The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the last few years, several works in the literature of software engineering have addressed the problem of requirement management. A majority problem of software errors is introduced during the requirements phase because much of requirements specification is written in natural language format. As this, it is hard to identify consistencies because of too ambiguous for specification purpose. Therefore,...
Service creation by composing existing services and/or network resources is considered by Telecom and Internet industries as the trend for service provisioning in next generation networks. Related research work is being carried out for years, and various service composition approaches have been proposed by different standardization organizations and companies catering to different network requirements...
Telugu is an Indian language spoken by more than 50 million people in the country. Language is very rich in literature, and it requires advancements in computational approaches. Applications like machine translation, speech recognition, speech synthesis and information retrieval need a powerful morphological generator to give morphological forms of nouns and verbs. The existing Telugu morphological...
What is a cloud application precisely? In this paper, we formulate a computing cloud as a kind of graph, a computing resource such as services or intellectual property access rights as an attribute of a graph node, and the use of a resource as a predicate on an edge of the graph. We also propose to model cloud computation semantically as a set of paths in a subgraph of the cloud such that every edge...
In order to obtain full value from Business Process Management (BPM) solutions, small and medium-sized enterprises (SMEs) need to adopt an integrated suite approach that combines the Enterprise Resource Planning (ERP) functionality with the extended process capabilities. In this paper we propose a unified configurable architecture (UCA) to simplify and quicken the implementation of a BPM solution...
Nowadays, how to efficiently compose Web services has become a hotspot. In this paper, we introduce a method of recommending an optimal service sequence based on the original service sequence for a composite service. This method uses a Bayesian-based approach and selects the service sequence that has the largest probability as the best choice. Compared with existing methods, this method has two advantages:...
This work presents an empirical property-based model to describe Web-based vulnerability. We define a web application using a new descriptive model with pre-condition, behavior, entity and communication property sets. The vulnerable property relationship graph (VPRG) defines a vulnerability as vulnerable properties in application with relations to other properties in cause- and consequence-relationships...
Among many service choreography description languages, WS-CDL which has been developed by W3C is the most popular one. This language is an intermediate language mostly considered as a design language to describe the choreography, and is unable to model the choreography in high level. Regard to this issue, this paper proposes a set of notations, used at the analysis phase, help user to express the...
Services participating in the composition are usually co-ordinated according to a workflow, composed by several activities, each of which carried out by a service. The binding of services to workflow activities may be affected by several parameters (e.g., QoS, price, reputation, etc.). In this paper, we propose a service binding driven by a further important requirement, that is, the incompatibilities...
A novel eye detection algorithm based on rank order filter is proposed in this paper. Features such as eyeball is round and darker than surrounding pixels are widely used in eye detection. However quite often eyeball is distorted by iris reflection or other obstacles around eyeball. Rank order filter pair is designed to tackle these problems. One rank order filter is applied on central pixels to emphasize...
We present a Chu spaces semantics of typical control flow of BPEL including fault handling and link semantics. BPELcf is proposed as a simplification of this subset of BPEL. For the compositional modeling of BPEL, we present a Chu spaces process algebra consisting of seven operators. These operators allow faults to be thrown at any point of execution and take link-based synchronization into consideration...
Risk management is an important process for public service organizations to maintain a high quality of service. However, many organizations are not satisfied with the result from risk handling. This paper proposes changes to a risk management model by integrating service level agreements into it. This makes responsibilities more clear to all parties involved in risk management. This paper also introduces...
With the emergence of Web service mashups, selecting the appropriate Web services from the vast amount of available services has emphasized the role of service discovery. In this research, we present a new way of enhancing Web services semantically using WordNet concepts (synsets). The important advantage of our solution is that it allows developers to enhance Web services with semantic information...
When large data repositories are coupled with geographic distribution of data, users and systems, it is necessary to combine different technologies for implementing high-performance distributed knowledge discovery systems. On the other hand, computational grid is emerging as a very promising infrastructure for high-performance distributed computing. Grid applications such as astronomy, chemistry,...
Archive is a collection of historical records which have been accumulated over the course of an individual and institution's lifetime. Archive is considered as an invaluable asset which provides us with an insight into the lives and circumstances of past generations. In this paper, we describe the workflow model of an archival management system adopted by Macau Historical Archives. To further analyze...
Mining data streams for knowledge discovery is important to many applications, including Web click stream mining, network intrusion detection, and on-line transaction analysis. In this paper, by analyzing data characteristics, we propose an efficient algorithm SWSS (Sequential pattern mining with the weighted sliding window model in SPAM) to mine frequent sequential patterns based on the weighted...
We call an electronic robust one then, if it the stress-like electronic change without a breakdown, possibly beside a minimal damage, not disturbing the normal function possibly, tolerates it. Not really definable the extreme changes quantity and his qualitative parameter, and the measure of the robustness. It was thawing out in robust electronics applications electronic circuit redundancy, the safe,...
Steganography it is an art of secret transmission by embedding data into multimedia and steganalysis is an attacking technology on steganography, which can be used to judge the existence of secret data, decode and even destroy it. An effective steganalysis method should measure the characteristics of embedded messages and digital image and give decision about steganography. Most recent steganalysis...
Signature verification is the process used to recognize an individual's handwritten signature to prevent fraud. In this paper pressure at the pen-tip together with the x, and y coordinates of the signature are measured and features extracted from these are used to verify the signature. A pressure pad was used to obtain signature samples. A signature verification system using SOM neural network was...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.