The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In today's cloud computing platforms, more and more users are now working or collaborating in multi-cloud environment, in which collaborators, clouds, computing nodes may belong to different institutions or organizations. Those different organizations might have their own policies. Security is still a big concern in cloud computing. To help cloud vendors and customers to detect and prevent from being...
A multiagent system (MAS) is a computer based model of multiple interacting intelligent agents within an environment. One of the key aspects of such models is the ability to reproduce the results in different software and hardware. In general, the simulation of these models are carried out under floating point standards. It is well known that by limitation of computer arithmetic, the results may be...
The derivatives in the transmission-line equation can be approximated by difference formula which must satisfy CFL condition. LOD-FDTD provides an unconditional stability method to get the updating equation by alternately solving for the implicit and explicit equation, which improves the computational efficiency greatly, and saves computer resources and memory. In this paper, simulation results demonstrate...
Passive resistive circuit models are used to derive bounds for the solution of strictly diagonally dominant symmetric systems of algebraic equations with all of the off-diagonal entries being of the same sign and all diagonal and right-hand side entries being of opposite sign. The values of the unknowns are in an interval obtained from [0,1] by performing an appropriate scaling of the right-hand side...
In this paper. Berenger's twelve split-formtime-domain-PML equations have been reduced to only six unsplit-form equations by rearranging the constitutive parameters of the PML region. The modified PML equations have two advantages, viz., a) computer time and memory savings and, b) ease of implementation. The disadvantage is that the interface between free space and PML region is no longer perfectly...
Construction of field lines for vector fields can be performed by a variety of analytical or graphical methods. Except for a small number of simple geometries, where closed analytical expressions can be obtained, the shape of the field lines is determined by numerical computation or evaluated approximately by physical modelling techniques [1]. In this paper, we consider irrotational vector fields...
We have been investigating behaviors of the logistic map over integers for constructing a pseudorandom number generator with the map. In the presented paper, we will give a 0/1-occurrence rate per bit for values by the logistic map over integers, and discuss suitable bit positions of a bit extraction for getting a pseudorandom bit sequence. First, we will show characteristic behaviors of occurrence...
DBlock is a block cipher proposed by Wu et al. in 2015. It has been reported that DBlock-128 has a 8-round saturation characteristic using 96-th order differential. Wu et al. guessed that the 11-round DBlock attack is possible by using this characteristic. This paper shows a new higher order differential of DBlock. By computer experiment, we found a new 6-round saturation characteristic of DBlock-192/256...
In this paper, a feature selection system is introduced applies the whale optimization algorithm (WOA). WOA is a recently introduced meta-heuristic optimization algorithm that mimics the natural behavior of the humpback whales. The proposed model applies the wrapper-based method to reach the optimal subset of features. This technique was applied to find the best feature subset that maximizes the accuracy...
As it is known, computer users who notice the existence of electronic viruses will take active measures to defend against the viruses before they prevail on networks. However, the most of former computer virus epidemic models ignore the human vigilance completely. This paper aims to understand how the human awareness prohibits virus spreading. So a new computer virus propagation model where the viral...
Computing in Cloud is a topical skill that disquiet with allocation of computing resources and services on pay- per- use basis. To access remote computers, scheduling is a key task. Scheduling of task is a NP-complete problem. It is additional obscure in cloud computing atmosphere. To achieve improved performance of cloud resource, successful and proficient scheduling methodologies are needed. This...
In the recent years', image processing is becoming an important field in computer science. Also, interaction between human and computer is in increasing rate. Nowadays image processing used in many application for example application like measuring the distance between systems that consist of a camera and objects around the system using Stereo vision. Some previous studies use pixel by pixel search...
Galois field (GF) arithmetic is used to implement critical arithmetic components in communication and security-related hardware, and verification of such components is of prime importance. Current techniques for formally verifying such components are based on computer algebra methods that proved successful in verification of integer arithmetic circuits. However, these methods are sequential in nature...
Air Data Computer (ADC) is an electronics device computes air data flight parameters. The objective of this paper is to analyze, simulate, and propose hardware implementation module for the Air Data Computer. Simulation of ADC model has been faced by two problems. The first one was to choose true values of dynamic temperature because it depends on flight altitude and airspeed. The second problem is...
The paper presents developed User-Defined Functions, that are designed for identification of linear periodically-time-variable circuits and inverse transformation of signals by Fourier and Laplace. Such User-Defined Functions are addition to the system UDF MAOPCs, which is designed for modeling, multivariate analysis and optimization of linear periodically-time variable circuits in the frequency and...
The effective integrated approach for modeling of functional devices (FD), airborne computers and embedded systems on the devices design stage is proposed. This approach can be used at the manufacturers, which have a full production cycle, especially in the following industrial systems: instruments for onboard information processing and control, space systems, aviation systems and others. In the traditional...
In recent years, the search of efficient and non-invasive methods for the diagnosis of diseases has grown among the scientific community. One of the explored areas for that purpose is the analysis of the pupillary response to light stimulus, obtaining results in areas such Diabetes, Alzheimer, Neurological Disorders, Melancholia and other different physiological states. However, each of those investigations...
This paper is devoted to the development of mathematical model and information technology for computer analysis of medical diseases based on investigations of cardiograms. Authors propose to use cardiogram recognition algorithm which is synthesized on the mathematical base of nonlinear canonical decomposition of random sequence. The automation process of cardiograms recognition, analysis, classification...
The article describes the development of a system for wireless control of mechatronic objects and anthropomorphic robots. The main attention is paid to the man-machine interface on the basis of MEMS sensors. Given the structure of the developed system with a description of the main blocks. It describes the communication interfaces used. Substantiates the benefits of the proposed technical solutions.
Optimal control is one of the most popular and efficient control strategies that have been widely used in both classical and quantum systems. Inspired by the recent progresses of quantum algorithms, we find that optimal control protocols can be exponentially accelerated by embedding a quantum controller in the control loop instead of the classical controller. This is the first time to our knowledge...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.