Search results for "computer.file_format"

showing 10 items of 214 documents

The Relationship between Risk-Taking, Sensation-Seeking, and the Tourist Behavior of Young Adults: A Cross-Cultural Study

2004

This study analyzed the effects of the combined psychological characteristics of risk-taking and sensation seeking on the travel behavior and preferred tourist activities of young adults on leisure trips. The results of this cross-cultural study, which was conducted among 1,429 students at 11 universities located in 11 different countries, found that respondents with high combined risk-taking and sensation seeking (RSS) scores differed significantly in their travel behavior, mode of destination choice, preferred tourist activities and demographics, from those who had low RSS scores. The study also discovered a significant difference between nationalities on RSS scores.

RSS05 social sciencesGeography Planning and DevelopmentInternational comparisons050109 social psychologyTransportationcomputer.file_formatTravel behaviorTourism Leisure and Hospitality Management0502 economics and businessCross-culturalSensation seeking0501 psychology and cognitive sciencesYoung adultPsychologyRisk takingcomputerSocial psychology050212 sport leisure & tourismTourismJournal of Travel Research
researchProduct

RSS-eye: Human-assisted Indoor Localization without Radio Maps

2015

The pervasive diffusion of smartphones is boosting indoor positioning solutions and location-based services. We propose a novel methodology to perform indoor positioning of mobile users by the estimation of angles of arrival from access points whose locations are known. Angles of arrival are estimated by correlating WiFi RSSI measurements with data coming from a digital compass, which is provided by most current handsets. Our system has minimal requirements in terms of infrastructure and mobile hardware. The system neither needs calibration, nor radio maps but requires the user to perform a gesture when an estimation is needed. The resulting on-demand localization has advantages in terms of…

RSSI indoor localization WiFi AoA estimationbusiness.industryComputer scienceSettore ING-INF/03 - TelecomunicazioniAngle of arrivalRSSCompassReal-time computingcomputer.file_formatbusinesscomputerMultipath propagationComputer network
researchProduct

RepeatsDB in 2021: improved data and extended classification for protein tandem repeat structures

2020

The RepeatsDB database (URL: https://repeatsdb.org/) provides annotations and classification for protein tandem repeat structures from the Protein Data Bank (PDB). Protein tandem repeats are ubiquitous in all branches of the tree of life. The accumulation of solved repeat structures provides new possibilities for classification and detection, but also increasing the need for annotation. Here we present RepeatsDB 3.0, which addresses these challenges and presents an extended classification scheme. The major conceptual change compared to the previous version is the hierarchical classification combining top levels based solely on structural similarity (Class > Topology > Fold) with two new lev…

Repetitive Sequences Amino AcidAcademicSubjects/SCI00010BiologíaStatistics as TopicProtein Data Bank (RCSB PDB)Computational biologyBiologyRepetitive SequencesGene Ontology; HEK293 Cells; HeLa Cells; Humans; Proteins; Reproducibility of Results; Statistics as Topic; User-Computer Interface; Databases Protein; Repetitive Sequences Amino Acid; Tandem Repeat SequencesDatabases03 medical and health sciencesAnnotationUser-Computer InterfaceProtein structureSimilarity (network science)Tandem repeatGeneticsDatabase IssueHumansDatabases ProteinCiencias Exactasdatabase030304 developmental biology0303 health sciencesHierarchy (mathematics)Protein030302 biochemistry & molecular biologyProteinsReproducibility of Resultscomputer.file_formatProtein Data BankClass (biology)proteinsAmino AcidComputingMethodologies_PATTERNRECOGNITIONGene OntologyHEK293 CellsclassificationTandem Repeat Sequencesprotein tandem repeat structures[INFO.INFO-BI]Computer Science [cs]/Bioinformatics [q-bio.QM]computerHeLa CellsNucleic Acids Research
researchProduct

ISAdetect

2020

Static and dynamic binary analysis techniques are actively used to reverse engineer software's behavior and to detect its vulnerabilities, even when only the binary code is available for analysis. To avoid analysis errors due to misreading op-codes for a wrong CPU architecture, these analysis tools must precisely identify the Instruction Set Architecture (ISA) of the object code under analysis. The variety of CPU architectures that modern security and reverse engineering tools must support is ever increasing due to massive proliferation of IoT devices and the diversity of firmware and malware targeting those devices. Recent studies concluded that falsely identifying the binary code's ISA ca…

Reverse engineeringprosessoritComputer scienceFirmware02 engineering and technologycomputer.file_formatcomputer.software_genrehaittaohjelmatInstruction setObject codeComputer engineering020204 information systemsEndianness0202 electrical engineering electronic engineering information engineeringMalwareesineiden internet020201 artificial intelligence & image processingBinary codeExecutabletietoturvacomputerProceedings of the Tenth ACM Conference on Data and Application Security and Privacy
researchProduct

LaDy: Software for assessing local landscape diversity profiles of raster land cover maps using geographic windows

2003

Landscape ecology starts from the assumption that diversity and spatial arrangement of ecosystem mosaics have ecological implications and tries to understand the interactions between diversity and structure of large spatially heterogeneous areas and their ecological functions. These assumptions imply effective use of earth observation techniques and geographic information systems, enabling a global view of the landscape mosaics. In this paper, a software, LaDy (Landscape Diversity Software), for computing Re´nyi’s local landscape diversity profile on raster land cover maps is presented. LaDy is based on the use of Merchant’s adaptive geographic window, which is designed to operate on a neig…

Rényi’s parametric entropyEarth observationEnvironmental EngineeringGeographic information systemLandscape diversity profilePixelbusiness.industryEcologyEcological Modelingmedia_common.quotation_subjectcomputer.file_formatLand coverConvolution operationsGeographySoftwareconvolution operations; landscape diversity profile; re´nyi’s parametric entropy; rényi's parametric entropyRaster graphicsLandscape ecologybusinesscomputerCartographySoftwareDiversity (politics)media_common
researchProduct

RDB2OWL

2010

RDB2OWL is a simple approach of mapping relational databases into independently developed OWL ontologies. The approach is based on creating a mapping RDB schema, filling it with mapping information from which SQL scripts are generated that perform the instance-level transformation. We describe the RDB2OWL mapping schema and report on successful application of the technology to the migration of Latvian medical registries data.

SQLInformation retrievalRelational databaseComputer scienceInformationSystems_DATABASEMANAGEMENTcomputer.file_formatcomputer.software_genreSemanticsInformation schemaSchema (genetic algorithms)Scripting languageRDFcomputercomputer.programming_languageProceedings of the 6th International Conference on Semantic Systems
researchProduct

An Approach to Data Quality Evaluation

2018

This research proposes a new approach to data quality evaluation comprising 3 aspects: (1) data object definition, which quality will be analyzed, (2) quality requirements specification for the data object using Domain Specific Language (DSL), (3) implementation of an executable data quality model that would enable scanning of data object and detect its shortages. Like the Model Driven Architecture (MDA) the data quality modelling is divided into platform independent (PIM) and platform-specific (PSM) models. PIM comprises informal specifications of data quality, PSM describes implementation of data quality model, thus making the data quality model executable. The approbation of the proposed…

SQLbusiness.industryComputer sciencemedia_common.quotation_subjectSoftware requirements specificationcomputer.file_formatLinked dataData modelingData integrityData qualityQuality (business)ExecutableSoftware engineeringbusinesscomputermedia_commoncomputer.programming_language2018 Fifth International Conference on Social Networks Analysis, Management and Security (SNAMS)
researchProduct

Bezier curves approximation of triangularized surfaces using SVG

2006

This paper presents a technique to convert surfaces, obtained through a Data Dependent Triangulation, in Bezier Curves by using a Scalable Vector Graphics File format. The method starts from a Data Dependent Triangulation, traces a map of the boundaries present into the triangulation, using the characteristics of the triangles, then the estimated barycenters are connected, and a final conversion of the resulting polylines in curves is performed. After the curves have been estimated and closed the final representation is obtained by sorting the surfaces in a decreasing order. The proposed techniques have been compared with other raster to vector conversions in terms of perceptual quality.

SVG Triangulation Bezier curvesScalable Vector GraphicsSortingTriangulation (social science)Image processingBézier curvecomputer.file_formatComputer Science::Computational GeometryFile formatVisualizationComputer graphics (images)Representation (mathematics)computerComputingMethodologies_COMPUTERGRAPHICSMathematicsSPIE Proceedings
researchProduct

Schema-Backed Visual Queries over Europeana and Other Linked Data Resources

2021

We describe and demonstrate the process of extracting a data-driven schema of the Europeana cultural heritage Linked data resource (with actual data classes, properties and their connections, and cardinalities) and application of the extracted schema to create a visual query environment over Europeana. The extracted schema information allows generating SHACL data shapes describing the actual data endpoint structure. The schema extraction process can be applied also to other data endpoints with a moderate data schema size and a potentially large data triple count, as e.g., British National Bibliography Linked data resource.

Schema (genetic algorithms)Structure (mathematical logic)Information retrievalResource (project management)Computer scienceProcess (engineering)Database schemaSPARQLcomputer.file_formatLinked dataRDFcomputer
researchProduct

No Reservations Required: Achieving Fairness between Wi-Fi and NR-U with Self-Deferral Only

2021

Wireless technologies coexisting in unlicensed bands should receive a fair share of the available channel resources, even when they use different access methods. We consider the problem of coexistence between Wi-Fi and New Radio Unlicensed (NR-U) nodes, which employ, respectively, a random and scheduled access scheme. The latter typically resorts to reservation signals (RSs), which allow keeping the control of the channel until the start of the next synchronized slot. This mechanism, although effective for increasing the channel access opportunities of scheduled-based nodes, is also a waste of channel resources. We investigate alternative solutions, based on self-deferral only. We built ana…

Scheme (programming language)business.industryComputer scienceRSSAccess methodReservationcomputer.file_formatRecurrent neural networkWirelessNetwork performancebusinesscomputerComputer networkcomputer.programming_languageCommunication channelProceedings of the 24th International ACM Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems
researchProduct