The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We discuss the possibility of reaching consensus in finite time using only linear iterations, with the additional restrictions that the update matrices must be stochastic with positive diagonals and consistent with a given graph structure. We show that finite-time average consensus can always be achieved for connected undirected graphs. For directed graphs, we show some necessary conditions for finite-time...
RFID (Radio Frequency IDentification) has been used in many applications now; therefore the volume of RFID data is enormous. How to clean and store data is becoming the research focus. For data cleaning, many methods have been proposed, and we first simply introduce these methods and models with some comments. We propose a structure of RFID database which has two levels: raw level and cleaned level,...
Based on the research of traditional assessment structure and informatization, we propose a novel five-unit assessment structure. It includes data state unit, index system unit, assessment system unit, results feedback unit, management services unit. This paper describes the content of five-unit assessment structure. Compared to traditional assessment structure, the five-unit assessment structure...
The new generation of R&D personnel has unique personality characteristics and work values, which brings challenge for the human resource management in enterprises. Based on the literature analysis and in-depth interviews, this paper puts forward a five-dimension model of work values for the new generation of R&D personnel and makes an empirical test through the questionnaire survey and statistical...
Problem of intranet security is almost birth with network interconnection, especially when the demand for network interconnection is booming throughout the world. The traditional technology can't guarantee the access terminals to its safe and reliable. In view of this, this paper introduces the trustworthiness evaluation technology in trusted computing. The collection and management model is established...
Building contractors have many risks to face. we took the multi-level comprehensive evaluating method of gray relational analysis and effectively resolved the problem of index weight in system, the comprehensive relational degree from this study gave a basis to evaluate building contractors' risks scientifically.
Qualitative Mapping(QM) is the basis of Property Theory, by which Conversion Degree Functions are induced. Furtherly Inverse Conversion Degree Functions are proposed used to convert qualitative description into quantitative value for some attributes of objects according to the degree to which the qualitative description belongs. Finally Qualitative Membership Degree Matrix based on the proportion...
High-rate, large-sized (α) flows are of interest to providers for various reasons, e.g., they have the potential to degrade service quality for real-time flows, and users are sensitive to the throughput variance of these flows. In this paper, we present characteristics, such as size, duration, average rate, of α flows computed from NetFlow records collected over a 7-month period from 4 ESnet routers...
Event matching is the process of checking high volumes of events against large numbers of subscriptions and is a fundamental issue for the overall performance of a large-scale distributed publish/subscribe system. Most existing algorithms are based on counting satisfied component constraints in each subscription. As the scale of a system grows, these algorithms inevitably suffer from performance degradation...
Information Retrieval deals with retrieving documents from a large collection that matches the information need of a user. Efficient retrieval is based on the proper storage of the inverted index. There have been many techniques for reducing the size of the inverted index. Static index pruning is one such technique, which is used to reduce the index size. This paper investigates a static index pruning...
The gaining popularity of Near Field Communication (NFC)-enabled applications has been facilitated by increased levels of NFC smartphone adoption. However, the existing touch-driven interaction using NFC smartphone for home environment is neither quick nor convenient. The primary contribution of this paper is to introduce a novel solution for a convenient mobiquitous home service, allowing users to...
Continuous K-nearest skyline query (CKNSQ) is an important type of the spatio-temporal queries. Given a query time interval [ts, te] and a moving query object q, a CKNSQ is to retrieve the K-nearest skyline points of q at each time instant within [ts, te]. Different from the previous works, our work devotes to overcoming the past assumption that each object is static with certain dimensional values...
An expert opinion describes his or her opinion about a quantity by using imprecise ("fuzzy") words from a natural language, such as "small", "medium", "large", etc. Each of these words provides a rather crude description of the corresponding quantity. A natural way to refine this description is to assign degrees to which the observed quantity fits each of the...
The quality of empirical studies is critical for the success of the Software Engineering (SE) discipline. More and more SE researchers are conducting empirical studies involving the software industry. While there are established empirical procedures, relatively little is known about the dynamics of conducting empirical studies in the complex industrial environments. What are the impediments and how...
In this work we propose a symbolic-based approach to assess the exploitability level of a path leading to a vulnerable flaw. We also define a stack memory model more suitable for exploit discovery. A tool, Symbolic Exploit Assistant (SEA) implements the proposed approach.
Concept maps are a learning tool that has been successfully applied in the educational process for more than three decades now. Their original aim was to serve as a learning aid, offering a more efficient overview of the learning content and more successful integration of new knowledge to the learner's schemata. Later, thanks to the popularization and increase in availability and applications of computers...
This paper proposes a method for comparison of coalition influence in the framework of social welfare function which is a model of group decision. The proposed method compares a pair of coalitions from the point of view how different the opinion which the coalition has with respect to the collective decision is. Some examples how the proposed method work are provided in this paper. It is verified...
Random-early-detection (RED) is widely applied in network nodes for congestion control. It randomly drops packets to prevent congestion from occurring, while keeping high bandwidth utilization at the same time. Unfortunately, RED provides little protection against aggressive flows from consuming most of the bandwidth. BF-RED was introduced in the literature to address the problem, but it calculated...
Load balancing is one of the important issues in power quality. In this paper a new method is presented for load balancing in LV distribution network considering different time-intervals (long term), using Modified Leapfrog method (MOLFOP). For this purpose, firstly the load balancing objective function for constant loads is extended to consider load changes in any time interval and then the statuses...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.