The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper proposes a novel method for identifying the same records across multiple databases in different languages. In order to identify the same records, we calculate the similarities between records by comparing the text values of metadata elements. The proposed method, i.e. finding the same records across multiple databases, will help users to know which organization has a certain record and...
A GPS system selects routes between two points with minimum physical distance or minimum driving time. Here we address a different type of route selection problem. Given a road map with driving distance and wireless connectivity for each road segment, find a driving route that maximizes total wireless connectivity while its length is bounded by a predetermined value. In this paper, we present three...
Double-pulse tests are commonly used as a method for assessing the switching performance of power semiconductor switches in a clamped inductive switching application. Data generated from these tests are typically in the form of sampled waveform data captured using an oscilloscope. In cases where it is of interest to explore a multi-dimensional parameter space and corresponding result space it is necessary...
Kinship verification from facial images in wild conditions is a relatively new and challenging problem in face analysis. Several datasets and algorithms have been proposed in recent years. However, most existing datasets are of small sizes and one standard evaluation protocol is still lack so that it is difficult to compare the performance of different kinship verification methods. In this paper,...
In an open Trusted Desktop Grid system, users can voluntarily participate in order to share resources. Thereby, computational trust is used to isolate malicious agents. Since a fully self-organised solution can suffer in emergent situations like the trust-breakdown scenario, we investigate an additional normative entity to guide the overall system behaviour by still keeping the autonomy of all agents...
By daily increasing appearance of vulnerabilities and various ways of intruding networks, one of the most important fields in network security will be doing network hardening and this can be possible by patching the vulnerabilities. But this action for all vulnerabilities may cause high cost in the network and so, we should try to eliminate only most perilous vulnerabilities of the network. CVSS itself...
Opportunistic Routing (OR) [1] is a new promising paradigm, which has been proposed as a way to increase the performance of wireless networks by exploiting its broadcast nature. It benefits from the broadcast characteristic of wireless mediums to improve the network performance. In OR, instead of pre-selecting a single specific node to be the next-hop as a forwarder for a packet, multiple nodes, usually...
Structures of real-world networks show varying degrees of importance of the nodes in their surroundings. The topic of evaluating the importance of the nodes offers many different approaches. We present simple and straightforward approach for the evaluation of the nodes in undirected unweighted networks. The approach is based on x-representativeness measure which is originally intended for weighted...
Similarity has been widely used in finding similar objects among complex and large scale information networks. Most of the current similarity comparison methods are the distance-based, link-based, neighborhood based similarity or the reference based similarity, and so on. They mainly make the similarity comparison with some kind of metrics but are lack of the measurement of the objects' semantics...
A fundamental solution of topical problem for economic, social and technological future of Ukraine and the world is proposed. The problem lies in the elimination of corruption through the formation and implementation of the state program «Creation of Cyber Physical Space for Digital Monitoring Technological Processes and Optimal Resource Management in order to Achieve Socially Important Goals». The...
This paper presents application software named NeighborNote which extends Ever note to include the capability of suggesting related notes based on the user operation history. NeighborNote calculates the relative ness between the notes based on the idea that the notes, which the user opened at the same time or copied & pasted across, may be related to one another. NeighborNote helps users find...
Service robots employed in public spaces need to be equipped with specific sensing, reasoning and human-robot interaction capabilities to adapt their interaction style and thus effectively engage with a variety of users. In this paper we present a method used by an ubiquitous robotic system to gather 3D body metrics and use them to robustly estimate age and gender of previously unseen participants...
The importance of software architecture in software development prolongs throughout the entire software life cycle. This is because quality of the architectural design defines the structural aspects of the system that are difficult to change, and hence will affect most of the subsequent development and maintenance activities. This paper considers software design flaws (related to the system structure)...
Trust is one source of information that has been widely adopted to personalize online services for users, such as in product recommendations. However, trust information is usually very sparse or unavailable for most online systems. To narrow this gap, we propose a principled approach that predicts implicit trust from users' interactions, by extending a well-known trust antecedents framework. Specifically,...
In recent years, practical software development exercises have been carried out in many higher education institutions. To carry out the exercises effectively, it is important that teachers understand the difficulty of learners in exercises and advise appropriately for it. Currently, a common way to check the results of the exercises is that teachers review artifacts which learners submitted. However,...
The sizes of hidden data sources are of great interests to public, researchers and even business competitors. Estimating the size of hidden data sources has been a challenging problem. Most existing methods are derived from the classic capture-recapture methods. Another approach is based on a large query pool. This method is not accurate due to the large variance of the document frequencies of queries...
The R&D Team SAES (Systems of the Alternate Energy Sources) is a group of teachers, technicians and research and development workers focussing on issues related to sensors, measuring, controlling, and intelligent management of systems using alternative energy sources. The team manages a number of learning and research laboratories and participates in activities by three research and development...
Decision-making is one of the most common activities in human resource allocation, transportation, and many other areas. In real problems, the decision-making problems often involve uncertainty such as roughness and fuzziness. Therefore, a proper uncertainty descriptive method is the foundation of complex decision-making problems. In this paper, we use rough fuzzy set to describe the uncertainty....
People play different roles in various social networks. Even in a single network, people may interact with others based on different roles, and there are various relationships among them. However, current research usually treats all relationships homogeneously (i.e. friendship). In this paper, we try to identify different types of relationship (family, colleague, and social) within social networks...
Unlike the current Internet where applications have little control over the path that their data travels, emerging network architectures enable applications to control the path their packets/flows take. Although an application can select its paths, providing an application with the up-to-date information needed to make an informed decision is a difficult problem. In particular, monitoring (i.e., collecting...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.