The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The problem statement of this research paper is focused around the challenge that any organization faces in today's day while synchronizing their strategy with real time challenges of the Market given the changing Demographics, increase in the Telecommunication Density and increase in the usage of Social Media. The method adapted by organizations to obtain competitive intelligence in the past has...
This paper presents the first version of a speaker verification spoofing and anti-spoofing database, named SAS corpus. The corpus includes nine spoofing techniques, two of which are speech synthesis, and seven are voice conversion. We design two protocols, one for standard speaker verification evaluation, and the other for producing spoofing materials. Hence, they allow the speech synthesis community...
We propose an obstacle classification method using multi feature comparison based on 2D LIDAR. The existing obstacle classification method based on 2D LIDAR has an advantage in terms of accuracy and shorter calculation time. However, it was difficult to classify obstacle type, and therefore accurate path planning was not possible. To overcome this problem, a method of classifying obstacle type based...
As biological databases are growing in terms of numbers, size and complexity, managing these databases is becoming very complex. Most of these databases emerged as the output of experimental research by scientists. However, many of the scientists were not trained on the informatics side of research and also there were few standards available to be followed in defining these databases. This resulted...
This paper discusses the practices employed by various terrorist groups that operated in European countries between the years of 1968 and 2009. We focus on the deployment of the terrorist operations as presented in the RAND Database of Worldwide Terrorism Activities. In this context we elaborate on the tactics of the terrorist groups with the highest frequency of actions that operated in the European...
Nowadays, it is more demanded for techniques that are efficient in retrieval of small results from large data sets. Iceberg queries are such a kind of queries which accepts large data as input and process them for retrieve small results upon user specified threshold (T). Earlier, the iceberg queries are processed by many ways but are compromised in speed with which the data is retrieved. Thus lots...
Nowadays cloud computing is the fastest growing technology that is used as a source of providing service through Internet. It is an enhanced model of Utility Computing. It embodies all technologies in Computer Architecture. It delivers the clients the needed applications, processes and Information as a service. It provides software platform as a service and virtualized servers, storage area and networks...
The EU-funded eNanoMapper project proposes a computational infrastructure for toxicological data management of engineered nanomaterials (ENMs) based on open standards, ontologies and an interoperable design to enable a more effective, integrated approach to European research in nanotechnology. eNanoMapper's goal is to support the collaborative safety assessment for ENMs by creating a modular, extensible...
For the present hospital management information system which lacked of data availability situation, this study was designed and implemented comprehensive query system of patients. The system can provide various forms of statistical analysis of patients for hospital administrators. After the system implementing in the hospital, it can effectively improved the utilization of data, help managers make...
As the model species for woody plants, the poplar has excellent experimental properties. The studies of functional genes make up the foundation of improving genetic traits and cultivating elite lines at the molecular level. Although studies of functional genes have been carried out for many years, plenty of experimental data are still scattered across documents and are not unified by a comprehensive...
Virtual worlds have become a target to criminal activities. With the increasing interest in these spaces, their security is becoming a challenge. The recently published works have proposed methodologies for the security of the virtual world based on avatar face authentication. However, the developed recognition systems have been validated on the avatar image datasets which belong to the authors themselves...
Recently the use of mobile devices is increasing and mobile traffic is growing rapidly. In order to deal with the massive traffic, cognitive radio (CR) is applied to efficiently use the limited spectrum resources. In this paper, we propose a CR operational algorithm for mobile cellular systems, which is applicable to the multiple secondary user environment. Performance of the proposed algorithm is...
Management application of Tabungan Kurban is an application that integrates business process of data management clients are involved in a business process, specifically in the process of saving sacrifice or kurban. The objective of developing the application is to replace manual activities in managing kurban savings, including deposits and records of savings. The inefficiency of having a manual booking...
Over the last few years, the Electrocardiogram (ECG) was introduced as a powerful biometric modality for human authentication. Indeed, ECG has some characteristics specific to each individual. In this paper we present an authentication system based on the ECG signal. We are particularly interested in the feature extraction step where we propose new approach based on the slopes and the angles of the...
In the paper, the mobile payment technology is applied to smart travel. Firstly, we design the overall functional structure diagram of the mobile payment system and describe the main function modules. Secondly, we design database system and a hybrid encryption algorithm based on DES and ECC, which ensures the security of the system. Finally, we test and analyze the result of the mobile payment system.
Arabic character recognition is an important aspect in pattern recognition because there are many applications that depend on it. Database availability is a key factor that encourages researchers to conduct research in this field. This paper proposed a database with a variety of shapes for each character. The database contains 5,600 images written by 50 writers. Each character has 200 images divided...
Short message service (SMS) that has been widely used in various fields could potentially utilized for problem-solving consulting services that are based on expert system, so it takes a kind of application platform to implement this service. This paper proposes an expansion of online expert system services (web and wap based) by adding an application use SMS interface. Knowledge base of the expert...
Databases contain potentially valuable knowledge that should be processed and interpreted in order to be useful. In this context, we examine synergy of fuzzy functional dependencies and linguistic summaries. Strength of dependency between two examined attributes in the whole database can be detected and expressed by fuzzy functional dependencies. If dependency exists but is not sufficiently strong,...
Pk-anonymization is a data anonymization method that employs randomization. Pk-anonymization guarantees Pk-anonymity, which is an extension of probabilistic k-anonymity. To implement this method, we assign random noise to records to reduce the probability of identifying record owners to less than 1/k. Existing methods assign noise using a Laplace distribution, and determine the variance of the Laplace...
Electronic Health Records (EHR) are digitized and stored for efficient patient management in hospitals or clinics. At the patient side, health records are not digitally stored and thus difficult to manage across different hospitals. We propose a new system, where medical sources (firms & devices) import a person's medical records into Personal Health Book (PHB). This will give the person (the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.