The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the scientist's community one of the most vital challenges is the reproducibility of a workflow execution. The necessary parameters of the execution (we call them descriptors) can be external which depend on for example the computing infrastructure (grids, clusters and clouds), on third party resources or it can be internal which belong to the code of the workflow such as variables. Consequently,...
Data Mining is the process of identifying new patterns, insights in data and knowledge discovery, and is at the intersection of multiple research areas, including Machine Learning, Statistics, Pattern Recognition, Databases, and Visualization. With the maturity of databases and constant improvements in computational speed, data mining algorithms that were too expensive to execute are now within reach...
Electronic business course at Zagreb School of Economics and Managements (higher education economy faculty) is highly practical course with aim to educate students how to use variety of open source information systems for online business purposes. As final project students have to use open source content management system and implement their own business idea using principles taught in theoretical...
E-learning is an integral part of smart education. There are many e-learning systems that are widely available to educational institutions. The challenge is to easily integrate the e-learning system into a smart educational environment based on the requirements of the users. The e-learning services rely on a software system that allows access to all the materials for the educational process and makes...
The exploration and analysis of large databases represents a subject of research efforts for several industries. In this paper the case of production of flat metals, where advanced optimization technologies based on mathematical modeling are integrated in the automation architecture together with databases, is discussed: in particular the use of MATLAB as an offline tool for model analysis and calibration...
Implementation of an MES (Manufacturing Execution System) in a large scale steel plant raises several technical and organizational challenges. Danieli Automation summarizes in this article its experience starting from the initial stages of the project when the overall approach was defined: from dividing the implementation in steps down to analyze the overall architecture and functionalities to be...
The advent of inexpensive RGB-D sensors pioneered by the original Kinect sensor, has paved the way for a lot of innovations in computer and robot vision applications. In this article, we propose a system which uses the new Kinect 2 sensor in a medical application for the purpose of detection and 3D reconstruction of chronic wounds. Wound detection is based on a per block classification of wound tissue...
Affective computing opens a new area of research in computer science with the aim to improve the way how humans and machines interact. Recognition of human emotions by machines is becoming a significant focus in recent research in different disciplines related to information sciences and Human-Computer Interaction (HCI). In particular, emotion recognition in human speech is important, as it is the...
Twitter is currently the most popular tool for social interaction and real-time information exchange. Outreach and importance of individual accounts is measured by the number of their followers. The aim of this paper is to investigate the applicability and usefulness of corpora containing textual and visual information for the purpose of machine observation of Twitter activities. The results in the...
Age classification and estimation is an important task in classifying face images. One way to classify humans by age is by using two-dimensional images of people's faces. In order to create an accurate algorithm for age classification, appropriate datasets for training and testing are required. A small number of datasets are available for age estimation and classification based on images of human...
Content management systems (CMS) are information systems designed dominantly for managing different types of publicly available web content although they could be used for various other purposes. Today, CMS open source solutions are one of the most popular platforms for developing web sites, portals, web shops and other publicly available content and services. Main problem in this area is lack of...
Measuring strength of passwords is important in order to ensure the security of password-based authentication. Since passwords are still the most widely used method for authentication, there has been a considerable research on passwords and password strength. Yet, studies related to password still lack of access to plaintext passwords that are created under a specific password policy. Our research...
The terms of logistic management in organizations and the use of information and telecommunication technologies in support of the management are inextricably intertwined. The fundamental benefit which business systems obtain by using logistics business information systems is the optimization of business processes. By using the logistics information systems the focus is shifted to those business processes...
The network society and the complexity of the changes that have affected digital economy is legally accompanied by the remains and traces of the past, including the addition of positive encountered numerous negative companions. This common, and now generally accepted phrase, encompasses the totality of criminal acts unauthorized affects the use, integrity and availability of technical, software or...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.