The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Software Defined Network (SDN) is a revolutionary networking paradigm system in which network control plane is separated from data plane and assigned to a devoted software program called controller running at a control layer. SDN makes networks wholly controlled through software applications and gives a hope to change the limitations of current networks infrastructures. Since the emergence of SDN,...
Designing a smartphone system can be a challenging task since it contains complex hardware and software components. The design space of an Android smartphone is very large as it spans over many hardware parameters such as the processor pipeline, cache configurations, memory capacity, as well as software configurations and tunables in the operating system, middleware, and applications. It is desirable...
Clone detection has been an active area for decades and many tools have been proposed. Existing researches show that in traditional software clones achieve to 13%–20%, and the clone rate in Web Application area may be higher. In this paper, we propose an improved method for code clone detection. Our approach is based on the randomized kd-trees with dimensionality reduction to cluster the characteristic...
Comparative genomics is a popular method for the identification of microbial virulence determinants, especially since the sequencing of a large number of whole bacterial genomes from pathogenic and non-pathogenic strains has become relatively inexpensive. The bioinformatics pipelines for comparative genomics usually include gene prediction and annotation and can require significant computer power...
Understanding an unfamiliar program is always a daunting task for any programmer, either experienced or inexperienced. Many studies have shown that even an experienced programmer who is already familiar with the code may still need to rediscover the code frequently during maintenance activities. Compared to that tracing the source code of an unfamiliar program is a totally different process of comprehension...
Security policies, which specify what applications are allowed to do, are notoriously difficult to specify correctly. Many applications were found to request over-liberal permissions. On mobile platforms, this might prevent a cautious user from installing an otherwise harmless application or, even worse, increase the attack surface in vulnerable applications. As a result of such difficulties, programmers...
Based on the analysis of the characteristics of combinatorial testing, an organizational evolutionary particle swarm algorithm (OEPST) to generate test cases for combinatorial testing is proposed. This algorithm is used to select the test cases of local optimal coverage in current environment based on these test cases, and then a test suite satisfying the pair-wise coverage criterion is built. The...
Verifying the execution of a test program against the memory consistency model is known to be NP-hard. Because of lacking extra observability, verifying the memory consistency model in post-silicon stage is even harder than in pre-silicon stage. In this paper, by identifying the pending windows of microprocessor and introducing the resultant time order restrictions, we propose a low time complexity...
The paper presents the developed Switched Reluctance linear generator system in hardware and in software. The structure and photograph of the developed three-phase 6/4 structure Switched Reluctance linear generator are given. The main circuit topology and photograph of power converter are also given. The photographs of power converter drive circuit, protection circuit, keyboard and LCD display circuit,...
Following with the charting process of risk map, the paper designed and developed Risk Mapping Tool (RMT), which is based on Microsoft .Net platform and SuperMap 5.3 COM. RMT encapsulates seven modules, including Risk Mapping, Cartographic Generalization, Making Thematic Map, Map Sheet Management, Risk Map Database, Vector Data Analysis and Raster Data Analysis. RMT system has successfully provided...
In this paper, we present SRCS, a system for Web browser Sharing and Collaboration that permits users within a group to share information and to cooperate based on the WWW at the same time. It is a pure browser-based solution without the involvement of any third-party platforms, servers changing and any other special client-side software installation. In addition, this paper shows that the implemented...
Comprehensive ecological environment evaluation system is an essential professional analysis system in Tarim River basin water regulation management. Research and development of the system consists of ecological environment quality evaluation module, ecological risk assessment module and ecological water demand module. The paper carries out environment quality evaluation by calculating bio-abundance...
The traditional frame error concealment methods primarily predict the motion trend for the corrupted pixel or block, which would generate edge fragmentation and object deformation. When the damaged images contain the contents of the non-linear motion and the global illumination change, these methods would have bad effects. In order to improve the efficiency of frame error concealment, we propose an...
Grid-computing technology is used to solve large or complex computational problems on distributed computational resources belonging to multiple organizations regardless of their geographical locations. In this paper, we introduce an integration of the SAFORAH geospatial data grid, provided by the Canadian Forest Service, and the computational grids, offered by the University of Victoria and National...
In this paper, we study how to optimize mesh-based overlay in a contribution aware manner. We have designed a suite of protocols to construct and optimize the overlay. Our core idea is to promote nodes with larger contribution closer to the source node so as to keep a compact and efficient mesh-based streaming overlay. Our method is evaluated through extensive simulations. Compared with the non-optimized...
Robust cryptography provides confidentiality and integrity for information transferred between peers. However, the decrypted plaintext in the memory of a receivers' computer is vulnerable - both to surveillance at the endpoints, and users who choose to forward confidential information. In this paper, we proposed a novel scheme called BLINK, which uses a reconfigurable hardware based decoder which...
Traditional search engines simply match according to keywords and recommend information for all the users without considering user preferences. Thus, personalized retrieval technology becomes the ??hotspot?? of current research on information retrieval. On the groundwork of traditional search techniques, this paper advances a personalized information retrieval model based on user interests via the...
Infeasible paths increase program complexity and program redundancy, generate useless DU(def-use) chains, and affect the result of program static analysis. Based on the valid information produced in the process of program compilation, this paper presents a translucent technique to analyze infeasible paths. It first requires the complier construct an information pool for each judge node and variables...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.