The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
SciDB is a scalable, computational database management system that uses an array model for data storage. The array data model of SciDB makes it ideally suited for storing and managing large amounts of imaging data. SciDB is designed to support advanced analytics in database, thus reducing the need for extracting data for analysis. It is designed to be massively parallel and can run on commodity hardware...
Software-Defined Security (SDS), which provides a flexible and centralized security solution by abstracting the security mechanisms from the hardware layer into a software layer, attracts many researchers to study the detail of this conception. One of the key challenges of SDS is how to schedule and orchestrate security appliances according to huge and heterogeneous threat information, especially...
Vehicles which satisfy ever increasing needs for comfort, safety and environment protection uses electronic engine. Electronic Control Unit (ECU) is the brain of electronic engine. Overall operation of electronic engine is controlled by ECU software. As customer needs are increasing, ECU software is becoming more and more complex. Testing of such complex software manually is difficult as well as time...
This industrial research paper outlines an outcome of a machine leaning approach to dynamically generate context sensitive Application User Interfaces (Adaptive UI) on top of a monolithic enterprise software product.
In this paper a new vulnerability discovery method based on symbolic execution and machine learning is proposed. Given a vulnerable function, similar function set can be located efficiently based on machine learning technique. Function call graphs of each function from the similar function set are obtained by dataflow analysis of the whole program. At last, the symbolic execution engine KLEE is used...
With expanding weight on the need to lessen CO2 emanations and fuel utilization, engine producers and vehicle integrators are searching for more radical approaches to build engine proficiency. One strategy is to draw vitality from various waste warmth sources. A turbocharger is a minimal and effective method for accomplishing this end and Cummins Turbo Technologies is working with various clients...
Warming up is essential for the engine's performance as well as life. Engine warmup basically relates to setting the initial levels of oil and coolant in the engine parts. Many drivers are into the habit of accelerating the vehicle on startup which may lead to damaging of engine parts. To prevent this damage, the software algorithm for engine warm up does not allow the engine to respond to any acceleration...
Emission control and regulations have become very critical part in today's automobiles. With introduction of strict emission norms, the use of electronics in automobiles is increasing extensively. Which in turn is adding complications at manufacturer, OEs (Original Equipment Manufacturers) and at the service front. OBD (On Board Diagnostics) is one of critical tool used for the emission control in...
This paper aims to describe the software architecture used for the development of Cultiventura, tool that provides technology resources to support the formation of cultural identity in the teaching-learning process through technology of videogame and augmented reality for students of fourth, fifth and sixth elementary school. The design method of architecture in the context of an agile software development...
The demands placed on hydrologic analyses have increased considerably in recent years. Hydrologic analyses involve numerous methods and are useful in many fields, such as agriculture, forestry and grassland farming. In order to catch information and knowledge from Digital Elevation Models (DEM), processing data step by step in software is available, which needs many manual workloads and is not convenient...
This article studies the extent and practicality of plagiarism detection systems using multiple classifications of detection engines, further described within the article. An in-depth analysis of 8 individual articles from different fields of work was carried out allowing comparisons both between detection systems and different writing styles/formats. The first analysis used unmodified versions of...
Register Transfer Level (RTL) design validation is a crucial stage in the hardware design process. We present a new approach to enhancing RTL design validation using available software techniques and tools. Our approach converts the source code of a RTL design into a C++ software program. Then a powerful symbolic execution engine is employed to execute the converted C++ program symbolically to generate...
Code identity is a fundamental concept for authenticated operations in Trusted Computing. In today's approach, the overhead of assigning an identity to a protected service increases linearly with the service code size. In addition, service code size continues to grow to accommodate richer services. This trend negatively impacts either the security or the efficiency of current protocols for trusted...
In this paper, we focus on the modeling and use of relationships between artifacts in MDE software processes. Infact, the nature of those artifacts has deeply changed (i.e. They are essentially models) and relationships between them are numerous (e.g. Transformation, matching, overlap and so on). We highlight that they are under-considered by the software process community and propose an approach,...
Integration issues are still one of the main concerns regarding hospital information systems (HIS). Hospitals need integration engines capable of guaranteeing that messages are properly dealt with, use standards properly (eg. IHE), are secure, promote integration of legacy systems, enable auditing, monitor failures, evolve to include new standards, have balancing capabilities and are able to compensate...
In these last few years we are witnessing a change in the way video games are implemented. Starting from an early age, where a single developer was sometimes in charge of the whole creative process, we have moved now toward extremely large groups with a multi-layered organisation. This increasing complexity of team organisation, together with a tremendous growth of projects size, calls for the adoptions...
Service chaining is one of the challenges in network function virtualization (NFV), where a sequence of middleboxes apply their service to particular traffic. The challenge of service chaining is that a middlebox may alter the content of packet headers; thus, the context of service chaining for particular traffic gets lost. This paper proposes Segmented Proactive Flow Rule Injection (SPFRI) using...
In Software Defined Networks (SDN), intensive traffic monitoring is used to optimize the Quality-of-Service (QoS) of the network paths which are selected. Thus, we introduce the use of the Cognitive Packet Network (CPN) algorithm to SDN in order to optimize the search for new high-QoS paths. We install the CPN algorithm in the Cognitive Routing Engine (CRE), a new application software for SDN, and...
As a rarity of Tibetan national culture, the Tibetan-go is dying out. In order to protect and popularize this unique culture, this paper designed a Tibetan-go human-computer game software. This software is composed of board representation, movement generator, searching engine and situation evaluation modules. The Tibetan-go human-computer game is realized by c programming language. We made test between...
Technology enhanced education has been recently established as a new approach for all stages of education in developing countries, especially in Macedonia. Although computer games are often given little attention we believe that within the vast amount of technologies and instruments used to achieve the needed improvements it is computer games that are playing the central role in delivering the desired...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.