The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
To enhance System on a Chip (SoC) yield this paper proposes understanding IP contributions. Data structures specific to IP design characteristics for test manufacturing data system can support this goal. This data provides a knowledge foundation and connects the knowledge traditionally siloed into Design, Fab and Test areas. Such a knowledge enhances the ability to comprehend manufacturability at...
Odour concentration is measured sensorially, thus needing a human panel, whereas the measurement of odorous compounds is typically based on physical and chemical analysis. Some systems such as electronic noses try to correlate both approaches in order to measure odour instrumentally, which would allow monitoring odour continuously. In the domain of instrumental odour monitoring, e-noses are the main...
A study of voltage and current wave distortions on a photoelectric power plant of 17 MW in the hard winter conditions of 2016–2017, with much snow and high frost, is presented. By means of a Isikawa diagram, the authors wish to familiarize the reader with causes of current and voltage wave distortion. The study case is accomplished by measurements in two points, using class A equipment. The obtained...
In recent years, there has been an increasing interest in music generation using machine learning techniques typically used for classification or regression tasks. This is a field still in its infancy, and most attempts are still characterized by the imposition of many restrictions to the music composition process in order to favor the creation of “interesting” outputs. Furthermore, and most importantly,...
Word embedding in the NLP area has attracted increasing attention in recent years. The continuous bag-of-words model (CBOW) and the continuous Skip-gram model (Skip-gram) have been developed to learn distributed representations of words from a large amount of unlabeled text data. In this paper, we explore the idea of integrating extra knowledge to the CBOW and Skip-gram models and applying the new...
Exception handling allows developers to deal with abnormal situations that disrupt the execution flow of a program. There are mainly three types of exceptions: standard exceptions provided by the programming language itself, custom exceptions defined by the project developers, and third-party exceptions defined in external libraries. We conjecture that there are multiple factors that affect the use...
Software-defined networking (SDN) is an emerging and disruptive networking paradigm that emerged on campus networks but was soon recognized as having potential applicability in several other application areas, including Internet of Things (IoT) and Industrial IoT. Industrial IoT applications have requirements remarkably distinct from the ones of campus networks, particularly in what concerns timeliness...
dynamic cloud workloads necessitate forecasting methodologies for accurate resource provisioning affecting both cloud providers and clients. This paper focuses on forecasting in the cloud in order to understand its underlying workload dynamics. It analyzes recent workload traces and discovers characteristics that are not adequately captured by traditional linear & nonlinear models employed for...
The low power stochastic sensor is proposed, and its suitability for operation in Internet of Things (IoT) environment is emphasized. Unlike typical digital sensors, instead of a digitizing module, this sensor has a digital stochastic measurement module (DSMM). DSMM enables low-power yet fast and accurate functioning of the sensor. Assessment model includes test signal generator, the standard calibrator,...
Open-source projects rely on attracting new and retaining old contributors for achieving sustainable success. One may suspect that adopting new development practices like Continuous Integration (CI) should improve the attractiveness of a project. However, little is known about the impact that adoption of CI has on developer attraction and retention. To bridge this gap, we study how the introduction...
Electric drainage is used to protect devices which are buried underground (such as piping) from the negative effects of DC electric traction induced stray currents. In places where stray currents leave the underground device and return into rails, they contribute to the corrosion of buried devices. Electric drainage is one of the possibilities to minimise these negative effects. Electric drainage...
Omnidirectional video encoding and delivery are rapidly evolving fields, where choosing an efficient representation for storage and transmission of pixel data is critical. Given that there are a number of projections (pixel representations), a projection independent measure is needed to evaluate the merits of different options. We present a technique to evaluate projection quality by rendering virtual...
Detecting anomalies in large-scale, streaming datasets has wide applicability in a myriad of domains like network intrusion detection for cyber-security, fraud detection for credit cards, system health monitoring, and fault detection in safety critical systems. Due to its wide applicability, the problem of anomaly detection has been well-studied by industry and academia alike, and many algorithms...
In this work, we incorporate trust into the interaction dynamics for multi-agent systems in order to analyze the effects of trust on human-robot teams. We extend previous work by moving away from a “self-centered” trust model and introduce a so-called “team-oriented” trust model in which each agent increases its trust for its neighbors only if they are collectively contributing to the team's overall...
This paper presents a practical study of the Persian ontology matching. Ontology matching has a key role to develop the semantic web. Although many attempts are done to develop Persian ontologies, but the Persian ontology matching problem is still unresolved. This paper addresses the challenges of the Persian ontology matching. One of the most important prerequisites of design and develop efficient...
Whilst there are many attributes that need to be considered for cloud service selection, performance remains one of the most crucial aspects. Thus, we argue for a transparent cloud provider comparison framework in this study. We initiate the development of TCloud: a transparent framework for public cloud service comparison. Our framework helps prospective cloud users to decipher public cloud benchmarking...
Video data security is one of the most research topic in the recent years. It is widely used in the multimedia applications such as video-conferencing, Video on Demand and Pay-TV services. Although many video encryption methods and objective measurements have been employed, few real time schemes and no subjective studies have been proposed. In this paper we investigate a set of selective video encryption...
In this paper, the problem of NFC/RFID technology frontend performance verification is addressed. To make this technology succeeded, it is necessary to test conformance, acceptance, compliance, consistency and interoperability of NFC/contactless infrastructure. Industry bodies such as EMVCo is developing and maintaining programs to ensure device conformance, acceptance, compliance, consistency, and...
Mobile AdHoc NETworks (MANETs) have been identified as a key emerging technology for scenarios in which IEEE 802.11 or cellular communications are either infeasible, inefficient, or cost-ineffective. Smartphones are the most adequate network nodes in many of these scenarios, but it is not straightforward to build a network with them. We extensively survey existing possibilities to build applications...
With the increasing adoption of embedded systems in critical automotive applications, the verification of hardware designs reliability is becoming a strictly regulated process where the ISO26262 standard plays a key role. Today crucial verification activities such as failure analysis and FMEA are still relying heavily on reliability engineer expertise, as automatic methods supporting them are still...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.