The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wireless Sensor Network is fabricated by the deployment of many miniature devices (sensors) which are capable of sensing, communicating and computing. These networks are susceptible to security threats due to unattended deployment of sensors. There are many attacks on information in transit, out of all Black hole attack or packet dropper is a denial of service attack in which an intruder persuades...
Both short and long term information of the transportation network is needed by commuters and planners. In order to obtain this information, there is a pressing need to consolidate, mine and analyze data collected from multiple sources. To enable these activities under a single umbrella, we propose a data platform in this position paper that transforms data into information. Finally, we discuss the...
Public policy should be decided quickly on the basis of scientific data. However, in urgent situations, e.g., disaster recovery, it takes too long to administer a social survey and collect the results. We have therefore developed a social data collection technique that utilizes the Web reservation data of hotels and bullet trains and propose using this technique to support policymaking in real time...
Since the number of farmers has been decreasing recently, shortage of the labor force is a serious problem in many farmhouses. In order to solve this problem, it is necessary to realize the system to support farmer's works in low costs. The purpose of our research is to construct the system which can predict the farmland environment in the near future. In this research, we focus on the control of...
The process of attackers exploiting the target facilities is always gradual in cyberspace, and multiple attack steps would be performed in order to achieve the ultimate goal. How to identify the attack scenarios is one of the challenges in many research fields, such as cyberspace security situation awareness, the detection of APT (Advanced Persistent Threat) and so on. Alert correlation analysis based...
With the rapid development of wireless communications, the ever increasing demand for limited spectrum resources will eventually cause spectrum scarcity problem. Cognitive Radio offers a solution to this problem, which intelligently detect unused spectrum and share it, without harmful interference to primary users. It has been a research hotspot on how to analyze and utilize licensed spectrum to meet...
Based on an analysis of 2D seismic prospecting in an adjacent coal mine, this paper puts forward a method of 3D seismic prospecting based on distributed acquisition system, in allusion to problems such as complexity of coalfield geological condition and hydrogeological condition in Enhong Coal Mine Area of Yunnan Province. The collected real-time data are of high-precision and high-reliability after...
Complex activities such as instrumental activities of daily living (IADLs) can be identified by creating a hierarchical model of fuzzy rules. In this work, we present a framework to model a specific IADL — "making the bed". For this activity recognition, the need for a three level Fuzzy Inference System (FIS) model is shown. Simple features such as bounding box parameters were extracted...
Cyber-Physical Systems (CPS) covers from M2M and Internet of Things (IoT) communications, heterogeneous data integration from multiple sources, security / privacy and its integration into the cloud computing and Big Data platforms. The integration of Big Data into CPS solutions presents several challenges and opportunities. Big Data for CPS is not suitable with conventional solutions based on offline...
In this paper, a novel method is proposed to extract hand gesture features in real-time from RGB-D images captured by the Microsoft's Kinect. A contour length information based de-noise method is introduced for the hand gesture smooth segmentation and edge contour extraction. In addition, a finger earth mover's distance algorithm is applied with a novel approach to locate the palm image and extract...
In order to prepare well for drawing Bode and Nyquist diagrams of vibration signals collected from rotor startup or shutdown process, a new Hilbert transform based calculation method is proposed. Experiment results show that the proposed method can smooth Bode and Nyquist diagrams, has more accuracy in amplitude and phase calculation, and also can not be affected by harmonic components of rotor vibration...
Most of the recent research on Object Tracking Sensor Networks has focused on collecting all data from the entire sensor network and placing it into the sink, which delivers the predicted locations to the corresponding nodes in order to predict an object's movement. This collection method affects the freshness of the data and creates latency in predicting movement patterns. In addition, due to the...
In ubiquitous environment, too much information exist, and it is not easy to obtain the well classified data from the information. Therefore an algorithm which should be fast and deduce good result is needed. About it, a decision tree algorithm is much useful in the field of data mining or machine learning system for the problem of classification. However sometimes according to several reasons, a...
In recent years researches are focused towards mining infrequent patterns rather than frequent patterns. Mining infrequent pattern plays vital role in detecting any abnormal event. In this paper, an algorithm named Infrequent Pattern Miner for Data Streams (IPM-DS) is proposed for mining nonzero infrequent patterns from data streams. The proposed algorithm adopts the FP-growth based approach for generating...
Sensory networks are scale-free environments that connect entities remotely but with noticeable tendency among its participating Sensors. The increasing size of data sets and the lack of algorithmic methods that are effectively manage such huge data collections led to growing demands of new techniques to handle big data's side-effects. In this research, a new ontology-based categorization methodology...
We present a comparative exploratory analysis of two proximity networks of mobile phone users, the Proximates network and the Reality Mining network. Data for both networks were collected from mobile phones carried by two groups of users. Periodic Bluetooth scans were performed to detect the proximity of other mobile phones. The Reality Mining project took place in 2004–2005 at MIT, while Proximates...
Twitter is a user-friendly social network which deserves its real-time nature. With the help of an algorithm, the investigation can be made with regard to some of the real-time events such as earthquake. The target event is assumed and classified based on the keywords, number of words and their context. The probabilistic spatiotemporal model is provided which can find the Centre of the event location...
In this paper, we propose a system and method for processing media in a convergence media service platform, which provide convergence media into which one or more sensory effects have been inserted based on media and user interaction feedback.
Intensive Care Unit is extremely useful for providing health care to critically ill patients for their speedy recovery. An Intensive Care Unit (ICU) consists of multiple life saving machines which are continuously recording vital organs of patients and generating vast data at very high frequency. A context aware based real time monitoring system is extremely useful in the modern era of bio-medical...
In this paper, we present the performance analysis and design challenges of implementing a fault-tolerant parallel exact motif mining algorithm leveraging the services provided by the underlying cloud storage platform (e.g., data replication, node failure detection). More specifically, first, we present the design of the intermediate data structures and data models that are needed for effective parallelization...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.