The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The issue of the workforce management in the field is crucial for infrastructure operators. A key role is played by workforce management systems that assign workers with the right skills at the optimal time in the right place, so long-term compliance with the required quality parameters is met at the lowest possible costs. Historical development and theoretical basics of workforce management systems...
The search of latent dependencies and the analysis of text collections are important tasks in the context of rapid development of information technologies. This article describes the identification of scientific and technological trends in the field of it-technologies using the analysis of thematic publications from web sources with LDA topic models. The proposed solution uses a formal criterion to...
The main goal of the paper is to develop two new causal graph-based fault detection and isolation algorithms. Easily calculated from the Hyper-graph (respectively Directed Hyper-graph) representation covering the hyper-paths, the qualitative residual generators are systematically deduced. The number of redundant relations can be reduced as information is added by a qualitative indicator for each term...
In areas where the habitats of elephants and humans are rapidly encroaching on each other, real-time monitoring of the elephants' locations has the potential to drastically improve the co-existence of elephants and humans, resulting in reduced deaths in both groups. However, as tagging (using GPS collars) elephants to obtain such location information is difficult and costly, it is important to ensure...
Many researchers have been applying computer technology, finite element analysis combined with Orthopedic manipulation of TCM research Finite element analysis method to study spinal manipulation has some advantages which can not be compared with traditional methods. This paper analyzes the application of finite element in this field from the aspects of mechanics of traction, rationality and safety...
This electronic document is a “live” template and already defines the components of your paper [title, text, heads, etc.] in its style sheet. Sentiment classification is one of the research hot spots of Natural Language Processing. Compared with English and Chinese, it is hard for Tibetan to do some research of sentiment analysis because of the situation that we are lack of related sentiment corpus...
We examine the use of the Fourier transform to discriminate dynamic behavior differences between congested and uncongested systems. Simulation continuous time statistic ‘trajectories’ are converted to time series for Fourier analysis. The pattern of Fourier component magnitudes across frequencies differs for congested versus uncongested systems. We use this knowledge to explore statistical process...
Elasticity is the most important feature that differentiatescloud computing from traditional IT infrastructure. Itdefines the capacity of cloud infrastructure provider to acceleratethe provision or the deprovision of the resources needed to deployclient's services. Auto-scaling resource is typically done usingtwo models: reactive and proactive. Most previous researchesmanage elasticity with a single...
In the first part of the article is a methodology for implementing a model-driven safety analysis of dynamical technology systems. The safety analysis is performed in the development of control system, mainly aiming at critical processes of system operation. I divided my methodology into five steps. These steps of the methodology was carried out in a hierarchical sequence. The objective of the second...
The distributed Brillouin optical sensor allows monitoring physical parameters such as temperature and stress, making them ideal for application in structural monitoring. Currently, the researches focus on improving the detection distance and resolution of these sensors, the laboratory tests are the main tools to checking the results of different theorical proposals. Therefore, the aim of this paper...
On the example of machine-building enterprise expediency use of SADT technologies in perfecting of the main business processes is shown. As-Is model one of key processes is constructed, the analysis is carried out it and To-Be model, taking into account recommendations about its perfecting is offered.
The recent attentions on video analysis have led to the extensive enhancement of computer vision technologies. However, it is still necessary to closely monitor the results of video analysis by human operators. This paper introduces a trajectory-based scene retrieval system that can help human operators look closely at desired scenes based on a trajectory query. The system includes the index and mapper...
The smart substation is an important part of smart grid. By transmitting GOOSE (Generic Object Oriented Substation Event) and MMS (Manufacturing Message Specification) message among devices, the smart substation can realize the functions including, protection, control, alarm etc. Currently available smart substation secondary system's operation and maintenance analysis doesn't take account of the...
The operation error of the electric energy metering device directly affects the accuracy of the electricity trade calculation, so it's very important to ensure the device working accurately. In this paper, three levels of indexes of electric energy meter were selected from the life cycle management, which cover basic information, operational monitoring and site inspection. Then the state evaluation...
The paper is devoted to solving the problem of developing new and improving existing methods of NFV technological solutions analysis on the earlier stages of developing process. A method of analysis functional and non functional requirements of NFV infrastructure realization is proposed. The proposed method bases on mathematical modelling approach. E-network is use as tool for NFV behavioural modelling...
ETL systems are responsible for populating data warehouses' storage structures with historical subject-oriented business data. To do that in the most appropriated manner ETL systems require special computational means, involving frequently the manipulation of large amounts of data that come usually from disparate information sources. Planning and designing ETL systems are very complex tasks, where...
This work investigates sensor signal processing approaches that can be used with a sensor system for direct on-site monitoring of groundwater, enabling detection and quantification of BTEX (benzene, toluene, ethylbenzene and xylene) compounds at μg/L (ppb) concentrations in the presence of interferents commonly found in groundwater. A model for the sensor response to water samples containing multiple...
In wireless ad hoc networks (WANETs), collaboration among nodes is usually inefficient and the network is vulnerable to various attacks. Although some intrusion detection systems (IDSs) and reputation strategies have been proposed to enhance the network's robustness, the significant power consumption they cause will reduce the networks' lifetime. In this paper, we propose a power-efficient mechanism...
Specific requirements and characteristics of primary storage make designing desirable deduplication schemes a sophisticated task. In this paper, we propose DIODE, a Dynamic Inline-Offline DEduplication scheme that provides salient read/write performance and space-saving simultaneously for primary storage systems. DIODE orchestrates inline and offline processes in a dynamic manner. We propose two innovative...
Cyber security is a challenging research problem especially when one considers exponential growth in information technologies. Most previous cyber security research have generally centered on securing and protecting physical resources (computers, network devices, and mobile platforms), protocols and applications. However, little work has focused on the human side and behavior, what motivates cyber...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.