The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
One of the important elements of successful parenting is care for children's safety, which includes parental knowledge about children's whereabouts, especially when a child has complex communication needs. In this context smartwatch may become a new aid not only for children but for all persons with complex communication needs, primary due to location and communication functions which can be efficiently...
Currently, the fast rate of population growth in urban areas are putting a big pressure in services supply. In order to fulfil citizens' demands, the cities' operations need to be intelligently optimized. All around the world cities are implementing smart cities initiatives to address this challenge. The development of smart initiatives implies the adoption of solutions that heavily rely on Information...
Communication technologies and approaches, such as mobile applications and social media enable individuals to share information with others ubiquitously. These voluntarily created data contain geographic information as well as user generated content such as images or text. Researchers and practitioners can gain highly valuable information by analysing and combining those different types of data. Earlier...
Knowledge-intensive business services (KIBS) such as management consulting, research and development, and IT outsourcing, have become a key component of most industrialized economies. As such, there has been a growing number of empirical studies investigating the way in which KIBS providers, clients, and partners collaboratively create value. These studies provide an important opportunity to improve...
Smart homes have gained attraction for several years in people's daily lives and are still increasing. They provide a fruitful foundation for the creation of social network services as they escort habits and regular activities of people at home, along their way or even at work. Smart homes and their current development stage are not only able to support people by intelligent functionality but also...
Structuring content has a positive effect on students' metacognitive skills. Our work in designing content is to approach the use of gaze tracking techniques in adaptive learning strategy that implicates structuring a learning content that will insure the adaptability in real time, taking into account the profile of each learner in the learning process. We present in this paper a learning content...
A Unit Selection based Synthesis (USS) system selects appropriate units from the inventory based on target cost and join cost. For a syllable based USS system, it is not practically feasible to cover all possible syllables in a language with all possible contexts. Hence, some discontinuity is observed at the concatenation points in the synthesized speech due to unavailability of units with proper...
It is becoming clear that one key characteristic of 5G communication systems will be heterogeneity. Heterogeneity is important to be able to reuse equipment that is available, extract maximum capacity from what is allowed to be used in given spectrum bands and locations due to regulatory limitations, and to match capabilities to the extremely wide range of use cases of 5G. Importantly, this heterogeneity...
Learning vocabulary is both critical and boring for many EFL (English as foreign language) learners and one major difficulty is the lack of suitable context for learning new words. Although videos can provide a rich context for learning vocabulary, it often takes more time than textual media to learn. This paper presents the EVOV system which is to exploit the role of video in vocabulary learning...
In this paper, we are proposing a new semantic and contextual based document image classification framework. The framework is composed of two main modules. The first one is the text analysis module (TAM) which processes document images and extracts words from the image, and second one is the SEMCON, which is a semantic and contextual objective metric. From the list of extracted words by TAM, SEMCON...
In this paper, we address the problem of shape part recognition. For this purpose, we define a robust distance between shape parts based on geodesics in the shape space. The proposed distance uses an elastic shape matching to handle elastic deformations and compare shape parts locally. This distance is applied to shape part classification and shape part retrieval. An experimental study through the...
In this paper, we focus on the exception handling mechanism of CA-CCML (Context-aware Cooperative Composition Modeling Language). First, according to level of exception generation, we divide Web service exceptions into three broad categories by levels of exception generation, which are Service invocation level exception, Syntax level exception and Semantic level exception. Then we make detail classification...
Developers use many software applications to process large amounts of diverse information in their daily work. The information is usually meaningful beyond the context of an application that manages it. However, as different applications function independently, developers have to manually track, correlate and re-find cross-cutting information across separate applications. We refer to this difficulty...
Mining frequent patterns is a crucial task in data mining. Most of the existing frequent pattern mining methods find the complete set of frequent patterns from a given dataset. However, in real-life scenarios we often need to predict the future frequent patterns for different tasks such as business policy making, web page recommendation, stock-market behavior and road traffic analysis. Predicting...
In the cloud computing paradigm, Infrastructure-as-a-Service (IaaS) providers can provision virtualized hardware and resources to users, removing the need for users to own and operate these resources, which can lead to lower costs and improved performance. This paper gives a general description of most commonly used open source IaaS service platforms. It includes descriptions and comparisons of OpenNebula,...
The Fynbos Leaf Optical Recognition Application (FLORA) is a software program to automatically identify fynbos plants using leaf photographs. While it is easier to classify fynbos when they are flowering, most fynbos flower for only short periods therefore FLORA was designed to identify plants by leaves instead of flowers. This paper presents the innovation journey of FLORA, highlighting transitions...
Network Functions Virtualization (NFV) consists of implementing network functions as software applications that can run on general-purpose servers. This paper discusses the application of NFV to the Mobility Management Entity (MME), a control plane entity in the Evolved Packet Core (EPC). With the convergence of cloud computing and mobile networks, conventional architectures of network elements need...
It is known that face recognition rate is affected by the resolution of probe image. Therefore it is natural to expect improving the resolution via face hallucination would increase the recognition rate. However, it was concluded in the previous works that improvement in the visual quality does not necessarily lead to a better recognition rate, and performance of face hallucination for recognition...
Recently, a lot of sensors are deployed to monitor the context in heterogeneous environments. A sensor is an engineering point of view as a device that collect the phenomenon signal. The sensor middleware is to enable clients to view context data on Internet. In this paper, we propose an integration architecture based on service provider using multiple sensor middleware in heterogeneous large-scale...
The study suggests the method of calculating a risk level by analyzing connection and association among continual events for recognizing the approach to risk conditions related to continual events. It is determined if a risk level is changing through analyzing connectivity among related events. Weighting is performed rationally for considering a risk level and improving the accuracy of information.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.