The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Mathematical Models Database (MMD) is an online repository of mathematical models that can be easily used for research purposes, in teaching or in performing comparative tests. In a single free-of-charge, freely accessible Internet service all the data from the database is available with an expected (in its final form) several ready-to-use models, either purely mathematical or physics-based. Apart...
In order to assist the international popularization of Chinese traditional furniture culture, digital technology is introduced into cultural inheritance of traditional furniture. In this paper, it analyzes the database construction hierarchy of Chinese traditional furniture culture, and the digital conversion means, and thus to build modules of digital platform for Chinese traditional furniture culture...
Standardization of Internet protocols is usually a somewhat slow process. The reasons for this are manifold. Besides working out the protocol details, things like opposing stakeholder interests can prolong the consensus building process, new requirements might be introduced that require technical changes to the protocol, coordination across standards developing organizations (SDOs) might add delays...
With the rapid development of P2P network technology, the share of P2P Internet traffic is growing among the total internet traffic. Because of the complex structure of P2P network and its protocals is flexible, most of the traditional P2P simulations simulate P2P protocols. This paper presents a distributed P2P users' action simulation system which is able to flexibly configure the content and P2P...
Due to the development of Web technology, the research on Internet big data become more and more popular. Source tracing of event is a practical problem, however, research on event source from multi-source event data is rare. The incompleteness and incredibility of Internet data are challenging issues for detecting event source. In this paper, event is mapped into Network Public Opinion Data Space...
We review how the state of information technology has evolved for consumers vs. enterprises. We discuss some of the key challenges in enterprise search over structured data and suggest a few promising directions for the research community.
Scientific Information Systems (SIS) must move beyond data repositories and closed systems, to allow collaborations among different research disciplines, to include new types of data, to control data quality, and to enable semantic interoperability. Archaeological data include textual information, measures, sketches, photographies, 3D models, and a vast amount of links between data and historical...
The Internet of Things (IoT) offers the promise of integrating the digital world of the Internet with the physical world in which we live. But realizing this promise necessitates a systematic approach to integrating the sensors, actuators, and information on which they operate into the Internet we know today. This paper reports the design and development of an open community-oriented platform aiming...
This paper presents a version control method on multi-data objects from multi-devices. As various types of devices are widely used these days, most people use more than one kind of personal devices. Data are copied in multiple devices. However, it is hard to maintain consistency of the data in different devices and they are usually in different versions. In order to keep versions of multiple data...
The Internet of Things (IoT) consists of networked objects deployed worldwide and connected over the Internet. As a consequence, the major aspects of the IoT are represented by the heterogeneity and the huge number of the participating devices. These aspects also constitute the major challenges in the definition of a storage infrastructure suitable for IoT applications. In this paper, we introduce...
This paper examines the needs of emerging applications of High Performance Computing by the Humanities, Arts, and Social Sciences (HASS) disciplines and presents a vision for how the current academic HPC environment could be adapted to better serve this new class of “big data” research.
Delivering clinic information of patient at the point-of-care to physicians is critical to increase the quality of healthcare services, especially in emergency departments of hospitals. However, since that medical records and clinic data are distributed in different hospitals, it is sometimes difficult to collect clinic data of patient ubiquitously in case of urgency. In order to support the ubiquitous...
This paper introduces architecture for recommender system in domain of interlibrary services. The system works based on rules that was extracted from historical usage logs by the aid of data mining techniques. The paper also describes experimental results of pilot implementation of system for Ghadir project (resource sharing program in Iran). The pilot design and implementation phases were data gathering,...
A distributed framework for network forensics is presented in this paper, which tries to capture and store the digital evidence of the information leaking through the network. The architecture of the frame work is composed of the distributed data agents and the forensic center. The former can extract and compress the text of the content of all target network transmission, and the latter can locate...
Software systems used by health research centers in low-income countries typically need to be maintained and upgraded by individuals who do not have formal Computer Science education. Without careful planning, these data management software systems can require years of technical assistance from highly trained specialists. This work proposes software design strategies to minimize the complexity of...
For Savant application problems in the Internet of Things, we improved architecture of the Savant system, and achieved connection methods between reader and enterprise application client with Savant middleware technology. In this method, one or more label or sensor data streams flow through readers, we achieved compressed data packets, tag data filtering, integration and calculation with Savant. Through...
Scientists want to stay connected with everything that is new in scientific world, so they constantly read several online scientific magazines and newspapers. However, not all the subjects are of interest to everyone. Consequently, a user is forced to do a lot of browsing to find the articles which are important to him. This paper presents a scientific news aggregator, structured as an online magazine...
The Reliability Information Analysis Center (RIAC), under contract to the Defense Technical Information Center (DTIC), is developing and implementing a Web-Accessible Repository of Physics-based Models (WARP) database and website to centrally organize and make available information and data on physics-based models. In addition to providing access to available Physics-of-Failure (PoF) model information...
Internet has gained huge popularity over the last decade. It offers its users reliable, efficient and exciting online services. However, the users reveal a lot of their personal information by using these services. Websites that collect information state their practices with data in their privacy policies. However, it is difficult to ensure if the policies are enforced properly in their practices...
In this paper we propose a web log mining-based network user behavior analysis scheme, which plays an important role in network structure optimization and website server configuration. Based on clustering and regression model, we studied the network user's visit model in a university by analyzing a large amount of web log data which is collected from the university campus network. The data analyzing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.