Results (1734)
Search Parameters:
Keyword: SinInvestigating the Expertise Indicators of Vulnerability Discovery Professionals
In crowdsourcing, selecting the person with suitable expertise is very important; especially since the task requester is not always in direct contact with the worker. Recently, this has become increasingly important particularly when the crowdsourced tasks are complex and require skillful workers (e.g. software development, software testing, vulnerability discovery, and open innovation). In this paper,…
Read MoreA Cost Effective Security Technology Integrated with RFID Based Automated Toll Collection System
Crime statistics and research on criminology show that under similar circumstances,crimes are more likely to occur in developing countries than in developed countries due to their lack ofsecurity measures. Transport crimes on highways and bridges are one of the most common crimes in the developing nations. Automation of various systems like the toll collection system…
Read MoreA Comparison of Mean Models and Clustering Techniques for Vertebra Detection and Region Separation from C-Spine X-Rays
In Computer Aided Diagnosis (CAD) tools, vertebra localization and detection are the essential steps for the diagnosis of cervical spine injuries. The accurate localization leads to accurate treatment, which is more challenging in case of poor contrast and noisy radiographs. This paper targets c-spine radiographs for the localization of vertebra using different vertebra templates, vertebra…
Read MoreRetrieving Dialogue History in Deep Neural Networks for Spoken Language Understanding
In this paper, we propose a revised version of the semantic decoder for multi-label classification task in the spoken language understanding (SLU) pilot task of the Dialog State Tracking Challenge 5 (DSTC5). Our model concatenates two deep neural networks – a Convolutional Neural Network (CNN) and a Recurrent Neural Networks (RNN) – for detecting semantic…
Read MoreOn Modeling Affect in Audio with Non-Linear Symbolic Dynamics
The discovery of semantic information from complex signals is a task concerned with connecting humans’ perceptions and/or intentions with the signals content. In the case of audio signals, complex perceptions are appraised in a listener’s mind, that trigger affective responses that may be relevant for well-being and survival. In this paper we are interested in…
Read MorePluggable Controllers and Nano-Patterns in Java with Lola
Pluggable controllers are a different way to design control constructors such as if, while, do, switch, and operators such as short circuit con-junction (&&) and the “?.” operator of the Swift programming language. Adoption of pluggable controllers enables the final user to modify and extend the control flow constructs (if, while, etc.) of an underlying…
Read MoreMathematical Model Based on Newton’s Laws and in First Thermodynamic Law of a Gas Turbine
The present article explains the modeling of a Gas Turbine system; the mathematical modeling is based on fluid mechanics applying the principal energy laws such as Euler’s Law, Newton’s second Law and the first thermodynamic law to obtain the equations for mass, momentum and energy conservation; expressed as the continuity equation, the Navier-Stokes equation and…
Read MoreFinite Element Modeling for Wind Response of Aluminum Wall Cladding in Tall Building
This paper analyzed wind loading responses of Aluminum Wall cladding panels in Tall Building using Ikeja Lagos State Nigeria. The wind loads were calculated according to Standard and Specification From BS6399-2:1997 Using the wind speed data of Lagos state Nigeria and finite element analysis, we predicted the responses of these Aluminum wall Cladding panels to…
Read MoreDesign and Construction of a remote control switching device for household appliances application
Remote control switching device for household application is a home device used to control the switching of household appliances from a distance. It serves to make the switching of household appliances easy for the elderly, physically challenged, the young and anyone who, in any circumstance, needs comfort and security. This paper develops a remote control…
Read More1-D Wavelet Signal Analysis of the Actuators Nonlinearities Impact on the Healthy Control Systems Performance
The objective of this paper is to investigate the use of the 1-D wavelet analysis to extract several patterns from signals data sets collected from healthy and faulty input-output signals of control systems as a preliminary step in real-time implementation of fault detection diagnosis and isolation strategies. The 1-D wavelet analysis proved that is an…
Read MoreModeling Double Subjectivity for Gaining Programmable Insights: Framing the Case of Uber
The Internet is the premier platform that enable the emergence of new technologies. Online news is unstructured narrative text that embeds facts, frames, and amplification that can influence society attitudes about technology adoption. Online news sources are carriers of voluminous amounts of news for reaching significantly large audience and have no geographical or time boundaries.…
Read MoreEmotional state recognition in speech signal
The matters regarding speech signal processing and analyzing in terms of emotional states recognition were presented in this paper. An experiment was conducted to perform both objective and subjective emotional states recognition tests for Polish language.
Read MoreThree-Dimensional EEG Signal Tracking for Reproducible Monitoring of Self-Contemplating Imagination
Electroencephalography (EEG) can globally monitor neural activity in millisecond scale, which is critical for identifying causality of human brain functions and mechanisms. However, to obtain accurate EEG stimulation-response relationship one usually needs to repeat multiple-ten times of stimulation-response recording to average out background signals of other irreverent brain activities, making real-time monitoring difficult to be…
Read MoreCall Arrival Rate Prediction and Blocking Probability Estimation for Infrastructure based Mobile Cognitive Radio Personal Area Network
The Cognitive Radio usage has been estimated as non-emergency service with low volume traffic. Present work proposes an infrastructure based Cognitive Radio network and probability of success of CR traffic in licensed band. The Cognitive Radio nodes will form cluster. The cluster nodes will communicate on Industrial, Scientific and Medical band using IPv6 over Low-Power…
Read MoreA Secure Automated Elevator Management System and Pressure Sensor based Floor Estimation for Indoor Mobile Robot Transportation
In this paper, a secure elevator handling system is presented to enable a flexible movement of wheeled mobile robots among laboratories distributed in different floors. The automated handling system consists mainly of an ADAM module which has the ability to call the elevator to the robot’s current floor and to request the destination floor. The…
Read MoreCOTS – Harsh Condition Effects Considerations from Technology to User Level
Radiation hardened devices are mostly extremely expensive. The continuously downscaling of microelectronic structures and the unavoidable presence of particle radiation on ground and in space leads to unwanted failures in electronic devices. Furthermore it is expected that in the next few years around 8000 new satellites will be launched around the world. Due to the…
Read MoreA Reliable, Non-Invasive Approach to Data Center Monitoring and Management
Recent standards, legislation, and best practices point to data center infrastructure management systems to control and monitor data center performance. This work presents an innovative approach to address some of the challenges that currently hinder data center management. It explains how monitoring and management systems should be envisioned and implemented. Key parameters associated with data…
Read MorePlanning an Availability Demonstration Test with Consideration of Confidence Level
The full service life of a technical product or system is usually not completed after an initial failure. With appropriate measures, the system can be returned to a functional state. Availability is an important parameter for evaluating such repairable systems: Failure and repair behaviors are required to determine this availability. These data are usually given…
Read MoreLifelong Learning Application: Mobile Application to Promote Lifelong Learning and Introduce Educational Institutions
Education is the raising of the thinking process and developing the mind in a broader perspective. However, education that is comprehensive and appropriate to the individual according to its potential, ability and skill is too hardest to describe. Thus, matching and referral institutions, including education model that suits the person’s behavior has been receiving attention.…
Read MoreClean Energy Use for Cloud Computing Federation Workloads
Cloud providers seek to maximize their market share. Traditionally, they deploy datacenters with sufficient capacity to accommodate their entire computing demand while maintaining geographical affinity to its customers. Achieving these goals by a single cloud provider is increasingly unrealistic from a cost of ownership perspective. Moreover, the carbon emissions from underutilized datacenters place an increasing…
Read MorePixel-Based Unsupervised Classification Approach for Information Detection on Optical Markup Recognition Sheet
This paper proposed an Optical Markup Recognition (OMR) system to be used to detect shaded options of students after MCQ-type examinations. The designed system employed the pixel-based unsupervised classification approach with image pre-processing strategies and compared its efficiencies, in terms of speed and accuracy, with object-based supervised or unsupervised classification OMR systems. Speed and accuracy…
Read MoreLookup Tables-based mean level detection of spatially distributed targets in non Gaussian clutter
In this paper, Constant False Alarm Rate (CFAR) detection of spatially distributed targets embedded in compound Gaussian clutter with Inverse Gamma texture is addressed. By taking into account the fact that clutter parameters are unknown in practical situations, we propose mean level based on Lookup Tables detectors, that operate as a two-step approach, which consists…
Read MoreSource Code Vulnerabilities in IoT Software Systems
An empirical study that examines the usage of known vulnerable statements in software systems developed in C/C++ and used for IoT is presented. The study is conducted on 18 open source systems comprised of millions of lines of code and containing thousands of files. Static analysis methods are applied to each system to determine the…
Read MoreAnalytical and Algorithmic Approaches to Determine the Number of Sensor Nodes for Minimum Power Consumption in LWSNs
A Linear Wireless Sensor Network (LWSN) is a kind of wireless sensor network where the nodes are deployed in a line. Since the sensor nodes are energy restricted, energy efficiency becomes one of the most significant design issues for LWSNs as well as wireless sensor networks. With the proper deployment, the power consumption could be…
Read MoreScalability Dilemma and Statistic Multiplexed Computing — A Theory and Experiment
The For the last three decades, end-to-end computing paradigms, such as MPI (Message Passing Interface), RPC (Remote Procedure Call) and RMI (Remote Method Invocation), have been the de facto paradigms for distributed and parallel programming. Despite of the successes, applications built using these paradigms suffer due to the proportionality factor of crash in the application…
Read More
