The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recently, utilization of position information by global navigation satellite system (GNSS) is expected in various fields. However, it's difficult to show unambiguously accuracy since positioning accuracy varies by measurement environment. We bring sky view factor (SVF) to evaluation of positioning accuracy, and evaluate it positioning accuracy of long time data in the places where SVF are high or...
Extreme Learning Machine (ELM) is a neural network architecture with Single Layer Feed-forward Neural Network (SLFN). For meaningful results, the structure of ELM has to be optimized through the inclusion of regularization and the ℓ2 — norm based regularization is mostly used. ℓ2-norm based regularization achieves better performance than the traditional ELM. The estimate of the regularization parameter...
A remote memory paging system called a distributed large memory (DLM) has been developed, which uses remote-node memories in a cluster, as the main memory extension of a local node. The DLM is available for out-of-core processing, i.e., processing of large-size data that exceeds the main memory capacity in the local node. By using the DLM and memory servers, it is possible to run multi-thread programs...
Streaming information flow allows identification of linguistic similarities between language pairs in real time as it relies on pattern recognition of grammar rules, semantics and pronunciation especially when analyzing so called international terms, syntax of the language family as well as tenses transitivity between the languages. Overall, it provides a backbone translation knowledge for building...
We propose PathML, an available bandwidth (i.e., unused capacity of an end-to-end path) estimation method based on a data-driven paradigm that uses machine learning with a large amount of data. An experiment over an operational LTE network was performed to compare our method with prior work.
Today's world is digital era, everyone looks for information on Web. The web is not only space for information, but most importantly, it is a tool to connect people. People used to share information and transfer confidential data on the Web. Since Internet is publicly available securing data on Web is much important, some techniques are needed to hide this data. There are different techniques available...
Hiding information in an image in a way that does not affect the original cover image pixels or cause a permanent distortion after extracting that information is known as reversible data hiding technology. Many reversible data hiding schemes have been proposed and successfully applied in medical and military applications. Such schemes are developed to ensure digital images' authenticity and integrity...
To improve the security and the quality of decrypted and recovered images, this work proposes a classification permutation based separable reversible data hiding in encrypted image. A classification permutation encryption combining with the XOR-encryption is firstly designed to improve the privacy of both pixel-value and pixel-location. And then, each bit in the additional data is embedded in the...
Cooperation combat of multi-UAV could improve the combat effectiveness and survivability. Cooperation architecture is the base of cooperation. To overcome shortcomings of the existing cooperation architectures, the workflow-based multi-UAV cooperation combat architecture is proposed. Performances of the proposed new architecture are analyzed and verified. Experimental results show that, in the given...
LSB techniques generally embed data in the same LSB position of consecutive samples which helps intruders to extract secret information easily. This paper solve this problem by introducing a robust audio steganography technique where data is embedded in multiple layers of LSB chosen randomly and in non-consecutive samples. The choice of random LSB layers and non-consecutive pixels for embedding increases...
In this paper, we propose an efficient solution for the privacy-preserving of a bipartite ranking algorithm. The bipartite ranking problem can be considered as finding a function that ranks positive instances (in a dataset) higher than the negative ones. However, one common concern for all the existing schemes is the privacy of individuals in the dataset. That is, one (e.g., a researcher) needs to...
Inspired by Zhang et al.'s method that applies the integer discrete wavelet transform (DWT) to the original image, and embeds the secret data into the middle (LH, HL) and high (HH) frequency sub-bands of integer DWT coefficients with histogram modification based method, we propose a reversible data hiding method that embeds the secret data into the encrypted prediction error values. Compared with...
Histogram shifting is one of the most useful techniques of Reversible Data Hiding (RDH). In histogram shifting based data hiding technique, lower distortion and improved capacity can be achieved. In this paper, a new method of reversible data hiding based on compressed gray level histogram shifting has been proposed which provides a high capacity of data hiding and also maintains a good image quality...
This paper deals with advanced approaches which may increase traffic safety. The solutions suggested in this paper work in real time and therefore make it possible to effectively warn a specific driver about a situation which could threaten their safety. In the beginning the concept of RADIO-HELP is explained. This system is designed to distribute warning messages to drivers automatically and the...
This work proposes a novel separable method for encrypted images. The input image is encrypted first via a pairwise encryption scheme. Then the data bits can be embedded into the pairwisely encrypted image by the well-known difference-expansion technique. When the receiver gets the marked encrypted, he can extract the secret data bits by the data-hiding key and obtain an image which is similar to...
This paper proposes a high-capacity hiding scheme for embedding secret message in the inactive frames of low-bit rate speech bitstream. Our information-hiding scheme can correctly extract secret message in the receiver. The scheme uses a flag to synchronize the embedding and extraction process in steganography. The results of an imperceptibility evaluation indicate that the average perceptual evaluation...
Prior research has shown the potential of device-free WiFi sensing for human activity recognition. In this paper, we show for the first time WiFi signals can also be used to uniquely identify people. There is strong evidence that suggests that all humans have a unique gait. An individual's gait will thus create unique perturbations in the WiFi spectrum. We propose a system called WiFi-ID that analyses...
Sentiment analysis refers to classify the emotion of a text whether positive or negative. The studies conducted on sentiment analysis are generally based on English and other languages while there are limited studies on Turkish. In this study, after constructing a dataset using a well-known hotel reservation site booking.com, we compare the performances of different machine learning approaches. We...
In this paper, we propose a steganography technique to hide a message in an image. The proposed technique combines the stochastic local search meta-heuristic (SLS) with the least significant bits method (LSB). First, we developed the basic technique of LSB to hide information in JPEG images. We found that LSB steganography method is not effective because the size of the image increases greatly after...
Steganography is one of the popular methods in information hiding that allows people to communicate secretly. The main advantage of image steganography is that the image within which the secret is encoded does not attract the attention of an attacker. Methods for image steganography always concentrate on maintaining the visual quality of an image while encoding a secret message in it. This paper reports...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.