The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Previous fingerprinting techniques proposed for sensor-based indoor localization assume that the fingerprint database is constructed by the measurement of received signal strength (RSS) at a fixed transmit power of the transmitter sensors. In order to improve the performance of the fingerprinting technique, we consider using the measurement of path loss rather than RSS to better distinguish the signal...
Hybrid Cloud is a composition of private and publicclouds, which can assist an application to utilize the advantages of distinct clouds and achieve high availability, scalability and robustness. Despite its benefits, hybrid cloud can present special challenges such as cloud heterogeneity, inconsistent interface, communication overhead between clouds and etc. In this paper, we propose a novel prediction...
Implementing database operations on parallel platforms has gain a lot of momentum in the past decade. A number of studies have shown the potential of using GPUs to speed up database operations. In this paper, we present empirical evaluations of a state-of-the-art work published in SIGMOD'08 on GPU-based join processing. In particular, this work presents four major join algorithms and a number of join-related...
Building a spontaneous, multi-modal, rich-annotated emotion database is a challenging work. Although there have been a growing number of emotional corpora available, most of them were recorded in ‘lab controlled’ environment. This paper presents a recently collected database, CASIA Natural Emotional Audio-Visual Database. This corpus contains two hours spontaneous emotional segments extracted from...
Rural educational resource regional service platform is service-oriented, providing personalized service to users anywhere who participate in distance education. Users can acquire resources based on their interests, achieving to share educational resources in the maximum extent. The paper first briefly analyses the mode, the present situation and the characteristics of rural education, then puts forward...
To meet the needs of knowledge management for product development, a knowledge active push model was proposed. The knowledge flow of the active push mechanism was analyzed as well as design knowledge organization and knowledge match of the system. A multi-table-based knowledge discovery method was introduced. To push the right knowledge to the right person, a knowledge-weight-based active push algorithm...
The educational information resource management system, which is based on SOA, achieves the goal of "change as need" for the system, ensures rapid update of the businesses and functions, improves the services of reuse, shortens the system development cycle, and cuts down the developed costs. This paper firstly analyzed the current educational resources management system, and found the existing...
The problem of academic expert recruiting is concerned with finding the experts on a specified research field. It has many real-world applications and has recently attracted much attention. However, the existing methods are not versatile and entirely suit for the special requirements from academic area where the co-authorship and the citation relation play important roles in judging researcherspsila...
In this paper, a design schema of a security authentication system combined with fingerprint identification and public key cryptography is explored, and its specific security mechanism is discussed in detail. In our schema, fingerprint is added into user's private key and served as a security parameter, such that user's secret key is separated into secret key parameters and fingerprint, by secret...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.