The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Duchenne muscular Dystrophy (DMD) Is a progressive muscle degenerative disease. Active hand assistive devices, can improve the quality of life of people with DMD. Such devices show a rejection rate due to complexity. Our hypothesis is, that a simple orthosis might prove more functional and realistic in assisting people with DMD. To investigate, we developed a portable setup that provides various visual...
This paper proposes a modified IMWBF decoding algorithm for low-density parity-check (LDPC) codes. In the proposed modification, the magnitude of the received signal is updated when the number of the unsatisfied parity-check equations participated by this received signal is larger than a predetermined threshold. Through this modification, the outlier, defined as the undesired large-magnitude received...
Soft-input soft-output (SISO) sphere decoding is applied to multiple-input multi-output (MIMO) systems to offer good bit error rate (BER) performance but at high complexity. To reduce this computational complexity, we propose a novel hybrid enumeration strategy for such decoding that dynamically determines the candidate list; moreover, this strategy uses a new node enumeration based on concentric...
Differential spatial modulation (DSM) is a novel attractive alternative technique for coherent spatial modulation (CSM) without channel state information (CSI) at the receiver. In this paper, iterative detection is firstly employed to improve the performance of DSM schemes. With the Hamming distance of two matrices reduced to the sum of simple elements, a lowcomplexity iterative detection scheme for...
The multiple-input multiple-output (MIMO) technology can make full use of spectrum and increase the communication throughput. In the coded MIMO system, the main challenge of soft detection is to efficiently generate the loglikelihood ratios (LLR) values for channel decoder. The exact maximum a posteriori (MAP) probability detection can guarantee the optimal performance, but its realization is difficult...
The Department of Defense (DoD) manages a large, complex system of systems that must operate together on the battlefield to deliver value. However, it is difficult to understand the network wide impacts of changes to the system of systems. The DoD has had difficulty managing this system of systems due to the scale and complexity of the network and traditional systems engineering tools do not provide...
Previous studies have researched how developer experience affects code quality, but they ignore work difficulty, although experienced developers are more likely to work on the more complex parts of a project. To examine work difficulty, we focus on revised files. Using product metrics, we evaluate file complexity in each type of file origin. Specifically, we analyze three large commercial projects...
List decoding of insertions and deletions in the Levenshtein metric is considered. In this paper, a Johnson-like upper bound on the maximum list size when decoding in the Levenshtein metric is derived. This bound depends only on the length and minimum Levenshtein distance of the code, the length of the received word, and the alphabet size. It shows that polynomial-time list decoding beyond half the...
We propose a new partial decoding algorithm for m-interleaved Reed-Solomon (IRS) codes that can decode, with high probability, a random error of relative weight 1 − Rm/m+1 at all code rates R, in time polynomial in the code length n. For m > 2, this is an asymptotic improvement over the previous state-of-the-art for all rates, and the first improvement for R > 1/3 in the last 20 years. The method...
Computing the probability of vulnerability exploitation in Bayesian attack graphs (BAGs) is a key process for the network security assessment. The conditional probability of vulnerability exploitation could be obtained from the exploitability of the NIST's Common Vulnerability Scoring System (CVSS). However, the method which N. Poolsappasit et al. proposed for computing conditional probability could...
Estimation of functions of d variables is considered using ridge combinations of the form Σmk=1 c1, kφ(Σdj=1c0, j, kxj-bk) where the activation function φ is a function with bounded value and derivative. These include single-hidden layer neural networks, polynomials, and sinusoidal models. From a sample of size n of possibly noisy values at random sites X ∊ B = [−1, 1]d, the minimax mean square error...
Detecting anomalous behaviors of cloud platforms is one of critical tasks for cloud providers. Every anomalous behavior potentially causes incidents, especially some unaware and/or unknown issues, which severely harm their SLA (Service Level Agreement). Existing solutions generally monitor cloud platform at different layers and then detect anomalies based on rules or learning algorithms on monitoring...
Small-scale clouds (SCs) often suffer from resource under-provisioning during peak demand, leading to inability to satisfy service level agreements (SLAs) and consequent loss of customers. One approach to address this problem is for a set of autonomous SCs to share resources among themselves in a cost-induced cooperative fashion, thereby increasing their individual capacities (when needed) without...
The objective of this paper is to illustrate how to monetize infrastructures and services. This is achieved by a combination of measuring consumption, applying pricing strategies and client invoicing. Furthermore, a range of billing solutions are available in order to cover the Rating, Charging and Billing process. The focus here is on the comparison of solution based suitability, which depends on...
Today, software maintenance is more expensive than development costs. As class complexity increases, it is increasingly difficult for new programmers to adapt to software projects, causing the cost of the software to go up. Therefore, it's important to produce faultless and understandable code. Moreover, software projects are not developed by one person alone; even a small-scale project needs 3 or...
Due to the constant evolution of technology, each day brings new programming languages, development paradigms, and ways of evaluating processes. This is no different with source code metrics, where there is always new metric classes. To use a software metric to support decisions, it is necessary to understand how to perform the metric collection, calculation, interpretation, and analysis. The tasks...
Our current knowledge of scholarly plagiarism is largely based on the similarity between full text research articles. In this paper, we propose an innovative and novel conceptualization of scholarly plagiarism in the form of reuse of explicit citation sentences in scientific research articles. Note that while full-text plagiarism is an indicator of a gross-level behavior, copying of citation sentences...
Marketing schemes of software products involve different types of approaches based on the nature of the software, the target customers, level of complexity, etc. Open source software products in particular, target largely software developers or users with a significant level of technical experience. This drives our project to evaluate the level of popularity for open software products based on internal...
Execution trace analysis is particularly valuable in the context of object-oriented software comprehension for the maintenance tasks. It involves analyzing dynamic information and behaviors that are stored in the execution trace. However, the execution traces of current object-oriented software systems tend to be very large in terms of complexity and size. In particular, classes and coupling features...
Component-based software development is one of the proficient models of constructing eminent-quality software products. Reusability is the basic concept behind the component-based software. Reusability suggests re-use of existing software artifacts rather than developing them from the beginning. Components interact to share services and information in component-based software environment. In this...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.