The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Automatic photo cropping is an important tool for improving visual quality of digital photos without resorting to tedious manual selection. Traditionally, photo cropping is accomplished by determining the best proposal window through visual quality assessment or saliency detection. In essence, the performance of an image cropper highly depends on the ability to correctly rank a number of visually...
In this paper we provide an intelligent and convenient shopping cart, Intelligent Shopping Assistant System (ISAS). With ISAS, customers can concentrate on what he/she has to buy, and do not be bothered where he/she has to buy or it is want to buy. In contrast to conventional shopping cart, two modes of autonomous functions are added to ISAS in order to reduce the labor of customers for pushing goods...
With the progressive development of information and communication technologies, we are now forming a new world called hyperworld that is composed by the cyber world and the physical world with various digital explosions including data, connectivity, service and intelligence. Therefore, Cyber-I has been proposed, which is a real individual's counterpart in cyberspace, and is to create a unique, digital,...
The majority of computational work on emotion in music concentrates on developing machine learning methodologies to build new, more accurate prediction systems, and usually relies on generic acoustic features. Relatively less effort has been put to the development and analysis of features that are particularly suited for the task. The contribution of this paper is twofold. First, the paper proposes...
On-line analytical processing (OLAP) provides analysis of multi-dimensional data stored in a database and achieves great success in many applications such as sales, marketing, financial data analysis. OLAP operation is a dominant part of data analysis especially when addressing a large amount of data. With the emergence of the MapReduce paradigm and cloud technology, OLAP operation can be processed...
This study proposes a real-time abnormal heartbeat detection and emergency system for helping users to obtain immediate rescue and treatment in a short period of time when they suffer from severe heart disease, for example, acute myocardial infarction (MI) or fatal malignant arrhythmia. The proposed system can detect abnormal heartbeat waveforms and automatically send out emergency signals. The detection...
Private query is a kind of cryptographic protocols to protect both users’ privacies in their communication. For instance, Alice wants to buy one item from Bob’s database. The aim of private query is to ensure that Alice can get only one item from Bob, and simultaneously, Bob cannot know which one was taken by Alice. In pursuing high security and efficiency, some quantum private query protocols were...
Radio Frequency Identification (RFID) is a radio communication technique. It identifies specific targets and acquires related data from the backend database by using radio frequency signal and no physical touch needed. Because of its advantages of low cost and remote identity recognition, RFID has been widely used in many applications. In 2011, Bassil et al. proposed an RFID authentication protocol...
In this paper, we propose an efficient building identification algorithm to allow users to take a picture by mobile phones and get the building information in few seconds. First, we use the GPS and compass information to reduce the search area. Next, we use the concept of the flood fill algorithm to cutout the building parts in the picture. Then, by extracting SIFT features, we can calculate the similarities...
It is a great challenge for face recognition with single training sample per person. In this paper, we try to propose a new algorithm based sparse representation to solve this problem. The algorithm takes the two-dimensional training samples as the training set directly rather than image vectors. So we can obtain the dictionary of sparse representation only using one sample. The proposed algorithm...
In recent years, tagging methods have been widely used on the Web for multimedia search and recommendation systems. Social tags are the keywords annotated by users to the multimedia objects. These tags contain the information which allows multimedia objects to be located and classified. Unfortunately, irrelevant information and noise are frequently included in such tags, especially when we use social...
Assistant Decision System for Optimization of Private Communication Network is a software tool used to optimize the private network and provide decision-making advice for the network maintenance technicians and network managers. The software tool can provide scientific decision basis for the optimization (or planning), construction, operation administration and maintenance (OAM) of the private network...
This paper proposed to solve the massive meteorological data from multiple systems integration and sharing between meteorological data interoperability transformation model. The model is based on the characteristics of the meteorological data, data warehouse, metadata and other technical research and design, using the model to standardize formats and effective management of a variety of multi-source...
Security countermeasures help ensure information security: confidentiality, integrity and availability(CIA), by mitigating possible risks associated with the security event. Due to the fact, that it is often difficult to measure such an impact quantitatively, it is also difficult to deploy appropriate security countermeasures. In this paper, we demonstrate a model of quantitative risk analysis, where...
Identifying transcription factor binding sites (TFBSs) is crucial for understanding the mechanism of transcriptional regulation. It is known that transcription factors (TFs) often cooperate to regulate genes. While traditional approaches can be used to discover binding motifs of a group of co-regulated genes, they often fail to accurately assign motifs to the corresponding TFs. Here, we consider two...
In this paper, a more subjective Synthesis Evaluation algorithm is studied, in which hierarchy of criteria is generated through analysing the internal structure of research data by using exploratory factor analysis, weights are determined by using confirmatory factor analysis and with the application of TFN, more reliable judgements and reasonable evaluation results will be acquired. Furthermore,...
Web information systems are now widely used. These systems generally provide specific service in accordance with users' identities. To use these services, users are required to conduct identity authentication separately when logging in different web applications and systems. For the sake of security and access control, it is infeasible to use a unique common identifier and password for all systems...
Geographic information systems (GIS) are now widely used. WebGIS, pushed by keeping increasing information resources, enriches functions and content of GIS under WWW framework. We propose a mobile agent-based middleware for WebGIS, called M4WebGIS, which consists of a group of coordinated agents for users to retrieve geographic information. Function logic of server part, processing logic of client...
In this paper, the problem of constraint-based pattern discovery is investigated. By allowing more user-specified constraints other than traditional rule measurements, e.g., minimum support and confidence, research work on this topic endeavor to reflect real interest of analysts and relief them from the overabundance of rules. Surprisingly very little research has been conducted to deal with multiple...
As an important international competitiveness indicator, real effective exchange rates based on unit labor costs can provide a reliable gauge of price competitiveness about the relative profitability of traded goods in manufacturing. This paper uses reliable data of trade and output data in manufacturing of 21 countries from 1989 to 2003, and adopts time-varying weights, which can reflect the rapidly...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.