The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This work proposes traceability link derivation process and theorems to establish the trace links between system objectives, requirements, design models and system/subsystems/components. The traceability relation definitions and three kinds of traceability links are defined by adopting requirements traceability reference models. Based on the definitions and graph theory, the dependency link derivation...
Load testing and cross-browser testing are ones of the web testing types particularly reliant on the support of cloud computing platforms for the implementation of TaaS. The main challenge involved in the composition of heterogeneous web application testing tools is the incompatibility of their inputs and outputs. However, the need to manually configure the tools greatly undermines the convenience...
A Q-Learning based back-off algorithm was proposed in this paper because the traditional DCF approach used for IEEE 802.11p MAC protocol to access the channel has some problems of the low packet delivery rate, high delay and the poor scalability in VANETs. The proposed algorithm which is quite different from the traditional BEB algorithm was adopted by the nodes(agents) to interact with surroundings...
Software security is crucial in every aspect of information technology. As today's software has become larger and more complex than ever before, software fault localization has become more time consuming and labor intensive accordingly. Consequently, a broad spectrum of software fault localization techniques are proposed and implemented. However, most of these techniques assume the existence of a...
Traffic prediction systems are currently the most important techniques, as they can be wildly applied in different aspects. Given a set of past traffic data, a traffic prediction system is able to predict the future traffic conditions. However, the existing traffic prediction systems are hard to implement and are quite expensive. Hence, this work proposed a Matlab-based traffic prediction system,...
In this paper, we present a continuous deep learning model for fall detection using Microsoft Kinect. The input include pre-processed high-resolution RGB images, depth images collected by a Kinect and optical flow images. We combine several deep learning structures including convolutional neural networks and long short-term memory networks for continuous human fallen detection. Finally, we present...
The network traffic has been growing explosively in recent years after users can watch the high quality video from the Internet. It is an important issue to reduce network traffic and increase the user quality of experience (QoE). Therefore, there have been in-network caching schemes to cache the content fetched by users in proxy servers. Recently, software defined networking (SDN) was proposed to...
There exist some real-time solutions for x86 personal computers. Most of them involve adding real-time extensions or modifying kernels to make operating systems be able to run real-time tasks. We provide another real-time solutions for x86 personal computers by proposing a model consisting of a non-real-time operating system for non-real-time tasks, a separated real-time operating system for running...
In recent years, many researchers have proposed intelligent systems based on the IoT (Internet of Things). Among these smart systems, one of the most common applications is intelligent surveillance system. Due to the development of the camera, some applications adopt higher resolution of images to get more accurate results. Therefore, how to process these high-resolution images in real time has become...
Received Signal Strength Indicator (RSSI) is used in indoor positioning for measuring object distance to the base station. However, acquiring accurate RSSI values is challenging because wireless interference factors, such as multipath decline interference, make RSSI values of the same object fluctuate over time. Therefore, instead of a single RSSI, RSSI acquisition will collect a set of RSSI values...
In this paper, we proposed an image registration method for digitized cadastral images in Taiwan. The proposed method is composed of three parts: feature selection, RANSAC-based transform parameter estimation, and image stitching. In the feature selection, Harris Corner Detection is first used to extract corners as feature points for each engineering image and then some feature points are selected...
This paper introduces a polygon-based method for removing overlaps of printed circuit board (PCB) pattern with circular-arc. The algorithm takes a sequence of object contours in Gerber files which consist of circular-arc polygons (i.e., polygons that have straight or circular boundary edges) in a plane as input, and outputs high quality and non-overlapping layouts. Instead of combining circular-arc...
A massively-dense wireless sensor network may pose many challenges for efficient load-balancing routing algorithm design due to the problem scale and hardware constraints. One approach to mitigate such a scalability problem is to formulate the load-balancing routing problem as a set of partial differential equations (PDEs) through a geographic model. In this paper, we describe two well-known numerical...
In recent years, web services have become an indispensable part of our life. By use of personal computers, smart phones and wearable smart devices, people can enjoy the convenience brought by these web services and use them to not only enrich our daily life but also solve life issues. Thus, to more appropriately realize the performance of a web service, it is necessary to perform an overall and credible...
To adapt to the underwater application environment and extend network lifecycle, an improved protocol called energy balanced pressure routing (EBPR) is proposed in this paper. EBPR is based on void-aware pressure routing (VAPR). In VAPR, determination of beacon cycle is related to node velocity. However, the node velocity is difficult to get without assisted positioning system, and it has certain...
Currently a massive amount of traffic per second is delivered through EPON systems, one of the prominent access network technologies for delivering the next generation network. Therefore, it is vital to keep the EPON optical distribution network (ODN) working by providing the necessity protection mechanism in the deployed devices, otherwise, when failures occur it will cause a great loss for both...
The selective pickup and delivery problem (SPDP) aims for the shortest path that satisfies the load constraint to supply the commodities demanded by all delivery nodes with some selected pickup nodes. This problem is relevant to many real-world problems, e.g., logistic and transportation problems. The SPDP has two major differences from the conventional pickup and delivery problem (PDP): One is to...
The k-ary n-cube is one of the most attractive interconnection networks for parallel and distributed computing systems. In this paper, we investigate Hamiltonian cycle and path embeddings in 3-ary 3-cubes based on K1,3-structure faults, which means each faulty element is isomorphic to any connected subgraph of a connected graph K1,3. We show that for two arbitrary distinct healthy nodes of a faulty...
Due to more and more on-premises services are migrating onto cloud, user behavioral analysis then gets popular as a data-driven way to administer lots accounts of on-cloud services. This paper proposes a novel rule-based approach, GMiner, for mining different types of Google cloud drive usages as an unsupervised account-management approach. Experiment results show that GMiner provides accurate, inter-pretable,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.