The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper proposes a methodology for evaluating the robustness of handwritten signature biometrics against forgeries. A particular emphasis has been applied in consider the viability of the attacks under operational environments. In order to carry out this work, not only a methodology but a toolbox has been developed. Such toolbox stores data, not only from a signing pad connected to a computer,...
For systems needed short diagnosis delay, dynamic multiple faults diagnosis (DMFD) is put forward for the systems of demanding diagnosis quickly. In this paper, a method of DMFD based Hidden Markov Mode (HMM) is established for the system's inner states transform and the corresponding external observing sequence, thus the inner states transform could be recovered from the external observing sequence...
In the process of Multi-UAV (Unmanned Aerial Vehicles) perform the task, with the increasing of detection range, how to decrease the communication range of the UAVs group to prevent the eavesdropping of information, which is an urgent need to solve the problem of Multi-UAV secure communications. In this paper, a distributed cooperative control algorithm improved by UAVs-transmission-power-setting-based...
Traffic lights are designed to ensure smooth traffic in the cities. The current traffic system is running same over the past few years. As number of vehicles on the roads is increasing constantly, this system is failing to serve traffic congestion problems especially on the intersections. Due to traffic congestion High Priority Vehicles (HPV) also get stuck in traffic which results delay in their...
Cloud computing has become a choice over traditional computing environments in terms of virtualization. As cloud services continue to grow rapidly, the need for more efficient utilization of resources and better optimized distribution of work-load emerges. In this paper an adaptive algorithm based on Map reduce technique is proposed which produces optimal solution from three perspectives i.e. Infrastructure...
In many radio frequency identification (RFID) applications, a RFID reader repeatedly identifies the tags in its scope. An anti-collision algorithm with blocking mechanism lets the staying tags and arriving tags reply in different time periods and the collisions between the staying and arriving tags are prevented. However, in the existing blocking algorithms, the reader can only identify two staying...
Cloud computing is developing rapidly and the open environment in cloud computing is much more complex and unpredictable than other applications, so just providing the identity certification cannot ensure the security of cloud user and cloud service provider, in order to find a effective way to ensure cloud security, we have to solve the problem of trustiness of cloud user's behavior first, in this...
With the rapid development of Internet, online survey becomes an emerging industry. It is a very challenging task to get interesting knowledge from the large-scale behavioral data of respondents. This paper firstly makes reduction of user properties and behavior data from an online survey company, and based on which we construct an online survey user model, then, an improved generalized sequential...
Due to the characteristics of fast read/write operation and small size, Solid State Drive (SSD) is now adopted as secondary storage device in place of Hard Disk Drive (HDD) for mobile devices. However, the shortcomings of SSD such as limited number of write operations and asymmetric read/write operation need to be solved. In this paper we propose a novel SSD block replacement scheme which considers...
This paper is concerned with congestion control for dynamic TCP/AQM networks with random delays. A robust congestion control algorithm is presented based on the H∞ approach, and the system performance is analyzed via linear matrix inequalities (LMIs). Simulation results illustrate the effectiveness of the proposed algorithm.
Limited by the MEMS sensor's sampling rate, the non-commutable error that derived from finite rotation of rigid body should not be neglected. Aimed at high dynamic motion and high-speed rotation, this paper presents an optimized algorithm based on expert control system (ECS) which combined rotation vector algorithm and quaternion to solve attitude estimation. Compared with the traditional quaternion...
According to the characteristics dynamic Bayesian network structure, in which the build process, due to the transfer of network nodes is twice the number of variables to be solved, using the traditional method of Bayesian network construction slow efficiency, this article will apply PSO dynamic Bayesian network structure learning, and According to the characteristics Transferred network node in the...
A new decentralized approach for solving the economic dispatch problem is presented in this paper. The proposed approach consists of either two or three stages. In the first stage, a flooding-based consensus algorithm is proposed in order to achieve consensus among the agents with respect to the units and system data. In the second stage, a suitable algorithm is used for solving the economic dispatch...
The main purpose of biological memory is to robustly recognize objects and concepts, not to reconstruct their copies. For this the memory should mostly record the relations among the constituents of the incoming signals, rather than the constituents themselves. Relational memories can be stored in the form of network connectivity between neurons. However, similarity testing for such spatial representations...
Detection and isolation of link failures in directed networks of LTI systems have been the focus of our previous study. Our results relate the failure of links in the network to jump discontinuities in the derivatives of the output responses of the nodes and exploit this relation to propose failure detection and isolation (FDI) techniques, accordingly. In this work, we consider these results in the...
Program slicing has numerous applications in software engineering activities like debugging, testing, maintenance, model checking etc. The main objective of this paper is to automate the generation of System Dependency Graphs (SDG) for aspect-oriented programs to efficiently compute accurate slices. The construction of SDG is automated by analysing the byte code of aspect-oriented programs that incorporates...
In this paper, we introduce a pack-centric approach to data center resource management by abstracting a system as a pack of resources and considering the mapping of these packs onto physical data center resource groups, called swads. The assignment of packs/VMs to swads/PMs is formulated as an integer optimization problem that can capture constraints related to the available resources, data center...
The main objective of this study is to maximize expected revenues of a convention hall through dynamic booking management. By dynamically accepting booking requests, the proposed method can improve facility utilization and expected revenue. This research assumes random arrival of booking requests, and each booking request requires a different time span. Since event setup costs are high, any booking...
For many Internet applications, the contents are built based on multiple data sources that change continually, and yet the presentation formats have to be tailored according to various user profiles. This paper investigates the dynamic content applications that are modeled as workflows of XML objects. Each content object can be constructed from its predecessors by executing the transformation scripts...
This paper presents a novel approach to enable frequent computational cycles in online dynamic security assessment by using the terms of the transient energy function (TEF) as input features to a machine learning algorithm. The aim is to train a single classifier that is capable of classifying stable and unstable operating points independent of the contingency. The network is trained based on the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.