This paper introduces a kind of new idea for Structural Health Monitoring(SHM) using Smart Phones Technique in civil engineering. Smart phone, with embedded responding SHM software and inter sensors or outer sensors b...
详细信息
The existing ontology reasoners are all unilaterally description logic-based or rule-based, and their abilities to deal with fuzzy ontology are limited. It is the diversity of fuzzy-ontology representation methods...
详细信息
The existing ontology reasoners are all unilaterally description logic-based or rule-based, and their abilities to deal with fuzzy ontology are limited. It is the diversity of fuzzy-ontology representation methods among them that leads to a low processing efficiency of fuzzy ontology. To solve this bottleneck problem of fuzzy ontology-based knowledge reasoning, fuzzy ontology, fuzzy ontology representation method and fuzzy description logic are investigated, and the existing fuzzy ontology reasoners are comparatively analyzed. By virtue of the advantages of the typical reasoners such as Pellet, JenaAPI and fuzzyDL (fuzzy Description Logic), a method combining rule and description logic reasoning is designed, and a framework about fuzzy ontology based knowledge reasoning is proposed. By reducing fuzzy ontology, checking consistency and repairing inconsistency, the efficiency and accuracy of fuzzy ontology based knowledge reasoning can be improved. Finally, an experiment is given to verify the validity of proposed method.
In this paper, a taxonomy of privacy-preserving approaches employed in digital right management systems are presented. These approaches are classified into two main approaches according to their design philosophy: cry...
详细信息
ISBN:
(纸本)9781509025350
In this paper, a taxonomy of privacy-preserving approaches employed in digital right management systems are presented. These approaches are classified into two main approaches according to their design philosophy: cryptographic and noncryptographic approaches. Moreover, the pros and cons of the presented approaches are reported and compared in light of different viewpoints. Furthermore, some new directions are highlighted based on the insightful comparison of the existing work.
A low-cost radio-over-fiber (RoF) based integrated transmission of long term evolution (LTE) and worldwide interoperability for microwave access (WiMAX) signals is proposed to solve the shadowing effect of building en...
详细信息
Many Telecom service companies need to forecast mobile user growth demand because their lead-time to supply is longer than their customers will typically wait for products. A logistic growth curve is an sigmoid curve ...
详细信息
In this paper, based on a newly presented approach for human gait recognition via deterministic learning theory, we construct a prototype for gait recognition system, display the recognition process by using the Labvi...
详细信息
In the Cloud context, the monitoring of service levels becomes critical because of the conflicts of interest that might occur between provider and customer in case of outage. Here we focus on Cloud monitoring at infra...
详细信息
software risk management process faces some threats. According to formal reports, the remarkable rate of failure in IT projects shows the relative unsuccessfulness in such processes. The model proposed in this researc...
详细信息
The acquisition and distribution of multimedia content, such as still images, audio and video streams, are the new frontier of wireless sensor networks (WSNs). Scalar data WSNs commonly rely on the ieee 802.15.4 stand...
详细信息
Advances in technology have attracted more e-banking users in an e-Commerce context. Measuring service quality enhances delivering superior services to achieve competitive advantages. Studies on Internet service quali...
详细信息
暂无评论