Selecting the most suitable local invariant feature detector for a particular application has rendered the task of evaluating feature detectors a critical issue in vision research. Although the literature offers a var...
详细信息
Personality traits are increasingly being incorporated in systems to provide a personalized experience to the user. Current work focusing on identifying the relationship between personality and behavior, preferences, ...
详细信息
Paraphrase evaluation is used to determine whether two input sentences share a same meaning. The automatic analysis for paraphrase evaluation technology has a potential use in the area of information retrieval technol...
详细信息
Nano devices have great potential to play a vital role in future medical diagnostics and treatment technologies because of its non-invasive nature and ability to reach delicate body sites easily as compared to convent...
详细信息
SNOLA is a Thematic Network of Excellence recognized by the Spanish Ministry of Economy and Competitiveness composed of the main Spanish researchers in the field of learning analytics. This network emerged in 2013 foc...
详细信息
Estimating distribution of load change in response to demand management programs has been targeted in many researches, mostly based on economical and business sale-price models. In this paper a bottom-up analysis appr...
详细信息
ISBN:
(纸本)9781509051687
Estimating distribution of load change in response to demand management programs has been targeted in many researches, mostly based on economical and business sale-price models. In this paper a bottom-up analysis approach will be considered. As the first step consumer's decision making process has been approximated using mathematical modeling. In this step a novel optimization model for production scheduling will be introduced which takes into account different energy consumption states. In the second step a design of experiment (DOE) model will be developed base on different energy and production factors. In the third step, two new distributions will be introduced based on a variable selected in DOE analysis. The proposed distributions can be obtained based on significant variables and be utilized in market analysis and more specifically, in stochastic analysis.
Interoperability is one of crucial Internet-related research domains. Today, there is a shift in the architecture of the Internet and the traditional communication model; the human part in machine communication is blu...
详细信息
Interoperability is one of crucial Internet-related research domains. Today, there is a shift in the architecture of the Internet and the traditional communication model; the human part in machine communication is blurring into a more sophisticated thing-to-thing communication model. In this model things search for other things and provide collaboration-base services, this way leading to more complex interaction issues. Especially, interoperability must transcend the use of protocols and include semantic to make the different building blocks of the Internet of Things (IoT) work together and exploit the maximum of it. Hence, we present our vision and concept of a multilayer model for IoT infrastructure to: abstract the data sources infrastructure, define filtering and formatting mechanisms, and to present pertinent data in the form of simple unitary or aggregation of multiple services.
Privacy, trust and confidentiality are the main issues of sensor layer in Internet of Things (IOT). In sensor layer, the sensing information must be transmitted from sensor node to gather node by multiple hopping. Eve...
详细信息
ISBN:
(纸本)9781509024629
Privacy, trust and confidentiality are the main issues of sensor layer in Internet of Things (IOT). In sensor layer, the sensing information must be transmitted from sensor node to gather node by multiple hopping. Every sensor node will be the sender and the relay node to forward the sensing information sent by other nodes. In this paper, BS embeds S+1 secret into the keys that are derived from the real identity of sensor node, to be as the private secret keys for every sensor node. One of the secret is the common secret that is owned by all sensor nodes, the rest S secretes are the random secret used for making mutual trust. Based on the secret index set and private secret keys, we propose a mutual trust method to explore the trust types and the pairing value among the sensor nodes without any negotiating process. To deny the right of malicious nodes to make trust with other nodes, we involve a group key to hash the secret index set to do making trust and pairing value mutually. Based on the trust types and the pairing values, the sensor nodes can set a secure path to deliver the sensing information to base station.
Indoor positioning often requires detecting and recognizing ad-hoc landmarks or anchor points with known coordinates and/or a given orientation within a given reference frame. Typically, the available kind of sensors ...
详细信息
ISBN:
(纸本)9781509024261
Indoor positioning often requires detecting and recognizing ad-hoc landmarks or anchor points with known coordinates and/or a given orientation within a given reference frame. Typically, the available kind of sensors and their detection area determine the landmark features and position. Of course, an excessive use of landmarks pose serious scalability and cost issues, whereas, on the other hand, a too-low amount of dep.oyed landmarks may create areas where agent's position is hard to track or localization accuracy drops. In addition, often sensors are not omni-directional. In this paper, the optimal placement problem of landmarks detected by sensors with a limited detection area is addressed in the general case of wide-open, ideally unbounded, rooms. First, landmarks placement optimization is performed numerically. Then, a closed-form expression of the optimal distance between landmarks on a regular pattern is determined as a function of both the reading range and the directional properties of the sensor considered. Finally, the performances of the chosen placement strategy in more realistic indoor environments (i.e. consisting of multiple rooms with obstacles therein) are evaluated through simulations assuming, without loss of generality, that a wheeled robot equipped with a front camera adjusts its own position by detecting suitable visual landmarks.
暂无评论