The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In academic libraries, electronic resources usually dominate the expenditure, but their usage is not systematically analyzed. Usage analysis usually requires manual integration of reports from various vendors in different formats via diverse channels. This makes it difficult to evaluate the cost effectiveness. In this poster, we implemented a systematic model to aggregate heterogeneous resources for...
In this study, an autonomous robot is designed to equip an omni-vision camera and an omni-moving platform to meet the requirement of FIRA and RoboCup robot soccer competitions. To make robots obtain its location on the field, we use white-line pattern match localization algorithm to achieve this goal. However, when the white-line information is not complete during the matching process, the observed...
A total of 656 unrelated males from Taiwan population were typed with 13 rapidly mutating Y-chromosome short tandem repeat (Y-STR) markers: DYF399S1, DYF387S1, DYS570, DYS576, DYS518, DYS526a+b, DYS626, DYS627, DYF403S1a+b, DYF404S1, DYS449, DYS547 and DYS612. 655 haplotypes of the RM 13 Y-STRs were obtained which only one haplotype was shared by two individuals. The combined haplotype diversity of...
Recent efforts in data cleaning of structured data have focused exclusively on problems like data deduplication, record matching, and data standardization; none of these focus on fixing incorrect attribute values in tuples. Correcting values in tuples is typically performed by a minimum cost repair of tuples that violate static constraints like CFDs (which have to be provided by domain experts, or...
Location-based service (LBS) is an information service that use location data to control features. Many kinds of location-based applications, such as route planning/navigation, social networking services, business services and indoor local information services, are widely deployed to handle many scenarios every day. In these applications, location-based marketing provides a great opportunity to increase...
Objective: To analyze the component law of Chinese medicines for osteonecrosis of the femeral head, and develop new prescriptions for osteonecrosis of the femeral head through unsupervised data mining methods. Methods: Chinese medicine recipes for osteonecrosis of the femeral head were collected and recorded in the database, and then the correlation coefficient between herbs, core combinations of...
Due to the proliferation of Global Position System (GPS) and smart phone technology, Location-Based Service (LBS) has attained tremendous growth in recent years. Spatial queries retrieving nearest Point-Of-Interests (POI) require actual user locations for services. However, sharing such sensitive personal location information with potentially malicious servers may cause concerns about user privacy...
In this paper, we present an approach that simultaneously clusters database members and learns dictionaries from the clusters. The method learns dictionaries in the Radon transform domain, while clustering in the image domain. Themain feature of the proposed approach is that it provides rotation invariant clustering which is useful in Content Based Image Retrieval (CBIR). We demonstrate through experimental...
Based on linear regression techniques, we present a new supervised learning algorithm called Class-oriented Regression Embedding (CRE) for feature extraction. By minimizing the intra-class reconstruction error, CRE finds a low-dimensional subspace in which samples can be best represented as a combination of their intra-class samples. This characteristic can significantly strengthen the performance...
In modern large enterprises, a complex project is usually composed of a series of processes and needs many persons with different roles cooperating with each other within limited time and investment. A workflow-based cooperative project management system (CPMS) that can support multi-user working is presented in this paper. The system is based on Browser/Server architecture that contains User Interface,...
A novel descriptor is proposed for invariant pattern recognition by using ring-projection and dual-tree complex wavelets. The ring-projection takes the summation of all pixels that lie on the circle with radius r and centre at the centroid of the pattern. This transforms the pattern from a 2-D image to a 1-D signal, so less memory is needed and it is faster than existing 2-D descriptors in the recognition...
This paper presents a block-based face-recognition algorithm based on a sparse linear-regression subspace model via locally adaptive dictionary constructed from past observable data (training samples). The local features of the algorithm provide an immediate benefit - the increase in robustness level to various registration errors. Our proposed approach is inspired by the way human beings often compare...
This paper proposes a hybrid concurrency control scheme for transactional composite services. The scheme uses the information gathered from the workflow specifications of the composite services to reduce the overhead in detecting cycles in the serialization graph. The scheme carries out runtime analysis of the SQL statements used by the composite services to determine whether the clients that execute...
Automatic control on business process with workflow is the core part of a project management system. A process-oriented workflow system model which can support workflow configuration, process control, task assignment, task submitting and approval, and cooperative work is presented. The model is a hierachical architecture that consists of three layers, i.e. database layer, workflow engine layer, and...
SpriteDB tool has two main objectives. Firstly, it provides an open-source, uniform platform for accessing a vast collection of test videos used for sprite generation. Secondly, it presents the experiments with intermediate results generated by our approach for comparison and analysis. Our experimental results consist of classification of videos for sprite generation, synthetic and ground truth video...
RFID system is gaining popularity and attracting interest from both the enterprises and academic institutes. But now, we face several security problems and challenges in RFID systems. In human centric applications, location privacy problem is the most important issue that should be solved. In this paper, we propose a RFID authentication scheme that achieves the goal of location privacy. We also cite...
Workflows are widely used for representing business processes, Web services, scientific experiments, and activities in daily life, like recipes. There is an increasing need for people to search a workflow repository using keywords and retrieve the relevant ones according to their interests. A workflow hierarchy is a three dimensional object containing multi-resolution abstraction views on the same...
There are several algorithms proposed for maintaining the sequential patterns as records are inserted. In addition to record insertion, the pattern maintenance for record modification is also very important in the real-applications. In the past, we have proposed the fast updated sequential pattern tree (called FUSP tree) structure for handling record insertion. In this paper, we attempt to handle...
Many problems in information processing involve some form of dimensionality reduction. This paper develops a new approach for dimensionality reduction of high dimensional data, called local maximal marginal (interclass) embedding (LMME), to manifold learning and pattern recognition. LMME can be seen as a linear approach of a multimanifolds-based learning framework which integrates the information...
Due to the nowadays increasing applications of grid computing technology, the risks of grid security are growing, such as the problem of access control inter-domain in grid environment. Recently, trust management is considered as an effective approach for enhancing grid security. As the fuzzy feature of trust and the advantage of fuzzy theory for trust representation and reasoning, this paper presents...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.