The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Microfluidic biochip technology integrates miniaturized components into a chip that can perform traditional biochemical laboratory procedures. Commercial impact is highlighted by the recent acquisition of Advanced Liquid Logic by Illumina Inc., a leader in DNA sequencing and biomolecular analysis. Due to the inherent variability involved in many biochemical processes, uncertainties manifest themselves...
This article proposes a methodology to measure the dynamic and static complexities in real systems. Using the theory of discrete event systems, it is simulated the Dining Chinese Philosophers problem and then the complexity of the system is measured based on the simulated data. The obtained results relate to the static complexity based on the configuration of the system, without using a simulator...
Nowadays the security becomes more and more important and as a need for secure data encryption grows, we have to be sure that the algorithms we are using are safe. But it is not always just about algorithm itself as about settings, for example key length. RSA, the most popular asymmetric cipher is a perfect example, because it fully depends on hardness of large numbers factorization. In this paper,...
Virtualization techniques have shown to report benefits to data centers and other computing facilities. In this regard, virtual machines not only allow reducing the size of the computing infrastructure while increasing overall resource utilization but virtualizing individual components of computers may also provide significant benefits. This is the case, for example, for the remote GPU virtualization...
Programs sometimes tend to lose their structure and clarity through the addition of error handling. Often, more than half of a code base ends up dedicated to various types of error detection and recovery, obscuring the nominal control flow that defines the basic structure. The challenge in writing reliable code is to find ways to remove code from an application by simplifying and generalizing, rather...
In this paper, we present a novel non-local averaging based multimodal image filtering method. In the method the mean average for filtering the noisy image is computed nonlocally and weights for average is jointly guided by the reference image taken from another imaging device. The experiment results shows that the proposed method is out performance than the state of the art joint bilateral filter,...
In an object oriented design, organization of classes in an inheritance hierarchy is believed to ease the understandability, reusability, and maintainability of the design. However, a lot of empirical analysis is required to confirm this. This research work is another attempt in this direction. Previous research experiments show that programmers do not prefer deep inheritance hierarchies. They find...
Algorithms of finding polynomials roots have been proposed and they are continuously suggesting in different works [5] which are devoted for solving as theoretical so application problems because of theirs complexity and sufficient perfection (accuracy) in series of certain situations. A method of finding polynomials roots which is reduced to obtaining analytical representation of polynomial roots,...
The Network-Centric warfare (NCW) has been the hot research spot in military area since its potential capacity and big advantages. Since it is a complex adaptive system (CAS) with many autonomous entities, the multi-Agent modeling and simulation (MABMS) technology has been the most popular method to study it. But the fact that the calculation load increases with the Agent Number accords with exponential...
We propose a distributed user selection strategy in a network MIMO setting with base stations serving users. Each base station is equipped with antennas, where $LM \ll K$. The conventional selection strategy is based on a well known technique called semi-orthogonal user selection when the zero-forcing beamforming (ZFBF) is adopted. Such technique, however, requires perfect channel state information...
Sparse matrix-vector multiplication (shortly spMV) and transposed spMV (shortly spMTV) are the most common routines in the numerical linear algebra. Sparse storage formats describe a way how sparse matrices are stored in a computer memory. Since the commonly used storage formats (like COO or CSR) are not sufficient for high-performance computations, extensive research has been conducted about maximal...
The aim of this paper is the simultaneous minimization of model error and model complexity for the Choquet integral. The Choquet integral is a generator function, that is, a parametric function that yields a wealth of aggregation operators based on the specifics of the underlying fuzzy measure (aka normal and monotonic capacity). It is often the case that we desire to learn an aggregation operator...
This study explores how evolutionary changes of the rules affect the characteristics of the games in the Shogi species. There are Dai-Shogi (Big Shogi) variants that are played with a big board and numerous pieces, but almost all such variants are now obsolete. Only a variant called Chu-Shogi is still played by some people. In this paper, we evaluate the impact of special Chu-Shogi rules that are...
This paper addresses the problem of high computational requirements in the implementation of Set-Valued Observers (SVOs), which places stringent constraints in terms of their use in applications where low computational power is available or the plant is sensitive to delay. It is firstly shown how to determine an overbound for the set-valued estimates, which reduces the overhead by limiting the number...
By using the essence of Tai Chi Thought (TCT), software's characteristics are analyzed, and a new kind of method for solving software problems is provided. The basic elements of TCT are introduced and their application is discussed. Software, in general, not only has a weakness such as abnormality, but also has a strength, namely plasticity. The complexity of software is due to the complexity of human...
Program slicing has numerous applications in software engineering activities like debugging, testing, maintenance, model checking etc. The main objective of this paper is to automate the generation of System Dependency Graphs (SDG) for aspect-oriented programs to efficiently compute accurate slices. The construction of SDG is automated by analysing the byte code of aspect-oriented programs that incorporates...
Commercial advertisement dissemination is one of the most promising applications in self-organizing mobile social networks (SMSN). Lightweight incentives are essential to encourage the participation of mobile users, given that only a few users are voluntary due to limited resources in mobiles. However, existing incentives overlook dishonest behaviors of relays in overstating their costs for higher...
Finite fields were successfully used to construct algebraic low-density parity-check (LDPC) codes, especially Quasi-Cyclic LDPC codes. These LDPC codes with large minimum distances have lower error floor, linear complexity of encoding and are more practical for hard-decision algebraic decoding. In this paper, we show that finite fields can also be successfully used to construct algebraic low-density...
With the rapid development of software defined networking and network function virtualization, researchers have proposed a new cloud networking model called Network-as-a-Service (NaaS) which enables both in-network packet processing and application-specific network control. In this paper, we revisit the problem of achieving network energy efficiency in data centers and identify some new optimization...
Finding critical nodes in a network is a significant task, highly relevant to network vulnerability and security. We consider the node criticality problem as an algebraic connectivity minimization problem where the objective is to choose nodes which minimize the algebraic connectivity of the resulting network. Previous suboptimal solutions of the problem suffer from the computational complexity associated...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.