Online virtual worlds offer exciting new opportunities for enterprises or businesses. To exploit these opportunities enterprises need to find a way to integrate virtual world services with their real-world services, a...
详细信息
Online virtual worlds offer exciting new opportunities for enterprises or businesses. To exploit these opportunities enterprises need to find a way to integrate virtual world services with their real-world services, and to exploit virtual worlds rich collaboration environment to offer new or enhanced services. However, there are many challenges to realizing these goals, such as resolving virtual and real identifications, controlling communication sessions between real and virtual world entities, and managing resources in both worlds. In this paper, we study these issues and propose a framework for integrating virtual worlds into enterprise service work flow. We implemented a customer service in a VW contact center that is integrated with corresponding enterprise services. We also present a novel mechanism in virtual worlds that allow users to bring their own resources, along with the contact center resources, and share the resources with other customers or agents to resolve customer issues. Further, we present experiences from our prototype.
Communication is one of the major issue for the epidemiology investigation in the area affected by Wenchuan earthquake. A collaborative mobile system has been designed for the field epidemiology event investigation an...
详细信息
Communication is one of the major issue for the epidemiology investigation in the area affected by Wenchuan earthquake. A collaborative mobile system has been designed for the field epidemiology event investigation and disposal for it. To get more stable communication between field and indoor groups, provide more information to field investigators and experts, we designed a star communication topology. Because of the different networks and different terminals, an asymmetric client/server network has been designed for the collaboration between field and indoor workfellows. A prototype system has been implemented and tested in the Wenchuan earthquake stricken area, the results show the system works well and is very useful for field work and collaboration.
Operational global quantitative retrievals of aerosol have been made from Moderate Resolution Imaging Spectrometer (MODIS) data for several years by NASA EOS teams. Dark Dense Vegetation (DDV) algorithm has shown exce...
详细信息
Operational global quantitative retrievals of aerosol have been made from Moderate Resolution Imaging Spectrometer (MODIS) data for several years by NASA EOS teams. Dark Dense Vegetation (DDV) algorithm has shown excellent competence at aerosol distribution and properties over land. In Sep. 2008, China successfully launched environmental satellite and received Charge Coupled Device (CCD) sensor data, it will provide a new way to monitor aerosol optical thickness (AOT) and distribution at a higher resolution (30 m * 30 m). According to DDV algorithm and HJ-1-CCD camera characters, we measured different surface reflectance spectra in Beijing and Pearl River Delta areas, then ascertained NDVI value and the surface reflectance radio between HJ-1-CCD red and blue band. This paper introduces the aerosol retrieval process including lookup table establishing, cloud detection and so on; Finally, the retrieved AOTs were validated by ground measurement and compared by MODIS aerosol products.
This paper reports the development of an optimal neural network model for stress-strain behaviour of steel fibre reinforced concrete in direct compression. For this, an algorithm which combines the Akaike's inform...
详细信息
This paper reports the development of an optimal neural network model for stress-strain behaviour of steel fibre reinforced concrete in direct compression. For this, an algorithm which combines the Akaike's information criterion (AIC) with the golden-section optimisation technique has been implemented. The extensive computational experiments have been successful in finding a network topology with excellent generalisation capabilities. The model was developed using the experimental results of doctoral research work of the second author. The parameters for modeling included the reinforcing index, the material parameter, and peak stress corresponding to peak strain and normalised strain. The output of the model is the normalised stress. The computational experiments used to implement the method are carried out by employing the three-layer back propagation neural network. The application of the combined algorithm resulted in an optimal topology of 4-26-1. The results of the model were excellent. However, a deviation of 0-15% was noticed in the post peak strain region when compared with experimental results.
Measures of text similarity have been used for a long time in applications in natural language processing and related areas such as text mining, Web page retrieval, and dialogue systems. Existing methods for computing...
详细信息
Today software development projects fail to be delivered on time, within budget and with desired quality. Many software risk methodologies have been proposed for mitigation of risks but they do not fulfill the aim of ...
详细信息
ISBN:
(纸本)1601320884
Today software development projects fail to be delivered on time, within budget and with desired quality. Many software risk methodologies have been proposed for mitigation of risks but they do not fulfill the aim of software society because problems still exist. Herein, an attempt is made to propose a software risk model and implement in Waterfall process. It may have advantages over other models and provide opportunities to developers to use this model in Waterfall process.
In recent years, Steganography and Steganalysis are two important areas of research that involve a number of applications. These two areas of research are important especially when reliable and secure information exch...
详细信息
ISBN:
(纸本)1424424089
In recent years, Steganography and Steganalysis are two important areas of research that involve a number of applications. These two areas of research are important especially when reliable and secure information exchange is required. Steganography is an art of embedding information in a cover image without causing statistically significant variations to the cover image. Steganalysis is the technology that attempts to defeat Steganography by detecting the hidden information and extracting. In this paper we propose an image Steganography that can verify the reliability of the information being transmitted to the receiver. The method can verify whether the attacker has tried to edit, delete or forge the secret information in the stego-image. The technique embeds the hidden information in the spatial domain of the cover image and uses two special AC coefficients of the Discrete Wavelet Transform domain to verify the veracity (integrity) of the secret information from the stego image. The analysis shows that the BER and PSNR is improved in the case of DWT than DCT.
The objective of the study is to establish the technologies of automatic similarity analysis and comparison of two method patents in order to reduce the cost and human efforts. We propose a method to compare the simil...
详细信息
The objective of the study is to establish the technologies of automatic similarity analysis and comparison of two method patents in order to reduce the cost and human efforts. We propose a method to compare the similarity between the components and prepositions. The proposed methods automatically extract components, relations between components, steps, and relations between steps, and establish a machine readable tree structures for similarity comparison. Our experiments use the USPTO database [1] as data resource. The study conducts two experiments to evaluate the performance: 1) applying genetic algorithms to learn the weightings in calculation of step similarity and 2) comparing the performance with a statistical similarity calculation method, BLEU. The experimental results show that the system performs better in terms of recall and precision than BLEU methods that are usually adopted in machine translation.
Due to the complexity of the biological networks, it is difficult to extract the conserved modules across species with graphical representation. One of the arising challenges is to compare different networks in order ...
详细信息
ISBN:
(纸本)1601320558
Due to the complexity of the biological networks, it is difficult to extract the conserved modules across species with graphical representation. One of the arising challenges is to compare different networks in order to analyze and discover common sub-networks, especially cliqued structure of protein complexes that may share similar biological functions. We combine sequence alignment and ontology-based semantic similarity score to cluster potential orthologous proteins and use depth-first search for network comparison to discover the conserved networks and protein complexes across species. This method allows the biological evolutions such as duplication and divergence to be tolerated in the network alignment process under a user specified value Ε. We apply network alignment for two large protein-protein interactions (Saccharomyces cerevisiae and Caenorhabditis elegans) as our test data. We detect a large number of conserved networks and true complexes that match in the yeast MIPS database.
Owning to the great growth of e-learning objects, authorities (e.g. ADL and IEEE) have developed some metadata standards to facilitate the keyword search for various e-learning applications. However, too much fields, ...
详细信息
ISBN:
(纸本)9789868473522
Owning to the great growth of e-learning objects, authorities (e.g. ADL and IEEE) have developed some metadata standards to facilitate the keyword search for various e-learning applications. However, too much fields, such as 58 blank fields in IEEE LOM, waiting for authors or annotators to fill up become an endless nightmare. In order to reach our vision of sharing and reusing valuable assets, the needs for an intelligent and automatic annotation system become more and more urgent. Among these 58 elements, it is the most difficult to extract the fittest solutions for Description, which calls for the advanced Chinese language processing technologies to generate the suitable value. We also adopted the Self-Organizing Map clustering method from Neural Networks, feature selection from Information Retrieval, and Latent Semantic Analysis from Linguistics to cope with the automatic annotation problem. In this paper, we proposed a novel approach called Clustering Descriptor, CD, to automatically generate the description metadata in TW LOM - a Learning Object Metadata application profile in Taiwan. Then, we conducted two experiments to evaluate the annotation quality for Description data element in terms of three parameters: clustering, feature weight, and semantics. Because of the benefits from clustering and feature weight, Clustering Descriptor achieved improvement in precision rate: 6.30% (clustering) and 8.60% (clustering plus feature weight) compared with the baseline.
暂无评论