The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Electrical capacitance tomography (ECT) is used in many industries as a non-invasive detection and measurement method, which works by finding permittivity changes in a viewing region. This usually consists of sensor electrodes surrounding a region of interest; however, this is not always possible as sometimes the viewing region is only accessible from a single side. In this case, a planar array ECT...
In a cyber-physical system (CPS), the events start or finish in a sequence of time. The sequence can be called chronological order. Chronological order relationship is essential in determining system status and providing decision reference in feedback control related to IoT areas. However, the correctness of the order obtained is vulnerable to many factors. This paper delves into typical events in...
Soft ferrite materials are widely used in the construction of high frequency transformer for power electronic applications. Core loss calculation is essential both in the selection of soft ferrites and the design of high frequency transformer. Traditionally, the Steinmetz equation is used to evaluate the core loss of magnetic materials under sinusoidal excitation. Nevertheless, in modern power electronics,...
As technology becomes a larger part of everyday life, it becomes increasingly more important for CS and CIT students to learn about cyber security during their education. While many cyber security oriented courses exist, it is also necessary that students must be able to work and learn in an environment that resembles a real world context. To address this problem it has become common to adapt cyber...
Tracking fish in their natural environment is an important aspect of marine ecosystem research. However, real-world fish tracking is challenging due to unconstrained environments and complex scenarios. The purpose of this study is to develop a sparse sample collection and representation method (SSCR) based on the compressive sensing concept for fish tracking. The SSCR consists of sample collection...
In today's world of fast communication, to insure, the security and integrity of information is a big challenge. Data hiding also known as Steganography is one of the fields that deal in methods related information security and hide secret information and message other information. This paper elucidates the effect of data hiding in different number of least significant bits in the primary colors of...
In this paper we propose a method for producing a citation summary of research articles that concentrates on the context of articles which cite the given article. Parameters for citation summary are selected in such a way that, this citation summary can be used to evaluate a qualitative citation index for the research articles. Considering some factors such as, semantic similarity between the citing...
Delay Tolerant Networks(DTNs) is network architecture designed to enable communication even in an unstable network connectivity between end. Nodes can't be pre-selected for a route because they can't know the information of the entire network. Therefore, the relay node should be selected effective to improve network performance. So the movement prediction scheme of the node is needed for this. In...
Recently, Big Data processing is becoming a necessary technique to efficiently store, manage, and analyze massive data obtained by social media contents. NoSQL is one of databases that efficiently handle Big Data compared to the traditional database that has the limitation to manipulate Big Data. Log-structured key/value store, widely used in NoSQL, basically stores data into the disk storage in batch...
Mobile learning is potential and valuable in education. However, most of previous developing strategies of m-learning were analyzed by means of individual knowledge, experience, judgment, and statistic software. Although these methods provide systematic steps for the implementation of m-learning strategies, the correlation between factors cannot be considered thoroughly through the steps, and it is...
Qualitative Mapping(QM) is the basis of Property Theory, by which Conversion Degree Functions are induced. Furtherly Inverse Conversion Degree Functions are proposed used to convert qualitative description into quantitative value for some attributes of objects according to the degree to which the qualitative description belongs. Finally Qualitative Membership Degree Matrix based on the proportion...
Event matching is the process of checking high volumes of events against large numbers of subscriptions and is a fundamental issue for the overall performance of a large-scale distributed publish/subscribe system. Most existing algorithms are based on counting satisfied component constraints in each subscription. As the scale of a system grows, these algorithms inevitably suffer from performance degradation...
This paper presents Pangaea, an inter-data center key-value store that keeps reasonable expandability of storage capacity, data lookup latency and data transfer speed. Pangaea uses two techniques called multi-layered DHT (ML-DHT) and local-first data rebuilding (LDR). ML-DHT provides a global and consistent index of key-value pairs with efficient routings in inter-data center environments. LDR reduces...
Monte-Carlo Tree Search uses simulation to play out games up to a final state that can be evaluated. It is well known that including knowledge to improve the plausibility of the simulation improves the strength of the program. Learning that knowledge, at least partially, online is a promising research area. This usually implies storing success rates as a number of wins and visits for a huge number...
This paper presents the theoretical aspects behind a handicap point system for pedometer challenges. The system attempts to address the problem of current approaches that report only the participants with the most steps in competitions. By introducing a handicap based calculation, the idea is to motivate all participants to exceed their average daily step count. It is proposed to add a participant's...
The aim of this contribution is to lead the reader into the problems of information competency and e-learning. In electronic education the students use information competencies, that's why we tried to clarify also the problem of creating the educational e-learning texts. The contribution also informs about the results of evaluation of the quality of prepared e-learning educational texts for the subject...
We describe an experimental approach to solving instances of an NP-Complete game, Light up, using a genetic algorithm. Subsequently we apply a new postprocessing algorithm known as the Wisdom of Artificial Crowds (WoAC) to improve the quality of achieved solutions. Experimental results are reported and directions for future research are suggested.
In recent years, botnets have become a significant threat, drawing the attention of computer security practitioners and researchers. As the extensive use of peer-to-peer (P2P) technology, P2P structured botnets have gradually emerged as a new advanced form of botnets. In this paper, we analyze the features of this new type botnet and evaluate effectiveness of various botnets defense strategies. However,...
This paper presents a approach for anomaly detection of electronic products using the Mahalanobis Distance (MD) and Weibull distribution. The MD value is used as a health index, which has the advantage of both summarizing the multivariate operating parameters and reducing the data set into a univariate distance index. The Weibull distribution is used to determine health decision metrics, which are...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.