The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Software projects are getting more complex and thus it is very difficult for the companies to develop their projects alone. There are multiple heterogeneous systems which are different by multiple perspectives such as different users functionalities delivered different CASE tools, technology adopted for software development, and different platform used for deployment. Thus heterogeneous systems are...
Combining with software-defined networking and virtualization technology, Network Function virtualization (NFV) has been proposed as an important technology for constructing scalable network. VNF (Virtual Network Function) redeployment is a critical step for dealing with network evolve. Due to the inner state consistency constraints, VNF migration to a new location is major challenge for redeployment...
With the rapid development of e-commerce, online services have become a usual part of our lives, such as online gaming, music or software downloads, pay-per-view content, and membership fees. But the amount of money spent for these services often is only a few multiple of the smallest currency unit. These kinds of payments are called micropayment. Therefore, in the field of electronic payment, micropayment...
Event segmentation is an important step in monitoring and management applications that categorizes different events into different segments. This is important especially when applications, to be monitored and managed, are large-scale, comprehensive and data-intensive in nature. The process of segmentation is based on data clustering which is one of the key data mining methods used these days. There...
In this paper, a new meta-heuristic optimization algorithm called Grey Wolf Optimizer (GWO) is applied to offshore crane design. An offshore crane is a pedestal-mounted elevating and rotating lifting device used to transfer materials or personnel to or from marine vessels, barges and structures whereby the load can be moved horizontally in one or more directions and vertically. Designing and building...
Blocking is a technique of filtering unlikely matched pairs for record matching, which aims to collect all pairs of records that relate to the same entities across different data sources. Blocking has been broadly adopted in data mining and database. However, for big data, there is no fast and effective blocking algorithm yet, because the number of candidate pairs is tremendous between large data...
Computational software programs, such as Maple and Mathematica, heavily rely on superfunctions and meta-algorithms to select the optimal algorithm for a given task. These meta-algorithms may require intensive mathematical proof to formulate, incur large computational overhead, or fail to consistently select the best algorithm. Machine learning demonstrates a promising alternative for automatic algorithm...
With the coming of Big Data era, the focus of software applications is shifting from numerical calculation to business processing continuously, and most of the basic variables in business applications are strings and characters. So, the heavier burden caused by massive character operations cannot be ignored. The string will be split into basic character operations during the processing and the multiple...
A transfer learning environment is characterized by a machine learning algorithm being trained with data from one domain (the source domain) and being tested on data from a different domain (the target domain). In a transfer learning scenario, the class probability of the source domain may be different from the class probability of the target domain, which is referred to as "domain class imbalance"...
In order to enable people to avoid too many cumbersome and complex operations of the command line and repeated parameter adjustments, automates pair-end whole genome re-sequence (aWGRS) data processing whereby pre-installed dependencies are presented in this paper, which are used to map reads to a reference and realign variations. This method presents aWGRS which is a method that takes as input paired-end...
In this article we introduce QtBiVis - a novel software intended for the comparative analysis of biclustering results. This modular tool has been efficiently implemented in C++ with Qt framework GUI. It may be successfully used for coverage analysis of the results of biclustering as well filtering or sorting biclusters by Gene Ontology (GO) identifiers or bicluster enrichment values. It may also be...
We consider the problem of scheduling multi-task jobs on identical machines in parallel. Each multi-task job consists of one or more tasks. Each job has a release date and a due date. A task of a job can be processed by any one of the machines. Multiple machines can process the tasks of a job concurrently. The completion time of a job is the time at which all its individual tasks have been completed...
Cryptographic software is increasingly important but notoriously difficult to implement correctly. Emerging specification approaches and tools make it possible to automatically and rigorously prove equivalence between machine-readable cryptographic specifications and real-world implementations. The Cryptol and the Software Analysis Workbench tools have successfully proven the correctness of routines...
In this paper we present the design considerations of lightweight encryption algorithm. Our aim is to demonstrate how to achieve lightweight block ciphers efficient software performance for low-resource embedded devices. Several lightweight block ciphers are proposed; we selected the most recent and suitable for low-resource embedded systems such as RFID tags. In this work, we analyzed the software...
Recently, a lot of progress has been made in the implementation of asymmetric cryptography such that RSA or ECC (Elliptic Curve Cryptography) in both hardware and software. The Residue Number Systems (RNS) offer, many features make it very useful in cryptographic applications. Since the modular multiplication is the main operation, in this paper, we describe a Montgomery modular multiplication algorithm...
TreeBank is a crucial resource for syntactic parsing. But syntactic labeling and error checking for treebank is time and energy consuming. To improve the efficiency in constructing treebanks, we have designed and realized a treebank editing system based on a graphical interface. And this graphical treebank editing system is proved to be 5 times faster than error checking on bracket marked syntactic...
In this paper, image processing algorithms designed in Zynq SoC using the Vivado HLS tool are presented and compared with hand-coded designs. In Vivado HLS, the designer has the opportunity to employ libraries similar to OpenCV, a library that is well-known and wide used by software designers. The algorithms are compared in terms of area resources in two conditions: using the libraries and not using...
Enterprises today are facing an increasing number of criminal threats ranging from financially motivated and opportunistic malware to more advanced targeted attacks organized by nation-state actors. To protect against these threats, enterprises deploy a number of perimeter defenses, including traditional controls (antivirus software, intrusion detection systems, firewalls) and more advanced techniques...
In this paper, we propose a policy-based model to achieve end-to-end (E2E) service negotiation among multiple domains that constitute E2E path. The model relies on a centralized approach, realized via the third party (3P) agent, which acts as a proxy server for local (per-domain) management entities. We demonstrate the proposed model on the implementation of policies for allocation of performance...
Localization and mapping algorithms can allow a robot to navigate well in an unknown environment. However, whether such algorithms enhance any specific robot mission is currently a matter for empirical validation. In this paper we apply our MissionLab/VIPARS mission design and verification approach to an autonomous robot mission that uses probabilistic localization software. Two approaches to modeling...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.