The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Software plays an important role in various aspects of our life. However, recent software development practices have substantial negative impacts (direct and indirect) on economy, society, human beings, and environment. To cope with these issues the concept of Green Software Engineering has boomed recently. Green and sustainable software development aims to create green software that meets the needs...
Plants are essential resources for nature and people's lives. Plant recognition provides valuable information for plant research and development, and has great impact on environmental protection and exploration. This paper presents a leaf analysis system for plant identification, which consists of three main components. First, given a leaf image, a preprocessing step is conducted for noise reduction...
It is an important research subject to estimate the missing value in the incomplete information system. In this paper, we formally define the incomplete information system, incomplete equivalence class, reflexive neighborhood, granularity, granularity domain, rough granularity domain, neighborhood granularity domain, and the property of neighborhood granularity domain. Then we put forward a new method...
Military operational C2 (command & control) requires dynamically focalized information for support. Internet search engines do not meet such requirement, as they don't care who is making what decision, and needs what information for support. It is found that commanders of same type, executing similar tasks, have similar information requirements. By this idea, a knowledge based method is proposed...
Aiming at the issues of the traditional centralized UDDI model, the distributed UDDI model was proposed. The model adopted the latest version specification of UDDI v3 and the management technology of key space, avoiding uneven service accessing, low processing efficiency and prone to single point of failure. Moreover, service publication and service discovery were elevated, and the good practicability...
Parallel computer architectures bring synchronization problem which bog down the system. And the speed gap between CPU and memory keeps growing, making data operation more expensive. In some data-intensive applications, there are similar or coincident child operations in parallel threads, which take unnecessary resources. To effectively exploit parallelization, reduce the price of data operation,...
This paper presents a quantitative analysis of Itai's leader election algorithm using probabilistic model checking. In particular, a leading probabilistic model checker PRISM is utilized to simulate the algorithm executions. From performance analysis perspective, this paper investigates execution efficiency of this algorithm. Properties to be considered is the expected round of leader election under...
Public or private cloud computing platform is often used to host multi-service platform. As a result of the adoption of virtual resource sharing architecture, multiple virtual machines corresponding to multi-service platform often contend for physical resources, including computing and storage as well as network resources, etc. This paper presents a method for resolving computing resource contention...
Everyday a large number of internet users are being encountered with web spamming where the search engines produce false ranking to web sites due to the use of unethical methods of Search Engine Optimization (SEO). The objective of the paper is to identify the spam traffic by using Artificial Immune System (AIS) classification algorithm. The paper presents chi square method for attribute selection...
To address the lack of health status identification and poor stability problems in the rotating machinery equipment, this paper proposes a new method for health status identification of rolling bearing based on SVM and improved evidence theory. Firstly, in order to reflect the rolling health condition, we use the empirical mode decomposition (EMD) to extract energy value and the original part of the...
With the development of computer technology and cloud computing, service trade has been widely used and more and more composite services with enhanced features and functionality are provided. The composite services are selected based on service selection model. At present studies on the selection model of composite services only consider the quality of service, but ignore the user's selection intention...
This paper analyzes the problems in the use of NFS. Combined with oVirt the current mainstream private cloud computing platform, Restore security threats of cloud computing platform configured with NFS. I also give some good reminder to the users, and find an optional way to further optimize the private cloud platform.
This paper mainly considers the coordination issue and capacity planning strategies of the cloud service supply chain, which is consisted of two participators: application infrastructure provider (AIP), application service provider (ASP). We modify the traditional newsvendor model to match the features of the cloud service supply chain, including the risk of downtime, the scalability of service, and...
With regard to the challenges for CNC system design stemming from the diversity of design requirements, a multi-dimensional integrated design framework is proposed in this paper, which can provide a convenient and efficient way for CNC system design. As an important part of this framework, a modelling language is developed based on IEC 61499 and hierarchical policy. By encapsulating CNC functions...
With the development of cloud computing technology, more and more governmental agencies are aware of the importance to take advantage of cloud computing to improve the efficiency and reduce costs. In this paper the design and implementation of a PaaS based E-government system is presented, with emphasis on the security design and rapid development features of the framework. Due to its characteristics...
In companies from retail banking or telecommunication sector are continually developed information systems (IS). The core of these IS resides in efficient and elegant usage of database tools. In this paper we present a new approach of analyzing database objects with DB Object Mapper Tool that is being developed for mapping objects from large and complex database systems. The term “object” in this...
This paper aims to classify the growing number of real-time traffic during the secure access process of the power system more effectively and to improve the speed of business processing of the power system. A real-time traffic classification scheme of the power business based on improved Naive Bayesian classification algorithm is proposed. On the basis of analyzing characteristics of real-time traffic...
With the continuous development of Internet of Things (IoT), cloud computing, and artificial intelligence, many cold chain logistics providers have updated their IT solutions to enhance the quality control of perishable food products in the cold chain industry. Based on RFID, WSN, GPS, and cloud computing, a typical cloud-based IoT platform empowers a logistics company to monitor the real-time status...
With the rapid development of the technologies of mobile phone, VOIP and mobile Internet, more and more demand for mobile phone video conversation over Internet is required. A method for video conversation based on VOIP and Android is presented in this paper. It realizes video conversation over Internet function of Android application using video conversion service provided by third party cloud service...
Due to the problem of channel inconsistency in the adaptive nulling antenna, based on the analysis of the performance's effect of the channel amplitude and phase error to the nulling antenna and the establishment of channel calibration model, an on-line calibration method for nulling antenna is proposed. A calibration signal is transmitted through the calibration antenna. The channel error estimation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.