Phishing is a form of online identity theft. Phishers use social engineering to steal victims' personal identity data and financial account credentials. Social engineering schemes use spoofed e-mails to lure unsus...
详细信息
Phishing is a form of online identity theft. Phishers use social engineering to steal victims' personal identity data and financial account credentials. Social engineering schemes use spoofed e-mails to lure unsuspecting victims into counterfeit websites designed to trick recipients into divulging financial data such as credit card numbers, account usernames, passwords and social security numbers. In this paper, a thorough overview of a phishing attack and detection techniques is presented. Firstly, technologies used by phishers and the definition, classification and future works of deceptive phishing attacks are discussed. Following with the existing detection techniques in literatures and research-stage technologies are shown, and a thorough analysis that shortcomings of countermeasures is given.
Online assignments with mathematical analyses often replicate the handwritten problem-solving process. This paper addresses work-in-progress enhancements to online linear-systems modules that move past procedural solu...
详细信息
Online assignments with mathematical analyses often replicate the handwritten problem-solving process. This paper addresses work-in-progress enhancements to online linear-systems modules that move past procedural solutions toward visualizations and exercises that promote deeper thinking. Enhancements address (1) plotting additions to zero-input response and unit-impulse response help files and (2) a new Fourier series module that targets coefficient comparisons rather than calculations. The time-domain enhancements focus on the visualization of signals that are solutions to the system equations, whereas the Fourier series additions focus on the roles that the coefficients play in determining signal shape. Upon completion of this enhanced module set, data from in-class examinations and out-of-class teaching/learning interviews will be compared to similar data from prior course offerings in an attempt to quantify the effect of these higher-level, conceptual additions on learning.
One of the key priorities for stroke survivors in their rehabilitation process is regaining their ability to walk. Evidence has shown that provision of ankle-foot orthoses (AFOs) can have a positive impact on walking....
详细信息
One of the key priorities for stroke survivors in their rehabilitation process is regaining their ability to walk. Evidence has shown that provision of ankle-foot orthoses (AFOs) can have a positive impact on walking. This paper discusses the role of gait analysis in the provision of AFOs for stroke survivors. A discussion of the shortcomings of gait analysis techniques is included, with a description of how these might be overcome during the AFO tuning process through the ongoing development of data visualisation software. The design of a randomised controlled trial in conjunction with a series of qualitative measures is described, which will be used to test the efficacy of the visualisation software.
Testing of Phasor Measurement Units (PMU devices) is necessary for any PMU application, be it a simple visualization and archiving system or a more complex set of real-time system operations tools. PMUs are available ...
详细信息
Testing of Phasor Measurement Units (PMU devices) is necessary for any PMU application, be it a simple visualization and archiving system or a more complex set of real-time system operations tools. PMUs are available from virtually every manufacturer of protection and monitoring equipment. PMUs can be an embedded function within relays or disturbance recorders, alternatively, PMUs can be standalone products. Many PMUs installations throughout the world are typically used for offline analysis and monitoring. PMU data can include monitoring of oscillations, angle difference, system frequency and voltage stability. Other ideas for PMU data include situational awareness, alarm and operational limit settings, state estimation and congestion management to name a few.
Aortic dissection is a real problem of public health, it is a medical emergency and may quickly lead to death. Aortic dissection is caused by aortal tissue perforation because of blood pressure. It consists of tears (...
详细信息
ISBN:
(纸本)9780819484017
Aortic dissection is a real problem of public health, it is a medical emergency and may quickly lead to death. Aortic dissection is caused by aortal tissue perforation because of blood pressure. It consists of tears (or holes of the intimal tissue) inside lumens. These tears are difficult to detect because they do not correspond to a filled organ to segment;they are usually visually retrieved by radiologists by examining gray level variation on successive image slices, but it remains a very difficult and error-prone task. Our purpose is to detect these intimal tears to help cardiac surgeons in making diagnosis. It would be useful either during a preoperative phase (visualization and location of tears, endoprothesis sizing);or during a peroperative phase (a registration of tears on angiographic images would lead to a more accuracy of surgeon's gestures and thus would enhance care of patient). At this aim, we use Aktouf et al.'s holes filling algorithm proposed in the field of digital topology. This algorithm permits the filling of holes of a 3D binary object by using topological notions - the holes are precisely the intimal tears for our aortic dissection images, after a first preprocessing step. As far as we know, this is the first time that such a proposal is made, even if it is a crucial data for cardiac surgeons. Our study is a preliminary and innovative work;our results are nevertheless considered satisfactory. This approach would also gain to be known to specialists of other diseases.
For the VAST 2011 Network Security Mini-Challenge, we adopted geovisual analytic methods and applied them in the field of network security. We used the GeoViz Toolkit [1] to represent cyber security events, by fabrica...
详细信息
For the VAST 2011 Network Security Mini-Challenge, we adopted geovisual analytic methods and applied them in the field of network security. We used the GeoViz Toolkit [1] to represent cyber security events, by fabricating a simple “geography” of several sets of blocks (one for the workstations, one for the servers, and one for the Internet) using ArcGIS 10 (by ESRI - Environmental System Research Institute). Security data was tabulated using Perl scripts to parse the logs in order to create representations of event frequency and where they occurred on the network. The tabulated security data was then added as attributes of the geography. Exploration of the data and subsequent analysis of the meaning and impact of the cyber security events was made possible using the GeoViz Toolkit.
Advances in imaging devices and web technologies have brought dramatic improvements in collecting, storing, and sharing images. The leakage of privacy information in the process becomes an important issue that has sta...
详细信息
Advances in imaging devices and web technologies have brought dramatic improvements in collecting, storing, and sharing images. The leakage of privacy information in the process becomes an important issue that has started drawing attention from both academia and industry. In this work, we study the problem of privacy preserving with focus on license plate number protecting in imagery. Specifically, we present a novel method for de-identifying license plate images with the least degradation in image visual quality for privacy protection. Unlike previous de-identification methods that pay little attention to the image quality preservation, our method, named inhomogeneous principal component blur (IPCB), adaptively blurs different pixels of a license plate by taking into account the prior distribution of sensitive information. We tested the proposed method on a public dataset in comparison with several popular de-identification methods. The evaluation shows that our method successfully de-identified the privacy information with the least damage of image quality when compared with several other solutions.
In this paper, we present a novel approach for news video story sentiment analysis. Two research challenges are addressed: news video story sentiment classification and ranking. For classification, a graph based semi-...
详细信息
ISBN:
(纸本)9781612843483
In this paper, we present a novel approach for news video story sentiment analysis. Two research challenges are addressed: news video story sentiment classification and ranking. For classification, a graph based semi-supervised learning approach is utilized to classify the news stories into sentiment classes. Graph based semi-supervised learning is able to tackle the problem of lacking labeled data. After classification, two sentiment classes are obtained: positive and negative. In order to project the news videos into sentiment space, a multimodal approach by fusing the text sentiment and visual representation scores is adopted to rank the videos in each class. For sentiment representation, inter and intra sentiment class analysis is conducted based on affinity propagation clustering and PageRank algorithm. A user study is conducted to evaluate the video ranking performance. The experimental results on the selected topics are promising and demonstrate the proposed approach is effective.
This paper presents a novel approach to cellular network coverage analysis and demonstrates the capabilities of a prototype system. Location specific network measurements are obtained from consumer mobile devices with...
详细信息
This paper presents a novel approach to cellular network coverage analysis and demonstrates the capabilities of a prototype system. Location specific network measurements are obtained from consumer mobile devices within the network. Crowd sourcing is used to generate a sufficiently large dataset of measurements. By visualising these measurements in a location-based context, this system can be used to produce high accuracy network coverage maps, improve the identification of cell boundaries, observe detailed cell level measurements and analyse the dynamic characteristics of a cellular network.
The epigenome, such as nucleosome structure and DNA methylation, regulates expression of genes. Searching for evolutionarily conserved sequence motifs essential for controlling the epigenome is a fundamental problem i...
详细信息
The epigenome, such as nucleosome structure and DNA methylation, regulates expression of genes. Searching for evolutionarily conserved sequence motifs essential for controlling the epigenome is a fundamental problem in biology. Collecting massive epigenome data has been becoming increasingly feasible because of the wide-spread availability of next-generation sequencing technology. Thus, there have been growing interests in the genome-wide analysis of the epigenome. There are some issues to be resolved. Care has to be taken to select samples so as to reduce false-positive findings. Processing enormous epigenome data is a computationally intensive task and needs a suite of software techniques such as suffix array, error correction, customizable datavisualization, machine learning, and efficient database management. In this talk, I will overview these issues and their solutions, and discuss remaining bioinformatics problems.
暂无评论