The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Robot Framework is a generic test automation framework based on keyword-driven and has been widely used in the automated testing of server. In this paper, Robot Framework is extended by test libraries to include some features in order to meet the demands of server testing, and the extended framework is used to execute the automated installation testing of server drives and firmware. Finally, analysis...
In existing educational environment, teacher's performance is playing vital role in growth of students as well as institution. The quality of Instruction is basic constituent for successful learning. For better collaboration between students and teachers, it has become mandatory to introduce comprehensive performance evaluation mechanism. In modern age, information technology provides us optimal solution...
The common classification is conducted under the supervised learning algorithms, which design classifiers through learning the labeled training samples. However, in actual situations, it is very costly to acquire class-labeled samples, because manually labeling documents requires a lot of time and efforts from experts. Therefore, it restrains the text classification to a great extent. To solve the...
Constructing software reliability growth model (SRGM) is an important method to evaluate software reliability. The common SRGMs usually assume that software faults are removed immediately when are detected. And new faults aren't introduced. It is not the truth. In this paper, a new SRGM is presented. The correlation of software faults detection process and the removing process are considered, and...
Feature selection is a strategy that aims at making text classifiers more efficient and accurate. In this paper, we proposed a novel feature selection method based on Tibetan grammar for Tibetan classification. Tibetan language express grammatical meaning through the function words and word order, and the function word has large proportions. By analyzing the Tibetan grammar and distribution of part...
There are different kinds of datacenter monitor system, but most of them just monitor a few aspects of runtime data. Some of them just focused on temperature monitoring and power consumption. And others are focusing on application behaviors and system resources. So they can't reflect the running state of a datacenter precisely. In this paper, we introduce a platform which aims at monitoring multilayer...
ECG signal quality is of great importance to real-time electrocardiogram(ECG) monitoring system. The paper introduces a new algorithm to evaluate the ECG signal quality. This algorithm is based on three features: heart rate score, spectral distribution ratio, and the variance between 12-lead ECG data. The result show that the proposed algorithm has a high Sensitivity of 95%, Specificity of 86.7%,...
In this paper, a new method for ECG biometric recognition using a hierarchical scheme classifier is presented. The integral process of the method is introduced, including preprocessing, feature extraction and classification. To achieve a better performance of proposed method, cross-validation is applied to determine the parameters in the classifier. As a result, proposed method offers considerably...
In this paper, we consider the termination problems about uninitialized and initialized two variable homogeneous linear loops. Through analysing the properties of the boundaries of the set NT composed of all points on which a given uninitialized two variable homogeneous linear loop does not terminate, we reconstruct a group of simpler and complete quantified formulas to check whether a given uninitialized...
Quantum communication is a new interdisciplinary branch of science which has been developing during the past two decades, which is a new research field combining quantum theory and information theory. Quantum communication is characterized by some features such as being highly efficient and absolutely safe, which is now a hot research area in quantum physics and information science around the world...
Research and propose a path collection mechanism optimization scheme of AODV protocol. This scheme adopts the path collection mechanism in DSR protocol to improve the performance of AODV, meanwhile it avoids being affected by the high running overhead and weak scalability of DSR protocol. Results obtained by OPNET Simulation shows that the optimized AODV scheme performs effectively in terms of packet...
Automatic train control system (ATC) is widely used in China, which effectively improve the efficiency of train operations, reduce system maintenance and construction costs, etc. In view of this situation, we propose the use of structural analysis and design language (AADL) for ATC modeling and analysis, It is described by automatic train protection (ATP), automatic train supervision (ATS) and Automatic...
Cyper Physical System(CPS) is a complex embedded system of a physical system, cyper system and the control logic depth fusion, because of the complexity and heterogeneity of the CPS part and interactive interface, there is no a unified framework for the CPS system modeling, analysis and design. Design the CPS system increasingly need using a variety of modeling forms in the whole development process...
In this paper, a novel self-healing restoration control method after distribution network faulting is applied to minimize the active power loss. Back-Forward sweep method based on layered node is selected to calculate power flow according to the radial distribution network model. Moreover, in order to avoid closed-loop structure scheme, a new solution which can reduce the dimension of mathematical...
This paper describes a remote water well monitoring system with .NET development platform. It involves many key technologies such as IC card, database, GPRS communication technology, GIS etc. And it adopts a multi-tier architecture framework that has scalability and compatibility. The system integrates the functions of selling water and monitoring consists of three parts: Monitoring terminal, information...
Aiming at policy conflicts when administrators deploy QOS policies, this paper proposed a QOS policy conflict detection and resolution mechanism. It includes QOS policy conflict detection technology based on policy and QOS policy conflict resolution technology based on policy re-construction, which can detect and resolute QOS policy conflicts both in the same type of behavior and in different types...
A mobile ad-hoc network (MANET) which does not use a wired network and base station system is composed of a group of mobile and wireless nodes. In MANET, The device In MANET is not charging in time. Many method based on Connecting dominate set are utilizing to prolong the network lifetime. In this paper we propose a new greedy approach to obtain a stable routing path by integrating three factors such...
With characteristics of high efficiency, low energy consumption and zero emission, pure electric vehicle is an effective solution for the recent energy crisis and environmental issues. This paper develops a pure electric vehicle control strategy that will be used on ENRANGER G3 — a compact SUV model by Wei Chai Motor. A hardware in the loop (HIL) test platform was constructed accordingly. The platform...
Traffic identification technique is used for classification of different network protocols and applications even with detection of users' network activities. In this paper, we conduct our study on some typical users' network activities and present a traffic identification method to describe the feature about users' behaviors. We convert users' network activities information into different sequences...
In peer-to-peer network environment, there is no centralized management authority to be relied on, so the service provider and service requester have to establish some assessment model, and evaluate the dynamic behavior of others, then choose more credible trusted entities to interact. Only in this way can they ensure security, safety and reliable decisions. On the basis of EigenTrust model, a local...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.