The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Satellite transmission based on IP may play important role for communication between event site and PPDR centers during large planned scenarios and disaster/unplanned ones. Geostationary SATCOM links that can be installed ad-hoc in any location present reliable and efficient way to transmit IP data even for voice communication based on VoIP. Using different mechanisms that handle multi connections...
This paper analyzes the impact of renewables on the resource adequacy in German electricity market. A system dynamic model is proposed to model the electricity market by considering the uncertainty of renewable generation. The aim is to investigate the impact of the increasing renewables generation and its intermittency on the profitability of new installed capacity and long term investment decisions...
As the network size grows more and more, it becomes difficult to understand the entire network. Complex network theory is used to analyze the characteristics of the current network. Trust management schemes are suggested to understand the entire network security situation. The results of this paper reveal that in order to solve a security problem of a complex network reliably, a security policy needs...
Objective of the paper is to evaluate metrics of automatic evaluation of machine translation output using manual metrics — fluency and adequacy. We tried to answer the question to which extent the manual evaluation correlates with the automatic evaluation of MT output from/to Slovak to/from English. We focused on metrics based on the similarity and statistical principles (WER, PER, CDER and BLEU-n)...
We consider a communication scenario in which the channel undergoes two different classes of attacks at the same time: a passive eavesdropper and an active jammer. This scenario is modeled by the concept of arbitrarily varying wiretap channels (AVWCs), in which the channel varies from one channel use to the other in an unknown and arbitrary manner. It has been shown that uncorrelated codes fail to...
A two-dimensional linear time-invariant system is considered. The two dimensions of its states are observed by one sensor each. Every sensor quantizes its observations into a finite number of messages, using also the other sensor's past decisions. The combined sensor outputs should allow for a bounded estimation error (reliability). For a natural quantizer, we identify the cases where a price in the...
This paper addresses a single-period dual sourcing problem with real option under uncertain supply and demand. A retailer, who faces the uncertain market demand, can source from a low-price but unreliable supplier and an expensive but reliable supplier. In order to manage the supply uncertainties and decrease the cost, the retailer orders product from the unreliable supplier and buys option from the...
Maintaining both reliable and secret communication involves different objectives: ensuring sufficient throughput for reliable communication and ensuring the secrecy of the associated communication. The optimal solution for one of these objectives might not be optimal or even suitable for another objective and thus a question arises as to what is the appropriate criteria for fairly balancing these...
P2P networks constitute the foundation for many scalable and fault-tolerant applications. These networks may consist of millions of peers due to their decentralized design. While each peer advertises the same service interface, the actual data provided by common large-scale P2P applications often yields an imbalance, i.e., particular peer subsets are more frequently contacted than the rest of the...
As the technology for acquiring and storing images becomes more prevalent, we are faced with a growing need to sort and label these images. At this time, computer vision algorithms cannot parse abstract concepts from images like a human. As a result, there may be performance gains possible from the integration of human analysts with computer vision agents. We present an image triage system which facilitates...
Acquiring data is quite easy, at least until it is exploited, when the results usually show the limits due to acquisition errors. At a time where big data sounds the solution to many problems [2], it is important to signify that it is not because you have a lot of data available that its quality may be less important. Data must be reliable, it must be a precise representation of the reality one wants...
This paper presents a new method to recognize the person's identity through their palmprints. Palmprint recognition is among the most reliable physiological characteristics that can be used especially in forensic applications thanks to its simplicity and its ease of use, its user friendliness and high identification reliability. Accordingly, it has gained great popularity within the pattern recognition...
Extensive use of computer network and huge amount of data had led several works to focus on intrusion detection system, which are based on single dataset or to combine multiple detection techniques to analyze detection rate and false positive flag.
The agent computing paradigm is rapidly emerging as one of the powerful technology to deal with the uncertainty in dynamic environment. Recently, traditional learning classifier system are challenged by changes in the context. In this paper, an anticipatory agent based on the Anticipatory Learning Classifier System (ACS) for learning in changing environments is presented. This research aims to develop...
This paper presents a distributed on-line test mechanism that detects stuck-at faults (SAFs) in the channels as well as identifies the faulty channel-wires in an on-chip network (NoC). The proposed test mechanism improves yield and reliability of NoCs at the cost of few test clocks and small performance degradation. Additionally, the mechanism is scalable to large-scale NoCs. We study the impact of...
This paper presents a detailed octorotor model derivation. The full derivation of the rigid octorotor body dynamics based on the Newton-Euler approach including the Gyroscopic effect and motor dynamics is given. We also discuss a generalization of the model thus making it applicable to any symmetric and balanced multirotor aerial vehicle (MAV) system with even number of rotors. Finally, simple stabilization...
Some scholars have already proposed a lot of dominance relation and its corresponding rough model under incomplete information system in order to deal with the problem of preference decision which has incomplete information. In the incomplete information system no matter use any dominance relation to construct a rough set model the result is uncertain. In order to reduce the misclassification caused...
In this paper, we present our prototype system which supports coding of mapping-enhanced SPARQLoid queries for users by providing recommendation mechanisms for both vocabularies and endpoints. Our prototype system aims for reducing the cost for eliciting appropriate ontology mappings and the mapped vocabularies. Furthermore, to make the recommendation of vocabularies and endpoints be widely covered,...
Service Composition is playing a pivotal role in diverse industries to approach more cost effective solutions in an efficient manner. Web service selection is playing a key role in the domain of the composition and it considers as the most important last informant of successful Automatic service composition. Since it is growing the web services in tremendous speed due to the innovation of cloud computing...
In this paper, we propose a tourism category classification method based on estimation of reliable decision. The proposed method performs tourism category classification using location, visual, and textual tag features obtained from tourism images in image sharing services. As the biggest contribution of this paper, the proposed method performs successful classification based on two classification...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.