The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In recent years, the Linked Open Data (LOD) have been attracting attention in the world as the technology that can construct the semantic Web. The LOD are created based on the Resource Description Framework (RDF), and can link each of resources considering semantic relations. However, there are problems that the LOD do not have enough links between resources, and the LOD need a lot of time for creation...
In this work two approaches of backward chaining inference implementation were compared. The first approach uses a classical, goal driven inference running on the client device — the algorithm implemented within the KBExpertLib library was used. Inference was performed on a rule base buffered in memory structures. The second approach involves implementing inference as a stored procedure, run in the...
The increasing complexity of IT environments dictates the usage of intelligent automation driven by cognitive technologies, aiming at providing higher quality and more complex services. Inspired by cognitive computing, an integrated framework is proposed for a problem resolution. In order to improve the efficiency of the problem resolution process, it is crucial to formalize problem records and discover...
Automated testing in massively multi-player on-line role playing games (MMORPG) is a challenging task due to the complexity of such games and their large numbers of mutually distributed but interacting components. Large-scale multi-agent systems (LSMAS) provide us with a suitable formalism to address such complex problems. Herein a first step towards an automated game testing environment, built for...
Software Defined Security (SDS), which provides a flexible and centralized security solution, attracts many researchers to study the details of this conception. In this paper, a security controller-based SDS (SC-SDS) architecture is presented, in which a modularized security controller is placed in the control plane and interacts with other components through APIs. The security controller completes...
An application of knowledge management system for tourism management is presented. The knowledge system can be featured as an online web application which is capable of stores and retrieves knowledge, improves collaboration, locates knowledge sources, mines repositories for hidden knowledge, captures and uses knowledge. The knowledge management system is viewed as an effective solution to get out...
The purpose of this research is to develop the case-based system for detecting the skin cancer by utilizing the information retrieved from users. Conversational case-based reasoning guides users to describe their problem through the question-dialog procedure. DePicT is a knowledge based approach to Detect and Predict diseases using image classification and Text Information from patient health records...
This work describes the integration of Augmented Reality and knowledge-based system applied to the innovation of the classic identification cards used in health system. Initial results are shown regarding the augmentation of physical elements (like cards, credentials, dogtags, etcetera) displaying virtual information and categorization based on the medical records of a person, using a knowledge-based...
As Communication Service Providers (CSPs) adopt the Network Function Virtualization (NFV) paradigm they need to transition their network function capacity to a virtualized infrastructure with different Network Functions (NFs) running on a set of heterogeneous servers. This paper describes a novel technique for allocating server resources (compute, storage and network) for a given set of Virtual Network...
Currently, new research questions arise because of the paradigms of Industry 4.0, which aims to bring together mechatronic systems and information technologies. Its general idea is to create an Internet of Things consisting of communicating machines, which implement concepts for self-configuration, -diagnosis, and -optimisation. The realisation of these functionalities is in focus of current research...
This paper presents the Angry-HEX artificial intelligent agent that participated in the 2013 and 2014 <bold>Angry Birds</bold> Artificial Intelligence Competitions. The agent has been developed in the context of a joint project between the University of Calabria (UniCal) and the Vienna University of Technology (TU Vienna). The specific issues that arise when introducing artificial intelligence...
This paper presents a system that works as an assistant for students in their learning process. The assistant system has two main parts: an Android application and a server platform. The Android application is a chatterbot (i.e., an agent intended to conduct a conversation in natural language with a human being) based on AIML, one of the more successful languages for developing conversational agents...
As Internet of Things advances, various smart objects and services permeate in our living environment. Due to their dynamic join/leave behaviors, service discovery protocols (SDPs) have been proposed. As new SDPs are introduced and legacy SDPs evolve, the incompatible islands of smart objects inevitably arise. To solve this issue, many research works are presented, but they cannot accommodate a new...
To maintain acceptable levels of security, organizations must manage their IT assets and related vulnerabilities. However, this can be a considerable burden because their resources are often limited. This paper introduces a technique and system architecture that monitor the vulnerability of the IT assets on an organization's administrative networks. We use open information and standardized, non-proprietary...
Nowadays, one of the directions of development of cloud systems is a creation of open platforms, providing resources for deploying third-party services. Users of such resources may deploy their own services, implemented with a wide range of technologies, receiving guaranteed performance and availability. To provide high availability and optimal utilization of hardware resources such platforms are...
Now-a-days the role of Information and Communication Technology (ICT) to develop and strengthen the sector of agriculture has become seemingly promising. ICT can help a farmer to get relevant information regarding different agricultural information like crop, diseases, marketing, etc. Also, studies have depicted that mobile phone penetration in Nepal have increased in the recent years. This have opened...
The increase in the prevalence of allergic diseases requires the active implementation of the capabilities of modern technology in the process of providing health care for children with asthma. The paper describes the system for remote monitoring for asthma patients receiving treatment atthe Scientific Center of Children Health. We describe the method of estimating of the state of patients, the method...
Knowledge is integral to an intelligent system. However, constructing a knowledge base often involves great cost and substantial effort on the part of human experts in the target domain. In this paper, we present an approach that harnesses the power of casual users to construct the knowledge base. The users answer a simple series of questions and, by aggregating their answers, we obtain the information...
Increasingly, applications are moving into the cloud, which is actually supported by large-scale data centres on the ground. These data centres are complex systems to manage and centralized solutions might not be able to meet the required scale nor make an efficient use of their networks. In this paper, we propose a hierarchical approach to dynamic resource management in data centres, where we leverage...
Personalization is omnipresent everywhere in today's modern world applications. It is primarily employed to improve user experience by adapting and learning from the patterns and information extracted from the user. There are various methods of making a system learn from the user behaviour. This paper gives a review of some of the techniques used for user profiling and personalisation systems. The...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.