We propose a new method to explore the characteristics of genetic networks whose dynamics are described by a linear discrete dynamical model x t+1 = Axt . The gene expression data xt is given for various time points a...
详细信息
A basic cyber security problem is how to optimally spend a security budget. We cast this problem in the framework of combinatorial optimization and explore its relationship with the classical knapsack problem. As in t...
详细信息
This paper introduces a powerful, efficient and generic framework for optimal routing of electric vehicles in the setting of flexible edge cost functions and arbitrary initial states. More precisely, the introduced st...
详细信息
The APL language allows subject matter experts with no computer science experience to create large and complex software implementations of ideas without excessive software engineering and external development costs. T...
详细信息
The proceedings contain 7 papers. The topics discussed include: utilizing security risk analysis and security testing in the legal domain;a graph-based approach for analysis of software security;towards attribute-base...
ISBN:
(纸本)9783319070759
The proceedings contain 7 papers. The topics discussed include: utilizing security risk analysis and security testing in the legal domain;a graph-based approach for analysis of software security;towards attribute-based access control policy engineering using risk;a systematic method for risk-driven test case design using annotated sequence diagrams;towards integration of compositional risk analysis using Monte Carlo simulation and security testing;a trace management platform for risk-based security testing;dynamic risk model of money laundering;assessing privacy risks in android: a user-centric approach;and security risk analysis by logic programming.
The UML is a modelling language common use in software development. UML is the de-facto standard language used to analyse and design object-oriented software systems. The UML is a modeling language common use in softw...
详细信息
In recent years, the internet use has led to rapid increases in multimedia resources. In this regard, handling multimedia data has become an important issue in information retrieval fields, and multimedia indexing pla...
详细信息
This paper presents the design and implementation of a software platform for creating interactive visualisations that respond to the free-form movements of a non-professional dancer. The visualisations can be trained ...
详细信息
ISBN:
(纸本)9781450328142
This paper presents the design and implementation of a software platform for creating interactive visualisations that respond to the free-form movements of a non-professional dancer. The visualisations can be trained to respond to the idiosyncratic movements of an individual dancer. This adaptive process is controlled by Interactive Machine Learning. Our approach is novel because the behaviour of the interactive visualisations is trained by a dancer dancing, rather than a computer scientist explicitly programming rules. In this way IML enables an 'embodied' form of design, where a dancer can design an interactive system by moving, rather than by analysing movement. This embodied design process taps into and supports our natural and embodied human understanding of movement. We hope the process of designing an interactive experience for free form dance will help us to understand more about how to create embodied interfaces and allow us to build a general frame- work for embodied interaction. We would also like to create a compelling, embodied and enjoyable experience with more satisfying interactions than previous dance computer games which use pre-scripted routines where a player must repeat a sequence of moves. The system was developed using a participatory methodology, with a software developer and an interaction designer working in partnership with users to test and refine two prototypes of the system. A third prototype has been built but not yet tested.
The main theme of this paper is performing online handwriting recognition for Arabic character using back propagation neural network and it experiments the performance of it using online features of characters as inpu...
详细信息
The main theme of this paper is performing online handwriting recognition for Arabic character using back propagation neural network and it experiments the performance of it using online features of characters as input to the BPNN in comparison with combining online and offline character features as the input. That's done through the following stages : online data acquisition, online & offline preprocessing, online & offline feature extraction (directional & geometric features), classification using back propagation neural network to classify the character to one of 15 character classes and finally, delayed strokes handling using logic programming to recognize the character according to the character class and its delayed strokes accounts and positions.
Notice of Violation of IEEE Publication Principles "SBBSCS: SHA Based Biometric Smartcard Security" by V. Kovendan, Gerly Eldose in the Proceedings of the internationalconference on Information Communicatio...
Notice of Violation of IEEE Publication Principles "SBBSCS: SHA Based Biometric Smartcard Security" by V. Kovendan, Gerly Eldose in the Proceedings of the internationalconference on Information Communication and Embedded Systems (ICICES), February 2014 After careful and considered review of the content and authorship of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles. This paper copies text and figures from the paper cited below. The original content was copied without attribution (including appropriate references to the original author(s) and/or paper title) and without permission. "Smart Card with Iris Recognition for High Security Access Environment" by Mohammed A.M. Abdullah, F.H.A. Al-Dulaimi, Waleed Al-Nuaimy and Ali Al-Ataby in the Proceedings of the 1st Middle Eastconference on Biomedical engineering (MECBME), February 2011, pp. 382-385 Smartcards are being used as a form of identification and authentication. One major problem with smartcards, however, is the possibility of loss or theft. Current options for securing smartcards against unauthorized use are primarily restricted to passwords. Passwords are easy enough for others to steal so that they do not offer sufficient protection. This has promoted interest in biometric identification methods, including iris recognition. The iris is, due to its unique biological properties, exceptionally suited for identification. It is protected from the environment, stable over time, unique in shape and contains a high amount of discriminating information. This paper proposes a method to integrate iris recognition with the smart card to develop a high security access environment. An iris recognition system and smart card programming circuit with its software have been designed. Template on card (TOC) category has been employed. The extracted iris features stored the form of hash in smartcard are compared against the hash of data acquired
暂无评论