Search results for "computer.file_format"
showing 10 items of 214 documents
The Relationship between Risk-Taking, Sensation-Seeking, and the Tourist Behavior of Young Adults: A Cross-Cultural Study
2004
This study analyzed the effects of the combined psychological characteristics of risk-taking and sensation seeking on the travel behavior and preferred tourist activities of young adults on leisure trips. The results of this cross-cultural study, which was conducted among 1,429 students at 11 universities located in 11 different countries, found that respondents with high combined risk-taking and sensation seeking (RSS) scores differed significantly in their travel behavior, mode of destination choice, preferred tourist activities and demographics, from those who had low RSS scores. The study also discovered a significant difference between nationalities on RSS scores.
RSS-eye: Human-assisted Indoor Localization without Radio Maps
2015
The pervasive diffusion of smartphones is boosting indoor positioning solutions and location-based services. We propose a novel methodology to perform indoor positioning of mobile users by the estimation of angles of arrival from access points whose locations are known. Angles of arrival are estimated by correlating WiFi RSSI measurements with data coming from a digital compass, which is provided by most current handsets. Our system has minimal requirements in terms of infrastructure and mobile hardware. The system neither needs calibration, nor radio maps but requires the user to perform a gesture when an estimation is needed. The resulting on-demand localization has advantages in terms of…
RepeatsDB in 2021: improved data and extended classification for protein tandem repeat structures
2020
The RepeatsDB database (URL: https://repeatsdb.org/) provides annotations and classification for protein tandem repeat structures from the Protein Data Bank (PDB). Protein tandem repeats are ubiquitous in all branches of the tree of life. The accumulation of solved repeat structures provides new possibilities for classification and detection, but also increasing the need for annotation. Here we present RepeatsDB 3.0, which addresses these challenges and presents an extended classification scheme. The major conceptual change compared to the previous version is the hierarchical classification combining top levels based solely on structural similarity (Class > Topology > Fold) with two new lev…
ISAdetect
2020
Static and dynamic binary analysis techniques are actively used to reverse engineer software's behavior and to detect its vulnerabilities, even when only the binary code is available for analysis. To avoid analysis errors due to misreading op-codes for a wrong CPU architecture, these analysis tools must precisely identify the Instruction Set Architecture (ISA) of the object code under analysis. The variety of CPU architectures that modern security and reverse engineering tools must support is ever increasing due to massive proliferation of IoT devices and the diversity of firmware and malware targeting those devices. Recent studies concluded that falsely identifying the binary code's ISA ca…
LaDy: Software for assessing local landscape diversity profiles of raster land cover maps using geographic windows
2003
Landscape ecology starts from the assumption that diversity and spatial arrangement of ecosystem mosaics have ecological implications and tries to understand the interactions between diversity and structure of large spatially heterogeneous areas and their ecological functions. These assumptions imply effective use of earth observation techniques and geographic information systems, enabling a global view of the landscape mosaics. In this paper, a software, LaDy (Landscape Diversity Software), for computing Re´nyi’s local landscape diversity profile on raster land cover maps is presented. LaDy is based on the use of Merchant’s adaptive geographic window, which is designed to operate on a neig…
RDB2OWL
2010
RDB2OWL is a simple approach of mapping relational databases into independently developed OWL ontologies. The approach is based on creating a mapping RDB schema, filling it with mapping information from which SQL scripts are generated that perform the instance-level transformation. We describe the RDB2OWL mapping schema and report on successful application of the technology to the migration of Latvian medical registries data.
An Approach to Data Quality Evaluation
2018
This research proposes a new approach to data quality evaluation comprising 3 aspects: (1) data object definition, which quality will be analyzed, (2) quality requirements specification for the data object using Domain Specific Language (DSL), (3) implementation of an executable data quality model that would enable scanning of data object and detect its shortages. Like the Model Driven Architecture (MDA) the data quality modelling is divided into platform independent (PIM) and platform-specific (PSM) models. PIM comprises informal specifications of data quality, PSM describes implementation of data quality model, thus making the data quality model executable. The approbation of the proposed…
Bezier curves approximation of triangularized surfaces using SVG
2006
This paper presents a technique to convert surfaces, obtained through a Data Dependent Triangulation, in Bezier Curves by using a Scalable Vector Graphics File format. The method starts from a Data Dependent Triangulation, traces a map of the boundaries present into the triangulation, using the characteristics of the triangles, then the estimated barycenters are connected, and a final conversion of the resulting polylines in curves is performed. After the curves have been estimated and closed the final representation is obtained by sorting the surfaces in a decreasing order. The proposed techniques have been compared with other raster to vector conversions in terms of perceptual quality.
Schema-Backed Visual Queries over Europeana and Other Linked Data Resources
2021
We describe and demonstrate the process of extracting a data-driven schema of the Europeana cultural heritage Linked data resource (with actual data classes, properties and their connections, and cardinalities) and application of the extracted schema to create a visual query environment over Europeana. The extracted schema information allows generating SHACL data shapes describing the actual data endpoint structure. The schema extraction process can be applied also to other data endpoints with a moderate data schema size and a potentially large data triple count, as e.g., British National Bibliography Linked data resource.
No Reservations Required: Achieving Fairness between Wi-Fi and NR-U with Self-Deferral Only
2021
Wireless technologies coexisting in unlicensed bands should receive a fair share of the available channel resources, even when they use different access methods. We consider the problem of coexistence between Wi-Fi and New Radio Unlicensed (NR-U) nodes, which employ, respectively, a random and scheduled access scheme. The latter typically resorts to reservation signals (RSs), which allow keeping the control of the channel until the start of the next synchronized slot. This mechanism, although effective for increasing the channel access opportunities of scheduled-based nodes, is also a waste of channel resources. We investigate alternative solutions, based on self-deferral only. We built ana…