The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
An Unattended Detection method for monitoring the CO2 concentration in soil respiration is described. It is based on the gas pump and gas extraction with a dynamic air chamber assay, and the study of the relationship between data collected from on-line measurement of carbon dioxide and time, as well as the resistance to interfering. This method uses proposed utility line peak extraction method to...
Public incidents not only lead to great loss to human life and property, but also cause psychological changes of people, which probably trigger public panic, stimulate derivative events and even produce greater disaster. Internet technology makes the transmission of information more quickly, with the negative impact even more serious. This paper analyses the causes, characteristics and response of...
Researched and developed the software system of Information Management and Decision Support System of the hidden danger troubleshooting of Coal Mine. By using the technology of collaborative software to realize fast circulation of information, dynamic tracking, rapid feedback, and closed-loop management of transaction processing for the hidden danger, and by applying the technology of data mining,...
The world has fundamentally changed as the Internet has become a universal means of communication. The Web is a huge virtual space where to express individual opinions and influence any aspect of life. Internet contains a wealth of data that can be mined to detect valuable opinions, with implications even in the political arena. Nowadays the Web sources are more accessible and valuable than ever before,...
Whenever the question arises how a product, a personality, a technology or some other specific entity is perceived by the public, the blogosphere is a very good source of information. This is what usually interests business users from marketing or PR. Modern search services offer a rich set of tools to monitor or track the blogosphere as a whole, but the analysis with respect to a certain domain is...
Networks are protected using many firewalls and encryption software's. But many of them are not sufficient and effective. Most intrusion detection systems for mobile ad hoc networks are focusing on either routing protocols or its efficiency, but it fails to address the security issues. Some of the nodes may be selfish, for example, by not forwarding the packets to the destination, thereby saving the...
We present a State Estimation based Internet traffic flow control system where the objective is to maximize the aggregate bandwidth utility of network sources over their transmission rates. The network links and sources are viewed as processors of distributed computation and the control mechanism is based on estimation and optimization framework to solve the dual problem. The novelty of our approach...
The SoC level verification of AMBA AHB interconnect matrix and I2C DUT is presented in this paper. The verification environment has been developed and test cases have been implemented for I2C DUT. The assertions and monitor are developed to check the functionality of Interconnect matrix of multilayer AHB Lite. The whole verification is done using SystemVerilog hardware description and verification...
Under service oriented architecture (SOA), a system- such as an enterprise-consists of multiple heterogeneous servers (service providers), which may be distributed over a wide area of network, and may be managed under different administrative domains. One of the goals of this work is to enable the system as a whole (i.e., the enterprise) to impose global constraints on the interactive behavior of...
Assessing the level of river water quality periodically is important in ensuring that the river water is safe for consumption. This study investigates the level of water quality at Skudai River from year 2002 to 2006. Twenty parameters were identified and used in this analysis. These twenty parameters are recorded at nine monitoring stations located along the Skudai River. Multivariate statistical...
Wireless and pervasive applications typically present critical requirements from the point of view of functional correctness, reliability, availability, security and safety. In contrast to the case of classic safety critical applications, the behavior of such applications is affected by the movements and location of users and resources. This paper presents some formal tools that enable designers to...
In order to obtain full value from Business Process Management (BPM) solutions, small and medium-sized enterprises (SMEs) need to adopt an integrated suite approach that combines the Enterprise Resource Planning (ERP) functionality with the extended process capabilities. In this paper we propose a unified configurable architecture (UCA) to simplify and quicken the implementation of a BPM solution...
Mashup tools are becoming increasingly important enabling users to compose services and processes on the Web. Most existing tools focus on Web-based interfaces, usability, and visual languages for creating mashups. A major challenge that has received limited attention is context-awareness and adaptivity of service mashups. In this paper we focus on two main aspects: First, a service capability model...
Evidence suggests that metacognition - the ability to monitor the cognitive processes and regulate them - exists not only in humans but also in some animals. In nature, humans and animals use metacognition to self-regulate their learning process. This paper gathers evidence of metacognition in nature from research in various disciplines. It also shows how metacognition can be modeled in artificial...
Recent advances in ultra lightweight communications and sensor devices have ushered in a new range of applications to incorporate location awareness into mission critical situations such as remote health monitoring of chronically ill patients or emergency response personnel. However, in an open environment where these devices could potentially operate in the future, reliable and accurate positioning...
The diagnosis, treatment and management of hydrocephalus remain a challenging issue, particularly for diagnosis and prognosis of hydrocephalus, improving current shunt treatment, predicting its success and evaluating its functionality. Nowadays, diagnosis procedure depends mainly on the surgeons observation of the clinical symptoms, neuroimages and instantaneous of intracranial pressure recording...
Wireless sensor networks (WSNs) have become a very active and important area of research due to their potential in civil and military applications. A lot of research works focus on energy efficient routing protocols due to the limited energy of battery-powered nodes. Resource constraints on nodes in the network coupled with considerable redundancy in the data generated mean that applications have...
In a number of scenarios, services generated using a model-driven development (MDD) approach could benefit from ??reflective?? access to the information in the models from which they have been generated. Examples are monitoring, auditing, reporting, and business intelligence scenarios. Some of the information contained in the models of a service can statically be generated into its source code. In...
We present a distributed on-line algorithm for detecting conjunctive stable predicates in dynamic systems. The algorithm consists of a virtual network topology to maintain the causality relationships between distributed events and protocols to check the verification of the predicates over consistent global states. A lazy detection protocol has been developed to minimize the number of messages for...
Today man-made disasters caused by terrorism is the most serious problem in the Chhattisgarh region of India. Activities include landmine blasts, railway track damage, and the destruction of power supply units. Effective response to natural and human-induced disasters requires rapid analysis of imagery and other sensor data acquired both before and after the event. Such information will enable emergency...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.