The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the recent advancements in the field of robotics and cloud computing, one technology backing the other can have a huge potential under the domain of Cloud Robotics. Majority of systems are still operating independently using on-board computation, and confined memory and storage. Cloud Computing is a promising technology which is intended to harness the power of networked computers and communication...
QRS detection is becoming more popular in detecting the heart beat rate. The improvement is done by using the new filter. This research work focus on providing better performance in heart beat detection algorithm by using hybrid filter (improving MaMeMi filter using the first order derivative filter). An enhanced algorithm has been proposed to enhance the performance of QRS detection. Different parameters...
Data loss, i.e. the unauthorized/unwanted disclosure of data, is a major threat for modern organizations. Data Loss Protection (DLP) solutions in use nowadays, either employ patterns of known attacks (signature-based) or try to find deviations from normal behavior (anomaly-based). While signature-based solutions provide accurate identification of known attacks and, thus, are suitable for the prevention...
System Dynamics (SD) is a method to build simulation models using computers, to study the behaviour of systems, and apply what-if scenarios aiming at achieving optimal policy design. To have an overview of the current state-of-the-art of SD use in the eGovernment field; we have surveyed related literature. Our main goal is to uncover the possibilities for future research by clarifying the shortages...
In this study, gender prediction is investigated for the face images. To extract the features of the images, Local Binary Pattern (LBP) is used with its different parameters. To classify the images male or female, K-Nearest Neighbors (KNN) and Discriminant Analysis (DA) methods are used. Their performances according to the LBP parameters are compared. Also classification methods' parameters are changed...
Error Weighted Hashing (EWH) is a fast algorithm for Approximate k-Nearest neighbour search in Hamming space. It is more efficient than traditional LocalitySensitive Hashing algorithm (LSH) since it generates shorterlist of strings for finding the exact distance from the query. Wehave parallelized the EWH algorithm using Cuda and OpenMP.Speedup of 44 times on a 16 core GPU and 16 core CPUmachine was...
Through the collection and association of discrete time-series resource metrics and workloads, we can both provide benchmark and intra-job resource collations, along with system-wide job profiling. Traditional RDBMSes are not designed to store and process long-term discrete time-series metrics and the commonly used resolution-reducing round robin databases (RRDB), make poor long-term sources of data...
Because program behaviors of database applications depend on the data used, code coverages do not effectively test database applications. Additionally, test coverages for database applications that focus on predicates in Structured Query Language (SQL) queries are not useful if the necessary predicates are omitted. In this paper, we present two new database applications using Plain Pairwise Coverage...
To realize high-speed and high-capacity 5G mobile networks, secondary users (SUs) may opportunistically use licensed spectrum allocated to primary users (PUs). This paper presents a framework to deal with the situation that occurs when a PU suffers harmful interference caused by the secondary use of the spectrum allocated to it. Here, the PU is assumed to be a radar system. In our proposed framework,...
The Engineering division at New York University in Abu Dhabi encourages students to not be afraid of thinking differently when faced with a challenge. Accordingly, a key aspect of the engineering curriculum focuses on invention, innovation, and entrepreneurship (i2e) through all years of undergraduate study[1]. Through i2e students are encouraged to hone their creativity and develop their leadership...
Opinion mining is the process of retrieving the opinion evidences from the reviews and finding their polarity such as positive, negative. Topical term mining enhances the opinion mining in which topical terms have to be extracted along with opinion evidences. Topical terms are specific attribute or quality of a topic. This paper proposes an approach for topical term mining. It aims to assist the users...
The Protection against Pornography application provides a unique method to secure children and youngsters. The application has an embedded in the porn webpage. Whenever the children and youngsters are trying to enter such page, automatically it sends message to their parents. The input of the user is stored in database for comparison with national aadhaar card database for login process. This paper...
Just imagine what happens if you are pulled over by a Traffic sergeant, and you did not have your driver's license with you. Without it, you cannot drive a vehicle on public roadways so it is possible for cop to fine you. Therefore, it is important for you to carry your Driver's License everywhere. On the other side, it is hectic job for a Cop to verify if the Driver's license is original, is it valid,...
Most websites use passwords for authenticating user identity and for allowing access to website resources that may contain sensitive information. A large number of people use dictionary words for creating passwords. These user passwords are subjected to one-way hash functions and are stored inside the database as corresponding hash values instead of plaintext. A potential hacker can use brute-force,...
Today in the world of extensive technologies, being able to communicate, sharing your ideas, expressing your feelings can be included in the basic needs of every human being. Communication is the sole reason behind most of the recent advancements in technology. Speech is the most effective mode of communication in between humans. Even a slightest inability in producing speech can create a tremendous...
With the rapid development of the campus social applications to the market, this paper introduced the implementation of a dating application especially designed for students. The application based on Android platform adopts C/S architecture and is developed in Java. It responds to users' operations via the instant interaction between the client and server. Some functions such as free time update,...
One of the important approach in data mining is sequential pattern mining that is used for discovering behaviors of sequential databases. There are various challenges in sequential pattern mining such as efficiency and effectiveness. In this paper different sequential pattern mining algorithm are discussed such as GSP, FreeSpan, PrefixSpan, and CAI-PrefixSpan to improve performance to finding sequential...
Over the years speech recognition has taken the market. The speech input can be used in varying domains such as automatic reader and for inputting data to the system. Speech recognition can minimize the use of text and other types of input, at the same time minimizing the calculation needed for the process. A decade back speech recognition was difficult to use in any system, but with elevation in...
Due to the development of the communication networks and mobile computing, location based service (LBS) becomes very popular in recent years. The Global Positioning Systems (GPS) are the earliest widely used modern systems for outdoor positioning service. However, GPS due to lack of LoS(Line Of Sight) cannot provide good accuracy in indoor environments since the satellite signals are blocked by building...
Healthcare system information is grown an exponential manner. Current management of data base cannot adequately manage the database. Important issues are maintaining huge amount of data. Big data is the solution for managing data base. In the health care system finding patient similarity is the one major problem. Current methods are not satisfied finding similarity between the patients record because...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.