The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In previous works, we presented Cross Motif Search (CMS), an algorithm designed to explore new techniques in the field of protein motif retrieval and identification. The novelty of the CMS approach is to look for geometrical similarities in the secondary structures of proteins, instead of homologous topology. Put in other words, while the connections among different secondary structures are still...
In this work, we propose to use the SSN ontology to manage the sensor information in an intelligent transportation architecture. The system performs the automatic traffic light settings allowing to predict and avoid traffic accidents and the routing optimization.
Fundamentals of Computer is a compulsory course of non-majors in many universities of China. In this paper, we explore the reform on this course for two goals. One is to redesign the teaching content: from operation oriented to computational thinking oriented. Computational thinking is one of the most important ability for 21st century and has become the primary goal of computer foundation education...
Network security management is a big challenge for network administrators due to increasing vulnerabilities. Vulnerabilities are the weakness of the network and allow malicious attackers access to resources controlled by an organization. To keep networks secure network administrators should be aware of all vulnerabilities through which an attacker can gain access. In this paper, we have considered...
In the article distinctive feature for modern IT equipment present on the European Union market have been presented. The collected measurement results of radiated emission generated by particular components of IT devices allowed it to build data base which could be used for identification of components characterized by too high level of radiated emission. This paper describes the implementation a...
In the current context of the information era, the teaching model of universities' environmental artistic design has undergone a great change. The Decoration Materials and Construction is an important professional course of the universities' environmental artistic design major, and also a course with an extremely big difficulty of cultivating talents. Starting from the teaching model of the environmental...
Knowledge about problem solving in business events is complex, besides, there is a dispersity in terms of the storage of the knowledge. As a result, islands of knowledge are common in problem solving of business events. Knowledge links established norms of the business problem to solve in the process of knowledge structure and connect with each other. Scenario links solving scenario factors of business...
This paper proposes an improved FP-Growth algorithm which modifies the support count to filter high confidence and high lift telecommunication network alarm big data. And to satisfy the big data environment, this paper improves the algorithm to be a distributed algorithm based on Spark. Experiments show that the improved FP-Growth algorithm mining strong association rules either in frequent patterns...
Information overload may affects everyone who receives, processes and presents the information. When individual is over supplied with the information which is more than he/she can process, it leads to information overload. In dealing with this phenomenon, individuals sometimes do not realize they are overloaded until the symptoms appear. Hence, it is important to recognize the starting point at where...
In today's scenario of data mining, there are so many upgraded versions of traditional Apriori has been launched in association due to its limitation of suffering from number of inefficiencies. Which have procreate other algorithms. The actual concept of this research topic is also one of them and it mainly focus on the description of the new version of hash based association using association rule...
Cloud Computing is a major field of study. Cloud Storage is regarded as an infrastructure to cloud computing and personal cloud storage are gaining popularity. This paper presents the development of a user friendly and efficient personal cloud synchronization and storage service using java and php. The application follows a new algorithm and its architecture is beyond the conventional client/server...
Examination affairs management is a bottleneck of the examination management information system because of its complex process, many participants and its confidentiality requirements. To solve this problem, an automated management information system of the examination affairs is present in this paper. In the system the examination affairs is controlled by the workflow based on forms, and its security...
Many studies of material property estimation and material recognition have been conducted. Previous approaches evaluate the validity or usefulness of hand-designed image features. Thus, we propose a method to directly and naturally acquire image features for material perception using convolutional neural networks. Using a fine-tuned network, we achieved approximately the same recognition accuracy...
With the cloud concept becoming more and more clearly, Web application has become one of the focuses in our life and work. The development of Web application is different from the one of traditional desktop application, its iteration cycle is short and its demand changes are special. More and more Web development teams turn to agile development, and Web application testing has encountered new challenges...
Mathematical theorems are human knowledge able to be accumulated in the form of symbolic representation, and proving theorems has been considered intelligent behavior. Based on the BHK interpretation and the Curry-Howard isomorphism, proof assistants, software capable of interacting with human for constructing formal proofs, have been developed in the past several decades. Since proofs can be considered...
We propose an approach to produce computer generated holograms (CGH) from RGBD data. Being able to produce CGH from RGBD images simplifies the recording process and results in more realistic reconstruction. A multilayer wavefront recording plane method is described for fast wave propagation, and it is completed with a two-step occlusion culling process to preserve the self-occlusion effect. The approach...
We propose a method to improve the consistency of human evaluation of non-native speaker's utterance, with a capability to evaluate features such as accent and rhythm. In this method, human evaluators evaluate the accent and the rhythm independently by using average voice model and prosody substitution. We also investigated the advantages of evaluating those features independently. We found that,...
Nowadays, there are more than 500 Quranic recitations available freely on the internet. Most of the audio files were recorded in MP3 format due to its popularity, but lossless audio coding has gained much interest due to its high quality. The drawback of the lossless audio coding is the higher bitrate requirement. In this paper, the characteristics of the Quranic recitation of all surahs from various...
Cancer is a major leading cause of death and responsible for around 13% of all deaths world-wide. Cancer incidence rate is growing at an alarming rate in Malaysia and the world as we know it. It is estimated that statistically one out of every four Malaysians will develop cancer by the age of 75. Conventional methods of diagnosing cancer rely solely on skilled physicians, with the help of medical...
The main purpose of analyzing the social network data is to observe the behaviors and trends that are followed by people. How people interact with each other, what they usually share, what are their interests on social networks, so that analysts can focus new trends for the provision of those things which are of great interest for people so in this paper an easy approach of gathering and analyzing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.