The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper describes our recent effort to develop a cognitive application to transform invoice processing in P2P (Procure to Pay) process in Finance operations. The context of this problem is with service providers who offer invoice processing services to their global clients. Due to the language barrier, the service provider usually maintain both offshore and near-shore teams, where the offshore...
In the past two decades, due to Taiwans national insurance policy, a substantial amount of medical and patient records have been stored in a large database. From this database, much important medical knowledge has been discovered; however, with the rapid growth of database size, it takes an increasingly long time to process queries on the database, even rather simple queries. We, therefore, propose...
With RFID applying in library, this paper develops an Internet of Things System for Library Materials Management using Android based UHF mobile reader (Android mobile reader) as its entry to increase the efficiency of library materials management. The functions of the Internet of Things System for Library Materials Management include user identification, inventorying, adding, refreshing, searching,...
The existed cloud data models cannot well meet the management requirements of structured data including a great deal of relational data, therefore a two-layer cloud data model is proposed by referencing the relation data model, Hierarchical data model and key value data model. In the representation layer, the concepts of composite class and composite object are proposed to represent nested data structure...
We propose an approach to produce computer generated holograms (CGH) from RGBD data. Being able to produce CGH from RGBD images simplifies the recording process and results in more realistic reconstruction. A multilayer wavefront recording plane method is described for fast wave propagation, and it is completed with a two-step occlusion culling process to preserve the self-occlusion effect. The approach...
Since the apoptosis protein plays an important role in understanding the mechanism of programmed cell death, so further to reveal the mechanism of subclass for apoptosis can bring more insights to their function. Here, our group established a dataset included 239 anti-apoptosis proteins and 222 pro-apoptosis proteins in our previous work. The extraction of information based on sequence information,...
A robot localization plays an important role in the field of robot navigation. One of the most commonly used localization algorithms is Monte Carlo algorithm. To improve the efficiency of robot localization, many modified algorithms have been proposed, such as Self-Adaptive Monte Carlo algorithm. However, this method requires a lot of storage space and intensive computing, especially in large environments...
We present an accurate seizure detection algorithm, and make a detailed comparison of two frequency analysis methods: a widely used stationary method — Fast Fourier Transform (FFT) and a relatively new nonstationary method — Hilbert-Huang Transform (HHT). Two public databases and one our own database were tested. The results show that our algorithm has very high accuracy compared with the state-of-the-art...
This paper presents a novel video-based face recognition algorithm using a sequential sampling and updating scheme, named sequential sample consensus (SSC). Different from the existing approaches, the training video sequences serve as the sample space, and the person's identity in the testing sequence is characterized by an identity probability mass function (PMF) that is sequentially updated. For...
Linear Discriminant Analysis (LDA) has been widely used in appearance-based face recognition. However, it requires lots of training samples for each person with respect to the large dimensionality of the image space, which is difficult to collect in reality. To overcome the severe constraint of training sample deficiency, approaches based on single training sample per person (SSPP) arise in the past...
We proposed an embedded face recognition authentication system with a novel structure, which consists of the RFID card used to store the face eigen information and the face recognition unit based on S3C6410. The hardware was designed and described, and the recognition algorithm was presented thoroughly. With the fabricated system, experiments were carried out for studying the authentication performances...
Wireless sensor networks based on the description of P2P network functions, the bottom of the screen, and using the network characteristics of P2P networks realized dynamic changes of sensor network support and multiple sensor network information sharing. This sensor network as the support of data, using high application of P2P technology gives P2P wireless sensor network layer of design and implementation.
Considering the multi-source information lack of automation management, analysis and evaluation in network security field, a new network security situational evaluation model based on D-S evidence theory is proposed. This method fuses multi-source alarm information through D-S evidence theory, associates with nodes vulnerability information, integrates with the severity of threats, computes the value...
With the development of network technology, computer network is characterized as an uncontrollable, variable and unpredictable infrastructure, this brings great difficulty of verify, defining, debugging and comparing the new schemes. Network simulation technology is proposed to test, appraise, and verify means available. This paper designs and implements an intelligent analyzing tool for NS2 traces,...
Based on more than 260 direct N2O emission fluxes in 93 published Chinese and English journal papers from 31 studying sites (including data from our own study), N2O emission fluxes from various land uses/covers (arable lands, forests, grasslands, swamps and marshes, riparian areas and freshwaters) were compiled and analyzed. Results showed that the annual N2O emissions fluxes ranged from 0.14 to 54...
There are many problems in the construction of network education resource currently, such as the neglect of teaching needs, duplication and lack of system design. These problems restrict the development and spread of distance education, which must be resolved. Postmodernism draws extensively Behaviorism, Cognitivism, Constructivism and other learning theories. Postmodernism advocates the spirit of...
The authentication system based on identity, combined key and hardware encryption technology is implemented and tested. USB key and encryption cards are the encryption equipment at client terminal and authentication server. Software testing is carried through the whole developing process by our team. The authentication system with enough security, high-efficiency and low cost can provide secure access...
The fundamental characteristics of SOA, loose coupling and on-demand integration, enable organizations to seek more flexibility and responsiveness from their business IT systems. However, this brings challenges to assure QoS, especially availability, which should be considered in an integrated way in an SOA environment. Traditionally, availability is measured for each IT resource, but within SOA environments,...
It is very important to protect the data security in distributed Web applications. In this paper, a file content tamper-proofing system is proposed, which can effectively resist file content tampering, and prevents illegal information spreading. To meet the requirement of authentication speed, a fast authentication algorithm combines file length verification and HMAC is used in the file content tamper-proofing...
This paper describes the design, creation, and validation of an infrastructure for grasping. The infrastructure is premised on the ability to use large amounts of memory to store grasping algorithms in a database that can be applied broadly with any hand on any arm. This effort includes the development of a software architecture; a language syntax for configuration, shape-matching, and algorithms...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.