The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Complex systems are prevalent in many fields such as finance, security and industry. A fundamental problem in system management is to perform diagnosis in case of system failure such that the causal anomalies, i.e., root causes, can be identified for system debugging and repair. Recently, invariant network has proven a powerful tool in characterizing complex system behaviors. In an invariant network,...
In China, drought is one of the major environmental disasters, which bring great harm to the people. The middle reach of Yangtze River is the most important base to produce grains in China. Influenced by the summer monsoon, the drought occurs frequently. In our paper, the NDVI and LST from MODIS data were utilized to calculate the TVDI (Temperature Vegetation Dryness Index), which were used to monitor...
Internet application workloads typically vary over time, periods of low demand alternate with spikes which, if not properly handled, can saturate the allocated infrastructure and violate Service Level Agreements. In this work, we leverage the usage patterns associated with the different customers of an Internet application to make tailored workload predictions. These workload predictions are then...
Power allocation for orthogonal frequency division multiplexing (OFDM) based two-way relay link in cognitive relay networks is discussed in this paper. Two secondary source nodes exchange their information through a secondary relay node by using amplify-and-forward two-way relaying strategy. The goal of power allocation is to maximize the sum data rate of the secondary system subject to the constraint...
SQL injection attacks, a class of injection flaw in which specially crafted input strings leads to illegal queries to databases, are one of the topmost threats to web applications. A number of research prototypes and commercial products that maintain the queries structure in web applications have been developed. But these techniques either fail to address the full scope of the problem or have limitations...
A solid phase microextraction (SPME) and gas chromatography and ECD method has been developed for the determination of 2,4-DCP in ground water resource. Optimal conditions for both extraction and gas chromatography, such as extraction time and temperature as well as pH, ionic strength and sorption time were established. The method was simple and reliable. It was an optimal method to determine 2,4-DCP...
A device is developed in this paper, which is used to detect whether the motor speed sensor meets the technical specifications, and has the ability of real-time displaying the current actual speed and automatic centering. In order to achieve the high-precision automatic centering of the device, image recognition technology is used in the device, and using ARM and servo control system to detect, recognize,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.