The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, to integrate android systems, intelligent computing and web service on an intelligent mobile web service computing systems for bioinformatics is proposed. That is, users can send parameters to control the intelligent computing system under Matlab/C#/Java and query from clientside to server-side in the proposed bioinformatics systems with their android phone. Besides, the proposed system...
We have developed a Shogi (Japanese Chess) support system on the Internet, called SAKURA. SAKURA provides an environment for Shogi with game and discussion support functions. It also has databases and interfaces with artificial intelligence to play shogi. The databases of SAKURA consist of a game record database and a position database. These databases have links to each other. As a result, information...
This paper presents a distributed solution of the synchronization of Business Intelligence (BI) Systems via networking services. The main problem addressed by the proposed project is to create a common solution that allows automatically redeploying of business intelligence applications among different servers located in the Internet. A case study by using the Microsoft BizTalk Server as a Business...
Privacy is an increasingly cited concept in the large-scale deployment of web services in pervasive computing. The necessity of putting data-owners' personal information online and unwanted intentions to access data-owners' information augment the risk of privacy disclosure. To address this problem, we propose a policy-based privacy protection mechanism that protects personal information by policy...
Real-word entities can be mapped to unique entity identifiers through an Entity Name System (ENS), to systematically support the re-use of these identifiers and disambiguate references to real world entities in the Web. An entity subscription service informs subscribed users of changes in the descriptive data of an entity, which is a set of attribute name-value pairs. We study the design, implementation...
This paper presents Eco2home, a software solution aiming to reduce energy consumption in the domestic area by providing intelligent information. The project started from the idea of the successful European project named Eco n'Home. The Eco n'Home project was created by a group of experts that were using data related to buildings, collected from house owners, to create an ldquoaction planrdquo containing...
Superiority of Web service's dynamics and real time is analyzed in this paper, and the system architecture of Business Intelligence network which based on service is also introduced in this paper. Prospective of Business Intelligence and prescription of service are fallen together organically. Methods of raising corporation's decision-making ability which based on Web service are introduced in this...
University educational administration management system begins to shift the workflow to the electronic document from the paper document workflow. However, the forms are difficult to be integrated into the existing workflow since improving and submitting forms are of low efficiency. The appearance of the intelligent document technology makes flexible document information interchanges become possible...
This paper presents an innovative solution in retail activities, named "Intelligent Store - INTELSHOP", based on a technological platform that offers the support for some attractive and efficient services for customers and administrative staff. The technological platform integrates various technologies such as RFID, GPS and GIS, wireless communications, mobile access to information on PDA...
Several vulnerability analysis techniques in web-based applications detect and report on different types of vulnerabilities. However, no single technique provides a generic technology-independent handling of Web-based vulnerabilities. In this paper we present our experience with and experimental exemplification of using the application vulnerability description language (AVDL) to realize a unified...
Sem@ntica is a system for extracting the information contained in collections of documents into a knowledge base. It combines high quality conventional named entity analysis with an ontology class labeling capability for open class words. The ontology comprises an upper ontology and one or more domain ontologies. The system has tools for rapidly designing the ontology and mapping segments of Word...
This paper proposed a two layer authorization mechanism, including traditional password system and rhythm recognition. The whole system includes two phases: preprocessing and usual operation for users. In preprocessing phase, users type password in a specific rhythm in order to record and analyse the characteristics of behaviour of users. In the second phase, how to verify a user in usual operation...
In order to realization electronic parts product appearance quality detection control, one kind of processor based on the intelligent knowledge automatic extraction and system intelligence modeling was presented. In the processor, wavelet-fuzzy technique and neural network technique are combined. Uses the fuzzy wavelet extraction image feature, and wavelet function is used as fuzzy membership function...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.