The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents a design of unique wireless remote controller, which utilizes WiFi wireless communication technology, providing a hand-held remote controller for an implantable stimulator. Based on MCU STC89C52RC, the controller is realized as a control terminal which issues instructions through WiFi module and receives the returned information, so that the controller realizes the control of the...
Human's computation power can be harnessed using the so-called Cyber-Physical-Social System (CPSS), which contains a mix of human-based and machine-based compute units. The inherent problem of human-based computation is its exposure to inevitable human errors; hence, it is not trivial to obtain a reliable CPSS. In contrast, many works for obtaining reliable machine-based system have been carried out...
The feasibility, scalability and performance of Internet-oriented Software Defined Network (SDN) are confronted with severe challenge, so it needs multiple controllers that influence every aspect of SDN performance. An effective placement algorithm of these controllers is especially important. In this paper, we formulate the Multiobjective Optimization Controller Placement (MOCP) problem and focus...
This article discusses the development of methodology of countering attacks based on the use of Bayes' theorem and normal distribution, where the workload, node residual energy, as well as an analysis of successful and unsuccessful network events used to compute the trust level. Estimation of the workload and the residual energy allows detecting attacks such as "Denial of Service", "Sybil"...
This research realizes the needs for organizations to increase its readiness towards the implementation of knowledge management. This study specifically analyzes factors related to knowledge management tools utilization within the organization as antecedents towards knowledge management implementation readiness. Data were gathered from 57 respondents whom were employees of a leading software development...
Difficult-to-machine materials is widely used in aerospace. Titanium alloy (Ti-6Al-4V) by using computer numerical control (CNC) machining is studied in order to improve the processing efficiency of Ti-6Al-4V. The wear amount of cutting tool as a key part of CNC is one of the most important representation for the machining efficiency and the stability for cutting difficult-to machine materials. An...
Proposed is procedure of evaluating reliability of pipelines containing crack-like defects, in stochastic setting and under consideration of the loading parameters spatial-temporal variation as well as the structure material crack resistance specifications scatter. Its basis is formed by the interpolation polynomials and Monte-Carlo methods designed for solving the statistical dynamics tasks. The...
This paper presents a summary and analysis deployment of a secure Intelligent Electronic Device (IED) management system at two different utilities in North America. Each of these utilities began their investigation into technologies and methodologies for securing their system for North America Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) standards. This report is intended...
The purpose of this study was to incorporate a new format of C-Test, the S-Test, as part of the Computer-Based Test of English Competence (CB TEC). The subjects for the main study were 209 voluntary graduate students at the National Institution of Development Administration, Bangkok, Thailand. Two forms of CB TEC (Form A and Form B), with the only difference in Section II, were used with 105 participants...
Software Projects are developed with the prior requirements and should be capable to complete on time under a fixed budget but it gets late to delivered, gets over-budget and even not able to meet user expectations. In agile approach, the estimation of software depends on expert opinion or on any historical data which is used as the input to previous methods like planning poker. The accuracy in estimation...
The process of testing any software system is an atrocious task which indeed consumes a ton of effort, and expensive also. Required effort and time to do adequate as well as effective testing get bigger, as the software gets more complexed that can lead to swarm over the project budget or some test cases left uncovered or delay in completion. A suitably generated test suite does not only locate errors...
Software development is an essential field today. The advancement in software systems leads to risk of them being exposed to defects. It is important to predict the defects well in advance in order to help the researchers and developers to build cost effective and reliable software. Defect prediction models extract information about the software from its past releases and predict the occurrence of...
Security and reliability are crucial requirements of modern information systems. Therefore, appropriate error detection mechanisms are necessary, in particular in systems processing confidential or private information, i.e. modern encryptors. This paper discusses error detection in software and hardware encryption. Cryptography basics, error detection algorithms and concurrent error detection methods...
In 2015, NetFlix made the headlines with nearly 37% of Internet traffic being caused by their streaming applications1. The trend towards similar applications is further accelerated by increasing number of mobile devices used to consume high resolution video and interact with low latency. Hence, new challenges arise that can no longer be solved by solely altering the network's edge. Software-Defined...
Underwater Acoustic Networks (UANs) are widely used in various applications such as climate change monitoring, pollution control and tracking, tactical surveillance and offshore exploration. However, limited consideration is given to the security of such networks, despite the fact that the unique characteristics of UANs make these networks vulnerable to various malicious attacks. In this paper, we...
The industrial, scientific and medical band is widely used by different wireless systems. The identification of other wireless technologies in the common environment is one of the keys for correct system coexistence. In this work, a sensing platform for the detection of IEEE 802.11g and IEEE 802.15.4 primary signals in the 2.4 GHz band is proposed. The sensing platform makes use of a combined scheme...
Unmanned Aerial Vehicles (UAVs) are increasingly demanded in civil, military and research purposes. However, they also possess serious threats to the society because faults in UAVs can lead to physical damage or even loss of life. While increasing their intelligence, for example, adding vision-based sense-and-avoid capability, has a potential to reduce the safety threats, increased software complexity...
As the demand expanding for high electrical performance, high pin count and low cost, the copper pillar bump packaging has been extensively used in recent years. However, the drawback is that copper pillar bump can introduce high stress, especially on low-k chip. In this paper, finite element method was adopted to optimize the structure of copper pillar bump, aiming at relieving the stress of low-k...
The emergence of online labor markets has concentrated a lot of attention on the prospect of using crowdsourcing for software development, with a potential to reduce costs, improve time-to-market, and access high-quality skills on demand. However, crowdsourcing of software development is still not widely adopted. A key barrier to adoption is a lack of confidence that a task will be completed on time...
Design by Contract (DbC) is a software engineering paradigm that aims to reduce the amount of source code in a computer program by avoiding redundant parameter checking. It is based on strict interface specifications, including the specification of responsibilities for checking. Although DbC potentially leads to better quality programs, it has to be supported by the programming language/environment...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.