The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Roadway traffic safety is a major concern for transportation governing agencies as well as ordinary citizens. In order to give safe driving suggestions, careful analysis of roadway traffic data is critical to find out variables that are closely related to fatal accidents. In this paper we apply statistics analysis and data mining algorithms on the FARS Fatal Accident dataset as an attempt to address...
This paper describes analysis of perception of external people of school about school mottos. Most of schools show their school motto on their web page to advertise their educational policy and philosophy. However, school mottos are sometimes created to make a guideline of behavior, attitude, and thought for their students to be used in education purpose. In this paper, we survey the school motto...
In this paper, we combine a framework for ethical requirement elicitation eFRIEND with automated reasoning. To provide trustworthy and secure IoT for vulnerable users in healthcare scenarios, we need to apply ethics to arrive at suitable system requirements. In order to map those to technical system requirements, we employ high level logical modeling using dedicated Isabelle frameworks for (1) infrastructures...
Web services bring more conveniences for users and developers. However, it makes user face the problem of service information explosion. The personalized service recommendation solves the problem. This paper proposes a method to predicting the system reliability which bases on user context information in mobile computing environment. The method construct user behavior model by formatting user location...
The Human-as-a-Sensor (HaaS) paradigm, where it is human users rather than automated sensor systems that detect and report events or incidents has gained considerable traction over the last decades, especially as Internet-connected smartphones have helped develop an information sharing culture in society. In the law enforcement and civil protection space, HaaS is typically used to harvest information...
Occupancy detection of a building has a wide range of applications. Areas such as emergency management, home automation and building energy management can benefit from the knowledge of occupants' locations to provide better results and improve their efficiency. Bluetooth Low Energy (BLE) beacons installed inside a building are able to provide information on an occupant's location. Since, however,...
In this paper, we discuss various economic indicators and the theory of predicting them using autoregressive models. We then construct a VAR(4) model (vector autoregressive model of order 4) on a small selection of indicators to predict Gross Domestic Product. The predicted result of this model matches historical GDP data well and predicts consistent future growth.
Model Based Testing (MBT) is defined as the process of generating functional test cases based on a model that describes the behavior of an application under test (AUT). It is used to ensure that the intended purpose of the application will function as expected, where if any change in the behavior is encountered it would be reported as a bug. Previous research in MBT has only focused on automating...
Performance prediction is critical in embedded system design for reducing the turnaround time of software. Using simulation to measure the performance of the whole source code is often too slow, particularly after the modification of the source code due to changes in problem specification. In this paper we present a comprehensive method that combines analytical modeling and statistical approach to...
Agile process and User Centered Design (UCD) approach are two fields with high beneficial opportunities when integrated together. Both are based on minimal design up front and frequent feedback from users, and both are human-centered. However, one of the main concerns in integrating them is how to coordinate the work properly specially in distributed projects. The traditional methods used (e.g. video...
Global software development (GSD) is in a booming stage from the last decade with the advances in information and communication technologies (ICTs). Despite of the benefits gained from GSD, the developer organizations still face a lot of difficulties in integrating the software components, developed by various GSD teams, into a final product. In our previous study we identified a list of nine critical...
Microservice is an architectural style that has recently started gaining popularity to become a new architectural phenomenon. Microservice architecture provides new opportunities to deploy scalable, language free and dynamically adjustable applications. This type of applications consist of hundreds or more of service instances. So that, management, monitoring, refactoring and testing of applications...
As computing technology advances, computers are being used to orchestrate and advance wide spectrums of commercial and personal life, an element even more significant as we immerse ourselves into the era of big data, leading to an economy heavily reliant on data mining and precise, meaningful visualizations. However, accuracy of information visualization techniques is heavily dependent on the knowledge...
The Software Enterprise at ASU aims at equipping students with practical knowledge of modern software practices through a multi-year instructional sequence that employs an iterative feedback pedagogical model in order for graduates to be adequately prepared for the workforce upon graduation. By means of the Software Enterprise Website, the community of teaching practitioners in this area having similar...
In this paper, we design a distributed platform for anonymized dataset trading without any centralized trusted third party. The platform consists of peers and consensus-based blockchain mechanism, and each peer acts as a data broker, data receiver, or verifier for blockchain in a data transfer transaction. A data broker collects data from data owners under their consent for data trading. The Privacy...
Person re-identification is an important task of matching pedestrians across non-overlapping camera views. In this paper, we exploit a weighted feature descriptor for person re-identification. We firstly compute the weights on the superpixel level via graph-based manifold ranking algorithm, then integrate the computed weights into a patch-based feature descriptor, named local maximal occurrence. Finally,...
In this paper, we describe a cloud platform for health care tourism of Hainan province, China. The relevant business process is designed in a way that the characteristics of health care are taken into account. A scheme that combines medical tourism with a self-health care system and a nursing system is proposed. The data storage structure of the health care system is given, together with the specific...
Health services delivery relating to chronic diseases in elders are becoming a hot spot with the progressively severity in population aging in China. To provide a better service system for the elders, researchers have used active rule based techniques including Event-Condition-Active (ECA). In this paper, we enhanced ECA to ECA-Sequence (ECA-S) rules to detect abnormal condition in physiological indices...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.