Academic literature on the topic 'Open Document Architecture (Computer network standard)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Open Document Architecture (Computer network standard).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Open Document Architecture (Computer network standard)"

1

Dergachov, Konstantin, Leonid Krasnov, Vladislav Bilozerskyi, and Anatoly Zymovin. "Methods and algorithms for protecting information in optical text recognition systems." RADIOELECTRONIC AND COMPUTER SYSTEMS, no. 1 (February 23, 2022): 154–69. http://dx.doi.org/10.32620/reks.2022.1.12.

Full text
Abstract:
The subject of the study. A concept of OCR systems performance improvement is proposed, which is achieved through the integrated use of special algorithms for preliminary processing of documents picture, an extended set of service functions, and advanced techniques for information protection. Study objectives: development of algorithms that compensate for the influence of the unfavorable points like imperfect lighting conditions overshooting, images geometric deformation, noises, etc., which corrupt the pictured text, on the efficiency of that text recognition. It is needed to provide for a series of service procedures that would ensure adequate data handling while viewing, converting, and storing in standard formats the results, and ensuring the possibility to exchange data in open communication networks. Additionally, it is necessary to ensure the information protection against unauthorized use at the stage of data processing and provide secretiveness of their transmission through the communication channels. Investigation methods and research results: developed and tested algorithms for preliminary picture data processing, namely, for the captured image geometry transformation, picture noise correction with different filters, image binarization when using the adaptive thresholds reduced the negative influence of irregular image portions illumination; in the software, the special services ensure the data processing ease and information protection are affected. In particular, the interactive procedure for text segmentation is proposed, which implies the possibility of anonymizing its fragments and contributes to collecting confidentiality for documents treated. The package for processing document shots contains the face detection algorithm bringing the identification of such information features; it can be used further in the task of face recognition. After the textual doc is recognized, the received data encryption is provided by generating a QR-code and the steganography methods can deliver the privacy of this information transmission. The algorithms' structures are described in detail and the stability of their work under various conditions is investigated. Focused on the case study, docs' text recognition software was developed with the usage of Tesseract version 4.0 optical character recognition program. The program named "HQ Scanner" is written in Python using the present resources of the OpenCV library. An original technique for evaluating the efficiency of algorithms using the criterion of the maximum probability of correct text recognition is implemented in the software. Conclusions. The study results can constitute the basis for developing advanced specialized software for easy-to-use commercial OCR systems.
APA, Harvard, Vancouver, ISO, and other styles
2

Appelt, W. "The Formal Specification of the ISO Open Document Architecture (ODA) standard." Computer Journal 36, no. 3 (1993): 269–79. http://dx.doi.org/10.1093/comjnl/36.3.269.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Gwyn, Tony, Kaushik Roy, and Mustafa Atay. "Face Recognition Using Popular Deep Net Architectures: A Brief Comparative Study." Future Internet 13, no. 7 (2021): 164. http://dx.doi.org/10.3390/fi13070164.

Full text
Abstract:
In the realm of computer security, the username/password standard is becoming increasingly antiquated. Usage of the same username and password across various accounts can leave a user open to potential vulnerabilities. Authentication methods of the future need to maintain the ability to provide secure access without a reduction in speed. Facial recognition technologies are quickly becoming integral parts of user security, allowing for a secondary level of user authentication. Augmenting traditional username and password security with facial biometrics has already seen impressive results; however, studying these techniques is necessary to determine how effective these methods are within various parameters. A Convolutional Neural Network (CNN) is a powerful classification approach which is often used for image identification and verification. Quite recently, CNNs have shown great promise in the area of facial image recognition. The comparative study proposed in this paper offers an in-depth analysis of several state-of-the-art deep learning based-facial recognition technologies, to determine via accuracy and other metrics which of those are most effective. In our study, VGG-16 and VGG-19 showed the highest levels of image recognition accuracy, as well as F1-Score. The most favorable configurations of CNN should be documented as an effective way to potentially augment the current username/password standard by increasing the current method’s security with additional facial biometrics.
APA, Harvard, Vancouver, ISO, and other styles
4

Omumbo, Nicholas J., Titus M. Muhambe, and Cyprian M. Ratemo. "Evaluation of Routing Performance using OSPF and Multi-Controller Based Network Architecture." International Journal of Computer Network and Information Security 13, no. 4 (2021): 45–61. http://dx.doi.org/10.5815/ijcnis.2021.04.05.

Full text
Abstract:
Newer mobile applications are increasingly being defined using Internet Protocol, resulting in increased use of Internet Protocol and subsequent upsurge of smartphones. However, many communication service provider core networks continue to use classical routing protocols and single controller-based networks if deployed. Controller-based networks built on the foundation of software-defined networks include centralization and separation of control plane and data plane, which can address the challenges experienced with the classical routing protocols. When single controllers are used, they tend to get overloaded with traffic. The ability to use multi-controller-based network architecture to improve quality of service in the mobile IP core network is still an open issue. This paper presents a performance evaluation of multi-controller-based network architecture, running OpenFlow and Open Shortest Path First protocol. The long-term evolution simulated network architecture is created using well-known network simulator Objective Modular Network Testbed running OpenFlow and simuLTE add-on. We test and analyze data traffic for Packet data ratio and Jitter and their associated effects on a multi-controller-based network running OpenFlow versus OSPF on a mobile core network. The experiment created two topologies; multi controller-based and Open Shortest path first network. Video and ping traffic is tested by the generation of traffic from User Equipment to the network-based server in the data center and back, and traffic metrics recorded on an inbuilt integrated development environment. The simulation setup consisted of an OpenFlow controller, HyperFlow algorithm, OpenFlow switches, and Open Shortest Path First routers. The multi-controller-based network improved Jitter by 10 ms. The Open Shortest Path first showed packet data ratio values of 89% gain while the controller-based network registered a value of 86%. A standard deviation test revealed 0.7%, which shows that the difference is not significant when testing for Packet data ratio. We provided insight into the performance of multi-controller-based architecture and Open Shortest Path First protocol in the communication service provider's core network.
APA, Harvard, Vancouver, ISO, and other styles
5

Wang, Zhihui, Jingjing Yang, Benzhen Guo, and Xiao Zhang. "Security Model of Internet of Things Based on Binary Wavelet and Sparse Neural Network." International Journal of Mobile Computing and Multimedia Communications 10, no. 1 (2019): 1–17. http://dx.doi.org/10.4018/ijmcmc.2019010101.

Full text
Abstract:
At present, the internet of things has no standard system architecture. According to the requirements of universal sensing, reliable transmission, intelligent processing and the realization of human, human and the material, real-time communication between objects and things, the internet needs the open, hierarchical, extensible network architecture as the framework. The sensation equipment safe examination platform supports the platform through the open style scene examination to measure the equipment and provides the movement simulated environment, including each kind of movement and network environment and safety management center, turning on application gateway supports. It examines the knowledge library. Under this inspiration, this article proposes the novel security model based on the sparse neural network and wavelet analysis. The experiment indicates that the proposed model performs better compared with the other state-of-the-art algorithms.
APA, Harvard, Vancouver, ISO, and other styles
6

Bezmaternykh, P. V., D. A. Ilin, and D. P. Nikolaev. "U-Net-bin: hacking the document image binarization contest." Computer Optics 43, no. 5 (2019): 825–32. http://dx.doi.org/10.18287/2412-6179-2019-43-5-825-832.

Full text
Abstract:
Image binarization is still a challenging task in a variety of applications. In particular, Document Image Binarization Contest (DIBCO) is organized regularly to track the state-of-the-art techniques for the historical document binarization. In this work we present a binarization method that was ranked first in the DIBCO`17 contest. It is a convolutional neural network (CNN) based method which uses U-Net architecture, originally designed for biomedical image segmentation. We describe our approach to training data preparation and contest ground truth examination and provide multiple insights on its construction (so called hacking). It led to more accurate historical document binarization problem statement with respect to the challenges one could face in the open access datasets. A docker container with the final network along with all the supplementary data we used in the training process has been published on Github.
APA, Harvard, Vancouver, ISO, and other styles
7

Bouhafs, Faycal, Alessandro Raschellà, Michael Mackay, and Frank den Hartog. "A Spectrum Management Platform Architecture to Enable a Sharing Economy in 6G." Future Internet 14, no. 11 (2022): 309. http://dx.doi.org/10.3390/fi14110309.

Full text
Abstract:
We propose a novel vision to trade and allocate wireless spectrum in 6G communication networks inspired by the concept of the sharing economy. We argue that such an approach will help ease the surge in demands for wireless spectrum that will characterise the 6G world. We also introduce HODNET (Heterogeneous on Demand NETwork resource negotiation), an open platform that is able to realise this new spectrum-sharing model. To demonstrate the benefits of spectrum trading and allocation in this new paradigm, we considered the use-case of massive Internet of Things (IoT) on a local scale. We simulated a large IoT deployment and evaluated the spectral efficiency of the system when managed using HODNET compared with a standard 5G deployment. Our experiments show that HODNET can indeed offer better allocation, based on our spectrum sharing model, of spectrum resources compared with standard allocation approaches.
APA, Harvard, Vancouver, ISO, and other styles
8

Lee, Shih-Hsiung, and Hung-Chun Chen. "U-SSD: Improved SSD Based on U-Net Architecture for End-to-End Table Detection in Document Images." Applied Sciences 11, no. 23 (2021): 11446. http://dx.doi.org/10.3390/app112311446.

Full text
Abstract:
Tables are an important element in a document and can express more information with fewer words. Due to the different arrangements of tables and texts, as well as the variety of layouts, table detection is a challenge in the field of document analysis. Nowadays, as Optical Character Recognition technology has gradually matured, it can help us to obtain text information quickly, and the ability to accurately detect table structures can improve the efficiency of obtaining text content. The process of document digitization is influenced by the editor’s style on the table layout. In addition, many industries rely on a large number of people to process data, which has high expense, thus, the industry imports artificial intelligence and Robotic Process Automation to handle simple and complicated routine text digitization work. Therefore, this paper proposes an end-to-end table detection model, U-SSD, as based on the object detection method of deep learning, takes the Single Shot MultiBox Detector (SSD) as the basic model architecture, improves it by U-Net, and adds dilated convolution to enhance the feature learning capability of the network. The experiment in this study uses the dataset of accident claim documents, as provided by a Taiwanese Law Firm, and conducts table detection. The experimental results show that the proposed method is effective. In addition, the results of the evaluation on open dataset of TableBank, Github, and ICDAR13 show that the SSD-based network architectures can achieve good performance.
APA, Harvard, Vancouver, ISO, and other styles
9

Janssen, Curtis L., Helgi Adalsteinsson, Scott Cranford, et al. "A Simulator for Large-Scale Parallel Computer Architectures." International Journal of Distributed Systems and Technologies 1, no. 2 (2010): 57–73. http://dx.doi.org/10.4018/jdst.2010040104.

Full text
Abstract:
Efficient design of hardware and software for large-scale parallel execution requires detailed understanding of the interactions between the application, computer, and network. The authors have developed a macro-scale simulator (SST/macro) that permits the coarse-grained study of distributed-memory applications. In the presented work, applications using the Message Passing Interface (MPI) are simulated; however, the simulator is designed to allow inclusion of other programming models. The simulator is driven from either a trace file or a skeleton application. Trace files can be either a standard format (Open Trace Format) or a more detailed custom format (DUMPI). The simulator architecture is modular, allowing it to easily be extended with additional network models, trace file formats, and more detailed processor models. This paper describes the design of the simulator, provides performance results, and presents studies showing how application performance is affected by machine characteristics.
APA, Harvard, Vancouver, ISO, and other styles
10

Warner, Jeremy L., Suzanne E. Maddux, Kevin S. Hughes, et al. "Development, implementation, and initial evaluation of a foundational open interoperability standard for oncology treatment planning and summarization." Journal of the American Medical Informatics Association 22, no. 3 (2015): 577–86. http://dx.doi.org/10.1093/jamia/ocu015.

Full text
Abstract:
Abstract Objective Develop and evaluate a foundational oncology-specific standard for the communication and coordination of care throughout the cancer journey, with early-stage breast cancer as the use case. Materials and Methods Owing to broad uptake of the Health Level Seven (HL7) Consolidated Clinical Document Architecture (C-CDA) by health information exchanges and large provider organizations, we developed an implementation guide in congruence with C-CDA. The resultant product was balloted through the HL7 process and subsequently implemented by two groups: the Health Story Project (Health Story) and the Athena Breast Health Network (Athena). Results The HL7 Implementation Guide for CDA, Release 2: Clinical Oncology Treatment Plan and Summary, DSTU Release 1 (eCOTPS) was successfully balloted and published as a Draft Standard for Trial Use (DSTU) in October 2013. Health Story successfully implemented the eCOTPS the 2014 meeting of the Healthcare Information and Management Systems Society (HIMSS) in a clinical vignette. During the evaluation and implementation of eCOPS, Athena identified two practical concerns: (1) the need for additional CDA templates specific to their use case; (2) the many-to-many mapping of Athena-defined data elements to eCOTPS. Discussion Early implementation of eCOTPS has demonstrated successful vendor-agnostic transmission of oncology-specific data. The modularity enabled by the C-CDA framework ensures the relatively straightforward expansion of the eCOTPS to include other cancer subtypes. Lessons learned during the process will strengthen future versions of the standard. Conclusion eCOTPS is the first oncology-specific CDA standard to achieve HL7 DSTU status. Oncology standards will improve care throughout the cancer journey by allowing the efficient transmission of reliable, meaningful, and current clinical data between the many involved stakeholders.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Open Document Architecture (Computer network standard)"

1

Aboualizadehbehbahani, Maziar. "Proposing a New System Architecture for Next Generation Learning Environment." Thesis, 2016. http://hdl.handle.net/1805/10289.

Full text
Abstract:
Indiana University-Purdue University Indianapolis (IUPUI)<br>The emergence of information exchange and act of offering features through external interfaces is a vast but immensely valuable challenge, and essential elements of learning environments cannot be excluded. Nowadays, there are a lot of different service providers working in the learning systems market and each of them has their own advantages. On that premise, in today's world even large learning management systems are trying to cooperate with each other in order to be best. For instance, Instructure is a substantial company and can easily employ a dedicated team tasked with the development of a video conferencing functionality, but it chooses to use an open source alternative instead: The BigBlueButton. Unfortunately, different learning system manufacturers are using different technologies for various reasons, making integration that much harder. Standards in learning environments have come to resolve problems regarding exchanging information, providing and consuming functionalities externally and simultaneously minimizing the amount of effort needed to integrate systems. In addition to defining and simplifying these standards, careful consideration is essential when designing new, comprehensive and useful systems, as well as adding interoperability to existing systems, all which subsequently took part in this research. In this research I have reviewed most of the standards and protocols for integration in learning environments and proposed a revised approach for app stores in learning environments. Finally, as a case study, a learning tool has been developed to avail essential functionalities of a social educational learning management system integrated with other learning management systems. This tool supports the dominant and most popular standards for interoperability and can be added to learning management systems within seconds.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Open Document Architecture (Computer network standard)"

1

Computer Systems Laboratory (U.S.), ed. Open document architecture (ODA) raster document application profile (DAP). U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, Computer Systems Laboratory, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Appelt, Wolfgang. Document architecture in open systems: The ODA standard. Springer-Verlag, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Carr, Richard. Document interchange. DISC, BSi Standards, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Implementing open systems. McGraw-Hill Book Co., 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Migrating to open systems: Taming the tiger. McGraw Hill Book Co., 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Olsen, Karen. The impact of the FCC's open network architecture on NS/NP telecommunications security. U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Olsen, Karen. The impact of the FCC's open network architecture on NS/NP telecommunications security. U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Olsen, Karen. The impact of the FCC'S open network architecture on NS/NP telecommunications security. U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Alan, Lloyd, ed. Open systems interconnection. Prentice Hall, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

OPENARCH'99 (1999 New York, NY). 1999 IEEE Second Conference on Open Architectures and Network Programming: OPENARCH'99 : proceedings : New York, NY, USA, 26-27 March, 1999. IEEE, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography