A digital image is usually stored as a two-dimensional matrix consisting of numerical values of the intensity of each color;for example, Red-Green-Blue (RGB). This fact allows a possibility of manipulation of the imag...
详细信息
A growing number of human-centric tasks like learning, planning, and creative writing require the integration of Artificial Intelligence (AI) in the current era of exponential advancements. Such systems collect and an...
详细信息
The software architecture requires interoperable security mechanisms. This article focuses on applying security requirements to service-oriented solution design. SOA security is very much concerned with what the syste...
详细信息
ISBN:
(纸本)9781618040282
The software architecture requires interoperable security mechanisms. This article focuses on applying security requirements to service-oriented solution design. SOA security is very much concerned with what the system is supposed to do and what can go wrong. This article presents the service-oriented approach - security services that can be developed and tested and applied against many types of applications or scenarios. The proposed concept has the contribution to allow for SSAS (Software Security as a Service) providers to provide access to software services without requiring the customer to host this service within their local environment. In this model, the access control decision and (ideally) enforcement functionality is not embedded within an application. The split of enforcement and decision point has its advantages.
Advances in technology have produced smaller and more powerful computing devices. For example, there are currently a variety of portable personal computing devices, including wireless computing devices, such as portab...
详细信息
Algorithms, which used in the microphone array, are currently widely popular, especially the GSC algorithm. Compared with the single-channel algorithm model, GSC uses information of direction of arrival (DOA) of the o...
详细信息
—The current research is focused on designing a multithreaded parallel solution for processing a pair of raster image files that are used to create an animation. In the computational process, a multithreaded model wa...
详细信息
This article describes the design and implementation of an Embedded Interactive Timing System. Such systems are used in the therapy of children who have learning problems. The matching of different beats can help the ...
详细信息
Data obtained from the scientific experiments are heterogeneous and distributed. They are stored in different file formats so it is difficult to be integrated, analyzed, and processed. The aim of this paper is to prop...
详细信息
ISBN:
(纸本)9789604742974
Data obtained from the scientific experiments are heterogeneous and distributed. They are stored in different file formats so it is difficult to be integrated, analyzed, and processed. The aim of this paper is to propose an ontology dependent approach to transform XML based scientific data description into RDF instances in order to using them as a complete resource on the Semantic Web. The transforming process includes: establishing an ontology describing the data semantic and links between the elements of the output RDF file;establishing a mapping document defining the relationship between the input XML Schema file and the OWL ontology. The proposed approach has been verified successfully as web service implementation utilizing specific scientific experimental data.
Array signal processing is an important branch in the field of signal processing. It has been widely used in many military and national economic fields such as radar, communications, sonar, navigation, voice signal pr...
详细信息
Automatic road sign recognition is one of the most important steps to help a driver prevent accidents. In this paper, the deep convolutional neural network (Deep CNN) was used for the autonomous traffic and road signs...
详细信息
暂无评论