Informatics

Learning criteria weights of an optimistic Electre Tri sorting rule
Multiple criteria sorting methods assign alternatives to predefined ordered categories taking multiple criteria into consideration. The Electre Tri method compares alternatives to several profiles separating the categories. Based on such comparisons, each alternative is assigned to the lowest (resp. highest) category for which it is at least as good as the lower profile (resp. is strictly prefe...


Motion-energy-based unequal error protection for H.264/AVC video bitstreams
An unequal error protection (UEP) technique based on motion information of video bitstreams compressed by H.264/AVC standard is proposed. Motion activities of macroblocks in a frame are analyzed, and those having high effects on the video performance are extracted. Suitable forward error-correcting codes with different rates are constructed according to the importance of macroblocks and frames....
Image feature extraction for classification of aggressive interactions among pigs
The aim of this study is to develop a method for continuous automated detection of aggressive behaviour among pigs by means of image processing. Five repetitions of the same experiment were performed. In each of the experiment, 24 piglets were mixed after weaning from four litters in two pens with 12 piglets each and captured on video for a total of 60h. From these video recordings, a dataset c...


Automatic knot segmentation in CT images of wet softwood logs using a tangential approach
Computed Tomography (CT) is more and more used in forestry science and wood industry to explore internal tree stem structure in a non-destructive way. Automatic knot detection and segmentation in the presence of wet areas like sapwood for softwood species is a recurrent problem in the literature. This article describes an algorithm named TEKA able to segment knots even into sapwood and other we...
De-anonymization attack on geolocated data
With the advent of GPS-equipped devices, a massive amount of location data is being collected, raising the issue of the privacy risks incurred by the individuals whose movements are recorded. In this work, we focus on a specific inference attack called the de-anonymization attack, by which an adversary tries to infer the identity of a particular individual behind a set of mobility traces. More ...


Efficient Kriging-Based Robust Optimization of Unconstrained Problems
A novel methodology, based on Kriging and expected improvement, is proposed for applying robust optimization on unconstrained problems affected by implementation error. a modified expected improvement measure which reflects the need for robust instead of nominal optimization is used to provide new sampling point locations. a new sample is added at each iteration by finding the location at which...
Real-time simulation of temperature in hot rolling rolls
Model-based process control is widely used in metal working. Often, simplified real-time capable numerical models replace or support measurement. In this work, we investigate the simulation of temperature in hot rolling rolls based on a 3-D model of a roll which is fast enough to act as soft sensor during operation. The involved discretization of the heat equation in cylindrical space is done v...

Guilt-based Handling of Software Performance Antipatterns inPalladio Architectural Models
Antipatterns are conceptually similar to patterns in that they document recurring solutions to common design problems. Software Performance Antipatterns document common performance problems in the design as well as their solutions. The definition of performance antipatterns concerns software properties that can include static, dynamic, and deployment aspects. To make use of such knowledge, we p...
Economy Driven Content Dissemination in Delay Tolerant Networks
Majority of the existing Delay Tolerant Network (DTN) routing protocols attempt to minimize the message delay, forwarding count, or required storage. However, for many DTN applications such as distributing commercial content, targeting the best performance for only one index and neglecting the others is insufficient. A more practical solution would be to strike a balance between multiple of tho...

Comparison of optimization algorithms in the sensor selection for predictive target tracking
This paper addresses the selection of sensors for target localization and tracking under nonlinear and nongaussian dynamic conditions. We have used the Posterior Cramér-Rao lower Bound (PCRB) as the performance-based optimization criteria because of its built-in capability to produce online estimation performance predictions, a “must” for high maneuverable targets or when slow-response sen...
AODV_RR: A Maximum Transmission Range Based Ad Hoc on-Demand Distance Vector Routing in MANET
Nodes in a mobile ad hoc network are battery constrained devices and energy efficiency becomes an important consideration. In a multi-hop mobile ad hoc network the most common method to achieve energy efficiency is the transmission power control scheme in which a node transmits the data packets to its nearest neighbor which is at minimum required power level. However this scheme minimizes only ...

A Novel Analytical Modeling of Composite Cognitive Capability with an Overlay Sensing Approach
Cognitive radios are promising solutions to the problem of overcrowded spectrum. The cognitive capability is the key technology that enables the secondary users to use licensed spectrum in a dynamic manner that the spectrum of the primary users are as unaffected as possible. But the metrics for composite cognitive capability are required in time in order to capture the temporal, spectral, and s...
Dual-Band Antenna Fed with CPW Technology Using Modified Mirrored L-Shaped Conductor-Back Plane
This paper describes a novel configuration of a CPW-fed printed monopole antenna that depicts dual-band operations of WLAN and X-bands. The proposed antenna consists of a simple rectangular-shaped patch as the main radiator, the modified mirrored L-shaped conductor back plane element, and the partial rectangular CPW-ground surface. Dual-band performances can be obtained by embedding and adjusti...
On Evaluating the Performance Impact of the IEEE 802.15.4 Security Sub-layer
Nowadays, wireless sensor networks (WSNs) are used in a wide range of application scenarios ranging from structural monitoring to health-care, from surveillance to industrial automation. Most of these applications require forms of secure communication. On the other hand, security has a cost in terms of reduced performance. In this paper we refer to the IEEE 802.15.4 standard and investigate the...
Acoustic and lexical representations for affect prediction in spontaneous conversations
In this article we investigate what representations of acoustics and word usage are most suitable for predicting dimensions of affect—arousal, valance, power and expectancy—in spontaneous interactions. Our experiments are based on the AVEC 2012 challenge dataset. For lexical representations, we compare corpus-independent features based on psychological word norms of emotional dimensions, as...