Now showing items 1-10 of 253
Towards Automatic Detection of Child Pornography
This paper presents a child pornographic image detection system that identifies human skin tones in digital images, extracts features to detect explicit images and performs facial image based age classification. The novelty ...
Demonstration of Individual Readout of Serially-Connected Superconducting Strip Line Detectors
We report successful demonstration of individual readout of the response to an optical signal in serially-connected superconducting strip line detectors (SSLDs). Based on the numerical analysis, placement of low-pass filters ...
A Multi-Agent System Model for Partner Selection Process in Virtual Enterprise
(ELSEVIER Science BV, 2014)
Virtual Enterprise (VE) is a collaboration model between multiple business partners in a value chain. VE information system deals with highly dynamic information from heterogeneous data sources. In order to manage and store ...
User-Specific Skin Temperature-Aware DVFS for Smartphones
Skin temperature of mobile devices intimately affects the user experience. Power management schemes built into smartphones can lead to quickly crossing a user's threshold of tolerable skin temperature. Furthermore, there ...
k-means Performance Improvements with Centroid Calculation Heuristics both for Serial and Parallel environments
k-means is the most widely used clustering algorithm due to its fairly straightforward implementations in various problems. Meanwhile, when the number of clusters increase, the number of iterations also tend to slightly ...
Implicit location sharing detection in social media turkish text messaging
(Springer Verlag, 2016)
Social media have become a significant venue for information sharing of live updates. Users of social media are producing and sharing large amount of personal data as a part of the live updates. A significant share of this ...
Trusted3Ballot: Improving Security and Usability of ThreeBallot Voting System using Trusted Computing
The main goal in the design of ThreeBallot system was to provide an end-to-end auditable voting system in a simple way without use of cryptography to bolster voter confidence in the system. However, later it was shown that ...
Nonlinear Approximation: q-Bernstein Operators of Max-Product Kind
(Springer Verlag, 2016)
In this paper, we construct a certain family of nonlinear operators in order to approximate a function by these nonlinear operators. For construction, we use the linear q-Bernstein polynomials and also the max-product algebra.
Convex Hull for Probabilistic Points
We analyze the correctness of an O(n log n) time divide-and-conquer algorithm for the convex hull problem when each input point is a location determined by a normal distribution. We show that the algorithm finds the convex ...
Estimating the Parameters of the Generalized Lambda Distribution: Which Method Performs Best?
(Taylor & Francis Inc, 2016)
Generalized lambda distribution (GLD) is a flexible distribution that can represent a wide variety of distributional shapes. This property of the GLD has made it very popular in simulation input modeling in recent years, ...