Mitosis detection poses a major challenge in cell tracking as mitoses are crucial events in the construction of genealogical trees. Making use of typical mitotic patterns that can be seen in phase contrast images of t...
详细信息
Bio-cryptography is an emerging security technology which combines cryptography with biometrics. A good bio-cryptosystem is required to protect the privacy of the relevant biometric data as well as achieving high reco...
详细信息
For the design of dependable and efficient wireless sensor networks it is essential to estimate the achievable packet reception rate (PRR) in the deployment environment. Making such estimation is not trivial as packet...
详细信息
ISBN:
(纸本)9781479937851
For the design of dependable and efficient wireless sensor networks it is essential to estimate the achievable packet reception rate (PRR) in the deployment environment. Making such estimation is not trivial as packet delivery success depends on the level of interference present in the deployment area. In this work we show that it is possible to obtain a meaningful representation of the expected interference levels at the target location by measuring the probability distribution function of idle period lengths, and use this to estimate PRR before network deployment. We show how a probability distribution function of idle period lengths can be measured using off-the-shelf sensor nodes. We illustrate how to exploit this methodology to estimate PRR in dependence of the used packet length, and show that relatively short measurement periods provide enough data to obtain accurate *** carry out an extensive experimental evaluation showing that Wi-Fi interference can be captured using this method which allows PRR predictions in such Wi-Fi interference setting with an average error of only 3.2%.
A method is proposed for estimating spectral radiances of the surrounding scene from a reflected image on the corneal surface. A digital color camera and the human eyeball are used to develop a simple imaging system w...
详细信息
Recently, MoBots or Mobile Botnets have become one of the most critical challenges in mobile communication and cyber security. The integration of Mobile devices with the Internet along with enhanced features and capab...
详细信息
Recently, MoBots or Mobile Botnets have become one of the most critical challenges in mobile communication and cyber security. The integration of Mobile devices with the Internet along with enhanced features and capabilities has made them an environment of interest for cyber criminals. Therefore, the spread of sophisticated malware such as Botnets has significantly increased in mobile devices and networks. On the other hand, the Bots and Botnets are newly migrated to mobile devices and have not been fully explored yet. Thus, the efficiency of current security solutions is highly limited due to the lack of available Mobile Botnet datasets and samples. As a result providing a valid dataset to analyse and understand the Mobile botnets has become a crucial issue in mobile security and privacy. In this paper we present an overview of the current available data set and samples and we discuss their advantages and disadvantages. We also propose a model to implement a mobile Botnet test bed to collect data for further analysis.
Reinforcement learning techniques become more popular in computer network security. The same reinforcement learning techniques developed for network security can be applied to software security as well. This research ...
详细信息
Reinforcement learning techniques become more popular in computer network security. The same reinforcement learning techniques developed for network security can be applied to software security as well. This research summarizes a work in progress attempt to incorporate Q-learning algorithm in software security. The Q-learning method is embedded as part of the software itself to provide a security mechanism that has ability to learn by itself to develop a temporary repair mechanism. The results of the experiment express that given the right parameters and the right setting the Q-learning approach rapidly learns to block all malicious actions. Data analysis on the Q-values produced by the software can provide security diagnostic as well. A larger scale experiment is expected to be seen in the future work.
We have proposed a novel solution to a fundamental problem encountered in implementing non-ingestion based medical adherence monitoring systems, namely, how to reliably identify pill medication intake. We show how wir...
详细信息
ISBN:
(纸本)9781424479276
We have proposed a novel solution to a fundamental problem encountered in implementing non-ingestion based medical adherence monitoring systems, namely, how to reliably identify pill medication intake. We show how wireless wearable devices with tri-axial accelerometer can be used to detect and classify hand gestures of users during solid-phase medication intake. Two devices were worn on the wrists of each user. Users were asked to perform two activities in the way that is natural and most comfortable to them: (1) taking empty gelatin capsules with water, and (2) drinking water and wiping mouth. 25 users participated in this study. The signals obtained from the devices were filtered and the patterns were identified using dynamic time warping algorithm. Using hand gesture signals, we achieved 84.17 percent true positive rate and 13.33 percent false alarm rate, thus demonstrating that the hand gestures could be used to effectively identify pill taking activity.
This paper presents an autonomous planning and control framework for humanoid robots to climb general ladder- and stair-like structures. The approach consists of two major components: 1) a multi-limbed locomotion plan...
详细信息
This paper presents an autonomous planning and control framework for humanoid robots to climb general ladder- and stair-like structures. The approach consists of two major components: 1) a multi-limbed locomotion planner that takes as input a ladder model and automatically generates a whole-body climbing trajectory that satisfies contact, collision, and torque limit constraints; 2) a compliance controller which allows the robot to tolerate errors from sensing, calibration, and execution. Simulations demonstrate that the robot is capable of climbing a wide range of ladders and tolerating disturbances and errors. Physical experiments demonstrate the DRC-Hubo humanoid robot successfully mounting, climbing, and dismounting an industrial ladder similar to the one intended to be used in the DARPA Robotics Challenge Trials.
Clustering is one of the widely used unsupervised methods to interpret and analyze huge amount of data in the field of Bioinformatics. One of the major issues involved in clustering is to address the growing data so t...
详细信息
Clustering is one of the widely used unsupervised methods to interpret and analyze huge amount of data in the field of Bioinformatics. One of the major issues involved in clustering is to address the growing data so that the cluster quality does not decrease with increase in the size of the data. In this work, we compare the promising clustering algorithms on various cancer domains and suggest improvements to them, with the help of a optimization techniques viz. Harmony Search (HS) algorithm. This paper discusses comparison of these techniques, various steps taken to achieve the target, and finally suggests an improved method that combines the merits of Fuzzy C-means algorithm and HS optimization technique.
暂无评论