This project consists in developing applications for mobile phones that allows users to query using the touch screen to check the status of remote devices. Current status of the remote visualization device is arranged...
详细信息
This project consists in developing applications for mobile phones that allows users to query using the touch screen to check the status of remote devices. Current status of the remote visualization device is arranged on the display, thereby increasing user comfort when operating the remote device (currently designed for GSM communicator GD-06 Allegro), instead of the traditional communication via SMS. Applications for mobile devices is designed for. NET Compact Framework and is designed for Windows Mobile. This application is created in Visual Studio 2008 from Microsoft.
This project is carring out of design and development of software which is able to determine the ideal method of passing cars sweep so that the car is capable of a corner as quickly as possible without compromising sa...
详细信息
This project is carring out of design and development of software which is able to determine the ideal method of passing cars sweep so that the car is capable of a corner as quickly as possible without compromising safety to crew, or there is a deterioration in passenger comfort, or damage to tangible property transported. Thus a virtual model of a situation such as a desktop application programming in Microsoft Visual Studio 2008 was created. Thanks to the user who made aplication used as an example of automated driving. At the same time it can become the basis for further work on this topic.
The project is to create an application that converts the audio signal from your computer microphone to record format MP3. Application is designed to record and preserve the audio recordings to a file in a format of l...
详细信息
The project is to create an application that converts the audio signal from your computer microphone to record format MP3. Application is designed to record and preserve the audio recordings to a file in a format of lossy compression of audio file compression based on MPEG algorithm (Motion Picture Experts Group). While maintaining a relatively high quality it can reduce the size of audio files in CD quality at about one tenth, for speech, however, it gives much worse results. The advantage of this application is the ability to set frequency range (the sampling) and set the width of the stream, which indicates the number of bits, by which a second of record is registred with. The application is written in C # using Microsoft Visual Studio 2008.
In this paper, we show the possibility of predicting the anomalous packets' behaviors to the near active addresses from small observation address space (Darknet) in Internet. We have proposed the distributed coope...
详细信息
In this paper, we show the possibility of predicting the anomalous packets' behaviors to the near active addresses from small observation address space (Darknet) in Internet. We have proposed the distributed cooperative monitoring architecture (DCMA) which probes the anomalous packets that arrive at the distributed unused address segments and detects and defenses anomalous packets' behaviors to the near active addresses. To realize DCMA, it is necessary to investigate the time-series correlation between anomalous packets arriving at small observation address segments and those of near addresses. Thus, we calculated the correlation strength of anomalous packets that scan address segments from the pairs of the sub-observation address segments divided from the Darknet addresses. Furthermore, we observed the correlation strength when changing the sub-observation's size and investigated the size dependency of the correlation strength. As a result, we could indicate the possibility of predicting the anomalous packets' behaviors to the near address segments from small sub-observation addresses. We could also find that the base observation fixed to the specific sub-observation space contributes to the strong correlation coefficient. Therefore, these results imply that DCMA can predict the anomalous packets' behaviors to the near addresses using small observation space.
Current neonatal illness scoring systems are not designed to predict outcomes for individual patients, but rather can provide an overview of a population of patients for objective comparison when reporting outcomes. H...
详细信息
Scheduling in traditional distributed systems has been mainly studied for system performance parameters without data transmission requirements. With the emergence of Data Grids (DGs) and Data Centers, data-aware sched...
详细信息
This research deals with a synthesis of control law for three selected discrete chaotic systems by means of analytic programming. The novality of the approach is that a tool for symbolic regression—analytic programm...
This research deals with a synthesis of control law for three selected discrete chaotic systems by means of analytic programming. The novality of the approach is that a tool for symbolic regression—analytic programming—is used for such kind of difficult problem. The paper consists of the descriptions of analytic programming as well as chaotic systems and used cost function. For experimentation, Self‐Organizing Migrating Algorithm (SOMA) with analytic programming was used.
Communities in social networks emerge from interactions among individuals and can be analyzed through a combination of clustering and graph layout algorithms. These approaches result in 2D or 3D visualizations of clus...
详细信息
Radio Frequency Identification (RFID) is a popular automatic identification and an emerging wireless technology with highly promising applications. In an RFID system, the anti-collision algorithm is one of the primary...
详细信息
Radio Frequency Identification (RFID) is a popular automatic identification and an emerging wireless technology with highly promising applications. In an RFID system, the anti-collision algorithm is one of the primary mechanisms to address the issue of multi-object identification. This paper focused on a detailed study of the ALOHA anti-collision problem and a comparative study with the basic binary tree protocols. Two tag estimation methods were investigated and a performance analysis was successfully achieved based on various key design parameters such as the probability of a successful transmission, the collision ratio, the offered load, the system efficiency, the system throughput and the estimation accuracy of successful transmission.
In recent years there is a rapid increase of traffic to a given web server within a short time as the number of Internet users increases, and such a phenomenon is called a flash crowd. Once flash crowds occur in the w...
详细信息
In recent years there is a rapid increase of traffic to a given web server within a short time as the number of Internet users increases, and such a phenomenon is called a flash crowd. Once flash crowds occur in the web server, a response rate decreases or the web server may crash as the load increases. We propose a load reduction system, which prevents excessive accesses and stably delivers content without enhancing the performance of the web server even when flash crowds occur. In the proposed system, a proxy server detects flash crowds by monitoring the number of requests and changes a content delivery system. To limit accesses to the web server, the proxy server redirects a request to another client that holds the content in the cache when flash crowds occur. We also propose a content delivery system that uses a tree construction to reduce the client load. Moreover, its efficacy is shown through simulations.
暂无评论