The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Building digital library applications is often a search for an applicable and adequate data or document model as well as for software tools which meets the requirements. Especially in digital archives, there are several data and document models to be considered. Unfortunately, there is no one-size-fits-all document model or system. For each application, the requirements and properties of a project...
This article proposes a novel data model for text corpora and discusses the issues on corpus query. First, a formalized definition of the corpus data is presented. Second, a data model is proposed in terms of the relational model, which is also proved to be complete. On this basis, we extend the query semantics of the traditional corpus query that generates KWIC (Keyword in Context) concordances and...
Collaborative e-Science applications often need to manage large numbers of user identities, profiles, and groups. However, developing and maintaining such capabilities is often challenging given the plethora of security protocols available and requirements for scalable, robust, and highly available implementations. Globus Nexus is a professionally hosted Platform-as-a-Service that provides these capabilities...
Management of ship designing is difficult because of the complexity in modeling of the process and large amounts of data throughout the process. Though existing technologies of BPMN can solve the first problem, BPMN does not provide sufficient supports on dealing with complex dependencies in the process, e.g., storage and search problems of correlated data with “many to many” relations. In this paper,...
The requirement and characteristic in Computer Generated Forces behavior modeling were analyzed. From the design concept of American OneSAF system, a method for behavior modeling based on composability was proposed and the formalization description of behavior was given. Moreover, the Behavior Modeling Composer Tool was developed based on this method to assist the behavior modeling. Finally, an application...
Boundary effect is one of the most concernful problems in analysis of geomagnetic anomaly field data, it introduces great error in analytical result and results in serious thread in engineering practice. This problem reflects on many aspects, such as reference map preparation, multi-resolution decomposition, etc. Improved bi-dimensional empirical mode decomposition (BEMD) is firstly proposed and used...
This paper concerns the conversion of the register schema of the International Hydrographic Organization (IHO)'s S-100 standard to a database schema for implementation of a Feature Concept Dictionary (FCD) register. The FCD register, one of the registers of the IHO Geographic Information (GI) registry, maintains independent sets of feature, attribute, enumerated value, and information type definitions...
Nowadays we need more services and more security in hi-tech environment for accessing the data from DW because data which is stored in Data Warehouse is crucial and sensitive. These sensitive data is used by decision maker to make the strategies decision to analyze the status and development of an origination. The data of Data Warehouse can easily access by an unauthorized user through unfair means...
This paper deals how genetic programming can be used for record de-duplication. Many systems rely on the data integrity for offering high quality services that may be affected by the existence of near-replicas, quasi-replicas, or replicas entries in their repositories. So, there has been a huge effort from private and public organizations for developing effective methods for removing duplicates from...
Managing variability in a software family is crucial to software product line engineering. The existing variability management techniques, however do not particularly address database design in the context of information systems poduct lines. This paper presents a practical approach to handle variability in database design for families of software. We use the technique of Delta-Oriented Programming...
In distributed business process support environments, process interference from multiple stakeholders may cause erroneous process outcomes. Existing solutions to detect and correct interference at runtime employ formal verification and the automatic generation of intervention processes at runtime. However, these solutions are limited in their generality: they cannot cope with interference that occurs...
To facilitate reporting and approval of university scientific research and statistical research achievements using for performance evaluation, a research model for reporting and approval has been established according to rules and regulations of performance evaluation after software s of the same type had been investigation, On this basis, reporting system of Scientific and Technological Achievements...
To study data dependencies over the data in schema transformation between data and metadata (DM-transformation for short), we define a general dependency form, namely pivot dependency (PD for short), which specifies constraints not only on values but also on names of attribute and relation. PDs, an extension to conventional FDs, formalize constraints in context that data and metadata are treated uniformly...
With the demand driven of Web-Based security and the privacy protection for sensitive information, the research on Fine-Grained mandatory access control for data resources in database is getting more attention. A Fine-Grained access control model with security label features (SL-FGAC) is proposed. The data resources are divided by granularity at least on column-level and record-level, where the record-level...
Based on the analysis of the process of data masking, the formal definition of data masking was presented and a generic data masking model was proposed from a theoretical point of view. The key problems and algorithms of the model were described and analyzed. The generic model can ensure similarity and availability of data without the leakage of sensitive data. So it has a strong practical value.
An approach to modeling and implementation of the CRIS software system for the University of Novi Sad (CRIS UNS) is described in this paper. CRIS UNS system is implemented with an intention to fulfill all specific requirements prescribed by rule books of the University of Novi Sad, Provincial Secretariat for Science and Technological Development of Autonomous Province of Vojvodina, and Ministry of...
The real facts in the education institute is the significant growth of the educational data. Basically the main goal of this paper is to propose a model that can be applied in data warehouse and data mining techniques to predict student performance (academic) in schools. Data mining techniques was used to extract the essential information from the data warehouse and to explore the relationships between...
Existing enterprise management information system database design commonly uses relational database management mode. This organization within the enterprise rich and diverse types of data is simplified as a two-dimensional table. This approach has limitation. In this paper, for the data organization, we propose to use category theory. Taking data as an object, by defining data relationships through...
Rice pests and diseases' occurrence and development are closely linked with climate change. Its' occurrence and outbreak have a certain similarity on weather conditions. In order to improve the prevention and control level of pests and diseases of rice, this paper establishes rice pests and diseases warning case based reasoning using data mining technology and implemented forecast adopting database...
The decisions support Systems are based on decision technologies enabling organizations to make better use of their data flow analysis by simplifying them. Indeed, OLAP (On Line Analytical Processing) tools such as decisional technology, offer the possibility of archiving, management, analysis and multidimensional modeling. However, they are limited in the consideration of the multicriteria and quality...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.