The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The video recorded tactics that a player applied in a sport competition are encoded to understandable semantics scripts for both human beings and computers. Such information is then embedded back into the sport video file. Thus, users can retrieve the contents of competition for purposes such as video analysis and tactics statistical analysis.
The barcode technology has been used in many applications for a long time. However, it does not provide unique object identification and lacks connectivity to the Internet that more and more business applications require. The Electronic Product Code (EPC) was developed to address these problems. But EPC is not widely used at the present time. In this paper, we propose an approach called Barcode Network...
Since the notion of “Internet of Things” (IoT) introduced about 10 years ago, most IoT research has focused on higher level issues, such as strategies, architectures, standardization, and enabling technologies, but studies of real cases of IoT are still lacking. In this paper, a real case of Internet of Things called ZB IoT is introduced. It combines the Service Oriented Architecture (SOA) with EPC...
With the rapid development of the Internet of things(IOT), the applications are more and more extensive in smart grid, intelligent transportation, intelligent logistics, intelligent medical, smart home and so on. In this case, more and more big data analysis and processing engines are emerging. Because real data is difficult to obtain, how to provide fast test data with enough variety, large scale,...
Dependability is an important issue of assessing a software systems. With more wide application of Internet in life-critical domain, the dependability of software system arranged on Internet becomes big challenges because of the undependability of today's Internet. Accurately assessing the dependability of a Internetware system has to be one of important task. In this paper, we propose a mathematics...
With the rapid growth of data which sensed by the sensor nodes deployed in the logistics center, the current data processing methods have been impossible to meet the requirements of rapid and efficient analysis and processing for big data. In order to satisfy the demand, this paper designs a data processing algorithm which is implemented by Hadoop. The experimental results show that our method can...
In this paper, hybrid method of model-checking and testing were suggested, the testing process for the combination of model-checking and testing were given. Counterexample of model-checking on LOTOS lacking in testing data which lead to the test suite generating based counterexample lacking in pertinence. In order to guarantee the significance of the testing based on counterexample, it proposes the...
As the transaction has the features of atomicity, consistency, isolation, and durability, the process of the TransactionEvent in the Internet of Things is complex. All operations of a TransactionEvent are either all completed or completed none, and the transaction data is hard to deal with. To solve this problem, the article specifies the start time and end time of the transaction, and to send a subscription...
The Barcode system has large scale application around the world. However, its disadvantages of unique object identity and the lack of connectivity to Internet have turned the customer's attention into the EPC(Electronic Product Code, EPC in short) Network. As a subsidiary organization of GS1, EPCglobal has launched an EPC network architectural framework. In the paper, the author designs the encoding...
With the rapid increase of Web Service applications, the reliability of web service and service composition has drawn particular attention from researchers and industries. Many methods for testing and verifying the reliability have been discussed, however, the existing methods are weak in test automation and therefore difficult in tackling the dynamic features of modern SOA based application. The...
Cloud Computing introduces a revolutionary paradigm of computing to Service Oriented Architecture (SOA), by provisioning various types of computational resources and applications as on-demand services. While presenting cloud services semantically using Web Ontology Language (OWL) based techniques, we experience a series of difficulties due to the vagueness of the novel cloud computing specifications,...
This paper describes how to use the Protégé based OWL API to parse Ontology model. Specifically, it includes how to load the ontology model from the owl file, how to collect the class, subclass, individual, object property, data property, and how to find the domain and range that are relevant to some object property.
With the development of Web Service composition, more and more diversified and complex business demands are satisfied. But the logical validity cannot be guaranteed. After a short view of recent research efforts of formal modeling and verification about Web Service, this paper proposes a new formal model for WS-BPEL described Web Service composition. The specification language of the model is LOTOS...
As the lack in business process information, the EPC(Electronic Product Code) data in RFID((Radio Frequency Identification) network miss its readability. Focus on the challenge this paper proposes a kind of method and technology for composing and decomposing business process information with EPC data in RFID network. By abstracting the transaction information with its EPC data and composing both into...
Protecting user's privacy is one of the main concerns for the deployment of pervasive computing systems in the real world. In pervasive environments, the user context information is naturally distributed among different spatial or logical domains. Many efforts have been done to match the service privacy policy with the user's privacy preferences. However, since the pervasive environments are characterized...
For the purpose of improving the performance of table tennis bats, the design of the distribution of rubber pips on table tennis bats contributes to meet the needs of athletes with different technical characteristics. In this paper, we take the pips distribution as focus; carry out the mechanical analysis of ball when hit onto a bat surface from the mechanical point of view. And thereby, we approve...
With the rapidly development and large scale applications of electronic product code (EPC) networks, researchers and customers have turned their attention to the security problems. In this paper, we discuss the design methodology of trustworthy ONS, an object naming system of EPC network, and propose an adjusted public key infrastructure (PKI), called LPKI, for trustworthy ONS. It enhances the security...
Systematic software testing plays a critical role in software development. Various approaches have been proposed and developed, but software testing is still far from maturity. A very promising strategy is model-based testing that is aimed to automatically generate test cases and evaluate test results based on the software models that specify the behavior of the software under test. In this paper,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.