The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Automatic and semi-automatic approaches supporting program comprehension are sought by researchers and practitioners to facilitate software engineering tasks, such as development, maintenance, extension and so on. Using topic modeling is a promising way to automatically discover feature and structure from textual software assets. However, there are gaps between knowing and doing when applying topic...
The details of oriented visual stimuli are better resolved when they are horizontal or vertical rather than oblique. This "oblique effect" has been researched and confirmed in numerous research studies, including behavioral studies and neurophysiological and neuroimaging findings. Although the "oblique effect" has influence in many fields, little research integrated it into computational...
Existing joint models of deep Convolutional Neural Networks (CNNs) and Conditional Random Fields (CRFs) face two problems for object segmentation: 1) CNNs can hardly extract high level features; 2) fully connected layers of CNNs are lack of capability of dealing with structured multi-level features. To address these problems, we utilize a Structured Random Forests based border ownership detection...
As buoyancy-driven underwater gliders which have multi-functionality become more and more important instruments of monitoring and exploring the ocean, it is momentous to research and verify the performance of hardware of glider and the function of control software by establishing mathematical model and simulation. So a semi-physical motion simulation system of buoyancy-driven underwater glider is...
Fault-tree analysis is a useful analytic tool for the reliability and safety of complex system. However, fault tree is not suitable for repairable system. In this paper, we will propose a new method called TTF (time to failure) and TTM (time to maintenance) to analyze repairable system. Nevertheless, Monte Carlo simulation may be time consuming. In order to reduce simulation time, a parallel algorithm...
This paper investigates the behavior of causal Jacobi differentiator in online robot identification applications. The identification process is carried out online using robot dynamic model. Causal Jacobi differentiator is applied to compute the acceleration from the noisy position measurements, with an exact time delay. Moreover its frequency domain property is analyzed via a finite impulse response...
Aiming at the problem that ViBe (Visual Background extractor) algorithm is sensitive to illumination variation, an improved ViBe algorithm is proposed in this paper. First, a brightness reference image is build, which represents the brightness level of background. Second, adjust the brightness of current frame, which is changed by illumination variation, back to the reference images brightness level...
Magnetic Resonance Imaging (MRI) has been contraindicated in patients with pacemakers or implantable cardioverter-defibrillators (ICDs) due to safety concerns, such as the heating of adjacent bodily tissue due to radio frequency (RF) induced current. The ISO/IEC 10974 Joint Working Group (JWG) has developed a tiered approach in establishing the worst case RF heating conditions that active implantable...
Hadoop is an open source implementation of the MapReduce programming model, and provides the runtime infrastructure for map and reduce functions programmed in individual applications. Commercial clouds such as Amazon Elastic MapReduce provides the Hadoop architecture with IaaS support. In this architecture, the map and reduce functions are major determinants of end-to-end application latency, along...
Recently, Au et al. proposed a hierarchical identity-based signature scheme and Hu-Huang proposed a proxy key generation protocol. Based on the both schemes, we present a novel identity-based proxy signature scheme. The proposed scheme is provablly secure in the standard model and its security can be reduced to the hardness assumption of the g-strong Diffie-Hellman problem. Compared with all existing...
To integrate wind and solar energy in electric systems, new technologies, such as energy storage and demand response, have been proposed to increase system flexibility. Control approaches and market rules are being developed accordingly to better manage these resources in multiple time scales. Therefore, models and software tools capable of performing hourly scheduling, intra-hour dispatch, and automatic...
In Peer-to-Peer (P2P) e-commerce systems, peers' features such as heterogeneity, anonymity and autonomy lead to some security problems, such as forging, slandering and collective cheating, which affect the quality of service a lot. A trust model in P2P e-commerce systems based on the recommendation is proposed, each peer in the system has a unique credibility of recommendation, two trust parameters...
It presents a computer control system for process control based on data-driven. The system focuses on process data and is able to deal with the complex problems such as nonlinearity, significant delay, strong coupling and stochastic uncertainty, which are ubiquitous in process control. It adopts both modeling method based on data and learning control theory. The computer control system is composed...
Pervasive computing systems are heterogenous and complex as they usually involve human activities, various sensors and actuators as well as middleware for system controlling. Therefore, analyzing such systems is highly non-trivial. In this work, we propose to use formal methods for analyzing pervasive computing systems. Firstly, a formal modeling framework is proposed to cover main characteristics...
In service engineering, service identification plays a critical role as it lays the foundation for the later phases. Many existing research focus on creating holistic service oriented engineering process, generating SOA methodologies and frameworks, as well as proposing new service identification methods. Unfortunately, most methods deal with certain business cases and cannot provide universal guidance...
This paper aims to investigate the problem of low-dose computed tomography (CT) reconstruction with prior image constraints using the compressed sensing (CS) theorem. The CS theorem states that images can be reconstructed from under-sampled data in an adequate or transfer domain without introducing noticeable artifacts by solving a convex optimization problem if the source signals are sparse. To describe...
Emergency Response Plan is the core and criteria of emergency response incidents process, which should be formalized further for the reason of improving its sharing and interoperability. In this paper, combined with van der Aalst's meta-model, we expanded the model to be a plan-program ontmodel, regarded the plan as a template with constraints and variables, described constraints of time, space, roles...
In order to promote to share resource of Agricultural Information Courses (AIC) for our school master's network education, ensure teaching quality and improve the construction level of the network courses; we have developed a teaching demonstration system. This teaching platform can reform the traditional agricultural informatization instruction, and improve the teaching and research activities of...
Materials handling at a non-automated cross-docking center is complicated and labour intensive. Managers are usually under enormous pressure to optimize personnel planning, inbound scheduling to minimize overall handling cost as well as to ensure just-in-time shipment. This paper demonstrates how to model a complex non-automated cross-docking system via simulation to analyze system operation without...
As email playing an increasingly important role in the online world, analyzing and mining on email communication network draw more and more attention, in which community detection is one of the most key technologies and applications. Based on the intuition that the edge topic is more focused than the node topic in a short period, this paper proposes an edge-content based email network community detection...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.