The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The right-handed single-stranded beta-helix proteins characterized as virulence factors, allergens and toxins are threat to human health. Identification of these proteins from primary sequence is of great importance in bio-medicine and medical microbiology. In this paper, support vector machine (SVM) has been used to predict the presence of beta-helix fold in protein sequences using dipeptide composition...
It is inherently allowed that a user engages in more than one activity at the same time. The interweave of multiple activities makes an activity have more than two states, i.e. the paused state in addition to active and inactive states and move from one state to another. In this paper, we propose an activity lifecycle management scheme that enables a system to adapt the services which help a user...
This paper proposes a new approach to the optical proximity correction (OPC) method which reduces OPC calculation loads by employing an optimization method. OPC is a method of correcting for a mask pattern to improve the fidelity of an image pattern on a silicon wafer. However, conventional OPC calculations have become increasingly complex as the size of semiconductor devices becomes even smaller...
We have developed the method of a robot programming by using frame like knowledge base in order to compose the multi-modal human-robot interface. The concept of object oriented programming, the case grammar, and the Conceptual Dependency theory (CD theory) is introduced into this knowledge base in order that the total system can be easily and naturally composed. In this system, a robot can interact...
As the information technology evolves, more and more organizations rely on software systems to automate their business activities and automated business process is recognized as a core competency in organization. There are many techniques for modeling business activities and bridging business activities and system models. But these methods focus on single system development only and, therefore, when...
The user requirements of many web-based services are dynamically and continuously changing even during the service time itself. For that reason, web service companies always keep trying to satisfy users' needs from the market. Requirements elicitation, among the processes in requirements engineering, is a process requiring high costs and time. Thus, a company planning to conduct the process wants...
This paper proposes a novel method for vector image segmentation as the first step in developing a content-based vector image retrieval system. Structure of a vector image can be represented as a tree in which each node is assigned each object region in the vector image and each link represents the inclusion relation between two object regions. In order to generate such trees, the method separates...
A content-based watermarking strategy relying on an affine invariant embedding domain obtained from affine invariant interest points and a watermark insertion via quantization index modulation is analyzed, namely the effects on the performance of the whole watermarking scheme carried out by the presence or absence of interpolation operations during the design of the invariant domain.
Recent malicious attempts are intended to get financial benefits through a large pool of compromised hosts, which are called software robots or simply "bots." A group of bots, referred to as a botnet, is remotely controllable by a server and can be used for sending spam mails, stealing personal information, and launching DDoS attacks. Growing popularity of botnets compels to find proper...
This research describes development of recognition algorithm for topographic features such as impact craters, wrinkle ridges, and grabens on Digital Terrain Models of SELENE (SELenological and Engineering Explorer). Because SELENE provides massive volumes of lunar data, its data sets require semi-automatic labor saving analysis. We try to recognize circular and linear topographic features with General...
Automation for the motion analysis of fragments has been requested in a field of collision and destruction experiments. While extracting and tracking of targeted fragments have been analyzed manually in a sequence of images and movie, we substituted arrangements of 2DCDP (two dimensional continuous dynamic programming) for that manual works. Four large fragments in test data were succeeded in handling...
This paper considers different methods and approaches for improving power plant inspection procedures through innovative technological means. Main objectives are to provide timely, context dependent assistance and advice to human inspectors of power plant facilities, to minimize human errors and to increase inspection efficiency and reliability. A solution based on spatial awareness methods for inspector...
As the size of today's high performance computers continue to grow, node failures in these computers are becoming frequent events. Although checkpoint is the typical technique to tolerate such failures, it often introduces a considerable overhead and has shown poor scalability on today's large scale systems. In this paper we defined a new term called fault tolerant parallel algorithm which means that...
This paper proposes the new approach to deal with the classification problems by employing the sociological concept of "in-group " and "out-group. " The main idea of the concept is about the behavior of in-group members that try to unite with their own group as much as possible, and at the same time maintain social distance from the out-group members. The performance of the proposed...
The problem of materialized view selection has been long researched, and many approaches have been proposed to deal with this issue. However, all the methods proposed to date strive toward improving the overall query performance, instead of being user-oriented. In this paper, we propose a new user-oriented method, called SOMES (user- oriented materialized view selection), aiming at achieving better...
The issue of query contention and scalability is the most difficult issue facing organizations deploying real-time data warehouse solutions. The contention between complex selects and continuous inserts tends to severely limit the scalability of the data warehouses. In this paper, we present a new method called dynamic multi-level caches, to effectively deal with the problem of query contention and...
To clarify the internal structure of the moon is a key role to unveil the process of birth of the moon and the earth. For this purpose, Apollo astronauts brought seismometers to the moon and more than ten thousand of seismic events are recorded. Now, to utilize these data more usefully, I developed the database of the lunar earthquake (moonquake). This database consists of formatted data, access library...
As soon as many users and applications work concurrently on valid XML documents, transaction management for valid XML becomes an important issue. A fundamental problem is the detection of conflicts between operations. The detection of conflicts between operations is very interesting in query optimization for a query compiler and concurrency for a transaction manager. In this paper, we studies the...
An active XML (AXMLfor short) document is an XML document where some of the data is given explicitly while other parts are defined only intentionally by means of embedded calls to Web services. When one of these calls is invoked, its results will be returned to enrich the original document. AXML schema defines the specification that AXML documents should conform. Containment checking for AXML schemas...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.