The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
General purpose processors have traditionally been favored over application-specific architectures due to the provided flexibility, standardized and simpler programming model, as well as significant reduction in development time. Fueled by the steady advances in transistor scaling, general purpose CPUs satisfied the performance needs of most applications. While CPUs were becoming ubiquitous, advances...
Database management systems (DBMSs) are one of the most important components in modern large-scale systems. Thus, it is important for developers to write code that can access DBMS correctly and efficiently. Since the behaviour of database access code can sometimes be a blackbox for developers, writing good test cases to capture problems in database access code can be very difficult. In addition to...
For over a century, fingerprints (FP) have been considered one of the most highly used methods for human recognition; automated biometric systems have only been available in recent years. FP recognition is becoming indispensable part of many identification systems in the world. This research present a proposed authentication system based on FP as biometric type and some of static credential personal...
In this paper, we review security and usability scenarios. We propose security enhancement without losing usability. We apply this approach to popular application systems in the database. Specifically, we analyze database security in access control, auditing, authentication, encryption, integrity control, and backups. Finally, we present our recommendations for system security and usability to go...
This paper describes the design of embedded system that enables the remote access of database by the implementation of web server. Porting of Linux to ARM9 is carried out to enable further porting of embedded webserver (BOA server) and SQLite database. The ported database is implemented by creating a table, storing the data into the database and retrieving the same. An application is developed for...
Asset tracking and maintaining records of consumables in hospital industry has been monotonous labor work for decades. Technological evolution has alleviated manual work which further restrained erratum approach in data management. The high-value assets in hospitals are misplaced, lost, or purloined which affects hospital revenue and patients security. The Radio Frequency Identification system based...
A modern development in time and technology requires faster information broadcasting. United, personalized, intelligent information applications are more significant in business and private lives. Such appliances are cell phones, two-way pagers, personal organizers, screen phones, etc. An ACC (Android College Campus) is an application to access the organization and particularly by students well over...
Network security is often neglected even by users. This paper deals with user authentication in a network environment and offers analysis of this topic and possibilities how to increase its security by cryptographic methods. A synthetic part provides a detailed description of the design of a simple web application to authenticate users with protection against selected attacks and also its practical...
In this paper, we have developed a mobile application for Ukrainian users with a possibility to create custom dictionaries. The system allows user to learn specific technical terms, especially in the field of Computer Aided Design. The iOS Databases were analyzed for storing custom dictionaries. The analysis software to create the user interface. A comparative analysis of various software tools for...
As one of sensor applications, meteorological service collects information for weather and uses it for preventing disaster risk. To achieve this, data from sensor networks must be integrated with communication and data processing system. In this paper, we present a specific web-based application with mobile networks to transmit weather data timely by introducing forecasting system. We implement central...
In this paper, we describe the application of cloud computing in the field of robotics where a robot is assigned the job of picking up sticks lying in the floor and to keep them in the given space. The robot is connected to the cloud through a network. It receives the answer to the queries of the database residing in the cloud about the location of the sticks to be picked up and receives the coordinates...
Pokemon Go is a mobile device based game that is very popular among teenagers. The game is based on the Geographic Information System (GIS) that utilizes the player's location and interacts with many fancy characters stored in local databases, and occasionally some information stored in remote databases. The game requires a lot of computations for distances, rules, and interactions. In this paper,...
The purpose of the research is to make a unique drone which is capable to move autonomously through any environment by interacting with server by itself. The main uniqueness is that it can move through air, land and water. Nowadays various drones are seem to be available. But such a drone which can move through every environment is never seen before. The main motive is to get accuracy in rescue missions...
In the software engineering field, especially in software product line engineering, the problem of managing the variability within databases is relevant. Therefore, in this paper, we have tried to manage the complexity of modeling variables databases schemas and implement an automatic method of generating this type of schema, and then test it on two cases of studies. To carry out this task we decided...
The precondition of productive data mining is having an efficient database to work on. The BioVid Emo DB is a multimodal database recorded for the purpose of analyzing human affective states and data mining related to emotion. Psychophysiological signals such as Skin Conductance Level, Electrocardiogram, Trapezius Electromyogram and also 4 video signals were recorded. 5 discrete emotions (amusement,...
In this paper we propose a publicly available static hand pose database called OUHANDS and protocols for training and evaluating hand pose classification and hand detection methods. A comparison between the OUHANDS database and existing databases is given. Baseline results for both of the protocols are presented.
Our cloud-based IT world is founded on hyper-visors and containers. Containers are becoming an important cornerstone, which is increasingly used day-by-day. Among different available frameworks, docker has become one of the major adoptees to use containerized platform in data centers and enterprise servers, due to its ease of deploying and scaling. Further more, the performance benefits of a lightweight...
Every company stores more and more product data. Most of the data are not analyzed and possible findings cannot be used. But the utilization of existing knowledge can make the system development process more efficient. Therefore, this paper focuses on the data analysis of system architectures. It develops a concept to identify patterns between system architectures of different products in a database...
The example of how to create and organize the ETL process on isolated small scale database system which is the part of the larger information system is given in this paper. We have given short description of the database, ETL process and given directions on how to expand classic ETL process with intermediate steps in order to automatize complete process and prepare it for loading into main data warehouse...
PID control schemes have been widely used in most industrial control systems. However, it is difficult to determine a suitable set of PID parameters because most industrial systems have nonlinearity. In order to overcome such a problem, a data-driven PID (DD-PID) control scheme based on utilizing a database has been proposed and its effectiveness has been investigated. However, the DD-PID controller...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.