scholarly journals Temporal Patterns for Document Verification

10.29007/dclv ◽  
2018 ◽  
Author(s):  
Mirjana Jaksic ◽  
Burkhard Freitag

In this paper we present a novel user-friendly high-level approach to the specification of temporal properties of web documents which can be used for verification purposes. The method described is based on specification patterns supporting an incremental construction of commonly used consistency criteria. We show that our approach fills the gap between a temporal logic such as CTL as a powerful tool for specifying consistency criteria for web documents and users that maintain documents but have no or very limited knowledge about the specification formalism. An empiric assessment of the usability of specification patterns for web documents confirms that a pattern based specification shows significantly better results than the direct specification with CTL.

Author(s):  
Mark O Sullivan ◽  
Carl T Woods ◽  
James Vaughan ◽  
Keith Davids

As it is appreciated that learning is a non-linear process – implying that coaching methodologies in sport should be accommodative – it is reasonable to suggest that player development pathways should also account for this non-linearity. A constraints-led approach (CLA), predicated on the theory of ecological dynamics, has been suggested as a viable framework for capturing the non-linearity of learning, development and performance in sport. The CLA articulates how skills emerge through the interaction of different constraints (task-environment-performer). However, despite its well-established theoretical roots, there are challenges to implementing it in practice. Accordingly, to help practitioners navigate such challenges, this paper proposes a user-friendly framework that demonstrates the benefits of a CLA. Specifically, to conceptualize the non-linear and individualized nature of learning, and how it can inform player development, we apply Adolph’s notion of learning IN development to explain the fundamental ideas of a CLA. We then exemplify a learning IN development framework, based on a CLA, brought to life in a high-level youth football organization. We contend that this framework can provide a novel approach for presenting the key ideas of a CLA and its powerful pedagogic concepts to practitioners at all levels, informing coach education programs, player development frameworks and learning environment designs in sport.


2018 ◽  
Author(s):  
D. Kuhner ◽  
L.D.J. Fiederer ◽  
J. Aldinger ◽  
F. Burget ◽  
M. Völker ◽  
...  

AbstractAs autonomous service robots become more affordable and thus available for the general public, there is a growing need for user-friendly interfaces to control these systems. Control interfaces typically get more complicated with increasing complexity of the robotic tasks and the environment. Traditional control modalities as touch, speech or gesture commands are not necessarily suited for all users. While non-expert users can make the effort to familiarize themselves with a robotic system, paralyzed users may not be capable of controlling such systems even though they need robotic assistance most. In this paper, we present a novel framework, that allows these users to interact with a robotic service assistant in a closed-loop fashion, using only thoughts. The system is composed of several interacting components: non-invasive neuronal signal recording and co-adaptive deep learning which form the brain-computer interface (BCI), high-level task planning based on referring expressions, navigation and manipulation planning as well as environmental perception. We extensively evaluate the BCI in various tasks, determine the performance of the goal formulation user interface and investigate its intuitiveness in a user study. Furthermore, we demonstrate the applicability and robustness of the system in real world scenarios, considering fetch-and-carry tasks and tasks involving human-robot interaction. As our results show, the system is capable of adapting to frequent changes in the environment and reliably accomplishes given tasks within a reasonable amount of time. Combined with high-level planning using referring expressions and autonomous robotic systems, interesting new perspectives open up for non-invasive BCI-based human-robot interactions.


Author(s):  
SARIKA KHALADKAR ◽  
SARITA MALUNJKAR ◽  
POOJA SHINGOTE

Secure environments protect their resources against unauthorized access by enforcing access control mechanisms. So when increasing security is an issue text based passwords are not enough to counter such problems. The need for something more secure along with being user friendly is required. This is where Image Based Authentication (IBA) comes into play. This helps to eliminate tempest attack, shoulder attack, Brute-force attack. Using the instant messaging service available in internet, user will obtain the One Time Password (OTP) after image authentication. This OTP then can be used by user to access their personal accounts. The image based authentication method relies on the user’s ability to recognize pre-chosen categories from a grid of pictures. This paper integrates Image based authentication and HMAC based one time password to achieve high level of security in authenticating the user over the internet.


2019 ◽  
Author(s):  
Matthew A. Slayton ◽  
Juan L. Romero-Sosa ◽  
Katrina Shore ◽  
Dean V. Buonomano ◽  
Indre V. Viskontas

ABSTRACTA key feature of the brain’s ability to tell time and generate complex temporal patterns is its capacity to produce similar temporal patterns at different speeds. For example, humans can tie a shoe, type, or play an instrument at different speeds or tempi—a phenomenon referred to as temporal scaling. While it is well established that training improves timing precision and accuracy, it is not known whether expertise improves temporal scaling. We quantified temporal scaling and timing precision in musicians and non-musicians as they learned to tap a Morse code sequence. We found that controls improved significantly over the course of days of training at the standard speed. In contrast, musicians exhibited a high level of temporal precision on the first day, which did not improve significantly with training. Although there was no significant difference in performance at the end of training at the standard speed, musicians were significantly better at temporal scaling—i.e., at reproducing the learned Morse code pattern at faster and slower speeds. Interestingly, both musicians and non-musicians exhibited a Weber-speed effect, where absolute temporal precision sharpened when producing patterns at the faster speed. These results are the first to establish that the ability to generate the same motor patterns at different speeds improves with extensive training and generalizes to non-musical domains.


Author(s):  
Federico Cabitza ◽  
Carla Simone

In this article, we present WOAD, a framework that was inspired and partly validated within a 2-year observational case study at a major teaching hospital. We present the WOAD framework by stating its main and motivating rationales, outlining its high-level architecture and then introducing its denotational language, LWOAD. We propose LWOAD to support users of an electronic document system in declaratively expressing, specifying and implementing content- and event-based mechanisms that fulfill coordinative requirements and make users aware of relevant conditions. Our focus addresses (a) the user-friendly and yet formal expression of local coordinative practices based on the work context; (b) the promotion of awareness of both these conventions and the context to enable actors to quickly respond; (c) the full deployment of coordination-oriented and context-aware functionalities into legacy electronic document systems. We give examples of LWOAD mechanisms taken from the case study and discuss their impact from the EUD perspective.


IoT ◽  
2020 ◽  
Vol 1 (2) ◽  
pp. 494-505
Author(s):  
Radu-Casian Mihailescu ◽  
Georgios Kyriakou ◽  
Angelos Papangelis

In this paper we address the problem of automatic sensor composition for servicing human-interpretable high-level tasks. To this end, we introduce multi-level distributed intelligent virtual sensors (multi-level DIVS) as an overlay framework for a given mesh of physical and/or virtual sensors already deployed in the environment. The goal for multi-level DIVS is two-fold: (i) to provide a convenient way for the user to specify high-level sensing tasks; (ii) to construct the computational graph that provides the correct output given a specific sensing task. For (i) we resort to a conversational user interface, which is an intuitive and user-friendly manner in which the user can express the sensing problem, i.e., natural language queries, while for (ii) we propose a deep learning approach that establishes the correspondence between the natural language queries and their virtual sensor representation. Finally, we evaluate and demonstrate the feasibility of our approach in the context of a smart city setup.


Author(s):  
Mária Gósy ◽  
Ákos Gocsál

Temporal properties of words are defined by physiological, psychical, and language-specific factors. Lexical representations are assumed to be stored either in a morphologically decomposed form or in a conceptually non-decomposed form. We assumed that the duration of words with and without suffixes would refer to the route of their lexical access. Measured durations of Hungarian nouns with various lengths produced by 10 speakers in spontaneous utterances revealed significant differences, depending on the words’ morphological structures. Durations of monomorphemic nouns were shorter than those of multimorphemic nouns, irrespective of the number of syllables they contained. Our interpretation is that multimorphemic words are accessed decompositionally in spontaneous speech, meaning that stem activation of the semantic representation is followed by activation of one or more suffixes. Durational differences of monomorphemic and multimorphemic words were not stable across word lengths. The number of suffixes did not influence the words’ temporal patterns. Kokkuvõte. Mária Gósy ja Ákos Gocsál: Sufiksiga ja sufiksita sõnade ajaline struktuur spontaanses ungari keeles. Sõnade ajalised omadused sõltuvad füsioloogilistest, psühholoogilistest ja keelespetsiifilistest teguritest. Eelduste kohaselt on sõnad mentaalses leksikonis representeeritud kas morfeemideks analüüsituna või tervikmõistena. Uurimuses lähtuti eeldusest, et sufiksiga ja sufiksita sõnade kestus viitab sellele, kuidas juurdepääs neile toimub. Mõõdeti kümne kõneleja spontaansetes lausungites produtseeritud eri pikkusega ungari nimisõnade kestust. Ilmnes, et kestus sõltus oluliselt sõna morfoloogilisest ülesehitusest. Tüvisõnade kestus oli tuletiste omast lühem, sõltumata silpide arvust sõnas. Järelduseks saadi, et juurdepääs tuletistele toimub spontaanses kõnes osade kaupa: tüve semantilise representatsiooni aktiveerimisele järgneb sufiksi või sufiksite aktiveerimine. Tüvisõnade ja tuletiste kestuserinevused olid eri pikkusega sõnade puhul erinevad. Sufiksite arv sõna ajalist struktuuri ei mõjutanud. Märksõnad: kestus, nimisõnad, tüvisõnad ja tuletised, leksikaalne juurdepääs, spontaansed lausungid


2019 ◽  
Vol 4 (1) ◽  
pp. 305-321 ◽  
Author(s):  
M. Cunha ◽  
S.G. Gonçalves

AbstractMechanisation is a key input in modern agriculture, while it accounts for a large part of crop production costs, it can bring considerable farm benefits if well managed. Models for simulated machinery costs, may not replace actual cost measurements but the information obtained through them can replace a farm’s existing records, becoming more valuable to decision makers. MACHoice, a decision support system (DSS) presented in this paper, is a farm machinery cost estimator and break-even analyzer of alternatives for agricultural operations, developed using user-driven expectations and in close collaboration with agronomists and computer engineers. It integrates an innovative algorithm developed for projections of machinery costs under different rates of annual machine use and work capacity processing, which is crucial to decisions on break-even machinery alternatives. A case study based on the comparison of multiple alternatives for grape harvesting operations is presented to demonstrate the typical results that can be expected from MACHoice, and to identify its capabilities and limitations. This DSS offers an integrated and flexible analysis environment with a user-friendly graphical interface as well as a high level of automation of processing chains. The DSS-output consists of charts and tables, evidencing the differences related to costs and carbon emissions between the options inserted by the user for the different intensity of yearly work proceeded. MACHoice is an interactive web-based tool that can be accessed freely for non-commercial use by every known browser.


Author(s):  
P. Gayathri ◽  
Syed Umar ◽  
G. Sridevi ◽  
N. Bashwanth ◽  
Royyuru Srikanth

As more increase in usage of communications and developing them more user friendly. While developing those communications, we need to take care of security and safety of user’s data. Many researchers have developed many complex algorithms to maintain security in user’s application. Among those one of the best algorithms are cryptography based, in which user will be safe side mostly from the attackers.  We already had some AES algorithm which uses very complex cryptographic algorithm to increase the performance and more usage of lookup tables. So the cache timing attackers will correlates the details to encrypt the data under known key with the unknown key. So, for this we provide an improvised solution. This paper deals with an extension of public-key encryption and decryption support including a private key. The private key is generated with the combination of AES and ECC. In general AES, key length is 128 bits with 10 times of iterations. But with this, users won’t get efficient security for their operations, so to increase the security level we are implementing 196-bit based encryption with 12 times round-key generation iterations. By this enhancement, we can assure to users to high level security and can keep users data in confidential way.


Sign in / Sign up

Export Citation Format

Share Document