The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Clinical diagnosis is a critical aspect of patient care that is typically driven by expert medical knowledge and intuition. An automated system for clinical diagnosis could reduce the cognitive burden of clinicians during patient care and medical education. In this paper, we describe a Knowledge Graph (KG)-based clinical diagnosis system that leverages publicly available knowledge sources to infer...
MEC or Multi-Access Edge Computing is a network service delivery architecture that enables cloud computing capabilities at the edge of the access network. Realisation of the MEC vision is challenging with current network technologies: service discovery and routing, secure network slicing and distributed mobility management require complex capabilities in the network. This demo features an OMEC use...
The Twenty-First Century has seen the dawn of the Internet as a pervasive medium by which nearly all information flows. However, the permissive environment in which the Internet was founded fostered a community plagued by Internet trolls, individuals who deliberately post inflammatory, off-topic, or offensive material on online message boards to elicit angst, or other emotions, from their targets...
The Internet of Things is one of the trending technologies wherein connecting any device to the Internet and control power to any appliance and in addition possess capability of connecting those appliances to each other in creating a network. In this work, a WiFi enabled micro-controller is interfaced with few sensors like ADXL335, a 3-axis accelerometer for sensing tilt of the object, motion, vibration...
This paper presents an efficient new snapshot mechanism, briefed as Live Save, to make real time backup of the VM state to the local host. The proposed Live Save will iteratively send the state data, store the snapshot file in the local host and send the entire file directly to a remote host when necessary - to save significant bandwidth consumption. We also set up an advanced Improved Live Save which...
Advances in mobile technologies have led to the use of mobile devices in telemedicine. Examples include smartphones for capturing microscopic images from glass slides for remote telepathology and in teledermatology consultations. As use of smartphones become even more pervasive in developing countries where expert medical consultation is greatly needed, telemedicine, such as telepathology and telemicroscopy...
Nowadays, life unfolds in a digitised world, in which, each person can have access to a huge amount of information through the use of Internet. In this situation, most of daily activities are being influenced by a new kind of society that allows ubiquitous and instantaneous interaction among its members. The creation of social platforms (SPs) has strengthened human relationships at such point that...
In this work, the principal aim is establishing networks parameters of wireless sensor. These devices can transmit variables to monitoring the quality of tourist beaches in the Colombian Caribbean. We propose a methodology to choose the network elements and its technologies. We analysis data based on coverage and implement the prototype. We show that the maximum distance between nodes is 33 m at mesh...
It presents the design and implementation of a manufacturing system integrating information and control technologies to provide an access to the user into part of the production system. A distributed control system is structured using didactic plants which emulate a manufacturing system of soft drinks. The control system is developed in Codesys®, integrating its operation through a monitoring system...
The Internet of Things (IoT) is becoming important in many areas that include health, entertainment, manufacturing, automotive, home and building automation, industrial, etc. Will it be important for education and more specifically for teaching and learning? If so, what engineering subjects would benefit the most and how effective could the IoT be for teaching and learning? Can IoT technologies and...
Recommender systems help people to find items of interest by utilizing past user interactions (such as product views, ratings, and purchases). Today many e-commerce sites and large scale web applications use recommender systems and provide their customers personalized products. In this work we will share our recent experience in developing a job recommender system based on collaborative filtering...
Massive Open Online Courses (MOOCs) have attracted millions of people who are geographically dispersed. MOOCs are mainly authored in English. However, a big proportion of the participants speaks English as a foreign language. There are studies reporting that some participants struggle with understanding the language in the video lectures and are reluctant to communicate with other fellow learners...
Deep learning is a subfield of machine learning which uses artificial neural networks that is inspired by the structure and function of the human brain. Despite being a very new approach, it has become very popular recently. Deep learning has achieved much higher success in many applications where machine learning has been successful at certain rates. In particular It is preferred in the classification...
Wireless communication technology is spreading rapidly to all areas of our lives. The technology, which has a wide range of applications from radios, intelligent home systems, automation applications to GPS units, was used in monitoring the workers working in mines in this study. Most of the mining area underground mining is risky and the possibility of accident (gas jams, the explosion and dents,...
The increased use of the Internet and the ease of access to online communities like social media have provided an avenue for cybercrimes. Cyberbullying, which is a kind of cybercrime, is defined as an aggressive, intentional action against a defenseless person by using the Internet, social media, or other electronic contents. Researchers have found that many of the bullying cases have tragically ended...
With the development of cultural level, the traditional tourism has not meet the needs of the development of the people. The development of traditional tourist scenic areas has been affected by the technology and the cloud computing, so we need continuous innovation and development, it can bring the new experience of the tourist. In this paper, from the angle of tourist, scenic, government, we will...
Network Address Translation (NAT) allows multiple devices with private addresses to share one public address. NAT was mainly confined to home gateways, but with the exhaustion of the IPv4 address space, large-scale NATs have been deployed. Other technologies causing large-scale address sharing are on the rise as well (e.g. VPNs). Large-scale address sharing is problematic, since it limits the number...
In order to improve the management intelligent level and the level of information sharing for higher law college instructors, and improve the efficiency of management of higher law college counselors work, and promote the sharing of college counselors and educational resources and scheduling information, Higher Law College Counselors work management system is developed and designed. The system adopts...
Prefix hijacking is a serious threat in the Internet routing landscape. The Border Gateway Protocol has no origin authentication by design. Countermeasures, e.g. on-top authentication as implemented by R-PKI infrastructures, are not yet deployed on a very large scale. Being victim of prefix hijacking is a difficult situation with few options. Not only the owner of a prefix is victim but all the networks...
Internet piracy is a significant ongoing problem for content producers and rights holders. Estimates of the cost of copyright infringement to the film and music industries range in the tens to hundreds of billions of dollars every year. The vast majority of this illegal content is shared using three key technologies: peer-to-peer (P2P) protocols such as BitTorrent, illegal file streaming, and one-click...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.