The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Software must be well developed and maintainable to adapt to the constantly changing requirement of the competitive world. In this article, we distinct different software maintainability prediction models and techniques which can help us to predict the maintainability of software, and can lead us to minimum the effort required to fix the faults in the software and the software will be more maintainable...
Software must be well developed and maintainable to adapt to the constantly changing requirement of the competitive world. In this article, we distinct different software maintainability prediction models and techniques which can help us to predict the maintainability of software, and can lead us to minimum the effort required to fix the faults in the software and the software will be more maintainable...
Flexible AC transmission system devices are used in power transmission networks in order to increase the maximum power transmission and stability. They as well, help to damp low frequency oscillations for both local and internal areas. On the other hand, the design of these devices with uncoordinated Power System Stabilizer (PSS) may degrade the performance of the power system. In addition, the power...
This Study proposes a routing strategy of combining a packet scheduling with congestion control policy that applied for LEO satellite network with high speed and multiple traffic. It not only ensures the QoS of different traffic, but also can avoid low priority traffic to be “starve” due to their weak resource competitiveness, thus it guarantees the throughput and performance of the network. In the...
This paper presents the development of a low cost mobile manipulator called the CAERO-MM-1 for the purpose of research and education. The hardware consists of 3 main parts, the 4-DOF manipulator with 2 webcams at its end effector which imitates a stereo camera, the mobile platform with tracks for navigation and the internal computer that is connected to various sensors and actuators. CAIRO-MM-1 features...
Cloud computing with its utilities is one of the realities that the most of the industrial and educational has a dream. However, the cloud computing has the potential to solve a lot of problems (such as easy sharing, transform a large part of the IT industry) but still the performance, reliability, and the security is the most issues that still need to test and measured. This paper is the survey paper,...
Mobile robots work in different kinds of environment, and it is necessary for them to move and maneuver in places with objects and obstacles. In order to navigate the robot in a collision free path, path planning algorithms have been presented. The main goal of path planning is to determine the optimal possible path between the initial point and the defined goal position in the minimal possible time...
In this paper we present a new obstacle detection method, based on stereo vision, without combination with any other kind of sensors. The proposed method uses a differential image transform algorithm to gain robustness against illumination changes. This method increases the speed of program execution while keeping the performance of stereo vision algorithm in term of accuracy in the same level with...
In this paper we develop a formal semantics of security protocols. Its main virtue is that it is a generic model, in the sense that it is parameterized over e.g. the intruder model. Further characteristics of the model are a straightforward handling of parallel execution of multiple protocols, locality of security claims, the binding of local constants to role instances, and explicitly defined initial...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.