The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the rapid advances in IoT technologies, the role of IoT gateways becomes even more important. Therefore, improving the reliability, availability and serviceability (RAS) of IoT gateways is crucial. Nowadays, Linux is widely adopted for core enterprise systems not only because it is a free operating system but also because it offers advantages in regards to operational stability. With many Linux...
The paper suggests very fast electronic solutions for priority buffers that take data from many potential sources, accumulate them in a register, and output the most priority item in run time in such a way that as soon as a new value arrives it is included in the set with all previously received and untreated items and properly handled. It is shown that such circuits are required for real time embedded...
The exponential growth of complex, heterogeneous, dynamic, and unbounded data, generated by a variety of fields including health, genomics, physics, climatology, and social networks pose significant challenges in data processing and desired speed-performance. Existing processor-based software-only algorithms are incapable of analyzing and processing this enormous amount of data, efficiently and effectively...
In this paper, the information acquisition problem of columnar moving obstacles is investigated for a quadrotor equipped with a stereo vision system flying in an indoor GPS-denied environment. A acquisition algorithm based on stereo vision is proposed to obtain the position and velocity direction. The spatial position relation between the quadrotor and the object detected is used to remove the interferences...
This paper presents a novel technique to uniquely identify a user using data gathered from a mouse and the users eyes during computer use. The research involves gathering data from users, extracting user features, and training a Neural Network classifier that can identify them. Previous work has attempted to identify users solely by eye or mouse data alone, but we seek to find out if combining the...
Event correlation is a cornerstone for process discovery over event logs crossing multiple data sources. The computed correlation rules and process instances will greatly help us to unleash the power of process mining. However, exploring all possible event correlations over a log could be time consuming, especially when the log is large. State-of-the-art methods based on MapReduce designed to handle...
Due to advances in medicine, the societies have become aging, which leads to the problem of missing teeth. Missing teeth negatively affects not only external appearance but also personal dietary habits. Therefore, it has become an important issue in dentistry to solve the problem of missing teeth. In Taiwan, dental prostheses for missing teeth are produced by dental technicians in dental laboratories...
Through investigating the status of information management of laboratory equipment in a certain aerospace scientific research unit, analyzing the backwardness of its equipment information management mode, low efficiency and high error rate, this paper puts forward the application of RFID(Radio Frequency Identification) technology in the laboratory, combining visualization, data mining technology and...
Online education interaction is an important part in online education research. The emergence and development of cloud computing and large data technology provide new opportunities for online education interaction research, and have great influence on its service mode and data processing. Based on the characteristics of cloud computing and large data, this paper discusses the problems faced by online...
Frequent Itemsets Mining is a Data Mining technique that has been employed to extract useful knowledge from datasets; and recently, from data streams. Data streams are an unbounded and infinite flow of data arriving at high rates; therefore, traditional Data Mining approaches for Frequent Itemsets Mining cannot be used straightforwardly. Finding alternatives to improve the discovery of frequent itemsets...
Problem reports at NASA are similar to bug reports: they capture defects found during test, post-launch operational anomalies, and document the investigation and corrective action of the issue. These artifacts are a rich source of lessons learned for NASA, but are expensive to analyze since problem reports are comprised primarily of natural language text. We apply {topic modeling to a corpus of NASA...
In this paper, we present a novel hardware implementation of a watermarking system applied on the digital image. The proposed hardware system is based on the DWT (Haar discrete wavelet transform) on the first level of the decomposition. The watermark is hidden in the LH0 (mean frequency sub-band) in goal to get a maximum of the compromise between the visibility and the robustness factors against several...
Exchange of image information is one of the main features of a camera network. In order to exchange a large amount of information, a platform with good communication speed is needed. In this study, we designed and implemented a specialized camera network platform using Wi-Fi Direct devices. This platform can provide various services to other devices within the same network. We designed the platform...
Fast data sorting is an essential component of many high-performance computing systems. High-throughput and highly parallel sorting algorithms are very appropriate for devices which provide massive parallelism like FPGAs and APSoCs. One of the major drawbacks of these platforms is amount of available resources which is a serious obstacle for design of hardware sorters. However, for many practical...
In order to overcome the ever increasing complexity of digital circuits, system design at the Electronic System Level (ESL) has become an area of active research.
The most powerful medium for communication among the individuals to share their valuable thoughts are Online Social Networks (OSNs). ‘Twitter’ is one of the most popular OSN rich with public data/tweets. In this paper we used Twitter Streaming API ‘streamR’ which is provided by ‘R’ statistical programming language, to extract the real-time tweets from Twitter. The tweet has many attributes which can...
In order to split the bottleneck of stream cipher algorithms realized by general processors, flexible configurable and high-performance NBF instructions targeted at stream cipher processing are proposed. Analyzing the structures and operating characteristics of many stream cipher algorithms, the proposed NBF instructions can support different operation data widths, different write-back modes. Moreover,...
This paper presents an area efficient architecture for a dual-mode double precision floating point division, which can either process a double precision (DP) division or two parallel single precision (SP) division. The dual-mode mantissa division architecture is based on the series expansion methodology, and implemented in an iterative fashion. A dual-mode Radix-4 Modified Booth multiplier is designed...
The usability of comparable technology in the higher education is very important for supporting knowledge management at industry assisted technology. An Information Technology (IT) platform with administrators, instructors, and students is necessary to achieve a powerful learning content. This process requires an educational lifeloop management approach. This approach provides some features such as...
An interesting class of irregular algorithms are tree traversal algorithms, which repeatedly traverse spatial trees to perform efficient computations. Optimizing tree traversal algorithms requires understanding specific characteristics of these algorithms which affect their behavior and govern which types of optimizations are likely to perform well. In this work, we present a set of tree traversal...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.