The modelling of the educational processes and their operational support is a key aspect in the construction of more effective e-learning applications. Instructional models are usually described by means of an educati...
详细信息
The modelling of the educational processes and their operational support is a key aspect in the construction of more effective e-learning applications. Instructional models are usually described by means of an educational modelling language (EML). The EML used can be one of the available standards (e.g. IMS Learning Design), the customization of a standard to meet a specific application profile, or even a domain-specific EML specifically designed to best fit in the very particular needs of a learning scenario. In this paper we propose , a general authoring and operationalization architecture capable of dealing with all these possibilities in a highly modular and flexible way. We also outline a specific implementation of based on standard XML technologies and in the BPEL4WS workflow management language, and we describe how this implementation can be used to support IMS Learning Design.
This work presents the performance of WLAN and MANET networks using the auto-configuration of Mobile IP Agents Protocol (DRMIPA). This scheme would allow groups of MIP nodes in WLANs or MANETs to enjoy IP mobility at ...
详细信息
ISBN:
(纸本)9781424436446
This work presents the performance of WLAN and MANET networks using the auto-configuration of Mobile IP Agents Protocol (DRMIPA). This scheme would allow groups of MIP nodes in WLANs or MANETs to enjoy IP mobility at any foreign or local network that doesn't implement MIP. To maintain a failure free MIP network, a passive agent is elected from an active agent if this active agent leaves or ceases its participation from current network. The DRMIPA protocol is implemented in WLAN and MANET. A performance analysis is done using a real world testbed scenario.
The algorithm of the dynamic control functions achieves a complex modeling regarding the behavior of any mechanical robot structure. First of all, considering the kinetic links dominated of stiffness hypothesis, on th...
详细信息
The algorithm of the dynamic control functions achieves a complex modeling regarding the behavior of any mechanical robot structure. First of all, considering the kinetic links dominated of stiffness hypothesis, on the basis of the new formulations with matrix exponentials, in this paper, the differentials expressions answerable to the forward kinematics of mechanical robot structures were presented. On the basis of these equations, in the following, the generalized dynamics forces were also analyzed for the robots with rigid and elastic structure
By now, the concept of program slicing has been known in the research community for around 25 years. As a research topic, it has enjoyed a fair share of popularity, evidenced by the number of articles published on the...
Cyber theft is a serious threat to Internet security. It is one of the major security concerns by both network service providers and Internet users. Though sensitive information can be encrypted when stored in non-vol...
详细信息
Cyber theft is a serious threat to Internet security. It is one of the major security concerns by both network service providers and Internet users. Though sensitive information can be encrypted when stored in non-volatile memory such as hard disks, for many e-commerce and network applications, sensitive information is often stored as plaintext in main memory. Documented and reported exploits facilitate an adversary stealing sensitive information from an application's memory. These exploits include illegitimate memory scan, information theft oriented buffer overflow, invalid pointer manipulation, integer overflow, password stealing Trojans and so forth. Today's computing system and its hardware cannot address these exploits effectively in a coherent way. This paper presents a unified and lightweight solution, called InfoShield that can strengthen application protection against theft of sensitive information such as passwords, encryption keys, and other private data with a minimal performance impact. Unlike prior whole memory encryption and information flow based efforts, InfoShield protects the usage of information. InfoShield ensures that sensitive data are used only as defined by application semantics, preventing misuse of information. Comparing with prior art, InfoShield handles a broader range of information theft scenarios in a unified framework with less overhead. Evaluation using popular network client-server applications shows that InfoShield is sound for practical use and incurs little performance loss because InfoShield only protects absolute, critical sensitive information. Based on the profiling results, only 0.3% of memory accesses and 0.2% of executed codes are affected by InfoShield.
Modelica is a modern, strongly typed, declarative, and object-oriented language for modeling and simulation of complex systems. This paper gives a quick overview of some aspects of the OpenModelica environment - an op...
详细信息
Modelica is a modern, strongly typed, declarative, and object-oriented language for modeling and simulation of complex systems. This paper gives a quick overview of some aspects of the OpenModelica environment - an open-source environment for modeling, simulation, and development of Modelica applications. An introduction of the objectives of the environment is given, an overview of the architecture is outlined and a number of examples are illustrated.
A network with its arc lengths as imprecise number, instead of a real number, namely, interval number and triangular fuzzy number is considered here. Existing ideas on addition and comparison between two imprecise num...
详细信息
The optimal production for an inventory control system of deteriorating multi-items where items are of complementary or substitute types is formulated with a resource constraint. Here, it is assumed that substitute pr...
详细信息
In this paper, realistic production-inventory models without shortages for deteriorating items with imprecise holding and production costs for optimal production have been formulated. Here, the rate of production is a...
详细信息
In robust regression we often have to decide how many are the unusualobservations, which should be removed from the sample in order to obtain better fitting for the restof the observations. Generally, we use the basic...
详细信息
In robust regression we often have to decide how many are the unusualobservations, which should be removed from the sample in order to obtain better fitting for the restof the observations. Generally, we use the basic principle of LTS, which is to fit the majority ofthe data, identifying as outliers those points that cause the biggest damage to the robust ***, in the LTS regression method the choice of default values for high break down-point affectsseriously the efficiency of the estimator. In the proposed approach we introduce penalty cost fordiscarding an outlier, consequently, the best fit for the majority of the data is obtained bydiscarding only catastrophic observations. This penalty cost is based on robust design weights andhigh break down-point residual scale taken from the LTS estimator. The robust estimation is obtainedby solving a convex quadratic mixed integer programming problem, where in the objective functionthe sum of the squared residuals and penalties for discarding observations is minimized. Theproposed mathematical programming formula is suitable for small-sample data. Moreover, we conduct asimulation study to compare other robust estimators with our approach in terms of their efficiencyand robustness.
暂无评论