Verification of models and model processing programs are inevitable in real world model-based software development. Model transformation developers are often interested in offline verification methods, when only the d...
详细信息
The use of Numerical Control and computers in manufacturing has enabled the development of new sheet forming processes. One of these flexible processes is called Incremental Sheet Forming (ISF) in which deformation is...
详细信息
ISBN:
(纸本)9781457708381
The use of Numerical Control and computers in manufacturing has enabled the development of new sheet forming processes. One of these flexible processes is called Incremental Sheet Forming (ISF) in which deformation is localized by the movement of a spherical or flat forming tool. ISF is carried out regularly by a CNC machine tool or by a Robot, which follows a tool-path generated by CAM programs, without the need for costly dies. Despite research progresses in understanding the deformation mechanism in ISF the process still needs a further optimization to guarantee the reliability required for industrial applications. This paper deals with the design of a new smart forming tool, applying FEM modeling and simulation, which is able to measure one of the key process parameters: the sheet thickness during the forming process. The authors analyze the possibility to use a Hall-effect sensor integrated into the forming tool for more precise on-line thickness measurement than what can be found in the literature and first results are reported.
Traffic models in computer networks can be described as a complicated system. These systems show non-linear features and to simulate behaviours of these systems are also difficult. Before implementing network equipmen...
Traffic models in computer networks can be described as a complicated system. These systems show non-linear features and to simulate behaviours of these systems are also difficult. Before implementing network equipments users wants to know capability of their computer network. They do not want the servers to be overloaded during temporary traffic peaks when more requests arrive than the server is designed for. As a starting point for our study a non-linear system model of network traffic is established to exam behaviour of the network planned. The paper presents setting up a non-linear simulation model that helps us to observe dataflow problems of the networks. This simple model captures the relationship between the competing traffic and the input and output dataflow. In this paper, we also focus on measuring the bottleneck of the network, which was defined as the difference between the link capacity and the competing traffic volume on the link that limits end-to-end throughput. We validate the model using measurements on a working network. The results show that the initial model estimates well main behaviours and critical parameters of the network. Based on this study, we propose to develop a new algorithm, which experimentally determines and predict the available parameters of the network modelled.
The popularity of web based social networks is rapidly increasing nowadays. These solutions allow managing relationships online. There are also several mobile solutions to these networks but they are mainly limited to...
详细信息
Although the computerized verification of handwritten signatures has been extensively studied in the past three decades, the results on the field are still unsatisfactory. This paper provides a generic analytic approa...
详细信息
ISBN:
(纸本)9789604742134
Although the computerized verification of handwritten signatures has been extensively studied in the past three decades, the results on the field are still unsatisfactory. This paper provides a generic analytic approach for modeling different kinds of signature verification systems and estimating their performance limitations based on simple properties of the signature database, which is used to evaluate the system. Although our current approach concentrates only on skilled forgeries, it could be well extended to handle unskilled and random forgeries and thereby provide a model, which is applicable to current commercial signature verification systems.
In most articles dataflow in computer networks is described as a transfer function. Numerators, denominators and delay times give behaviors of these systems. Some systems show linear features, others have non-linear o...
详细信息
Although the computerized verification of handwritten signatures has been extensively studied in the past three decades, the results on the field are still unsatisfactory. This paper provides a generic analytic approa...
详细信息
ISBN:
(纸本)9789604742011
Although the computerized verification of handwritten signatures has been extensively studied in the past three decades, the results on the field are still unsatisfactory. This paper provides a generic analytic approach for modeling different kinds of signature verification systems and estimating their performance limitations based on simple properties of the signature database, which is used to evaluate the system. Although our current approach concentrates only on skilled forgeries, it could be well extended to handle unskilled and random forgeries and thereby provide a model, which is applicable to current commercial signature verification systems.
Meta Object Facility 2.0 Query/Views/Transformation (QVT) is OMG's standard for specifying model transformations, views and queries. In this paper we deal with the QVT Relations language, which is a declarative sp...
详细信息
ISBN:
(纸本)9789898425225
Meta Object Facility 2.0 Query/Views/Transformation (QVT) is OMG's standard for specifying model transformations, views and queries. In this paper we deal with the QVT Relations language, which is a declarative specification of model transformation between two models. The QVT Relations language specifies several great features in practice, such as implicit trace creation support, or bidirectional transformations. However, QVT lacks implementation because its specification is not final and far too complex. The main contribution of this paper is to show how we integrated QVT constructs in our domain-specific modeling environment to facilitate a later implementation of QVT Relations-driven bidirectional model transformation.
The increasing capabilities of mobile phones enable them to participate in different type of web-based systems. One of the most popular systems are social networks. The phonebooks of the mobile devices also represent ...
详细信息
The increasing capabilities of mobile phones enable them to participate in different type of web-based systems. One of the most popular systems are social networks. The phonebooks of the mobile devices also represent social relationships of the owner. This can be used for discovering additional relations in social networks. Following this line of thought, mobile-based social networks can be created by enabling a synchronization mechanism between,. phonebooks of the users and the social network. This mechanism detects similarities between phonebook contacts and members of the network. Users can accept or ignore these similarities. After acceptance, identity links are formed. If a member changes her or his personal detail, it will be propagated automatically into the phonebooks, via identity links after considering privacy settings. Estimating the total number of these identity links is a key issue from scalability and performance point of view in such networks. We have implemented a mobile-based social network, called Phonebookmark and examined the structure of the network during a test period of the system. We have found, that the distribution of identity links of the users follows a power law. Based on this, we propose a model for estimating the total number of identity links in the dynamically evolving network. We verify the model by measurements and we also prove the accuracy of the model mathematically. For this we use the fact, that the number of identity links of each user (and thus, the value of the random variable modeling it) is bounded linearly by the number of members N m of the network. Then we show, that the variance of the random variable is Θ(NM3-β), where 2 0, Pr[X = x] = c.x-β, if x ≥ Nm and Pr[X = x] = 0 otherwise. The model and the results can be used in general when the distribution shows similar behavior.
This paper is looking into the possibility of multimedia content distribution over multiple mobile platforms forming wireless peer - to - peer networks. State of the art mobile networks are centralized and base statio...
详细信息
暂无评论