The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Ontologies perform the cumbersome task of translating data on the web into a form suitable for manipulation by machines. The discovery of concepts and relationships from unstructured text is a crucial and challenging task in constructing ontology (s). A pragmatic solution is offered by a metaontology as it supplements the ontology with related concept pairs and relationships. An ideal approach to...
According to the requirement of inter-system EMC test and EMC prediction, the structure, contents and interfaces of EMC database are described in detail, Three-layered EMC database design is produced by the COM technique, which can guarantee the stable and extension of database in future. The design of EMC test sub-database and EMC prediction sub-database can satisfy all the EMC requirements in practice...
For the question that how to show the emergency supply in the software, a mathematical model is developed in this paper. The mathematical model distinguishes connecting sides, nodes from different networks, which includes modeling events as material information, information of transporting vehicles, scheduling schemes, and disaster points. Then according to requirements of the modeling elements and...
MOOCs have expanded educational access beyond the traditional scope and masses. Cloud computing, open source platforms and software frameworks have provided the MOOC elements to support the creation of cost effective infrastructures, minimizing costs with widespread accessibility. However, these foundational elements present security concerns, which include non-enforceable policies, system and software...
The conventional optical cable labels in smart substations contain too little information to support operation or maintenance. To solve this problem, this paper introduced a QR (Quick Response) code system for labeling and identification of optical cable labels in China's smart substations. The label format is specified for three kinds of cables, and the implementation methods of generation module...
Communication is the key to any successful project development, because it is a process of transmitting ideas and information. In many cases, a project developer communicates but still lack understanding. Stakeholders and the project developers often make the same mistake and too easily consider a model to be properly communicated or validated. They fail because of human factors which are an important...
Big Data are collections of data sets so large and complex to process using classical database management tools. NOSQL databases are in the base of storage of Big Data. Learning ontology from these databases will extract their hidden semantics. This paper illustrates an approach to learn ontology from document oriented NOSQL database. We choose to deal with MongoDB. We present main steps of our approach...
Biometrics represents a return to a natural way of identification: testing someone by what (s)he is, instead of relying on something (s)he owns or knows seems likely to be the way forward. Biometric systems that include multiple sources of information are known as multimodal. Such systems are generally regarded as an alternative to fight a variety of problems all unimodal systems stumble upon. One...
In this paper unified structure formation method (ETL) development for operative analysis of data stored in different SQL and NoSQL databases are considered. Unified structure formation method (ETL) is based on work with Map Reduce parallel model. In order to perform the method following steps should be considered: development of searching forms (pattern) for data searching in different database,...
In this paper we have focused on designing and collecting an infant crying database. The data have been collected using an in-house developed acquisition system. The study has involved 136 infants aged between 0 and 3 months. Seven types of cries have been collected: hunger, pain, eructation, tiredness, discomfort, colic and pathology. Some of the data (about 750 audio/video recordings meaning about...
Nowadays most of people of developed economy countries interact with software every day. As a result of computer systems expansion to all scope of people's activity the problem of transition from visual and command interfaces to natural language user interfaces is thrown into the sharp relief. Computational linguistics and natural language processing methods are described in this article. Methods...
Location inference attack may cause location privacy leakage of secondary users SUs in database-driven cognitive radio networks. Malicious entities could infer SUs' location with channel usage information. For the unpredictable return of primary users, there is no solution that is effective to location inference attack. To prevent location inference attack, we propose an Agent-based Channel Selection(ACS)...
Cytological (CI) and histological images (HI) of separate cells and cells groups are used to diagnose breast cancer. We propose an approach that combines computer vision algorithms and intelligent processing of images (fuzzy knowledge base). We also have researched several types of breast cancer and developed a database of CI and HI. On the base of a database an intellectual system of breast cancer...
Indoor localization is a key topic for mobile computing. However, it is still very difficult for the mobile sensing community to compare state-of-art Indoor Positioning Systems due to the scarcity of publicly available databases. Magnetic field-based methods are becoming an important trend in this research field. Here, we present UJIIndoorLoc-Mag database, which can be used to compare magnetic field-based...
RFID is one of wireless technology that can be used in various sectors of human life like military, school, sport, health, industry, security, animal, and other areas. RFID mainly consist of two important parts, the reader (combination of transceiver and antenna) and the tag (consist of unique number). The use of unique number inside the tag is very useful as an identity of an object or as tracking...
How to dynamically utilize the spectrum and efficiently enhance spectrum utilization for a variety of clients' demands is still an open issues. This paper studies the dynamic access network with database-assisted, where spectrum brokers (SBs) compete to provide service for secondary users (SUs) with different QoS demands and budget. To this end, we investigate the interactions among BSs and SUs as...
The road safety and maintenance are very important and costly activities for road operators. Due to the decrease in the cost of the sensors technologies and wireless equipments, connecting maintenance fleet vehicles become very intuitive. It allows to enhance the efficiency and the reactivity of such services. In the present paper we describe an interconnection system that facilitates the data exchange...
A virtual machine (VM) has access only a portion of computer resources but that appears to be a whole computer. Virtual machines are running on the same computer system hardware. The performance of the virtual machines are depends on the performance of the host operating system on which they are running. In this work the performance of different guest VM's on the same host operating system has been...
Gun violence and in particular police shootings have become prominent in the news media in the United. States. However, there is currently no national database of police incidents. This paper describes the first phase of a project to develop a database to collect, edit, query and analyze police shootings. The SHOT Project (Statistics Help Officer Tactics), an academic collaboration between Criminal...
Distributed database and analysis tools for electroencephalography (EEG) data archiving and procession in Ukrainian Grid Infrastructure were proposed, implemented and applied for separation of signal sources. The database is being populated with human scalp EEG and rat intracranial EEG data now. Resources consuming algorithms for removal of electromyogram and electro-oculogram artifacts from human...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.