software clone detection is an actively researched area which has spawned numerous approaches to the problem of duplicated code. These approaches, however, are of little practical use as most of them are ill-suited fo...
详细信息
Only a small amount of work has been published on the topic of exploiting existing Long-Term Evolution-Advanced(LTE)cellular communication network infrastructure for Unmanned Aerial Vehicles(UAV)data *** paper documen...
详细信息
Only a small amount of work has been published on the topic of exploiting existing Long-Term Evolution-Advanced(LTE)cellular communication network infrastructure for Unmanned Aerial Vehicles(UAV)data *** paper documents a modeling and simulation(m&s)framework that has been developed utilizing the powerful OMNeT++simulation tool for assessing the feasibility and effectiveness of this prospect in various UAV *** multiple scenarios,we have studied the data rate requirements for communications between small and medium-sized UAVs and base *** this framework,we have shown that the data rate requirements for the links are within the data throughput achieved by LTE *** developed framework implements a propagation model endorsed by the 3GPP LTE project team and also accurately models the high mobility of *** framework is highly configurable and extensible and boasts of automatic aggregation of results and chart *** outcomes of this research may be utilized by industry for rapidly deploying highly mobile,low-cost UAVs in a wide range of applications and scenarios.
The use of electronic communication has been significantly increased over the last few *** is one of the most well-known means of electronic *** email applications are widely used by a large population;however,illiter...
详细信息
The use of electronic communication has been significantly increased over the last few *** is one of the most well-known means of electronic *** email applications are widely used by a large population;however,illiterate and semi-illiterate people face challenges in using them.A major population of Pakistan is illiterate that has little or no practice of computer *** this paper,we investigate the challenges of using email applications by illiterate and semi-illiterate *** addition,we also propose a solution by developing an application tailored to the needs of illiterate/semi-illiterate *** shows that illiterate people are good at learning the designs that convey information with pictures instead of text-only,and focus more on one object/action at a *** proposed solution is based on designing user interfaces that consist of icons and vocal/audio instructions instead of ***,we use background voice/audio which is more helpful than flooding a picture with a lot of *** tested our application using a large number of users with various skill levels(from no computer knowledge to experts).Our results of the usability tests indicate that the application can be used by illiterate people without any training or third-party’s help.
In this paper, we propose a distributionally robust control synthesis for an agent with stochastic dynamics that interacts with other agents under uncertainties and constraints expressed by signal temporal logic (STL)...
详细信息
Energy resilience in renewable energy sources dissemination components such as batteries and inverters is crucial for achieving high operational fidelity. Resilience factors play a vital role in determining the perfor...
详细信息
This paper presents a new robust sliding mode control (SMC) method with well-developed theoretical proof for general uncertain time-varying delay stochastic systems with structural uncertainties and the Brownian noi...
详细信息
This paper presents a new robust sliding mode control (SMC) method with well-developed theoretical proof for general uncertain time-varying delay stochastic systems with structural uncertainties and the Brownian noise (Wiener process). The key features of the proposed method are to apply singular value decomposition (SVD) to all structural uncertainties and to introduce adjustable parameters for control design along with the SMC method. It leads to a less-conservative condition for robust stability and a new robust controller for the general uncertain stochastic systems via linear matrix inequality (LMI) forms. The system states are able to reach the SMC switching surface as guaranteed in probability 1. Furthermore, it is theoretically proved that the proposed method with the SVD and adjustable parameters is less conservatism than the method without the SVD. The paper is mainly to provide all strict theoretical proofs for the method and results.
Domain adaptive person re-identification (Re-ID) encounters significant challenges when models trained on one dataset are deployed in new environments. It is particularly critical in engineering applications where sur...
Domain adaptive person re-identification (Re-ID) encounters significant challenges when models trained on one dataset are deployed in new environments. It is particularly critical in engineering applications where surveillance infrastructure must be rapidly adapted to new environments without compromising security system reliability. The problem represents a knowledge-intensive engineering task that requires sophisticated knowledge representation and transfer mechanisms to support automated system reconfiguration decisions. These challenges include preserving fine-grained visual details, handling camera-specific variations, generating reliable pseudo-labels, maintaining consistency across multiple camera views, and managing varying difficulty levels in domain transfer. To address these issues, we propose a novel framework that separates adaptation into intra-domain and cross-domain learning phases. Our approach introduces several key innovations: an adaptive fine-grained network that preserves spatial details while ensuring domain invariance, a memory-guided learning method for stable feature representation, and a hierarchical adaptation strategy for reliable intra-domain learning. Additionally, we incorporate a progressive learning strategy for gradual domain adaptation and a consistency reinforcement mechanism to resolve cross-camera identity conflicts. Experiments on the Market-1501, DukeMTMC-reID, and MSMT17 datasets across four domain adaptation tasks show that our method outperforms state-of-the-art approaches, significantly improving both mAP and CMC accuracy. This work contributes to engineering informatics by providing a reliable solution for automating knowledge-intensive tasks across diverse engineering domains, while also laying the foundation for advancements in intelligent surveillance systems and automated decision-making in engineering infrastructures.
An empirical study of high-speed software development practices was conducted in US companies. Fast development, along with low cost and high quality has formed a tripartite tension among softwareengineering goals. T...
详细信息
An empirical study of high-speed software development practices was conducted in US companies. Fast development, along with low cost and high quality has formed a tripartite tension among softwareengineering goals. The detailed case studies of Internet software development were reviewed in 10 companies and then knowledge was synthesized on best practice for quality and agility. Agile methodologies, including Extreme Programming and Scrum are found increasing in the software development field. Some of the problems identified in high speed software development, include demands of time-to-market compression, insufficient programmer productivity, ambiguous requirements, fluid requirements, lack of design time and experience, and changing environment. The solutions to the problems identified, include parallel development and frequent releases, greater reliance on tools and reusable components, production prototyping, customer implantation, multitiered architecture and emphasis on acquiring the right expertise and tailored methodology.
Most of the time developers make extensive use of software tools in a software development process to support them in their day-to-day work. One of the first and most important phases is the design phase. Here tools a...
详细信息
Dynamic risk assessment refers to a risk management framework where frequent updates of risk evaluation information are used to evaluate risk exposure,as close as possible to *** this paper,we present the incident obj...
详细信息
Dynamic risk assessment refers to a risk management framework where frequent updates of risk evaluation information are used to evaluate risk exposure,as close as possible to *** this paper,we present the incident object description exchange format extended model for dynamic risk *** format attempts to overcome the absence of integration and real-time communication between security systems and risk assessment *** model is based on the incident object definition exchange format,which is commonly used in the computer security incident response teams *** data model aims to facilitate a global vision of information systems risk by supplying real-time security events data to risk assessment tools based on renowned *** present a proof-of-concept scenario to demonstrate the usefulness of this integration and the proposed data model,and discuss the expected improvements.
暂无评论