The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Delay jitter adversely affects the performance of networked real-time applications that require accurate prediction of packet delivery times. Delay jitter can be smoothed by holding packets in a play-back buffer for a certain time called a playback delay. In this paper, we propose a scheme to enhance the prediction of the play-back delay in networked control systems (NCSs) with no need for clock synchronization...
Semantic event recognition based only on vision cues has had limited success on unconstrained still pictures. Metadata related to picture taking provides contextual cues independent of the image content and can be used to improve classification performance. With geotagged pictures, we investigate the novel use of satellite images (e.g., supplied by Google Earth??) corresponding to the GPS (global...
Self-reconfigurable and evolvable hardware is a new emerging technology which will enable adaptation of computing systems to changing environments. This paper deals with the design architecture of an autonomous on-board system and the development of a real-time scheduler for the adaptation manager of reconfigurable hardware fabric. Our approach employs computer architecture with two key layers: the...
The protection from software Trojans in embedded systems is a difficult problem. The only way a software Trojan can be inserted into an embedded system is if the embedded systems instruction code is behaviorally modified. Trojans can be introduced into the system via new software installation, updates, or application input data such as buffer overflows. Trojans are really nothing more than unauthorized...
We propose a system architecture and methodology to manage the information flow and inquiries between a central station and an adaptable mobile agent (AMA) in real time. The agents collect and process sensory information from a target area in response to queries from the station and provide quantifiable responses to the station for evaluation and feedback. The station communicates with the AMA through...
Vagus nerve stimulation (VNS) is an adjunctive treatment for refractory epilepsy. Using a seizure-prone Fast-kindling rat strain with known comorbid behavioral features, we investigated the effects of VNS on spatial memory, epileptogenesis, kindled seizures and body weight. Electrodes were implanted in both amygdalae and around the left vagus nerve of 17 rats. Following recovery, rats were tested...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.