The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Traditional methods of system verification call for the repeated exercise of that system in its intended environment to give confidence that it will operate as designed. Autonomous systems, however, are systems designed for sophisticated operation in stochastic environments that specifically handle the unexpected; testing all possible operational scenarios for such systems is intractably complex....
The RPL routing protocol has gained prominence as the standard IoT routing protocol. However, it faces like many other routing protocols diverse attacks. Many studies have been proposed to secure the RPL protocol, and simulation studies have been put forward as the main research method while testbed experiments though an authentic research and testing method has been ignored. Although Testbed experiments...
The methodology of community detection can be divided into two principles: imposing a network model on a given graph, or optimizing a designed objective function. The former provides guarantees on theoretical detectability but falls short when the graph is inconsistent with the underlying model. The latter is model-free but fails to provide quality assurance for the detected communities. In this paper,...
Following the trend of privacy preserving online social network publishing, various anonymization mechanisms have been designed and employed. Many differential privacybased mechanisms claim that they can preserve the utility as well as guarantee the privacy. Their utility analysis are always based on some specifically chosen metrics.This paper aims to find a novel angle that describing the network...
Clustering is a classic topic in optimization with k-means being one of the most fundamental such problems. In the absence of any restrictions on the input, the best known algorithm for k-means with a provable guarantee is a simple local search heuristic yielding an approximation guarantee of 9+≥ilon, a ratio that is known to be tight with respect to such methods.We overcome this barrier...
This paper gives an overview of the calorimetric systems used to determine the losses of converters and motors, introduces the standards in the scope of the topic briefly, and highlights the problems associated with the loss determination of high efficiency devices. The calorimeters are classified in four categories based on chamber configuration. Information about previously published calorimeters...
IT system risk assessments are indispensable due to increasing cyber threats within our ever-growing IT systems. Moreover, laws and regulations urge organizations to conduct risk assessments regularly. Even though there exist several risk management frameworks and methodologies, they are in general high level, not defining the risk metrics, risk metrics values and the detailed risk assessment formulas...
The accuracy and productivity of measurement performed with the help of coordinate measuring machines depend not only on their technical characteristics but also on the strategy used to select the number, location of the points and the sequence of their circumvention on the surface. The article proposes a new strategy for the determination of the number and location of control points on surfaces based...
The regular expression (regex) is a powerful tool employed in a large variety of software engineering tasks. However, prior work has shown that regexes can be very complex and that it could be difficult for developers to compose and understand them. This work seeks to identify code smells that impact comprehension. We conduct an empirical study on 42 pairs of behaviorally equivalent but syntactically...
Registration of 3D point set is a very important problem in computer vision. As a widely used algorithm in 3D point set registration, the ICP algorithm has got much attention of researchers. This paper presents a comprehensive survey of the modified ICP algorithms in recent decade by five stages: selection of registration elements, feature metrics, search strategy, Weight of the Point Pair and the...
Impressive image captioning results are achieved in domains with plenty of training image and sentence pairs (e.g., MSCOCO). However, transferring to a target domain with significant domain shifts but no paired training data (referred to as cross-domain image captioning) remains largely unexplored. We propose a novel adversarial training procedure to leverage unpaired data in the target domain. Two...
Mutation testing of object-oriented programs differs from that of standard (traditional) mutation operators in accordance to the number of generated mutants and ability of tests to kill mutants. Therefore, outcomes of cost reduction analysis cannot be directly transferred from a standard mutation to an object-oriented one. Mutant sampling is one of reduction methods of the number of generated and...
This paper describes the design and setup of different measuring systems for the calibration of commercial voltage and current transformer test sets for non-conventional instrument transformers. The calibration systems are recently developed at the national metrology institutes VSL, PTB, METAS and TUBITAK within the frame of the European project “FUTURE GRID — Non-conventional voltage and current...
The architecture of a software-driven testbed is discussed. The test setup has been developed as measurement and instrumentation system to functionally verify and thermally validate the communication subsystems designed and manufactured for the nanosatellite applications. The system is applied for qualification of a communications subsystem currently under consideration for ZA-CUBE-2 mission.
Paraphrase Detection is the task of examining if two sentences convey the same meaning or not. Here, in this paper, we have chosen a sentence embedding by unsupervised RAE vectors for capturing syntactic as well as semantic information. The RAEs learn features from the nodes of the parse tree and chunk information along with unsupervised word embedding. These learnt features are used for measuring...
In recent times, major cybersecurity breaches and cyber fraud had huge negative impact on victim organisations. The biggest impact made on major areas of business activities. Majority of organisations facing cybersecurity adversity and advanced threats suffers from huge financial and reputation loss. The current security technologies, policies and processes are providing necessary capabilities and...
The number of extracted features for fault diagnosis in rotating machinery can grow considerably due to the large amount of available data collected from different monitored signals. Usually, feature selection or reduction are conducted through several techniques proposing a unique set of representative features for all available classes; nevertheless, in feature selection, it has been recognized...
Multiple indices are available for measuring the performance of closed-loop systems, some of which are explored in the seminal work of Graham & Lathrop in 1953. In their paper, a determination is made of closed-loop transfer functions for optimal performance relative to the non-standard performance indices ITSE and ISTSE. A new approach is presented to calculate such metrics using Lyapunov matrix...
Image quality assessment (IQA) plays a crucial role in monitoring quality control in image communication systems, and in benchmarking and optimizing parameters in enhancement algorithms. The full-reference IQA metrics require a good-quality reference image, obtaining which may not be practical in real-life applications. This paper, therefore, proposes a no-reference IQA metric based on the hypothesis...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.