The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Fall is a leading cause of accidental injury deaths and a key cause of significant health problems, especially for elderly people who live alone. To assist those people for seeking help when falling and keeping records of key daily movements, we propose a simple yet effective system to monitor the daily activities and in-house locations using smartphone. We also test the system for the optimum arrangement...
The Vast number of publicly available unstructured information on web and their rapid growth pose a great challenge in understanding, managing and structuring the information. Topic modeling algorithms have been developed with the purpose of analyzing these unstructured data and obtain abstract topics and clusters from these data collections. KeyGraph is a word co-occurrence based algorithm for topic...
Augmented Reality is a variation of Virtual Environment (VE) in Virtual Reality (VR). Virtual Reality technologies Virtual Environment makes user experiences immersion inside a synthetic environment and user cannot see the real world. In contrast, Augmented Reality (AR) medium of information added to the real world in registration with the world to combine virtual objects and real world. Technically,...
In Image Processing, different algorithms can give similar outputs but different efficiencies. Therefore, the developer needs to conduct experiments making adaptations for more efficiency in order to select the best algorithm. This research proposes a workflow environment applying the workflow technology to help the developer design and check for the performance of algorithms more easily. With our...
Virtual reality (VR) has become a very popular technology in recent years, which used in the field of multimedia for various purposes. One of the applications that widely used for simulating physical presence in the real world is walk-through VR. In the walk-through VR system will generate simulation character or avatar for user which able to control movement, especially first person movement walk-through...
This paper tackles a scripting problem associated with script tasks in BPMN modeling. Usually a BPMN process modeling tool provides a plain text editor without any assisting features for writing a script for a BPMN script task. This is not very convenient even for skilled programmers. There is also a limitation on exporting the script written in one language to different process modeling and execution...
The development of a model classification intrusion detection using Weighted Extreme Learning Machine was examined with KDD'99 data set ad 4 types of main attack : Denial of Service Attack (DoS), User to Root Attack (U2R), Remote to Local Attack (R2L), and Probing Attack, when comparing the effectiveness of working process of the method presented to SVM+GA[6] and ELM, found that weighted technique...
To forecast the weather accurately, meteorologists need the meteorological data from wireless sensor devices which are installed in different geographical areas besides from satellites. Nowadays, cloud computing technology can provide data storage and data processing tasks for the big meteorological data from numerous sensors. However, wireless sensors have short communication range to send the data...
Recently, machine-learning based vulnerability prediction models are gaining popularity in web security space, as these models provide a simple and efficient way to handle web application security issues. Existing state-of-art Cross-Site Scripting (XSS) vulnerability prediction approaches do not consider the context of the user-input in output-statement, which is very important to identify context-sensitive...
Scrum team is a cross-functional team which is composed of multi-disciplinary individuals, and there are no clearly specified positions. It means that the team members must perform many tasks in both functional area and aptitude area toward a common goal. This distinction suggests that team members should have enough skill set in order to carry out their own work and also help the team to meet the...
Agent is an autonomous entity who can perform actions to achieve its goal. A multi-agent system (MAS) is a system composed of multiple interacting agents doing activities for a complex system. Since in the real world, MAS have agents acting behaviors concurrently in temporal context, it is hard to completely eliminate failures in such a system. Therefore, a formal verification of a system model is...
There were many research works about video surveillance as a service system. Some concerned system architecture. Some identified cost optimization for the deployment of video surveillance systems using cloud computing technology. However, there was not much information about budget calculation for system provision. This paper addresses a cost investigation for video surveillance providers to use as...
It is a challenging task to suppress mixed noise in a color image. Simple fuzzy method could reduce the mixed Gaussian-Impulse noise with preservable edge and detail of image; however, the method provides some drawbacks and led to inappropriate outputs. This paper proposed a resourceful method to remove the mixed Gaussian-Impulse noise by designing the sequential cases to estimate the optimal weights...
Tracking moving human from a monocular vision using visual tracking is a useful skill for the coming generation of human-machine interface. It is a challenging problem of planning and control in dynamic environment. The methods used in existing moving human tracking that operate from fixed platform or fixed background, are not applicable. In this paper, we propose a visual tracking approach that detects...
In computer vision, object detection is one of the most researched topics. The goal of object detection is to detect all instances of objects from a known class, such as people, cars or faces in an image. Object detection uses the extracted features and learning algorithms to detect and recognize objects. In this paper, we propose a robust object detection method based on fast template matching. We...
The rise of internet web-based application and smart phone ease access to the stock market, attracting newcomer investors. Most investors have made their decision based on information from stock investment researches published by the brokers. An automated stock recommendation system from stock investment research is introduced in this paper. The system collects several investment researches from multiple...
Human activity recognition has an important role for the automatic anomaly event detection and recognition application such as surveillance system and patient monitoring system. In this paper, we propose a human activity recognition method based on graph similarity measurement technique (GSM). The basic actions with their movements for each person in the interested area are extracted and calculated...
Recommender systems provide personalized suggestions for every individual user in the system. Many recommender systems use collaborative filtering approach in which the system collects and analyzes users' past behaviors, activities or preferences to produce high quality recommendations for the users. Among various collaborative recommendation techniques, model-based approaches are more scalable than...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.