Industry 4.0 will bring not only transformation to the manufacturing technologies but also to the profile of the workforce. Education system should be revised to prepare the future graduates embracing the knowledge of...
详细信息
Rapid development in vehicular technology has caused more automated vehicle control to increase on the roads. Studies showed that driving in mixed traffic with an autonomous vehicle (AV) had a negative impact on the t...
详细信息
A significant number of cloud storage environments are already implementing deduplication *** to the nature of the cloud environment,a storage server capable of accommodating large-capacity storage is *** storage capa...
详细信息
A significant number of cloud storage environments are already implementing deduplication *** to the nature of the cloud environment,a storage server capable of accommodating large-capacity storage is *** storage capacity increases,additional storage solutions are *** leveraging deduplication,you can fundamentally solve the cost ***,deduplication poses privacy concerns due to the structure *** this paper,we point out the privacy infringement problemand propose a new deduplication technique to solve *** the proposed technique,since the user’s map structure and files are not stored on the server,the file uploader list cannot be obtained through the server’s meta-information analysis,so the user’s privacy is *** addition,the personal identification number(PIN)can be used to solve the file ownership problemand provides advantages such as safety against insider breaches and sniffing *** proposed mechanism required an additional time of approximately 100 ms to add a IDRef to distinguish user-file during typical deduplication,and for smaller file sizes,the time required for additional operations is similar to the operation time,but relatively less time as the file’s capacity grows.
IoT edge platform has become popular in various distributed environments. The edge devices need to communicate BigData among them or with the cloud servers by collaborating with AI technologies for finding events from...
详细信息
This paper focuses on a performance enhancement of communication performance by compressing data stream. ASE coding is an effective lossless data compression method for data stream. The software implementation of the ...
详细信息
Foreground segmentation is one of moving object detection techniques of computer vision applications. To date, modern moving object detection methods require complex background modeling and thresholds tuning to confro...
详细信息
The paradigm of polygenic risk score (PRS) has recently been getting much wider attention. PRS is a mathematical aggregate reflection of the risk conferred by deoxyribonucleic acid (DNA) variations to estimate the sus...
详细信息
The surge of cyberbullying on social media platforms is a major concern in today's digital age, with its prevalence escalating alongside advancements in technology. Thus, devising methods to detect and eliminate c...
详细信息
Method of teaching and inheriting for skill is almost oral. It is not quantitative but qualitative. Quantitative inheriting of skill is difficult. In this paper, after tracking of a subject's skill motion using Mi...
详细信息
ISBN:
(纸本)9789897580406
Method of teaching and inheriting for skill is almost oral. It is not quantitative but qualitative. Quantitative inheriting of skill is difficult. In this paper, after tracking of a subject's skill motion using Microsoft Kinect, a subject's motion is visualized as the curved surface. A curved surface is fitted in the positions of a subject's joint, or the direction of trajectories. Expert and beginner perform swimming and karate motion. After the motions are tracked, the trajectories of joints are transformed to a curved surface. The difference of an action between an expert and a beginner is extracted by investigating curvatures and form on the visualized curved surface. Therefore, we expected that technical skill is transferred easily.
Quantitative analysis of user behavior calls for automated collection of large amount of log data over time. In this paper, we present a service platform for logging and analyzing mobile user behaviors. We have implem...
详细信息
暂无评论