Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Tujia brocade (Xi lan ka pu) is a kind of traditional handcraft brocade which was listed in the first batch of non-material cultural heritage of China. It has become a popular trend to promote non-material cultural heritage with digital technology. Personalization recommendation for Tujia brocade culture resources could push new knowledge and something the user interested in, which could improve the...
Conventionally, the modules of SCADA system such as Message broker, Human Machine Interface (HMI) Building Environment, Database Manager and drivers including the SCADA HMI are developed in compiler-based languages such as C/C++. Thus, the person who develops the SCADA HMI has to be well versed with that language whose learning curve is steep. Every time the user has to rely on the SCADA engineer...
Accelerating relational databases in general and SQL in particular has become an important topic given thechallenges arising from large data collections and increasinglycomplex workloads. Most existing work, however, has beenfocused on either accelerating a single operator (e.g., a join) orin data reduction along the data path (e.g., from disk to CPU). In this paper we focus instead on the system...
Most data scientists use nowadays functional or semi-functional languages like SQL, Scala or R to treat data, obtained directly from databases. Such process requires to fetch data, process it, then store again, and such process tends to be done outside the DB, in often complex data-flows. Recently, database service providers have decided to integrate "R-as-a-Service" in their DB solutions...
Creating autonomy for maritime vehicles that allows multiple developers and users to quickly integrate and develop capabilities is a difficult process. Multiple examples of autonomy exist; however, creating an environment that is modular and expandable is not often a goal of many autonomous systems. This work presents an advanced Autonomous Vehicle Architecture (AVA) for maritime systems that was...
Recently, scripting languages are becoming popular as languages to develop server-side applications. Modern JavaScript compilers significantly optimize JavaScript code, but their main targets are client-side Web applications. In this paper, we characterize the runtime behaviors of server workloads on an emerging JavaScript server-side framework, Node.js, comparing it to client-side JavaScript code...
There has been a recent increasing demand to digitize Arabic books and documents, due to the fact that digital books do not lose quality over time, and can be easily sustained. Meanwhile, the number of Arabic-speaking Internet users is increasing. We propose AreCAPTCHA, a system that digitizes Arabic text by outsourcing it to native Arabic speakers, while offering protective measures to online web...
This paper describes the architectural redesign of a distributed execution framework called State Machine Based Distributed System which uses a state machine-based representation of processes in order to reduce the applications development time while providing safety and reliability. Initially the system has been built on top of the .Net Framework employing static programming techniques and made use...
Current-day programming languages include constructs to embed meta-data in a program's source code in the form of annotations. More than mere documentation, these annotations are used in modern frameworks to map source-level entities to domain-specific ones. A common example being the Hibernate Object-Relational Mapping framework that relies on annotations to declare persistence configurations. While...
It is the basic way to enhance service ability to predict customer behavior in the process of E-commerce activities. Through applying temporal description logic (TL-ALCF) in describing the rules of time-dependent customer behavior change, this article puts forward a method in acquiring algorithms through improving the temporal correlated rules of the FP-tree(frequent pattern tree), and further constructs...
When developing video-based surveillance systems the developer faces a highly complex task due to the wide range of application domains where video-based surveillance systems are applied. As the number of domains of application increases, so does the level of variability of non-functional and functional properties that needs to be managed by video-based surveillance systems. The traditional response...
This paper proposes a code security inspection system based on the Subversion, which aims to avoid the submission of risk codes that contain vulnerabilities such as SQL injection, XSS (Cross Site Script) attacks and CSRF (Cross-site request forgery) to SVN repositories. In the proposed system, the submitted code will be scanned and checked and then the results will be sent to the SQA (Software Quality...
This paper applied Multi-Agent to E-commerce personalized Recommender System, and designed E-commerce personalized Recommender System based on Multi-Agent, namely, MAPRS. Off-line recommendation and on-line hybrid recommendation are used to construct the core recommender model under the intelligent control. The paper presents the function and design ideas of various components of the system.
This paper presents a tool called SysFlow Workflow Engine (SWE) that is being developed to execute a domain workflow defined using SysML's Activity Diagram. The paper also describes extensions added to the SysML semantics to make them SWE executable. SWE focuses on grid computing, cyberinfrastructure and related domains; however support for other domains can be easily added. SWE aims to provide a...
In this paper, a multi-sites scheme will be proposed which with many wonderful characters: dynamic, cost-effective, efficient and Single Sign-On. The proposed scheme can be used in universities and government which usually need more than one website to support service. In the multi-sites system, resources will be sharing between every sub-site and the management of every sub-site will be relatively...
Traditionally, a standard operational routine is applied in the food distribution centre (DC) for performing inventory receiving activities. However, with the growth of customized service, different quality checking or value-added activities are requested to perform upon the receiving process. Standard operational routine can no longer be applied as different work stations are needed to involve in...
Service-Oriented Computing has recently received a lot of attention from both academia and industry. However, current service-oriented solutions are often not as dynamic and adaptable as intended because the publish-find-bind-execute cycle of the Service-Oriented Architecture triangle is not entirely realized. In this paper, we highlight some issues of current web service technologies, with a special...
Current many information retrieval methods are based on purely keywords for representing the user needs. One of the main problems with this method is that it does not formally capture the explicit meaning of a keywords query, and ignores the documents that may be different in content but related with them. To improve the precision of the information retrieval, this paper proposes a hybrid method for...
Anomaly-based techniques were exploited successfully to implement protection mechanisms for various systems. Recently, these approaches have been ported to the web domain under the name of "web application anomaly detectors" (or firewalls) with promising results. In particular, those capable of automatically building specifications, or models, of the protected application by observing its...
Bayesian networks (BNs) are probabilistic graphical models that are widely used for building diagnosis- and decision-support expert systems. The construction of BNs with the help of human experts is a difficult and time consuming task, which is prone to errors and omissions especially when the problems are very complicated. Learning the structure of a Bayesian network model and causal relations from...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.