Results (31)
Search Parameters:
Keyword: TWIAutomated Text Annotation for Social Media Data during Natural Disasters
Nowadays, text annotation plays an important role within real-time social media mining. Social media analysis provides actionable information to its users in times of natural disasters. This paper presents an approach to a real-time two layer text annotation system for social media stream to the domain of natural disasters. The proposed system annotates raw tweets…
Read MoreSignal-Based Metamodels for Predictive Reliability Analysis and Virtual Testing
In the current industrial development, an increasing number of sensors is applied for monitoring of any kind of appliances and machines. A predictive mathematical model allows for realistic assessment of the health state of the appliance, indication of service requirements, as well as control of the appliance, serving as so-called digital twin on a control…
Read MoreShort CCA-Secure Attribute-Based Encryption
Chosen-ciphertext attacks (CCA) are typical threat on public-key encryption schemes. We show direct chosen-ciphertext security modification in the case of attribute-based encryption (ABE), where an ABE scheme secure against chosen-plaintext attacks (CPA) is converted into an ABE scheme secure against CCA by individual techniques. Our modification works in the setting that the Diffie-Hellman tuple to…
Read MorePluggable Controllers and Nano-Patterns in Java with Lola
Pluggable controllers are a different way to design control constructors such as if, while, do, switch, and operators such as short circuit con-junction (&&) and the “?.” operator of the Swift programming language. Adoption of pluggable controllers enables the final user to modify and extend the control flow constructs (if, while, etc.) of an underlying…
Read MoreA Modified Patch Antenna with Square-Open Loop Resonator Slot for Improved Bandwidth Performance in WiFi Applications
A novel, modified square patch antenna with square open loop resonator slot, operating at 5.5 GHz, for improved bandwidth performance is proposed in this article. A complementary square open loop resonator is introduced on the patch to enhance the bandwidth more than twice that of the conventional square patch antenna operating at the same frequency.…
Read MoreA security approach based on honeypots: Protecting Online Social network from malicious profiles
In the recent years, the fast development and the exponential utilization of social networks have prompted an expansion of social Computing. In social networks users are interconnected by edges or links, where Facebook, twitter, LinkedIn are most popular social networks websites. Due to the growing popularity of these sites they serve as a target for…
Read More
