Arama Sonuçları

Listeleniyor 1 - 4 / 4
  • Yayın
    An interoperability infrastructure for distributed feed networks
    (2007) Wild, Fridolin; Siguroarson, Steinn E.; Sobernig, Stefan; Stahl, Christina; Soylu, Ahmet; Rebas, Vahur; Gárka, Dariusz; Danielewska-Tułecka, Anna; Tapiador, Antonio
    Blogs have the affordance to become an integral part of teaching and learning processes as a vehicle for knowledge management. Open, flexible systems integrating blogs provide user-friendly, personalised microlearning environments while ensuring ubiquitous access. This paper concentrates on blog interoperability in an open space for learning and collaboration. As blogging is one of the most popular web-based forms of publishing today, there is a plethora of different blogging tools, feed readers, and aggregators, enabling information dissemination, filtering, and retrieval. Several different data structure and interaction standards emerged which make integration a real challenge. This paper aims at creating distributed microlearning environments basing on networks of integrated blogs, discusses problems of such an integration along with possible solutions, and proposes an architecture for loosely-coupled blog integration. The core of this infrastructure consists of a service interface for feed management that allows learners as well as facilitators to automatically set up channel structures for feed syndication, while effectively reducing the management efforts thereof through proper system support.
  • Yayın
    A novel biometric authentication approach using electrocardiogram signals
    (IEEE, 2013) Gürkan, Hakan; Güz, Ümit; Yarman, Bekir Sıddık Binboğa
    In this work, we present a novel biometric authentication approach based on combination of AC/DCT features, MFCC features, and QRS beat information of the ECG signals. The proposed approach is tested on a subset of 30 subjects selected from the PTB database. This subset consists of 13 healthy and 17 non-healthy subjects who have two ECG records. The proposed biometric authentication approach achieves average frame recognition rate of %97.31 on the selected subset. Our experimental results imply that the frame recognition rate of the proposed authentication approach is better than that of ACDCT and MFCC based biometric authentication systems, individually.
  • Yayın
    A novel human identification system based on electrocardiogram features
    (IEEE, 2013) Gürkan, Hakan; Güz, Ümit; Yarman, Bekir Sıddık Binboğa
    In this work, we present a novel biometric authentication approach based on combination of AC/DCT features, MFCC features, and QRS beat information of the ECG signals. The proposed approach is tested on a subset of 30 subjects selected from the PTB database. This subset consists of 13 healthy and 17 non-healthy subjects who have two ECG records. The proposed biometric authentication approach achieves average frame recognition rate of %97.31 on the selected subset. Our experimental results imply that the frame recognition rate of the proposed authentication approach is better than that of ACDCT and MFCC based biometric authentication systems, individually.
  • Yayın
    Quarantine region scheme to mitigate spam attacks in wireless sensor networks
    (IEEE, 2006-08) Coşkun, Vedat; Çayırcı, Erdal; Levi, Albert; Sancak, Serdar
    The Quarantine Region Scheme (QRS) is introduced to defend against spam attacks in wireless sensor networks where malicious antinodes frequently generate dummy spam messages to be relayed toward the sink. The aim of the attacker is the exhaustion of the sensor node batteries and the extra delay caused by processing the spam messages. Network-wide message authentication may solve this problem with a cost of cryptographic operations to be performed over all messages. QRS is designed to reduce this cost by applying authentication only whenever and wherever necessary. In QRS, the nodes that detect a nearby spam attack assume themselves to be in a quarantine region. This detection is performed by intermittent authentication checks. Once quarantined, a node continuously applies authentication measures until the spam attack ceases. In the QRS scheme, there is a trade-off between the resilience against spam attacks and the number of authentications. Our experiments show that, in the worst-case scenario that we considered, a not quarantined node catches 80 percent of the spam messages by authenticating only 50 percent of all messages that it processes.