Pal D.,Mathematics |
Khethavath P.,Mathematics |
Chen T.,California State Polytechnic University, Pomona |
Zhang Y.,Nanjing University
International Journal of Communication Systems | Year: 2017
Payment methods using mobile devices instead of using traditional methods (cash, credit card, etc) has been gaining popularity all over the world. The ubiquitous nature of smartphones and tablets has widened the ambit for using these devices for payments and other daily life activities. Recent advancements in mobile technology along with the convenience of mobile devices made these applications possible. Despite the worldwide user adoption of mobile applications, security is the key challenge in mobile banking and payments system. Mobile payments systems need to be very efficient and provide utmost security endlessly. State-of-the-art mobile payment systems need the physical presence of a merchant agent to make a payment. In this article, we had described in detail about the design and implementation of a mobile payments application, used to make in-store purchases and make secure payments without any physical presence of a cashier or a merchant agent. We proposed a novel privacy-preserving and secure authentication algorithm to make mobile payments using biometrics. The analysis and experimental results show the reliability and efficiency of our proposed solution. © 2017 John Wiley & Sons, Ltd.
Martin H J.A.,Informatics and Computing |
Montero J.,Mathematics |
Yanez J.,Mathematics |
Gomez D.,Complutense University of Madrid
Proceedings of 2010 IEEE International Conference on Intelligent Systems and Knowledge Engineering, ISKE 2010 | Year: 2010
In this paper we present a divisive hierarchical method for the analysis and segmentation of visual images. The proposed method is based on the use of the k-means method embedded in a recursive algorithm to obtain a clustering at each node of the hierarchy. The recursive algorithm determines automatically at each node a good estimate of the parameter k (the number of clusters in the k-means algorithm) based on relevant statistics. We have made several experiments with different kinds of images obtaining encouraging results showing that the method can be used effectively not only for automatic image segmentation but also for image analysis and, even more, data mining. © 2010 IEEE.
Kauffman L.H.,Mathematics |
Ul-Haq R.,Jawaharlal Nehru Centre for Advanced Scientific Research
Progress in Biophysics and Molecular Biology | Year: 2015
The essay is in the form of a dialogue between the two authors. We take John Wheeler's idea of "It from Bit" as an essential clue and we rework the structure of the bit not to the qubit, but to a logical particle that is its own anti-particle, a logical Marjorana particle. This is our key example of the amphibian nature of mathematics and the external world.We emphasize that mathematics is a combination of calculation and concept. At the conceptual level, mathematics is structured to be independent of time and multiplicity. Mathematics in this way occurs before number and counting. From this timeless domain, mathematics and mathematicians can explore worlds of multiplicity and infinity beyond the apparent limitations of the physical world and see that among these possible worlds there are coincidences with what is observed. © 2015 .
Miranda L.,Mathematics |
Vieira T.,Mathematics |
Martinez D.,Mathematics |
Lewiner T.,Pontifical Catholic University of Rio de Janeiro |
And 2 more authors.
Brazilian Symposium of Computer Graphic and Image Processing | Year: 2012
Human gesture recognition is a challenging task with many applications. The popularization of real time depth sensors even diversifies potential applications to end-user natural user interface (NUI). The quality of such NUI highly depends on the robustness and execution speed of the gesture recognition. This work introduces a method for real-time gesture recognition from a noisy skeleton stream, such as the ones extracted from Kinect depth sensors. Each pose is described using a tailored angular representation of the skeleton joints. Those descriptors serve to identify key poses through a multi-class classifier derived from Support Vector learning machines. The gesture is labeled on-the-fly from the key pose sequence through a decision forest, that naturally performs the gesture time warping and avoids the requirement for an initial or neutral pose. The proposed method runs in real time and shows robustness in several experiments. © 2012 IEEE.
Saussie D.,Ecole Polytechnique de Montréal |
Barbes Q.,Mathematics |
Proceedings of the American Control Conference | Year: 2013
This paper presents a new application of structured H∞ synthesis to tune self-scheduled controllers. Newly available MATLAB-based tools allow to tune fixed-structure linear controllers while satisfying H ∞ constraints. Moreover multi-model synthesis capabilities can extend their application to self-scheduled controllers. This technique is successfully applied to the attitude control of a launch vehicle in atmospheric ascent phase. © 2013 AACC American Automatic Control Council.
SIAM Journal on Optimization | Year: 2011
We give two self-dual regularizations of maximal monotone operators on Hilbert spaces. These regularizations and their set-valued inverses are strongly monotone, single-valued, and Lipschitz with full domain. Moreover, these regularizations graphically converge to the original monotone operator. If a maximal monotone operator has nonempty zeros, these self-dual regularizations can be used to find its least norm solution. When the maximal monotone operator is the subdifferential of a proper lower semicontinuous convex function with nonempty minimizers, this translates to finding the least norm minimizer. © 2011 Society for Industrial and Applied Mathematics.
AI and Society | Year: 2013
Following up on Thomas Nagel's paper "What is it like to be a bat?" and Alan Turing's essay "Computing machinery and intelligence," it shall be claimed that a successful interaction of human beings and autonomous artificial agents depends more on which characteristics human beings ascribe to the agent than on whether the agent really has those characteristics. It will be argued that Masahiro Mori's concept of the "uncanny valley" as well as evidence from several empirical studies supports that assertion. Finally, some tentative conclusions concerning moral implications of the arguments presented here shall be drawn. © 2013 Springer-Verlag London.
Bauschke H.H.,Mathematics |
Wang X.,Mathematics |
SIAM Journal on Optimization | Year: 2010
Monotone operators are of basic importance in optimization as they generalize simultaneously subdifferential operators of convex functions and positive semidefinite (not necessarily symmetric) matrices. In 1970, Asplund [A monotone convergence theorem for sequences of nonlinear mapping, in Nonlinear Functional Analysis, American Math Society, Providence, RI, 1970, pp. 1-9] studied the additive decomposition of a maximal monotone operator as the sum of a subdifferential operator and an "irreducible" monotone operator. In 2007, Borwein and Wiersma [SIAM J. Optim., 18 (2007), pp. 946-960] introduced another additive decomposition, where the maximal monotone operator is written as the sum of a subdifferential operator and a "skew" monotone operator. Both decompositions are variants of the well-known additive decomposition of a matrix via its symmetric and skew part. This paper presents a detailed study of the Borwein-Wiersma decomposition of a maximal monotone linear relation. We give sufficient conditions and characterizations for a maximal monotone linear relation to be Borwein-Wiersma decomposable and show that Borwein-Wiersma decomposability implies Asplund decomposability. We exhibit irreducible linear maximal monotone operators without full domain, thus answering one of the questions raised by Borwein and Wiersma. The Borwein-Wiersma decomposition of any maximal monotone linear relation is made quite explicit in Hilbert space. © by SIAM.
Ngabonziza Y.,Mathematics |
Li J.,City College of New York
ASME 2011 International Mechanical Engineering Congress and Exposition, IMECE 2011 | Year: 2011
In the past years, carbon nanotubes and their composites have been intensively studied due to their extremely high strength and high electrical and thermal conductivities. However, to be able to use CNT-reinforced composites as structural materials in real applications, more cost-efficient processing methods should be adopted and the properties of such nanocomposites need to be further analyzed. Here we investigate the electrical and elastic properties of multi-walled carbon nanotubes (MWCNT) reinforced polycarbonate (PC) nanocomposites produced by injection molding which has been widely used in industrial plastic production. Nanocomposite samples with MWCNT ranging from 0 to 7wt% were tested for both electrical conductivity using a 2-probe measurement and mechanical properties under tensile loading. It has been found that the electrical conductivity depends on both injection velocity and the CNT content while the elastic properties of the nanocomposites only depend on the CNT content. Besides the experimental testing, a percolation theory and micromechanics models have been applied to determine the electrical conductivity percolation threshold and the effective elastic modulus of the nanocomposites in terms of CNT contents. The results are compared with our experimental data. It shows that a percolation threshold is around 1.8wt % of MWCNT. The evaluation of elastic properties using micromechanics models not only indicates the influence of MWCNT on elastic properties but also the presence of an interphase between the CNT and PC matrix. Copyright © 2011 by ASME.
PubMed | Mathematics and Jawaharlal Nehru Centre for Advanced Scientific Research
Type: Journal Article | Journal: Progress in biophysics and molecular biology | Year: 2015
The essay is in the form of a dialogue between the two authors. We take John Wheelers idea of It from Bit as an essential clue and we rework the structure of the bit not to the qubit, but to a logical particle that is its own anti-particle, a logical Marjorana particle. This is our key example of the amphibian nature of mathematics and the external world. We emphasize that mathematics is a combination of calculation and concept. At the conceptual level, mathematics is structured to be independent of time and multiplicity. Mathematics in this way occurs before number and counting. From this timeless domain, mathematics and mathematicians can explore worlds of multiplicity and infinity beyond the apparent limitations of the physical world and see that among these possible worlds there are coincidences with what is observed.