The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The article treats with the integration of an elaborate Lexicon Extended Language which is denoted all in the interconnected reuse process. The eLEL is a lexicon rich in information and allows to describe a software component such as: its identification, its notion, its behavior and its different characteristic. From this lexicon, we proposed a reused environment that included three processes, namely...
In the current context of the information era, the teaching model of universities' environmental artistic design has undergone a great change. The Decoration Materials and Construction is an important professional course of the universities' environmental artistic design major, and also a course with an extremely big difficulty of cultivating talents. Starting from the teaching model of the environmental...
In this study, life course theory was used to synthesize research on women's underrepresentation in computing across 4 stages of their academic trajectory: pre high-school, high-school, college recruitment, and college retention. The Association for Computing Machinery and IEEE Explore databases, as well as select journals that publish on women in computing, were searched for relevant work. The synthesis...
Though the issues of data quality trace back their origin to the early days of computing, the recent emergence of Big Data has added more dimensions. Furthermore, given the range of Big Data applications, potential consequences of bad data quality can be for more disastrous and widespread. This paper provides a perspective on data quality issues in the Big Data context. it also discusses data integration...
Context-aware systems have historically employed a limited range of available data and while research across a diverse range of domains is addressing an increasingly broad range of data the level of intelligence generated in context-aware systems remains generally very limited. This is arguably due to the highly dynamic nature and inherent complexity of context. Individuals view the world though a...
In this work we present our system of speech synthesis from a text written in Standard Arabic TTS-SA, the use of speech synthesis systems in our daily life will facilitate many tasks like helping the visually impaired while navigating computers using a screen reader, thus we judged extremely important to explore this area in order to bring a more to research, especially when we are dealing with the...
Any activity in a computer-supported cooperative working environment produces a set of traces. In a collaborative working context, such traces may be very voluminous and heterogeneous. They reflect all the interactive actions among the actors themselves and between the actors and the system. This paper examines what is required to exploit traces in the context of a collaborative working environment...
In this paper we explore the design of Leyline, a provenance-based desktop search and file management system, both on a conceptual and user interface level. We start with a comparative analysis and classification of previous provenance based search systems, examining their underlying assumptions and focus, search coverage and flexibility, as well as features and limitations. We then describe a novel...
In this paper we present a natural user interface system. The device utilized for achieving natural interaction is the MS-Kinect which provides RGB, depth & audio signal. Our system is based on the theory of multimodal interaction and provides the ability to the user to interact simultaneously with different applications using vocal commands and gesture in conjunction. The difference of our system...
Positive emotions have been proven to be a key factor for successful learning. In modern personalized learning environments informal learning takes a prominent role and with this the use of computer-mediated communication. Communication data, like for example chat logs, can be harvested for sentiments. Most sentiment analyses operate processing only verbal information. But the messages exchanged in...
SQL Injection (SQLI) is an attack method that is easy to achieve but often leads data leak and malicious control of the system, so anti SQLI is very important for applications using database. This paper proposes an algorithm for detecting SQLI based on statements sequence digest (SSD). Abstract SQL statement, SSD and its calculating method are defined; algorithms for building SSD and detection SQLI...
Context based Meaning Extraction is a process of finding the correct sense of a word from the sentence. Word Sense Disambiguation (WSD) algorithm is used to remove ambiguity of words and correct domain of a word to be displayed using Word Net Domain. In this paper, conventional methods of WSD such as dictionary and knowledge base, supervised, semi-supervised and unsupervised methods are compared....
The purpose of this paper is to develop a technology used in some company's interactive game players. Based on VC++, The video is captured and has a real-time processing, so that it can identify the shape of hands and realize the intercommunication between human and computer. It was introduced emphatically the use of video sources based on ir-camera, the identification of technical and implementation...
Although hash functions are a well-known method in computer science to map arbitrary large data to bit strings of a fixed length, their use in computer forensics is currently very limited. As of today, in a pre-step process hash values of files are generated and stored in a database, typically a cryptographic hash function like MD5 or SHA-1 is used. Later the investigator computes hash values of files,...
Knowledge modeling, acquisition, and proper use are crucial for successful computer playing of the game of GO. This paper presents a systematic approach for knowledge representations of GO-playing in which the meaning of a move is defined as a contextual pattern with respect to local contexts of surroundings of the move. This representation allows large amounts of contextual patterns, along with their...
The theories of concept lattice expansion and recovery were presented in this paper. Firstly, a formal context can be reduced from the viewpoint of objects or attributes by inclusion reduction, and its corresponding concept lattice can be constructed. And then, the concept lattice can be expanded dynamically according to the need, thus, the concept lattice of original formal context can be recovered...
This paper explores recent research done into the philosophy of data. The research utilizes experimental philosophy ideas combined with Information Technology methodologies to assess participants' philosophies of data. Reusing the concept of the Data Flow Diagram, I suggest a methodology of experimental philosophy that allows participants to categorize flows into data, information, and knowledge in...
The proliferation of deep Web offers users a great opportunity to search high-quality information from Web. As a necessary step in deep Web data integration, the goal of duplicate entity identification is to discover the duplicate records from the integrated Web databases for further applications(e.g. price-comparison services). However, most of existing works address this issue only between two data...
The Oracle database enables use of bulk operation in order to reduce time needed for commands execution over a large amount of data. Operations are called using PL/SQL programming language. Advantage of these operations is that they transfer a large amount of data in a single step to SQL engine where they are executed. Bulk operation may also be used with a limitation to maximal number of lines transferred...
Frequent pattern mining is a basic problem in data mining and knowledge discovery. The discovered patterns can be used as the input for analyzing association rules, mining sequential patterns, recognizing clusters, and so on. However, discovering frequent patterns in large scale datasets is an extremely time consuming task. Most research in the area of association rule discovery has focused on the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.