The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The problem of animal social behavior estimation has two components: automatically tracking a number of identical objects with a large number of collisions and calculating indexes for behavior description. In this paper a tracking algorithm has been proposed for a sequence of depth images. This algorithm combines detection and tracking methods. The proposed algorithm is highly reliable: in the worst...
This paper presents a framework and empirical analyses for the survey data from 1,678 managers and professionals working in a collaborative environment for Japanese software houses to understand relationships among factors of factor groups; the project manager, project team members, and the organization, which may lead to project success/failures. The results of the research model using SEM show that...
This paper gives an assessment of the applicability of the discretionary, mandatory and role-based access control models for designing the information security subsystem of an electronic master plan (EMP) web-based geographic information system. The use of role-based access control model allowed authors to develop and build original information security subsystem of EMP Web-GIS.
This paper describes the development of information system software for educational institutions ranking. Analysis of the existing mathematical models of educational institutions ranking was conducted; the mathematical apparatus and ranking algorithm of educational institutions on the basis of an integral indicator of quality was proposed; an experimental study of the software was conducted; the architecture...
This research describes the stress annotation process for the two hours of Urdu speech corpus containing 18,640 words and 28,866 syllables to build a natural voice for Text-to-speech (TTS) system. For the stress annotation of speech corpus, two algorithms i.e. phonological and acoustic stress marking algorithms have been tested in comparison to perceptual stress marking. Urdu phonological stress markings...
This research has for goal to propose a model for developing viable electrical generation projects with use of Non-Conventional Renewable Energy, focused on people living in poverty in rural areas to enable and enhance sustainable development. The methodology is based on technique for cross-impact scenarios, applying strategic prospective, as well as non-experimental design without manipulation of...
The objective of this paper is to analyze the technical and economical viability of the insertion of two renewable energy sources in a timber industry. It proposes a hybrid system PV/Wind/Grid, following the concepts of Distributed Generation (DG). It is presented the local energy profile, and the response of the equipment selected for these features. It also presents two case studies that would facilitate...
Reducing the power supply-demand gap and increasing reliability of power supply are the challenges of current energy management. Implementation of smart grid, smart meters and smart metering can be a possible solution for power demand reduction, efficient power supply management, and optimization of management resource usages. Smart meters include sophisticated measurement and calculation hardware,...
Industrie 4.0 requires intelligent self-aware adaptive machines and plants that know their abilities. In this paper, we propose different qualitative and quantitative measures to evaluate reconfiguration abilities of automated production systems in the context of Industrie 4.0. This paper presents first measures to quantify different reconfiguration abilities of automated production systems, using...
Software misconfigurations are responsible for a substantial part of today's system failures, causing about one-quarter of all customer-reported issues. Identifying their root causes can be costly in terms of time and human resources. We present an approach to automatically pinpoint such defects without error reproduction. It uses static analysis to infer the correlation degree between each configuration...
Refactoring is a key activity for any software system, as it ensures that the system is easily maintainable and extensible. However, complex refactorings (restructurings) are largely performed by hand, as there are no automated means of chaining existent basic refactorings. In addition, developers cannot quickly and safely evaluate the effects of a restructuring solution over another. In this context,...
Feature location is a program comprehension activity in which a developer inspects source code to locate the classes or methods that implement a feature of interest. Many feature location techniques (FLTs) are based on text retrieval models, and in such FLTs it is typical for the models to be trained on source code snapshots. However, source code evolution leads to model obsolescence and thus to the...
We compare five slope correction methods developed by Walter et al., Montes et al., Schleppi et al., España et al., and Gonsamo et al. (referred to as WAL, MON, SCH, ESP, and GON, respectively) using artificial fisheye pictures simulated by graphics software and a lookup table (LUT) retrieval method. The LUT is built by simulating the directional gap fraction as a function of leaf area index (LAI)...
Earned Value Management (EVM) is the most recognized tool for monitoring and controlling project performance. Its ultimate goal is to provide reliable early warning signals about the cost and schedule performance of a project. However, EVM has its limitations in monitoring and controlling software project activities. The lack of quality performance indicator and the inadequacy in incorporating the...
Clustering is an important phase in data mining. A number of different clustering methods are used to perform cluster analysis: Partitioning Clustering, hierarchical clustering, grid-based clustering, model-based, graph based clustering and density based clustering and so on. Hierarchical method helps us to cluster the data objects in the form of a tree known as hierarchy. And each node in hierarchy...
Dynamic graph software watermarking has become the focus of attention both in the academia and industries. In this paper we improve the IPPCT structure (Improved Planted Plane Cubic Trees) which is based on the Radix-k circular linked list structure and PPCT structure. This further improvement takes advantage of all nodes in PPCT tree to encode so as to enhance the data rate at the same time. In order...
In this paper, an adaptive weighted prediction is proposed to improve the coding efficiency. Conventional weighted prediction methods are optimized for specific sequences with global brightness variations (GBVs) such as fade-in and fade-out. However, if there is uncovered background by motion between current picture and reference picture, weighted prediction parameter (WPP) could not be derived accurately...
In recent years, the inductive, incremental verification algorithm IC3 had a major impact on hardware model checking. Also with respect to software model checking, a number of adaptations of Boolean IC3 and combinations with CEGAR and ART-based techniques have been developed. However, most of them exploit the peculiarities of software programs, such as the explicit representation of control flow,...
We present a compositional SMT-based algorithm for safety of procedural C programs that takes the heap into consideration as well. Existing SMT-based approaches are either largely restricted to handling linear arithmetic operations and properties, or are non-compositional. We use Constrained Horn Clauses (CHCs) to represent the verification conditions where the memory operations are modeled using...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.