The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper shows ICT operational models to view the actual usage of teachers' desk systems (TDS). The TDS which consist of several ICT devices have been developed and installed to give effective lectures in classrooms of our university. In this study, authors construct ICT operational models from the execution logs of the TDS, and then discuss the adequacy of their specifications and application which...
In this paper we discuss computational issues related to optimal sensor placement in numerical weather prediction (NWP). Specifically we will discuss the application of observability as a metric for sensor placement to an atmospheric flow model and the arising optimization problem. Atmospheric data assimilation is the process of estimating the initial system state based on observations needed in NWP...
Aero-optic imaging deviation characterizes the image position displacement on an imaging plane induced by the nonuniform flow field surrounding a high-speed flying vehicle. It is a kind of aero-optic effect that all the airborne imaging systems will encounter. This paper studies the imaging deviation at high altitudes from 40 to 60 km, with a step length of 5 km. CFD computations are completed by...
In this paper, we introduced the intrusion detection technology first. Beside of the definition and the common intrusion detection frame (CDIF), we described three methods of the intrusion detection: anomaly detection, misuse detection and hybrid detection. Then we discussed the mobile agent technology. In this part, we mainly introduced three key issues. They are: mobile agentpsilas move, mobile...
In this paper, we propose inline DRR (deficit round robin) scheduling algorithm due to the limitation of the satellite switch processing speed and memory capacity. We build the model in OPNET. The results show that inline DRR processing delay is 26ms lower than DRR. The inline DRR complexity is O(1). According to the traffic and network structure of low earth orbit satellite system, we adopt CICQ...
SAT-based bounded model checking has a high complexity in dealing with real-time systems. SMT solvers can generalize SAT solving by adding the ability to handle arithmetic and other decidable theories. With this advantage, if we use SMT in bounded model checking for real-time systems instead of SAT, the clocks can be represented as integer or real variables directly and clock constraints can be represented...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.