The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A method of rotation and scale invariant for texture analysis based on radon transform and wavelet transform is proposed in this paper. First, after a texture is standardized, it is projected into Radon domain by Radon transform. Then the standard variance of the projecting data are computed at each projecting directions, thus all standard variances constitute the feature set of the texture. The principal...
Enterprise computing is one of application fields of pervasive computing in manufacturing enterprises, which includes all aspects of enterprise business management via enterprise application integration within network environment. The study on manufacturing pattern is the basic work for enterprise computing. There are different attention contents for the enterprise management within different manufacturing...
The increasing user mobility and more and more powerful mobile devices changed the way services are used today, e.g., by taking the user's location into account. Indeed, service interaction models are also influenced by this development making the ad hoc composition of complementary functionalities possible. Here, particular challenges remain in the field of composing services that are hosted on different...
Aiming at the problem of apartment of model and system in software area, the reason of it is analyzed in this paper. And then an executable modeling language xKL(executable kernel language) based on MOF (meta object facility) is proposed to solve this problem. The model described by xKL has executability which lays a foundation from model to implement.
In pervasive computing environment, a challenge is how to exchange and share information on heterogeneous devices. The mediated-base approach of data integration provide a uniform view by creating the semantic relationship between sources and mediated schema. Since the manual match is unfeasible, many automatic approaches are developed. The probability of mappings should be considered inevitably during...
In pervasive computing environment, more personalized information can be achieved, and better user profile model can be built, thus personalized service can be realized. User profile is the critical aspect in personalized service of digital library. This paper proposes structure and mechanism of user profile in personalized service of digital library. The main problems during its construction are...
The advent of pervasive computing puts forward a new challenge for individual information research. With the explosion of information on the Internet, finding information relevant to a user's interest can be a time-consuming and tedious task. User interest learning plays an important role in information personalization. In this paper, a learning approach to acquire and update user interest is proposed...
Attribute based access control (ABAC) is a promising access control model for pervasive computing. XACML is recognized as an effective ABAC policy description method that can exactly describe the semantics of a policy. However, the description of a XACML policy is complex and it is difficult for users to compose such a policy, which seriously embarrasses the application of XACML. Aiming at this problem,...
In order to support process construction in wireless migrating workflow system, this paper presents an approach based on task components for resource-limited executing environment. First, we propose a business process construction model based on the idea that the process logic is separated from the process instances, and then abstract the process generation as a resource-constrained combinatorial...
Discovering the semantic relationships in knowledgebase is critical in information processing and knowledge management. Previous studies of discovering semantic relationships are mainly based on the information extraction using manually annotated training set and predefined semantic relationship patterns. In this paper, we propose a new method to automatically discover the semantic relationships between...
ULTRA GRIDSEC" is a high performance symmetric key cryptography schema used to increase the performance of symmetric key encryption algorithms like DES and TDES by decreasing their execution time and increasing their security by using compression and multithreading techniques and other enhancement points. In this paper we enhancing the performance of a "ULTRA GRIDSEC" by using a pure...
Formal description of network behavior is the important part in network management. But some problems have not yet to be adequately addressed are the semantic and behavioral aspects of composition in this domain. Therefore a formal description method was presented to network behavior. The method includes a simple formal language, and its semantic was described by CSP. The formal language has graphical...
Pervasive Computing, which is a hotspot of current computer applied research, has great potential for many applications, e.g. in education, health care, seamless traveler service, and transportation. Based on the analysis of existing public transportation systems which have already applied Radio Frequency Identification and bus auto-announce technology, this paper proposes a novel bus metered fare...
User modeling, often addressed as user profile and a simple way of capturing his/her preferences, plays key roles in marketing and personalized services in E-commerce. Due to its powerful knowledge representation and inference mechanism, ontology-based user modeling is emerging as a natural choice to represent knowledge about users in E-commerce context. This paper has presented ontology-based user...
One of the most promising ideas underlying Web services is service composition, that is, to provide new value added services by combining some pre-existing Web services. Although though service composition has received a great deal of attention tention and there are many solutions to the problem of composition, finding potential service compositions efficiently is still challenging because of the...
Middleware for the Pervasive Computing pays much attention to making the numerous computing entities cooperate to provide services for people. It needs to meet the demand of multiplatform, limited resources and the mobile computing. In the paper, a embedded middleware, emORB, is presented, and its architecture and design is discussed in detail including the reduction of ORB, the design of PDL, the...
The communication between agents has some special requirements. One of them is asynchronous communication. Used communication sequence process (CSP) to descript a model of agents communication with shared buffer channel. The essence of this model is very suitable for the multi-agents communication, so it is a base for our next step job. Based on the communication model, explored the distributed tasks...
We present a framework that supports the development of pervasive cross-media applications through a clean separation of interaction design and application programming. The approach is based on a novel concept of active components that provides a lightweight mechanism for linking physical and digital entities to services. We show how the development of cross-media applications can be simplified by...
In this paper, we present a framework of modeling concept sketch and sketching interaction based on context-awareness. And an operational model for sketching interface has been developed. This new model can guide and help new sketch-based interface development. From a software engineering point of view, the operational model can be implemented as a basic class with a set of standard operational functions...
This article mainly researches mining questions of association rules in temporal data. A fundamental structure for double association rules mining is proposed, based on temporal dataset, to define the main notion used in temporal knowledge discovery in a formal way. The relevant properties of the notion are proved. A data structure, hash table based on the double linked list will be used for the storage...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.