postures influence one's health and can cause upper limb and neck disorder. Current solutions for siting posture recognition, however, are impractical due to intrusiveness, high cost or low generalization capability. Particularly, most of the existing solutions are chair-dependent, which are highly coupled with certain types of chairs. In this paper, we design Postureware, a smart cushion,...
This demo paper presents the Tasklet system - a middleware for distributed computing. The Tasklet system allows developers to offload self-contained units of computation - the so-called Tasklets - to a pool of heterogeneous computing devices. In this demonstration of the Tasklet system, we uncover the otherwise transparent process of computation offloading and scheduling. Further, we show the easy...
Enhanced Course of Action (CoA) generation is a fundamental component of effective risk management and mitigation. This paper presents an extension of a system capable of integrating physics-based (hard) and people-generated (soft) data, for the purpose of achieving increased situational assessment and automatic CoA generation upon risk identification. The system's capabilities are enhanced through...
There is a growing need for Vehicular Ad-hoc Networks (VANETs), in which vehicles communicate with each other (i. e., Vehicle to Vehicle, V2V) or with the infrastructure (i. e., Vehicle to Infrastructure, V2I) on a wireless basis. This paper presents an improved traffic monitoring system for VANET applications via a proposed security scheme. Specifically, the proposed model analyzes the monitored...
Biological information can easily be monitored by installing sensors in a lavatory bowl. Lavatories are usually shared by several people, so users need to be identified. Because of the need for privacy, using cameras, microphones, or scales is not appropriate. Though personal identification can be done using a touch panel, the user may forget to use it because the action is not necessary. In this...
Pervasive and ubiquitous computing increasingly relies on data-driven models learnt from large datasets. This learning process requires annotations in conjunction with datasets to prepare training data. Ambient Assistive Living (AAL) is one application of pervasive and ubiquitous computing that focuses on providing support for individuals. A subset of AAL solutions exist which model and recognize...
With the high usage of internet today, people started sharing much of the information with each other online. In this paper, we propose to monitor user activity for any hazardous behavior like terrorism on Gmail and Twitter. We apply Natural Language Processing (NLP) techniques like POS tagging, Chunking, Stemming, and WordNet Processing to extract the keyword and check to see whether the information...
Internet of things (IoT) integrate the technologies such as sensing, communication, networking and cloud computing in wide range monitoring zone. For applications of IoT, the most appropriate monitoring network is wireless sensor networks (WSN). It is most important to develop energy efficient cluster head (CH) selection scheme to increase the network lifetime of WSNs. It is most crucial to save the...
The conventional positioning systems require the users to carry an electronic device, which helps in the localization process. Device-free Passive Localization (DfPL) techniques are used to position the users in a passive manner such that they do not engage in the process. A typical DfPL setup comprises of Wi-Fi Access Points (APs) that transmit periodic signals to Monitoring Points (MPs). Any intrusion...
Participatory sensing is an emerging paradigm in which citizens voluntarily use their mobile phones to capture and share sensed data from their surrounding environment in order to monitor and analyze some phenomena. Participating users can disrupt the system by contributing corrupted, fabricated, or erroneous data. Different reputation systems have been proposed to monitor participants' behavior and...
This paper presents algorithms that find the optimal number of sensor nodes and the optimal location of nodes to achieve more efficient estimation in a wireless sensor network under power constraints. The network consists of sensors that are optimally placed over an area. Sensors' observations are noisy measurements of an underlying field. Each sensor processes its observation prior to transmitting...
The exponential growth of internet traffic over the last twenty years presents a real challenge to ISP looking to ensure a reliable and efficient service to their customers. Network traffic is far from being straightforward to predict and a deep understanding of the routing domains is a first requirement to achieve proper management of the traffic. This paper focuses on the monitoring and characterization...
Students Performance can be measured under various categories like Success Rate, Academic Performance, Placement and Higher Studies and Professional Activities. Among these, Academic Performance paves the vital role in assessing their career upliftment. It is meant to be one of the key factors for assessing the departmental as well as institutional strength. The assessment can be undergone in two...
Asthma is among the most common condition, and it has been reported that it is currently poorly controlled. In this work, wheeze sound were analysed to classify different levels of asthma severity. Wheeze signals were obtained from patients with three asthma severity levels, namely mild, moderate and severe asthma. The wheeze sounds detected were then used for a feature extraction process using mel-frequency...
Haze has becoming a yearly occurrence in Malaysia. There exist three dimensionsto the problems associated with air pollution: public ignorance on quality of air, impact of air pollution towards health, and difficulty in obtaining information related to air pollution. This research aims to analyse and visually identify areas and associated level of air pollutant. This study applies the air pollutant...
Spine curvature disorders are a common health problem, and most of their causes are related to the habit of poor trunk posture. Several posture monitoring products exist in the market; however, they are expensive and do not consider the involvement and activities of muscles in the formations of postures. This paper describes our initial studies on the relationship between surface electromyography...
Our main goal in this study was to resolve the difficulty of facilitating problem-solving-learning in schools, where all facilitators carry out the effective facilitation of Problem/Project Based Learning (PBL) that satisfies a certain quality. This paper discusses a "Project/Problem Based Learning Body of Knowledge (PBLBOK)" that was developed to enable facilitation suitable for learning...
System event logs have been frequently used as a valuable resource in data-driven approaches to enhance system health and stability. A typical procedure in system log analytics is to first parse unstructured logs, and then apply data analysis on the resulting structured data. Previous work on parsing system event logs focused on offline, batch processing of raw log files. But increasingly, applications...
Decentralized Continuous Double Auctioning offers a flexible marketing approach to power distribution in resource constrained (RC) smart micro-grids. Grid participants (buyers and sellers) can obtain power at a suitable price both at on or off-peak periods. Decentralized CDA schemes are however vulnerable to two attacks, namely - 'Victim Strategy Downgrade' and 'Collusion'. Both attacks foil the CDA...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.