The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the enhancement of informatization and automation, the capacity and efficiency of CBTC systems are increasing. However, the wide application of information technologies brings serious security threats on CBTC systems. Due to inherent characteristics of railway services, obtaining the security situation of CBTC systems is necessary. The methodlogy in this paper to evaluate the vulnerability of...
High precision results in structural with the shortest time consumption are expected when methods are introduced to solve FEM(Finite element method). Solving of stiffness matrix assembled by isoparametric elements and solving the assembled stiffness matrix are the most time-consuming. In the previous serial algorithms, there is always a time limitation for some applications and it is hard to achieve...
In a cyber-physical system (CPS), the events start or finish in a sequence of time. The sequence can be called chronological order. Chronological order relationship is essential in determining system status and providing decision reference in feedback control related to IoT areas. However, the correctness of the order obtained is vulnerable to many factors. This paper delves into typical events in...
Soft ferrite materials are widely used in the construction of high frequency transformer for power electronic applications. Core loss calculation is essential both in the selection of soft ferrites and the design of high frequency transformer. Traditionally, the Steinmetz equation is used to evaluate the core loss of magnetic materials under sinusoidal excitation. Nevertheless, in modern power electronics,...
On behalf of the FGCT 2017 conference, the program committee has the pleasure to welcome the attendees to participate in the Sixth edition of the International Conference on the Future Generation Communication Technologies (FGCT 2017) which is dedicated to addressing the challenges in computing technologies for the new generation.
The linear array 3D imaging sensor uses a common optical path system to acquire image and point cloud data at the same time. The registration of these two types of data is realized by the common optical axis alignment and time synchronous control system. Since the image and point cloud data have different sampling frequencies; the process of generating colored point cloud needs to interpolate the...
Cloud storage is a service provided by cloud service provider (CSP). More and more individuals and organizations accept the scheme and outsource their data to CSP seeking to reduce local storage burden. Since the outsourced files are no longer under the data owners' direct control and CSP is not trustworthy, it is necessary for data owners to check the integrity of their files outsourced to CSP. To...
In this paper, a new global time series averaging method is proposed for improving k-means clustering performance for observed signals or time series data. The proposed method is different from most commonly used time series averaging methods, such as pairwise averaging method (PA), nonlinear alignment and averaging filter (NLAAF), prioritized shape averaging (PSA) and dynamic time warping (DTW) barycentre...
Information retrieval techniques play vital role in the era of information technology. Inverted index is one of the technique to retrieve the information/data related with certain keyword. This technique gives faster results to retrieve relevant document from billions of documents, which contains specified keyword. In order to support wrongly spelled keyword, many techniques have been proposed including...
In this paper, we aim at sustaining the claim that curve-based cryptographic schemes over finite fields of characteristic 2 do not provide enough security. We present algorithms to find all the possible supersingular elliptic curves which can be embedded into a predefined finite field. We also consider the case of hyperelliptic curves with genus 2, including both supersingular and ordinary cases....
This paper investigates the impact of demand response (DR) management on improving the social welfare of remote communities by integrating renewable energy (RE) resources into their diesel generator-based isolated microgrids. A multiple-year planning optimization problem is developed to determine the optimal combination of RE resources and energy storage system (ESS) while considering demand response...
The study of social structure and the effect of it on social members is an attractive area in social networks. Structural balance theory focuses on patterns of signed links and frequency/popularity of them. In recent years several works try to define some approximations to calculate the distance of one unbalanced graph from nearest balanced one. But these works don't have any idea about the links...
Efficient execution of applications on heterogeneous many-core platforms requires mapping solutions that address different aspects of run-time dynamism like resource availability, energy budgets, and timing requirements. Hybrid mapping methodologies employ a static design space exploration (DSE) to obtain a set of mapping alternatives termed operating points that trade off quality properties (compute...
The literature review shows a trend to arbitrary number of multi-field packet classification is evolved from standard 5-tuple matching to support new applications like OpenFlow switch which processes upto 15 fields [1]. However, arbitrary number of multi-field packet classification becomes a great challenge regarding to performance, memory requirement, and update cost. In this paper, a high performance...
As technology becomes a larger part of everyday life, it becomes increasingly more important for CS and CIT students to learn about cyber security during their education. While many cyber security oriented courses exist, it is also necessary that students must be able to work and learn in an environment that resembles a real world context. To address this problem it has become common to adapt cyber...
The purpose of this study was aimed to fabricate the computer instruction package on the silkscreen print design and to evaluate the efficiency of the package on the silkscreen print design, learning effectiveness, and learners' satisfaction towards the package. The research instrument used includes 1) the Computer Instruction Package on The Silkscreen Print Design, 2) an achievement test, 3) the...
A prime cordial labeling of a graph G with vertex set V is a bijection f from V to {1, 2, …, |V|} such that if each edge uv is assigned the label 1 if gcd(f(u), f(v)) = 1 and 0 if gcd(f(u), f(v))> 1, then the number of edges labeled with 0 and the number of edges labeled with 1 differ by at most 1. A double triangular snake is a graph formed by two triangular snakes having a common path, i.e.,...
We propose a method to estimate the artistic quality of Haiku (Japanese style short poem) texts using a machine learning approach. Based on the assumption that the artistry of a text stems from its sound factors as well as its meanings, we first constructed two types of vector models, a word-based model and a syllable-based model, converted from Haiku texts. Next, we conducted machine learning for...
In this paper we present a sequential sampling strategy for multiresponse radial basis function. Different from traditional methods which construct a single metamodel for each scalar response independently, the proposed approach takes multiple responses simultaneously. The product of minimum distance from other current sampling sites and curvature of the site on the response surface is introduced...
DNA read alignment is a major step in genome analysis. However, as DNA reads continue to become longer, new approaches need to be developed to effectively use these longer reads in the alignment process. Modern aligners commonly use a two-step approach for read alignment: 1. seeding, 2. extension. In this paper, we have investigated various seeding and extension techniques used in modern DNA read...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.