Search results for "computer.software_genre"

showing 10 items of 3858 documents

An Investigation of the Energy Consumption by Information Technology Equipments

2013

The World Wide Web and the rise of servers and PC's data centers have become a major position in the overall power consumption of the world. In order to prevent global warming and ensuing disasters, already Internet-service providers, hosting providers on green power have changed. Even household energy suppliers offer green electricity from renewable energy such as wind , solar, biomass and hydro, which emits no carbon dioxide, to stand against global warming. Only a global change for the information technology can prevent the global -warming. The switch to renewable energy is the beginning of our future and must be pursued as well as the research and development in information and communic…

Computer sciencebusiness.industryGlobal warmingInformation technologyGlobal changeEnergy consumptionEnvironmental economicsComputer securitycomputer.software_genreRenewable energyInformation and Communications TechnologyServerPosition (finance)businesscomputerInternational Journal of Computer Science and Information Technology
researchProduct

Multiword Units in Machine Translation and Translation Technology

2018

This article describes a new word alignment gold standard for German nominal compounds and their multiword translation equivalents in English, French, Italian, and Spanish. The gold standard contains alignments for each of the ten language pairs, resulting in a total of 8,229 bidirectional alignments. It covers 362 occurrences of 137 different German compounds randomly selected from the corpus of European Parliament plenary sessions, sampled according to the criteria of frequency and morphological complexity. The standard serves for the evaluation and optimisation of automatic word alignments in the context of spotting translations of German compounds. The study also shows that in this text…

Computer sciencebusiness.industryGold standardContext (language use)Spottingcomputer.software_genreTranslation (geometry)language.human_languageGermanNounlanguageArtificial intelligenceddc:410.2businesscomputerNatural language processingWord (computer architecture)
researchProduct

Divisive normalization image quality metric revisited.

2010

Structural similarity metrics and information-theory-based metrics have been proposed as completely different alternatives to the traditional metrics based on error visibility and human vision models. Three basic criticisms were raised against the traditional error visibility approach: (1) it is based on near-threshold performance, (2) its geometric meaning may be limited, and (3) stationary pooling strategies may not be statistically justified. These criticisms and the good performance of structural and information-theory-based metrics have popularized the idea of their superiority over the error visibility approach. In this work we experimentally or analytically show that the above critic…

Computer sciencebusiness.industryImage qualityMachine visionPoolingNormalization (image processing)Wavelet transformImage processingImage enhancementMachine learningcomputer.software_genreAtomic and Molecular Physics and OpticsImage contrastElectronic Optical and Magnetic MaterialsOpticsComputer Vision and Pattern RecognitionArtificial intelligencebusinesscomputerJournal of the Optical Society of America. A, Optics, image science, and vision
researchProduct

Three-dimensional Fuzzy Kernel Regression framework for registration of medical volume data

2013

Abstract In this work a general framework for non-rigid 3D medical image registration is presented. It relies on two pattern recognition techniques: kernel regression and fuzzy c-means clustering. The paper provides theoretic explanation, details the framework, and illustrates its application to implement three registration algorithms for CT/MR volumes as well as single 2D slices. The first two algorithms are landmark-based approaches, while the third one is an area-based technique. The last approach is based on iterative hierarchical volume subdivision, and maximization of mutual information. Moreover, a high performance Nvidia CUDA based implementation of the algorithm is presented. The f…

Computer sciencebusiness.industryImage registrationMutual informationMachine learningcomputer.software_genreFuzzy logicCUDANon-rigid registration Fuzzy regression Mutual information Interpolation GPU computingArtificial IntelligenceSignal ProcessingPattern recognition (psychology)Kernel regressionComputer Vision and Pattern RecognitionArtificial intelligenceData miningGeneral-purpose computing on graphics processing unitsCluster analysisbusinesscomputerSoftwareInterpolationPattern Recognition
researchProduct

Zur Identifikation von Strukturanalogien in Datenmodellen

2005

On the one hand, data models decrease the complexity of information system development. On the other hand, data models causes additional complexity. Recently structural analogies are discussed as instruments reducing the complexity of data models. This piece of research presents a procedure to identify structural analogies in data models and demonstrates its performance by analyzing Scheer’s reference model for industrial enterprises (Y-CIM-model). The proposed procedure is based on formalizing data models within set theory and uses a quantitative similarity measure. The obtained results show both identical and very similar information structures within the Y-CIM-model. Furthermore, ways of…

Computer sciencebusiness.industryInformation structureSoftware developmentSimilarity measurecomputer.software_genreData modelingInformation modelEntity–relationship modelSoftware designData miningbusinessReference modelcomputerInformation SystemsWirtschaftsinformatik
researchProduct

Applying Wavelet Packet Decomposition and One-Class Support Vector Machine on Vehicle Acceleration Traces for Road Anomaly Detection

2013

Road condition monitoring through real-time intelligent systems has become more and more significant due to heavy road transportation. Road conditions can be roughly divided into normal and anomaly segments. The number of former should be much larger than the latter for a useable road. Based on the nature of road condition monitoring, anomaly detection is applied, especially for pothole detection in this study, using accelerometer data of a riding car. Accelerometer data were first labeled and segmented, after which features were extracted by wavelet packet decomposition. A classification model was built using one-class support vector machine. For the classifier, the data of some normal seg…

Computer sciencebusiness.industryIntelligent decision support systemPattern recognitionMachine learningcomputer.software_genreWavelet packet decompositionSupport vector machineComputerSystemsOrganization_MISCELLANEOUSAnomaly detectionVehicle accelerationArtificial intelligencebusinesscomputerClassifier (UML)
researchProduct

Security Enhancement of Peer-to-Peer Session Initiation

2012

Today, Peer-to-Peer SIP based communication systems have attracted much attention from both the academia and industry. The decentralized nature of P2P might provide the distributed peer-to-peer communication system without help of the traditional SIP server. However, the decentralization features come to the cost of the reduced manageability and create new concerns. Until now, the main focus of research was on the availability of the network and systems, while few attempts are put on protecting privacy. In this chapter, we investigate on P2PSIP security issues and introduce two enhancement solutions: central based security and distributed trust security, both of which have their own advanta…

Computer sciencebusiness.industryInternet privacySecurity enhancementSession (computer science)Peer-to-peercomputer.software_genrebusinesscomputer
researchProduct

Low-cost active cyber defence

2014

The authors of this paper investigated relatively simple active strategies against selected popular cyber threat vectors. When cyber attacks are analysed for their severity and occurrence, many incidents are usually classifi ed as minor, e.g. spam or phishing. We are interested in the various types of low-end cyber incidents (as opposed to high-end state- sponsored incidents and advanced persistent threats) for two reasons: • being the least complicated incidents, we expect to fi nd simple active response The authors analysed the proposed strategies from the security economics point of view to determine why and how these strategies might be effective. We also discuss the legal aspects of th…

Computer sciencebusiness.industryInternet privacybusinessComputer securitycomputer.software_genrePhishingcomputerCyber threats2014 6th International Conference On Cyber Conflict (CyCon 2014)
researchProduct

CAD Software and Interoperability

2009

Decisions taken during the conception phases in huge architectural projects influence a lot the cost and the schedule of the building construction. To ease this decision-making, many mock-ups have been used as a project prototype. This prototyping is useful to test and to improve the conception of projects. Nowadays, collaborative sites that appear on the Web greatly improve the flexibility of the framework’s actors of a distant project [Aliakseyeu, Martens, Subramanian, Vrouble, & Wesselink, 2001; Balaguer & DeGennaro, 1996; Klinker, Dutoit, Bauer, Bayes, Novak, & Matzke, 2002). Digital mock-ups are used to represent future 3D elements of the final product. Digital mock-ups are…

Computer sciencebusiness.industryInteroperabilityComputer Aided DesignCADcomputer.software_genreSoftware engineeringbusinesscomputer
researchProduct

UbiRoad: Semantic Middleware for Context-Aware Smart Road Environments

2010

A smart road environment is such a traffic environment that is equipped with all necessary facilities to enable seamless mobile service provisioning to the users. However, advanced sensors and network architectures deployed within the traffic environment are insufficient to make mobile service provisioning autonomous and proactive, thus minimizing drivers’ distraction during their presence in the environment. For that, an Intelligent Transportation System, which is operating on top of numerous sensor and access networks and governing the process of mobile services provisioning to the users in self-managed and proactive way, must be deployed. Specifically, such system should provide solution…

Computer sciencebusiness.industryInteroperabilityProvisioningComputer securitycomputer.software_genreAdvanced Traffic Management SystemInteroperationIntelligent NetworkMiddleware (distributed applications)Semantic technologybusinesscomputerMobile serviceComputer network2010 Fifth International Conference on Internet and Web Applications and Services
researchProduct