The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The rapid growth of digital data storage of medical or health, social media, education and many more in the world has amplified the demand for big data storage, which requires trillion of files having exabytes of data. This growth in data has put up the key question of how we can effectively manage and find the data in the emergent ocean of information. The upcoming demand for data storage in petabytes...
In recent years, there has been a great interest in analyzing complex text documents and corpora. Digital textual content is being increased day by day and it is very challenging to summarize all the data to be meaningful content and also to understand the relationship among the data. The objective of this experiment is to classify the terminologies based on related topics and to visualize the classified...
This paper presents a novel application of commodity Graphics Processing Units (GPU), the OpenMP CPU parallelization library, and the Qt4.8 framework for a real-time characterization and calibration utility created to meet the needs of the Imaging Spectroscopy community. Until now FPA calibration was performed offline in MATLAB or IDL due to the high throughput required to process incoming data —...
This paper discusses some basic methods of text documents classification. Results of its analysis are presented in the table of comparative characteristics in accordance with the list of proposed parameters.
Big-Data has opened up enormous opportunities for a variety of industries. Our ability to process large amounts of data, particularly a plethora of types of data, within a unified processing platform has been extremely useful in pushing the boundaries of what can be achieved from our computational models and how we can apply that to solve real life problems. This paper enumerates the main areas where...
Development of computer technology today has a major role in the development process of interaction in computer-based applications. Various innovations in creating the user experience of applications began are increasing. Augmented reality is a technology model the interaction between humans and computers by using a model of a merger between the real world with the virtual world. This development...
A system that makes one send/receive SMS and be notified of calls using a computer via a bluetooth connection to one or more android mobile devices is presented in this paper. The system is called iSMS which is a client-server system with an android app as the client and a java swing app as the server. The server app uses the ABTSMSLib (Android BlueTooth SMS Library), a work in progress which currently...
With the development of the information society and computer science, voice information service is extensively used, which needs the support of speech synthesis system. Multilingual speech synthesis system has become a hot research topic. The development state and the future prospect for computer speech synthesis system are introduced and discussed. Application samples of speech synthesis are enumerated...
Cryptography and Encryption methods are means to ensure confidentiality of data transferred from one computer to another. While design of appropriate security protocols is vital for information security, making sure that they are implemented accurately and effectively is even more important. Effective implementation of encryption algorithms and security protocols involves implementing big number arithmetic...
Gender classification has found application in a myriad of fields such as surveillance, interaction between humans and computers, face recognition and most recently in digital signage for gender-targeted advertising. There are several existing methods of gender classification such as Principal Component Analysis (PCA), Linear Discriminant Analysis (LDA) and Support Vector Machines (SVM). All these...
Nowadays the technology is improving in a fast pace and the service sector is getting widely boomed. Consumers who are giving prior importance to quality consider several factors for choosing the service. Among them the service rendered by academic libraries also matter a lot because of the growth of digital libraries. The objective of this paper is to find factors which are more important for assuring...
One of the problems in the computer security system is port scanning attack. There are several detection systems have been developed to find out the occurrence of port scanning attack, one of them is anomaly detection method. A mechanism on how to implement the detection process in a more simple and effective way is a real serious challenge. In this paper, we design a simple implementation of anomaly...
This paper presents a development proposal of a systemcapable of detecting, localizing and tracking vehicles inreal time using computer vision algorithms in an embeddedplatform for an advanced driver assistance system (ADAS). This project will use a Flea3 monocular color camera fromPointGrey. The video will be processed using support vectormachines (SVM) and convolutional neural networks (CNN). These...
The exchange image file format (Exif) standard defines the specification for how to store metadata and ancillary tags for multimedia files. These tags are useful in documenting information about how the content in the multimedia file was collected, stored, and modified. The list of available tags are constantly being updated, with one of the most notable updates being the Global Positioning System...
This paper presents a data acquisition and visualization system, with storage in the cloud, applied to photovoltaic (PV) systems. The proposed system uses an embedded computer to perform communication with PV inverters via the RS485 standard. The system developed also performs the acquisition of meteorological data, the computer embedded obtain data by a microcontroller that performs reading of the...
In order to provide better knowledge service for teachers and students in colleges and universities, this paper discusses about the future models of knowledge service in digital library. By adopting the methods of comparison and analysis, comparative analysis of the concept of digital library, knowledge service and the knowledge service in digital library, and analysis their characteristics too. The...
Tourism is a potential sector for national income. But in Indonesia, people still have less concern about the importance of tourism. This situation may be caused by the static and uninteresting method to promote Indonesian tourism. A suitable solution is implementing digital signage for e-tourism to increase people attraction to Indonesian tourism. Earlier research has been done to implement digital...
This paper outlines issues of designing environments for real-time dynamic displaying of vector object-oriented 2D open-text formatted schemes with large number of rendered objects. Graphical objects and their dynamic behaviour are treated as entities with mutable structure — string-indexed containers. The article emphasizes significance of container elements rapid lookup by given key for application...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.