10-12 July 2013
Filter Results
-
[Front cover]
Publication Year: 2013, Page(s): c1|
PDF (477 KB)
-
Table of contents
Publication Year: 2013, Page(s):1 - 4|
PDF (79 KB)
-
Automatic stationary detection of time series using auto-correlation coefficients and LVQ — Neural network
Publication Year: 2013, Page(s):1 - 4
Cited by: Papers (1)A data mining of Time Series using Autocorrelation Coefficients (ACC) and LVQ -Neural Network is addressed in this work-a problem that has not yet been seen in a signal processing framework, to the best of our knowledge. Neural network classification was performed on real Time series Data of real data, in an attempt to experimentally investigate the connection between Time Series data and hidden i... View full abstract»
-
Traffic incident detection and modelling using Quantum Frequency Algorithm and AutoRegressive Integrated Moving Average models
Publication Year: 2013, Page(s):1 - 6In this study, we used AutoRegressive Integrated Moving Average (ARIMA) to effectively represent expected normal traffic behavior of those weeks identified to be abnormal in the previous literature. Using the 2006 North Luzon Expressway North Bound (NLEX NB) Balintawak (Blk) segment's hourly traffic volume and time mean speed data sets provided by the National Center for Transportation Studies (NC... View full abstract»
-
A kinesthetic game as a motivational aid and monitor in upper extremities burns rehabilitation
Publication Year: 2013, Page(s):1 - 3
Cited by: Papers (1)Lack of motivation is often cited as one of the most common reasons as to why only few burn patients with physical conditions do the recommended rehabilitation exercises regularly. Many games have been created to address this problem but most of them require subjects to wear sensors and devices which can be intrusive. A non-intrusive kinesthetic game that uses a Kinect sensor to incorporate range ... View full abstract»
-
Experiences on the use of an automatic C++ solution grader system
Publication Year: 2013, Page(s):1 - 6The codeCurator is an automatic C++ solution grader used in teaching programming to first year College students in Ateneo de Naga University. It provides programming exercises and challenge problems based on a prescribed sequence of programming topics. The exercises and challenge problems are designed to help students get a grip on formulation of functions, class methods, complete class implementa... View full abstract»
-
MediPic: A mobile application for medical prescriptions
Publication Year: 2013, Page(s):1 - 4Misinterpreted drug names in medical prescriptions cause severe and lethal effects to patients. This is caused by either illegible handwriting or inability of pharmacists to recognize medicine names in medical prescription. This study resolves the problems in medical prescriptions through MediPic, an Android application that uses optical character recognition to partially scan handwritten medicine... View full abstract»
-
Acceptability of Hear-O as a mobile hearing screening tool
Publication Year: 2013, Page(s):1 - 6Permanent childhood hearing impairment (PCHI) can cause diminished communication skills and delay in language development causing a great disadvantage for children. Early identification of hearing impairment, by the hearing screening program, can lead to beneficial effects on language development. However, the program is not accessible for everyone in the Philippines. This study aims to implement ... View full abstract»
-
Secure communication platform for distributed city-wide surveillance systems
Publication Year: 2013, Page(s):1 - 4Managing a modern IP-based city-wide surveillance system requires that sensors and actuators in the system are visible to multiple computation and co-ordination nodes deployed in the surveillance network. As current and future surveillance systems can often consist of multiple independently managed local-area networks utilizing network address translation, it is not guaranteed that the nodes can c... View full abstract»
-
An integrated tool for virtual restoration of Byzantine icons
Publication Year: 2013, Page(s):1 - 6
Cited by: Papers (1)An integrated tool that can be used for damage detection, shape restoration and texture restoration of faces appearing in Byzantine icons, is presented. The damage detection process involves the estimation of residuals obtained after the coding and reconstruction of face image regions using trained Principal Component Analysis (PCA) texture models. Shape restoration is accomplished using a model-b... View full abstract»
-
Privacy as a Product: A case study in the m-Health sector
Publication Year: 2013, Page(s):1 - 6
Cited by: Papers (6) | Patents (1)Business models based on offering free services to people in exchange for their data are gaining importance and prevalence. The most prominent examples are social networks and, more recently, mobile social networks. However, this trend is endangering users' privacy. We do not discuss the ethical and legal issues derived from this business model. Notwithstanding, we believe that users might have be... View full abstract»
-
Uncertainty reasoning for the Semantic Web based on Dempster-Shafer model
Publication Year: 2013, Page(s):1 - 4
Cited by: Papers (3)The Semantic Web vision introduces the concept of machine-oriented web information. This information is characterized by the notions of uncertainty and vagueness. Towards this notions, an ontology model for representing uncertain or vague information, as well as an inference method for reasoning about this kind of information is necessary. Our approach faces the aforementioned issues, i.e. the imp... View full abstract»
-
Distributed privacy-preserving P2P data mining via probabilistic neural network committee machines
Publication Year: 2013, Page(s):1 - 4
Cited by: Papers (1)This work describes a probabilistic neural network (PNN) committee machine for Peer-to-Peer data mining. The pattern neurons of the PNN committee are composed of locally trained class-specialized regularization network Peer classifiers. The training takes into account the asynchronous distributed and privacy-preserving requirements that can be met in P2P systems. The Peer classifiers are first tra... View full abstract»
-
Agent agreement protocols based on golay error-correcting code
Publication Year: 2013, Page(s):1 - 6In this paper, we propose simple protocols for enabling two communicating agents that may have never met before to extract common knowledge out of any initial knowledge that each of them possesses. The initial knowledge from which the agents start, may even be independent of each other, implying that the two agents need not have had previous access to common information sources. In addition, the c... View full abstract»
-
Fuzzy logic for dynamic adaptation: Represent and manage changeable user states
Publication Year: 2013, Page(s):1 - 6In this paper a novel generic fuzzy adaptation tool (FAdapT) is presented. FAdapT uses fuzzy sets and a mechanism of rules over them in order to promote personalization in adaptive systems. It is applicable to systems, in which the user's changeable state and/or preferences are affected by the existing dependencies among the system's elements (like concepts, preferences, events, choices). FAdapT l... View full abstract»
-
Learning addition by playing an adaptive game with coins
Publication Year: 2013, Page(s):1 - 4Recent studies have shown that the use of educational games during learning process is dramatically increased. Furthermore, researchers suggest the attachment of adaptive features in order to motivate students and assess their knowledge level on a specific educational subject. In this paper, we present an educational browser-based game with coins that contributes to better understanding the additi... View full abstract»
-
Multi-application ID card using DESFire EV1
Publication Year: 2013, Page(s):1 - 4Currently, when development of applications and technologies is definitely aimed at global use, such trend must be supported by unequivocal identification of users. The basic principles support safety elements (integrity, indisputableness, resistance to known and supposed forms of attacks) and do not link application to a physical carrier (plastic). The application can be hosted on a bank payment ... View full abstract»
-
Evaluation of density one-class classifiers for item-based filtering
Publication Year: 2013, Page(s):1 - 6In this paper we explore the use of density one-class classifiers for the movie recommendation problem. Our motivation lies in the fact that users of recommender systems usually provide ratings only for items that they are interested in and belong to their preferences without giving information on items that they dislike. One-class classification seems to be the proper learning paradigm for the re... View full abstract»
-
The use of Information and Communication Technologies in the first grade of primary school for teaching rectangles based in Realistic Mathematics Education
Publication Year: 2013, Page(s):1 - 6
Cited by: Papers (1)The aim of this study is to investigate the question: “Can Information and Communications Technology (ICT) helps to improve primary school students' geometry achievements for rectangles?” The applied educational software consisted of a story and several activities with and without the use of computers which were designed following the background of Realistic Mathematics Education for geometry conc... View full abstract»
-
Application of support vector regression in removing Poisson fluctuation from pulse height gamma-ray spectra
Publication Year: 2013, Page(s):1 - 4
Cited by: Papers (2)Analysis of pulse height gamma-ray signals is crucial in a variety of applications regarding safeguards and homeland security. Because of the inherent random nature of radiation measurements, the spectra obtained from gamma-ray sources exhibit a high variance that can be modeled as Poisson fluctuation. This variance imposes serious difficulties to spectrum analysis and isotope identification algor... View full abstract»
-
Enacted virtual partnerships: Imbrications of representations of boundary artifacts and cloud services
Publication Year: 2013, Page(s):1 - 7
Cited by: Papers (3)This paper examines the mechanics and the implications of remediated practices in the context of virtual cross-organizational collaboration. Our treatment of the issue is informed by a case study aiming to assess how imbrications of representations hosted by different social media enable or constrain peer co-engagement of members in a virtual partnership. To this effect, we draw upon theories of a... View full abstract»
-
A comparison between continuous categorical emotion responses and Stimulus loudness parameters
Publication Year: 2013, Page(s):1 - 6This paper investigates the use of psychoacoustic loudness analysis as a method for determining the likely emotional responses of listeners to musical excerpts. 19 excerpts of music were presented to 86 participants (7 randomly chosen excerpts per participant) who were asked to rate the emotion category using the emotion-clock-face continuous response interface. The same excerpts were analysed wit... View full abstract»
-
S-Port: Collaborative security management of Port Information systems
Publication Year: 2013, Page(s):1 - 6
Cited by: Papers (2)Port Information and Communication Technology (PICT) systems offer a series of critical services rendering their effective security management an issue of vital importance. Existing regulation, standardization, and risk management methodologies do not adequately address the cyber threats the dependent environment of PICT systems is exposed to. In the SPort project, we identified and addressed thes... View full abstract»
-
Modeling cyber attacks on a critical infrastructure scenario
Publication Year: 2013, Page(s):1 - 6
Cited by: Papers (4)Critical infrastructures, such as electrical grids, are monitored and controlled by SCADA (Supervisory Control And Data Acquisition) systems. Cyber attacks against SCADA might put CI and in turn industrial production, environment integrity and human safety at risk. Here, with reference to an actual case study, constituted by an electrical grid, its SCADA system and a corporate network, we discuss ... View full abstract»
-
Performance evaluation of three GPSR-based routing protocols in a military setting
Publication Year: 2013, Page(s):1 - 4
Cited by: Papers (1)Recent research has highlighted the potential of equipping soldiers with portable computing devices as a means to regularly report complex and important observations to mission planners at headquarters. To realise such scenarios connectivity between disparate elements in the battlefield needs to be established and appropriate supporting algorithms developed. In MANET literature several algorithms ... View full abstract»