The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we proposed a novel algorithm based on fuzzy model using both integrated HVI data (face and bio-signal) and in-vehicle data (turn signal etc.) in order to detect drowsiness and distracted driving, nonfulfillment of safety distance, and lane departure warning. Also, the proposed algorithm was implementation to the integrated ECU. From experiment results, our proposed algorithm will be...
The semiconductor counterfeiting has become a serious problem. Several Physical Unclonable Functions (PUFs), which utilizes the variation when manufacturing, are proposed as a countermeasure for imitation electronics. An arbiter PUF is one of the most popular PUFs. The operation of an arbiter PUF can be expressed by using a delay model. An arbiter PUF is reported to be attacked by forcing them to...
The storage-bandwidth tradeoff of linear and exact-repair regenerating codes is considered. An outer bound on the storage-bandwidth tradeoff is proposed for arbitrary (n, k, d) case. n, k, and d denote typical code parameters of regenerating codes. The proposed outer bound becomes tighter than other existing outer bounds as k gets closer to n. In addition, for the case of d = n − 1, it is shown that...
We revisit the problem of inferring the overall ranking among entities in the framework of Bradley-Terry-Luce (BTL) model, based on available empirical data on pairwise preferences. By a simple transformation, we can cast the problem as that of solving a noisy linear system, for which a ready algorithm is available in the form of the randomized Kaczmarz method. This scheme is provably convergent and...
The ‘sense of agency’ refers to the experiential state that one's actions cause events in the world. Developing a sense of agency allows infants to learn from interacting with the social and physical world in ways that would not be possible otherwise [1]. To date, few empirical studies seem to target this phenomenon in infancy directly. Notable exceptions are the work by Rochat and colleagues (e.g...
Enormous commercial value brought by big data analysis promotes the vigorous development of big data analysis industry. Due to the difficulties existed in the modeling process, reusing existing analysis experiences becomes a good choice to find an optimal way from problem domain to solution domain efficiently. To help data analysts reuse previous experiences to elicit and model analysis requirements...
In this position paper, we present our interdisciplinary research into a unified account of profiling attackers for software-intensive systems. Our work draws on the principles from requirements engineering and criminology. Specifically, we show how a unified crime theory can be adapted to model the attackers and their degree of knowledge about the environment in which the software operates. We illustrate...
The world is witnessing exploding interests in big data and its analytics, which makes data a critical and relevant asset more than ever for today's organizations. However, without a proper understanding to security and privacy requirements, data might hardly be used to its full power. Data owners and users can be in risk in terms of information security and privacy when sharing their data and running...
Due to the limited data transmission capability, most of the sensor nodes in the wireless sensor networks(WSN) cannot send data to the base station directly. In most situations the data transfer has to be done by the means of multi-hop. Low Energy Adaptive Clustering Hierarchy(LEACH) is one of the most widely used multi-hop strategies. However, as there are many random factors interrelated with each...
Scripts have been used in different disciplines to characterize how individuals conceptualize the conduct of goal-oriented tasks. Cornish introduced this modelling approach to the field of environmental criminology as a more systematic way to identify offenders’ decisions during the commission of crime. Despite the growing number of articles about crime scripts, there is limited information about...
We have examined to apply the multi-armed bandit (MAB) techniques to the incentive design problem in crowdsourcing. So far, researchers studied the effects of various incentives including financial and social ones. The effect of these incentives, however, may differ in different tasks and/or at a different time, which makes difficult to find an appropriate incentive out of the whole design space of...
With the advancements of Internet-of-Things (IoT) and Machine-to-Machine Communications (M2M), the ability to generate massive amount of streaming data from sensory devices in distributed environment is inevitable. A common practice nowadays is to process these data in a high-performance computing infrastructure, such as cloud. Cloud platform has the ability to deploy Hadoop ecosystem on virtual clusters...
The Spanish Renewable Energies Plan (SREP) for 2011–2020 and the European Energy Road Map are promoting the use of renewable sources as the best way to avoid the undesired global warming, and in particular, the use of Ocean Energy. Within the different types of on-shore wave-based ocean energy devices, Oscillating Water Column (OWC) converters are one of the widely used ones. An OWC device is basically...
An image was taken by the XMM telescope to better understand galaxy clusters. We model the data as a high dimensional Poisson inverse problem and develop a lasso type estimator with a composite penalty (with two thresholds) to handle both estimation of the gas density in the cluster and detection of point sources.
The total number of webpages has grown substantially since the birth of the Internet. So too have the number of webpages dedicated to radical yet subtle content. As these new circumstances have necessitated a guided data collection method, one that can sidestep the laborious manual methods that have been classically utilized, simple keyword analysis has not been sufficient to identify radical sites...
Big Data technologies enable new possibilities to analyze historical data generated by process plants. One possible application is the development of new types of operator support systems (OSS), which could help plant operators during operations in identifying and dealing with critical situations. The project FEE has the objective to develop such support functions based on Big Data analytics of historical...
Incorporating spatial information quantified by geostatistical tools to improve the classification of remotely sensed data is a promising method. Most existing studies only focused on the development of geostatistics-based spectral-spatial classification methods. This paper investigates primarily the advantages and disadvantages of two different types of geostatistical methods (two-point statistics...
In the case of a cloud-based remote control system such as SCADA (Supervisory Control and Data Acquisition) that enables users to collect data from cloud-connected machines deployed anywhere at any time. However, machine data models may not be updated in a timely manner after the devices are upgrades or modified. This leads to mismatches between the machine data and data models. A key obstacle of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.