The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Interaction and communication between IoT devices are a new service trend in Internet of Things (IoT). With the connectivity and resources of an IoT device/ service, various scenarios can be provided to build interaction between IoT devices. To make those interactions more effective and efficient, an effective device interaction service for IoT is proposed. The proposed service uses temporal relationship...
With the proliferation of smart phones, mobile applications (APPs) are increasingly being used for mobile work and entertainment. In order to satisfy people's various demands, there are enormous mobile applications being delivered through different mobile application markets. This brings markets owners huge opportunities and tough challenges simultaneously. It is very difficult to find proper APPs...
We study statistical issues related to the use of words in messages on SNs, as related to specific potentially catastrophic events, such as fires and earthquakes. The analysis investigates the frequency of the words in the messages of interest, moreover their temporal correlation, and aims to determine a reasonable number of keywords for the searches of the events, especially in relation with analytics...
Cloud Computing did come up with so many attractive advantages such as scalability, flexibility, accessibility, rapid application deployment, and user self service. However in hindsight, Cloud Computing makes ensuring security within these environments so much challenging. Therefore traditional security mechanisms such as firewalls and antivirus softwares have proven insufficient and incapable of...
A fundamental challenge in controlling the leakage of sensitive information by computer systems is the possibility of correlations between different secrets, with the result that leaking information about one secret may also leak information about a different secret. We explore such leakage, here called Dalenius leakage, within the context of the g-leakage family of leakage measures. We prove a fundamental...
Confidentiality of training data induced by releasing machine-learning models, and has recently received increasing attention. Motivated by existing MI attacks and other previous attacks that turn out to be MI "in disguise," this paper initiates a formal study of MI attacks by presenting a game-based methodology. Our methodology uncovers a number of subtle issues, and devising a rigorous...
Intrusion detection systems (IDS) look for digital patterns mainly over the network or host traffic. Increasing complexity of todays enterprise information systems (EIS) obliges enterprises to deploy multiple but yet isolated IDSs in their IT boundaries, namely in, network (NIDS), host (HIDS), DMZs and application (appIDS). Modern exploits being able to disguise may appear innocent from an individual...
In many subjective listening tests, audio is evaluated on either “quality” or “preference”. These terms are often conflated. Little evidence has been gathered which explains the subtle differences between these terms in audio perception — we may not necessarily prefer high-quality audio samples. In the case of music, hedonic preference is strongly related to familiarity with the audio samples, which...
Automatic image annotation methods automatically assign labels to images in order to facilitate tasks such as image retrieval, search, organizing and management. Incorrect labels may negatively influence the search results so image annotation should be as accurate as possible. Labels pertaining to objects or to whole scenes are commonly used for image annotation, and precision is especially important...
With the widely use of smart devices and rapid development of communication technologies, it becomes easier for base stations to obtain the context information of users. The context information can be utilized to optimize system resource allocation. This paper focuses on context- aware unicast cellular networks. Assuming that some channel state information (CSI) can be predicted based on user context...
Ports can be considered as a mixed network composed of different stakeholders such as private service provider companies, public organizations, professional and social associations. Each of them has its own aims and the port community exercises the role of coordinator, taking on responsibility for governance. In general, the interaction among the different actors generates strategic synergy, contributing...
The article describes the factor model of Tomsk region schools functioning which was developed and investigated using the STATISTICA system. The constructed model describes an impact of different variables (context factors) on educational results of Tomsk school graduates. At the preliminary stage the most significant variables were determined, the exploratory data analysis was made using the method...
With the development of multimedia technology and the explosive growth of video data, content-based video copy detection has attracted considerable attentions in the multimedia and the computer vision community. However, most video copy detection methods only focus on the contents of key frames and ignore their temporal context information. In this paper, we proposed to express the temporal context...
This study analyses the effectiveness of teaching an undergraduate process control course in a flipped mode, with a constraint that the students do not have to do more work than in a conventional class. Video lectures delivered by the instructor in the past were used as study material. It was supplemented by classroom and LMS based discussions, a virtual lab, and tutorial sessions. To enforce the...
Many household appliances draw standby power, which can be reduced to save total energy consumption of a household. Smart plugs are proposed for effectively reducing standby power of an appliance by monitoring and cutting power when the appliance is no longer in use. However, the level of intelligence it leverages is minimal such that it still requires a direct manipulation by the user and does not...
This paper addresses conformance testing of communication protocols. The Session Initiation Protocol (SIP) is often considered "the standard protocol" for deploying VoIP (Voice over IP) solutions. We implemented a popular SIP distributed scenario on an industrial test bed. Active testing of SIP maintains our attention, while we kept on experimenting with the test cases dependencies architecture...
Embedded and invisible computing resources are paving the way to a new paradigm known as ubiquitous computing. In this paradigm, more attention needs to be paid to the development of context aware applications. Several proposals for the development of these applications are based on a context awareness loop with four phases. First, monitoring context information (Collect). Second, analyzing the collected...
This work investigates how Hidden Semi-Markov Model (HSMM) can be used to monitor and evaluate physical rehabilitation exercises by Kinect v2 to support medical personnel and patients during rehabilitation at home. Authors developed an exercises assessment method based on the extraction of motion features determined by clinicians. Five different rehabilitation exercises are modeled using a HSMM to...
In this paper, we introduce a distance-based approach for measuring the semantic dissimilarity between two concepts in a knowledge graph. The proposed Normalized Semantic Web Distance (NSWD) extends the idea of the Normalized Web Distance, which is utilized to determine the dissimilarity between two textural terms, and utilizes additional semantic properties of nodes in a knowledge graph. We evaluate...
This paper presents a novel prediction error estimation (PEE) based reversible watermarking scheme. A good predictor is key to the performance of this kind of watermarking scheme. A novel gradient based predictor estimates the pixel value based on a 5×5 neighborhood of the pixel. Moreover, the prediction error expansion (PEE) is divided between the current pixel and its top-diagonal neighbor such...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.