Parallel implementation of color-based particle filter for object tracking in embedded systems
Recently, embedded systems have become popular because of the rising demand for portable, low-power devices. A common task for these devices is object tracking, which is an essential part of various applications. Until now, object tracking in video ...
Generating descriptive model for student dropout: a review of clustering approach
The implementation of data mining is widely considered as a powerful instrument for acquiring new knowledge from a pile of historical data, which is normally left unstudied. This data driven methodology has proven effective to improve the quality of ...
Trust reality-mining: evidencing the role of friendship for trust diffusion
Value sensitive design is driven by the motivation of making social and moral values central to the development of ICT systems. Among the most challenging concerns when imparting shared values like accountability, transparency, liberty, fairness and ...
On hybrid intelligence-based control approach with its application to flexible robot system
Flexible robot system is in general taken into real consideration as most important process in a number of academic and industrial environments. Due to the fact that the aforementioned system is so applicable in real domains, the novel ideas with ...
An enhanced security framework for home appliances in smart home
Since the end of 2000, smartphones have explosively spread and have made people's lives plentiful. With the start of smartphones, new smart devices, including tablet PCs, smart TVs, smart refrigerators, and smart air conditioners, have emerged, ...
Transaction processing in consistency-aware user's applications deployed on NoSQL databases
NoSQL databases are capable of storing and processing big data which is characterized by various properties such as volume, variety and velocity. Such databases are used in a variety of user applications that need large volume of data which is highly ...
Exploring the affective, motivational and cognitive effects of pedagogical agent enthusiasm in a multimedia learning environment
In a traditional classroom environment, instructor enthusiasm has been shown to enhance student's emotion, affective perceptions, intrinsic motivation, and cognitive outcome. Additionally, emotional response theory argues that enthusiastic verbal and ...
Citizen science for pedestrian cartography: collection and moderation of walkable routes in cities through mobile gamification
Digital geographical maps can be regarded as a user interface for understanding and navigating the city. Nevertheless, contemporary digital maps over-emphasize the needs of motor vehicles. Pedestrian routes have only been considered as an add-on option ...
Understanding and evaluating the behavior of technical users. A study of developer interaction at StackOverflow
This paper is focused on analyzing the details of one of the most widely used Q&A technical discussion forums on the Internet: StackOverflow. StackOverflow is a huge source of information for both academics and industry practitioners and its analysis ...
The convergence computing model for big sensor data mining and knowledge discovery
The article considers the model and method of converged computing and storage to create SCADA systems based on wireless networks for the energy industry. Computing power of modern wireless sensor network nodes allow the transfer to them some operations ...
An investigation into users' considerations towards using password managers
Password managers, though commonly recommended by security experts, are still not used by many users. Understanding why some choose to use password managers while others do not is important towards generally understanding why some users do what they do ...
A collaborative approach for semantic time-based video annotation using gamification
Efficient access to large scale video assets, may it be our life memories in our hard drive or a broadcaster archive which the company is eager to sell, requires content to be conveniently annotated. Manually annotating video content is, however, an ...
Tracking intruder ship in wireless environment
It is a challenging task for all Harbors or Naval Administration to restrict and monitor the movement of defense or commercial ships. Most commonly used techniques of monitoring are radars and satellite images. These techniques are not reliable as ...
Video scene identification and classification for user-tailored QoE in GEO satellites
Satellite networks offer an efficient alternative where no terrestrial networks are available, and can offer a cost effective means of transferring data. Numerous proposals have addressed the problem of resource allocation in geostationary (GEO) ...
Feature extraction for robust physical activity recognition
This paper presents the development of a Human Activity Recognition (HAR) system that uses a network of nine inertial measurement units situated in different body parts. Every unit provides 3D (3-dimension) acceleration, 3D angular velocity, 3D magnetic ...
A novel lightweight URL phishing detection system using SVM and similarity index
The phishing is a technique used by cyber-criminals to impersonate legitimate websites in order to obtain personal information. This paper presents a novel lightweight phishing detection approach completely based on the URL (uniform resource locator). ...
Toward the reduction of incorrect drawn ink retrieval
As tablet devices become popular, various handwriting applications are used. Some of applications incorporate a specific function, which is generally called palm rejection. Palm rejection enables application users to put the palm of a writing hand onto ...
Users' design feedback in usability evaluation: a literature review
As part of usability evaluation, users may be invited to offer their reflections on the system being evaluated. Such reflections may concern the system's suitability for its context of use, usability problem predictions, and design suggestions. We term ...
PLC-based design of monitoring system for ICT-integrated vertical fish farm
The common cause of the mass mortality of fishes in a fish farm is a power failure. There can be many reasons for the power failures but most of them are the result of natural disasters, systematic faults, ill-willed sabotages, or mistakes of employees. ...
Efficient motion blurred shadows using a temporal shadow map
In this paper, we propose a novel algorithm that renders motion blurred shadows efficiently on GPUs using a temporal shadow map. Each triangle moves during a frame and for each pixel, it is visible to the light in a range of time. The main idea of our ...
Graph clustering-based discretization of splitting and merging methods (GraphS and GraphM)
Discretization plays a major role as a data preprocessing technique used in machine learning and data mining. Recent studies have focused on multivariate discretization that considers relations among attributes. The general goal of this method is to ...
Rethinking self-reported measure in subjective evaluation of assistive technology
Self-reporting is used as a subjective measure of usability study of technology solutions. In assistive technology research, more than often the `a coordinator' directly assist the `subject' in the scoring process. This makes the rating process slower ...
A guide for the selection of routing protocols in WBAN for healthcare applications
In the present scenario, the term wireless body area network (WBAN) is becoming an integral part of human day to day life due its wide variety of applications, especially in the field of healthcare systems. To design such a reliable body area network ...
A climbing motion recognition method using anatomical information for screen climbing games
Screen climbing games have made a new category of gaming experience between a human climber and a virtual game projected onto an artificial climbing wall. Here, climbing motion recognition is required to interact with the game. In existing climbing ...
An AmI-based and privacy-preserving shopping mall model
Nowadays, large shopping malls provide tools to help and boost customers to buy products. Some of these tools melt down digital operations with physical ones executed by customers into blended commerce experiences. On the other hand, ambient ...
Handpad: a virtual mouse for controlling laptops in a smart home
This study investigates the possibilities of equipping fixed furniture with touch screens to control laptops or other smart home devices, to create a holistic smart home control system. Although multi-touch screens have recently been integrated into ...
A slave ants based ant colony optimization algorithm for task scheduling in cloud computing environments
Since cloud computing provides computing resources on a pay per use basis, a task scheduling algorithm directly affects the cost for users. In this paper, we propose a novel cloud task scheduling algorithm based on ant colony optimization that allocates ...
A fusion approach based on infrared finger vein transmitting model by using multi-light-intensity imaging
An infrared transmitting model from the observed finger vein images is proposed in this paper by using multi-light-intensity imaging. This model is estimated from many pixels' values under different intensity light in the same scene. Due to the fusion ...
Analyzing of incremental high utility pattern mining based on tree structures
Since the concept of high utility pattern mining was proposed to solve the drawbacks of traditional frequent pattern mining approach that cannot handle various features of real-world applications, many different techniques and algorithms for high ...