The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Sequences of duplicate code, either with or without modification, are known as code clones or just clones. Code clones are generally considered undesirable for a number of reasons, although they can offer some convenience to developers. The detection of code clones helps to improve the quality of source code through software re-engineering. Numerous methods have been proposed for code clone detection...
The paper aims at demonstrating the feasibility of an execution platform that is capable of performing protection and control functions from various vendors in a controlled manner. This will reduce vendor dependency enabling utilities to standardize hardware while implementing complex protection schemes from multiple vendors at reduced cost. The paper develops protection system including earth, differential...
Image composition is a basic process in digital image editing. Its objective is to enable convenient image object copy-and-paste to generate new images which look natural and realistic. Seamless image composition systems often require users to successively choose a rough region of the inserted object and the target location for automatic which is rather tedious for using 2D input devices like mouse...
File retrieval is a frequently adopted primitive operation for most computer users. As the dominant way for file retrieval, file navigation is yet quite inefficient. Lots Efforts have been made to either enhance the navigation interface or provide alternative. However, they all suffer from the challenge of switching users from their preferred interface to a totally unfamiliar new one. In this paper,...
Along with the rapid development of social networks, social network worms have constituted one of the major internet security problems. The root of worm is the inevitable software vulnerability during the design and implementation process of software. So it is hard to completely avoid worms in the existing software engineering systems. Due to lots of bandwidth consumption, the patch cannot be transmitted...
This paper proposes new type of software components for distributed automation systems that are capable of adapting to the computational load conditions by migrating to other devices. The migration is seen as a basic mechanism of bio-inspired heuristic search for more optimal overall load across distributed network of devices. The adaptable components can form digital ecologies self-configuring themselves...
A smart electric grid incorporating local generation and storage is an area of active research in the industrial automation community. Very little attention has been given to similar possibilities in hot water grids that are used extensively for district heating in several countries, especially in Central and Northern Europe. In this paper, possibilities for heat trade in such a grid are investigated...
The reliability theory used in the design of complex systems including electric grids assumes random component failures and is thus unsuited to analyzing security risks due to attackers that intentionally damage several components of the system. In this paper, a security risk analysis methodology is proposed consisting of vulnerability analysis and impact analysis. Vulnerability analysis is a method...
This paper presents a visualization architecture to facilitate automated design for distributed automation applications. CAD is used as a source of software models as it was found to provide detailed physical information, particularly for visualization. The approach assumes a fully distributed control architecture, with each system component functionally encapsulated into IEC 61499 Function Block...
Modeling is the crucial first step in formal verification. Some models are constructed by humans from source code, while others are extracted automatically by tools. Regardless of how a model is constructed, verification is only as good as the model; therefore, it is essential to validate the model against the implementation it represents. In this paper we present two complementary approaches to software...
AutoCAD is a famous software for moulds design, MasterCAM is a popular soft ware of NC- machining. This paper aims at taking f ull advantages of this two kinds of software to design and manufacture mould. Through the example of designing and manufacturing of cell phone covermould, expound the method and technological process of NC machining by using this two kinds of software.
The design software used in the Matlab interface as the application development platform, and with a SQL Server database as the background data storage tool, in order to achieve efficient human-computer interaction function. From the results of view, the end result meets the design requirements, host computer receives a wireless sensor network module transmission to the temperature, humidity, air...
Three solutions to the common problem of print in the MIS of B/S mode are put forward: use the page printing function of IE to print reports; use control such as Crystal Report to print reports and certificates; use XML to print reports in B/S mode. These methods provide a feasible project about print based on B/S mode. It will be helpful for creation of printable documents based on Web.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.