The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With systems performing Simultaneous Localization And Mapping (SLAM) from a single robot reaching considerable maturity, the possibility of employing a team of robots to collaboratively perform a task has been attracting increasing interest. Promising great impact in a plethora of tasks ranging from industrial inspection to digitization of archaeological structures, collaborative scene perception...
As educators seek to create better learning materials, knowledge about how students actually use the materials is priceless. The advent of online learning materials has allowed tracking of student movement on levels not previously possible with on-paper materials: server logs can be parsed for details on when students opened certain pages. But such data is extremely coarse and only allows for rudimentary...
Image sharing is one of the most attractive features facilitated by different social media sites such as Facebook, Flickr, Pinterest, and Instagram. People frequently use these social media sites to express various aspects of their life with peers they are connected through these sites. The service providers of these sites sometimes use the image features for social discovery such as friend recommendation,...
JavaScript has become one of the most popular languages in practice. Developers now use JavaScript not only for the client-side but also for server-side programming, leading to "full-stack" applications written entirely in JavaScript. Understanding such applications is challenging for developers, due to the temporal and implicit relations of asynchronous and event-driven entities spread...
In case of large scale disaster, officers of local government will receive a large amount of information related disaster status in order to make decision what to do into first responding tasks. Moreover, there is some problems caused by delaying of report on these information, this delay be an obstacle to take disaster countermeasure activity. In this paper, we describe an operation method for unified...
This paper presents 2-Dimensional visualization to categorize packets of network traffic into normal data pattern and attack data pattern based on the patterns resulted by a brute force attack. Two clustering methods: K-Means and Naïve Bayes methods are used to produce the data to be visualized. Experiments using ISCX and DARPA dataset were conducted. Brute force assaults on some service protocols...
In this demonstration we present MiniNAM, a utility that provides real-time animation of networks created by the Mininet emulator. Mininet is one of the most well-known network emulators in research and academia. Although Mininet is capable of emulating both traditional and software-defined networks, it does not provide a tool to visually observe and monitor the packets flowing over the created network...
The goal of this research is to create Efficient Privacy Preserving online communication System with help of VCS, Block DWT-SVD and modified Zernike Moment to prevent from attackers. In current Scenario online transactions are uses Client-server System. In that Server data will be modified by the attackers. VCS is Image Encryption technique Which Generate Binary Share image. One Binary share hide...
Geo-tweet visualization help users know the events that is happening over the space and time from the tweets or wikipedia while they click on the specified location for a 3D based tag visualization. Normal events are detected by system which happens anywhere or anytime using machine learning algorithm and special events are also extracted by comparing current situation to normal regularities. Generally,...
The availability of open source software projects has created an enormous opportunity for software engineering research. However, this availability requires that researchers judiciously select an appropriate set of evaluation targets and properly document this rationale. After all, the choice of targets may have a significant effect on evaluation.We developed a tool called RepoGrams to support researchers...
This paper deals with gender classification by analyzing footfalls captured by seismic sensor. Gender classification plays an important role in developing different applications like guided navigation system that helps the customer to find different shops in a big shopping mall or to find different departments in a hospital on the basis of their gender. We have tested different classifiers (SVM-Linear,...
Practical implementation of Web technologies in developing computer-aided circuit design (CAD) systems based on the Web Socket protocol is treated. An approach to storing project data by setting up a database server in data management Oracle environment is suggested. Components of the environment as well as those of the developed software, their assignment along with communication protocols are described...
Datacenter energy consumption constitutes a large portion of global energy consumption. Particularly, a large amount of this energy is consumed by the datacenter cooling system. Subsequently, many innovative cooling technologies have been developed to reduce energy consumption and increase cooling performance. In this work, an experimental setup was designed and constructed which comprises a direct...
Infrastructure visualization based on monitored resource status is essential for the effective operation of modern SDN (Software-Defined Networking)-enabled cloud. More specifically, collecting and visualizing visibility information about both physical & virtual (p+v) types of resources is one of key requirement for multi-site cloud operators. However, most existing visualization tools fall short...
Traditional password conversion scheme for user authentication is to transform the passwords into hash values. These hash-based password schemes are comparatively simple and fast because those are based on text and famed cryptography. However, those can be exposed to cyber-attacks utilizing password by cracking tool or hash-cracking online sites. Attackers can thoroughly figure out an original password...
Periodic broadcasting has achieved prominent performance in VoD (Video on Demand) service in wired network. However, the development of wireless VoD service still has gone on hard and slowly in comparison to the rapid growth of mobile video service. In this paper, we propose a scalable video streaming method HQOBA (Heterogeneous Quality-Oriented Bandwidth Allocation) to address the problems in wireless...
We propose that spectrograms can be useful for investigating large and complex sets of temporal data, especially 3D-like, using them as a quick and compact high density visualization tool for big data, where each pixel represents a data value. Our approach proposes for interaction with the spectrogram based toolkit thus allowing for a possible redefinition of hypothesis or research goals when new...
In today's world where everything is recorded digitally, right from our web surfing patterns to our medical records, we are generating and processing petabytes of data every day. Big data will be transformative in every sphere of life. But just to process and analyze those data is not enough, human brain tends to find pattern more efficiently when data is represented visually. Data Visualization and...
Parking-management systems, including services that recognize vacant stalls, can play a valuable role in reducing traffic and energy waste in large cities. Visual methods for detecting vacant parking spots are cost-effective options since they can take advantage of the cameras already available in many parking lots. However, visual-detection methods can be fragile and not easily generalizable. In...
Analyzing and visualizing large datasets generated by real-time spatio-temporal activities (e.g. vehicle mobility or large crowd movement) are a very challenging task. Recursive delays both at middleware and front end applications limit the of usefulness of the real-time analysis. In this paper, we present a framework “Spatial-Crowd” that first handles spatial-temporal data acquisition and processing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.