The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In companies from retail banking or telecommunication sector are continually developed information systems (IS). The core of these IS resides in efficient and elegant usage of database tools. In this paper we present a new approach of analyzing database objects with DB Object Mapper Tool that is being developed for mapping objects from large and complex database systems. The term “object” in this...
This research aims to examine the effectiveness and efficiency of fuzzing hashing algorithm in the identification of similarities in Malware Analysis. More precisely, it will present the benefit of using fuzzy hashing algorithms, such as ssdeep, sdhash, mvHash and mrsh – v2, in identifying similarities in Malware domain. The obtained results will be compared with the traditional and most common Cryptographic...
Ontology mapping is a common way to solve heterogeneous problem in ontologies and achieve the goal of ontology integration. In a distributed environment, it is necessary to find the mappings between ontologies before they are merged. There is a number of mapping approaches based on concept similarities which are widely used but with large amount of calculations exist. Aiming at mapping between ontologies...
The term Personal Learning Environment (PLE) is associated with the desire to put the learner in control of his own learning process, so that he is able to set and accomplish the desired learning goals at the right time with the learning environment chosen by him. Gradually, such a learning environment includes several digital content, services and tools. It is thus summarized as the Virtual Learning...
This paper describes algorithmic decision support that facilitates recommendation of course schedules personal- ized to the background and interests of a given student. More specifically, recommendations are made with pri- oritized consideration of four categories of information: (1) degree requirements, (2) student interests, (3) student performance, and (4) time-to-degree. All four categories of...
Knowledge discovery from data is a challenging problem that has significant importance in many different fields such as biology, economics and social sciences. Real-world data is incomplete and ambiguous; moreover, its rapid increase in size complicates the analysis process. Therefore, data reduction techniques that consider data uncertainty are highly required. In this paper, our objective is to...
In many applications domains, time modeling has a fundamental role. Allen temporal relations are one of the most used and known formalisms for modeling and handling temporal data. However, classical Allen relations deal only with crisp time information, but time is often subjective and fuzzy. This paper discusses a disjunctive view of temporal relations between fuzzy time intervals. This approach...
This paper proposes a novel approach for texture-based image indexing and retrieval in the scope of very high resolution (VHR) optical imagery. Our motivation is to take into account local textural features and structures inside each image to measure its similarity to other images. These local features are extracted for a set of characteristic points from the image using the local extrema-based descriptors...
Perishable goods are those whose value decay rapidly over time. To reach the maximum profit, vendors should sell them as soon as possible ever since they are available on market. Advance selling strategy refers to sell a product before it is ready for sale and this helps sellers to observe the market response and adjust its operational plans. With the rapid development of E-commerce, it becomes much...
It is possible to streamline corporate Environment, Health, and Safety (EH&S) duties through the use of workflow management technology. This approach requires a specification of workflow models that among others are composed of activities. A domain-specific workflow meta data model is proposed. The model consists of modelling concepts for the detection of failures of EH&S activities that already...
We cast the classic problem of achieving k-anonymity for a given database as a problem in algebraic topology. Using techniques from this field of mathematics, we propose a framework for k-anonymity that brings new insights and algorithms to anonymize a database. We focus on the simpler case when the data lies in a metric space which is instrumental in introducing the main ideas and notation. Specifically,...
This paper presents a context-aware ontological approach applied to an alarm management system. The goal is to easier the work of the plant's operators using supervisory systems and process control. Being part of a Supervisory Control and Data Acquisition (SCADA), alarm management systems produces and stores a big data set. Using proper analysis techniques in order to produce information and knowledge...
The Northbound Interface (NBI) plays a crucial role in promoting the adoption of SDN as it allows developers the freedom of developing their revenue-generating applications without being affected and constrained by the complexities of the underlying networks. To do so the NBI has to allow applications to express their requirements and constraints in their own application specific language, and the...
Town Administrations are increasingly facing the challenge to identify smart planning actions to reduce the cities' energy demand by improving the efficiency of the urban energy systems. Buildings play an important role in this regarding both the demand and supply energy. In this scenario, the neighborhood or district scale seems to be the most appropriate to implement a multi-disciplinary approach...
A fundamental challenge in controlling the leakage of sensitive information by computer systems is the possibility of correlations between different secrets, with the result that leaking information about one secret may also leak information about a different secret. We explore such leakage, here called Dalenius leakage, within the context of the g-leakage family of leakage measures. We prove a fundamental...
Most literature in conceptual modelling focuses on the development of models. However, models, once created, must be used, which requires that the model is as usable as possible. Often, usage scenarios for a model are only vaguely clear at model creation time, so model usability should be considered as a relevant problem, especially in relation to conformance (creating instance models that conform...
Information systems become more accessible as a service offered to anybody, anywhere, at any time, via almost any device and computing platform. The continuous growth and the heterogeneity of these devices induce diverse user experiences depending on the device and challenge designers to creating methods and tools for engineering usable, yet accessible, information systems. Instead of repeating a...
Service chaining is one of the challenges in network function virtualization (NFV), where a sequence of middleboxes apply their service to particular traffic. The challenge of service chaining is that a middlebox may alter the content of packet headers; thus, the context of service chaining for particular traffic gets lost. This paper proposes Segmented Proactive Flow Rule Injection (SPFRI) using...
Smart cities and smart homes are booming fields of development of pervasive systems. With the high stakes these systems have to manage, and their sheer complexity, anomalies have to be considered. In these complex systems are many connected components with computing capacities. They can manage anomalies, even if partially, and can act as some kind of expert systems. These expert systems can be relied...
This paper introduces an empirical investigation which directly addresses and explores gender prediction capacity from digitised handwriting data from several different perspectives - such as feature type (static/dynamic) and content (fixed/variable) types - in order to provide extensive experimental evidence and analysis to guide the development of a better understanding of the opportunities for...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.