The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The study of graph-based submodular maximization problems was initiated in a seminal work of Kempe, Kleinberg, and Tardos (2003): An influence function of subsets of nodes is defined by the graph structure and the aim is to find subsets of seed nodes with (approximately) optimal tradeoff of size and influence. Applications include viral marketing, monitoring, and active learning of node labels. This...
The use of virtual patching tools to prevent attackers exploiting vulnerabilities of a web application is a widely adopted defensive approach. The constant evolution of applications, and thereby of attack techniques, requires a big maintenance and tuning effort to ensure that the remediation patches are working correctly. We put forward in this paper a tool supported process here security requirements...
This paper presents an online nonlinear actuator fault detection and isolation system, aiming at monitoring monitor the health of a novel ducted fan UAV. In order to cover wider flight envelope, an unscented multiple model adaptive estimation method is introduced as an extension of the EKF-based method. The proposed method provides a bank of UKFs running in parallel, each of which is responsible for...
The recent attentions on video analysis have led to the extensive enhancement of computer vision technologies. However, it is still necessary to closely monitor the results of video analysis by human operators. This paper introduces a trajectory-based scene retrieval system that can help human operators look closely at desired scenes based on a trajectory query. The system includes the index and mapper...
Today's science is more and more driven by collecting and evaluating increasing amounts of data. Utilizing Scientific Workflows is one suitable method how to organize processing pipelines for this purpose. In this work, we show that performance improvements on the execution of existing workflows can be achieved, if the conditions for starting selected tasks with certain data access characteristics...
The paper is devoted to solving the problem of developing new and improving existing methods of NFV technological solutions analysis on the earlier stages of developing process. A method of analysis functional and non functional requirements of NFV infrastructure realization is proposed. The proposed method bases on mathematical modelling approach. E-network is use as tool for NFV behavioural modelling...
This article proposed method for monitoring threats preparing attacks on the telecommunications network and to prevent opportunities for their implementation. The method is based on monitoring the implementation of states in the functioning of the network components, vulnerability assessment and determination of the facts of preparation intruder attacks (monitoring risks of attacks) by finding the...
Anti-Tank Guided Missile (ATGM) is Indonesian Army' main defense equipment, whose availability depends on purchasing from abroad. The dependency to other countries allows many weak points and makes Indonesia merely a user, which cannot do anything against the import of defense equipment. Moreover, as a user having obligation to report the status of the defense equipment to the producer, Indonesia's...
Cyber culture of virtual-macro-micro-computing, which formulates, explains and predicts the current processes and phenomena monitoring and control technology in the physical and virtual space is proposed. The verbal and structural definitions of the main types of computing, based on current trends evolution of planet cyber ecosystem are represented. The universal model of MAT-computing: <Memory,...
Test point optimization selection is an effective way to decrease test cost and time. This paper proposes a method of test point optimization selection based on qualitative fault propagation analysis. Firstly, a qualitative fault propagation model based on physical relations is built. Secondly, the responses of available test points under normal state and failure state are analyzed, and the Mahalanobis...
Cyberculture of cosmological computing, which formulates, explains and predicts the current monitoring and control technology for processes and phenomena in the physical and cosmological space, is proposed. The verbal and structural definitions of the main components for the cosmological computing, based on current research trends are represented. Harmonic genome of the universe as a computing metric...
To ensure reliable operation of electric motors, various types of condition monitoring techniques are employed. Among them Electrical Signature Analysis (ESA) is a well-established technique for fault detection. ESA mainly consists of motor current signature analysis, instantaneous power signature analysis and extended Park's vector approach. While these techniques are very effective for fault detection...
Flood is one of the major natural disasters affecting almost the whole world. In this paper, we propose a model of cloud computing based flood detection and management system (FDMS) using wireless sensor and actor networks (WSANs). Sensors and actors are deployed in connected subnets to localize the problem. As WSANs are limited in terms of resources, e.g., battery, wireless bandwidth and memory,...
in recent years, mobile phone sensing applications has been regarded as new paradigm to obtain ubiquitous environment data. Research on motivating smart phone users to participate in mobile sensing contributing their resources and maximizing the profit of platform is in full swing. Unfortunately, the location-based optimal task assignment problem in mobile sensing is an NP-hard problem. We transform...
Parameter selection is a critical task in scientific workflows in order to maintain the accuracy of the simulation in an environment where physical conditions change dynamically such as in the case of weather research and forecast (WRF) simulations. Considering the large number of simulation parameters, the size of the configuration search space becomes prohibitive for rapidly evaluating and identifying...
Configuring and executing application across multiple clouds is a challenging task due to the various terminologies used by cloud providers to describe their services and features. Likewise, the services are regularly offered at different levels of abstraction, such as infrastructure-as-a-service (IaaS) and platform-as-a-service (PaaS). While IaaS services provide low-level access to the infrastructure,...
In order to recognize faults of the high voltage circuit breaker (HVCB) in the whole fault state space precisely and minimize the impact of the lack of fault data on the accuracy of fault recognition, a method of fault recognition was proposed based on the incremental learning algorithm for SVM. Firstly, the incremental learning algorithm for SVM was analyzed theoretically, and the state monitoring...
The constant development of information technology and communication has opened up new learning opportunities, and it has recognized the potential of new technologies and ways they can be exploited, therefore, it has increased the number of digital technology applications that support teaching and learning. In these cases, Technology has also had a great boom to support collaborative learning. Taking...
Specific requirements and characteristics of primary storage make designing desirable deduplication schemes a sophisticated task. In this paper, we propose DIODE, a Dynamic Inline-Offline DEduplication scheme that provides salient read/write performance and space-saving simultaneously for primary storage systems. DIODE orchestrates inline and offline processes in a dynamic manner. We propose two innovative...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.