In this paper we propose the application of the generalized median graph in a graph-based k-means clustering algorithm. In the graph-based k-means algorithm, the centers of the clusters have been traditionally represe...
详细信息
Understanding and recognizing human activities from sensor readings is an important task in pervasive computing. In this paper, we investigate the fundamental problem of recognizing activities for multiple users from ...
详细信息
Understanding and recognizing human activities from sensor readings is an important task in pervasive computing. In this paper, we investigate the fundamental problem of recognizing activities for multiple users from sensor readings in a home environment, and propose a novel pattern mining approach to recognize both single-user and multi-user activities in a unified solution. We exploit Emerging pattern - a type of knowledge patternthat describes significant changes between classes of data - for constructing our activity models, and propose an Emerging pattern based Multi-user Activity Recognizer (epMAR) to recognize both single-user and multi-user activities.
Electricity market liberalization gives the opportunity to customers to choose their electricity supplier. In this new circumstance more exact knowledge of consumer behavior is essential for designing specific pricing...
详细信息
Electricity market liberalization gives the opportunity to customers to choose their electricity supplier. In this new circumstance more exact knowledge of consumer behavior is essential for designing specific pricing strategies, where the pricing considers the consumption patterns from various types of customers. In our paper artificial intelligence techniques (self-organizing maps, neural networks) are applied for consumer characterization and classification. After the characterization procurement costs were calculated for the different consumer groups. Based on the obtained results relationship could be determined between procurement costs and consumer's load patterns in order to support our traders in procurement activity.
Wireless sensor networks have become a technology for the new millennium withthe endless possibilities for applications ranging from academic to military. these tiny sensors are deployed in open environments, where s...
详细信息
Wireless sensor networks have become a technology for the new millennium withthe endless possibilities for applications ranging from academic to military. these tiny sensors are deployed in open environments, where security for data or hardware cannot be guaranteed. Unfortunately due to the resource constraints, traditional security schemes cannot be applied. therefore designing protocols that can operate securely using smart inherent features is the best option. In this paper, an efficient way of detecting an intruder using Honeypot and swarm intelligence is proposed. the Honeypot architecture strategically enables agents to track the intruders. this process of locating an intruder reduces the false alarm detection rate caused by denial-of-service attacks. A detailed analysis of the attack is captured to predict future attacks using patternrecognition. the proposed framework is evaluated based on accuracy and speed of intruder detection before the network is compromised. this process of detecting the intruder earlier helps learn his/her future attacks, but also a defensive countermeasure.
Scintigraphic imagery is an important data source since it provides morphological and functional clinical informations. However, scintigraphic images present very bad quality because of several degradation factors. In...
详细信息
Scintigraphic imagery is an important data source since it provides morphological and functional clinical informations. However, scintigraphic images present very bad quality because of several degradation factors. In fact, the recorded data are embedded in noise modelled as the realisation of Poisson process. the aim of this paper is to provide a framework able to enhance nuclear images quality by Poisson intensity estimation. this framework consists, in a first step, of performing variance-stabilizing step for the Poisson process thanks to the Anscombe transformation. So the obtained data can be considered as contaminated by a white Gaussian noise. In a second step, it uses a Bayesian technique inspired of Pizurica approach, known in the literature for exhibiting good results as for white Gaussian noise. In fact, the complex wavelet packets were exploited regarding to Pizurica algorithm.
Robust and accurate algorithm in real time eye tracking system has been a fundamental and challenging problem for computer vision and biomedical engineering area. this paper proposes a new method to estimate eye-motio...
详细信息
Robust and accurate algorithm in real time eye tracking system has been a fundamental and challenging problem for computer vision and biomedical engineering area. this paper proposes a new method to estimate eye-motion position and direction based on initial centroid and gradient analysis technique. the proposed method was validated by tracking eye position within high and low occlusion conditions. Experimental results show that the proposed method improves the accuracy of tracking pupil position compared to conventional window-matching method. the proposed method yields 76.07% and 87,89% accuracies while the conventional window-matching performs 44.56% and 67.89% accuracies within high and low occlusion conditions, respectively.
the CENIT research project GAD (Demand Active Management), partly supported by the Spanish government, has as its objective the demand side management (DSM) of domestic end-users, smoothing the peaks of energy demand,...
详细信息
the CENIT research project GAD (Demand Active Management), partly supported by the Spanish government, has as its objective the demand side management (DSM) of domestic end-users, smoothing the peaks of energy demand, therefore enhancing the conditions of transport and distribution networks and the quality of energy delivery and service. One of the objectives in the development of the project is the classification of users according to their patterns of daily energy load profiles. Based on daily hour measures from a sample of residential users, a self-organizing map (SOM) has been trained to classify users according to a specific number of resulting patterns of daily load profiles, attached to a number of indices that define the users' energy consumption. the so-trained SOM classifier allows the characterization of future users based on their load profiles, thus estimating their energy consumption habits and potentially manageable energy.
Nowadays, the power production and transmission are substantial elements for the society, and will probably play a more important role in the future, but are also associated with various negative effects, which impose...
详细信息
Nowadays, the power production and transmission are substantial elements for the society, and will probably play a more important role in the future, but are also associated with various negative effects, which impose additional costs, the so called external costs. As long as these are not included in the electricity prices, market failures most often arise. In order to define expansion projects, right price signals are needed. thus, the internalization of external costs in power production, which typically leads to higher marginal production costs for conventional power plants, can help in the identification of sustainable future transmission and production plans. the aggregated benefit of the internalization of external costs is usually higher than the social welfare deficit, depending on the energy mix, and can be further used in order to reinforce the existing electricity network, financing ldquogreenrdquo investments. the idea in this paper is the coordination of generation, transmission and policy planning, and their interaction, towards a common electricity market. the proposed methodology is based on a cost benefit analysis in order to support the final decision taken. Several scenarios, considering demand changes, power plants installations and investments in transmission are implemented by means of a European ldquocopperplaterdquo model.
the ever increasing of software technologies has brought closer technology to users with visual impaired *** diversification poses a real challenge to "authors" (developers and designers) when creating softw...
详细信息
the ever increasing of software technologies has brought closer technology to users with visual impaired *** diversification poses a real challenge to "authors" (developers and designers) when creating software that has to cope with a myriad of interaction situations,as well as specific directives for ensuring an accessible *** an advanced accessibility simulation tool,"authors" can obtain a better understanding of the accessibility constraints for visual impaired users within a Java Swing application by simulating each *** proposed NetBeans-enabled plugin tool will assist them,with a minimal effort,to explore user-centered design and important accessibility issues for their Java Swing implementations
作者:
Perales, F.J.Fisher, R.UIB
Dept. of Computer Science and Mathematics Computer Graphics and Vision Group C/ Valldemossa Km. 7.5 PC 07122 Palma de Mallorca Spain University of Edinburgh
School of Informatics James Clerk Maxwell Building Mayfield Road Edinburgh EH9 3JZ United Kingdom
暂无评论