The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Jeppesen GmbH is researching new communication and interaction systems for the next generation flight deck. One such opportunity is the determination of use cases for wearable technology in support of airline personnel. Key attributes of wearables, pertinent to the ongoing research efforts, include mobility, persistence, ability to be proactive, and context awareness. Wearables also enable hands-free...
The abundant aspects of big data and it's technology are increasing due to new methods of fetching data and diverse needs. Meteorological data is also the source of big data in terms of volume, variety, veracity and velocity, and it includes structured, unstructured and hybrid forms. This paper aims to apply Hadoop architecture and MapReduce algorithm into meteorological big data. It also describes...
Shortage of qualified cybersecurity workforce is a national problem. Without an effective solution, people's daily lives, business operations, and even national security are in jeopardy. Higher education institutions have invested in various approaches to train college students to acquire cybersecurity related knowledge, skills, and abilities. The existing approaches still need improvement and refinement...
Collaborations and sharing of knowledge has been one of the primary activities of academics and researchers. The purpose of any research and development activity is to transfer ideas into products. Any such activity is useless if its benefits do not percolate down to the society. IITs have been established in India on the model of MIT, USA and are supposed to produce high quality technocrats, produce...
This paper proposes an online cake-cutting protocol without a long wait. Cake-cutting protocols are used to fairly divide a heterogeneous divisible good among some number of people. Though many protocols have been proposed, most of them assume that all people must simultaneously execute one protocol. Walsh proposed an online cake-cutting protocol, in which each player can join to the protocol at any...
This paper discusses the development of a neural network array model for predicting the radiation performance characteristics of the horn fed parabolic reflector and the dipole fed corner satellite antennas. A number of neural networks were developed in order to predict the radiation characteristics for various combinations of the design parameters. The results obtained from the neural network array...
In this paper, two transit problems which pass through the ε-neighborhood of some given objective states in turn from an arbitrary initial state will be studied for both continuous-time and discrete-time switched linear systems with constant input. At first the quadratic stabilization problem for continuous-time switched linear systems with constant input will be investigated. Next, the same problem...
We investigate the linear complexity and the minimal polynomial over the finite fields of sequences constructed on the basis of cubic residue classes. In particular, we find the linear complexity and the minimal polynomial of the characteristic sequence of cubic residue class and balanced cyclotomic sequences of order three.
Mode-mixing, boundary effects and necessary extrema lacking and etc. are the main problems involved in empirical mode decomposition (EMD). The paper presents an improved empirical mode decomposition based on assisted signals: Gaussian noises. Firstly, the given 1D Gaussian noise and its negative counterpart are added to the original respectively to construct the two s to be decomposed. Secondly, the...
Many works have been done for secure computation of functions. Most of them assume computation on computers. The protocols are difficult for the people who has no knowledge on cryptography. Therefore, secure computation using cards was considered. Since nothing other than the cards are used, the protocols are easy to understand for the people who has no knowledge on cryptography. This paper presents...
Because the phenomenon about unreasonable arrangement of college students' class hour is relatively common, the system designed a public colleges and universities ordering system based on WeChat. This system took use of convenience and openness of WeChat, which can tremendously simplify the development and promotion. At the same time, online ordering for the students provided a convenient way of eating,...
The concept of the cloud is no longer limited to providing remote hardware or platform support with the development of cloud computing technology. Instead, it encapsulates all aspects of the content in computer field into service invoked by others. As an important part of software, data resource has become core services to the cloud platform in areas such as collaborative manufacturing and collaborative...
The era of Heterogeneous systems and Big Data computing is already here. Handling huge amount of data poses new challenges in data management and in the effective usage of memory, caches, heterogeneous structures and available bandwidth. In addition, computing requirements of Big Data is unique; in many occasions the processing required per storage access is limited (i.e. low Instructions/Byte) which...
Over the last decade, due to the need of analyzing and studying the logical order that data exhibit in various industries, sequential data storage and processing field has attracted a significant number of researchers. Recently, sequential OLAP has emerged as one of sequential data subfields whereby traditional OLAP - which mainly utilizes a set data-based analysis, do not satisfy the hunger of performing...
Thanks to the hard work and outstanding efforts of the Associate Editors, reviewers, authors, and support staff, IEEE Network is now commonly recognized as a leading magazine in the field of computer and communication networks. In this editorial, I would like to take a look back at the state of our magazine during the past six months. We have continued to revise the topic areas to cover new emerging...
Modern healthcare systems are still struggling to provide patient-centered healthcare instead of clinician-centered, as it is essential to implement major aspects of modern healthcare such as continuity of care, evidence-based treatment and more importantly preventing medical mistakes. In order to implement patient-centered, it is necessary to collect all the relevant clinical /non-clinical data for...
Tremendous progress in semiconductor technology enabled broad proliferation of computer-based solutions in almost all fields, from medical instrumentation up to spacecraft technology. This development opened the question about a new engineering profile being able to act in research and development of embedded systems. In this paper a contribution to the structuring of undergraduate embedded engineering...
The evolution of software to maintain its performance and usefulness over time occurs in successful software development processes. To address this, Meir Lehman formulated his well-known software-evolution laws. This article evaluates Lehman's laws in the context of two companies' real-world software-product-line projects to gain useful insights about the evolution process.
The rapid growth of computer technologies has resulted in a corresponding increase in the creation of new loopholes in systems which eventually might result in data leak. Data leakage is an incident in which sensitive information is released to any unauthorized party intentionally or unintentionally. There is a large set of software available which can be used to prevent data leak, however they fail...
Playing computer games for many years has led to a large volume of gaming data that consist of gamers' likings and their playing behavior. Such data can be used by game creators to extract knowledge for enhancing games. Mining computer game data is a new data mining approach that can help in developing games as per a gamer's requirements and his/her area of interest. Since the gaming industry has...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.