The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In email networks, user behaviors affect the way emails are sent and replied. While knowing these user behaviors can help to create more intelligent email services, there has not been much research into mining these behaviors. In this paper, we investigate user engagingness and responsiveness as two interaction behaviors that give us useful insights into how users email one another. Engaging users...
Large amount of social (communication) data have been generated in many applications for personal communication purpose. However, these data have not been used well currently. In this paper, we will introduce a methodology to collect and analyze those personal data, and by this for extracting social networks from the data. A system architecture will also be presented and implemented to show how the...
Sensors are being deployed to improve border security generating enormous collections of data and databases. Unfortunately these sensors can respond to a variety of stimuli, sometimes reacting to meaningful events and sometimes triggered by random events which are considered false alarms. The intent of this project is to supplement human intelligence in a sensor network framework that can assist in...
Massive multiuser virtual environments (MMVEs) and the idea of a global scale 3D Web have grown popular in recent years. While commercial precursors of such environments for the most part rely on centralized client/server architectures, it is commonly accepted that a global scale virtual online world can only be realized in a distributed fashion. Within the HyperVerse project, we have developed and...
E-mail systems are some of the most admired Internet-based applications today. They enable users to send and receive e-mail messages between each other both from inside and outside the local area network. The simple mail transfer protocol (SMTP) is a transportation protocol used to transfer Email messages over the Internet. When the e-mail server sends email messages among each other or from the clients...
It has been shown previously that glucocorticoids exert a dual mechanism of action, meaning cytotoxic and mitogenic as well as mitogenic and anti-apoptotic, in a dose-dependent manner on CCRF-CEM cells at 72 h. Early gene expression response suggested also a dose-dependent dual mechanism of action of prednisolone which is apparently reflected on cell state upon 72 h of treatment. The present work...
We analyze the asymptotic variance of distributed consensus algorithms over large-scale switching random networks. Our analysis is focused on consensus algorithms over large, i.i.d., and directed Erdo??s-Re??nyi random graphs. We assume that every agent can communicate with any other agent with some fixed probability c/n, where c is the expected number of neighbors of each agent and n is the size...
In the last few years, several Web-based conference management systems have been developed and used by many international conferences. However, almost all of them were built on stand-alone Web servers. Their fault tolerance, scalability and ability of responding to dispersed users are limited. Aimed at addressing these problems, this paper presents a novel approach for Web-based conference management...
Due to the difference between Web page and plain text document, the concept of Web object is introduced in this paper. Besides, the supposed state transition and the emission symbol conditions are improved based on Pseudo two dimension hidden Markov model (P2D-HMM), and a novel web objects information extraction method is proposed. Finally, through an example, it shows that the proposed method has...
Human-computer interaction (HCI) in embedded system is an issue concerned by many people. From the engineering point of view, by analyzing the scenario of embedded system, we propose the use of multi-list for HCI in embedded system. We have set up the model and implemented the system. Our engineering practice shows the effectiveness of this scheme.
Network managers of Higher Educational Institutes, are well aware of general information security issues, related to campus networks. There are well developed security metrics, giving exhaustive list of security controls, required to mitigate different risks. Accordingly, various security measures and technologies are being deployed. However, at present, not enough attention is being paid on measuring...
Let Rn be a n-dimension Euclidean space (n ges 2), D sub Rn is a proper sub-domain of Rn, for x, y isinD, 0 < c < 1, kD(x, y) > log(1/(1-c)). There is a quasi-conformal homomorphism F:Rn rarr Rn with the following properties: (1) kD (x,F(y)) les log(1/(1-c)); (2) F:Rn\D rarr Rn\D is the identity; (3) log kD(F) les (1/c)kD(x, y).
The purpose of this paper is to answer a basic problem of finite element method that is how do the elements which have determined shapes form the element grid which has determined structure. In order to study this problem, a method called chain-making and chain-coupling is established. Through this method the qualified relationships between the geometric structures of the element grid and the geometric...
An advance in today's information communication technology (ICT) has opened an opportunity for healthcare industry to enhance and improve the quality of their services. Decision makers are now able to make their decisions accurately and precisely with the helps of computer-based decision support system. Sharing of patient's medical records is not a new approach. From paper based format to electronic...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.