The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we designed a real-time data recording system for the characteristics of the three-axis acceleration sensor MSA3000-100. The system consists of low-pass filtering, data acquisition, storage and data analysis. The system master adopts the STM32 chip. Firstly, the analog voltage information outputted by the sensor is pre-processed by the active first-order low-pass filter composed of...
Decades went by since Mark Weiser published his influential work on how a computer of the 21st century would look like. Over the years, some of the UbiComp features presented in that paper have been gradually adopted by industry players in the technology market. While this technological evolution resulted in many benefits to our society, it has also posed, along the way, countless challenges that...
Modular exponentiations are widely used in discrete-log based cryptographic protocols. Most researches have been done for outsourcing exponentiation modular a prime, while less work has been done for outsourcing exponentiation modular a composite. In this paper, we first raise a new secure outsourcing algorithm for exponentiation modular a composite in the one malicious model. Then, we prove that...
Tool Path Generation is one of the important steps in 3D printing (3DP) processes. An extendable tool path generation software is designed aimed at supporting all 3DP processes in this paper. At first, an extendable architecture is created based on the principle of tool path generating which all 3DP processes should follow. Then, the Graphical User Interface (GUI) is designed with a Visual Studio...
Memory devices represent a key component of datacenter total cost of ownership (TCO), and techniques used to reduce errors that occur on these devices increase this cost. Existing approaches to providing reliability for memory devices pessimistically treat all data as equally vulnerable to memory errors. Our key insight is that there exists a diverse spectrum of tolerance to memory errors in new data-intensive...
As the core information system, the Unified Process Management (UPM) system covers the critical business processes in large enterprises. To achieve stable operation of the system and high quality of the processes is the key requirements from these enterprises. The original UPM system has ambiguous IT roles and responsibilities and lacks of important management schemes in the course of software development,...
During equipment tests, there exist many software faults such as incorrect design, inaccurate boundary, awful mistake managing, which result in equipment faults frequently. By systematic analysis of software test process and the equipment software's characteristics of close relation with the environment, user and operation, it is proved that there exist disadvantages among software verification tests'...
This paper introduces UI Portals, a novel approach to help users share their off-the-shelf applications' user interfaces on traditional and multi-user interactive devices among various platforms. Users can choose an application window or select parts of the window to share. In addition to the traditional single-user mouse-and-keyboard interaction, we provide support for simultaneous interactions on...
After measured fuel parameters such as calorific value, volatiles, ash and water content of the oil-sludge and the coal experimentally, a mixture fuel has been prepared from oil-sludge and coal. It will be recalled that the former has a high proportion of volatiles, whereas the latter has a similar amount of carbon. Such a property allows for mitigation against the amount of oil-sludge produced per...
Computer networks are inevitably attacked as a result of their openness, while network attack usually actualized by exploiting vulnerability existing in network environment. Attack graph, consisted of lots of related atomic attacks, can fully display the exploitation and dependence relations among all of the vulnerabilities existed in network. Thus, it is a very useful tool for network vulnerability...
Based on SD memory card, the communication & storage system of the embedded portable spectrometer was designed, so the spectrometer can save data and change the analysis model files. In the system, SD card was used to store data files, and the communication function was designed by using serial port to send the file and command and receive the file. So the system can be used to accomplish uploading...
Today, workflow based software model has become mainstream to many application system developments. However, in most of these applications, their workflow procedures are fixed in their source code, this is not only restricts to the enterprises changing their working procedures to adapting the market requirements, but also limits the dynamic changes, scalability and adaptation of the system itself...
Outlier detection is a hot topic of data mining. After analyzing current detection technologies, a detection method of outlier based on clustering analysis is proposed, in which an effective sample is screened out from original data. According to agglomerative of hierarchical clustering, credible sample set is found. Then mathematical expectation and standard deviation are obtained by credible sample...
With the analysis of the principle and composition for the MQ Series, based on the features of steel MES(Manufacturing Execution System), this paper discusses the steel MES message communication system by using the middleware of MQ Series. The structure of the system, format of the message and designing of object are presented in detail. After careful analysis of system communication process, the...
It is quite difficult to acquire criterion knowledge for the condition monitoring and fault diagnosis in machinery. The traditional approach depends on constant summary of experiences from the experts. However, the acquired knowledge is probably inaccurate and inefficient. With the benefit of network, the different companies and users that have the same equipments can be organized to form an integrated...
Software defects are the key factors to evaluate the dependable software. This paper analyzes the attributes of software defects, and applies positive and negative association rules method to the research of software defects. This method can not only overcome the weak point of the traditional association rules method that can only mine the explicit rules, but also output some more meaningful rules...
The traditional method based on "support-confidence" framework could bring a large number of irrelevant or even misleading association rules. In view of the problem of evaluation standards of association rules, we increase interest measure in the evaluation standards, and give the definition of interest measure and positive and negative association rules method based on "interest-support-confidence"...
The high dependability software is not only one of software technique development commanding points, but also is the software industry development essential foundation, this paper summarizes the data mining to face the detect of the software credibility test, the appraisal and the technical aspect newest research, elaborated the data mining technology in the software flaw test application, including...
Data Centers are energy consuming facilities that host Internet services such as cloud computing platforms. Their complex cyber and physical systems bring unprecedented challenges in resource managements. In this paper, we give an overview of the resource provisioning and utilization patterns in data centers and propose a macro-resource management layer to coordinate among cyber-and-physical resources...
In the software industry, an unsuccessful software development project bears the characteristics that it would have fewer features, be late, and be over budget. We participated in a project that suffered all the three characteristics. Looking back, we realized that we have made many wrong decisions. This paper, serving as a case study, discusses these mistakes, especially the major ones that contributed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.