The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Joint clustering of multiple networks has been shown to be more accurate than performing clustering on individual networks separately. Many multi-view and multi-domain network clustering methods have been developed for joint multi-network clustering. These methods typically assume there is a common clustering structure shared by all networks, and different networks can provide complementary information...
Devices that monitor and measure various system parameters or physical phenomena form an integral part of cyber-physical systems. Such devices usually operate continuously and gather important data that is often critical for the operation of the underlying system. Thus, it becomes important to understand and detect abnormal or malicious device behavior, false injection of data by an adversary, or...
Electric load profile forecasting is among the most important tasks in power system operation. This task has been performed reasonably well with minimal disruption from renewables over the past decades. The expected high penetration of renewables in the system is challenging this classical task. Moreover, the blossom of demand side management programs warrants the necessity of load profile forecasting...
The aim of this paper is to compare the complexity of three simple sort algorithm; selection sort algorithm, bubble sort algorithm, and insertion sort algorithm. The measurement of the complexity is based on control flow structure and time processing. The control flow structure is illustrated into flowgraph and measured by number of out-degree and number of in-degree. The algorithm is coded in C programming...
SDN orchestration, the problem of integrating and deploying multiple network control functions (NCFs) while minimizing suboptimal network states that can result from competing NCF objectives, is a challenging open problem. In this work, we formulate SDN orchestration as a multiobjective optimization problem, and present an evolutionary approach designed to explore the NCF tradeoff space comprehensively...
Large-scale, carrier-grade Network Functions Virtualisation (NFV) services are expected to involve a significant number of Virtual Network Functions, deployed across multiple Points-of-Presence (PoPs) and possibly in heterogeneous infrastructures. While proper monitoring is crucial for the commercial viability of NFV services, effectively and efficiently monitoring a huge number of VNF instances,...
Education and technology have a very close relationship and it cannot be denied. Education is now very depending with technology and always keeps evolving to support each other. Teaching methods are now drastically change because the present of rapid development of technology. The way of teaching is now shifting due to the available technology and the students, parents and the society no longer accept...
In the recent years the demand for real time video delivery has been increased. Hence, real time video distributers must ensure that the end-user quality-of-service is met (QoS). There are multiple conditions which can have influence on the transmission of video content, such as type of transmission, channel capacity, data loss, coding etc. Data loss mostly occurs in packet switched networks. This...
Pedestrian detection is an active problem in computer vision research, with applications in robotics, self-driving cars and surveillance. It involves generating bounding boxes to indicate the location of every pedestrian in an input image. This paper proposes a method to augment a basic pedestrian detector with a Convolutional Neural Network. An implementation of the proposed algorithm was trained...
Software-Defined Networking (SDN) provides the potential for highly configurable, automated networks by separating the control and forwarding functions of network devices. While SDN appears to have many potential benefits for coalition tactical networking, including rapid reconfigurability and improved network situational awareness, there are significant obstacles to overcome. In particular, the low...
In a Wireless Sensor Network (WSN) Nodes are distributed to monitor an area of interest such as a military battlefield, and transmit their data to in-situ Base-Station (BS) through multi-hop paths. In addition to collecting and processing the sensor data, the BS performs network management tasks. Due to such an important role, an adversary would try to locate the BS and target it with Denial-of-Service...
Spatial visualization (SV) skills are both learnable and linked to student success in engineering. Our work was motivated by previous research revealing a gender gap in SV skills that favors male engineering students. A multi-modal SV workshop intervention was incorporated into a first-year engineering projects course with the goal of fostering SV skills for all students. An analysis of SV skills,...
A case study on Colorado Technical University's development and release of its CTU Mobile app for students. This paper includes mobile user research findings, functionality objectives, KPIs underway to evaluate adoption and impact, and best practices for universities considering a mobile app.
Objective of the paper is to evaluate metrics of automatic evaluation of machine translation output using manual metrics — fluency and adequacy. We tried to answer the question to which extent the manual evaluation correlates with the automatic evaluation of MT output from/to Slovak to/from English. We focused on metrics based on the similarity and statistical principles (WER, PER, CDER and BLEU-n)...
Nowadays, smart meters are capable of collecting, processing, storing, and reporting users' energy consumption data with high fidelity. While facilitating a wide variety of applications such as demand response and anomaly detection, smart meter data exposes users to the risks of revealing sensitive information including occupancy states and activity patterns. Among privacy-preserving data collection...
Space-filling curves (SFCs) are straightforward and efficient methods for a sparse space clustering. They are utilized in research areas like classification, computer vision, computer graphics and/or machine learning. Most of the SFCs are based on a regular orthogonal grid. Generally, a hierarchical properties of Quad-trees (2D) or Octrees (n-dimensional) are utilized for a vertex hashing. However,...
This paper introduces a new approach to Data Clustering on interval-valued data. Nowadays dissimilarity measures for interval-valued data uses representative point distance. It was defined the Range City Block metric. Interval-valued input distance matrix is used to process hierarchical clustering by single linkage with partial ordering. The new method based on the Range City Block Metric can allows...
This paper presents a distributed on-line test mechanism that detects stuck-at faults (SAFs) in the channels as well as identifies the faulty channel-wires in an on-chip network (NoC). The proposed test mechanism improves yield and reliability of NoCs at the cost of few test clocks and small performance degradation. Additionally, the mechanism is scalable to large-scale NoCs. We study the impact of...
Due to the large amount of videos generated through several data sources, the development of efficient mechanisms for storing, indexing, retrieving and visualizing their content is a challenging task. Temporal video segmentation is the automatic process of detecting transitions in video sequences, which is a fundamental step in the analysis of video content. This work proposes and evaluates an improved...
A well defined testing strategy is essential for any software development project. Testing efforts need to be carefully planed and executed in order to ensure effectiveness. Programming failures can represent a high risk for business. In order to mitigate such risk, companies have been increasingly investing more resources on software testing.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.