The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The second leading cause of cancer related death in women is breast cancer, mostly diagnosed in the age group of 40–60. Breast cancer is the formation of lump in the breast, this the initial stage which is further followed by abnormal cell division and growth of malignant tumour. Mammography is the most powerful detector of breast cancer that can easily diagnose masses and micro-calcifications. Early...
The boundary ringing artifacts always appears near image boundary after deconvolution. We presented a new deconvolution image boundary ringing metric to evaluate the quality of images. First, we remove the deconvolution image boundary ringing artifact using the PDE-based method, and then we compare it with the degraded image to evaluate the boundary ringing artifact. The experimental results validate...
Sustaining the memory locality is critical for obtaining high performance in NUMA system. But how to identify a locality leakage problem and how to measure the leakage is still open issue. This paper provides an algorithm to quantitatively measure the locality leakage based on the memory trace produced by IBS (Instruction-Based-Sampling). A """"perfect matrix""""...
With the large-scale deployment of virtualized data centers, energy consumption and SLA (Service Level Agreement) violation have already become the urgent issue to be solved. And it is essential and important to design energy-aware allocation policy for energy-aware and SLA violation reduction. In this paper, we propose a novel allocation and selection policy for the dynamic virtual machine (VM) consolidation...
Recently, the advance of cloud computing services has attracted many customers to host their Internet applications in the cloud. Infrastructure as a Service (IaaS) is on top of these services where it gives more control over the provisioned resources. The control is based on online monitoring of specific metrics (e.g., CPU, Memory, and Network). Despite the fact that these metrics guide resources...
This paper studies linear set-dynamics driven by random convex compact sets (RCCSs), and derives the set-dynamics of the expectations of the associated reach sets as well as the dynamics of the corresponding covariance functions. It is established that the expectations of the reach sets evolve according to deterministic linear set-dynamics while the associated dynamics of covariance functions evolves...
In this paper, we study a multi-vehicle coverage control problem in constant flow environments while taking into account both energy consumption and traveling time. More specifically, the metric (called the mixed energy-time metric) is a weighted sum of the energy consumption and the traveling time for a vehicle to travel from one point to another in constant flows when using the minimum energy control,...
The classical definition of a rolling map, describing the rolling motion, without slip or twist, of one Euclidean submanifold over another of the same dimension, as given in Sharpe [8], is generalized for the situation when the embedded space is equipped with a pseudo-Riemannian metric and applied to derive the kinematic equations for the constrained rolling motion of a connected pseudo-Riemannian...
The acts to submit the copied programs of other person make problems in the subject of the programming exercise in university curriculum. Teachers could not make accurate scores and evaluate the reached learning level of students. The code clone detection technique is to automatically detect the copied programs. Researches of the code clone detection technique have been proposed. The object of these...
A control problem is formulated and solved for a stochastic system that evolves in the unit sphere in Euclidean three space. The cost functional depends on the system state only by its Riemannian distance from a point called the origin. An explicit optimal control is obtained by expressing the cost as a squared term in the control from which the optimal control and the optimal cost follow directly.
We present a Recognizing Textual Entailment(RTE) system based on different similarity metrics. The metricsused are string-based metrics and the Semantic Edit DistanceMetric, which is proposed in this paper to address limitationsof known semantic-based metrics and to support the decisionsmade by a simple method based on lexical similarity metrics.We add the scores of the metrics as features for a machinelearning...
While some developers like to work on multiple code change requests, others might prefer to handle one change request at a time. This juggling of change requests and the large number of developers working in parallel often lead to files being edited as part of different change requests by one or several developers. Existing research has warned the community about the potential negative impacts of...
In this paper, we introduce the delayed shift on a one-sided symbolic space (with two symbols) and prove that the delayed shift has some complex dynamical properties. In addition, through the method of construction, we prove that there exists an uncountable subset of the one-sided symbolic space such that the restriction of the delayed shift on the subset is distributively chaotic.
This article deals with the radiation of sound from ultrasonic transducers located on a flat surface and bounding a shear flow. The aim of the experiments is to measure time delays between flushed transducers in order to characterize flow velocity. Considering that the sound has an infinitely small wavelength, comparison between numerical (simulated using Matlab) and experimental results shows that...
In this paper, a comparative analysis of different gaits were done using modular snake robots. They move along different sizes of horizontal pipes. Pipe sizes were chosen according to robot's length. Gaits were chosen to match robot stability and effectiveness criteria on these surfaces. A description of gait design process is shown. Parametrized schemes were used to control the robot. A visualization...
Comment statements are useful to enhance the readability and/or understandability of software modules. However, some comments may adjust the readability/understandability of code fragments that are too complicated and hard to understand—a kind of code smell. Consequently, some well-written comments may be signs of poor-quality modules. This paper focuses on the lines of comments written...
The quality and the quantity of the e-Learning educational content is reflected by its usage. In this paper, old and new performance metrics and a simple performance prediction algorithm, for the measurement of both educational content as exposed by the educators and the usage of such educational material by the learners, are presented. Metrics and algorithms were tested in an experimental system...
In vehicular ad hoc networks (VANETs) tracking of participants is an issue that is examined by many research groups. These groups came up with several different concepts of counter measures against tracking attacks. All of these presented techniques seem to offer a pretty good protection. We pick out two very promising concepts — the Mix Zones and the Silent Periods — to examine them in a simulation...
In software product lines, multiple products of a software product family, share source code of common components. New features added to the common components of a software product family, are integrated into products following a selective code integration process. Selective code integration is a process in which developers pick the commits (i.e., code changes) related to a feature from one code branch...
The Viterbi algorithm is one of the most popular algorithms for decoding convolutional codes. Implementing a high-speed Viterbi decoder is a challenging task due to the recursive iteration of an add-compare-select operation. In this paper, we propose and analyze several optimization techniques to improve the area/performance tradeoffs of high speed Viterbi decoders on Virtex-6 FPGAs. Both Radix-2,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.