itcsbanner.jpg

Filter by

Towards efficient and secure cloud

Cloud computing is becoming more and more popular. It is increasing in popularity with companies as it enables them to share various resources in a cost effective way. Cloud computing has lots of advantages, however some issues need to be handled before organizations and individuals have the confidence to rely on it. Security and privacy are at the forefront of these important issues. In this

Artificial Intelligence

Enhanced target tracking in UAV imagery with P-N learning and structural constraints

This paper presents improved automatic moving target detection and tracking framework that is suitable for UAV imagery. The framework is comprised of motion compensation phase to detect moving targets from a moving camera, target state estimation with Kalman filter, and overlap-rate-based data association. Finally, P-N learning is used to maintain target appearance by utilizing novel structural

Artificial Intelligence

ITS navigation and live timetables for the blind based on RFID robotic localization algorithms and ZigBee broadcasting

This paper tries to alleviate some challenges facing blind and visually impaired people in public transportation systems by providing them with in-station navigation information and real-time schedule information. Novel system architecture for the Intelligent Transportation Systems (ITS) navigation for blind and visually impaired people based on recent Radio Frequency Identification (RFID)

Software and Communications
Mechanical Design

News auto-tagging using Wikipedia

This paper presents an efficient method for automatically annotating Arabic news stories with tags using Wikipedia. The idea of the system is to use Wikipedia article names, properties, and re-directs to build a pool of meaningful tags. Sophisticated and efficient matching methods are then used to detect text fragments in input news stories that correspond to entries in the constructed tag pool

Software and Communications

A system for assessing the quality of Web pages

The World Wide Web has brought about an unprecedented explosion in the amount of information available on-line, largely in the form of Web pages. The fact that anyone can publish anything has ultimately led to pages with varying degrees of quality. This paper aims at investigating means for assessing the quality of a random web page and provides a quantitative approach for selecting high quality

Software and Communications

2DHOOF-2DPCA contour based optical flow algorithm for human activity recognition

A novel algorithm for human activity recognition is presented in this paper. This approach is based on a new 2D representation for the Histogram of Oriented Optical Flow (2DHOOF) describing the motion of the actor's contour, where one multi-layer 2D-histogram per video is constructed. Each histogram layer consists of 2D bins (layers) that represent different range of angles. Applying our 2DHOOF

Artificial Intelligence

Plagiarism candidate retrieval using selective query formulation and discriminative query scoring: Notebook for PAN at CLEF 2013

This paper details the approach of implementing an English plagiarism source retrieval system to be presented at PAN 2013. The system uses the TextTiling algorithm to break a given document into segments that are centered around certain topics within the document. From these segments, keyphrases are generated using the KPMiner keyphrase extraction system. These keyphrases and segments are then

Artificial Intelligence

An approach for deriving semantically related category hierarchies from Wikipedia category graphs

Wikipedia is the largest online encyclopedia known to date. Its rich content and semi-structured nature has made it into a very valuable research tool used for classification, information extraction, and semantic annotation, among others. Many applications can benefit from the presence of a topic hierarchy in Wikipedia. However, what Wikipedia currently offers is a category graph built through

Artificial Intelligence

Performance evaluation of AODV under dos attacks

Mobile Ad-hoc Networks consist of a group of nodes with wireless connectivity forming a network without fixed infrastructure or centralized administration. Such networks are very dynamic due to nodes' mobility. This causes frequent unpredictable changes in topology, a characteristic that must be dealt with using special routing protocols. The Ad-hoc on Demand Distance Vector (AODV) is one of the

Artificial Intelligence

Security access control research trends

Information security policy is a critical property in any organization. For systems, the security policy addresses constraints on access by external systems and adversaries including programs and access to data by people. A continuous research effort is done throughout security policy aspects, such as policy procedures, documentation, policy enforcement, and administration. In this paper, we

Artificial Intelligence