Grid systems are large-scale platforms which consume a considerable amount of energy. Several efficient resource/power management strategies were proposed by the specialized literature. However, most of the proposed s...
详细信息
Distributed applications rely on Certification Authorities (CAs) entities associated with a few institutions around the world. There are countless trusted institutions on the networks, e.g., universities, governments,...
详细信息
This paper proposes an energy-efficient Haar transform architecture using efficient adders circuits. Nine levels of decomposition in a fixed-point format are used in the architectures. The Processing Module (PM) of Ha...
详细信息
Classification algorithms have been extensively studied in many of the major scientific investigations in recent decades. Many of these algorithms are designed for supervised learning, which requires labeled instances...
详细信息
Cloud computing (CC) popularization unleashed the creation and competition of a large number of new companies providing CC services, the so called Cloud Providers (CPs). Thus, select the smallest CP set with the lowes...
详细信息
Network configuration, performance, and congestion impact the Quality of Service (QoS) of Moodle Learning Management System (LMS). Moreover, LMSs composing modules have different QoS demands for each activity. Upon a ...
详细信息
Monitoring the degradation of induction motors is an essential concern for industries, especially when there are high costs related to maintenance and their stops. Nowadays, there are many non-invasive ways to monitor...
详细信息
Invisibility in Ubiquitous computing (UbiComp) and Internet of Things (IoT) systems refers to the merge of technology in the environment or the interaction workload decrease so that users can focus on their daily acti...
详细信息
Water supply utilities have been increasingly looking for solutions to reduce water wastage. Many efforts have been made aiming to promote a better management of this resource. Fraud detection is one of these actions,...
详细信息
ISBN:
(纸本)9781450344869
Water supply utilities have been increasingly looking for solutions to reduce water wastage. Many efforts have been made aiming to promote a better management of this resource. Fraud detection is one of these actions, as the irregular violations are usually held precariously, thus, causing leaks. In this context, the use of technology in order to automate the identification of potential frauds can be an important support tool to avoid water waste. Thus, this research aims to apply pattern recognition techniques in the implementation of an automated detection of suspected irregularities cases in water meters, through image analysis. The proposed computer vision system is composed of three steps: the detection of the water meter location, obtained by OPF classifier and HOG descriptor, detecting the seals through morphological image processing and segmentation methods;and the classification of frauds, in which the condition of the water meter seals is assessed. We validated the proposed framework using a dataset containing images of water meter inspections. At the last step, the proposed framework reached an average accuracy up to 81.29%. We concluded that a computer vision system is a promising strategy and has potential to benefit the analysis of fraud detection. Copyright 2017 ACM.
Software-Defined Networking (SDN) paradigm has decoupled data and control planes on traditional networks. In this context, a logically-centralized controller, with full knowledge on network resources and traffic loads...
详细信息
暂无评论