The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The human immune system is incredibly efficient at identifying self- and non-self entities in our bodies. A non-self entity (malicious), once identified, is attacked by particular types of cells to remove the intruder before it can cause damage. Our immune system has components that identify not only non-self entities but also recall old entities that may not have been encountered for a very long...
This research focuses on improving business process worked under workflow simulation. In the business process, there are several properties to be considered such as person, cost, time. The current workflow simulation cannot combine these properties to simulate the situation for business decision making. In this paper, the improving business workflow simulation is proposed by adding the business properties...
We present a method for developing executable algorithms for quantitative cyber-risk assessment. Exploiting techniques from security risk modeling and actuarial approaches, the method pragmatically combines use of available empirical data and expert judgments. The input to the algorithms are indicators providing information about the target of analysis, such as suspicious events observed in the network...
During the last decade the integration of smart devices into humans' lives has witnessed an exponential increase. This has led to a new paradigm namely Cyber-Physical-Social Systems (CPSS) which consists of cyber components (computer systems) physical components (controlled objects) and social components (humans and their interactions). Although social components are playing a main role in CPSS their...
Containers are rapidly replacing Virtual Machines (VMs) as the compute instance of choice in cloud-based deployments. The significantly lower overhead of deploying containers (compared to VMs) has often been cited as one reason for this. We analyse performance of the Kubernetes system and develop a Reference net-based model of resource management within this system. Our model is characterised using...
The search of latent dependencies and the analysis of text collections are important tasks in the context of rapid development of information technologies. This article describes the identification of scientific and technological trends in the field of it-technologies using the analysis of thematic publications from web sources with LDA topic models. The proposed solution uses a formal criterion to...
Many researchers have been applying computer technology, finite element analysis combined with Orthopedic manipulation of TCM research Finite element analysis method to study spinal manipulation has some advantages which can not be compared with traditional methods. This paper analyzes the application of finite element in this field from the aspects of mechanics of traction, rationality and safety...
The recent attentions on video analysis have led to the extensive enhancement of computer vision technologies. However, it is still necessary to closely monitor the results of video analysis by human operators. This paper introduces a trajectory-based scene retrieval system that can help human operators look closely at desired scenes based on a trajectory query. The system includes the index and mapper...
The paper is devoted to solving the problem of developing new and improving existing methods of NFV technological solutions analysis on the earlier stages of developing process. A method of analysis functional and non functional requirements of NFV infrastructure realization is proposed. The proposed method bases on mathematical modelling approach. E-network is use as tool for NFV behavioural modelling...
Specific requirements and characteristics of primary storage make designing desirable deduplication schemes a sophisticated task. In this paper, we propose DIODE, a Dynamic Inline-Offline DEduplication scheme that provides salient read/write performance and space-saving simultaneously for primary storage systems. DIODE orchestrates inline and offline processes in a dynamic manner. We propose two innovative...
The paper deals with a methodology of detecting and localizing leakages in water distribution networks. Two approaches are presented: based on a hydraulic model of the network, and based on approximate models and fuzzy classifiers. Moreover, a case study concerning applications of the methodology to a real network in Rybnik, Poland is presented. A pilot version of the system has been running since...
This paper demonstrates the capability of a hybrid simulation tool that can perform islanding detection studies in distribution networks with photovoltaic (PV) generation systems. The hybrid tool is constructed by interfacing an electromagnetic transient (EMT) tool with the Open Distribution System Simulator (OpenDSS) which is a phasor analysis tool developed by the Electric Power Systems Institute...
A contactless monitoring system for daily human activities using a stepped-frequency continuous wave (SFCW) is investigated in this paper. To detect and classify the daily human activities in a fast and accurate fashion, the phase information of the received signals is processed to determine the high-resolution range profile (HRRP), the instantaneous velocity, acceleration, and jerk. Preliminary simulation...
Continuous assessment of the quality of health-related life (HRQoL) of patients is an important aspect of health and gives rise to several readings. On one hand, the enormous amount of information that is generated allows the extraction of knowledge with great accuracy concerning the disease, the treatments and the impact it has on society, on the other hand, this continuous monitoring allows effective...
Modern science is often conducted on large scale, distributed, heterogeneous and high-performance computing infrastructures. Increasingly, the scale and complexity of both the applications and the underlying execution platforms have been growing. Scientific workflows have emerged as a flexible representation to declaratively express complex applications with data andcontrol dependences. However, it...
Models of friend density in social networks, as a function of population density and geographic distance are discussed, with generalizations over the current models. Next, models of information propagation on social networks previously introduced are extended and refined. Currently, there is no model to explain the traffic features produced as a result of dramatic events. This paper fills this gap...
E-learning is a promising research area, as they are expected to increase enrollment and improve the quality of education. Adaptive e-learning systems, traditionally focused on content personalization, are in need to cope with continuous changing requirements and changing environment. Indeed, the specification and the management quality attributes of such systems, supported throughout the whole lifecycle...
Computational tools for modeling multi-agent work, including task work and teamwork, are needed to support the design of complex operational concepts involving human operators and automated systems. This paper presents a human performance model of task sharing with delegation where an agent can execute, delay, or delegate assigned task work according to its multi-tasking capacity and other attributes...
As accidents frequently occurred in aerospace applications, traditional reliability analysis methods are not enough for modern flight control software. To find a comprehensive, effective and intelligent method for software fault diagnosis is urgent for airborne software engineering. Consequently, in this paper, a novel knowledge-based diagnosis system is constructed for flight control software, by...
Forwarding messages in opportunistic networks incurs costs for nodes in terms of storage and energy. Some nodes becomes selfish or even malicious. The selfish and malicious behaviors depress the connectivity of opportunistic networks. To tackle this issue, in this paper, we propose CARISON: a community and reputation based incentive scheme for opportunistic networks. CARISON allows every node belongs...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.