The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We have developed a screen sharing system to share contents between two persons, and applicable to one-to-one remote teaching. The screen of a PC at one side is shared with the screen of a tablet at the other side through the network to convey instructions from an operator to a collaborator. This system makes it possible to arbitrarily select a part of the screen of the PC at the operator side. The...
Nowadays, many kinds of IT-based healthcare products have been released, which measure the patients' health status and warn them of potential risk they might have. In addition, this accumulated data can be sent to remote medical staff in order for the users to get the proper guidelines or treatments from them. In this paper, we propose a simple approach which makes sure that the patients secure the...
Technological infrastructure and mines in Colombia conditions do not meet the standards, promoting events that endanger the lives of miners. This paper presents the design and implementation of an information system for access control and management of priority information in a central mining exploitation. The developed system allows to control the access of the miners, with alarms that warn of possible...
Biomedical time-series analysis is a diverse field that includes biomedical engineering, computer science, and medical achievements, with the goal to save human lives and improve the quality of healthcare. In this paper, we present a preliminary report on construction of an innovative web platform for heterogeneous multivariate biomedical time-series analysis. The platform will feature data upload,...
Integrated Development Environments (IDEs) provide a convenient standalone solution that supports developers during various phases of software development. In order to provide better support for developers within such IDEs, we need to understand how developers use them. To infer useful conclusions, such information should be gathered for different types of IDEs, for different programming languages,...
Biomedical time-series analysis is a diverse field that includes biomedical engineering, computer science, and medical achievements, with the goal to save human lives and improve the quality of healthcare. In this paper, we present a preliminary report on construction of an innovative web platform for heterogeneous multivariate biomedical time-series analysis. The platform will feature data upload,...
In this paper, we propose a novel approach to detect a targeted attack by visualizing the paths of lateral movement in which the attacker compromises several hosts in the targeted network step by step to achieve his final goal. To this end, we first identify a pair of hosts that has a relationship in which a host can have compromised the other host based on the suspiciousness of their activities and...
Inexpensive displays make large, tiled displays attractive for visual analysis and collaborative investigation. Especially in multi-user environments, the increased space allows to better organize the findings and results and, therefore, helps to improve collaboration. One important requirement is that all users can navigate seamlessly on the whole display space, while employing the standard software...
The cloud services are shared in one are more customers by pooling in a multitenant environment, which provides virtualized resources to the customer using different technologies. Virtual machine (VM) is a important software program, which is being used in cloud computing. It includes the behavior of the computer and also which is act as an implementation carrier to accomplish the running applications...
Cloud computing is the much sought after technology as it solves large computational problems by using various resources and also offers many other services through the internet. The computational offloading and the increased demand for timely and appropriate response for real time applications has resulted in the need to improve the performance of the cloud. In addition to this, the tremendous growth...
Network Functions Virtualization (NFV) enhances the flexibility of network service provisioning and reduces the time to services deployment. NFV and SDN promises transform the carrier networks, introducing innovation in the network core. NFV moves packet processing from dedicated hardware middleboxes to Virtualized Network Functions (VNFs), which run on virtual machines hosted on commercial off-the-shelf...
This paper presents a detailed survey on existing Business Intelligence (BI) tools for developing a dashboard in a typical academic setup. As a survey, few most popular BI tools like SpagoBI, Tableau, Pentaho, Qliksense, Jaspersoft and Jedox are considered based on the ease of use, support in terms of training and minimal initial cost. At the end, a sample dashboard has been developed using one of...
This paper shows the user search results with an images. Based on the given query it retrieves the image from huge database, first we give the importance for content concepts and location concepts. And also users locations (positioned by GPS) are used insert the location concepts. For the user preference using ontology but it take into consideration the semantic meaning of each keyword that expected...
More and more massive parallel codes running on several hundreds of thousands of cores enter the computational science and engineering domain, allowing high-fidelity computations up to trillions of unknowns for very detailed analyses of the underlying problems. During such runs, typically gigabytes of data are being produced, hindering both efficient storage and (interactive) data exploration. Here,...
In this paper, we introduce a method for synchronization of multiple devices based on context sharing and system design for multimodal contents service. A main advantage we can expect from our system environment is eliciting abundant function features of each device and exploiting them for rendering multimodal information in more efficient ways. To make it feasible, context s haring takes a significant...
This paper describes the design, comparison and evaluation of two software solutions from business intelligence category for the purpose of improving report process in the one of the biggest European steel companies. Industrial companies very often use old information system, which were made many years ago. Management chooses business intelligence solutions and our task was to set up web portals and...
This paper presents a qualitative assessment of access control in database management system to guide those who wish to implement a discretionary or/and non-discretionary access control model and need some support to choose the access control in database management system (DBMS) best suited to their security requirements. To accomplish this we apply the core concepts related to access control models,...
A decade ago volume visualization required costly workstations due to the high processing cost for visualization. Nowadays and with the rapid development of mobile graphics, opportunities to provide volume visualization on mobile devices have been increased. New graphic application programming interfaces (APIs) have been developed as worthy candidates to support the volume rendering core. This paper...
Data mining has been used as a technology in various applications of engineering, sciences and others to analysis data of systems and to solve problems. Its applications further extend towards detecting cyber-attacks. We are presenting our work with simple and less efforts similar to data mining which detects email based phishing attacks. This work digs html contents of emails and web pages referred...
In this paper we present the LUCAS Visual Browser system, a tool for land cover visual analytics. The system implements different web technologies in a multilayer server-client architecture in order to allow the user to visually analyse land cover heterogeneous information. The information manage is composed of EO multispectral and SAR products along with the multitemporal in situ LUCAS surveys. The...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.