Search results for "computer.software_genre"
showing 10 items of 3858 documents
CORMORANT
2019
People own and carry an increasing number of ubiquitous mobile devices, such as smartphones, tablets, and notebooks. Being small and mobile, those devices have a high propensity to become lost or stolen. Since mobile devices provide access to their owners' digital lives, strong authentication is vital to protect sensitive information and services against unauthorized access. However, at least one in three devices is unprotected, with inconvenience of traditional authentication being the paramount reason. We present the concept of CORMORANT, an approach to significantly reduce the manual burden of mobile user verification through risk-aware, multi-modal biometric, cross-device authentication…
Secure integration of multiprotocol instant messenger
2017
Pidgin communicator is a multiprotocol instant messenger client, developed by open source community. It was originally a third party client of AIM (AOL Instant Messenger) protocol for Linux operating system founded in 1998. At present, its main goal is to provide common interface for every protocol it supports, so the user does not need care about protocol to use or peer's IM identifier, while he just want to talk with a Bob. The work focuses mainly on security and functionality aspects like password storage strategies, integration with plugins which provide privacy of communication. This paper shares experiences has been gained during the process of developing and replacement of existing c…
A secure architecture for P2PSIP-based communication systems
2009
Today, Peer-to-Peer SIP based communication systems have attracted much attention from both academia and industry. The decentralized nature of P2P might provide the distributed peer-to-peer communication system without help of the traditional SIP server. However, it comes to the cost of reduced manageability and therefore causes security problems, e.g. distrust, privacy leaks, unpredictable availability, etc. In this paper, we investigate on P2PSIP security issues and propose a proxy-based system architecture that improves security during P2PSIP session initiation. The main issues considered in this architecture include Source inter-working, Encryption & Decryption, Policy Management, Desti…
Global vegetation monitoring through multitemporal analysis of pathfinder AVHRR land database
2005
We have applied a Land Surface Temperature algorithm to the whole Pathfinder AVHRR Land (PAL) database, aiming at studying the evolution of the vegetation at a global scale. The Land Surface Temperature parameter, along with NDVI, will allow retrieving vegetation changes between July 1981 and September 2001. We have also built a classification which takes into account both vegetation variations and thermal patterns, from NDVI and Air Temperature at 2 meters height data. This classification allows differentiating areas which present close vegetation changes throughout the year, but totally different climates, as for example in mountainous and semiarid regions. The main quality of this classi…
An optimal code for patient identifiers.
2004
How to distinguish 1 billion individuals by an identifier consisting of eight characters, allowing a reasonable amount of error detection or even error correction? Our solution of this problem is an optimal code over a 32-character alphabet that detects up to two errors and corrects one error as well as a transposition of two adjacent characters. The corresponding encoding and error checking algorithms are available for free; they are also embedded as components of the pseudonymisation service that is used in the TMF-the German telematics platform for health research networks.
Bagging, bumping, multiview, and active learning for record linkage with empirical results on patient identity data
2011
Record linkage or deduplication deals with the detection and deletion of duplicates in and across files. For this task, this paper introduces and evaluates two new machine-learning methods (bumping and multiview) together with bagging, a tree-based ensemble-approach. Whereas bumping represents a tree-based approach as well, multiview is based on the combination of different methods and the semi-supervised learning principle. After providing a theoretical background of the methods, initial empirical results on patient identity data are given. In the empirical evaluation, we calibrate the methods on three different kinds of training data. The results show that the smallest training data set, …
An Augmented Reality System for Treating Psychological Disorders: Application to Phobia to Cockroaches
2005
Augmented reality has been used in many fields, but it has not been used to treat psychological disorders. Augmented reality presents several advantages respect to: the traditional treatment of psychological disorders and virtual reality treatments. In this paper we present the first augmented reality system for the treatment of phobia to cockroaches. Our system has been developed using ARToolkit software. It has been tested with one patient and the results have been very satisfactory. At first of the exposure session the patient was not able to approach to a real cockroach and after the exposure session using our augmented reality system, the patient was able to approach to a real cockroac…
On the Construction of Optimum Categories in Biomedical Data Recognition Problems
1979
The recognition of patterns within sets of biomedical data involves the following problems: a) Proper recording of the data to be used b) Extraction of suitable features c) Choice of categories or classes which are relevant to the medical decision task d) Estimation of the underlying distributions in the case of using parametric methods e) Choice of an adequate classification rule Whereas a lot of theories and procedures exists for most of these steps — particularly in the field of computer-aided differential diagnosis of electrocardiograms (ECG) (see [6]) — there has been only rare considerations on the problems of definition of appropriate categories.
Peer assessment based assignment to enhance interactions in online learning groups
2015
In this paper, we report on the findings from our PhD work on how peer assessment based assignment method can enhance interaction in online learning groups. The method is explored and tried out on the research methods course on the Bachelor of Commerce Programme which is run in distance learning mode at Makerere University. Based on the idea that learning groups can enhance effective learning in online learning environments, we used the affordance eLearning framework to design the peer assessment based assignment task and then qualitative methods collect and report on data. The results reveal that there was increased interaction through peer feedback. Students were motivated because of the …
Adaptive formative feedback to improve strategic search decisions in task-oriented reading
2014
This study analyses the effectiveness of adaptive formative feedback to boost strategic search decisions and performance when students are asked to answer a set of questions in a task-oriented reading situation. We compared automatic feedback that included information about the right answer with feedback that also included the connection between the students' strategic search decisions and their performance. Ninety-two high school students read two non-continuous texts. They received feedback during a training phase, and then they read and also received feedback with a similar text in a final phase. Text and questions were presented using a new computer-based technology that provided automa…