987 resultados para computer science, information systems


Relevância:

100.00% 100.00%

Publicador:

Resumo:

We investigate the relationship between consensus measures used in different settings depending on how voters or experts express their preferences. We propose some new models for single-preference voting, which we derive from the evenness concept in ecology, and show that some of these can be placed within the framework of existing consensus measures using the discrete distance. Finally, we suggest some generalizations of the single-preference consensus measures allowing the incorporation of more general notions of distance.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Cloud-based service computing has started to change the way how research in science, in particular biology, medicine, and engineering, is being carried out. Researchers in the area of mammalian genomics have taken advantage of cloud computing technology to cost-effectively process large amounts of data and speed up discovery. Mammalian genomics is limited by the cost and complexity of analysis, which require large amounts of computational resources to analyse huge amount of data and biology specialists to interpret results. On the other hand the application of this technology requires computing knowledge, in particular programming and operations management skills to develop high performance computing (HPC) applications and deploy them on HPC clouds. We carried out a survey of cloud-based service computing solutions, as the most recent and promising instantiations of distributed computing systems, in the context their use in research of mammalian genomic analysis. We describe our most recent research and development effort which focuses on building Software as a Service (SaaS) clouds to simplify the use of HPC clouds for carrying out mammalian genomic analysis.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Adaptive filters are now becoming increasingly studied for their suitability in application to complex and non-stationary signals. Many adaptive filters utilise a reference input, that is used to form an estimate of the noise in the target signal. In this paper we discuss the application of adaptive filters for high electromyography contaminated electroencephalography data. We propose the use of multiple referential inputs instead of the traditional single input. These references are formed using multiple EMG sensors during an EEG experiment, each reference input is processed and ordered through firstly determining the Pearson’s r-squared correlation coefficient, from this a weighting metric is determined and used to scale and order the reference channels according to the paradigm shown in this paper. This paper presents the use and application of the Adaptive-Multi-Reference (AMR) Least Means Square adaptive filter in the domain of electroencephalograph signal acquisition.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Considering that the uncertainty noise produced the decline in the quality of collected neural signal, this paper proposes a signal quality assessment method for neural signal. The method makes an automated measure to detect the noise levels in neural signal. Hidden Markov Models were used to build a classification model that classifies the neural spikes based on the noise level associated with the signal. This neural quality assessment measure will help doctors and researchers to focus on the patterns in the signal that have high signal to noise ratio and carry more information.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Driving simulators have become useful research tools for the institution and laboratories which are studying in different fields of vehicular and transport design to increase road safety. Although classical washout filters are broadly used because of their short processing time, simplicity and ease of adjust, they have some disadvantages such as generation of wrong sensation of motions, false cue motions, and also their tuning process which is focused on the worst case situations leading to a poor usage of the workspace. The aim of this study is to propose a new motion cueing algorithm that can accurately transform vehicle specific force into simulator platform motions at high fidelity within the simulator’s physical limitations. This method is proposed to compensate wrong cueing motion caused by saturation of tilt coordination rate limit using an adaptive correcting signal based on added fuzzy logic into translational channel to minimize the human sensation error and exploit the platform more efficiently.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The aim of this paper is to provide a washout filter that can accurately produce vehicle motions in the simulator platform at high fidelity, within the simulators physical limitations. This is to present the driver with a realistic virtual driving experience to minimize the human sensation error between the real driving and simulated driving situation. To successfully achieve this goal, an adaptive washout filter based on fuzzy logic online tuning is proposed to overcome the shortcomings of fixed parameters, lack of human perception and conservative motion features in the classical washout filters. The cutoff frequencies of highpass, low-pass filters are tuned according to the displacement information of platform, workspace limitation and human sensation in real time based on fuzzy logic system. The fuzzy based scaling method is proposed to let the platform uses the workspace whenever is far from its margins. The proposed motion cueing algorithm is implemented in MATLAB/Simulink software packages and provided results show the capability of this method due to its better performance, improved human sensation and exploiting the platform more efficiently without reaching the motion limitation.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Cryptographic keys are necessary to secure communications among mesh clients in wireless mesh networks. Traditional key establishment schemes are implemented at higher layers, and the security of most such designs relies on the complexity of computational problems. Extracting cryptographic keys at the physical layer is a promising approach with information-theoretical security. But due to the nature of communications at the physical layer, none of the existing designs supports key establishment if communicating parties are out of each other's radio range, and all schemes are insecure against man-in-the-middle attacks. This paper presents a cross-layer key establishment scheme where the established key is determined by two partial keys: one extracted at the physical layer and the other generated at higher layers. The analysis shows that the proposed cross-layer key establishment scheme not only eliminates the aforementioned shortcomings of key establishment at each layer but also provides a flexible solution to the key generation rate problem. © 2014 Springer International Publishing Switzerland.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Cognitive radio improves spectrum efficiency and mitigates spectrum scarcity by allowing cognitive users to opportunistically access idle chunks of the spectrum owned by licensed users. In long-term spectrum leasing markets, secondary network operators make a decision about how much spectrum is optimal to fulfill their users' data transmission requirements. We study this optimization problem in multiple channel scenarios. Under the constrains of expected user admission rate and quality of service, we model the secondary network into a dynamic data transportation system. In this system, the spectrum accesses of both primary users and secondary users are in accordance with stochastic processes, respectively. The main metrics of quality of service we are concerned with include user admission rate, average transmission delay and stability of the delay. To quantify the relationship between spectrum provisioning and quality of service, we propose an approximate analytical model. We use the model to estimate the lower and upper bounds of the optimal amount of the spectrum. The distance between the bounds is relatively narrow. In addition, we design a simple algorithm to compute the optimum by using the bounds. We conduct numerical simulations on a slotted multiple channel dynamic spectrum access network model. Simulation results demonstrate the preciseness of the proposed model. Our work sheds light on the design of game and auction based dynamic spectrum sharing mechanisms in cognitive radio networks.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Static detection of malware variants plays an important role in system security and control flow has been shown as an effective characteristic that represents polymorphic malware. In our research, we propose a similarity search of malware to detect these variants using novel distance metrics. We describe a malware signature by the set of control flowgraphs the malware contains. We use a distance metric based on the distance between feature vectors of string-based signatures. The feature vector is a decomposition of the set of graphs into either fixed size k-subgraphs, or q-gram strings of the high-level source after decompilation. We use this distance metric to perform pre-filtering. We also propose a more effective but less computationally efficient distance metric based on the minimum matching distance. The minimum matching distance uses the string edit distances between programs' decompiled flowgraphs, and the linear sum assignment problem to construct a minimum sum weight matching between two sets of graphs. We implement the distance metrics in a complete malware variant detection system. The evaluation shows that our approach is highly effective in terms of a limited false positive rate and our system detects more malware variants when compared to the detection rates of other algorithms. © 2013 IEEE.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

There are the two common means for propagating worms: scanning vulnerable computers in the network and spreading through topological neighbors. Modeling the propagation of worms can help us understand how worms spread and devise effective defense strategies. However, most previous researches either focus on their proposed work or pay attention to exploring detection and defense system. Few of them gives a comprehensive analysis in modeling the propagation of worms which is helpful for developing defense mechanism against worms' spreading. This paper presents a survey and comparison of worms' propagation models according to two different spreading methods of worms. We first identify worms characteristics through their spreading behavior, and then classify various target discover techniques employed by them. Furthermore, we investigate different topologies for modeling the spreading of worms, analyze various worms' propagation models and emphasize the performance of each model. Based on the analysis of worms' spreading and the existing research, an open filed and future direction with modeling the propagation of worms is provided. © 2014 IEEE.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In large-scale systems, user authentication usually needs the assistance from a remote central authentication server via networks. The authentication service however could be slow or unavailable due to natural disasters or various cyber attacks on communication channels. This has raised serious concerns in systems which need robust authentication in emergency situations. The contribution of this paper is two-fold. In a slow connection situation, we present a secure generic multi-factor authentication protocol to speed up the whole authentication process. Compared with another generic protocol in the literature, the new proposal provides the same function with significant improvements in computation and communication. Another authentication mechanism, which we name stand-alone authentication, can authenticate users when the connection to the central server is down. We investigate several issues in stand-alone authentication and show how to add it on multi-factor authentication protocols in an efficient and generic way.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The noninvasive brain imaging modalities have provided us an extraordinary means for monitoring the working brain. Among these modalities, Electroencephalography (EEG) is the most widely used technique for measuring the brain signals under different tasks, due to its mobility, low cost, and high temporal resolution. In this paper we investigate the use of EEG signals in brain-computer interface (BCI) systems.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper contains findings based on administering a Likert-type mobile learning attitude survey to 261 university students from four nations, China, Lebanon, the UAE and the USA. Students were asked to provide attitudes and perceptions toward the use of mobile technologies in education. The results of the survey indicate that students in different regions of the world tend to agree that mobile learning could empower informal learning and could enhance teaching and learning. Lebanon students were most similar to those from the USA, while students from China were more similar to those from the UAE. Similarities and differences in results among nations and implications of these findings are discussed.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Online communities offer a platform to support and discuss health issues. They provide a more accessible way to bring people of the same concerns or interests. This paper aims to study the characteristics of online autism communities (called Clinical) in comparison with other online communities (called Control) using data from 110 Live Journal weblog communities. Using machine learning techniques, we comprehensively analyze these online autism communities. We study three key aspects expressed in the blog posts made by members of the communities: sentiment, topics and language style. Sentiment analysis shows that the sentiment of the clinical group has lower valence, indicative of poorer moods than people in control. Topics and language styles are shown to be good predictors of autism posts. The result shows the potential of social media in medical studies for a broad range of purposes such as screening, monitoring and subsequently providing supports for online communities of individuals with special needs.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Due to the critical security threats imposed by email-based malware in recent years, modeling the propagation dynamics of email malware becomes a fundamental technique for predicting its potential damages and developing effective countermeasures. Compared to earlier versions of email malware, modern email malware exhibits two new features, reinfection and self-start. Reinfection refers to the malware behavior that modern email malware sends out malware copies whenever any healthy or infected recipients open the malicious attachment. Self-start refers to the behavior that malware starts to spread whenever compromised computers restart or certain files are visited. In the literature, several models are proposed for email malware propagation, but they did not take into account the above two features and cannot accurately model the propagation dynamics of modern email malware. To address this problem, we derive a novel difference equation based analytical model by introducing a new concept of virtual infected user. The proposed model can precisely present the repetitious spreading process caused by reinfection and self-start and effectively overcome the associated computational challenges. We perform comprehensive empirical and theoretical study to validate the proposed analytical model. The results show our model greatly outperforms previous models in terms of estimation accuracy. © 2013 IEEE.