The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Presented paper deals with problems related to automatic recognition of expressive speech states. The analysis was performed using the Slovene part of the emotional speech corpus recorded under the international project Interface. The main focuses of presented emotional multi-level based feature extraction method are not the emotions itself but rather three expressive states: positive, negative and...
Images are widely used in web pages. However, most web images can only be viewed passively. Currently, it remains inconvenient for users to collect and save web images for further editing. The positioning of a certain image in web pages with a large number of images, such as the image search results, is also troublesome and time-wasting, especially for mobile devices with small screens. In this paper,...
Due to the context of pervasive computing with time-sensitive, the system scheduling management module must support real-time scheduling of context-aware. When a context information acting on the high-level application, may make other emergency contexts in a wait state which is not conducive to real-time systems and efficient implementation in ubiquitous computing environment. In order to solve this...
Placement of mesh nodes is an important and challenging issue in the research of wireless mesh networks (WMNs). It is important that the placement occurs after careful network planning, in order to minimize deployment cost while satisfying the requirements of network performance. In this paper, we study the problem of cost-effective node placement (CeNP) in WMNs. First of all, we define the objective...
A machining procedure covers several critical issues, which can be handled in a way of pervasive computing to build a whole environment with several parts to respectively fit different functionalities of machining. This paper proposes the construction of a pervasive environment for machining with necessary instruments to accomplish the correct drilling operations in the plates of the typical Shell-and-Tube...
In the pervasive environment, intelligent taxation systems are required to be adaptive to the changing environment and the volatile requirements of taxation rules. The business rule technique is effective in achieving these kinds of adaptation. In this paper, we present an OO Petri Net based Business Rule modeling method of Intelligent Taxation System. And the structure and grammar rules of the business...
In video surveillance there is an ever-growing demand for heavily distributed radio cooperating objects that Wireless Sensor Networks (WSNs) can satisfy. We present a preliminary study of an energy efficient multimodal WVSN using a main node deciding which camera to trigger based on the information from a Pyroelectric InfraRed (PIR) network. The evaluation of the proposed approach against the solution...
Cloud computing is a buzzword terminology applied to several nascent trends in the turbulent landscape of information technology. Computing in the "cloud" alludes to ubiquitous and inexhaustible on-demand IT resources accessible through the Internet. In the era of cloud computing, whole lifecycle of telecommunication services, especially service deployment, present new features. In this...
The mode of telecommunications network management is changing from 'network-centered' to 'subscriber-centered'. Aimed to improve subscribers' experience, proactive performance monitoring is elaborated to enable a fast fault correction by detecting anomalies designating performance degradation. In this paper, a novel anomaly detection approach is proposed taking advantage of time series prediction...
The emergence of location-aware mobile social networking applications (SNAs) has gained considerable prominence in ubiquitous computing. However, the weak designs of privacy protection result in more potential risks that users have to face. This paper presents a deep insight into the designs of privacy protection, especially from the perspective of location privacy. Three main potential risks and...
In this paper, we propose a context-aware system framework characteristic of two novel features. First, this framework is capable of modeling highly complex usage scenarios as a finite state machine while having transitions controlled by context information. And, this framework is designed with Augmented Reality capability as an integral component in its overall architecture to enable augmented interaction...
As the critical demand of market for greater product, how to ensure the minimum inventory of customers in the supply chain and to make a reasonable prediction on the customer needs are particularly essential. The neural network technology will be introduced to VMI customer demand prediction, by means of professional visualization software development, supply chain efficiency improvement and budget...
This study concentrated on real-time monitoring of a worker using wearable-sensor-based activity recognition. An inertial measurement unit was attached to both wrists of the worker and, by using acceleration and angle speed information, the activities performed by the worker were recognized. Online recognition was done using the sliding window method to divide the data into two-second intervals, and...
This paper begins with the uplink bottleneck problem which is common in campus network, relatively analyzes existed solutions of multiple uplinks, and passes an opinion of our own based on that. In order to utilize network resources more fully, and provide a good online working, studying, entertaining environment to the teachers and students, without adjusting the original network structure, we proposed...
Software as a Service (SaaS) is a new software delivery model. More and more companies are offering their software by following it. In contrast to earlier attempts of application service provisioning, the SaaS delivery model is focused on exploiting economies of scale by offering the same instance of an application to as many customers, i.e. supporting multi-tenants. As well understand, the delivery...
Opportunistic networking-forwarding messages in a disconnected mobile ad hoc network via any encountered nodes-offers a new mechanism for exploiting the mobile devices that many users already carry. However, forwarding messages in such a network is trapped by many particular challenges, and some protocols have contributed to solve them partly. In this paper, we propose heterogeneous content-aware...
When we have a complex system, it is important to have integrated devices which are independent or at least almost independent. This ensures the proper functioning of the system, although a device (unit) breaks down, which does not cause a chain reaction of errors or failures in the system or a break down of the whole system. In this article we will give an example of an existing system, which is...
As an emerging portable service platform, OSGi (Open Service Gateway Initiative) is taking a more and more important role in modern Service Oriented Architectures (SOA). In order to improve the capability of using distributed services in network-based OSGi applications, R-OSGi (Remote OSGi) is invented. However, network-based SOA applications are prone to the big impact on Quality of Service (QoS)...
Cloud Computing promises to deliver on an objective that building on compute and storage virtualization technologies, consumers are able to rent infrastructure "in the Cloud" as needed, deploy applications and store data, and access them via Web protocols on a pay-per-use basis. For application and data deployment in cloud, high availability and service level agreement must be satisfied...
This thesis presents a new object mapping algorithm C-SIEVE. It uses discrete data algorithm which can not only locate data object effectively, but also solves problems of object copies mapping. Experiments indicate that this algorithm is effective. It can accomplish object mapping efficient and balanced according to the load of storage devices, but also have a good performance for object recovery...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.