Experience and business intuition of a contractor are often insufficient to ensure that tender procedures will provide a good trade-off between the cost of bid preparation and the benefit of a high probability of winn...
详细信息
Experience and business intuition of a contractor are often insufficient to ensure that tender procedures will provide a good trade-off between the cost of bid preparation and the benefit of a high probability of winning a money-making contract. the authors put forward a set of decision-support models: a multi-criteria analysis for assessing the desirability of a potential new contract, and two linear programming models: one for calculating the total price, and the other for distributing the bid amount among the items of the bill of quantities to maximize the contractor's cash flows. Application of the models is illustrated with a numerical example. (C) 2016 the Authors. Published by Elsevier Ltd.
Over the past decade, the sprinting performances of athletes with a leg amputation have come significantly closer to those of their non-amputee colleagues. the differences in the underlying whole-body mechanics of amp...
详细信息
ISBN:
(纸本)9781538681848
Over the past decade, the sprinting performances of athletes with a leg amputation have come significantly closer to those of their non-amputee colleagues. the differences in the underlying whole-body mechanics of amputee and non-amputee sprinting have not yet been fully explored, though. the aim of this study was to investigate optimality principles applied by amputee and non-amputee sprinters by means of inverse optimal control (IOC). We have formulated hypotheses for five potential elementary optimality criteria and identified their respective weights that allow the closest possible matches to reference motions for both cases. We have established rigid multi-body system models of a non-amputee and a unilateral transtibial amputee athlete. Each of them has 13 degrees of freedom in the sagittal plane and is equipped with torque actuators at all internal joints - except for the ankle joint of the passive running-specific prosthesis. the IOC problem is formulated as a bi-Ievel problem that solves an identification problem in the outer loop and a motion synthesis optimal control problem in the inner loop. We found a set of optimal weights for each of the two athletes with which motions are synthesized that come close to motion capture data. We conclude that the IOC approach is promising for the identification of optimization criteria in sprinting with and without prostheses.
Over the past two decades, various research works have been going on Multiple Sequence Alignment (MSA) and it becomes an important domain in bioinformatics. this is an NPhard problem. For this purpose, various traditi...
详细信息
ISBN:
(纸本)9781538618608
Over the past two decades, various research works have been going on Multiple Sequence Alignment (MSA) and it becomes an important domain in bioinformatics. this is an NPhard problem. For this purpose, various traditional, heuristics and metaheuristic methods have been applied. Among these methods, metaheuristics show an effective output to overcome the bottleneck of MSA problem. Different metaheuristic methods and software have been developed to overcome the speed and accuracy problem of MSA, while the number of sequences increases. In this article, we have surveyed widely used metaheuristic methods and alignment tools applied for solving MSA problem. However, after reviewing we can conclude that the time complexity is still a big challenge for MSA problem.
K-12 classrooms use block-based programming environments (BBPEs) for teaching computer science and computational thinking (CT). To support assessment of student learning in BBPEs, we propose a learning analytics frame...
详细信息
ISBN:
(纸本)9781450348706
K-12 classrooms use block-based programming environments (BBPEs) for teaching computer science and computational thinking (CT). To support assessment of student learning in BBPEs, we propose a learning analytics framework that combines hypothesis- and data-driven approaches to discern students' programming strategies from BBPE log data. We use a principled approach to design assessment tasks to elicit evidence of specific CT skills. Piloting these tasks in high school classrooms enabled us to analyze student programs and video recordings of students as they built their programs. We discuss a priori patterns derived from this analysis to support data-driven analysis of log data in order to better assess understanding and use of CT in BBPEs.
this study is part of the whole study which is to introduce robotic approach in teaching and learning Structured programming. Learning programming especially to new students who do not have any prior experience in cod...
详细信息
the paper analyses computational model based on dynamic programming for platforms with multicore processors and heterogeneous architectures with FPGA. the models are applied for solving a canonical problem of dispatch...
详细信息
ISBN:
(纸本)9781509048151
the paper analyses computational model based on dynamic programming for platforms with multicore processors and heterogeneous architectures with FPGA. the models are applied for solving a canonical problem of dispatching where the computation time significantly depends on the problem scale factor. the parallel algorithms of NP-hard problem of dispatching are complicate and require intensive RAM data exchange. In order to reduce the computation time, it is suggested to use FPGA as a coprocessor providing massively parallel computation and increase the operational performance of the system in one order.
Metal recycling is an issue that needs attention and should be practiced by people as it has many advantages to human and Earth. In order to get a metal from Earth, the process called mining are needed where it can ha...
详细信息
Metal recycling is an issue that needs attention and should be practiced by people as it has many advantages to human and Earth. In order to get a metal from Earth, the process called mining are needed where it can harm our natural resources due to depletion of the area to be mined. If the process is not controlled, most of the areas on Earth will have huge excavation holes. So, people should be responsible to prevent this from happening to preserve the environment in a good quality by recycling the metal material. By metal recycling, it can save an energy and resources as it can reduce the demand for raw materials, hence maintain the natural resources for the future. the proposed automatic metal waste separation system is intended to ease the people to separate the waste material. Besides, it will make the metal recycling industry work easier because the metal waste is already isolated at garbage collection side. the purpose of the project is to design a system to separate the metal recyclable household waste automatically and record the data waste collected. there are total of four detectors used to separate the non-metal, steel, copper and aluminum metal waste. the average time used to complete metal separation process by using the proposed prototype is 14.5 seconds. this project includes a mechanical part, programming part and an electronic design. the system will be programmed using Arduino Mega as a microcontroller to control all the electronic component in the system.
Nowadays, the heterogeneity of interconnected things and communication technologies creates several small worlds composed of a single object and a smartphone. For each object, the user needs to download a specific app...
详细信息
Nowadays, the heterogeneity of interconnected things and communication technologies creates several small worlds composed of a single object and a smartphone. For each object, the user needs to download a specific application, search and connect the device. the result is a waste of valuable resources: several objects are able to communicate withthe smartphone, but they cannot directly interact among them. In this paper, we propose a model that can be used to define a set of standard interfaces suitable for every smart object. Devices that adhere to the same model can be easily controlled and placed in relation among them, creating multi-object behaviors for a smart space. the smartphone is still a control center, but with a single application it is possible to control and personalize spaces in a holistic way, instead of using the traditional one-to-one approach. Moreover, personalization should be portable: it is desirable that a behavior works in as many smart spaces as possible, at least in a similar way as it does in the environment in which it was configured, freeing the user from the tedious task of adapting it manually every time s/he goes to another space. A portable personalization extends the bring your own device paradigm to a new "bring your own space" paradigm. the model is inspired in the object-oriented programming, reinterpreting features such as inheritance and polymorphism to the real world, so it is possible to provide a software system able to adapt existing behaviors to new spaces. the use of the model is exemplified in the paper with two examples of smart spaces. 1877-0509 (C) 2017the Authors. Published by Elsevier B.V.
Distribution losses are one of the major concern for India. According to central electricity authority(CEA) executive summary report May 2017 transmission and distribution losses accounts for about 22%. these losses c...
详细信息
As cloud computing environments move towards securing against simplistic threats, adversaries are moving towards more sophisticated attacks such as ROP (Return Oriented programming). In this paper we propose the LIve ...
详细信息
ISBN:
(纸本)9789897582431
As cloud computing environments move towards securing against simplistic threats, adversaries are moving towards more sophisticated attacks such as ROP (Return Oriented programming). In this paper we propose the LIve Text Page-level Re-ordering (LITPR) system for prevention of ROP style attacks and in particular the largely unaddressed Blind ROP attacks on applications running on cloud servers. ROP and BROP, respectively, bypass protections such as DEP (Data Execution Prevention) and ASLR (Address Space Layout Randomization) that are offered by the Linux operating system and can be used to perform arbitrary malicious actions against it. LITPR periodically randomizes the in-memory locations of application and kernel code, at run time, to ensure that both ROP and BROP style attacks are unable to succeed. this is a dramatic change relative to ASLR which is a load time randomization technique.
暂无评论