The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Application of the underwater target positioning system is widely used, so the underwater target passive location technology research has also become a hotspot. The underwater target passive location technology involves computer technology, digital signal processing technology, microelectronic technology and array technology and so on. This paper develops an intensive research on the related technologies...
The National Synchrotron Light Source II (NSLSII) at Brookhaven National Laboratory offers a large variety of synchrotron based imaging techniques that provide users with structural and chemical information of materials at the nanoscale. Multiple imaging techniques such as light microscopy, infrared imaging and X-ray fluorescence microscopy are commonly used to correlate information from the same...
VLBI is a technique that synthesizes the signals of several telescopes to achieve a much higher resolution. Correlator is a key component in the whole VLBI system. This paper introduces the parallel implementation of the CVN(Chinese VLBI Network) software correlator. High performance computing algorithms are used to accelerate the correlation process.
In electron microscope tomography, the alignment of tilt series images is a major determining factor of resolution in the 3D reconstruction. One method of tilt alignment uses gold beads deposited on or in the specimen as the fiducial markers. This paper describes an "auto pick" software system which can pick markers automatically. It uses a cross correlation function to find out the shift...
Organizational identification is a perception that individual is consistent with the organization. The purpose of this paper was to explore the status of university teachers' organizational identification and the influencing factors by applying the computational statistics software SPSS19.0 to analyze the data. Method: 535 university teachers were investigated with two questionnaires and the data...
Agile software development describes those methods with iterative and incremental development. This development method came into view to overcome the drawbacks of traditional development methods. Although agile development methods have become very popular since the introduction of the Agile Manifesto in 2001, however, there is an ongoing debate about the strengths and weakness of these methods in...
Nowadays concurrent programming is in large demand. The inherent support for concurrency is therefore increasingly important in programming languages. As for C++, an abundance of standard concurrency constructs have been supported since C++11. However, to date there is little work investigating how these constructs are actually used in developing real software. In this paper, we perform an empirical...
SATD (Sum of Absolute Transformed Difference) based cost function is adopted to reduce the complexity of HEVC (High Efficiency video coding) codec by selecting up to 8 intra modes for RDO (Rate Distortion Optimization) process. However, transform of all 35 modes, and RDO of 8 modes is bottleneck in intra mode complexity reduction. In this paper, a hybrid approach for reducing intra coding complexity...
This paper shows the analysis of the angles in the hip, knee and ankle. In a complete cycle of pedaling, are obtained the superior values, following a protocol totally specified in the document. Through the use of an acquisition software, named Kinovea®. The data of each one of the angles are set; in this manner the data information can be exported to Matlab®. In Matlab® Software the analysis of the...
Software misconfigurations are responsible for a substantial part of today's system failures, causing about one-quarter of all customer-reported issues. Identifying their root causes can be costly in terms of time and human resources. We present an approach to automatically pinpoint such defects without error reproduction. It uses static analysis to infer the correlation degree between each configuration...
The presence of anti-patterns and code smells can affect adversely software evolution and quality. Recent work has shown that code smells that appear together in the same file (i.e., collocated smells) can interact with each other, leading to various types of maintenance issues and/or to the intensification of negative effects. It has also been found that code smell interactions can occur across coupled...
Information systems can be targeted by different types of attacks. Some of them are easily detected (like an DDOS targeting the system) while others are more stealthy and consist in successive attacks steps that compromise different parts of the targeted system. The alarm referring to detected attack steps are often hidden in a tremendous amount of notifications that include false alarms. Alert correlators...
When analysing software metrics, users find that visualisation tools lack support for (1) the detection of patterns within metrics; and (2) enabling analysis of software corpora. In this paper we present Explora, a visualisation tool designed for the simultaneous analysis of multiple metrics of systems in software corpora. Explora incorporates a novel lightweight visualisation technique called PolyGrid...
Due to changes in the development practices at Axis Communications, towards continuous integration, faster regression testing feedback is needed. The current automated regression test suite takes approximately seven hours to run which prevents developers from integrating code changes several times a day as preferred. Therefore we want to implement a highly selective yet accurate regression testing...
In view of the lack of semantic information description in commonly-used knowledge representation modes such as framework and object-oriented mode, the domain ontology of electronic protective equipment fault diagnosis is designed by analyzing and summarizing the characteristics of the equipment fault cases. Considering that the traditional VSM (vector space model) ignores the role of the position...
Large cluster systems are composed of complex, interacting hardware and software components. Components, or the interactions between components, may fail due to many different reasons, leading to the eventual failure of executing jobs. This paper investigates an open question about failure diagnosis: What are the characteristics of the errors that lead to cluster system failures? To this end, this...
In this paper, we propose a method that skips the complex encoding processes of coding unit (CU) for HEVC intra frame coding. To speed-up the encoding process that recursively explore all sizes of CUs, most researchers have exploited spatial information thus far. On the other hand, the temporal correlation among frames has not been thoroughly investigated. We exploited the temporal correlation as...
This paper describes study results regarding a feature detection scheme using a Cyclic Prefix (CP) that is appended to an OFDM signal. The detection scheme is especially important when used as a sensing technology in advanced systems such as Device-to-Device communication. Herein, several performance characteristics of the signal processing involved in the feature detection are described with an analytical...
Software bugs contribute to the cost of ownership for consumers in a software-driven society and can potentially lead to devastating failures. Software testing, including functional testing and structural testing, remains a common method for uncovering faults and assessing dependability of software systems. To enhance testing effectiveness, the developed artifacts (requirements, code) must be designed...
The Maintainability Index (MI) metric was proposed in the early nineties to gauge ease of code maintenance. A high value of MI indicates well-constructed code which is easy to maintain and a low MI, the opposite. The metric has been criticized in the past and more recently for its applicability to code and validity more generally. Very few studies however have explored whether the MI correlates strongly...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.