In the era of research where topics like Sentiment Analysis, NLP (natural language processing), Artificial Intelli- gence, Transfer learning are buzz words. Sentiment Analysis is a field which have proved its importan...
详细信息
In contrast to single-component pipe flows, where the developed velocity profile depending on the Reynolds number plays a defining role in the flow measurement, the addition of other phases leads to the wide range of ...
详细信息
At present cloud computing environment, DDoS attacks have become a weapon for the illegitimate user’s as well as for the cyber terrorists. these attacks have the capability to disrupt large scale network infrastructu...
详细信息
Security is a key factor for providing high-quality software. In the last few years, a significant number of security incidents has been reported. Considering scenarios that may lead to such incidents right from the b...
详细信息
ISBN:
(纸本)9789897583995
Security is a key factor for providing high-quality software. In the last few years, a significant number of security incidents has been reported. Considering scenarios that may lead to such incidents right from the beginning of software development, i.e. during requirements engineering, reduces the likelihood of such incidents significantly. Furthermore, the early consideration of security reduces development effort since identified scenarios do not need to be fixed in later stages of the development lifecycle. Currently, the identification of possible incident scenarios requires high expertise from security engineers and is often performed in brainstorming sessions. those sessions often lack a systematic process which can lead to overlooking relevant aspects. Our aim is to bring together security engineers and requirements engineers. In this paper, we propose a systematic, tool-based and model-based method to identify incident scenarios based on functional requirements by following the principle of security-by-design. Our method consists of two parts: First, we enhance the initial requirements model with necessary domain knowledge, and second we systematically collect relevant scenarios and further refine them. For all steps, we provide validation conditions to detect errors as early as possible when carrying out the method. the final outcome of our method is a CORAS threat model that contains the identified scenarios in relation withthe requirements model.
the article presents a hardware implementation of an APRS (Automatic Packet Reporting System) based tracker for determining the location of an object in real time. It was developed and tested in the educational proces...
详细信息
this paper presents an improved version of direct power control (DPC) applied to the shunt active power filtering system (SAPF). By using the adaptive proportional-integral (PI) control strategy in the dc-link voltage...
详细信息
CONTEXT Numerous non-cognitive and affective (NCA) factors (e.g. Personality, Identity, Mindset, etc.) relate to student success in academics. Some factors or collection of factors relate positively to academic succes...
详细信息
ISBN:
(纸本)9781713862604
CONTEXT Numerous non-cognitive and affective (NCA) factors (e.g. Personality, Identity, Mindset, etc.) relate to student success in academics. Some factors or collection of factors relate positively to academic success while others do not. In addition, many NCA factors are malleable, creating an opportunity for educators to improve student academic performance withthe use of targeted interventions. Understanding how factors change over time and the causes of those changes can provide insight to educators looking to improve individual academic performance in engineering and computing students. PURPOSE OR GOAL As a first step in determining to what extent NCA-based interventions can improve academic performance and the perceived quality of the undergraduate experience, we seek to know how NCA factors of a group of Mechanical engineering students change over time. We posit that some NCA factors will not change (some constructs are not considered malleable) and some factors will change at identifiable points in the students' experience. APPROACH OR MEthODOLOGY/MEthODS A comprehensive and validated survey instrument measuring 28 NCA factors was given to engineering and computing students (n>2000) at a large state university in the United States for three consecutive academic years. A small group (n=47) took the survey in each of their first three years of university studies. Looking at these survey responses, we performed a repeated measures analysis of variance to determine longitudinal changes in NCA factors. ACTUAL OR ANTICIPATED OUTCOMES Analysis indicates that six of the NCA factors change significantly for the Mechanical engineering students over time. these include engineering Identity, Motivation by Expectancy, two measures of Stress, Belongingness and Neuroticism. there may be a slight increase in responses for the two measures of Stress and Neuroticism over time. However, for Motivation by Expectancy, Belongingness and engineering Identity, there is evidence o
Indicators are a modern tool for measuring and identifying the quality of goods such as tourism and recreation in a region. Index systems have been established throughout Europe and almost all over the world to presen...
详细信息
Serial manipulators have a workspace within which the manipulator can reach. While designing and developing a manipulator, it is important to check whether a pose (position and orientation) is attainable or not. thoug...
详细信息
Serial manipulators have a workspace within which the manipulator can reach. While designing and developing a manipulator, it is important to check whether a pose (position and orientation) is attainable or not. though there exist many methods on workspace analysis that are proposed by researchers, these have to be implemented by the users in the form of MATLAB program or equivalent. there is no free software, in the best knowledge of the authors, that can draw workspace for a wrist-partitioned serial manipulator. through this paper, the authors present a new module on Workspace Analysis in RoboAnalyzer software. the module lets the user enter the Denavit-Hartenberg (DH) parameters of a serial manipulator and its workspace region is drawn and shown to the user. the authors have discovered that incremental joint motion gives better results than the Monte-Carlo random sampling of joint angles within allowed joint range, proposed by many researchers. the authors also propose a novel method to determine the boundary of the points in the workspace using a concept of radial frustum. Finally, the workspace regions of many industrial manipulators were drawn using the proposed module and verified to be correct. the authors feel the module would help in effective teaching and learning in a robotics related course and also help robotics designers to visualize the workspace and make any corrective changes in their design.
the acquisition of the center of gravity of the upper body of the exoskeleton robot is critical in the balance control. In order to solve the problems of poor portability, low efficiency and precision of gravity cente...
详细信息
暂无评论