The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The bank client identity verification system developed in the course of the IDENT project is presented. The total number of five biometric modalities including: dynamic signature proofing, voice recognition, face image verification, face contour extraction and hand blood vessels distribution comparison have been developed and studied. The experimental data were acquired employing multiple biometric...
In this paper, we introduce a digital edition of the Altan Tobchi, a Mongolian historical manuscript written in traditional Mongolian script. The Text Encoding Initiative guidelines were adopted to encode the named entities, commentaries, transcriptions, and interpretations of ancient Mongolian words. Named entities such as personal names and place names were extracted from digitized text by employing...
We are in a time where trends and ICTs are capable of leading important educational changes and allowing an advance in flexible teaching environments, through innovation and collaboration between educational institutions. Teachers have a large number of technologies to use as an ally in the classroom, such as software agents in the teaching-learning process. The objective of this article is to make...
Starting in 2010, one of the most important policies for the introduction of Digital Technologies in schools, in modalities 1 to 1, has been implemented in Argentina: The “Programa Conectar Igualdad” (PCI, for its acronym in Spanish). This program proposed two complementary goals: one related to digital inclusion, which far exceeds school's ambit, and another one related to the improvement of education...
A new generation of cryptographic primitives is on the horizon and they are likely to replace soon many previous and widespread systems. This is due to the cybersecurity threat represented by the appearance of the first practical quantum computers, that will be able to easily solve several mathematical problems on which classical cryptographic systems rely. Cryptographic primitives based on error...
The purpose of this pilot study was to describe web reference use patterns of poison control center specialists using time tracking software. We analyzed two weeks of web site use data from Utah poison control center (PCC) computers to describe patterns of reference web site use. We observed frequent use of webPOISONCONTROL and Amazon. Specialists visited additional reference web sites that feature...
Soft ferrite materials are widely used in the construction of high frequency transformer for power electronic applications. Core loss calculation is essential both in the selection of soft ferrites and the design of high frequency transformer. Traditionally, the Steinmetz equation is used to evaluate the core loss of magnetic materials under sinusoidal excitation. Nevertheless, in modern power electronics,...
On behalf of the FGCT 2017 conference, the program committee has the pleasure to welcome the attendees to participate in the Sixth edition of the International Conference on the Future Generation Communication Technologies (FGCT 2017) which is dedicated to addressing the challenges in computing technologies for the new generation.
Transcranial magnetic stimulation (TMS) is a non-invasive brain stimulation technique to modify neural excitability. The effectiveness of TMS experiments critically depends on precise TMS coil position and orientation. There are many TMS coil positioning methods have been used to optimal TMS efficiency. But, sometimes these data are not always precise, and it will make the results uncertainty. To...
The problem of research is that there are challenges and obstacles that have emerged in distance education. It is an electronic system that allows the interaction between the teacher and the learner through a full presentation of the educational content of the courses. The modern means of computers 'networks and media are used. Education seeks to develop 'and develop it has faced some obstacles and...
The direct impact of the use of information and communication technology products increases energy consumption, the long term impact is the increase of electronic waste and carbon foot print on the environment. This research focused on the design of green computing environment based on the behavior of the energy consumption in a government agency in Indonesia. The research model composed of six variables,...
In this paper, we have presented a design of hybrid arithmetic logic unit (ALU) in Double precision format (DPF) according to the IEEE-754 standard. In this we have designed an ALU which consists of the two different architectures. First architecture is semi-floating point unit (Semi-FPU) and the second architecture is floating point unit (FPU). Semi-FPU takes a 32-bit integer input and produces an...
In late years, the effective application of IT for the efficiency of works is required further by the development of IT. The ability of users to carry out works effectively with IT is essential to implement it. This paper considers the work efficiency in people"fs work style today, and focuses on the task of document producing. The efficiency of document producing is the essential element in...
Cloud computing and Internet of Things (IoT) are computing technologies that provide services to consumers and businesses, allowing organizations to become more agile and flexible. The potential business values that cloud consumers can achieve depend a lot on the quality of service in the provided cloud services. Therefore, ensuring the quality of service through service-level agreements (SLA) for...
Graphs are a key form of Big Data. Although graph computing technology has been studied extensively in recent years, it remains a grand challenge to process large-scale graphs efficiently. Computation on a graph is to propagate and update the vertex values systematically. Both its complexity and parallelism are affected mainly by the algorithm's value propagating pattern. Efficient graph computing...
In this paper, we propose an efficient terrain meshing method based on discrete point cloud, which is based on the existing meshing method of 3D reconstruction. Our meshing method uses the DTM (Delaunay Triangle Mesh) as a criterion to establish vertex constraints and evaluation functions. We start from a seed triangle and use the growing method to extend the outer-edge of each triangle until all...
Organizations are exposed to various cyber-attacks. When a component is exploited, the overall computed damage is impacted by the number of components the network includes. This work is focuses on estimating the Target Distribution characteristic of an attacked network. According existing security assessment models, Target Distribution is assessed by using ordinal values based on users' intuitive...
Quantum Key Distribution (QKD) provides a secure way of generating shared cryptographic keys between a sender (Alice) and a receiver (Bob). The original BB84 protocol uses a two-dimensional polarization basis, limiting the information content of a single photon to 1 bit. Using the transverse position of single photons as one basis and the Fourier space as a second basis, one can construct a pair of...
Our society relies upon information processing at a scale never seen before in human history. We are indeed experiencing an exponential growth in processing demand, as more and more applications in the most disparate domains emerge. While continuous improvements in the manufacturing processes of microprocessors has been able so far to mitigate the ecological and economical costs this trend imposes,...
Not all mathematical problems that today are considered hard will remain hard after the advent of quantum computers. In fact, there are some quantum algorithms able to accelerate the solution of some problems that are hard to solve with classical non-quantum computers. Among these, Grover’s algorithm [1] is able to provide a quadratic speedup in the search of an item in a non-ordered list, whereas...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.