The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the advancement of information technology resulting in the blurredness of industry boundaries, companies have tried to integrate product and service to fulfill customer requirements and create competitive advantage in the market. The key in convergence is software. To make convergence effective, three things need to be considered. This article discusses the role of software in convergence and...
Modern businesses face significant obstacles in fully leveraging the increasing amount of diverse, distributed, and dynamic computing resources. IT convergence requires collaborative, adaptive distributed processing combined with a rich knowledge structure to dynamically integrate the diverse resources and efficiently forge them into useful business tools. This study presents an integrated framework,...
Rapid change of customer requirements has propelled the emergence of an agile approach due to such merits as fast release and simplified documents. An agile approach aims at maximizing productivity and effectiveness. Participants in an agile project usually focus on functionality of a system during the process. However, there are few considerations for nonfunctional requirements (or quality requirements)...
Changes should continuously occur to enterprise applications whenever organizational structure and business processes are changed. However, the application modification means that the access control modules become more complicated in order to control application users, roles for users, and permissions depending on roles of an organization. This problem was tackled traditionally with the access control...
IT convergence based applications rely on an amalgamation of different technologies to provide various functionalities. In designing such applications, the primary focus is on integrating the appropriate technologies to deliver the required functionalities and services. While the functional requirements drive this process, sufficient care needs to be provided to non functional requirements (NFRs)...
Services are increasingly being utilized to develop business applications to keep pace with the changing environment and business requirements. Service identification is one of the core activities in developing service systems. To identify proper services, business requirements and business change factors should be analyzed since the ultimate aim of a service system is to achieve business goals and...
Migration systems in server virtualization environments distribute workloads and solve resource shortage problems by moving a virtual machine in hotspot to a physical server having residual resources. Most of the migration systems use the first-fit algorithm known as an efficient solution for bin packing problem to determine the migration policies. Since the resource usages of virtual servers continuously...
To ensure data confidentiality and fine-grained access control in cloud computing environments, a recent study proposed system model using Key Policy-Attribute Based Encryption(KP-ABE) and Proxy Re-Encryption(PRE). But, existing work has effected the violation of data confidentiality through collusion attack of revoked user in system and cloud server. To resolve this problem, we propose system model...
In recent years, social network service based on mobile devices has obtained lots of interests from many users, developers as well as service providers. However, many users do not gain high quality social media services due to the fact that mobile devices have bad performance of hardware. In order to overcome the limitation of hand devices, most providers are applying cloud computing techniques, especially...
Due to the stochastic nature and time constrains, it is important to quantitatively verify the reliability of Web applications as well as the usability. However, the reliability involves different kinds of QoS metrics, which is hard to be verified by the "yes" or "no" assertion in general model checking. This paper proposes a verification approach to analyzing the performance of...
The LBS (Location Based Service) is becoming important part of IT(Information Technology) business. The localization is a core technology for LBS, because the LBS based on a position of each device or user. In case of outdoor, GPS is used to get a position of moving user as dominant technology. But as for indoor environments, GPS is not available. Therefore, for 'Seamless LBS', an enhanced indoor...
Recently, there has been increased interest in home healthcare service due to prosperity of information technology and distribution of developed medical devices. Home healthcare service is a service that enables patients to receive medical service at home, without visiting a hospital. However, since the insecurely processed information can directly affect patients' health and lives, security must...
Appearance of social media cloud system can provide media services and open tools for share own ideas, opinions, experience and etc. Also, the increase in mobile device with mobility has increased the need for a tool of media information sharing and a user-created content circulation through the network. Therefore service providers of social media are developing virtualization rule to constitute resource...
Universal Plug and Play (UPnP) can be applied many home appliances because of its straightforward implementation and zero configuration characteristics. However, it has limitation of the cost and spatial because it has to be used in IP based network. The proposed network bridge is capable of generating virtual Zigbee device without implementing each actual device which inserts an UPnP stack. This...
This study aims to explain the users' adoption of Tcommerce, which is receiving a attention as a new profit model of IPTV, a representative telecommunications & broadcasting convergence technology. In order to develop a convergence service adoption model, utilitarian and hedonic motivation factors that explain selection and behavior of individual users; interactivity that reflects characteristics...
In August of 2006 the US Government passed an executive order to implement electronic health records by 2014. Recent moves in global healthcare IT standards address many medical domains; however, there has been little attempt to provide interoperability in transport medicine. We present an Integrating the Healthcare Enterprise (IHE) profile for Transport Medicine, to facilitate interoperability between...
In this paper, we proposes a novel hardware architecture and FPGA implementation method of high performance real-time face-detection engine for robustness to variable illumination and rotation. The proposed face detection algorithm improved its performance by using MCT (Modified Census Transform), rotation transformation and AdaBoost learning algorithm. For implementation, we used a QVGA class camera,...
This paper presents an approach to capturing safety properties for safety critical systems using the Structured Object-oriented Formal Language (SOFL). The approach features a process and five keys for capturing safety properties that need to be verified based on a software model. The five keys include constraints of functions, domain knowledge for functions, developer's experience, real-time constraints...
For radar systems, target detection procedures need to be conducted with a received signal amplitude that exceeds the CFAR (Constant False Alarm Rate) threshold. An Ordered Statistics CFAR (OS-CFAR), based on a sorting algorithm, is useful for an automotive radar system in a multi-target situation. However, it has a limitation in that it requires a higher computation effort than a typical Cell Averaging...
Breast cancer is a cancer which occurs commonly for women of the entire world. [9] In this thesis, in order to find cancer by using image conformation technology, computer tomography (CT), positron emission tomography (PET) and magnetic resonance imaging (MRI) images were used. For conforming the images of each the different modalities, surface points, which become common feature of MRI and CT images...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.