In this paper, we propose a novel feature extraction method based on local quinary patterns (LQP), multifractal features and intensity histograms for classifying emphysema into three subtypes in computed tomography im...
详细信息
Simulation is used for developing and testing different scenarios under controlled and reproducible situations. Proper handling of the initial transient effect for steady state simulations, proper selection of simulat...
详细信息
Language identification is the task of identifying the language a given document is written in. This paper describes a detailed examination of what models perform best under different conditions, based on experiments ...
详细信息
WPANs (Wireless Personal Area Networks) fill an important role in local area network technology complementing traditional IEEE 802.11 Wireless LANs. Bluetooth, ZigBee and NFC (Near Field Communications) have emerged a...
详细信息
ISBN:
(纸本)9781605580890
WPANs (Wireless Personal Area Networks) fill an important role in local area network technology complementing traditional IEEE 802.11 Wireless LANs. Bluetooth, ZigBee and NFC (Near Field Communications) have emerged as the key WPAN technologies. They are however subject to the usual range of security vulnerabilities found in wireless LANs such as spoofing, snooping, man-in-the-middle, denial of service and other attacks. However security in WPANs is not as mature as it is in Wireless LANs and further work is needed in order to provide comparable protection. This paper examines a range of vulnerabilities and security attacks that can be performed on Bluetooth, ZigBee and NFC WPANs and proposes protection mechanisms that can mitigate such risks.
This paper proposes a fluid rendering pipeline that uses OpenGL-4 shaders to employ the parallel processing capabilities of the GPU. The fluid's surface mesh is produced using tessellation shader stages where the ...
详细信息
Network security can be analysed using attack representation models (ARMs) (e.g., Attack Graphs (AGs) and Attack Trees (ATs)). One can analyse the network security by computing all possible attack scenarios, but it su...
详细信息
In this paper, we elaborate a set of scenarios and experiments for evaluating the impact of the physical environment on a Wireless Sensor Network (WSN). More specifically, a WSN application is implemented for collecti...
详细信息
We present a reasoning procedure for ontologies with uncertainty described in Description Logic (DL) which include General TBoxes, i.e., include cycles and General Concept Inclusions (GCIs). For this, we consider the ...
详细信息
In Wireless Sensor Network (WSN) researches, WSN routing algorithm is one of the hot issues. This article focuses on GPSR (Greedy Perimeter Stateless Routing) and uses the NS2 (Network Simulator-2) to simulate both GP...
详细信息
Generalization of web sessions is an effective approach used to overcome two major challenges in web usage mining, namely quality and scalability. Given a concept hierarchy, such as a website, generalization replaces ...
详细信息
ISBN:
(纸本)9781605588087
Generalization of web sessions is an effective approach used to overcome two major challenges in web usage mining, namely quality and scalability. Given a concept hierarchy, such as a website, generalization replaces actual page-clicks with their general concepts, i.e., nodes at higher levels. Presently known methods do this by choosing a level in the hierarchy, below which all the nodes are generalized to nodes at this level. The problem with this is that significant items may be coalesced, and insignificant ones may be retained. We present a usage driven generalization algorithm, which coalesces less significant pages into more general ones, independent of their level in the hierarchy. Based on actual usage set of sessions, item significance is estimated approximately but fast, using a small stratified sample of the large dataset. While providing scalability, the proposed generalization technique results in improved efficiency and quality of the discovered usage model, demonstrated through numerous experiments in our work. Copyright 2009 ACM.
暂无评论