The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Comparing images to recommend items from an image-inventory is a subject of continued interest. Added with the scalability of deep-learning architectures the once 'manual' job of hand-crafting features have been largely alleviated, and images can be compared according to features generated from a deep convolutional neural network. In this paper, we compare distance metrics (and divergences) to rank...
In this study, we apply machine learning algorithms to predict technical failures that can be encountered in Oracle databases and related services. In order to train machine learning algorithms, data from log files are collected hourly from Oracle database systems and labeled with two classes; normal or abnormal. We use several data science approaches to preprocess and transform the input data from...
The use of static analysis is clearly recommended in automotive safety standard ISO26262 to reduce software runtime errors. A comparative study of top performance tools is provided by analyzing production code of AUTOSAR application software components for an Instrument Panel Cluster. A quantitative analysis based on an alert classification model and performance metrics has been carried out. The goal...
Keystroke Dynamics can be used as an unobtrusive method to enhance password authentication, by checking the typing rhythm of the user. Fixed passwords will give an attacker the possibility to try to learn to mimic the typing behaviour of a victim. In this paper we will investigate the performance of a keystroke dynamic (KD) system when the users have to type given (English) words. Under the assumption...
Our research work aims to develop a monitoring and control system in potentially explosive environments using microcontrollers. The paper presents a micro-system designed and achieved within the Metrology Laboratory of S.C. SIP S.A. It describes the user interface software structure built and used with the acquisition and transfer modules as well as managing the signals received in a SQL SERVER 2008...
Contrast is a very important characteristic for visual perception of image quality. Some No-Reference Image Quality Assessment Algorithm NR-IQA metrics for Contrast-Distorted Images (CDI) have been proposed in the literature, e.g. Reduced-reference Image Quality Metric for Contrast-changed images (RIQMC) and NR-IQA for Contrast-Distorted Images (NR-IQACDI). Here, we intend to improve the assessment...
Low-resolution (LR) is a challenging problem in the real world. In order to obtain better performance for low-resolution face recognition (LRFR), this paper employs a novel approach for matching low-resolution images with high resolution (HR) images based on two-dimensional linear discriminant analysis (2D-LDA) and metric learning method. The LR and HR images are transformed into a common space via...
Modelling of a database performance depending on numerous factors is the first step towards its optimization. The linear regression model with optional parameters was created. Regression equation coefficients are optimized with the Flower Pollination metaheuristic algorithm. The algorithm is executed with numerous possible execution parameter combinations and results are discussed. Potential obstacles...
System monitoring is an established tool to measure the utilization and health of HPC systems. Usually system monitoring infrastructures make no connection to job information and do not utilize hardware performance monitoring (HPM) data. To increase the efficient use of HPC systems automatic and continuous performance monitoring of jobs is an essential component. It can help to identify pathological...
Most modern search engines feature keyword based search interfaces. These interfaces are usually found on websites belonging to enterprises or governments or sites related to news articles, blogs and social media that contain a large corpus of documents. These collections of documents are not easily indexed by web search engines, and are considered as hidden web databases. These databases provide...
Developing new ideas and algorithms or comparing new findings in the field of requirements engineering and management implies a dataset to work with. Collecting the required data is time consuming, tedious, and may involve unforeseen difficulties. The need for datasets often forces re-searchers to collect data themselves in order to evaluate their findings. However, comparing results with other publications...
This paper discusses the motivation and implementation for Cray's Project Caribou. Project Caribou enables users to correlate HPC job performance with Lustre file systems through collected metrics and events. We will discuss use cases, the sources of metrics that are collected, correlation, and how the data is visualized. Additional topics to include events and alerts that are available, as well as...
Software vulnerabilities pose significant security risks to the host computing system. Faced with continuous disclosure of software vulnerabilities, system administrators must prioritize their efforts, triaging the most critical vulnerabilities to address first. Many vulnerability scoring systems have been proposed, but they all require expert knowledge to determine intricate vulnerability metrics...
Early design-space evaluation of computer-systems is usually performed using performance models such as detailed simulators, RTL-based models etc. Unfortunately, it is very challenging (often impossible) to run many emerging applications on detailed performance models owing to their complex application software-stacks, significantly long run times, system dependencies and the limited speed/potential...
The human brain consists of two hemispheres, right and left. These two hemispheres are almost symmetrical, not perfectly. However, in neurological diseases, the volumetric losses in the brain begin to deteriorate asymmetrically between the two hemispheres. This deterioration can be local or global in the brain. Symmetry deterioration can be a biomarker in the early stage diagnosis and the following...
Visualization of the micro video big data refers to the intuitive display of the obtained data on micro videos across the Internet for the purpose of helping users to understand the message in the data. This paper describes the implementation of a micro video big data visualization system in detail, which has four steps: determine the visualization objective, choose data based on the objective, display...
This paper proposes a methodology for finding typical load profiles for residential customers by using clustering techniques. Such task is particularly challenging due to the great diversity of electricity use by residential customers. Specific characteristics of this kind of customers, as number of inhabitants or house surface, may help the clustering, but such features are often, maybe always, unknowable...
Technical debt monitoring is one of the activities that have to be performed in technical debt management. To do that, there are different techniques that can be used to estimate technical debt and different tools that implement those different techniques. This paper presents TEDMA Tool, a tool for monitoring technical debt over the software evolution and that it is open to integrate third party tools...
Recent developments in the storage of system data in the Navy's data repository, LEAPS, using the FOCUS product meta-model have opened the doors to graph-theory applications in the design of Navy ship systems in the early stages of design. In this paper, we demonstrate the ability to extract graphs from ship data and present pertinent applications of such graphs including a vulnerability metric for...
It is difficult to assess the security of modern enterprise networks because they are usually dynamic with configuration changes (such as changes in topology, firewall rules, etc). Graphical security models (e.g., Attack Graphs and Attack Trees) and security metrics (e.g., attack cost, shortest attack path) are widely used to systematically analyse the security posture of network systems. However,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.