Nowadays in Ukraine, there is a need for automation and removal of human from the processes of decision making on civil law regulation of contract for the provision of in vitro fertilization, which can significantly i...
详细信息
In this paper, the heat conduction equation for composite materials posed and solved. This problem is known as an inverse initial value problem for the heat conduction equation. In order to solve and formulate this in...
详细信息
Data mining has become an important and active area of research because of theoretical challenges and practical applications associated with the problem of discovering interesting and previously unknown knowledge from...
详细信息
The nonlinear random vibration issues are analyzed by the use of parabolic partial differential equations. Among them, the Fokker-Planck equation is a very powerful tool for obtaining statistical information, because ...
详细信息
The nonlinear random vibration issues are analyzed by the use of parabolic partial differential equations. Among them, the Fokker-Planck equation is a very powerful tool for obtaining statistical information, because it is derived on a probabilistic basis and can be formulated to govern random processes in spring-mass mechanical systems. If a single degree-of-freedom (SDOF) mechanical system is excited by wideband random noise, the statistical behaviour for the relative displacement of the mass can be determined by numerical solving the Fokker-Planck equation. A C++ computer program was written for the two-dimensional finite differences method, with initial value conditions. The numerical method is based on an operator splitting technique combined with an alternating-direction implicit (ADI) method. The white noise like signal is substituted by a true-random number generator that gives uniform random deviates, of real number type. For a concrete example with Gaussian distribution initial conditions, several 3D plots are given for the calculated probability density function.
In this paper we study the use of parallelism to speed up execution of Answer Set Programs (ASP). ASP is an emerging programming paradigm which combines features from constraint programming, logic programming, and non...
详细信息
computer science and engineering communities have been exploring a variety of activities and techniques to attract and retain more students, especially women and minorities, to computer science and computer engineerin...
详细信息
computer science and engineering communities have been exploring a variety of activities and techniques to attract and retain more students, especially women and minorities, to computer science and computer engineering degree programs1. This paper briefly describes the efforts and results of a plan for actively recruiting young women into undergraduate computer engineering and computer science programs hosted by the University of North Texas (UNT). It also describes a series of activities aimed at improving the retention rate of students already in our programs, particularly during the freshman year. Such recruitment and retention efforts are critical to the country's efforts to increase the number of engineering professionals, and are a priority for the computer Science and Engineering (CSE) department at UNT. We initially designed a three-part plan to achieve our recruitment and retention goals: Sponsorship of portable and mobile summer computer engineering robotics camps for middle and high-school women students, coordinating with the regional Girl Scouts councils and other organizations to help with the recruitment;Creation of an Ambassador program using young women currently enrolled in the upper division of current computer science and computer engineering programs as a form of outreach to area high schools and junior colleges;and Expansion of our successful undergraduate mentoring program by using the Ambassador cohort mentioned above as mentors for incoming freshman and first-year transfer women entering our programs. This paper will focus primarily on the summer camp program and present an analysis of the results we have seen to date after 2 years of camp activities. Results from student surveys and parent surveys will be presented. The paper concludes with recommended changes and improvements in the program, as well as a discussion of adaptations that would create programs suitable for implementation at other institutions as well as programs aimed at a dif
Cyclic codes form an important class of codes. They have very interesting algebraic structure. Furthermore, they are equivalent to many important codes, such as binary Hamming codes, Golay codes and BCH codes. Minimal...
详细信息
Cyclic codes form an important class of codes. They have very interesting algebraic structure. Furthermore, they are equivalent to many important codes, such as binary Hamming codes, Golay codes and BCH codes. Minimal codewords in linear codes are widely used in constructing decoding algorithms and studying linear secret sharing scheme. In this paper, we show that in the binary cyclic code all of the codewords are minimal, except 0 and 1. Then, we obtain a result about the number of minimal codewords in the binary cyclic codes.
The software architecture requires interoperable security mechanisms. This article focuses on applying security requirements to service-oriented solution design. SOA security is very much concerned with what the syste...
详细信息
ISBN:
(纸本)9781618040282
The software architecture requires interoperable security mechanisms. This article focuses on applying security requirements to service-oriented solution design. SOA security is very much concerned with what the system is supposed to do and what can go wrong. This article presents the service-oriented approach - security services that can be developed and tested and applied against many types of applications or scenarios. The proposed concept has the contribution to allow for SSAS (Software Security as a Service) providers to provide access to software services without requiring the customer to host this service within their local environment. In this model, the access control decision and (ideally) enforcement functionality is not embedded within an application. The split of enforcement and decision point has its advantages.
This paper investigates the performance trade-offs between accuracy and inference time in real-time object detection models, particularly for detecting landmines and unexploded ordnance (UXO). Using subsets from the C...
详细信息
A bipolar fuzzy set is a generalization of a fuzzy set. In this paper, we apply the concept of bipolar fuzzy sets to multigraphs and planar graphs. We introduce the notions of bipolar fuzzy multigraphs, bipolar fuzzy ...
详细信息
暂无评论