The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In order to more precisely to acquire the mechanics parameter of surrounding rock for finite element modeling, on the basis of a tunnel of Longlin~Baise expressway in Guangxi Zhuang Autonomous Region, the method of acquiring the mechanics parameter of surrounding rock based on displacement analysis was applied. According to the field measurement raw data, the equivalent elastic modulus...
Despite the many benefits of virtualisation, security remains the main challenge for virtualisation in cloud computing. Even though a number of solutions like intrusion detection, malware introspection among others, have been developed and implemented by many security professionals, monitoring, visibility and infrastructure still pose security threats to virtualisation in cloud computing. In this...
The precisely detection of electromagnetic spectrum anomaly is important and crucial for increasing demand on spectrum security, especially in the condition of complex electromagnetic environment and lack of pre-knowledge information about frequency use. There were many research methods of anomalies detection to conquer malicious radio events. In this paper, we proposed a spectrum anomalies autonomous...
The paper is divided into two main parts. In the first part of the study, we applied two process mining discovery techniques (i.e., alpha and heuristic algorithms) on an event log previously collected from an information system during an Academic Writing (English) training course at a private university in Thailand. The event log was initially consisted of 330 process instances (i.e., number of participants)...
Cooperative intelligent transport systems (ITS) are considered as the key enabling technology to improve road safety, traffic efficiency and driving experience. V2X (vehicle-to-vehicle and vehicle-to-infrastructure) communications are gaining increasing importance in automotive research and engineering domains. Many mobility and convenience applications require the V2X bidirectional communications...
To guarantee the data quality is of the first importance in the research of monitoring and management of the health of large complex electronic systems such as radars, and tracking the working performance. Influenced by the combined effect of all kinds of interfering factors, the observation series reflecting the health of a radar usually includes variety of outliers and noise, which ought to be detected...
This paper presents the vibration behavior of the miniature circular piezoelectric micromachined ultrasonic transducers (pMUTs) under water for the first time As the results of the FSI analysis, the vibration modes and resonant frequencies were successfully observed and compared to the scanning LDV measurements. According to these result, some vibration mode and resonant frequencies were appeared...
E-learning is a promising research area, as they are expected to increase enrollment and improve the quality of education. Adaptive e-learning systems, traditionally focused on content personalization, are in need to cope with continuous changing requirements and changing environment. Indeed, the specification and the management quality attributes of such systems, supported throughout the whole lifecycle...
Threats in cybersecurity come in a variety of forms, and combating such threats involves handling a huge amount of data from different sources. It is absolutely necessary to use algorithmic models to defend against these threats. However, all models are sensitive to deviation from the original contexts in which the models were developed. Hence, it is not really an overstatement to say that ‘all models...
Field signature method (FSM) is used today by many of the world's major oil companies in a wide range of monitoring applications, with advantages of high degree of reliability and accuracy, non-intrusive, reflecting wall thickness visually. In this paper, the theory of FSM used in inner corrosion monitoring was analyzed and the expression of defects evaluation parameter (Fc) was deduced based on the...
Analyzing accountability violations and identifying the guilty party is a challenging process especially where multiple tenants are hosted by a single application instance. To handle this issue, we propose an approach for accountability violation analysis. It is based on service patterns as an abstract model to provide reusable and suitable description of the different characteristics of the analysis...
Technical Debt (TD) is a metaphor to refer to events that bring quality loss in the code. A large volume of Technical Debt in an application may bring losses for the organisation that keeps it. For those organisations that outsource software development, monitoring TD in the influx of development packages may be an efficient strategy to ensure the quality of the product acquired. This works bring...
Computational tools for modeling multi-agent work, including task work and teamwork, are needed to support the design of complex operational concepts involving human operators and automated systems. This paper presents a human performance model of task sharing with delegation where an agent can execute, delay, or delegate assigned task work according to its multi-tasking capacity and other attributes...
As accidents frequently occurred in aerospace applications, traditional reliability analysis methods are not enough for modern flight control software. To find a comprehensive, effective and intelligent method for software fault diagnosis is urgent for airborne software engineering. Consequently, in this paper, a novel knowledge-based diagnosis system is constructed for flight control software, by...
Elasticity mechanisms allow private cloud platforms to dynamically increase or decrease resources according to policies related to workload. Auto scaling and virtual machines (VMs) instantiation are processes which affect the performance of such mechanisms. This paper evaluates the performance of the auto scaling process on a private cloud platform considering some relevant factors which are not addressed...
Dataflow analysis-based dynamic parallel monitoring(DADPM) is a recent approach for identifying bugsin parallel software as it executes, based on the key insightof explicitly modeling a sliding window of uncertainty acrossparallel threads. While this makes the approach practical andscalable, it also introduces the possibility of false positives inthe analysis. In this paper, we improve upon the DADPMframework...
Self-adaptive software systems (SASS) are equipped with feedback loops to adapt autonomously to changes of the software or environment. In established fields, such as embedded software, sophisticated approaches have been developed to systematically study feedback loops early during the development. In order to cover the particularities of feedback, techniques like one-way and in-the-loop simulation...
This study presents an analysis of the interaction between a driver and an automated driving system (ADS) using a communicating sequential process (CSP). Level 3 of automated vehicles requires that drivers are able to take control from the ADS in emergency situations. To allow this, the interactions between the driver and ADS must be treated as part of the safety system. In an emergency situation,...
In industrial plants, there is a mix of devices with different security features and capabilities. If there is a mix of devices with various degree of security levels, then this will create independent islands in a network with similar levels of security features. However, the industrial plant is interconnected for the purpose of reducing cost of monitoring with a centralized control center. Therefore,...
The complexity of network topology together with heterogeneity of network services make the network configuration a hard task, even for skilled and experienced administrators. In order to reduce the complexity of the network configuration, administrators have leveraged network policies, introducing hence new possibility of error. Indeed, erroneous and unexpected network behaviour (e.g., security flaws)...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.