The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Engaging in physical exercises such as weight training and physiotherapy stretching exercises at home requires proper execution and awareness of the exercises. One of the main problems in engaging exercises at home is that there is no proper guidance and feedback provided to align the exercises to the correct movements due to the absence of a physical trainer. This paper discusses how a system, namely...
Failure of a task running on a Hadoop cluster is highly expensive in terms of computational time. A failure occurring even at the end phase of the task may cause the need to redo the entire task. Thus is really important to deploy fault tolerant techniques. Hadoop deploys a technique of checkpointing to prevent data loss. However, computational time-loss still pose a grim threat to critical applications...
This paper addresses the problem of damage detection technique of structural health monitoring (SHM). Kernel principal components analysis (KPCA)-based generalized likelihood ratio (GLR) technique is developed to enhance the damage detection of SHM processes. The data are collected from the complex three degree of freedom spring-mass-dashpot system in order to calculate the KPCA model. The developed...
Hadoop architecture provides one level of fault tolerance, in a way of rescheduling the job on the faulty nodes to other nodes in the network. But, this approach is inefficient when a fault occurs after most of the job is executed. Thus, it's necessary to predict the fault at the node at quite an early stage so that the rescheduling of the job is not costly in terms of time and efficiency. Prediction...
Organisations increasingly perceive their employees as a great asset that needs to be cared for; however, at the same time, they view employees as one of the biggest potential threats to their cyber security. Employees are widely acknowledged to be responsible for security breaches in organisations, and it is important that these are given as much attention as are technical issues. A significant number...
The objective of online sequential learning is to make decisions on-the-fly. In this paper, we make a case for online sequential learning in the context of human activity recognition. Moreover, a mechanism to monitor learning online is introduced so as to avoid over-training and to reduce computational complexity. We consider a feed forward neural network with a single hidden layer for faster learning.
Load balancers and firewalls are entry points to many key websites in any network infrastructure. Any downtime due to these devices, even for a few minutes, may result in major business impact. There are many proactive event management systems/products which can monitor their health and alert on device failure. However, predicting failure with sufficient lead time still remains a challenging problem...
A new efficient measure for predicting estimation accuracy is proposed and successfully applied to multistream-based unsupervised adaptation of ASR systems to address data uncertainty when the ground-truth is unknown. The proposed measure is an extension of the M-measure, which predicts confidence in the output of a probability estimator by measuring the divergences of probability estimates spaced...
India is a developing country and the citizens of India are dreaming that within 2020, India will become a well-developed nation. Indian government has started Start-up India, Make in India to improve our nation, but still women in India are facing lots of obstacle towards their improvement. Despite this, women are having high exposure and they are working in all fields like defense, engineering,...
Human age estimation is an important research topic and can find its applications in such as commodity recommendation and security monitoring. The establishment of existing estimators basically follows a same pipeline, i.e., an estimator is built from a given training dataset like FG-NET and then evaluated on a holdout testing set to determine its effectiveness. In doing so, a usually-followed assumption...
The Cloud Security Alliance lists data theft and insider attacks as critical threats to cloud security. Our work puts forth an approach using a train, monitor, detect pattern which leverages a stateful rule based k-nearest neighbors anomaly detection technique and system state data to detect inside attacker data theft on Infrastructure as a Service (IaaS) nodes. We posit, instantiate, and demonstrate...
Analysing the power usage of an Internet of Things (IoT) device is essential in contexts such as smart building, testbed and forensics. For example, in the smart building case, schemes have been proposed to detect and analyse the activity of electric appliances based on the total power usage. In this work, we intend to take this concept a step further and devise a method to analyse the activity of...
In recent years, air quality has become a severe environmental problem in China. Since bad air quality brought significant influences on traffic and people's daily life, how to predict the future air quality precisely and subtly, has been an urgent and important problem. In this paper, a Spatio-Temporal Extreme Learning Machine (STELM) method is proposed for air quality prediction. STELM considers...
In the area of Non-Intrusive Load Monitoring (NILM), many approaches need a supervised procedure of appliance modelling, in order to provide the informations about the appliances to the disaggregation algorithm and to obtain the disaggregated consumptions related to each one of them. In many approaches, the appliance modelling relies on the consumption footprint, which is a typical working cycle of...
HTTP(S) has become the main means to access the Internet. The web is a tangle, with (i) multiple services and applications co-located on the same infrastructure and (ii) several websites, services and applications embedding objects from CDN, ads and tracking platforms. Traditional solutions for traffic classification and metering fall short in providing visibility in users' activities. Service providers...
This paper describes how the non-intrusive load monitoring technique can be applied to develop a powerful framework for grid-responsive buildings, particularly in the small commercial and residential sector. Specifically, recent advances have made it cost-effective to monitor a number of electrical circuits in a building using low-cost embedded platforms that can send their data to cloud-computing...
This electronic document is a “live” template and already defines the components of your paper [title, text, heads, etc.] in its style sheet. Sentiment classification is one of the research hot spots of Natural Language Processing. Compared with English and Chinese, it is hard for Tibetan to do some research of sentiment analysis because of the situation that we are lack of related sentiment corpus...
For the problems that we can't monitor abnormal conditions of heart rate as well as carrying out scientific and efficient training plans based on knowledge from variation of them. A ZigBee and big data analysis based pulse monitoring system has been proposed. The system is composed of multiple ZigBee based pulse monitoring sensors, customized gateways and back-end system. Individuals' pulse information...
The types and numbers of benthic macroinvertebrates found in a water body reflect water quality. Therefore, macroinvertebrates are routinely monitored as a part of freshwater ecological quality assessment. The collected macroinvertebrate samples are identified by human experts, which is costly and time-consuming. Thus, developing automated identification methods that could partially replace the human...
This case study arises from the need to make more robust and effective quality assurance procedures of the products by automating the final inspection process. The case study explains how the automation of the inspection process was performed in a company from the automotive sector. Knowledge, involvement and commitment of operators and respective managers should not be neglected because their reaction...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.