The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Data centers are notorious energy consumers. In fact, studies have shown that for every $1 spent on hardware in the datacenter, $0.50 is spent on powering this hardware over its lifetime. Data centers host real or virtual (i.e., cloud) clusters that often execute large compute jobs using MapReduce, of which Hadoop is a popular implementation. Like other successful open source projects, Hadoop has...
This paper presents a case study of a discreteevent simulation (DES) model of an emergency department (ED) unit in a governmental hospital in Kuwait. The emergency department operations were modeled using Arena software. The simulation model was reinforced through verification and validation. Some scenarios in an attempt to determine the minimum staff level were evaluated. These scenarios show that...
To perform successfully interdisciplinary engineering tasks, engineers need a systems view, in other words, a high capacity for engineering systems thinking (CEST). Systems thinking is a major high-order thinking skill that enables individuals to successfully perform systems engineering tasks. Industrial engineers who work in complex, multi-dimensional and multi-disciplinary reality need to view systems...
Personality and its impacts on team processes in the domain of software engineering have been an area of investigation for many researchers since the last many years. However, personality traits and its effects on team climate and team performance were not being focused as area of research. In our previous research, we had performed a systematic literature review on team climate and team productivity...
Software metrics play an important role in Software Development Life Cycle (SDLC). In this paper we have tried to find the correlation between different software metrics. The research is done using PROMISE data repository of NASA. The positive correlation is found to exist between various software metrics. Large number of metrics available in the software industry raises the need of finding the most...
This paper proposes a modeling approach based on software correlated defects -- error propagation slicing (EPS). EPS, describing the way error propagates in software, detects potential defects which are hard to be detected by traditional approaches and strategies. To begin with, software testing method in this paper will inject cultivated seed of defects, and its potential defects. Test cases of the...
Algorithmic composition refers to the process of composing a melody automatically using algorithms. A bulk of methods have been proposed for this task. Among them, a novel idea is to utilize the correlation information between the pitches of melodies and the tones of lyrics for melody composition. Unfortunately, the existing method adopting this idea suffers from several severe shortcomings and thus...
Application of the underwater target positioning system is widely used, so the underwater target passive location technology research has also become a hotspot. The underwater target passive location technology involves computer technology, digital signal processing technology, microelectronic technology and array technology and so on. This paper develops an intensive research on the related technologies...
The National Synchrotron Light Source II (NSLSII) at Brookhaven National Laboratory offers a large variety of synchrotron based imaging techniques that provide users with structural and chemical information of materials at the nanoscale. Multiple imaging techniques such as light microscopy, infrared imaging and X-ray fluorescence microscopy are commonly used to correlate information from the same...
VLBI is a technique that synthesizes the signals of several telescopes to achieve a much higher resolution. Correlator is a key component in the whole VLBI system. This paper introduces the parallel implementation of the CVN(Chinese VLBI Network) software correlator. High performance computing algorithms are used to accelerate the correlation process.
In electron microscope tomography, the alignment of tilt series images is a major determining factor of resolution in the 3D reconstruction. One method of tilt alignment uses gold beads deposited on or in the specimen as the fiducial markers. This paper describes an "auto pick" software system which can pick markers automatically. It uses a cross correlation function to find out the shift...
Organizational identification is a perception that individual is consistent with the organization. The purpose of this paper was to explore the status of university teachers' organizational identification and the influencing factors by applying the computational statistics software SPSS19.0 to analyze the data. Method: 535 university teachers were investigated with two questionnaires and the data...
Agile software development describes those methods with iterative and incremental development. This development method came into view to overcome the drawbacks of traditional development methods. Although agile development methods have become very popular since the introduction of the Agile Manifesto in 2001, however, there is an ongoing debate about the strengths and weakness of these methods in...
Nowadays concurrent programming is in large demand. The inherent support for concurrency is therefore increasingly important in programming languages. As for C++, an abundance of standard concurrency constructs have been supported since C++11. However, to date there is little work investigating how these constructs are actually used in developing real software. In this paper, we perform an empirical...
When software developers fail to coordinate, build failures, duplication of work, schedule slips and software defects can result. However, developers are often unaware of when they need to coordinate, and existing methods and tools that help make developers aware of their coordination needs do not provide timely or efficient recommendations. We describe our techniques to identify timely and efficient...
SATD (Sum of Absolute Transformed Difference) based cost function is adopted to reduce the complexity of HEVC (High Efficiency video coding) codec by selecting up to 8 intra modes for RDO (Rate Distortion Optimization) process. However, transform of all 35 modes, and RDO of 8 modes is bottleneck in intra mode complexity reduction. In this paper, a hybrid approach for reducing intra coding complexity...
This paper shows the analysis of the angles in the hip, knee and ankle. In a complete cycle of pedaling, are obtained the superior values, following a protocol totally specified in the document. Through the use of an acquisition software, named Kinovea®. The data of each one of the angles are set; in this manner the data information can be exported to Matlab®. In Matlab® Software the analysis of the...
Software misconfigurations are responsible for a substantial part of today's system failures, causing about one-quarter of all customer-reported issues. Identifying their root causes can be costly in terms of time and human resources. We present an approach to automatically pinpoint such defects without error reproduction. It uses static analysis to infer the correlation degree between each configuration...
The presence of anti-patterns and code smells can affect adversely software evolution and quality. Recent work has shown that code smells that appear together in the same file (i.e., collocated smells) can interact with each other, leading to various types of maintenance issues and/or to the intensification of negative effects. It has also been found that code smell interactions can occur across coupled...
Information systems can be targeted by different types of attacks. Some of them are easily detected (like an DDOS targeting the system) while others are more stealthy and consist in successive attacks steps that compromise different parts of the targeted system. The alarm referring to detected attack steps are often hidden in a tremendous amount of notifications that include false alarms. Alert correlators...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.