The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Creating autonomy for maritime vehicles that allows multiple developers and users to quickly integrate and develop capabilities is a difficult process. Multiple examples of autonomy exist; however, creating an environment that is modular and expandable is not often a goal of many autonomous systems. This work presents an advanced Autonomous Vehicle Architecture (AVA) for maritime systems that was...
Automatically curating knowledge that is availableonline is a pressing necessity, given the exponential increasein the volume of data published over the web. However, thesolutions presently available are yet to reach the same level ofsupport quality provided by human curators. This is mainlydue to the fact that digital database managers do not takethe expertise of the interested community into account...
Digital libraries that store scientific publications are becoming increasingly central to the research process. They are not only used for traditional tasks, such as finding and storing research outputs, but also as a source for discovering new research trends or evaluating research excellence. With the current growth of scientific publications deposited in digital libraries, it is no longer sufficient...
in this article the effectiveness of one of the main methods for assisting the information search in large data sets is analyzed, namely the method based on the social approach. This method analyzes the behavior of multiple users when searching for information, particularly the keywords they use. Based on the obtained results, the relevant algorithms in the searching engines of the organizations can...
This paper addresses the problem of integrating ontological knowledge bases into complex software applications by proposing a library for exposing ontology access and manipulation as web services. The proposed framework is an extension of our previous work, the M2O framework, and enhances it by integrating reasoning techniques and generating a web services layer for performing basic CRUD operations...
With RFID applying in library, this paper develops an Internet of Things System for Library Materials Management using Android based UHF mobile reader (Android mobile reader) as its entry to increase the efficiency of library materials management. The functions of the Internet of Things System for Library Materials Management include user identification, inventorying, adding, refreshing, searching,...
As with many other areas of study, mathematical knowledge has been produced for centuries and will continue to be produced for centuries to come. The records have taken many forms, from manuscripts, to printed journals, and now digital media. Unlike many other fields, however, much of mathematical knowledge has a high degree of precision and objectivity that both gives it permanent utility and makes...
Inventor name disambiguation is the task that distinguishes each unique inventor from all other inventor records in a patent database. This task is essential for processing person name queries in order to get information related to a specific inventor, e.g. a list of all that inventor's patents. Using earlier work on author name disambiguation, we apply it to inventor name disambiguation. A random...
With the increasing size of digital libraries (DLs) it has become a challenge to identify author names correctly and assign publications to them. The situation becomes more critical when different persons share the same name (homonym problem) or when the names of authors are presented in several different ways (synonym problem). This paper focuses on homonym names in the computer science bibliography...
In this demo, we present Coagmento 2.0, a Web-based, open-source platform that provides support for one working in individual or group projects spanning multiple sessions that involve looking for, collecting, and synthesizing information. The system also provides a highly customizable platform for researchers who want to investigate individual and group information seeking behaviors in a lab or a...
Heart transplantation (HT) is a life saving procedure, but a limited donor supply forces the surgeons to prioritize the recipients. The understanding of factors that predict mortality could help the doctors with this task. The objective of this study is to find locally optimal feature sets to predict survival of HT patients for different time periods. To this end, we applied logistic regression together...
With the System Integration Technology, this paper integrated some library electronic resources from the perspective of protocol standard, portal, database and retrieval method, aiming to provide an integrated platform and solutions for Cross-platform heterogeneous search among multiple databases of libraries, which can maximally keep the integrity of the knowledge system and improve the retrieval...
This work shows a system oriented to generate a deformation and transformation of human faces between two images by applying Active Shape Models (ASM). The software was developed on Visual Studio and the free OpenCV libraries was used. The first step was to build an ASM model based on the Yao Wei's algorithm. To create the ASM model, the IMM face database, from the Technical University of Denmark,...
In this paper, we study an automatic testing system for public cloud on data security risks. To this end, we first establish a framework based on SOA (Service Oriented Architecture), which provides a capability to proceed data security tests on cloud automatically. Second, based on the framework we implement a cloud security testing system, which includes data confidentiality test and data deletion...
With the development of cloud computing technology, more and more governmental agencies are aware of the importance to take advantage of cloud computing to improve the efficiency and reduce costs. In this paper the design and implementation of a PaaS based E-government system is presented, with emphasis on the security design and rapid development features of the framework. Due to its characteristics...
This paper presents an integrated tool of several utilities for the automation of custom IC design flow. It has several features including EM Width and Current Calculator, Resistance Calculator, Database Manager and Abstract Checker. Database Manager has various interactive utilities named as Smart Hierarchy, Single Design Library Generator, Multiple tasks of design and verification with design library,...
With the expanding application of the two-dimensional barcode, the harmfulness of malicious URLs is much more serious. For preventing malicious URLs of two-dimensional barcode, this paper proposes a detection method -- H-SBH which is utilizing hash function. Firstly, the detection system extracts eigenvalues of malicious and benign URLs by H-SBH, then builds black and white lists library based on...
In order to integrate search results returning from several deep web query interfaces, this paper proposes a framework of deep web query result integration system for a specific domain, which provides unified records from selected web sources dynamically. It submits query conditions on a global interface to local query interfaces, and transforms each query result web page to a DOM tree, then discovers...
The cost of developing parallelised software is a significant bottleneck in the implementation of bioinformatics pipelines. This paper identifies the use of low-level threading abstractions as one cause for these elevated costs,, proposes alternatives which offer better value. We identify a core set of higher abstractions to accomplish low-cost multi-core, multi-server parallelization - Streams, Actors,...
Halal certification is very crucial these days. In Malaysia, JAKIM plays very important role to certify halal product. Products with halal certification become highest priority in users' demands in Muslim country, particularly in Malaysia. However, due to the rapid development of advanced technology, irresponsible manufactures resort to produce fake halal to attract Muslim consumers and overshadow...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.