Is it possible to estimate some 'safety' metric to assess the effectiveness of Intelligent Transportation systems? In particular, we are interested in using Inter-Vehicle Communication (IVC) beaconing for incr...
详细信息
We present a novel algorithm for discriminating pornographic and assorted benign images, each categorized into semantic subclasses. The algorithm exploits connectedness and coherence properties in skin image regions i...
详细信息
ISBN:
(纸本)9781450314183
We present a novel algorithm for discriminating pornographic and assorted benign images, each categorized into semantic subclasses. The algorithm exploits connectedness and coherence properties in skin image regions in order to capture alarming Regions of Interest (ROIs). The technique to identify ROIs in an image employs a region-splitting scheme, in which the image plane is recursively partitioned into quadrants. Splitting is achieved by considering both the accumulation of skin pixels and texture coherence. This processing step is proven to significantly boost the accuracy and reduction of running time demands, even in the presence of sparse noise due to errors attributed to skin segmentation. For detected ROIs, we extract 15 rough color and spatial features computed from the pixels residing in the ROI. A novel classification scheme based on a tree-structured ensemble of strong Random Forest classifiers is also proposed. The method achieves competitive performance both in terms of response time and accuracy when compared to the state-of-the-art. Copyright 2012 ACM.
The rate of growth to share diverse information between users is increasing in the market of current search engine systems. However, in spite of this development, a user inputted search word is not protected, and when...
详细信息
Cyber-Physical systems (CPS) has been identified as a key technology for providing next generation applications for improving transportation, electricity delivery & usage, and healthcare in the 21st century. This ...
详细信息
作者:
János RudanGábor SzederkényiKatalin M. HangosFaculty of Information Technology
Pázmány Péter Catholic University Práter u. 50/a H-1083 Budapest Hungary Faculty of Information Technology
Pázmány Péter Catholic University Práter u. 50/a H-1083 Budapest Hungary and Process Control Research Group Computer and Automation Research Institute Hungarian Academy of Sciences. Hungary Process Control Research Group
Computer and Automation Research Institute Hungarian Academy of Sciences. Kende u. 13-17 H-1111 Budapest Hungary and Dept. of Electrical Engineering and Information Systems Faculty of Information Technology Univer Hungary
An algorithm for the computation of mass conservative dynamically equivalent chemical reaction network structures is proposed in this paper. The algorithm is formulated in an optimization-based framework as a mixed-in...
An algorithm for the computation of mass conservative dynamically equivalent chemical reaction network structures is proposed in this paper. The algorithm is formulated in an optimization-based framework as a mixed-integer linear programming problem.
Privacy protection and user revocation are essentially conflicting requirements in many cryptographic protocols. It is a particularly challenging problem to harmonize them in a secret handshake protocol that is geared...
详细信息
The volume of published scientific literature available on Internet has been increasing exponentially. Some of them reflect the latest achievement of the specific research domain. In recent years, many projects have b...
详细信息
The volume of published scientific literature available on Internet has been increasing exponentially. Some of them reflect the latest achievement of the specific research domain. In recent years, many projects have been funded aiming to online scientific literature mining, especially in biomedical research. Scientific literature covers most of the hot topics in the research field and has a very large domain-specific vocabulary. The exploitation of domain knowledge and specialized vocabulary can dramatically improve the result of literature text processing. To evaluate the discriminating capability of vocabularies automatically constructed from domain and non-domain specific corpus, the concept of discrimination index defined by Cosine similarity and Jicard distance was introduced. To validate the effectiveness of domain-specific vocabulary, a large-scale corpus was built from abstract content in IT security literature retrieved from open literature database and annotated manually by experts. Domain vocabularies of single word-vocabulary and co-occurrence phrase-vocabulary were constructed from positive and negative corpus with TF/IDF-like schema. The paper firstly carried some discussion on soundness of its customized seed keywords submit to do "AND"-mode search by retrieval efficiency analysis, it also presented yearly distribution analysis on the retrieved paper and ranked phrases in different vocabularies. The discrimination index values between these vocabularies show that domain vocabulary is more representative and the experimental result of document classification confirms the effectiveness of domain-specific vocabulary although there is no much difference in performance between single word -vocabulary and bi-lexical co-occurrence domain vocabulary.
Ambient Assisted Living (AAL) aims at providing unobtrusive support to frail and elderly people for their daily life based on their context and situation. To this end, systems and services are required which are user-...
详细信息
Ambient Assisted Living (AAL) aims at providing unobtrusive support to frail and elderly people for their daily life based on their context and situation. To this end, systems and services are required which are user-centric and adaptable towards the needs and capabilities of the people in need of care. The continuous integration of leading-edge technologies, such as cloud and wireless communication technologies, in the context of the Internet of the Things (IoT), can meet this requirement by enabling a new form of communication between frail and elderly people, their environment and relevant groups of care givers. However, for IoT-based systems to reach their full potential, sound answers need to be provided to the important security questions arisen, particularly those regarding authentication of entities (people and environmental objects) and data privacy. This paper presents a system based on Gateways (GW) that aggregate health sensor data and resolve security issues through digital certificates and PKI data encryption.
With the moving development of networks, especially Internet of Things, electronic identity administration in cyberspace is becoming more and more important. And personal identity management in cyberspace associated w...
详细信息
暂无评论