The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The application of simulation optimization in water distribution network analysis and design is a promising method for generating solutions to existing challenges. The absence of a standard interface for coupling the open source EPANET software package to optimization algorithms increases the implementation effort and limits the comparison of results. This work presents a methodology for implementing...
The traditional ortho-rectification technique for remotely sensed imagery, which is performed on the basis of ground image processing platform, has been unable to meet the timeliness requirements. To solve this problem, this paper presents the research on ortho-rectification technique based on field programmable gate array (FPGA) platform, which can be implemented onboard and spaceborne for a real-time...
The current static analysis approaches for detecting stack overflow vulnerabilities in binaries are only usable to the functions in system libraries and not suitable for user defined functions. In this paper, we model the characteristic of stack overflow vulnerabilities and propose a static taint analysis method, which can recognize user defined functions that may have that type of vulnerabilities...
Coverage analysis is a foundation computation analysis of space missions, which calculates figures of merits and visible periods of the spacecraft. Conventional analysis algorithms are computationally efficient but lack universality because they deal specifically with particular conditions of special orbits and specific objects. In this study, a coverage analysis tool that rectifies this state of...
Construction of efficient process for managing goods and reducing distance movement of goods to save energy are two important tasks in management warehouse. This paper will present a combination of building algorithms to determine storage location in storage and retrieval process as well as planning optimal route in each travel cycle of goods, their combination helps to manage the goods effectively...
This paper proposes an algorithm that is particularly concerned with generating all possible distinct spanning trees that are based on breadth-first-search directed graph traversal. The generated trees span all edges and vertices of the original directed graph. The algorithm starts by generating an initial tree, and then generates the rest of the trees using elementary transformations. It runs in...
fault injection is an effective technique in software testing. By introducing faults to software under test, fault injection can improve the coverage of a test, as the same time, the fault injected in software contributes significantly to find true fault related to fault injected. In this paper we propose a software testing method based on fault injection. In this method, we first use neural network...
Past AI systems were domain specific intended to fulfill a particular task. These days, there is a need for versatile machines that are capable of performing multiple tasks, should be adaptive in nature and should have decision-making capabilities for any situation. At this point, the role of Cognitive Computing comes into the picture. Cognitive computing is a promising area of research, it is depicting...
An approach, verifying class diagram correspondence to SOLID Design Principles, is proposed in this paper. SOLID is an acronym, encapsulating the five class diagram design principles namely: Single Responsibility, Open-Closed, Liskov Substitution, Interface Segregation and Dependency Inversion. To check whether a class diagram meets to SOLID, its analytical representation is analyzed by means of predicate...
The task abstraction and aggregation in a business process can help to (1) obtain customized descriptions of a business process for different users, and (2) derive user interfaces of a business process related to the participating users. This paper proposes an approach for task abstraction and aggregation of a business process based on a role-enriched business process model. For each user role, tasks...
The aim of this work is improve voltage profile and active power loss. Capacitor placement and sizing are done by loss sensitivity analysis and GA. Power loss sensitivity factor offer the important information about each section in a feeder. This factor is determined using load flow study. In a feeder, Sections with highest power loss sensitivity are selected to installation the capacitor. GA with...
In this paper it is presented a new application of Levenshtein distance algorithm, for the selection of choices in a vocabulary quiz. Levenshtein distance is a measure for the similarity of two strings. In order to make the quiz more difficult, the choices for the correct word are selected using the calculated degree of similarity with the correct word. We developed a Java graphical application that...
Graph Pattern Matching (GPM) plays a significant role in many real applications, where given a graph pattern Q and a data graph G, computing the set M(Q, G) of matching subgraphs of Q in G. However, many applications like the experts recommendation in social networks, often need to find Top-K matches of a designated node v0, rather than the entire set M(Q, G). Moreover, the existing GPM method for...
This paper addresses requirements from future automotive electronics system concept/design to computing technology or platform filling processing characteristics which will be used in applications of automated driving generation. We cannot completely predict future trends of functionality or application, so it is important to have flexible and scalable computing platform for that generation. The platform...
More and more on-line experiments have been done in E-Commerce in order to understand the behavior of users or customers and then apply the data analysis technique to provide business guidance. One of the techniques is A/B testing. However, there is not clear guidance on the sample size in order for us to have valuable, trustable discovery. The purpose of this work is to find out a way to group customers...
In this short paper, we compare well-known rule/tree classifiers in software defect prediction with the CTC decision tree classifier designed to deal with class imbalanced. It is well-known that most software defect prediction datasets are highly imbalance (non-defective instances outnumber defective ones). In this work, we focused only on tree/rule classifiers as these are capable of explaining the...
This paper addresses requirements from future automotive electronics system concept/design to computing technology or platform filling processing characteristics which will be used in applications of automated driving generation. We cannot completely predict future trends of functionality or application, so it is important to have flexible and scalable computing platform for that generation. The platform...
Soil arching effect is a physical phenomenon that allows self-retain to the soil by mean of discontinuous earth retaining structures used to the construction of foundation piles for high-rise buildings. To analyze this phenomenon, a two-dimensional (2D) simplified analysis is currently used, although it offers a mathematical approximation to the solution of the problem, their results significantly...
The search for the efficiency of the use of time dedicated to an activity of reading academic texts is central to the research that is in progress. A prominent contribution of the research is related to an algorithm that generates questionnaires from those texts. This article presents and discusses the main strategy that subsidizes the concerns involved in the development of such algorithm. The strategy...
Ternary Content Addressable Memory (TCAM) capacity problem is an important issue in Software-Defined Networking. Rule caching is an efficient technique to solve the TCAM capacity problem. However, there exists rule dependency problem in wildcard-rule caching technique. In this paper, we utilize cover-set method to solve the rule dependency problem and propose a wildcard-rule caching algorithm to cache...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.