The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In order to support the end-to-end timing analysis at various abstraction levels and development phases, the end-to-end timing models should be extracted from models of the applications in such a way that they are interoperable. We discuss the challenges and issues that are faced when the timing models are extracted at various abstraction levels during model-and component-based development of vehicular...
Edge detection is an important task in image processing and becomes more complex for the colour image which provides more information in comparison to the gray image. In this paper it will be presented a colour edge detection approach based on the product of multiscale wavelet transform. The use of the product of multiscale transform improves the localization of detected edges comparing to the one...
We present complete model-and component based approach for the development of vehicular distributed real-time systems. Within this context, we model and timing analyze these systems using one of the state-of-the-practice modeling and timing analysis techniques that is implemented in the existing industrial model the Rubus Component Model and accompanying tool suite. As a proof of concept, we conduct...
This poster describes an academic development of an embedded system project named SETRAIF, which was performed during the 2nd half of 2012, by students and professors of computer engineering courses at the Brazilian Aeronautics Institute of Technology (Instituto Tecnologico de Aeronautica - ITA), combining the use of inter disciplinarity, Agile Methods, and Model Driven Development.
Good quality meshes are extensively used for finding approximate solutions for partial differential equations for fluid flow in two dimensional surfaces. We present an overview of existing algorithms for refinement and generation of triangular meshes. We introduce the concept of node stability in the refinement of Delaunay triangulation. We present an algorithm based on the location of center of gravity...
Already a research is done on applying e-procurement in Iran Automaker industry and found the necessity of doing research on replacing new technology for other diligence too. Among so many industries in Iran one of the vast manufacturing cases which is familiar with e-procurement and has only 80 years history in Iran, is Cement Industry. According to special situation of world market and economy crisis...
The scientific knowledge, in many areas, is obtained from time series analysis, which is usually done in two phases, preprocessing and data analysis. Trend extraction (detrending) is one important step of preprocessing phase, where many detrending software using different statistical methods can be applied for the same time series to correct them. In this context, the knowledge about time series data...
Today, the industry old adage of sequential processing is certainly no longer sufficient. The need for high performance computation is ever growing, even though certain problem sets remain within the realm of super high performance computing with applications such as weather forecasting, quantum physics and climate research to name a few. Within the commercial realm of computation, NVIDIA has proposed...
A smart road infrastructure is proposed to monitor and control traffic in real-time. It uses global positioning and navigation, as well as mobile gadgets and the Internet for improving the quality and safety of vehicle movement and minimization the time and costs. The innovative idea is using a virtual cloud space for vehicle management.
A study to apply binary ATM in reducing latency and packet error probability in cloud for integrated voice, video and data is made in the paper. Studies reveal the superiority of binary ATM to conventional ATM.
Cloud storages have many exciting features that attract many individuals and organizations for storing and sharing data over the cloud. However, security and key management are still remaining the highlighted concerns in cloud storage. Managing/protecting keys is a problem for existing approaches, and opens the risk of attackers working to offline brute-force crack the decryption and/or surreptitiously...
There are multiple methods that permit measuring a software product's degree of usability. Heuristic evaluation is an inspection method widely used, since it allows finding many usability problems. Transactional websites have their own defining features, therefore general heuristics may not be appropriate when evaluating their usability. A set of usability heuristics has been developed for transactional...
Multiple views interactive environments (MVIEs) have been used to visually analyze different types of data. These environments provide visual mechanisms based on interaction resources to support users to analyze and understand data. However, building MVIEs is challenging, as it involves the use of sophisticated visual and coordination mechanisms. This paper discusses the motivation, technical approach...
The performance of transmit beamforming (BF) systems in terms of the spatial correlation coefficient and channel gain variance (CGV) are analyzed over Rayleigh fading channels. We derive bit error rate (BER) of distributed BF (DBF) systems as a function of CGV of distributed channel links. As for clustered BF (CBF), we express its BER as the explicit function of the correlation coefficient. Based...
Security policies play an important role in the security of communication networks. They are normally defined at a high level of abstraction and implemented in firewalls, which are the first defense to secure networks against attacks and unauthorized access. When security policies are implemented in firewalls, anomalities and conflicts that may arise from different policies should be taken into consideration...
Xing et al. proposed a digital watermarking scheme based on visual cryptography and the extended codebook in order to eliminate ambiguity problem. However, there exists still an ambiguity problem such that the watermark can be extracted from other owner's watermarked image. In order to solve this problem, we propose a new digital watermarking scheme with authentication. The proposed scheme is based...
In oil and gas exploration, geologists will need to visualize targeted areas at a large scale to understand the possibilities of a particular seabed area containing hydrocarbon reservoir. Currently, seismic surveys are done to know such possibilities. There are various techniques that has been used to accurately map seabed condition. Using a non-costly method for geologist to generate 3D visualization...
This paper describes an automated solution for improving the design methodology of bio-medical applications on embedded platform devices with security and privacy guarantees. Besides typical design parameters, the need for security and privacy guarantees at the communication, software and hardware layers further extend the design space. Security and privacy features require expertise in evaluating...
We combine successive ICI cancellation scheme to the recently proposed, so called ISDAC OFDM (Interantenna interference Suppressed Distributed Alamouti coded Orthogonal Frequency Division Multiplexing) for frequency asynchronous distributed antenna systems. Due to the superb initial detection reliability of ISDAC OFDM compared to the conventional schemes, the additional improvement by performing iterative...
This paper introduces a new hardware-software solution for game development. Currently, game developers do not utilize any dynamic inputs that are based off of a player's reaction. The goal of this paper is to research how effectively and efficiently biofeedback can be implemented into a videogame. This process is evaluated from both the hardware and software implementation of heart rate monitoring...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.