The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The authors have developed a system to autonomously classify the meanings of words using a knowledge database constructed from sentences found in textual content on Internet websites. This is a totally new system for classifying the meanings of words dynamically using only the connections between words. The authors believe that robots using such a system can approximate the knowledge of humans.
Since the 21st century, artificial intelligence has deeply impacted the development process of every subject, such as Cybernetics, Information Theory, System Theory, Computer Science, physiology, etc., nearly involving any field and category in the human world in the theory and practice study. With the development of artificial intelligence, the internet has become a relatively new field. Today, with...
Since 1990, the Thai government has attempted to encourage universities to incorporate e-learning systems intheir curriculum. However, it seems that the number of completed e-learning courses is growing quite slowly, largelydue to the fact that many private and public universities in Thailand have no e-learning adoption readiness, such as policy, regulation, and technology. The necessary components...
This paper presents a novel approach to overcome the limitation inherited in statistical machine translation services where the translation of new terms is not covered. The proposed approach is based on the power of user generated content to drive Arabic translations of English words. Our initial pilot experiment reveals the potential of our approach. This approach can act as an add-on to improve...
In this paper, we proposed a novel method to improve colonic polyp detection in computed tomographic colonography. Utilizing the human knowledge workers via the Amazon Mechanical Turk (MTurk) webservice, we distributed polyp detections from a computer-aided detection system (CAD) to anonymous online knowledge workers and asked them to distinguish true and false polyp candidates. We combined decisions...
The Internet has recently emerged with new kind of services, applications and countless contents. User reaction plays essential role in interacting with the Internet. The theoretical concepts on feelings are extracted from psychology, phenomenology and computer science. It is understood that feelings are subjective experience of users aroused from different emotions. As feelings changes based on time,...
Recently, there are many serious crimes happening in many institutions and commercial areas. Therefore, security and protection for those areas are needed. This paper proposes an automatic method for counting passersby using horizontal measurement line to solve this serious problem. In this paper, time and direction information are used to count passersby. Therefore, time-space image and measure the...
This paper presents a sufficient stability condition for internet-based tele-operation systems in terms of LMI. The tele-operation scheme is modeled in state-space as a time-delay system in retarded form and a delay-independent stability criterion is extracted. By choosing Lyapunov-Krasovski functional, we show that the internet-based tele-operation system is stable and has good performance under...
Is happiness contagious online? To answer this question, this paper investigates the posting behavior of users on Twitter.com, a popular online service for sharing short messages. Specifically, we use automated sentiment analysis to study a large sample of over 46,000 Twitter messages that reference the 2010 Winter Olympics. We determined that there are more positive messages than negative, and that...
As more and more “smart things” get connected to the Internet, the “Internet of Things” grows. It is currently quite common that aircraft have transponders and cars have tracking devices. Even the family pet, FIDO, often has a chip embedded. Many of these “smart things” can also be remotely controlled via their Internet connection. Geysers (hot water heaters) can be turned off by power companies when...
Smart wallet is a mobile enabled application and payment service provider to make convenient payments to any designated merchant over the Internet. In this paper, we propose human verifiable authentication schemes geared to smart wallet that prevent man-in-the-middle attack with neither a prior context nor a PKI. The Human Verifiable authentication scheme verifies a shared key for both parties to...
Application layer centralized business players, such as search engines, have revolutionized the Internet, by smartly mediating between the users' generic interests and the specific resources returned. Meanwhile, networks consistently neglect the human nature of demand, and persist in handling a-priori offered load expressed in terms of requests for precisely identified network resources. A twofold...
Web 2.0 has become a hot topic in recent social studies. A systematic review of the literature was conducted in May 2010 to generate preliminary answers to the following primary research question: What are the current patterns of theory use in social studies of Web 2.0 applications? Using the search key terms of Web 2.0, social media, and social networking, a total of 141 articles from the Communication...
Information and Communication Technologies (ICTs), and public access to computers with Internet connectivity in particular, can assist community development efforts and help bridge the so-called digital divide. However, use of ICT is not gender neutral. Technical, social, and cultural barriers emphasize women's exclusion from the benefits of ICT for development. This paper offers a qualitative analysis...
The paper presents the issues on the role of wireless access networks to support the kind of information exchange and interactions involved in the evolving social networks. The author discusses several requirements that the wireless access networks and social networking needs to address such as the communication infrastructure, distributed and informal trusts, environment interactions, body interactions,...
Purchasing is the primary point of contact with most supply-chain partners and thus extremely crucial for the performance of the supply chain specifically and in overall for the firm. Understanding how the various criteria for evaluating suppliers play a role is crucial for a better understanding of the dynamics of the supply chain. This study attempts to find out the relative importance of the various...
The paper describes emergent verbal behaviour that arises when speech components are added to a robotics simulator. In the existing simulator the robot performs its activities silently. When speech synthesis is added, the first level of emergent verbal behaviour is that the robot produces spoken monologues giving a stream of simple explanations of its movements. When speech recognition is added, human-robot...
In the paper an Internet based massive experiment devoted to subjective assessment of images quality is described. The investigations have been based on DSIS method with some modifications induced by the nature of Internet poll. Special measures have been undertaken for removing results given by incompetent experiment participants. The huge number of tests allowed for multi-aspect image quality evaluation:...
We present our method for learning object categories from the Internet using cues obtained through human-robot interaction. Such cues include an object model acquired by observation and the name of the object. Our learning approach emulates the natural learning process of children when they observe their environment, encounter unknown objects and ask adults the name of the object. Using this learning...
In recent years we witness that computers and Information Technologies (IT) are increasingly becoming an integral part of the everyday activities of all strata of human society. Users differ considerably among themselves, so except for differences by age and level of education, they are from different countries, speak different languages, belong to different races, have different religious affiliations,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.