The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Equivalent optimum design is a new method of designing an optimum accelerated life test scheme. Traditional method is to establish a statistical model based on the corresponding life distribution and acceleration model under the premise of determining the test stress loading mode. The premise of predetermined stress loading mode results in a locally optimal solution, rather than achieving the global...
As to the problem that it is difficult to estimate the parameters of Weibull mixtures accurately, a new parameter estimation method for Weibull mixtures based on the improved cuckoo search algorithm (CSA) is proposed. The optimization model, which is solved by the improved CSA, is established based on the idea of minimizing the residual sum of squares (RSS). The algorithmic improvement has three schemes...
Controllers' placement is one of the most important concerns that emerged recently to solve scalability and reliability issues of SDN networks. The placement efficiency is influenced by both network operator strategy and the supported services' requirements, which makes more complex the decision-making process. In particular, the need to support QoS-constrained services may guide the controllers'...
One of the essential tasks in data integration is entity resolution (ER) which will recognize the records that are belonging to the same entity. The entity resolution is referred by many other terms like duplicate detection, pattern matching, etc. Now a days the activities like information integration, information retrieval, crowd sourcing, and pay-as-you-go have involved users to carry out the ER...
We describe a novel clustering technique for clustering short texts, such as URLs, without enriching it with the help of external knowledge sources. Our technique first performs feature clustering to identify the key features of the dataset and then reconstructs the dataset on the basis of the key features. Then, it computes the similarity of the short texts belonging to the reconstructed dataset...
Distributed Generations (DG) are modular power generating technologies that are located near the load centers. DGs help avoid the expensive long distance transmission of power which is expensive and lossful while providing certain relief to the central power grid. They can be reliable and environmental friendly. DGs can prove beneficial for the local economies, enhance the energy independence, provides...
Constraint-based sequential pattern mining algorithms discover sequential patterns among from sequence data and the resultant sequential patterns satisfy a given constraint. For time stamped sequences duration and/or gap constraints can be applied to obtain corresponding constraint-based sequential patterns. One of the shortcomings of existing algorithms is the requirement to pre-specify a time window...
The widespread utilization of cloud computing services has brought in the emergence of cloud service reliability as an important issue for both cloud providers and users. To enhance cloud service reliability and reduce the subsequent losses, the future status of virtual machines should be monitored in real time and predicted before they crash. However, most existing methods ignore the following two...
This paper is devoted to doing a simulation research on the cushioning process of hydraulic operating mechanism applied on 252kV high voltage circuit breakers and suggesting an effective design method to improve the performance of buffer device. According to the working principle of cushioning process, parametric analysis and optimization are carried out for the buffer process with considering step...
The construction of new distribution infrastructure and the reconstruction of the existing one is associated with huge investment costs. These costs further increase from the penetration of many new RES, which are in most cases directly connected to electricity grid without considering the nature of the load profile of consumers in accession branch. The operational independence of the Distribution...
To retrieve semantically related documents with the query submitted by the user has always become a challenging task. An efficient assessment of semantic similarity is of critical importance in the area of information retrieval and web mining so as to associate the query with its associated documents. However their cannot be any accurate measure for semantic similarity as its domain is spread not...
Social Networks are most powerful and easy to use medium for the communication. Social Networks provide a platform for the users where they can make new friends and can share their ideas or moments with others. Facebook is one of the most popular and widely used Social Networks. In Facebook users can easily and freely create their accounts. Facebook provides easy and effective communication among...
The process of testing any software system is an atrocious task which indeed consumes a ton of effort, and expensive also. Required effort and time to do adequate as well as effective testing get bigger, as the software gets more complexed that can lead to swarm over the project budget or some test cases left uncovered or delay in completion. A suitably generated test suite does not only locate errors...
Component-Based Software Development involves integration of many different self-contained units of software that perform a specific task known as software components with the existing software components as plug-ins which can be used again and again. The present crisis in the software development forces on development of the reusable components which build once can be reused when and where ever required...
Recent advancements introduced in the field of wireless technologies have led to the emergence of vehicular ad hoc networks (VANETs). VANET consists of vehicles and road-side units as its components. These components communicate with each other to share the information, mainly related to traffic conditions. In such networks, routing, secure transmission of control information and user messages, avoiding...
BigData contains large amount of unstructured data in the form of movie data, facebook data, and industry data and so on. There are number of posts are posted on Twitter about movies by different users. Out of these posts some of posts may be inappropriate. These posts contain negative comments as well as positive comments about movies. It is difficult to distinguish large number of positive and negative...
In this paper proposed bucket based data deduplication technique is presented. In proposed technique bigdata stream is given to the fixed size chunking algorithm to create fixed size chunks. When the chunks are obtained then these chunks are given to the MD5 algorithm module to generate hash values for the chunks. After that MapReduce model is applied to find whether hash values are duplicate or not...
In this study, a 128 kb ultra low voltage (ULV) SRAM, based on a 7T bitcell with one bitline, is presented. Overall energy efficiency is enhanced by optimizations on all abstraction levels, i.e., from bitcell to macro integration. Degraded performance and reliability due to ULV operation is recovered by selectively overdriving the bitline and wordline with a new single-cycle charge-pump. A dedicated...
Small Cells (SCs) are considered as a key enabling technique for future 5G cellular networks; whether they are deployed for Macro Cells networks densification or ensuring a standalone broadband access service. However, one of the critical challenges facing SCs deployments is a stable and an economical backhaul network. Particularly, if we consider SC for green-field deployments where operator transport...
In this paper, the physical mechanism and models of oxide-based resistive-switching random access memory (RRAM) and the optimization of the devices and arrays are addressed and reviewed. The review focuses on our research achievements on the unified physical mechanism, physical-based models including switching and reliability behaviors, and the optimization design issues of the oxide-based RRAM.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.