Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Detection and isolation of link failures in directed networks of LTI systems have been the focus of our previous study. Our results relate the failure of links in the network to jump discontinuities in the derivatives of the output responses of the nodes and exploit this relation to propose failure detection and isolation (FDI) techniques, accordingly. In this work, we consider these results in the...
Program slicing has numerous applications in software engineering activities like debugging, testing, maintenance, model checking etc. The main objective of this paper is to automate the generation of System Dependency Graphs (SDG) for aspect-oriented programs to efficiently compute accurate slices. The construction of SDG is automated by analysing the byte code of aspect-oriented programs that incorporates...
In this paper, we introduce a pack-centric approach to data center resource management by abstracting a system as a pack of resources and considering the mapping of these packs onto physical data center resource groups, called swads. The assignment of packs/VMs to swads/PMs is formulated as an integer optimization problem that can capture constraints related to the available resources, data center...
The main objective of this study is to maximize expected revenues of a convention hall through dynamic booking management. By dynamically accepting booking requests, the proposed method can improve facility utilization and expected revenue. This research assumes random arrival of booking requests, and each booking request requires a different time span. Since event setup costs are high, any booking...
For many Internet applications, the contents are built based on multiple data sources that change continually, and yet the presentation formats have to be tailored according to various user profiles. This paper investigates the dynamic content applications that are modeled as workflows of XML objects. Each content object can be constructed from its predecessors by executing the transformation scripts...
This paper presents a novel approach to enable frequent computational cycles in online dynamic security assessment by using the terms of the transient energy function (TEF) as input features to a machine learning algorithm. The aim is to train a single classifier that is capable of classifying stable and unstable operating points independent of the contingency. The network is trained based on the...
This work models the traffic congestion minimization as the multicommodity flow problem, which minimizes the amount of vehicles that travels in the same streets. Based on two constructive heuristics proposed in this study (Random Routes and Sorted Routes), we have developed and evaluated four new heuristics, being two local search and two metaheuristics of reactive GRASP. The results have shown that...
A wireless sensor network usually has a large amount of nodes deployed in a area to report ambient reading, to detect abnormal events, or to monitor the region. Each sensor performs several tasks, such as computing, sensing and communicating. A node equipped with multiple sensors is able to participate in many sensing tasks to improve measurement accuracy. However, the contribution a new node can...
Over the past decades the pico/nano-satellite (PNS) has gradually become an important direction of small satellites. As a crucial subsystem of PNS, the attitude determination and control system (ADCS) should pass a full set of strict ground tests before launch. Due to the low cost and short period of PNS manufacturing process, as well as the requirement of “test while designing”, this paper presents...
Introducing the principle of symbolization and conceptualization, we present the algorithm for evolution of language of the machine mind. We verify the algorithm by sequential program in Haskell, introducing intermediate and output forms of language produced in each algorithm step. The output form is a fine-grained parallel and non-redundant structure of the machine mind language in a supercombinator...
Rapid growth in the cache sizes of Chip Multiprocessors (CMPs) to support high performance applications will lead to increase in wire-delays and unexpected access latencies. NUCA architectures help in managing the capacity and access time for such larger cache designs. Static NUCA (S-NUCA) has a fixed address mapping policy whereas dynamic NUCA (D-NUCA) allows blocks to relocate nearer to the processing...
Hierarchical graphs propose an important class of graphs for modeling many real applications in software and information visualization. Actually, the ability to construct area-efficient drawings is essential in many practical visualization applications. In this paper, we consider the problem of the drawing area needed to draw a hierarchical graph in the grid. We applied practical analysis in order...
Every human being has predefined movement in their regular social life. This predefined movement of user is very much useful in cellular network. Using supervise learning methods we can able to find out mobility patterns of mobile users in cellular network, which is useful to divide mobile users in various categories. Based on these categories we can develop algorithms which can help cellular network...
Approximate string matching is the problem of finding all factors of a text t of length n with a distance at most k from a pattern x of length m ≤ n. Fixed-length approximate string matching is the problem of finding all factors of a text t of length n with a distance at most k from any factor of length h of a pattern x of length m ≤ n, where h ≤ m. It is thus a generalisation...
Though multi-agent formation and consensus have been studied intensively recently, very few of the research focuses on their engineering realization using rotor-craft unmanned air vehicle (UAV) as the basic platform. Some assumptions in many theoretical study present challenges in engineering realization, such as the over-simplified dynamic model or sensor model of each agent. In this paper, we present...
As mobiles become a ubiquitous, they are used more and more for operations that may involve sensitive data or huge amounts of money. The mobile is also increasingly being used as the tool of preference for browsing and using the Internet. Hence, new security measures must be developed to support increased functionality of these devices, to protect users in the case of any mishap. Authentication using...
Online signature recognition is one of the important behavioral biometric trait. This signature has information of x, y, z variations, pressure, azimuth of pen tip, altitude of pen tip. This makes online handwritten signature based biometric system more accurate than the static ones. In this paper new set of features are proposed for online or dynamic signature recognition. Geometric centers, Grid...
Cloud computing provides attractive solutions for dispatching services over the Internet. With the increase of more and more Internet users, the job of allocating the resources by the cloud providers has become a challenging task. In this paper, a new technique called Drip Based Resource Allocation (DBRA) is proposed for allocating cloud resources or Physical Machines (PMs) to the incoming jobs using...
Cloud computing is increasingly popular in recent years. As an application of cloud computing, cloud workflow is widely applied in scientific research and commercial field. And the cloud workflow scheduling problem is a major concern of the research on cloud workflow application. To study the state of the art of cloud workflow scheduling, some efforts are made and presented in this paper. Firstly,...
For a long time now, researchers have worked on defining different metrics able to characterize the importance of nodes in networks. Among them, centrality measures have proved to be pertinent as they relate the position of a node in the structure to its ability to diffuse an information efficiently. The case of dynamic networks, in which nodes and links appear and disappear over time, led the community...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.