Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
In order to balance the number of outbound and inbound tasks of each aisle and improve the working efficiency of the multi-tier shuttle system, three principles of storage location assignment were put forward: the principle of minimum correlation degree, the principle of equalization of product items and the principle of equalization of tasks, which were expected to be followed when storing products...
Cryptocurrency mining can be said to be the modern alchemy, involving as it does the transmutation of electricity into digital gold. The goal of mining is to guess the solution to a cryptographic puzzle, the difficulty of which is determined by the network, and thence to win the block reward and transaction fees. Because the return on solo mining has a very high variance, miners band together to create...
Blind signal extraction is particularly attractive to solve signal mixture problems while only one or a few source signals are desired. Many desired biomedical signals exhibit distinct periods. A sequential method based on second order statistics is introduced in this paper. One can choose to recover one source signal or all signals in a specific order. The validity and performance of the proposed...
Discriminating Distributed Denial of Service (DDoS) from Flash Crowds (FC) is a tough and challenging problem, because there are many similarities between each other existed in network layer. In this paper, according to an extensive analysis of user traffic behavior of DDoS and FC, it can be found that some traffic abnormalities are existed between Bots and legitimate users. So a behavior-based method...
To solve the problem of high-energy-consumption of Wireless Sensor Network (WSN) nodes and short WSN lifetime, considering the practical underground environment of coal mine, this paper proposes a novel event-driven WSN in the coal mine system. The paper also discusses different working patterns of the proposed event-driven WSN, and switching methods between them. According to the safety regulation...
This paper focuses on analysis of machine performance in a manufacturing company. Machine behavior can be complex, because it usually consists of many tasks. Performance of these tasks depends on product attributes, worker's speed, and therefore, analysis is not simple. Performance analysis results can be used for different purposes. Prediction and description are typical products of data mining....
The fault mechanism of small current grounding system for single-line-to-ground (SLG) faults and the functions of big data techniques are discussed. A new fault line selecting method for SLG faults based on big data theory is proposed. The method resolves the problem of detecting fault lines by making use of a mass of data from the grid which consists of both electrical and non-electrical quantities...
To utilize data from hospital systems, big data analytics (BDA) has become increasingly important. BDA enable queries of large highly diverse and real volumes of patient data in an interactively dynamic way that enriches the use of the platform with data visualization for healthcare. We established a Healthcare BDA (HBDA) platform at the University of Victoria (UVic) with Compute Canada/Westgrid,...
A fault diagnosis method is proposed for the mine hoist machine fault diversity and redundancy of fault data based on Rough Sets (RS) and Support Vector Machine (SVM). RS theory is used to analyze the stator current fault data of mine hoist machine in order to exclude uncertain, duplicate information. For getting the optimal decision table, the equivalence relationship of positive domains of between...
There are many security vulnerabilities in computer systems. They can be easily attacked by outsiders or abused by insiders who misuse their rights or who attack the security mechanisms in order to disguise as other users or to detour the security controls. Today’s network consists of a large number of routers and servers running a variety of applications. Policy-based network provides a means by...
A general approach or framework is proposed for multi-sensor data fusion using template based matching (TBM). The main advantage of TBM is that it allows defining features/templates using a priori information from the scene/image. The approach works as follows: first quite complex features e.g. roundabouts/junctions are extracted in the optical image, then these features are simulated in SAR and finally...
Data mining allows research to reach patterns, often not visible by the simple observation of data. It is an exploration process in order to detect relations between the variables, seeking infer or create forecasts for future data. In public safety area data mining or MD, can be used in several ways: to identify the relation of a crime type with some neighborhood, determine the existence of a pattern...
The field of Network Centric Warfare seeks to use information technology in order to gain competitive advantage over the enemies during war. An essential part of network centric warfare deals with the firing of highly destructive weapons. It includes the determination of exact direction of firing the weapon so as to successfully destroy the target for a given unguided shell. This can be done using...
Short-term traffic prediction provides tools for improved road management by allowing the reduction of delays, incidents and other unexpected events. Different real-time approaches provide traffic managers with varying but valuable information. This paper reviews the literature regarding model-driven and data-driven approaches focusing on short-term realtime traffic prediction. We start by analyzing...
In this paper we focus on the Job Shop Scheduling Problem (JSSP) using Priority Dispatching Rules. Simulation model for makespan optimization is proposed using different Dispatching Rules (DR) for each machine in the shop floor. Collected results are used for learning base construction. This database will be used to develop an inference model able to select the best DR for every new scheduling problem...
This paper investigates how data mining can be applied in functional debug, which is formulated as the problem of explaining a functional simulation error based on human-understandable machine states. We present a rule discovery methodology comprising two steps. The first step selects relevant state variables for constructing the mining dataset. The second step applies rule learning to extract rules...
This paper considers software tools and linguistic constructions of the network simulator TRIADNS. Nowadays network applications - especially in the area of wireless networks - are becoming more and more complex which makes the design and the testing almost impossible without appropriate software. This software available to aid the user in simulating previously designed scenarios, scalable algorithms...
A Method based on a mathematical model has been developed for simulating the basic characteristics of artificial fiber patterns using only a PC. Artificial fiber patterns enable information to be hidden in the background of printed matter with almost no visible noise. Measurement of the intensity ratio for artificial fiber patterns created using the method demonstrated that the properties of the paper...
The reliance on critical infrastructures, which are heavily interconnected, is one of society's greatest weaknesses. An individual failure has the potential to have a huge impact on society and affect other infrastructures. Predicting the effects of a cascading failure is a challenge. In this paper, a simulation of a virtual city is presented in order to visualise the effects of a cascading failure...
Decision making processes in some contexts, such as construction of infrastructures, require the design of prospective experiments. These experiments are designed to test hypothesis raised in the design phase. Following an adaptive methodology, these experiments will feed new iterations. In many cases, the development of these experiments is so costly that they must be performed using simulators....
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.