The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The problem of building statistical models of cyber-physical systems using operational data is addressed in this paper, using thecase study of aircraft engines. These models serve as a complementto physics-based models, which may not accurately reflect the operational performance of systems. The accurate modeling of fuelflow rate is an essential aspect of analyzing aircraft engine performance. In...
Mobile Ad hoc Network (MANET) in the form of wireless local area networks is becoming a common platform for communication among internet users. As compared with wired networks, the rate of random packet loss due to wireless channel errors or node mobility is very high in MANET. Misinterpretation of random packet loss as a loss due to congestion by TCP causes significant degradation in the performance...
Location estimation has become essential for mobile and pervasive computing applications of indoor wireless networks. Trilateration is a basic building block of the range based localization techniques, which requires the set of at least three distances from the known locations, and these distances may be estimated by Received Signal Strength (RSS) using the radio propagation models. The distance estimation...
It is well known that not all intrusions can be prevented and additional lines of defense are needed to deal with intruders. However, most current approaches use honeynets relying on the assumption that simply attracting intruders into honeypots would thwart the attack. In this paper, we propose a different and more realistic approach, which aims at delaying intrusions, so as to control the probability...
In this paper, we introduced an algorithm for tracking and detecting multi moving human sperm using Course Grained Multi Threading Cam Shift (CGM-CS) approach in a microscopic human sperm moving video. This method is fully based on adaptive Cam Shift algorithm using color model. This algorithm is design to track and detect the sperms by using multi threading concept. The multi threading concept is...
Recently, it is being found that the most common parasitic worm are found inside a dog is heartworms. Usually puppies and almost all dogs are infected by this heartworms. It disturbs their lives also. These worms are contracting in different ways which makes them easy to spread and very hard to control. In this paper, considering the problem we proposed a method which is used for detecting multi-moving...
In this Paper, we proposed a method for tracking multi moving bacteria and white blood cell (WBC) using Multi threading parallel (MTP) concept in a microscopic blood cell video. This method is based on continuously adaptive mean shift algorithm using color model which is designed to track multi moving bacteria using multi threading concept by comparing its mean in the successive frame in the video...
To meet ever-changing business needs, organizations are required to invest time and budget to scale up IT infrastructure such as hardware, software and services. However with own premises and investment in IT infrastructure scaling process can be slow and costly. Moreover, even if organizations scale up their IT infrastructure, these are hardly able to achieve the optimal utilization of the same....
The Cloud computing offers various services and web based applications over the internet. With the tremendous growth in the development of cloud based services, the security issue is the main challenge and today's concern for the cloud service providers. This paper describes the management of security issues based on Diameter AAA mechanisms for authentication, authorization and accounting (AAA) demanded...
Simulation is an essential early evaluation tool for mobile robot research and development, and different stages of development have individual simulator needs. In this paper, we document details of two simulation tools that were developed for an entry into the MAGIC 2010 challenge, an autonomous ground vehicle competition. In developing the entry, simulators were used in two domains: problem analysis...
We here present two probabilistic edge coloring algorithms for a message passing model of distributed computing. The algorithms use a simple automata for finding a matching on a graph to produce the colorings. Our first algorithm for edge coloring finds an edge coloring of a graph which is guaranteed to use no more than 2? - 1 colors and completes in O(?) communication rounds using only one hop information,...
We propose a novel robust estimation algorithm—the generalized projection-based M-estimator (gpbM), which does not require the user to specify any scale parameters. The algorithm is general and can handle heteroscedastic data with multiple linear constraints for single and multicarrier problems. The gpbM has three distinct stages—scale estimation, robust model estimation, and...
Klystron is vacuum electron device operating in microwave range of frequencies. It is used as power amplifier in a variety of systems including radars, particle accelerators and thermonuclear reactors. With the availability of very reliable design codes, it is now possible to optimize the design and develop a tube with minimum iterations in fabrication. In the present case standard design codes like...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.