The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The computational cost of querying for similar entities across ontologies is high since, in the worst case, every pair of entities will have to be considered. Therefore, links discovered during ontology alignment have been used to speed up querying across ontologies by following relatedness links to discover similar entities. We derive the computational complexity of querying across ontologies using...
Obstructive Sleep Apnea (OSA) is a breathing disorder that takes place during sleep, and has both short -- as well as long -- term consequences on patient's health. Real -- time monitoring for a patient can be carried out by making use of ElectroCardioGraphy (ECG) recordings. This paper introduces a methodology to forecast OSA events in the minutes following the current time instant. This is accomplished...
Dashboard cameras are increasingly used these days worldwide to record driving videos. These devices generate a vast amount of geo-referenced videos. However, most of this valuable data is lost due to loop recording. We present the City Recorder, a platform to provide street level video tours based on user-uploaded driving videos. We demonstrate here how to get a smooth route previewing experience...
With decades of investments, productivity has still continued to be a major issue for many digital circuit designers. One of the most important factors in improving productivity is design reuse, which current tools have yet to fully exploit. Reusing designs involve manually searching through repositories to find a design that meets the requirements of a project. This search can be tedious and often...
In this paper, we propose a novel approach to the problem of integrating code forges based on metadata (e.g., programming language, database, intended audience, operating system), similar software projects and software developers. We review the current problems in integrating metadata of different code forges and argue that Semantic Web technologies are suitable for representing and integrating knowledge...
The Harmonized Tariff Schedule for the classification of goods is a major determinant of customs duties and taxes. The basic HS Code is 6 digits long but can be extended according to the needs of the countries such as application of custom duties based on details of the product. Finding the correct, consistent, legally defensible HS Code is at the heart of Import Compliance. However finding the best...
Choosing and implementing technologies to extract value from big data are constant challenges for business and governments alike. This paper describes the design and implementation of a data mining tool to analyze the XML data of the U.S. university campus crimes. The main aim of this tool is to extract data stored in XML documents and to provide summarized information that can help students in determining...
Galaxies in the universe are commonly classified by their morphology, or visual appearance. The morphology of a galaxy tells us about the history and physical make-up of the galaxy. With the fast pace at which digital galaxy images are captured and a slow and biased human pattern recognition process, finding an efficient way to automate the galaxy image classification process can help advance the...
Web applications are a critical component of the security ecosystem as they are often the front door for many companies, as such, vulnerabilities in web applications allow hackers access to companies' private data, which contains consumers' private financial information. Web applications are, by their nature, available to everyone, at anytime, from anywhere, and this includes attackers. Therefore,...
In this paper we describe a new approach to creating rich, dynamic and customized maps for business or leisure activities, and demonstrate how the approach can be implemented through a prototype system. The approach is aimed at changing the way we map the world by providing a meaningful and personalized context that is augmented with the semantic web, social media integration and sentiment analysis...
Face recognition is one of the most active research topics in computer vision due to its potential applications in access control, authentication systems, law enforcement, human-machine interfaces, etc. Along with the development of face recognition algorithms, numerous face databases have been collected for face recognition evaluation. However, many of these databases are tailored to specific testing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.