We developed an instruction analysis tool for acquiring the design skill to think of the specification for implementing the instruction. The instruction is split into semantic divisions and function divisions, and the...
详细信息
ISBN:
(纸本)9789868473539
We developed an instruction analysis tool for acquiring the design skill to think of the specification for implementing the instruction. The instruction is split into semantic divisions and function divisions, and the correspondences of the semantic and functional divisions are visually analyzed. Since each function division indicates each hardware operation, the user can clearly understand the relationship between the instruction specification and the hardware operation that implements it. This instruction analysis tool gives the design skill that thinks of the specification for implementing instructions.
The role of manufacturing software, such as being used in CAD/CAM/CAE, production management and scheduling, facility control, has increased the importance. The development of the unique platform and the common enviro...
详细信息
The main aim of this paper is to generate understanding of the range of internal and external factors which impact the Business-to-business electronic commerce (B2B EC) development of the smaller firms in agro- based ...
详细信息
ISBN:
(纸本)9781424449125
The main aim of this paper is to generate understanding of the range of internal and external factors which impact the Business-to-business electronic commerce (B2B EC) development of the smaller firms in agro- based industry. Drawing on existing research on e- readiness models of information, communications and technology (ICT) specifically B2B EC technologies, this paper formulates a conceptual model of B2B EC assessment constructs together with the specific research approach towards the development of a more robust electronic readiness (e- readiness) model. The research presents a conceptual model that highlights the key indicators of the B2B EC implementation based on individual, organizational and environmental dimensions.
Software internationalization is often necessary when distributing software applications to different regions around the world. In manY cases, developers often do not internationalize a software application at the beg...
详细信息
ISBN:
(纸本)9781424434527
Software internationalization is often necessary when distributing software applications to different regions around the world. In manY cases, developers often do not internationalize a software application at the beginning of the development stage. To internationalize such an existing application, developers need to externalize some hardcoded constant strings to resource files, so that translators can easily translate the application to be in a local language without modifying its source code. Since not all the constant strings require externalization, locating those need-to-translate constant strings is a basic task that the developers must conduct. In this paper, we present TranStrL, an Eclipse plug-in tool that automatically locates need-to-translate constant strings in Java code. Our tool maintains a pre-collected list of API methods related to the Graphical User Interface (GUI), and then searches for need-to-translate strings in the source code starting from the invocations of these API methods using string-taint analysis.
IEEE 802.16, known as WiMax, is at the top of communication technology drive because it is gaining a great position in the next generation of wireless networks. Due to the evolution of new technologies wireless is not...
详细信息
IEEE 802.16, known as WiMax, is at the top of communication technology drive because it is gaining a great position in the next generation of wireless networks. Due to the evolution of new technologies wireless is not secured as like others networking technologies. A lot of security concerns are needed to secure a wireless network. By keeping in mind the importance of security, the WiMax working groups has designed several security mechanisms to provide protection against unauthorized access and malicious threats, but still facing a lot of challenging situations. An authentication and authorization model provides protection for a network or technology and protects its resources from unauthorized use. This paper examines the threats which are associated with MAC layer and physical layer of WiMax and also proposes some enhancements to the existing model for improving the performance of the encryption algorithm. The paper proposes some techniques in the existing model to enhance its functionality and capability. Simulation is done using Qualnet4.5 simulation tool and the results are given at the end.
Bandwidth allocation is always an important element in both fixed and wireless networks. Despite this, IEEE 802.16e-2005 does not have a bandwidth allocation algorithm or mechanism to support WiMAX (worldwide interope...
详细信息
Bandwidth allocation is always an important element in both fixed and wireless networks. Despite this, IEEE 802.16e-2005 does not have a bandwidth allocation algorithm or mechanism to support WiMAX (worldwide interoperability for microwave access) network presently. This includes both uplink (UL) and downlink (DL) directions. Thus, most of the research initiatives are focusing in this area. In order to satisfy the users and multi-type services, the total capacity of WiMAX system must be optimized. In this research, a new Intelligence bandwidth allocation of uplink (IBAU) mechanism for UL direction in WiMAX is proposed. The proposed mechanism has a design of the management module in subscribe station (SS), which is for intelligent management UL bandwidth. This includes UL bandwidth allocation and service flow schedule. The IBAU mechanism has a great potential to decrease the delay time, different service flow interference and to improve the throughput of WiMAX.
The grind-hardening is a new type of surface modification technology, which utilizes the dissipated grinding heat for hardening the surface layer of the workpiece. Currently, most of the researchers studying the grind...
详细信息
At first, this paper reviews the development of the protein secondary structure prediction. Some concerned secondary structure prediction methods are introduced. Then we propose a novel method to predict protein secon...
详细信息
Data quality is crucial to any data analysis task. Information collected from many channels prone to disturbance, inconsistent, missing values and redundant information. In our case, these errors arise in metal loss d...
详细信息
Data quality is crucial to any data analysis task. Information collected from many channels prone to disturbance, inconsistent, missing values and redundant information. In our case, these errors arise in metal loss data collected at different point of time using dissimilar sensors and devices in offshore pipeline structure. Furthermore, data collection and analysis are often time consuming and expensive making it undesirable for recollection. Thus, rather than discard the corrupted data, we need to evaluate and enhanced its quality by correcting the errors as much as possible. In this paper, we discuss how data is pre-processed by means of correcting the data to make it ready for further analysis. A modified corrosion rate method was used to enhance the quality of data coupled with a linear prediction method to verify the accuracy of the corrected data. Result shows that the proposed method can minimize the effects of uncertainties on the reliability of the inspection data.
暂无评论