The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Existing Web API search engines allow for only category-based browsing and keyword or tag-based searches for RESTful services without offering the capability of discovering and composing real-world RESTful services from the viewpoint of application developers. Therefore, we propose a novel approach, referred to as TAD (Transformation-Annotation-Discovery), to address the above issue. TAD firstly transforms...
According to GJB6600, this paper firstly analyses Interactive Electrical Technical Manual's (IETM) read and use, and puts forward an independent and controllable IETM reader platform framework and software realization technical architecture, which is based on GJB6600 and satisfied national safety and confidentiality requirements. Then design IETM reader platform framework. Some key techniques are...
As wireless local area network, WLAN, access point (AP) are becoming very common wireless communication infrastructures in indoor environments, Wi-Fi signal based Indoor Positioning Systems (IPS) have been widely developed in recent years and one of the most popular technologies is the received signal strength (RSS) fingerprinting technology. However, due to large amount of time-consuming work required...
Next-generation sequencing (NGS) is becoming feasible for identification or diagnosis of human infectious diseases. In the present study, we aimed to develop a bioinformatic method for dengue virus identification by comparison against different database for variant types of samples and BLASTn and ViPR databases. We collected 12 different types of samples from five dengue-virus-infected patients and...
According to the development of information technology and the management of metallurgical enterprises, the paper puts forward the design scheme of the information platform for metallurgical enterprises, introduces the structure and function of the new type of metallurgical information platform. It realize loop online collection, hierarchical data computation, distributed database management and global...
Outlier detection is a primary step in many data mining applications. An outlier is an abnormal individual from a population, which usually leads poor accuracy in models. Medical literatures are the most reliable resources for researchers to know the progress in their research areas and latest contributions from others. Traditional keyword search retrieves all the text data that contain the keywords...
The science laboratory class is a key class in some universities. They learn a wide range of knowledge rather than specialized ones. To deepen knowledge in limited time, we propose a new method for database course. Students learn the basic knowledge from textbook. For difficult point, they can return to videos on MOOC websites. If there are still problems, they may discuss with teacher and classmates...
There is no previous research that compares the results of k-means, CLOPE clustering and Latent Dirichlet Allocation (LDA) topic modeling algorithms for detecting trending topics on tweets. Since not all tweets contain hashtags, we considered three training data feature sets: hashtags, keywords and keywords + hashtags in this study. Our proposed methodology proved that CLOPE can also be used in a...
The microservice architecture (MSA) is an emerging cloud software system, which provides fine-grained, self-contained service components (microservices) used in the construction of complex software systems. DevOps techniques are commonly used to automate the process of development and operation through continuous integration and continuous deployment. Monitoring software systems created by DevOps,...
Database is widely used for information storage and management. With the explosion of the data size, the requirement of the storage capacity is growing dramatically. Cloud offers clients a scalable solution to meet the demand of the increasing space. A cloud service, if used and managed properly, can increase the resource usability and provide more secure services. In this paper, we propose a cloud-based...
Querying the path information of individual products in a supply chain is key to many applications. RFID (Radio-Frequency IDentification) is a main technology to enable product path information query today. With RFID technology, supply chain participants can efficiently track products in transit and record their production information in databases. In this paper, we investigate the following question:...
This paper proposes a novel scheme for RFID anti-counterfeiting by applying bisectional multivariate quadratic equations (BMQE) system into an RF tag data encryption. In the key generation process, arbitrarily choose two matrix sets (denoted as A and B) and a base Rab such that [AB] = λRABT, and generate 2n BMQ polynomials (denoted as p) over finite field Fq. Therefore, (Fq, p) is taken as a public...
Device-free Passive (DfP) indoor localization releases the users from the burden of wearing sensors or carrying smartphones. Instead of locating devices, DfP technology directly locates human bodies. This promising technology upgrades and even redefines many services, such as intruder alarm, fire rescue, fall detection, baby monitoring, etc. Using Wi-Fi based fingerprints, DfP approaches can achieve...
In recent years, the State Grid has built amounts of business systems, e.g. OA, marketing and MIS systems. And it gradually developed into big data. However, with the construction of information increasingly deepening and a sharp increase of data volume, new challenges and inconvenience have been brought out for data seekers. In this paper, an architecture model of data integration in power field...
The replication and dissemination of multimedia data become increasingly convenient and efficient, so a lot of redundant multimedia data, especially image files, have been generated and stored on the Internet. Therefore, it is necessary to perform deduplication of images. However, the existing deduplication methods of regular files are hash-based, which cannot be applied to the deduplication of images...
In this paper, a clinical data management and statistic system is implemented for authorized users such as doctors and medical researchers to manage clinical data. The system is able to inquiry patient particulars, diagnostic results, CT (Computerized Tomography) data and electrocardiogram (ECG) data, and it implements comparison function of Cardiodynamicsgram (CDG) data and statistic function for...
To maximize spectrum access opportunities for white space devices, incorporating real-time spectrum sensing with geolocation database is a promising approach to enhance detection resolution. Advanced spectrum sensing techniques are needed to quickly and accurately identify spectrum occupancy over a wide frequency range. However, the stringent requirements from the wideband signal acquisition and processing...
Sharing outsourced data between owners and data mining experts is becoming a challenging issue in biomedical and healthcare fields. Watermarking has been proved as a right-protection mechanism that can provide detectable evidence for the legal ownership of a shared dataset, without compromising its usability. However, the main disadvantage of these conventional techniques is unintelligent, rule-based...
The adoption and availability of diverse application design and support platforms are making generic scientific application orchestration increasingly difficult. In such an evolving environment, higher level abstractions of design primitives are critically important using which end users have a chance to craft their own applications without a complete technical grasp of the lower level details. In...
The UAV intelligence support mode is studied in the article in order to improve the ability of intelligence support in the battlefield. Three kinds of UAV intelligence distribution mode are put forward and their advantages and disadvantages are analyzed. The UAV intelligence sharing mode based on existing battlefield network is proposed which could contact all intelligence processing system, command...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.