The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In a cyber-physical system (CPS), the events start or finish in a sequence of time. The sequence can be called chronological order. Chronological order relationship is essential in determining system status and providing decision reference in feedback control related to IoT areas. However, the correctness of the order obtained is vulnerable to many factors. This paper delves into typical events in...
Vulnerability assessment is the practice of testing a computer system, network or application to identify, measure and rank vulnerabilities within the system. This project's goal is to create a distributed vulnerability assessment architecture utilizing multiple miniaturized computers such as Raspberry Pi 2 Model B. The scheme delegates scanning tasks to low-cost and self-contained miniaturized devices...
We demonstrate optical beam auto-focusing without the need of a focusing lens or nonlinearity. Radial Airy beams with inward and outward accelerations are used and an abrupt transition between Airy and Bessel behavior is observed.
Z Formal method not only can improve correctness and reliability of software, but also improve development efficiency. Although Z specifications have been widely studied in literatures, very little work is involved in definition and use of variables. This paper discussed on definition and use of variables by an example. Finally, it is applied to data flow analysis and data dependent analysis.
Formal methods are introduced into system design process that use rigorously specified mathematical models to build target systems. It can establish a precise and unambiguous model of a complex system. This paper takes an example for a complex NP-complete problem such as a class scheduling problem. By using the specification language Z, it designs and describes a formal mathematical model of a class...
Many natural language processing tasks, such as text classification, text clustering, text summarization, and information retrieval etc., cannot miss the step-relevance measure of inter-sentence. However, many of the current NLP system always calculate not the inter-sentence relevance but their similarity. In fact, similarity means differently from relevance. The similarity measure can be acquired...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.