oalib
匹配条件: “” ,找到相关结果约100条。
列表显示的所有文章,均可免费获取
第1页/共100条
每页显示
Peripheral Display for Multi-User Location Awareness  [cached]
Rahat Iqbal,Anne James,John Black,Witold Poreda
Journal of Advances in Information Technology , 2010, DOI: 10.4304/jait.1.3.116-126
Abstract: An important aspect of Ubiquitous Computing (UbiComp) is augmenting people and environments with computational resources which provide information and services unobtrusively whenever and wherever required. In line with the vision of UbiComp, we have developed a multiuser location-awareness system by following a user-centred design and evaluation approach. In this paper, we discuss the development of the system that allows users to share informative feedback about their current geographical location. Most importantly, the proposed system is to be integrated in the smart-home environment by portraying location-awareness information on a peripheral display. The proposed system can be used by various users, for example family members, relatives or a group of friends, in order to share the information related to their locations and to interact with each other.
Linear Eigenvalue Statistics: An Indicator Ensemble Design for Situation Awareness of Power Systems  [PDF]
Xing He,Robert C. Qiu,Qian Ai,Lei Chu,Xinyi Xu
Statistics , 2015,
Abstract: Power systems are developing very fast nowadays, both in size and in complexity; this trend is challenging the situation awareness (SA) with classical indicators, which are always deterministic and highly relying on the mechanism models. This paper proposes an indicator ensemble of linear eigenvalue statistics (LESs) as an alternative; besides, the random matrix model (RMM) is introduced as a connection with the physical systems. Thus, related to the ensemble, a data-driven methodology of SA is presented; moreover, we develop 3D powermap as a visualization. The LES ensemble and according methodology conduct SA with a pure statistical procedure, requiring no knowledge of system topologies, unit operation/control models, causal relationship, etc. This mode has numerous advantages, such as sensitive, universal and fast, and flexible and compatible; especially, its robustness against bad data is highlighted.
Context-Awareness via Ubiquitous User Profiling: An Implementation Paradigm
Software Engineering , 2012, DOI: 10.5923/j.se.20120203.05
Abstract: The diversity of service access contexts and the co-existence of different technologies that characterizes the forthcoming 4G systems lead to the heterogeneity of the networks and systems that support end-user applications’ provision. This creates the requirement for applications to be optimally delivered and executed over a large diversity of infrastructures and configurations, as well as for dynamic adaptability of services to changing conditions and contexts. The present paper focuses on context-awareness in service provisioning over PLMN and proposes a flexible and innovative model for user profiling. The innovation is based on the enrichment of common user profiling architectures to include location and other contextual attributes, so that enhanced adaptability and personalization is achieved. Moreover, an intelligent distributed middleware framework that capitalizes the enhanced user profiles and deals with context information is introduced. The framework compiles context information and user profiles and can enhance with contextual characteristics even context unaware services.
Approaches for user profile Investigation in Orkut Social Network  [PDF]
Rajni Ranjan Singh,Deepak Singh Tomar
Computer Science , 2009,
Abstract: Internet becomes a large and rich repository of information about us as individually. Any thing form user profile information to friends links the user subscribes to are reflection of social interactions as user has in real worlds. Social networking has created new ways to communicate and share information. Social networking websites are being used regularly by millions of people, and it now seems that social networking will be an enduring part of everyday life. Social networks such as Orkut, Bebo, MySpace, Flickr, Facebook, Friendster and LinkedIn, have attracted millions of internet user who are involved in bogging, participatory book reviewing, personal networking and photo sharing. Social network services are increasingly being used in legal and criminal investigations. Information posted on sites such as Orkut and Facebook has been used by police, probation, and university officials to prosecute users of said sites. In some situations, content posted on web social network has been used in court. In the proposed work degree of closeness is identified by link weight approaches and information matrices are generated and matched on the basis of similarity in user profile information. The proposed technique is useful to investigate a user profile and calculate closeness or interaction between users.
User Awareness Measurement Through Social Engineering  [PDF]
Tolga Mataracioglu,Sevgi Ozkan
Computer Science , 2011,
Abstract: TUBITAK National Research Institute of Electronics and Cryptology (UEKAE) Department of Information Systems Security makes social engineering attacks to Turkish public agencies within the frame of "Information Security Tests" [19]. This paper will make an analysis of the social engineering tests that have been carried out in several Turkish public agencies. The tests include phone calling to sample employees by the social engineer and trying to seize employees' sensitive information by exploiting their good faith. The aim of this research is to figure that the employees in Turkish public agencies have a lack of information security awareness and they compromise the information security principles which should be necessarily applied for any public agencies. Social engineering, both with its low cost and ability to take advantage of low technology, has taken its place in the information security literature as a very effective form of attack [8].
A Ciphering Model Described Step by Step  [PDF]
DANIEL HOMOCIANU
Scientific Annals of the Alexandru Ioan Cuza University of Iasi : Economic Sciences Series , 2006,
Abstract: The ciphering is a security technique used to protect information the way it could not be theoretically understood by any unauthorized person that tries to intercept it as stored or transmitted data. But the time and the deciphering machine are critical factors in order to practically find out the meaning of the safe data. This paper describes a ciphering / deciphering technique as it was implemented thru a Rapid Application Development solution. The algorithms which implement it are followed by comments in order to provide the understanding of the whole solution.
How Good Is The DES Algorithm In Image Ciphering?
Said F. El-Zoghdy,Yasser A. Nada,A. A. Abdo
International Journal of Advanced Networking and Applications , 2011,
Abstract: Digital Images and video encryption plays an important role in today’s multimedia world. Many encryption schemes have been proposed to provide security for digital images. Usually the symmetric key ciphering algorithms are used in encrypting digital images because it is fast and use the techniques for block and stream ciphers. Data Encryption Standard is symmetric key encryption algorithm. In spite of the successful cracking of the data encryption standard by massive brute force attacks, data encryption standard algorithm is an entrenched technology and still useful for many purposes. In this paper, we use some of the image quality encryption measuring factors to study the effect of data encryption standard algorithm in image ciphering. The results show that the data encryption standard algorithm is fast and it achieves a good encryption rate for image ciphering using different modes of operation.
Selected approaches of variables weighting in frame of composite indicator analysis  [PDF]
T. Hlavsa
AGRIS on-line Papers in Economics and Informatics , 2010,
Abstract: Composite indicators are useful as tool for complex evaluation and aggregation of different variables of regionaldevelopment. Variables which are aggregated in a composite indicator have first to be weighted. All variablesmay be given equal weights or they mea be given differing weights which reflect the significance, reliability orother characteristics of the underlying data. The weights given to different variables heavily influence theoutcomes of the composite indicator. Aim of this paper is an evaluation of selected methods for weighting ofparticular variables in frame of composite indicator construction. Evaluation is verified on group of regionaleconomic variables based on Strategy of regional development.
Interactive Evolutionary Computation for Analyzing Human Awareness Mechanisms  [PDF]
Hideyuki Takagi
Applied Computational Intelligence and Soft Computing , 2012, DOI: 10.1155/2012/694836
Abstract: We discuss the importance of establishing awareness science and show the idea of using interactive evolutionary computation (IEC) as a tool for analyzing awareness mechanism and making awareness models. First, we describe the importance of human factors in computational intelligence and that IEC is one of approaches for the so-called humanized computational intelligence. Second, we show examples that IEC is used as an analysis tool for human science. As analyzing human awareness mechanism is in this kind of analyzing human characteristics and capabilities, IEC may be able to be used for this purpose. Based on this expectation, we express one idea for analyzing the awareness mechanism. This idea is to make an equivalent model of an IEC user using a learning model and find latent variables that connect inputs and outputs of the user model and that help to understand or explain the inputs-outputs relationship. Although there must be several definitions of awareness, this idea is based on one definition that awareness is to find out unknown variables that helps our understanding. If we establish a method for finding the latent variables automatically, we can realize an awareness model in computer. 1. Introduction The number of papers using the keywords context awareness, power awareness, location awareness, and situation awareness in the SciVerse Scopus database of Elsevier is, respectively, 6,383, 1,749, 1,688, and 257 as of February 2012. Engineering interest in these areas has increased. These engineering approaches call obtaining unknown knowledge or facts awareness. However, how do these engineering approaches differ from data mining or knowledge acquisition? Although these kind of applications are useful and important, we need other scientific approaches not only to support the engineering applications of awareness but also to extend awareness science and engineering. One such scientific approach would be analyzing the awareness mechanisms of human beings and/or animals and constructing awareness models based on these mechanisms. Once we establish their core technologies, we may be able to make a computer with using such a model be aware of something. As the result, we can expect not only to develop data mining-like applications as has been done until now but also to progress human-machine communications, the monitoring of social networks, and new areas. Analyzing awareness mechanisms and modeling them are the first important step to research performed in this direction. It is important to integrate ideas from and cooperate with those in ethology,
A comparative study of approaches in user-centered health information retrieval  [PDF]
Harsh Thakkar,Ganesh Iyer,Prasenjit Majumder
Computer Science , 2015,
Abstract: In this paper, we survey various user-centered or context-based biomedical health information retrieval systems. We present and discuss the performance of systems submitted in CLEF eHealth 2014 Task 3 for this purpose. We classify and focus on comparing the two most prevalent retrieval models in biomedical information retrieval namely: Language Model (LM) and Vector Space Model (VSM). We also report on the effectiveness of using external medical resources and ontologies like MeSH, Metamap, UMLS, etc. We observed that the L.M. based retrieval systems outperform VSM based systems on various fronts. From the results we conclude that the state-of-art system scores for MAP was 0.4146, P@10 was 0.7560 and NDCG@10 was 0.7445, respectively. All of these score were reported by systems built on language modelling approaches.
第1页/共100条
每页显示


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.