The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We have presented the real time database management in mobile computing system and supported by mobile computing system. The process of the system including various mobile system those are wireless network, the database management, disconnection.
The authors deliver the comparative study between the directly reduced systems and step wise reduced systems. In this paper reduced order model corresponding to a higher order model, say T, in two steps using HSIA's method has been found. This method is very simple and gave stable reduced order system corresponding to the stable original system. This method is used twice to find the final reduced...
There are a lot of document image binarization techniques that try to differentiate between foreground and background but many of them fail to correctly detect all the text pixels because of degradations. In this paper, a new binarization method for document images is presented. The proposed method is based on the most commonly used binarization method: Sauvola's, which performs relatively well on...
Modeling of physical systems with high accuracy results into a complex model with higher-order dynamics. This creates intricacy in analysis, simulation and controller design. So one needs to find an approximate simpler representation of such complex systems while preserving the characteristic properties of the higher order system. Reduced lower order representations provide facility in easy analysis...
In current times, there has been a surge in the amount of collected data from computational systems. The vast amount of data can be useful in many applications and fields, particularly so in Big Data Analytics. However with a large collection of data there is a difficulty discovering important information. Automatic Document Summarization (ADS) systems are suitable for the task of outlining useful...
This paper presents a new approach for acoustic environment classification based on the discrete Hartley transform. The approach applies a Hidden Markov Model based classifier on test data composed of audio clips, in order to determine which environment is surrounding these audio clips. The approach uses features obtained from the discrete Hartley transform, leading to a set of features that require...
This paper explores the causality and responsibility problem (CRP) for the non-answers to probabilistic reverse skyline queries (PRSQ). Towards this, we propose an efficient algorithm called CP to compute the causality and responsibility for the non-answers to PRSQ. CP first finds candidate causes, and then, it performs verification to obtain actual causes with their responsibilities, during which...
Mobile ad hoc networks (MANET) is a type of networks that consists of autonomous nodes connecting directly without a top-down network architecture or central controller. Absence of base stations in MANET force the nodes to rely on their adjacent nodes in transmitting messages. The dynamic nature of MANET makes the relationship between nodes untrusted due to mobility of nodes. A malicious node may...
There are lot of treatments that are available for various diseases. No human can possibly know about all the medicines and the diseases. So, the problem is that there isn't any place where anyone can have the details of the diseases or the medicines. What if there is a place where you can find your health problem just by entering symptoms or just scanning an ECG or you can check whether the prescribed...
This paper describes the system dynamics architecture of UTASiMo, a simulation-based task analysis tool that simulates the outcomes of task analysis for a system design and estimates task execution times, workload, and human error probability. UTASiMo combines discrete event, agent-based, and system dynamics simulation methods to automatically construct and simulate models that correspond to different...
Modern smartphone applications rely on contextual information while providing the users with relevant and timely content and services. One way of generating such contextual information is by employing learning systems to model user behavior. Motion-based sensors, such as the accelerometer or gyroscope, have been previously employed for recognizing predefined high-level physical activities such as...
Our previous work led to the proposal of a method for secret computation without changing the polynomial degree in Shamir’s (k, n) secret sharing scheme. This scheme realizes secret computation for n
Pervasive computing envisions environments where computers are blended into everyday objects in order to provide added-value services to people. Already today, there is a growing number of advanced embedded systems around us, extended with computing and communication capabilities. However, pervasive applications raise major challenges in term of software engineering and remain hard to develop, deploy,...
This research examines human-robot acceptance during service encounters. Based on role theory and the technology acceptance model (TAM), we argue that users draw on various categories of expectations, which in turn, leads to a user's acceptance of frontline service robots (FSR). Results of a qualitative study with 63 participants reveal that users form their expectations toward FSR based on three...
Traditional ways of understanding customer behaviour are mainly based on predominantly field surveys, which are not effective as they require labor-intensive survey. As mobile devices and ubiquitous sensing technologies are becoming more and more pervasive, user-generated data from these platforms are providing rich information to uncover customer preference. In this study, we propose a shop recommendation...
Driven by the rapid growth in the area of the Internet of Things, everyday environments become increasingly smart and pervasive. Simultaneously, this development faces users with emerging challenges in interacting with pervasive environments. Due to the ongoing and often invisible embedding of functionality into everyday objects and environments, the wireless interconnection of devices and the increasing...
We present a framework for comprehensive model-based systematic design and staged verification of Human-in-the-Loop Cyber-Physical Systems (HiLCPS) to handle their inherent complexity. HiLCPS are systems where humans are in the middle of the feedback loop between their cyber and the physical components. HiLCPS designers require modern tools and simpler model-based approaches for design and verification...
This paper presents a novel tandem human-machine cognition approach for human-in-the-loop control of complex business-critical and mission-critical systems and processes that are monitored by Internet-of-Things (IoT) sensor networks and where it is of utmost importance to mitigate and avoid cognitive overload situations for the human operators. The approach is based on a decision making supervisory...
We present our results on the definition of a formal and interactive situation model improving comprehension of situations and supporting reasoning on projections of situations. The model is based on the rough sets and allows the creation of lattices that fuse the elements of an environment according to different perspectives and requirements of interest for a human operator. To support rapid decision...
The new advent of digitized has lead to rise of volume, velocity and variety of data by passing every hour. In reality, most of the data were stored on Cloud for managing the storage system. Most of the organizations were moving their data into the Cloud. Thus, Cloud Computing will play a vital role in today's world. Cloud Computing provides remote access to the Client on the basis of Pay-What-Use...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.