The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
New Hybrid Television systems have been recently developed and are in process of deployment. The video quality assessment is very important for any present and future broadcast or broadband multimedia service. This paper highlights the importance of video quality evaluation for all players implied in these new hybrid services. A review of current standards and trends on the field of video quality...
Nowadays, the staff of modern operation rooms (ORs) and intensive care units (ICUs) has to handle increasingly complex medical devices and their user interfaces. Inconsistent and often non-sterile user interfaces lead to error-prone and slow reconfiguring actions which in the end may even harm the patient. To overcome these issues interconnected medical devices are necessary. We introduce a new concept...
Software-Defined Networking (SDN) provides the potential for highly configurable, automated networks by separating the control and forwarding functions of network devices. While SDN appears to have many potential benefits for coalition tactical networking, including rapid reconfigurability and improved network situational awareness, there are significant obstacles to overcome. In particular, the low...
Low Power and Lossy Networks (LLNs) have a crucial role in the Internet of Things (IoT) paradigm. For the IPv6 Routing Protocol for LLNs (RPL), two objective functions (OF) have been standardized so far, namely (Objective Function zero (OF0), and the Minimum Rank with Hysteresis Objective Function (MRHOF). However, these particular objective functions are used to build a topology where bottleneck...
Medical devices at the point-of-care can be interconnected through standardised communication protocols to build an Integrated Clinical Environment (ICE), but in order to interoperate with clinical information systems, different data exchange standards need to be conformed to. The emerging HL7 Fast Healthcare Interoperability Resources (FHIR) framework appeals to developers and clinicians alike and...
Logic has sometimes been seen as an alternative to metaphysics and to speculation. In this paper it is argued that a different story should be told when it comes to temporal logic and tense-logic in particular. A. N. Prior's first formulation of tense logic was mainly established in order to qualify the discussion of certain metaphysical and conceptual problems. Although temporal logic has now been...
Proper feedback can leverage students to better understand their difficulties and shorten the characteristic program-submit-refactor cycle of programming exercises. The ideal feedback is the result of a human inspection and analysis considering both functional and qualitative aspects of programs produced by students. On the other hand, automated assessment systems can provide rapid, cheap and standardized...
Robots are being increasingly used in safety-critical contexts, such as transportation and health. The need for flexible behavior in these contexts, due to human interaction factors or unstructured operating environments, led to a transition from hardware- to software-based safety mechanisms in robotic systems, whose reliability and quality is imperative to guarantee. Source code static analysis is...
In order to estimate the security of the Web apps, there has been proposed the design and built of a model for evaluating security on Virtual Learning Environments (VLE), starting from the identification of security criteria proposed in handbooks, rules and standards, and there were established objectives and activities that gave patterns for carrying out such process, making emphasis on three criteria:...
The Locator/Identifier Separation Protocol (LISP) was specified a few years ago by the Internet Engineering Task Force (IETF) to enhance the Internet architecture with novel inbound control capabilities. Such capabilities are particularly needed for multihomed networks that dispose of multiple public IP routing locators for their IP networks, and that are willing to exploit them in a better way than...
Power line communication (PLC) connects energy producers with energy consumers. In the European Union stricter guidelines are under development to limit disturbances in the 2–150 kHz frequency range, because devices utilising PLC do not work. This study measured voltage transients in 22 locations and identified sources for noise. Home environments and public buildings were measured. Measurements were...
A high-performance low-latency transmission system based on a concatenated code consisting of inner four-dimensional five-level pulse-amplitude-modulation (5-PAM) trellis-coded modulation and an outer Reed-Solomon (RS) code is proposed for a high-speed data link over time-dispersive channels. The implementation of high-speed sequence detection in state-of-the-art technology nodes is enabled by a novel...
Binary descriptors allow fast detection and matching algorithms in computer vision problems. Though binary descriptors can be computed at almost two orders of magnitude faster than traditional gradient based descriptors, they suffer from poor matching accuracy in challenging conditions. In this paper we propose three improvements for binary descriptors in their computation and matching that enhance...
This publication discusses the problem concerning the concept of the instantaneous information security (IT-Security) audits directed, including providing protection against “zero-day” threats. It is noted that effective “zero-day” counteraction based on implementation a set of preventive IT-Security controls, but not limited new technical facilities installation only. A key feature of this concept...
There are many methods for indoor positioning. These methods are divided into the relative localization and absolute localization. In the relative localization, one widely used method is Pedestrian Dead Reckoning (PDR). Relative localization estimates the moving distance, orientation, and height of the pedestrian. However, relative localization has a problem caused by an accumulated error: the longer...
Scientific problems, related to the interaction between IT-services suppliers and consumers in the cloud environments, has been described. The analysis of quality metrics, used for IT-services estimation, has been carried out taking into account the specificity of the cloud infrastructure that focuses on large-scale scientific problems solving. The technique, used for the visual express quality estimation...
Software Complexity Metrics play a major role of determining the complexity of a given software quantitatively with respective to one or more software complexity attributes in which the metric is willing to compute with. Among the continuation of the possible ways of computing the complexity of a software, the Cognitive Complexity calculation can be considered as a prominent factor since it indicates...
We address the task of mapping a given textual domain model with the source code of an application which is in the same domain but was developed independently of the domain model. The key novelty of our approach is to use mathematical optimization to find a mapping between the elements in the two sides that maximizes the instances of clusters of related elements on each side being mapped to clusters...
According to a 2013 AUVSI report, delays in integrating Unmanned Aerial Systems (UAS) into the National Airspace System (NAS) could cost more than $10 billions a year for the United States alone. Worldwide regulatory bodies are under pressure by the UAS industry to accelerate the regulation process, but safety remains their main objective. One condition for the safe introduction of UAS in the NAS...
In the area of code performance optimisation and tuning, we are faced on the difficult problem of selecting the "best" code version based on empirical experiments and statistical analysis. With the massive introduction of general purpose multicore processors, programs performances become more and more instable, especially parallel programs. Usual statistical methods for computing performance...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.