The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Scientific and accurate cultivated quality grade results are an important guarantee for applications. However, the phenomenon of abnormal cultivated land quality is always occurred due to the error of investigation or computation, so exploring effective method to inspect abnormal data of the grade results is an important problem to be solved. Cultivated land quality grade results of Wuhan Hannan district...
In this paper a new vulnerability detecting method is proposed to detect buffer boundary violations. The main idea is to use the metric of array index manipulation rather than using any heuristic method. We employ a SVM-based classifier to classify the vulnerable functions and innocent functions. Then the vulnerable functions are fed to function call graph guided symbolic execution to precisely determine...
Ternary content addressable memories (TCAMs) are special memories which are widely used in high-speed network applications such as routers, firewalls, and network address translators. In high-reliability network applications such as aerospace and defense systems, soft-error tolerant TCAMs are indispensable to prevent data corruption or faults caused by radiation. This paper proposes a novel soft-error...
Major problem of heavily loaded system is, transmission networks are operating close to their limit which causes increase in stress on transmission lines. This problem was solved by the addition of isolated and individually controlled devices such as FACTS to the existing networks. This paper focuses on FACTS device-TCSC (Thyristor Controlled Series Capacitor) and its optimal location in the power...
The present study focuses an optimal modeling of an integrated renewable energy system by considering locally available different renewable energy sources namely micro hydro, solar, wind, biomass and biogas. Three decision variables, namely total active area of the PV panels, total swept area of wind turbine blades and state of charge (SOC) of battery system have been considered for optimization of...
In the Scrum process, Product Backlog consists of a prioritized list of desired software functionalities recorded in the form of user stories. As the software product is developed, new functionalities are discovered and included in the Product Backlog. However, in large-scale projects, duplicate stories may arise because of the large number of generated stories, the lack of communication among team...
Given the growing request for reusing raw material in new manufactured products in the plastics industry, the present study analyzes the effect of the concentration of recycled materials and pigments on the rheological properties of the polymer blend. It was quantified and analyzed in a statistical way the significance of the effects that these components produce in the rheological properties, such...
The paper describes the testing of an obstacle-detection radar installed on the steerable head of a Horizontal Directional Drilling (HDD) equipment; the system was developed during the ORFEUS (Operational Radar For Every drill string Under the Street) project co-funded by the European Commission under the 7th Framework programme. HDD is a trenchless method of installing pipes and cables of various...
This paper proposes a cost-effective index poisoning scheme for unstructured Peer-to-Peer (P2P) file sharing systems. Index poisoning is a technique which alters the index of illegal shared files so that they could not be reached by any peer which wishes to access them through the P2P. The proposed scheme is a combination of the following three periodical injections of the altered index: 1) injection...
The shares are considered as a fundamental part of the equity market, as their values change over time as a result of offer and demand, and the effect of market volatility. This volatility makes the trading of shares on a stock exchange is an extremely difficult task. That is why in this article develops and analyzes a system for automatic trading shares, which incorporates a series of progressive...
In the nuclear power engineering, methods of detection and diagnostics of failures, as well as methods of information support of human operators in order to improve the efficiency and reliability of the operation, play increasing role. A task that is solved within the information support is the task of calculating technical and economical indexes, which the paper is devoted to.
To find opportunities for applying prefactoring, several techniques for detecting bad smells in source code have been proposed. Existing smell detectors are often unsuitable for developers who have a specific context because these detectors do not consider their current context and output the results that are mixed with both smells that are and are not related to such context. Consequently, the developers...
The traditional sequential ways of spatial data processing lags in the efficiency of executing the queries. The modern parallel processing technique, the MapReduce, is used extensively for big data analysis. This paper analyzes the synthetic large spatial data-set on the MapReduce and ArcGIS to check the similarity of the outputs generated through the parallel framework and the specialized GIS software...
In this research, we investigate the possibility of applying ranking task activity in teaching and learning software engineering courses. We introduce three types of ranking tasks, conceptual-, contextual- and sequential ranking questions, which cover most core topics such as requirement analysis, architecture design and quality validation in the course. We have also done experiments on a group of...
Traffic flowing through a software defined network is vulnerable to disruptions caused by malicious switches. The malicious behaviors are diverse such as dropping traffic, adding traffic or modifying it. A switch could be malicious or otherwise dysfunctional or misconfigured. A lot of work in SDN has addressed the problem by securing the control plane and having it validate network wide properties...
This paper presents an application of clustering algorithms for streaming smart grid datasets. The authors use a framework that includes a combination of an openPDC and statistical software (R) platform to acquire Synchrophasor data to carry out the clustering process. The clustering operations on streaming synchrophasor data enables operators to detect any anomalies or outages for better decision...
The classical, popular Hungarian algorithm for solving the “optimum assignment” problems (with its broad engineering/science applications) has been well-documented in the literature. Other (more efficient) variations of the Hungarian algorithm have also been extensively studied by the research communities. In this paper, the basic Hungarian algorithm is revisited, with the ultimate goal of developing...
This paper explores the notion of self-agency in developing agent-based systems that support human-to-human communication. We first point out that a challenge in developing such agent-based systems is to successfully transfer conversational experiences that agents gain to their users. We then propose that the sense of self-agency is a key to address this challenge. We also show an experimental system...
The paper presents the current state of art of a smart Distribution Management System (DMS) environment based on the evolution of a traditional Supervision Control and Data Acquisition (SCADA) system and the integration with a Network Calculation Algorithm System (NCAS). The tool is designed to perform a sensible management, on-line and off-line, of a distribution system with a high penetration of...
With the exponential growth of digital cameras and the aid of powerful video editing softwares, videos with various resolutions become ever more popular. Therefore, there is a great demand for video coding schemes supporting arbitrary resolutions with higher efficiency. In the latest standard, only a simple padding with direct copying is adopted to meet this requirement, and the coding efficiency...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.