The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Flood is a phenomenon by which the living and non-living entities that belong to the environment suffers various losses. Human beings cannot totally avoid floods but the only thing humans can do is, they can develop suitable systems to predict & subsequent measures to alert the people about its occurrence. There are many technologies available to predict and prevent. There are many natural disasters...
A novel approach is introduced in this paper to execute computing device with non-deterministic finite automata for hexose monophosphate shunt pathway process. It is designed to observe the hexose monophosphate shunt pathway metabolism along the case of acceptance and rejection. The state of rejection in non-deterministic finite automaton for red blood cells is glucose-6-phosphate dehydrogenase deficiency,...
Powerful miniature single-board computers have recently gained attention, inviting computer scientists and engineers to develop various kinds of applications on these tiny devices. Having numerous benefits over full-scaled personal computers, their small size enables system mobility and allows operations under limited power resources. Exploring its computing capability, we set up a Raspberry Pi with...
Monitoring user interaction activities provides the basis for creating a user model that can be used to predict user behaviour and enable user assistant services. The BaranC framework provides components that perform UI monitoring (and collect all associated context data), builds a user model, and supports services that make use of the user model. In this case study, a Next-App prediction service...
The work presented in this paper focuses on the modeling of nonlinear hybrid systems taking into account the different operating modes. This approach is a multi-models approach or each model describes the system in a given mode. Each mode is represented by hybrid automata.
In this work, we explore a security reference monitor (RM) design which borrows from the Flask security architecture. Our RM design goal is to achieve complete mediation by checking and verifying the authority and the authenticity of every access to every system object in systems-on-chip (SoCs). Access decisions are administered by a security logic “server" implemented as an extension of the...
Due to the volatile nature of Service Level Agreements (SLA), dynamic management is vital for both service consumer and service providers. As a result of technology innovation, cloud computing SLA content updates are not accurate with consumer needs. Further, public SLAS are used as templates and when a new SLA is issued, requirement mapping to all its public SLA is necessary. To manage cloud SLAs...
Originated from Wireless Sensor Networks (WSNs), Body Sensor Networks (BSNs) have been applied to numerous domains. However, after an in-depth analysis of the state-of-the-art, several factors have been found to limit the development of applications based on BSNs. In this paper we introduce the concept of Open BSNs for improving the development of BSNs. Specifically, open BSNs can improve key aspects...
Behavior Modeling is always a attentive task in the complex product modeling. It is difficult to monitor different kind of behavior of a product in the physical environment. In the RFLP (Requirement Functional Logical Physical) structure, behavior modeling is accomplished in Function and Logical level. There are several ways to monitor the behavior of a product. In this paper, author made an effort...
The search of latent dependencies and the analysis of text collections are important tasks in the context of rapid development of information technologies. This article describes the identification of scientific and technological trends in the field of it-technologies using the analysis of thematic publications from web sources with LDA topic models. The proposed solution uses a formal criterion to...
This paper investigates a method to predict aerodynamic heating on a supersonic flare body using a 2D axisymmetric transient viscous CFD simulation. Five turbulent models and three simulation time step sizes were utilized. The surface temperature of the rocket predicted by the simulations was compared to the published experimental data obtained from the first 26 s of a rocket flight test. It was found...
This abstract will discuss machine learning and BCI efforts of the BBCI team and co-workers with the general focus on analysing cognition. Due to the fact that many different aspects are reviewed, a high overlap to prior own contributions is not only unavoidable but intentional.
In the existing service selection models, there is not a good one for SaaS system. In view of the characteristics of multi-tenant in SaaS system and the perspective of ensuring the tenants' enthusiasm, this paper puts forward a QoS-constrained service discovery model based on intelligent agent, as well as a service selection algorithm based on tenant level. Extensive experiments have been conducted...
Concerns for the environment, health and safety are of major importance and have been attracting considerable attention around the globe due to the new environmental challenges that are threatening our planet. In this paper, we propose to enhance the fault detection of an air quality monitoring network (AQMN) by using wavelet principal component analysis (WPCA)-based on generalized likelihood ratio...
Failure of a task running on a Hadoop cluster is highly expensive in terms of computational time. A failure occurring even at the end phase of the task may cause the need to redo the entire task. Thus is really important to deploy fault tolerant techniques. Hadoop deploys a technique of checkpointing to prevent data loss. However, computational time-loss still pose a grim threat to critical applications...
This paper addresses the problem of damage detection technique of structural health monitoring (SHM). Kernel principal components analysis (KPCA)-based generalized likelihood ratio (GLR) technique is developed to enhance the damage detection of SHM processes. The data are collected from the complex three degree of freedom spring-mass-dashpot system in order to calculate the KPCA model. The developed...
Cyber deception is usually synonymous with nefarious activities led by attackers. Motivated attackers will stop at nothing to accomplish their mission and deception is amongst the tools they use. Cyber defenders have also begun using deception as an instrument to further enhance overall defensive strength. Deception has been leveraged to research attacker behaviors and their associated tactic techniques...
Hadoop architecture provides one level of fault tolerance, in a way of rescheduling the job on the faulty nodes to other nodes in the network. But, this approach is inefficient when a fault occurs after most of the job is executed. Thus, it's necessary to predict the fault at the node at quite an early stage so that the rescheduling of the job is not costly in terms of time and efficiency. Prediction...
In recent years, trust has emerged with the development of cloud computing. It is a critical step to select a trusted cloud provider before the service begins, which is related to the interests of cloud consumers themselves and the quality of the service. A SLA trust model based on behavior evaluation is proposed in this paper. User's subjective evaluations are abandoned, the provider who is trusted...
This paper proposes an efficient data-based anomaly detection method that can be used for monitoring nonlinear processes. The proposed method merges advantages of nonlinear projection to latent structures (NLPLS) modeling and those of Hellinger distance (HD) metric to identify abnormal changes in highly correlated multivariate data. Specifically, the HD is used to quantify the dissimilarity between...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.