'Location cloaking' allows services to access larger location description (for instance, 'Austria'), instead of fine grained location information (for instance, 'a restaurant in Tyrol') to pres...
详细信息
'Location cloaking' allows services to access larger location description (for instance, 'Austria'), instead of fine grained location information (for instance, 'a restaurant in Tyrol') to preserve privacy, while keeping any useful services (for instance, 'automatic language-translation') continuing. This paper proposes an extension of location/spatial cloaking technique for RDF data based on view-based access control. Our system starts from a fine-grained view defining method, making use of structural characteristics of interlinked RDF data. It supports cloaking of non-hierarchical data by allowing abstract hierarchy definitions of resources and views. We implement a prototype system named 'Husk' on top of an RDF repository system.
In this paper we consider the importance of explicit knowledge management, taking into account the growth of global software engineering and the importance of corporate knowledge. We conclude by suggesting specific ar...
详细信息
In this paper we consider the importance of explicit knowledge management, taking into account the growth of global software engineering and the importance of corporate knowledge. We conclude by suggesting specific areas of research which should be considered important for the implementation of knowledge management within global software engineering environments.
Paper deals with industrial realization of feedback control of demanding applications on their control, control algorithms and visualization together with design, implementation and real time control from MATLAB/Simul...
详细信息
Paper deals with industrial realization of feedback control of demanding applications on their control, control algorithms and visualization together with design, implementation and real time control from MATLAB/Simulink Environment. Paper shows direct connection and implementation way of designed control schemas of prepared applications to an industrial WinPLC. Described is a way to produce a permanent solution in control applications that are fully prepared, designed and implemented directly from MATLAB/Simulink to the target control platform. As a part, the mentioned solution is using a multiplatform control system REX as a bridge between MATLAB and target platforms. These methods allow minimizing costs of development of control of applications, because it produces target permanent realizations in comparison to classical development methods that usually need expensive real time measurement cards and produce only one purpose development solution.
Active modeling is required in learning settings to cope with the dynamic evolution of the knowledge, since learners competences evolves over time as they participate in the course activities. Moreover, one of the mai...
详细信息
Active modeling is required in learning settings to cope with the dynamic evolution of the knowledge, since learners competences evolves over time as they participate in the course activities. Moreover, one of the main issues in a competence based eLearning process is to deliver personalized instructional designs adjusted to both 1) intrinsic characteristics of users (i.e. learning styles) and 2) the desired and achieved competences in the learning process (i.e. specific and generic competences). This delivery includes the adaptation of the content and the activities in a learning scenario based on a dynamic user model that evolves according to user interactions. In this paper, an approach to support Conditional Plans Generation (IMS Learning Designs) in the context of a virtual learning environment is presented. The process is supported by a pervasive usage of standards and specifications (IMS family of specifications) in conjunction with an integral user modeling.
We propose a programmable and scalable traffic management scheme. Programmable traffic management at high-speed routers is difficult because programmability and high-speed packet processing have involved a serious tra...
详细信息
We propose a programmable and scalable traffic management scheme. Programmable traffic management at high-speed routers is difficult because programmability and high-speed packet processing have involved a serious tradeoff. To attain both, the new scheme combines control programs at a control server and simple packet handling functions, such as sampling packet headers and discarding packets, at routers. Therefore, by installing appropriate control programs into the server, a variety of active queue management schemes, per-flow bandwidth management schemes, DoS mitigation schemes, and so on, are achieved. One of the main contributions of this paper is its proposal of a statistical scheme for handling flows. As only a fraction of complete flow information stored at the control server is loaded into the router's flow table and it is replaced cyclically, the proposed scheme scales more than the router's flow table capacity. Our simulation results indicate that the scheme provides efficient traffic management, per-flow WFQ emulation in our example, even with very small flow tables compared to the number of concurrently active flows. Furthermore, we discuss implementation issues with the proposed scheme and reveal that the processing cost at the server and router is sufficiently small for use with 10 Gbps links.
We describe a unique competition based on the novel concept of robotics and mechatronics products that included evaluation of the products' engineering function and interface design. Seventy-seven students of elev...
详细信息
We describe a unique competition based on the novel concept of robotics and mechatronics products that included evaluation of the products' engineering function and interface design. Seventy-seven students of eleven teams from seven universities in the Kyushu area participated in the competition, whose subject was ldquoHealth care, life supporting and communication or other technical aids for the elderly or *** Many of the plans presented ideas that balanced function and design, showing the results of collaboration among students studying engineering and students studying product design.
To obtain perception abilities, conventional methods independently detect static and dynamic obstacles, and estimate their related information, which is not quite reliable and computationally heavy. We propose a fusio...
详细信息
ISBN:
(纸本)9781424435036
To obtain perception abilities, conventional methods independently detect static and dynamic obstacles, and estimate their related information, which is not quite reliable and computationally heavy. We propose a fusion-based and layered-based approach to systematically detect dynamic obstacles and obtain their location and timing information. The layered-based concept helps us to first search pedestrians in horizontal dimension based on transitional peaks in the defined projection-curves, and then search in vertical dimension. Converting a typical 2D search problem into two 1D search problems significantly decreases the computational load. The fusion-based obstacle detection fuses the information from initial segmentation and dynamic tracking model to avoid complicated tracking schemes. The methodologies take advantage of connection between different information, and increase the accuracy and reliability of obstacle segmentation and tracking. The search mechanism works for both visible and infrared sequences, and is specifically effective to track the movements of pedestrians in complicated environments such as human intersecting and conclusion, thus improving environment understanding abilities and driving safety.
Radio frequency identification (RFID) technology has become more sophisticated in recent years and is being developed rapidly for a variety of applications. The problem of eliminating redundant readers has been reduce...
详细信息
ISBN:
(纸本)9781424440085
Radio frequency identification (RFID) technology has become more sophisticated in recent years and is being developed rapidly for a variety of applications. The problem of eliminating redundant readers has been reduced to the minimum cover problem and proved to be NP-hard In this paper, a Density-based Redundant Reader Elimination Algorithm (DRRE) is presented;DRRE eliminates the redundant readers without influencing the number of usable tags. Simulation results demonstrate that the DRRE algorithm performed better in all instances in a variety of environments compared with other algorithms. In a densely deployed RFID network, the DRRE algorithm detected 85% more redundant readers than others.
A method is proposed for clustering data that results in more accurate clustering when clusters are close to each other. The method takes into account the continuity of the data by using a self-organizing map showing ...
详细信息
A method is proposed for clustering data that results in more accurate clustering when clusters are close to each other. The method takes into account the continuity of the data by using a self-organizing map showing the separation and combination of code vectors. Using this map reduces the dependence of fitting of code vectors. The proposed method can be thus used to obtain accurate clustering.
暂无评论