The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Power policies are widely applied at computer systems such as desktops, notebooks, and smartphones. For example, the timeout policy to turn off the display. A power management policy must be tested by measuring the power consumption of an experimental platform running workloads. Such tests must be fast enough to feedback the development process with valuable information about the power policy performance...
Qualitative Mapping(QM) is the basis of Property Theory, by which Conversion Degree Functions are induced. Furtherly Inverse Conversion Degree Functions are proposed used to convert qualitative description into quantitative value for some attributes of objects according to the degree to which the qualitative description belongs. Finally Qualitative Membership Degree Matrix based on the proportion...
Our scientific community faces a sort of paradox. A large bulk of work has been done on data-oriented techniques devised to improve peer reputation and knowledge extraction from data, so as to improve trustworthiness of digital services involving coordination and cooperation among heterogeneous peers. But, perhaps surprisingly, to the best of our knowledge, such techniques have rarely been applied...
Due to the prevalence of sensors such as security cameras or environmental monitoring, sensor data stream delivery which means delivering the observed data continuously attracts great attention. Currently, the methods to distribute communication loads by relay nodes in the case of delivering the sensor data streams that have different data delivery cycles are proposed. However, in the existing methods,...
Since adversaries may spoof their source IPs in their attacks, traceback schemes have been proposed to identify the attack source. Among these methods, Hybrid IP traceback schemes fuse packet marking and packet logging, using only one packet for traceback and reducing the storage requirements during packet logging. However, if a hybrid traceback scheme logs a packet's digests on a router, the router's...
Accurate detection of voids in solder bumps on ball grid arrays (BGAs) is important for improving device quality. Radiographic imaging is commonly used to inspect BGA packages incorporate into LSI circuits. In the case of conventional method, imaging is normally done four times, and the images obtained are averaged to reduce noises. We have developed a nonnegative matrix factorization method for detecting...
A simple technique for accurate and low-cost modeling of microwave structures is presented. Our approach utilizes response surface approximation at the level of suitably selected response features rather than direct approximation of frequency responses (e.g., S-parameters) of the structure of interest. By exploiting the fact that dependence of the features on designable parameters is much less nonlinear...
In this paper, we propose a new texture descriptor GLBP (Gradient LBP) for age group estimation. LBP exploits the only signs of the gradients between a center pixel and its surrounding pixels in a local patch and it does not reflect their magnitudes. This fails LBP to describe local signal structure in detail. Motivated by this observation, we propose so called GLBP, which considers the magnitude...
What is an ultimately evolved form of cloud computing environment? The solution should have two important features; “Fine-Granular” and “Participating”. To realize such an attractive and feasible solution with the two features, we advocate a “participating fine-granular cloud computing platform” that a large number of personal or small company level resource suppliers participates in, configures and...
To solve the problem of vision diminishing and lumbar cervical vertebra disease caused by using computers, we design an intelligent fatigue health monitoring system based on computer with mouse and its software. By designing the algorithm and making relevant research, the system can make daily health evaluation and fatigue prompt to computer users. We adopt the embedded design method to enable the...
The majority of encoder signal process circuits only support one type of the specific photoelectric encoder, either absolute encoder or incremental encoder. In order to realize the compatibility for both two types of encoders simultaneously, a novel encoder signal process circuit based on FPGA is presented in this paper. Firstly, a series of universal functions are analyzed and demonstrated. On this...
In the Cognitive Radio Networks (CRNs), the Secondary Users (SUs) wait the release of a channel, to transmit their data packets. During the waiting phase, each SU can receive other packets that are organized on its own queue. Upon the release of a channel, the SUs begin the transmission. To avoid interference problems and conflict between SUs, it is necessary to implement a scheduler able to manage...
This paper deals with information education in development of a knowledge-based society in Croatia. The basic objective of the paper is focused on systematic comprehension and analysis of the situation related to information education and its tendency. Hence, some concepts and models for IT education in Croatia were propounded. Accordingly, these tasks were fully accomplished. Application of ICT has...
Given an incompletely specified index generation function, the number of variables to represent the function can often be reduced by properly assigning don't care values. In this paper, we derive a lower bound on the number of variables necessary to represent a given incompletely specified index generation function. We also derive three properties of incompletely specified index generation functions...
Critical situations such as running into an impasse and failure of decision-making during collaborative work are often hard to recognize by team members themselves. Such critical situations drive the collaborative work into poor continuity. Remote collaboration is even harder to stay active due to communication difficulty in decision-making. This study argues an effective visualization method for...
Event matching is the process of checking high volumes of events against large numbers of subscriptions and is a fundamental issue for the overall performance of a large-scale distributed publish/subscribe system. Most existing algorithms are based on counting satisfied component constraints in each subscription. As the scale of a system grows, these algorithms inevitably suffer from performance degradation...
In order to efficiently achieve fault tolerance in cloud computing, large-scale data centers generally leverage remote backups to improve system reliability. Due to longdistance and expensive network transmission, the backups incur heavy communication overheads and potential errors. To address this important problem, we propose an efficient remote communication service, called Neptune. Neptune efficiently...
The ubiquitous use of RFID tags raises concern about potential security risks in RFID systems. Because low-cost tags are extremely resource-constrained devices, common security mechanisms adopted in resource-rich equipment such as computers are no longer applicable to them. Hence, one challenging research topic is to design a lightweight cipher that is suitable for low-cost RFID tags. Traditional...
As a space-efficient approach to data archive and backup, data deduplication is becoming increasingly popular in storage systems. However, as the data growing rapidly in data centers, single-node storage node is no longer be able to provide the corresponding throughput and capacities as expected. Building deduplication clusters is considered as a promising strategy to leverage such bottle-neck on...
Batch recall is a practically important problem for most industry manufacturers. The batches of products which contain flawed parts need to be recalled by manufacturers in time to prevent further economic and health loss. Accurate batch recall could be a challenging issue as flawed parts may have already been integrated into a large number of products and distributed to customers. The recent development...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.