The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The process model matching i.e., finding correspondences between activities of process models, is a crucial task in many activities of business process management lifecycle such as merging, clustering or querying business processes. This paper presents an approach to solve the problem of process model matching. The proposed approach formulates the problem as an optimization problem and uses a genetic...
The video coding standard, H.264/MPEG-4 AVC, uses variable block sizes in intra coding. This feature has achieved significant coding gain compared to coding a macroblock (MB) using fixed block size. However, this feature results in extremely high computational complexity when brute force rate distortion optimization (RDO) algorithm is used. In this paper, we propose an Efficient Intra Block Size Decision...
Outlier and anomaly detection are widely used in several fields of study such as social networks, statistics, and knowledge discovery. In social networks, it is useful to detect structural abnormalities which are different from the typical behavior of the social network in order to maintain the network security and privacy. In this paper, we suggest a new approach for outlier and anomalous behavior...
The Internet of Things (IoT) is based on the idea that things surrounding the human living space can be connected to the Internet, allowing smarter living environments and more comfortable life. However, adoption of the IoT might not be approved unless security issues are solved. In this paper, we propose a new Dirichlet based trust management system for the IoT called DTMS-IoT. This system detects...
The world wide web has grown exponentially over the previous decade in terms of its size that is currently over a billion sties, as well as the number of users. In fact, web usage has become pervasive to touch all aspects of our life, economy and education. These rapid advances have also significantly increase the vulnerabilities of websites that are being hacked on a daily basis. According to White...
All real-time services provided by the IP Multimedia Subsystem (IMS) require QoS mechanisms to avoid traffic congestion. Recently, the Software Defined Networking (SDN) paradigm has emerged to enable dynamic network resources, and then a way to perform QoS management. The paper presents an approach to integrate the IMS with the SDN paradigm. The work is motivated by the lack of QoS management of real-time...
Information system is vital for any company. However, the opening to the outside world makes the computer system more vulnerable to attack. It is essential to protect it. Intrusion Detection System (IDS) is an auditing mechanism that analyzes the traffic system and applications to identify normal use of the system and an intrusion attempt and also it prevent security managers. Despite the advantages...
IEEE 802.15.6 standard defines several service differentiation mechanisms with the aim of providing good QoS to different Wireless Body Area Network (WBAN) based applications including medical, entertainment, military, and security. The purpose of this paper is to improve IEEE 802.15.6 slotted CSMA/CA efficiency, making it more suitable for healthcare applications. To do so, we propose an enhancement...
Wireless sensor networks (WSNs) are widely used nowadays in various domains. In general, the applications in which the WSN is deployed need that this network presents a minimal degree of reliability, effectiveness and robustness. However, the specificity of the nodes deployed in this type of networks makes them prone to failures. In this paper, we discuss the recovery from simultaneous failures for...
The work presented in this paper is part of the filed of automatic recognition of radar targets. Thus, for assistance in target recognition, we propose a new approach to extract efficient feature from synthetic aperture radar (SAR) images. The proposed approach deals with a combination of two feature descriptors obtained from two methods. In the first method, we perform the dual-tree complex wavelet...
A Full Reference Image Quality Metric (FR-IQM) for stereoscopic images based on two main steps is presented in this paper. The first step consists to select some features according to the considered degradation types and combine those features using an Artificial Neural Network (ANN). These features are here extracted from a Cyclopean Image (CI). At the end of this step, a FR-IQM per degradation is...
Traffic Sign Detection and Recognition is an important component of intelligent transportation systems. It has captured the attention of the computer vision community for several decades. In this paper, we propose a new traffic sign detection and recognition approach consisting of color segmentation, shape classification and recognition stages. In the first stage, the image is segmented using look-up...
A design pattern describes a general solution to a design problem occurring repeatedly in many systems. Indeed, software designers adapt the pattern solution to their specific applications. Therefore, its design must show the variations points which will be adopted for certain systems. Hence, the expression of the variability when modeling the pattern is crucial. The design pattern is usually modeled...
The skyline, defined as the line separating the sky from other objects on the ground, could provide unique and useful information for a variety of applications. This line was used as a key data, especially, for geo-localization and aerial robotic applications. The particular shape and the geometric features of a skyline may be the identity of the landscape itself. The skyline, once well extracted,...
We present an approach for formal modelling of SystemC programs build uppon the “Behavior, Interactions and Priority” framework. Produced automata interactions are restricted only by using priorities rather than cutting their interactions. Produced models have thus the advantages of being composable — with other futur programs — without any change, except for the priorities. Furthermore automata are...
Software Process Improvement (SPI) has become one of the main strategic objectives in software industry. Companies make more investments in implementing software quality standards and models that focus on process assessment to improve their performance and productivity. To achieve these goals, companies focus on improving their process by means of improvement initiatives which may be implemented....
Action recognition is actually considered as one of the most challenging areas in computer vision domain. In this paper, we propose a new approach based on utilization of motion boundaries to generate Motion Stable Shape (MSS) features to describe human actions in videos. In fact, we have considered actions as a set of human poses. Temporal evolution of each human pose is modeled by a set of new MSS...
The increasing need for computing power today justifies the continuous search for techniques that decrease the time to answer usual computational problems. To take advantage of new hybrid parallel architectures composed by multithreading and multiprocessor hardware, our current efforts involve the design and validation of highly parallel algorithms that efficently explore the characteristics of such...
GPU-accelerated computing consists in using a graphics processing unit (GPU) together with a CPU in order to enhance the performance of scientific and engineering applications. With the increasing spread of GPUs as hardware accelerators for scientific applications, several optimized linear algebra libraries have emerged to make use of this additional computing power. In this paper we present an implementation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.