Runtime testing is a common way to detect faults during normal system operation. To achieve a specific diagnostic coverage runtime testing is also used in safety critical, automotive embedded systems. In this paper we...
详细信息
In a Wireless Sensor Networks (WSN), there are normally one or several sensor nodes working as Access Points (AP), which are able to provide a relay for other sensors to an external Internet connection. Since WSNs are...
详细信息
Axonemal outer dynein arms(ODAs) regularly align on the outer doublet with a 24-nm periodicity and each of the heterotrimeric three heavy chains(a,(3 and y) works as a *** far,although biochemical studies revealed tha...
详细信息
Axonemal outer dynein arms(ODAs) regularly align on the outer doublet with a 24-nm periodicity and each of the heterotrimeric three heavy chains(a,(3 and y) works as a *** far,although biochemical studies revealed that each head plays a distinct role in the ODA function,how the three heads have assembled on the axoneme is still *** electron tomographs by negative staining showed that,among ODA-microtubule
With the development of online communities, there has been a dramatic increase in the number of members using Enterprise Communities (ECs) over the past few years. Many join ECs with the objective of sharing their kno...
详细信息
With the development of online communities, there has been a dramatic increase in the number of members using Enterprise Communities (ECs) over the past few years. Many join ECs with the objective of sharing their knowledge on the specific issue and seeking relative knowledge from others. Despite the eagerness of sharing knowledge and receiving knowledge through ECs, there is no standard of assessing ones knowledge sharing capabilities and prospects of knowledge sharing in order to get great level of efficiency of knowledge sharing collaboration. This paper developed evaluation model to assess knowledge relationship behavior among ECs members with the aim of Vector Space Model.
The electrical control of pulse width in a two-photon absorption-based silicon pulse compressor is demonstrated. Approximately 30% improvement in pulse compression rate is experimentally measured under a forward volta...
详细信息
Real-time code clone search is an emerging family of clone detection research that aims at finding clone pairs matching an input code fragment in fractions of a second. For these techniques to meet actual real world r...
详细信息
Real-time code clone search is an emerging family of clone detection research that aims at finding clone pairs matching an input code fragment in fractions of a second. For these techniques to meet actual real world requirements, they have to be scalable and provide a short response time. Our research presents a hybrid clone search approach using source code pattern indexing, information retrieval clustering, and Semantic Web reasoning to respectively achieve short response time, handle false positives, and support automated grouping/querying.
Ad-hoc network is becoming more important in various areas for wireless communications. In the network, routing algorithms have a great influence on the communication performance. To minimize network overheads, this p...
详细信息
Ad-hoc network is becoming more important in various areas for wireless communications. In the network, routing algorithms have a great influence on the communication performance. To minimize network overheads, this paper proposes a hybrid routing algorithm, Group Hierarchical Routing (GHR), which is a combination of proactive and reactive routing methods. The comparison with other hybrid routing methods shows that GHR has less communication complexities in route discovery and maintenance.
Minimizing Energy consumption is considered as one of the most important principles in the development of routing protocols for Wireless Sensor Networks (WSN). In this study, we propose a Location based Energy-Aware R...
详细信息
ISBN:
(纸本)9789604742769
Minimizing Energy consumption is considered as one of the most important principles in the development of routing protocols for Wireless Sensor Networks (WSN). In this study, we propose a Location based Energy-Aware Reliable routing protocol (LEAR) for WSN based on sensor position and clustering. Geographical routing protocols are efficient and convenient for optimum energy consumption and bandwidth utilization. Most of the existing geographic routing protocols make use of greedy routing to forward packets from source to destination. Enhance Greedy Forwarding is proposed to perform a geographic, efficient and reliable routing for WSN. A comprehensive simulation study illustrates that the lifetime of WSN can be consequentially extended with LEAR. Finally, LEAR algorithm has been developed, tested and validated through a set of experiments to illustrate the relative advantages and capabilities of a proposed algorithm.
Since the heading direction of a robotic fish continuously changed when it is swimming, its surrounding information may not be easily obtained from a front camera equipped on the robotic fish's head. Also, it is d...
详细信息
ISBN:
(纸本)9781457721366
Since the heading direction of a robotic fish continuously changed when it is swimming, its surrounding information may not be easily obtained from a front camera equipped on the robotic fish's head. Also, it is difficult to know both the heading direction, which is direction of robotic fish's head and the swimming direction, which robotic fish are moving toward. Therefore, this paper proposes the gyro sensor-based vision sway compensation module to obtain surrounding information from a camera equipped on a swaying robotic fish's head using a gyro sensor. Firstly, the time when heading direction and swimming direction coincide is detected. The swimming direction image is priodically captured and updated at this time using a gyro sensor and a front camera. Then, the input images are continuously transformed to the relative location. This transformation is performed by image stitching which consists of speeded up robust features (SURF) and random sample consensus (RANSAC), comparing with the captured swimming direction image. By this developed module, it is possible to get the surrounding information from the transformed input images and also to get the relative location of target object. The effectiveness of the proposed gyro sensor-based vision sway compensation module is demonstrated through real target following experiment using the robotic fish “Fibo II,” developed in the RIT Lab, KAIST.
Providing consistent security services in on-demand provisioned Cloud infrastructure services is of primary importance due to multi-tenant and potentially multi-provider nature of Clouds Infrastructure as a Service (I...
详细信息
Providing consistent security services in on-demand provisioned Cloud infrastructure services is of primary importance due to multi-tenant and potentially multi-provider nature of Clouds Infrastructure as a Service (IaaS) environment. Cloud security infrastructure should address two aspects of the IaaS operation and dynamic security services provisioning: (1) provide security infrastructure for secure Cloud IaaS operation, (2) provisioning dynamic security services, including creation and management of the dynamic security associations, as a part of the provisioned composite services or virtual infrastructures. The first task is a traditional task in security engineering, while dynamic provisioning of managed security services in virtualised environment remains a problem and requires additional research. In this paper we discuss both aspects of the Cloud Security and provide suggestions about required security mechanisms for secure data management in dynamically provisioned Cloud infrastructures. The paper refers to the architectural framework for on-demand infrastructure services provisioning, being developed by authors, that provides a basis for defining the proposed Cloud Security Infrastructure. The proposed SLA management solution is based on the WS-Agreement and allows dynamic SLA management during the whole provisioned services lifecycle. The paper discusses conceptual issues, basic requirements and practical suggestions for dynamically provisioned access control infrastructure (DACI). The paper proposes the security mechanisms that are required for consistent DACI operation, in particular security tokens used for access control, policy enforcement and authorisation session context exchange between provisioned infrastructure services and Cloud provider services. The suggested implementation is based on the GAAA Toolkit Java library developed by authors that is extended with the proposed Common Security Services Interface (CSSI) and additional mechanisms for b
暂无评论