The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Thyroid nodules are common findings and thyroid cancer is projected to be one of the leading causes of cancer in women. The EHR includes the necessary data needed to connect clinical research with patient outcomes. The objective for this project was to develop and validate a usable informatics tool for clinicians and researchers to record, analyze, and be able to manipulate the clinical and research...
Due to the geomagnetic abnormality in indoor environment, made by various ferrous structural materials such as pipelines, the magnetic signals of a region are regularly different and sustainable. In this paper, we develop an application based on the Android system to implement the indoor geomagnetic positioning. To estimate the pedestrian's position, the real-time geomagnetic sequence measured by...
Interest on palmprint biometrics has experimented a strong growth in the last decades due to its useful characteristics as uniqueness, permanence, reliability, user-friendliness, acceptability, non-intrusiveness, and low cost of the acquisition devices, which make it attractive for civil and commercial applications. Accordingly, a wide research has been developed in this field. Nevertheless, there...
Literature survey is the first step of scientific research. However, this process could be quite time-consuming. Previous works aiming to automatically address this issue employ textual similarity or reference-relation between papers, while neither of which is flexible enough for context-specific demanded In this paper, we have proposed an idea to narrow down the search range for relevant literatures...
This article describes the use of the comparison method MM to protect the Internet user from the effects of DNS Injection attacks. A description of the basic concepts of this area of the computer network and the dangers of DNS Injection attacks is presented. The description of the MM method used in the literature is concluded. In the paper the concept of using above-mentioned method to protect Internet...
In conditions of information technology growth, systems which are being developed to be used on multiple platforms, gain in importance and popularity. As a rule, such systems have client-server architecture and have strong security requirements for user authentication. In this paper the information technology of user authentication for cross-platform systems has been developed, which is characterized...
A lot of products are sold on electronic commerce websites. There are many customer reviews available on the Internet. Users read them to select a product to purchase. However, going through the reviews is time-consuming because the number of reviews is large for each product. It is important to reflect reviews in a ranking to make a decision easily. The aim of this research is ranking products based...
Local databases have become an important component within mobile applications. Developers use local databases to provide mobile users with a responsive and secure service for data storage and access. However, using local databases comes with a cost. Studies have shown that they are one of the most energy consuming components on mobile devices and misuseof their APIs can lead to performance and security...
For reliable control of the cardiovascular, respiratory, musculoskeletal systems of the human body must be continuously recorded electro-cardio signal for a long time. Detected and quickly transferred over the wireless channel the most informative pieces of daily electro-cardio signal will allow duty cardiologists for react and provide the necessary medical care to remote cardiac patients. The sequences...
In today's economic conditions, engineers are faced with the problem of designing complex distributed computer systems under tight deadlines. Ensuring high reliability and robustness of such systems requires redundancy of their structure as well as the processes of data transmission and handling. The purpose of this study is to create simulation models and means to support computer-aided design of...
The integration of Internet of Things (IoT) and Cloud computing has brought the rising of IoT Clouds able to provide different kinds of IoT as a Service solutions consisting of various micro-services deployed in IoT devices (including sensors and actuators) interacting with different Infrastructure, Platform, and Software as Service (i.e., IaaS, PaaS, SaaS) running in the Clouds' data centres. On...
Indonesian Teacher Engagement Index (ITEI) is an instrument designed to help teachers to detect themselves through self diagnostic. The results of self-diagnostic is then systemally developed with the goal of becoming a decision support system for the central government to the areas in the field of education. This study aims to develop ITEI design as a Decision Support System in education especially...
Based on the field failure mechanisms in smart electrical energy meters, field operating abnormal data and maintenance data were analyzed. Discrimination analysis for field data was screened for predicting residual life. Through thoroughgoing analysis, field failure data, failure modes, failure mechanisms and external inducing stresses as well as their features with time were analyzed. Then the degradation...
SRAM-Based FPGAs represent a low-cost alternative to ASIC device thanks to their high performance and design flexibility. In particular, for aerospace and avionics application fields, SRAM-based FPGAs are increasingly adopted for their configurability features making them a viable solution for long-time applications. However, these fields are characterized by a radiation environment that makes the...
Mobile phones provide an excellent opportunity for building context-aware applications. In particular, location-based services are important context-aware services that are more and more used for enforcing security policies, for supporting indoor room navigation, and for providing personalized assistance. However, a major problem still remains unaddressed--the lack of solutions that work across buildings...
Past research on facial expressions have used relatively limited datasets, which makes it unclear whether current methods can be employed in real world. In this paper, we present a novel database, RAF-DB, which contains about 30000 facial images from thousands of individuals. Each image has been individually labeled about 40 times, then EM algorithm was used to filter out unreliable labels. Crowdsourcing...
Green IT is a concept about wisely, efficiently, and environmentally technology (IT) usage or adoption that exists due to the negative impacts of technology (IT) growth. There are some examples about Green IT applications that are used by the organization (firm) as the support tools of its business processes such as Paperless Office (PLO), E-Meeting, Remote System, and Cloud Computing. Although Green...
Temporal databases are characterized by significant data amount monitored over the time. Such values are stored with regards on validity during the whole time spectrum supporting decision making, reliability definition, analysis, progress monitoring and creating future prognoses. When dealing with various granulairty of changes, management must be shifted into attribute granularity level to remove...
Database management requires fast and reliable access to the data stored in the database for complex evaluating in intelligent information systems. Significant data amount must be handled, stored and consequently retrieved for analysis. Each data tuple is delimited by the time of occurrence or reflected by the validity. Temporal database approach uses various architectures based on data structure...
In public sectors, the trend of using electronic information sharing has transformed the traditional ways of information sharing either vertically or horizontally. The horizontal functioning of information sharing means sharing information within same level of organization such as sharing information between local governments. The vertical functioning of information sharing means sharing information...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.