Article | 01-March-2016
Moving object detection based on color information is easily affected by illumination changes and shadows in complex scenes. Depth information can provide complementary information. In the paper, a novel method is presented by using color and depth information. Firstly, we improve the codebook algorithm by fusing the depth information as the fourth channel in the code word. Next, a compensation factor algorithm is presented to make the edges accurate. So the final detection result can be
T. T. Zhang,
G. P. Zhao,
L. J. LIU
International Journal on Smart Sensing and Intelligent Systems, Volume 9 , ISSUE 1, 274–288
Article | 07-May-2018
This paper explains the idea of information security and discusses the establishment of the security system of information network. By using the information system security engineering method, we will establish and improve the network security plan and disaster recovery plan through strict organization and management, adequate financial support, strong talent support and deep technical guarantee. This paper puts forward the overall strategic goal of the “people-oriented, to prevent the main
Wang Yuanyuan
International Journal of Advanced Network, Monitoring and Controls, Volume 3 , ISSUE 2, 104–107
Article | 30-November-2018
I.
INTRODUCTION
With the development of radio frequency technology, product-related information can be quickly obtained by the readers if RF tags are assigned to each product. Recently, people have began to adopt IPV6 and even IPV9 protocol formats for RF tag coding since IPV4 address space has been used up. If the server storing product-related information is stored in an IPV4 or IPV6 network, how to query RF information across the network should be solved. This paper mainly studies the RF
Li Guiping,
Xue Lei
International Journal of Advanced Network, Monitoring and Controls, Volume 4 , ISSUE 4, 74–79
Article | 07-May-2018
In the “Internet plus” era, information technology will be applied to the community home-based care services is a new initiative to create wisdom of the pension industry. With the full use of the Internet and large data, the new model of home care for the elderly needs the active participation of the social organizations (enterprises), and the correct guidance of the government. Strengthening the top-level design of government, establishing the information standard and enhancing the
Jie Zhao
International Journal of Advanced Network, Monitoring and Controls, Volume 3 , ISSUE 2, 113–117
Article | 07-May-2018
The rapid development of communication technology such as big data makes the integration and application of sports resource information become the key of sports informatization construction. The construction of sports resources information big data platform is of great significance to the integration of sports resources and the sharing of sports resources. The subject explores the related theory of sports resources, studies the present situation of the application of sports resources
Wang Shuangming,
Shi Jianwei,
Fu Shiqiu,
Xu Wanlin
International Journal of Advanced Network, Monitoring and Controls, Volume 3 , ISSUE 2, 28–32
Article | 23-April-2018
According to the development of information technology and the management of metallurgical enterprises, the paper puts forward the design scheme of the information platform for metallurgical enterprises, introduces the structure and function of the new type of metallurgical information platform. It realize loop online collection, hierarchical data computation, distributed database management and global WEB publishing capability. And improve the level of production automation, reduce energy
Ma Dandan,
Bai Jing
International Journal of Advanced Network, Monitoring and Controls, Volume 2 , ISSUE 4, 1–4
Article | 01-June-2015
As the attributes provided by multi-source information can be used to distinguish between the different species of targets, attributes recognition becomes the most important work in target recognition. In this paper, a new method for attributes recognition was proposed with rough set theory. It used a new way to described the target with a information system consisting of four elements, reduced the attribute value according to the mission requirements, valuated the attribute based on the degree
Cheng Zengping
International Journal on Smart Sensing and Intelligent Systems, Volume 8 , ISSUE 2, 1063–1084
Article | 01-September-2016
Sensor network is a data-centric network, which provides data collection, storage and query services. Data storage and query is one of the hot spot in the research of sensor networks. In order to solve the problem of low efficiency of storage and query,high energy consumption in sensor networks, we put forward a scheme that storing distributed data of wireless sensor network based on information processing cloud. Information processing cloud is made up of a group of sensor nodes around the
LUO Qing-Yun,
ZHU Ling-Zhi,
CHAGN Yun-Jie,
ZHAO Jin-Guo,
LIAO Wei-Sheng,
HE Rui
International Journal on Smart Sensing and Intelligent Systems, Volume 9 , ISSUE 3, 1614–1636
Article | 24-April-2018
This paper studies the application of embedded system in water conservancy information remote monitoring, structured, modular scheme is adopted to improve the system of software and hardware design, debugging and implementation, and puts forward a set of embedded control, data acquisition and transmission, friendly interface in the integration of monitoring information management system design. This system based on the wide coverage of the GSM short message service provided mobile communication
Xiaoqing Shi,
Qianhua Huang,
Gangyu Gu
International Journal of Advanced Network, Monitoring and Controls, Volume 2 , ISSUE 4, 106–109
Article | 08-April-2018
Cognitive testability is an inherent attribute of the modern electronic equipment. The information acquisition ability of cognitive testability was described in details and an evaluation model was built upon the basic construction of the index system of the cognitive testability. First of all, the idea and contents of the information acquisition ability of the modern electronic equipment was stated. Second, based on this, a mathematical model of weight calculation with the use of entropy weight
Liu Xinhai,
Ma Yanheng,
Zong Zijian
International Journal of Advanced Network, Monitoring and Controls, Volume 1 , ISSUE 2, 82–88
Article | 04-March-2018
The author proposes to develop special models that are built based on finite-state machine, Mealy, in order to display information about technological processes at railway stations. The input alphabet of such machines is represented by the real signals (from the floor equipment, the related information systems and the dispatch office personnel). This representation allows one to formalize the software design process of real-time information management systems for these technological processes
Igor ZHUKOVYTS’KYY
Transport Problems, Volume 12 , ISSUE 4, 101–108
Article | 04-March-2018
In this paper, we examine the problems of simulating modeling of urban transport route network operation and development of an information system for automating the process of modeling and processing of simulation results with SIMUL8 software. In order to solve this problem, it is required to solve the following set of related tasks: formal description of the urban transport systems structure and parameters of its functioning, development of mathematical models of urban transport network
Vladimir NEMTINOV,
Yulia NEMTINOVA,
Andrey BORISENKO,
Vladimir MOKROZUB
Transport Problems, Volume 12 , ISSUE 4, 83–90
Research Article | 21-April-2017
, proposes a basic conceptual design of an information system for evaluation and analysis of these elements. This was done by contextual analysis where the relevant stakeholders such as infrastructure operators or industry, were identified. The analysis included the demand of the stakeholder for such an information system. Thus, the design and the architecture of an information system was specified. The system should provide a tool for operators of rail infrastructures to get a systematic overview on the
Frank MICHELBERGER,
Hirut GROSSBERGER,
Peter JUDMAIER
Transport Problems, Volume 10 , ISSUE SE, 111–124
research-article | 30-January-2020
whether we name, order and attend to it) is seen as consequent upon ‘nurture’: it is a social kind. Research into ADHD however spreads across disciplines, and so in principle foretells some sort of scientific integration of the nature and nurture attributes of ADHD.
Although the authors of youth information books on ADHD might project an integrated nature/nurture picture of ADHD for example by covering both biomedical and psychosocial risk factors, such books are perhaps as likely to reflect the kind
Laura Batstra,
Linda Foget,
Caroline van Haeringen,
Sanne te Meerman,
Ernst Daniël Thoutenhoofd
Scandinavian Journal of Child and Adolescent Psychiatry and Psychology, Volume 8 , 1–9
Sampling Methods | 22-July-2018
In the present study we have proposed an improved family of estimators for estimation of population mean using the auxiliary information of median, quartile deviation, Gini’s mean difference, Downton’s Method, Probability Weighted Moments and their linear combinations with correlation coefficient and coefficient of variation. The performance of the proposed family of estimators is analysed by mean square error and bias and compared with the existing estimators in the literature. By
Mir Subzar,
Showkat Maqbool,
Tariq Ahmad Raja,
Surya Kant Pal,
Prayas Sharma
Statistics in Transition New Series, Volume 19 , ISSUE 2, 219–238
Research Article | 12-December-2017
We adopt temporal graph model to explore the dynamic temporal properties of three mobility datasets in DTN (Delay Tolerant Network), collected from different sources, including one university campus WLAN and two conferences WLANs. With this model, we observe that the temporal network density of DTN changes with time and approximate varies periodically. Then we study the impact of this phenomenon on information diffusion. Our studies and findings can be used for establishing more realistic
Lintao Yang,
Sai Wang,
Hao Jiang
International Journal on Smart Sensing and Intelligent Systems, Volume 4 , ISSUE 1, 35–52
Article | 02-April-2020
can save the execution information of workflow through persistent message queue and complete the complete independence of all nodes in the execution process
SOA architecture has three significant advantages: loose coupling, coarse granularity, and location protocol transparency. Through the encapsulation of services to achieve a comprehensive loose coupling, loose coupling can reduce the dependency between services, so that the flexibility of the service itself can be improved, and it will not be
Pingping Liu,
Jiaxing Lu
International Journal of Advanced Network, Monitoring and Controls, Volume 5 , ISSUE 1, 15–21
Article | 13-December-2019
The most dominant problem in the survey sampling is to obtain the better ratio estimators for the estimation of population mean or population variance. Estimation theory is enhanced by using the auxiliary information in order to improve on designs, precision and efficiency of estimators. A modified class of ratio estimator is suggested in this paper to estimate the population mean. Expressions for the bias and the mean square error of the proposed estimators are obtained. Both analytical and
Mir Subzar,
S. Maqbool,
T. A. Raja,
Prayas Sharma
Statistics in Transition New Series, Volume 20 , ISSUE 4, 181–189
Article | 01-March-2015
Aim at existing selection algorithm mutual information inaccurate valuation problem, a condition dynamic concept of mutual information. On this basis, the conditions proposed based on dynamic mutual information (CDMI) feature selection algorithm to overcome the traditional mutual information selection process dynamic correlation problem; conditions of dynamic mutual information throughout the selection process is dynamic valuation, those the samples can be identified after each selection
Wang Liping
International Journal on Smart Sensing and Intelligent Systems, Volume 8 , ISSUE 1, 316–337
Article | 01-June-2015
We consider multiple-inputs-single-output (MISO) systems equipped with N transmit and single receive antennas, and concentrate on transmit antenna selection (TAS) for flat Rayleigh fading channels. We assume perfect channel state information (CSI) at receiver and imperfect CSIs through an feedback link at transmitter. The metric of TAS are those with the largest instantaneous signal-tonoise ratio (SNR), the best 2 out of N available transmit antennas always are selected. We use Alamouti
Mingjie Zhuang
International Journal on Smart Sensing and Intelligent Systems, Volume 8 , ISSUE 2, 1333–1353
Article | 24-August-2017
Nazeema T. Beevi,
C. Chandran
Statistics in Transition New Series, Volume 18 , ISSUE 2, 227–245
Article | 07-May-2018
Sentiment analysis, also known as opinion mining, refers to the emotional tendencies expressed by the critics through the analysis of the content of the text. The task of text sentiment analysis mainly includes the classification of sentiment, the extraction of sentiment information and the retrieval and induction of sentiment information. Based on CRF, this paper will extract several pairs of theme words and sentiment words exist in the e-commerce review, and judge the sentiment inclination of
Danyang Li,
Huimin Fan,
Zhao Yingze
International Journal of Advanced Network, Monitoring and Controls, Volume 3 , ISSUE 1, 92–96
research-article | 05-January-2021
information, delivering key messages timely to the public, and controlling the spread of dis/misinformation can play a crucial role in managing epidemics (Homeland Security Council (US), 2006; World Health Organization, 2009; Centers for Disease Control and Prevention, 2014; Department of Homeland Security, 2018). COVID-19’s devastating effects on the physical and mental health of the public are unlike previous medical crises, in part because of people’s collective access to communication technologies
Ian Kim,
Thomas W. Valente
Connections: The Quarterly Journal, Volume 40 , ISSUE 1, 129–142
Research Article | 21-April-2017
Transport accessibility can be analyzed using a number of different methods. The problem with each of them is the difficulty of obtaining data to measure this phenomenon The focus of this article and its main goal are to present methods and tools for gathering data on road traffic; thanks to modern information technology, it is possible to collect real data without the need for large-scale and highly capital-intensive measurements. The application of modern information technology (IT) presented
Bartosz BARTOSIEWICZ,
Szymon WIŚNIEWSKI
Transport Problems, Volume 10 , ISSUE 3, 87–98
Article | 16-April-2018
This study investigated the experiences of men and women with vision disabilities knowing about and participating in information programs provided by guide dog organisations; and investigated the way information programs affect people’s perceptions and attitudes towards guide dogs in Japan where people are hesitant to acquire a guide dog. The results suggest that the information programs had been widely publicised and were familiar to participants. Younger women were the most experienced
Mariko Yamamoto,
Lynette A. Hart,
Koji Matsumoto,
Mitsuaki Ohta,
Nobuyo Ohtani
International Journal of Orientation & Mobility, Volume 6 , ISSUE 1, 70–82
Article | 02-April-2018
Based on the journals of JCR Social Sciences Edition--INFORMATION SCIENCE & LIBRARY SCIENCE category from 2003 to 2014, the Chinese authors’ 2793 articles in Library and Information Science (LIS) were collected and analyzed on Web of Science (WOS). First, it ranked the first Chinese authors, and selected 76 authors with more than 5 articles as sample authors. Then it collected the sample authors’ articles on WOS, and the h-index and first author h-index were listed and analyzed.
Chen Yuecong,
Liu Zongqi
International Journal of Advanced Network, Monitoring and Controls, Volume 1 , ISSUE 2, 20–24
Article | 01-September-2014
The digital system of Archaeology includes multi-scale non-destructive detection (NDD) of archaeological methods, data mining technologies and the GIS of archaeological detect. Heritage preservation is not just to protect the cultural relics which have been excavated. NDD method could detect archaeological artifacts and clarify the statues of cultural relics buried underground. Due to data mining algorithm we can obtain archaeological information via detection data. Finally, apply GIS
CAO Ligang,
WANG Xuben
International Journal on Smart Sensing and Intelligent Systems, Volume 7 , ISSUE 3, 1347–1363
Article | 01-June-2015
Integrating recent years’ results and analyzing the VANET (Vehicular ad hoc networks), taking the important role of mobile nodes into account a vehicular opportunity route based on real-time information (VORI) is proposed. VORI uses mobile nodes to collect real time area information, and construct hot area for best inter-area selecting with the information to help delivery message. VORI is consisting of node position query and data transmission. The limited query reduces the number of query
Zhongwei CUI,
Yong CHAO,
Daoyun XU,
Yu ZUO
International Journal on Smart Sensing and Intelligent Systems, Volume 8 , ISSUE 2, 1142–1161
research-article | 01-October-2021
, corticotomies, osteotomies, distraction, and a surgery-first approach.6
The Internet consists of a vast combination of computer networks linked around the world. It is reported that approximately 40% of the world’s population has an Internet connection, and this rate has increased rapidly during the twenty-first century.7 Public access to health-related information has also increased following the widespread use of the Internet. Many patients seek and obtain information about orthodontic problems and
Kevser Kurt Demirsoy,
Tugce Imamoglu,
Suleyman Kutalmış Buyuk
Australasian Orthodontic Journal, Volume 37 , ISSUE 2, 265–272
Research Article | 15-February-2020
services and spaces among all persons, this work proposes an innovative indoor navigation and information system for public buildings, namely shopping centers, based on existing technologies not used for this purpose. Intending to allow a comfortableandhelpfulaidonblindpersonstripstotheshopping center, this proposal system relies on users smartphone and wireless sensors deployed in the environment.
Karen Duarte,
Jose Cecilio,
Jorge Sa Silva,
Pedro Furtado
International Journal on Smart Sensing and Intelligent Systems, Volume 7 , ISSUE 5, 1–4
research-article | 23-October-2019
Network theory and methods contribute prominently to understandings of how the structure of communication and interactions among people impact various organizational processes and outcomes (Monge and Contractor, 2003; Borgatti and Halgin, 2011). This mystery game (see Appendix 1 for game setup instructions) offers an engaging way to help students experience and understand how their position in a network brings opportunities and constraints in accessing information and facilitating information
Seungyoon Lee,
Zachary Wittrock,
Bailey C. Benedict
Connections: The Quarterly Journal, Volume 39 , ISSUE 1, 1–18
research-article | 30-November-2019
information on behavior, direction, and activity of these data. Probabilistic analyses require many experts to construct predictive models for the prediction process (Jayanthi et al., 2017). After the emergence of social media such as Facebook and Twitter, big data analysis and prediction techniques became one of the most important elements for identifying human behavior and predicting unknown aspects such as location, gender, and nationality. Social media data analysis is important for scientists
Yasser Almadany,
Khalid Mohammed Saffer,
Ahmed K. Jameil,
Saad Albawi
International Journal on Smart Sensing and Intelligent Systems, Volume 13 , ISSUE 1, 1–10
research-article | 30-November-2019
Structure-free vehicular ad-hoc networks (VANETs) exchange information through roadside units (RSUs) using IEEE 802.11p at 5.9 GHz. To make the journey experience safe and secure for the user, we need to ensure real-time information to road users on the highway or city scenario (S Al-Sultan et al., 2014; Schoch et al., 2008). Figure 1 indicates the basic communication module used for the propagation of information of the cluster to the end user. Cluster is required to overcome the issue of
Rajeev Kumar,
Dilip Kumar,
Dinesh Kumar
International Journal on Smart Sensing and Intelligent Systems, Volume 13 , ISSUE 1, 1–9
Article | 20-July-2021
Objective: To evaluate the treatment risks and the quality of information contained within the websites of specialist orthodontists in Australia. Methods: The term ‘specialist orthodontic practice’ was entered into three internet search engines. Websites satisfying inclusion and exclusion criteria were evaluated for orthodontic treatment risk information against nine common treatment risks. For website reliability and quality, the DISCERN instrument was used along with the HON
Maurice J. Meade,
Craig W. Dreyer
Australasian Orthodontic Journal, Volume 35 , ISSUE 2, 143–151
Research paper | 01-November-2017
logits of the true proportions. Effective sample sizes are defined so variances given the true proportions equal corresponding sampling variances of the direct survey estimates. We extend the BLN model to bivariate and time series (first order autoregressive) versions to permit borrowing information from past survey estimates, then apply these models to data used by the U.S. Census Bureau’s Small Area Income and Poverty Estimates (SAIPE) program to predict county poverty for school-age children. We
Carolina Franco,
William R. Bell
Statistics in Transition New Series, Volume 16 , ISSUE 4, 563–584
Article | 15-September-2020
estimate an information criterion based on the transformed linking model and use the estimated information criterion for variable selection. The proposed method is motivated by the variable selection method of Lahiri and Suntornchost (2015) for the Fay-Herriot model and the variable selection method of Li and Lahiri (2019) for the unit-level nested-error regression model. Simulation results show that the proposed variable selection method performs significantly better than some naive competitors
Song Cai,
J. N. K. Rao,
Laura Dumitrescu,
Golshid Chatrchi
Statistics in Transition New Series, Volume 21 , ISSUE 4, 68–83
Article | 01-April-2020
ISBT 128 will be implemented in the United States during the next two years. In addition to improving unit traceability and lookback tracking, this information technology standard has the power to detect and prevent errors in data entry by using data identifiers and check characters. Additionally,its ability to encode special testing results such as CMV and RBC phenotype on a label provides laboratories a computerized mechanism to verify the accuracy of such labels.
Suzanne H. Butch,
Patricia B. Distler
Immunohematology, Volume 22 , ISSUE 1, 30–36
Research Article | 01-June-2017
Watermarking is an advanced technology that identifies to solve the problem of illegal manipulation and distribution of digital data. It is the art of hiding the copyright information into host such that the embedded data is imperceptible. The covers in the forms of digital multimedia object, namely image, audio and video. The extensive literature collected related to the performance improvement of video watermarking techniques is critically reviewed and presented in this paper. Also
B. Sridhar
International Journal on Smart Sensing and Intelligent Systems, Volume 10 , ISSUE 2, 387–406
Research Article | 21-April-2017
and reduces interfaces in business to port (B2P) and business to administration (B2A) operational processes for ship formalities. Consequently, the business to customer (B2C) relationship benefits from lean operation procedures. The focus is also on information exchange standardization. The paper presents principal benefits of the model implementation in the Slovenian port community. The SI MSW model might be adopted also in other port communities in the Adriatic region or to be used as the main
Bojan BEŠKOVNIK
Transport Problems, Volume 10 , ISSUE 4, 24–33
Article | 05-September-2013
In modern society, more and more people are suffering from some type of stress. Monitoring and timely detecting of stress level will be very valuable for the person to take counter measures. In this paper, we investigate the use of decision analytics methodologies to detect stress. We present a new feature selection method based on the principal component analysis (PCA), compare three feature selection methods, and evaluate five information fusion methods for stress detection. A driving stress
Yong Deng,
Chao-Hsien Chu,
Huayou Si,
Qixun Zhang,
Zhonghai Wu
International Journal on Smart Sensing and Intelligent Systems, Volume 6 , ISSUE 4, 1675–1699
Article | 06-July-2017
Construction of small area predictors and estimation of the prediction mean squared error, given different types of auxiliary information are illustrated for a unit level model. Of interest are situations where the mean and variance of an auxiliary variable are subject to estimation error. Fixed and random specifications for the auxiliary variables are considered. The efficiency gains associated with the random specification for the auxiliary variable measured with error are demonstrated. A
Andreea L. Erciulescu,
Wayne A. Fuller
Statistics in Transition New Series, Volume 17 , ISSUE 1, 9–24
Research Article | 02-November-2017
. Toward this end, we exploit random set theory, a statistical tool based on Bayesian framework, for establishing generalized likelihood and Markov density functions to yield an iterative filtering procedure. We conduct a study regarding how the design of distributed detection has impact on the result of system level information fusion. The sources of analyzed data include (a) simulation-based sensor readings through bi-directional sensing/communication; and (b) practical images taken by multiple
Juo-Yu Lee,
Kung Yao
International Journal on Smart Sensing and Intelligent Systems, Volume 1 , ISSUE 4, 842–857
Article | 22-January-2018
The key and fundamental purpose of sampling over successive waves lies in the varying nature of study character, it so may happen with ancillary information if the time lag between two successive waves is sufficiently large. Keeping the varying nature of auxiliary information in consideration, modern approaches have been proposed to estimate population mean over two successive waves. Four exponential ratio type estimators have been designed. The properties of proposed estimators have been
Kumari Priyanka,
Richa Mittal
Statistics in Transition New Series, Volume 18 , ISSUE 4, 569–587
Article | 01-December-2015
significance to select the optimal cluster heads number for wireless sensor networks. Based on the information rate-distortion function and network energy model, we propose an algorithm OCHN which calculates the optimal cluster head number for the minimal energy consumption, and further gets the optimal cluster head ratio in the process of data aggregation. Simulation results demonstrate that our proposed algorithm is energy efficient, and the comprehensive performances of network lifetime and data
Mingxin Yang
International Journal on Smart Sensing and Intelligent Systems, Volume 8 , ISSUE 4, 1935–1955
Article | 18-June-2020
Intelligent information and analytical basis of a modern transport system is a prerequisite for efficient functioning of the digital economy. Modern transport systems are based on new intelligent technologies and new organizational principles, which is why the functions and competences of specialists in transportation are changing very rapidly. This paper substantiates the need and reveals the content of new competencies of specialists for modern transport systems, which should be ready to take
Svetlana LYAPINA,
Valentina TАRASOVA,
Marina FEDOTOVA
Transport Problems, Volume 15 , ISSUE 2, 71–82
Article | 24-March-2018
major obstacles to comprehensive multimodal transport management within and beyond European Union borders. Though information and communication technologies (ICT) have entered into all traffic and transport systems, the levels of ICT penetration achieved in controlling, monitoring, and managing of system operation and processes are currently quite different [1-5]. One of the reasons for that is the lack of homogenous ICT standards and, as a result, the technological barriers for interconnectivity
Evelin ENGLER,
Stefan GEWIES,
Paweł BANYŚ,
Erik GRUNEWALD
Transport Problems, Volume 13 , ISSUE 1, 81–96
Article | 25-November-2017
Summary. In the present study the transport work on collecting routes in "Bulgarian Posts" EAD has been analysed. Routes have been defined, in which a reduction of the transport costs is possible if pre-collected information about the availability of letters in the mailboxes is available. For this purpose, an automated system was created, which can recognise the availability of letters and send notifications. The method and the recognition criterion are described and the critical
Velizara PENCHEVA,
Asen ASENOV,
Dzhemal TOPCHU,
Ivan BELOEV,
Boris EVSTATIEV
Transport Problems, Volume 12 , ISSUE 3, 147–157
Article | 04-March-2018
The interaction of the two kind activities of the Faculty of Transport of the Silesian University of Technology, namely the international conference and scientific journal, which have the same name "Transport Problems", is considered. It is proved that such interaction is very useful for transport scientists of different countries and serves a platform for information exchange and discussion of the most pressing problems of the transport industry. Changes that have occurred in this
Aleksander SŁADKOWSKI
Transport Problems, Volume 12 , ISSUE SE, 5–10
Letter | 29-December-2020
Delores Mallory
Immunohematology, Volume 4 , ISSUE 4, 90–90
Article | 01-June-2016
Wireless Sensor Networks (WSNs) suffer from many security attacks when deployed either in remote or hostile environments. Among possible attacks, the Sybil attack is one of the severe attacks in which malicious nodes report false identities and location information such that the remaining nodes believe that many nodes exist in their vicinity. The current study proposes a method for detecting Sybil attack using sequential analysis. This method works in two stages. First, it collects the
P. Raghu Vamsi,
Krishna Kant
International Journal on Smart Sensing and Intelligent Systems, Volume 9 , ISSUE 2, 651–680
Book Review | 14-October-2020
S. Gerald Sandler
Immunohematology, Volume 19 , ISSUE 3, 93–93
Research Article | 13-August-2019
This article discusses the conceptualization of network in Manuel Castells’ theory of network society and its relation to network analysis. Networks assumed a significant role in Castells’ opus magnum, The Information Age trilogy, in the latter half of the 1990s. He became possibly the most prominent figure globally in adopting network terminology in social theory, but at the same time he made hardly any empirical or methodological contribution to network analysis. This article
Ari-Veikko Anttiroiko
Journal of Social Structure, Volume 16 , ISSUE 1, 1–18
Article | 15-April-2020
Anne F. Eder
Immunohematology, Volume 22 , ISSUE 4, 188–195
Article | 16-April-2018
Katherine Ward, B.Sc., M.Spec.Ed.,
Kerry Peirce, Grad.Dip., M.HSc., O&M
International Journal of Orientation & Mobility, Volume 3 , ISSUE 1, 36–40
Article | 30-November-2020
effects even cause instability. Therefore, in recent years, the network control system design and analysis has aroused widespread concern in both academia and industry. Literature [2] proposed a new method to improve the network latency problem. First, feedback information of the server sends the client is no longer the traditional image information while status information with the robot movement, contained less byte code. Secondly, on the server side, we set reasonable threshold for the parameters
Xu Shuping,
Wu Jinfe,
Su Xiaohui,
Xiong Xiaodun
International Journal of Advanced Network, Monitoring and Controls, Volume 6 , ISSUE 1, 1–10
Article | 06-July-2017
Wioletta Grzenda
Statistics in Transition New Series, Volume 17 , ISSUE 4, 763–780
Article | 08-April-2018
Xu Shuping,
Chen Yiwei,
Cheng Xinhua,
Su Xiaohui
International Journal of Advanced Network, Monitoring and Controls, Volume 2 , ISSUE 1, 38–48
research-article | 30-November-2017
which pollutants introduced into the aquatic environment are accumulated [1, 2].
The chemical composition of the matter lying on the bottom of water reservoirs is conditioned by both natural and anthropogenic factors. An important role is played, among others, by the geological structure of the basin, the type of soil cover, terrain and climatic conditions. Additionally, the chemical analysis of bottom sediments is a source of information on human activity in a given region [3]. The most frequently
Katarzyna ROZPONDEK,
Rafał ROZPONDEK
Architecture, Civil Engineering, Environment, Volume 11 , ISSUE 2, 141–147
Article | 06-July-2017
Daniel Hernandez-Stumpfhauser,
F. Jay Breidt,
Jean D. Opsomer
Statistics in Transition New Series, Volume 17 , ISSUE 1, 91–104
Sampling Methods | 20-November-2017
RANJITA PANDEY,
KALPANA YADAV
Statistics in Transition New Series, Volume 18 , ISSUE 3, 375–392
Article | 01-April-2018
In order to implement the integration of the tool libraries from CATIA and the tool database, CATIA software was further developed using CAA. CAA macro-based integration project about the two libraries is proposed, and the development process is presented. In CAA environment provided by CATIA, though further developed using CAA, calling for information, converting information and valuating information of CATIA and TOOLMANAGER were researched. Finally, the dynamic calling, association and
Li Yihui
International Journal of Advanced Network, Monitoring and Controls, Volume 1 , ISSUE 1, –
Article | 01-December-2012
He-Bing Hu,
Hong-Yu Liu,
Jing-Feng Hao,
Jing An
International Journal on Smart Sensing and Intelligent Systems, Volume 5 , ISSUE 4, 811–823
Research Article | 20-December-2018
Findings are presented from two major research projects investigating impacts of climate change in rural South Australia. One focuses specifically on farmers’ responses to periods of pronounced heat and drought on both Eyre and Yorke Peninsulas. The second looks more broadly at how rural communities across the State respond to spells of extremely high temperatures. In both cases, the primary data source is semi-structured interviews with key informants who provided information on their
Guy M. Robinson
South Australian Geographical Journal, Volume 114 , ISSUE 1, 43–58
Article | 27-May-2019
Danny Pfeffermann,
Dano Ben-Hur,
Olivia Blum
Statistics in Transition New Series, Volume 20 , ISSUE 1, 7–19
Article | 15-March-2021
Joseph M. POGODZINSKI,
John S. NILES
Transport Problems, Volume 16 , ISSUE 1, 211–221
Research Article | 15-February-2020
J. Sneddon,
A. Mason
International Journal on Smart Sensing and Intelligent Systems, Volume 7 , ISSUE 5, 1–4
Research Article | 13-December-2017
A simple but dependable electronic device, Con-Dis, has been developed to gain reliable information on elderly persons’ perceptions of their well-being. The device has been tested and proven to be technically functional and dependable. It was tested in two care homes for the elderly and two private homes to evaluate whether it provided reliable information about the service quality. This report illustrates the practical usage of the device and shows its efficiency in gathering reliable service
Jori Reijula,
Toni Rosendahl,
Kari Reijula,
Paula Roilas,
Heikki Roilas,
Raimo Sepponen
International Journal on Smart Sensing and Intelligent Systems, Volume 3 , ISSUE 1, 14–26
Research Article | 13-December-2017
The approach of human-based sensing is based on the assumption that sensor systems for individual use have optimal performance if coherent with the human perception system. The benefits of complementing the human sensing with sensor systems that strengthen the information and make the human able to perform more adequate and optimized decisions based on the sensor information, will improve the human capability. The arguments for designing sensor systems that increase the human ability in order
Peter Wide
International Journal on Smart Sensing and Intelligent Systems, Volume 1 , ISSUE 1, 57–69
Article | 01-March-2016
to improve target tracking performance in dynamic target track system, this paper propose the processing method of positive and negative difference image to extract target information; research target image preprocessing algorithm, the separation and segmentation processing algorithm of target and background, target edge detection and extraction based on the collected images; use Laplace operator, Canny operator. Gauss-Laplace operator to gain target information and improved recognition target
Liping Lu,
Jinfang Wang
International Journal on Smart Sensing and Intelligent Systems, Volume 9 , ISSUE 1, 353–376
Article | 30-November-2019
task of the current power industry. After the completion of the power grid transformation, the power supply enterprises need to draw and archive the power line diagram, which is usually drawn semi-manually by AutoCAD. However, AutoCAD requires professionals to use different drawing tools to draw on the software when drawing, and if it is necessary to change the position of a pole or change the information of a power line, it needs to be redrawn. Therefore, this kind of design method’s shortcoming
Sun Pengzhan,
Lei Juchao
International Journal of Advanced Network, Monitoring and Controls, Volume 5 , ISSUE 2, 71–75
research-article | 30-November-2019
in full swing, but the task of privacy protection remains.
Machine learning technology has been actively introduced in big data processing, and applied in many applications where mechanical data mining is difficult. However, privacy concerns are raised in applications that extract information through deep learning (Tanuwidjaja et al., 2019). Privacy protection is essential as the application of deep learning is expanded from medical applications that process sensitive information such as patient
Im Y. Jung
International Journal on Smart Sensing and Intelligent Systems, Volume 13 , ISSUE 1, 1–13
Article | 01-June-2015
Steganography refers to the technique of concealing secret information into another cover-media, such as audio, video, image and text in such a manner that the very existence of the information is camouflaged while secret is kept from the knowing of attacker. Watermarking is closely related to Stenography except that it hides information in cover object. Watermarking usually serves the purpose of copyright protection and ownership authentication, for example, watermarking can hide a stego-image
Hamdan Lateef Jaheel,
Zou Beiji,
Ahmed Lteef Jaheel
International Journal on Smart Sensing and Intelligent Systems, Volume 8 , ISSUE 2, 1011–1030
research-article | 30-November-2020
I.
THE INTRODUCTION
With the rapid development of information technology in today’s society, people’s demand for information is also greatly increased. The society has gradually become a collection of information, and in this collection of information there are various data. The data is a form of information. In most cases, these data are hidden in the network, and these data are complex and diverse. It is very difficult to extract these complex data from the network by using our traditional
Hejing Wu,
Ran Cui
International Journal of Advanced Network, Monitoring and Controls, Volume 6 , ISSUE 2, 37–47
Article | 30-November-2018
I.
INTRODUCTION
Data flow processing is a very important and active area in modern database technology. CEP technology[1] has become the study focus of such field since its inception as it is capable of integrating the information from the numerous data source distributed and digging the valuable dynamic meaning among the information from the high-speed data flow in real time. CEP technology is thoroughly changing the way of subscription & distribution and application data of the traditional
Bo Hong,
Xin Jing
International Journal of Advanced Network, Monitoring and Controls, Volume 3 , ISSUE 3, 77–84
Article | 01-December-2016
This paper proposed an image fusion method based on a novel scheme with joint nonsubsampled contourlet and overcomplete brushlet transform. And an improved region energy operator is employed as the fusion strategy, which can take full advantage of the anisotropic texture information and multidimensional singular information in the new multiresolution domain. Experimental results shows that the proposed method improved the fusion results not only in visual effects but also in objective
Zhang Pai
International Journal on Smart Sensing and Intelligent Systems, Volume 9 , ISSUE 4, 2186–2203
Article | 01-June-2015
Due to the different imaging mechanism of optical image and Synthetic Aperture Radar (SAR) image, they have the large different characteristics between the images, so fusing optical image and SAR image with image fusion technology could complement advantages and be able to better interpret the scenes information. A fusion algorithm of Synthetic Aperture Radar and optical image with fast sparse representation on low-frequency images was proposed. For the disadvantage of target information easily
Yin Zhouping
International Journal on Smart Sensing and Intelligent Systems, Volume 8 , ISSUE 2, 1123–1141
research-article | 30-November-2017
of reference for those events is the space and relations existing within it. The means of describing that space have been developed. The most important measure of articulating space is the modern form of a map – the Geographic Information System (GIS) [3]. The problem lies in the fact that vehicle traffic zones are commonly adjacent to pedestrian zones, and even when there is no such proximity, a threat of vehicle-ramming attack is still present. The following questions concerning the relations
Anna ECKES
Architecture, Civil Engineering, Environment, Volume 11 , ISSUE 2, 7–12
Article | 15-March-2019
G. N. Singh,
Amod Kumar,
Gajendra K. Vishwakarma
Statistics in Transition New Series, Volume 19 , ISSUE 4, 575–596
Article | 01-December-2016
This paper uses the combination of information and class separability as a new evaluation criterion for hyperspectral imagery. Moreover, the correlation between bands is used as a constraint condition. The differential evolution algorithm is adopted during the search of optimal band combination. In addition, the game theory is introduced into the band selection to coordinate the potential conflict of searching the optimal band combination using information and class separability these two
Aiye Shi,
Hongmin Gao,
Zhenyu He,
Min Li,
Lizhong Xu
International Journal on Smart Sensing and Intelligent Systems, Volume 9 , ISSUE 4, 1971–1990
Article | 01-April-2020
Anti-hrB and anti-HrB are rare alloantibodies found predominantly in people of BlackAfrican descent. It has been assumed that strongly reacting examples of anti-hrB may cause hemolytic transfusion reactions,but precise information is limited. Anti-HrB is a clinically significant antibody and may cause hemolytic transfusion reactions and HDN. Selection of blood for transfusion support for patients with these alloantibodies, and especially with anti-HrB, imposes a special challenge in the United
Nay Win,
Malcolm Needs,
Louise Tillyer
Immunohematology, Volume 23 , ISSUE 4, 143–145
research-article | 05-February-2021
., 2018). As a result of unreliable information, people who deliver selective incentives may confuse cooperators and defectors, or ostracize the former and invite the latter in. The challenge is, therefore, to establish accurate reputations, on the basis of which indirect reciprocity can become an effective mechanism. The challenge is more severe in larger groups were most people do not know one another directly (Sommerfeld et al., 2007). In contrast to smaller groups, in which people are more likely
Jeroen Bruggeman,
Rense Corten
Connections, Volume 41 , ISSUE 1, 1–6
Article | 06-July-2017
Housila P. Singh,
Surya K. Pal
Statistics in Transition New Series, Volume 17 , ISSUE 4, 605–630
Article | 10-April-2018
The amount of information on the Internet is getting larger and larger, and the energy of the consumer and the ability to deal with information is limited. Electricity supplier enterprises in the development process to do are to use big data for personalized shopping guide. This paper analyzes the situation of the development of e-commerce industry in the background of big data, and puts forward the improvement method. The paper presents novel model of e-commerce marketing based on big data
Hongsheng Xu,
Ke Li,
Ganglong Fan
International Journal of Advanced Network, Monitoring and Controls, Volume 2 , ISSUE 3, 40–44
research-article | 13-July-2021
Figure 9 above can also be checked in three dimensions using the Point Comparison method demonstrated in Figure 4, allowing determination of the actual displacement.
Digital models can be sliced into planes (Figure 7) to generate a two-dimensional (2D) heat map of a tooth or teeth at that slice location (Figure 8). This allows a rapid visual assessment of the displacement of a point on the measured model from the reference model in 2D. Additional information can be accessed by clicking on a
Tony Weir
Australasian Orthodontic Journal, Volume 37 , ISSUE 1, 100–108
Article | 01-June-2016
The intrinsic contradiction hidden in the Internet of things, which is the mismatching between the diversification of forms expressing the thing’s information and the insufficiency of understanding ability of the agents using the thing’s information, hinders its intelligent development. Adding a semantic annotation for the expression of thing’s information based on ontology will improve the ability to understand, to reason and to obtain information for the agents, and will essentially promote
X. Y. Chen,
G. Y. Li
International Journal on Smart Sensing and Intelligent Systems, Volume 9 , ISSUE 2, 997–1028
Research Communicate | 20-November-2017
The article contains some theoretical remarks about selected models of position parameters estimation as well as numerical examples of the problem. We ask a question concerning the existence of possible measures of the quality of interval estimation and we mention some popular measures applied to the task. Point estimation is insufficient in practical problems and it is rather interval estimation that is in wide use. Too wide interval suggests that the information available is not sufficient to
Czesław Domański
Statistics in Transition New Series, Volume 18 , ISSUE 3, 549–558
Article | 24-April-2018
Big data technology refers to the rapid acquisition of valuable information from various types of large amounts of data. It can be divided into 8 technologies: data acquisition, data access, infrastructure, data processing, statistical analysis, data mining, model prediction and results presentation. The paper presents improved statistical analysis method based on big data technology. A statistical analysis model in big data environment is designed to extract useful information features from
Hongsheng Xu,
Ganglong Fan,
Ke Li
International Journal of Advanced Network, Monitoring and Controls, Volume 2 , ISSUE 4, 26–30
Article | 07-April-2018
evidence combination. The examples results show that the algorithm has strong versatility and stability in the evidences combination, can be applied to information fusion, uncertain information decision-making and other fields.
Yongchao Wei
International Journal of Advanced Network, Monitoring and Controls, Volume 2 , ISSUE 1, 65–71
Article | 30-November-2018
completely eliminated, the patient data security can still be effectively protected in the presence of the above security management vulnerability.
II.
DESIGN OF INFORMATION SECURITY SCHEME FOR REMOTE ECG SYSTEM
The key protocol developed in this paper contains mechanisms for key generation, storage, deployment, and verification. This scheme takes into account various attacks such as brute force cracking by attackers and interception of network communication packets.
A.
Hardware risk control scheme
Liu Xin,
Wei Zhiqiang
International Journal of Advanced Network, Monitoring and Controls, Volume 3 , ISSUE 4, 31–34
Research Article | 21-April-2017
Proposed model of technical vision system use for supplementation and clarifying information about surround objects classes and distances, received by driver.
Anatoliy KULIK,
Kostiantyn DERGACHOV,
Oleksandr RADOMSKYI
Transport Problems, Volume 10 , ISSUE 1, 55–62
Article | 24-August-2017
important reasons are weighting for unequal probability of selection, compensation for nonresponse, and post-stratification. Many highly efficient estimation methods in survey sampling require strong information about auxiliary variables, x. The most common estimation methods using auxiliary information in estimation stage are regression and ratio estimator. This paper proposes a sequential data weighting procedure for the estimators of combined ratio mean in complex sample surveys and general variance
Aylin Alkaya,
H. Öztaş Ayhan,
Alptekin Esin
Statistics in Transition New Series, Volume 18 , ISSUE 2, 247–270
Research Article | 01-September-2017
Most data sources in real-life are not static but change their information in time. This evolution of data in time can give valuable insights to business analysts. Temporal data refers to data, where changes over time or temporal aspects play a central role. Temporal data denotes the evaluation of object characteristics over time. One of the main unresolved problems that arise during the data mining process is treating data that contains temporal information. Temporal queries on time evolving
Mastan Vali Shaik,
P Sujatha
International Journal on Smart Sensing and Intelligent Systems, Volume 10 , ISSUE 5, 495–505
Article | 01-March-2015
With the development of information technology, the rapid development of microelectronics technology, image information acquisition and use is also increasing, sensor technology also unceasingly to reform. A single sensor information obtained is limited, often can not meet the actual needs, in addition, different sensors have the advantage of the imaging principle and its unique, as in color, shape characteristics, band access, spatial resolution from the aspects of all have their own
Zhang Ning,
Zhu Jinfu
International Journal on Smart Sensing and Intelligent Systems, Volume 8 , ISSUE 1, 480–496
Article | 01-March-2015
Human facial expressions detection plays a central role in pervasive health care and it is an active research field in computer vision. In this paper, a novel method for facial expression detection from dynamic facial images is proposed, which includes two stages of feature extraction and facial expression detection. Firstly, Active Shape Model (ASM) is used to extract the local texture feature, and optical flow technique is determined facial velocity information, which is used to characterize
Shaoping Zhu,
Yongliang Xiao
International Journal on Smart Sensing and Intelligent Systems, Volume 8 , ISSUE 1, 581–601
Article | 01-June-2016
With the development of the times, in the wireless sensor networks, the increasing amount of information transmission requires more advanced transmission protocols. Especially accompanied by the arrival of the era of Big Data, the conflicts between traditional transport agreement and the sudden or large amount of data are increasingly prominent. The discrete time three-dimensional probability CSMA protocol with multichannel mechanism proposed solves these problems pretty well. By the new MAC
Yifan Zhao,
Shengjie Zhou,
Hongwei Ding,
Zhijun Yang,
Qianlin Liu
International Journal on Smart Sensing and Intelligent Systems, Volume 9 , ISSUE 2, 845–863
Article | 01-December-2016
Aiming at the problem of automatic identification and evaluation of road damage degree, the road damage identification and degree assessment algorithms based on unmanned vehicles experimental platform are studied. The road crack segmentation extraction method based on adaptive sliding window is studied. On this basis, the road damage crack classifies and identifies according to the crack geometry information and the principle of template matching. The road damage degree assessment algorithm
J. H. Song,
H. W. Gao,
Y. J. Liu,
Y. Yu
International Journal on Smart Sensing and Intelligent Systems, Volume 9 , ISSUE 4, 2069–2087
Review | 16-October-2019
This article reviews information regarding the clinical significance of antibodies to antigens in the blood group collections, the 700 series of low-incidence antigens, and the 901 series of high-incidence antigens. Antibodies to many of the antigens in these groups are rarely encountered, meaning that available information is limited. For a few, the clinical significance— the potential to cause reduced survival of transfused antigen-positive red blood cells, a hemolytic transfusion
Christine Lomas-Francis
Immunohematology, Volume 34 , ISSUE 2, 39–45
research-article | 31-October-2020
can be variable. Thus, easy-to-use tools designed to facilitate the assessment of children referred to mental health clinics prior to their clinical visit can be very useful aids for the assessment and management of children with mental health problems in clinical practice.
One such tool is the Child Behavior Checklist (CBCL) (11), an easy-to-use, empirically derived, low-cost dimensional assessment tool of psychopathology that is completed by the parent and provides useful information on broad
Joseph Biederman,
Maura DiSalvo,
Carrie Vaudreuil,
Janet Wozniak,
Mai Uchida,
K. Yvonne Woodworth,
Allison Green,
Stephen V. Faraone
Scandinavian Journal of Child and Adolescent Psychiatry and Psychology, Volume 8 , 157–165
Article | 16-April-2018
This article presents the results of a questionnaire about daily living, and particular opinions about guide dogs by Japanese people with vision impairment who are not guide dog users. Reasons for respondents not applying for guide dogs are provided, and suggestions are made to improve the services by Japanese Guide Dog Associations. Overall, the majority of respondents were aware of the functions of guide dogs, however information about financial assistance and support services were unknown
Naoko Koda, Ph.D.,
Nae Morioka, B.S.A.,
Masumi Kubo, B.S.W.,
Takafumi Wada,
Akira Yoshikawa,
Hirofumi Nakamura,
Rinka Shinoda
International Journal of Orientation & Mobility, Volume 4 , ISSUE 1, 21–31
Article | 16-April-2018
This pilot study conducted between January 2010 and December 2014, investigated whether or not a structured peer support program would benefit people with vision impairment. The program was designed to provide support and information to clients over the telephone about mobility and vision conditions. Fourteen volunteers with vision impairment who provided the telephone support were matched with 71 clients with vision impairment. On completion of each client’s support program an evaluation
Karen Stitt, B.SoSci., Masters Counselling
International Journal of Orientation & Mobility, Volume 8 , ISSUE 1, 119–126