Image watercolorization is a hot research topic in the field of non-photorealistic rendering. There are many methods proposed to simulate the various features of watercolor painting including edge darkening, pigment d...
详细信息
In recent years, the IoT(Internet of things) industry has developed rapidly. As an important part of the IoT, smart streetlights have been widely used in cities around the world. More and more smart streetlights are b...
详细信息
One of the main challenges in the smart grid is how to efficiently manage the high volume data from smart meters and sensors and preserve the privacy from the consumption data to avoid potential attacks (e.g., identit...
详细信息
Emergence of smart appliances and high performance IoT devices is promoting studies on more functional and intelligent home services using these devices. Especially, in developed countries including Japan with aging p...
详细信息
ISBN:
(纸本)9781728147161
Emergence of smart appliances and high performance IoT devices is promoting studies on more functional and intelligent home services using these devices. Especially, in developed countries including Japan with aging population and declining birthrate, it is urgent to develop technologies to monitor living situations of residents including elderly persons and improve their quality of life (QoL) through home services based on the activity recognition technology. However, activity recognition systems in general require many types/number of sensors and hence they are difficult to deploy and operate. In this paper, we propose a system consisting of low-cost and easy-to-deploy sensors based on energy harvesting that can collect data of resident's activities of daily living (ADL) for months without maintenance. The system was deployed in 10 homes of senior citizens where we collected ADL data for two months each. We also estimated the ADLs from the collected data by using long short-term memory (LSTM), a deep learning model. As a result, ADLs could be estimated at high recall rate of 82.4% on average and hence we found that the proposed system has high applicability to actual services.
Block chain technology provides the foundation for the reshaping of accounting information systems. The key features of block chain decentralization, de-trust, co-governance, tamper resistance, traceability and open t...
详细信息
Cloud computing is a new technology model that consists of a pool of configurable resource and multiple data centers in distributed areas. It offers a service over the internet for users using virtual data, and who sh...
详细信息
ISBN:
(纸本)9783030335823;9783030335816
Cloud computing is a new technology model that consists of a pool of configurable resource and multiple data centers in distributed areas. It offers a service over the internet for users using virtual data, and who share resources for storing and accessing data from anywhere. Cloud computing supports big-scale platforms that consist of thousands of servers and hundreds of switches. Currently, the cloud is suffering from many issues in term of management, security and other essential aspects. This paper discusses integrating Software Defined Networking (SDN), with Network Function Virtualization (NFV) based on cloud computing, to eliminate some of the existing security issues faced by cloud computing. This research paper proposes a new architecture design by taking advantage of the NFV technology to build a virtual security mechanism such as Network Intrusion Detection System (NIDS).
With the advent of the era of big data, data plays a more and more important role. At the same time, the massive data also contains a variety of invalid information. The existing data information extraction methods do...
详细信息
Floating car data (FCD) are one of the most important sources of traffic data. However, their processing requires several steps that may seem trivial but have far-reaching consequences. One such step is map-matching, ...
详细信息
ISBN:
(纸本)9789811393648;9789811393631
Floating car data (FCD) are one of the most important sources of traffic data. However, their processing requires several steps that may seem trivial but have far-reaching consequences. One such step is map-matching, i.e. assignment of the FCD measurement to the correct road segment. While it can be done very simply by assigning the point of measurement to the closest road, this approach may produce a highly undesirable level of error. The second challenge connected with processing of FCD measurements is missing measurements. They are usually caused by the shortcomings of GPS technology (e.g. the satellites can be obscured by buildings or bridges) and may deny us many measurements during longer downtimes. The last problem we will solve is the assignment of measurements to very short segments. FCD measurements are taken in periodic steps for several seconds long. However, some road segments are very short and can be passed by a car in the shorter interval. Such segments are therefore very difficult to monitor. We plan to solve all these problems through a combination of geometric map-matching with the Dijkstra's shortest path algorithm.
Information systems based on Bayesian intelligent technologies make it possible to implement monitoring, control and management tools within the framework of the "smart City" concept. Such tasks are connecte...
详细信息
Vulnerabilities are everywhere around us. Every device we use in our daily life include a software that may contain vulnerabilities. The growth use of software and devices to automate some of our daily life actions is...
详细信息
ISBN:
(纸本)9781728180847
Vulnerabilities are everywhere around us. Every device we use in our daily life include a software that may contain vulnerabilities. The growth use of software and devices to automate some of our daily life actions is making these programs more complex and more connected to the internet, which increase the risk of cyber-attacks. To reduce this risk, multiple programming companies are trying to use different approaches to find these vulnerabilities. Some are using static approaches during the software development life cycle while others are using dynamic analysis approaches to find vulnerabilities once the application is correctly working. Unfortunately, both approaches still suffer from multiple limitation and still need improvement. In this paper, we are discussing some of the most recent dynamic approaches and the efficient of the tools that use them.
暂无评论