The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Campus libraries in modern universities provide students with group study areas where they can work and study collaboratively. In this paper, we propose a complete solution for the creation of study groups in future smart libraries featuring (i) a smartphone application to create study groups, (ii) a hybrid Bluetooth Low Energy (BLE) and Wi-Fi indoor positioning system to localize study groups and...
The scale effect of big data brings great challenges to manufacturing resource integration, modeling, analysis and sharing. According to the application requirements, function requirements, performance requirements and operation conditions of manufacturing resources integration and sharing (MRIS) in big data environment, the characteristics of manufacturing resource big data are analyzed, then, a...
Current design of analog integrated circuits is still a time-consuming manual process resulting in static analog blocks which can hardly be reused. In order to address this problem, a new framework to ease reuse-centric bottom-up design of analog integrated circuits is introduced. Our IIP Framework (IIP: Intelligent Intellectual Property) enables the development of highly technology-independent analog...
The record linkage problem in application to a bibliographic and authority data is considered. The problem is common in the situation of merging data from several libraries. The two approaches based on empirical analysis of data are tested. Both of them involve an indirect information about a person. The proposed variant of the decision tree method allows us to deal with inconsistent bibliographic...
In this paper, we present Smartphone-based Contactless Epilepsy Detector (SmartCED): an Android monitoring application able to diagnose neonatal clonic seizures and warn about their possible occurrences in realtime. SmartCED has, however, wider applicability so that it could also be used on adult patients. The main goal is to implement a wire-free and low-cost epilepsy diagnostic system, executing...
The Engineering division at New York University in Abu Dhabi encourages students to not be afraid of thinking differently when faced with a challenge. Accordingly, a key aspect of the engineering curriculum focuses on invention, innovation, and entrepreneurship (i2e) through all years of undergraduate study[1]. Through i2e students are encouraged to hone their creativity and develop their leadership...
Malware is an ever-increasing threat to personal, corporate, and government computing systems alike. Particularly in the corporate and government sectors, the attribution of malware—including the identification of the authorship of malware as well as potentially the malefactor responsible for an attack—is of growing interest. Such malware attribution is often enabled by the fact that malware authors...
Scholarly digital libraries have become an important source of bibliographic records for scientific communities. Author name search is one of the most common query exercised in digital libraries. The name ambiguity problem in the context of author search in digital libraries, arising from multiple authors sharing the same name, poses many challenges. A number of name disambiguation methods have been...
Text Extraction plays an important role in finding valuable information. As a result of rapid growth of available multimedia documents on web and increasing requirement for information, identification, indexing and retrieval, several research have been done on text extraction. Here, a methodology to build a system for text extraction has been presented that is designed to provide support to the applications...
We take university library as an example to mine association rules from circulation records in university libraries. To satisfy the requirement of information service in libraries, a mining algorithm is presented. This paper using association rule mining techniques to find law from the library borrowed document, and recommendation service is found by these rules. Furthermore, a recommendation service...
The existence of the library as a technical service unit in a campus is very important to provide services to the academic community. With increasing number of library collections, database that is built has to be able to improve the services oriented on providing data warehouse. Especially at managerial level requires complete information, quickly and accurately to support the process and planning,...
Augmented Reality has revolutionized the way of looking at actuality. The colossal developments in this area have led to visualizations beyond desktop. Unreal objects can be augmented on real surfaces. Augmented Reality has converged the knowledge of computer vision, virtual reality, image-processing, human-to-computer interaction and more such areas. It has found applications in various expanses...
Recently, there have been a slew of design automation contests and released benchmarks. ISPD place & route contests, DAC placement contests, timing analysis contests at TAU and CAD contests at ICCAD are good examples in the past and more of new contests are planned in the upcoming conferences. These are interesting and important events that stimulate the research of the target problems and advance...
Gathering and analyzing statistic information is essential for every college or university, which cares about their students. This paper aims at giving theoretical overview of modern web page development and statistics gathering methods, analyzing present state of TUKE and designs a new statistics system, where emphasis is placed primarily on comfortable work of students with the system.
Biometric systems are developed to verily and-or identify persons, for access control, identification systems or border management. They are based on the unique biological characteristics of persons like face, finger, iris, hand, signature, voice. In comparing with other biometric technologies, the iris recognition system has very high recognition accuracy. This system consists of several stages including...
Ontology has been increasingly recognised as an instrumental artifact to help make sense of large amounts of data. However, the challenges of Big Data significantly overburden the process of ontology storage and query particularly. In this respect, the paper aims to convey considerations in relation to improving the practice of storing or querying large-scale ontologies. Initially, a systematic literature...
Smile is not only a visual expression. When it occurs together with speech, it also alters its acoustic realization. Being able to synthesize speech altered by the expression of smile can hence be an important contributor for adding naturalness and expressiveness in interactive systems. In this work, we present a first attempt to develop a Hidden Markov Model (HMM)-based synthesis system allowing...
With the development of the information society and computer science, voice information service is extensively used, which needs the support of speech synthesis system. Multilingual speech synthesis system has become a hot research topic. The development state and the future prospect for computer speech synthesis system are introduced and discussed. Application samples of speech synthesis are enumerated...
Collaborative filtering recommendation is a popular recommendation algorithm in electronic commerce, but the disadvantage of cold start still exists in the reason of new coming users and items. CBR (case-based reasoning) is used to get source case in history according to the notation of target case, and the source case plays a guiding role in solving the problem of the target case. It is a useful...
Test generation automation using Data Driven Architecture (DDA) is a challenging task. It involves an external database to feed test inputs to a test case sequentially. Same test case is executed repeatedly in a loop, to handle different test inputs. In this paper, a method is proposed to generate DDA based tests for Android mobiles. A tool called Virtual Test Engineer (VTE), which generates tests...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.