Rapid business change demands the ability to adapt, rearrange and reinvent business processes while keeping the alignment with supporting information systems. However, such tasks require a business process to be consi...
详细信息
Due to short product life cycles, increasing variety of products and short cycles of leap innovations manufacturing companies have to increase the flexibility of factory structures. Flexibility of factory structures i...
详细信息
Due to short product life cycles, increasing variety of products and short cycles of leap innovations manufacturing companies have to increase the flexibility of factory structures. Flexibility of factory structures is based on defined factory planning processes in which product, process and resource data of various partial domains have to be considered. Thus factory planning processes can be characterized as iterative, interdisciplinary and participative processes [1]. To support interdisciplinary and participative character of planning processes, a federative factory data management (FFDM) as a holistic solution will be described. FFDM is already implemented in form of a prototype. The interim results of the development of FFDM will be shown in this paper. The principles are the extracting of product, process and resource data from documents of various partial domains providing as web services on a server. The described data can be requested by the factory planner by using a FFDM-browser.
It is very challenging issue to utilize human-being's behaviors or reactions as a way of interacting to virtual world. Indoor baseball simulation system is one of good candidates to combine real equipment and acti...
详细信息
It is very challenging issue to utilize human-being's behaviors or reactions as a way of interacting to virtual world. Indoor baseball simulation system is one of good candidates to combine real equipment and actions with virtual contents. As one of experimental approach to break a barrier between virtual game space and human-being's real behavior, we mapped out an experiment on seamless gaming between 3D virtual game space and human-being's real behavioral space, where real balls and bats are augmented with online baseball contents through computer vision and sensor technologies. The Simulation Engine, the key part of our proposal, consists of 6 components: Pitch Recognizer, Toss Controller, Swing Detector, Vehicle Recognizer, Vehicle Tracker and Trajectory Calculator. This approach, utilizing human-being's behaviors as input event, will open the new field of digital interfaces.
The protection and authentication problems for three dimensional (3D) models have become more and more important. The capability of accurately verifying, locating, and recovering any tampered vertex is one of the most...
详细信息
The thermal conductivity of nitrogen-doped Ge 2 Sb 2 Te 5 (N-GST) was analyzed using Frequency Domain Thermoreflectance (FDTR). The thermal conductivity of amorphous N-GST (~0.15 W/m-K) was not found to change signif...
详细信息
The thermal conductivity of nitrogen-doped Ge 2 Sb 2 Te 5 (N-GST) was analyzed using Frequency Domain Thermoreflectance (FDTR). The thermal conductivity of amorphous N-GST (~0.15 W/m-K) was not found to change significantly as the nitrogen concentration was raised from 0 at% to ~6 at%, possibly due to the huge amount of phonon scattering in the disordered films. The thermal conductivity of crystalline N-GST films was found to increase initially with increasing N content, but then to decrease upon further N addition. X-ray diffraction spectra of N-GST films show increasing defect density that correlates with the decrease in thermal conductivity of the crystalline films at higher nitrogen content.
In the current, There are a lot of problems in CG teaching, Thematic Teaching Method as a new teaching model is an effective way to cultivate high quality CG talents which places great emphasis on students' creati...
详细信息
In the current, There are a lot of problems in CG teaching, Thematic Teaching Method as a new teaching model is an effective way to cultivate high quality CG talents which places great emphasis on students' creative thinking, problem solving, and collaboration capabilities, etc. The paper discusses the innovation and implementation of Thematic Teaching Method to CG teaching.
Estimating the worst-case execution time (WCET) of real-time embedded systems is compulsory for the verification of their correct functioning. Traditionally, the WCET of a program is estimated assuming availability of...
详细信息
Estimating the worst-case execution time (WCET) of real-time embedded systems is compulsory for the verification of their correct functioning. Traditionally, the WCET of a program is estimated assuming availability of the program's binary which is disassembled to reconstruct the program, and in some cases its source code to derive useful high-level execution information. However, in certain scenarios the program's owner requires that the binary of the program not be reverse-engineered to protect intellectual property, and in extreme situations, the program's binary is not available for the analysis, in which case it is substituted by program-execution traces. In this paper we show that we can obtain WCET estimates for programs based on runtime-generated or owner-provided time-stamped execution traces and without the need to access the source code or reverse-engineer the binaries of the programs. We show that we can provide very accurate WCET estimations using both integer linear programming (ILP) and constraint logic programming (CLP). Our method generates safe and tight WCET estimations for all the benchmarks used in the evaluation.
This paper presents a user authentication scheme for healthcare application using wireless medical sensor networks (WMSNs), where wireless medical sensors are used for patients monitoring. These medical sensors' s...
详细信息
This paper presents a user authentication scheme for healthcare application using wireless medical sensor networks (WMSNs), where wireless medical sensors are used for patients monitoring. These medical sensors' sense the patient body data and transmit it to the professionals (e.g., doctors, nurses, and surgeons). Since, the data of an individual are highly vulnerable, it must ensures that patients medical vital signs are secure, and are not exposed to an unauthorized person. In this regards, we propose a user authentication scheme for healthcare application using medical sensor networks. The proposed scheme includes: a novel two-factor professionals authentication (user authentication), where the healthcare professionals are authenticated before access the patient's body data; a secure session key is establish between the patient sensor node and the professional at the end of user authentication. Furthermore, the analysis shows that the proposed scheme is safeguard to various practical attacks and achieves efficiency at low computation cost.
Robust control problems for nonlinear systems are usually formulated as L 2 -induced norm minimization problems and it is known that those problems are reduced to the solvability of Hamilton-Jacobi equations. However,...
详细信息
Robust control problems for nonlinear systems are usually formulated as L 2 -induced norm minimization problems and it is known that those problems are reduced to the solvability of Hamilton-Jacobi equations. However, in the case of bilinear systems the usual L 2 -induced norm minimization problem leads to an obvious solution (the zero input). To avoid the obvious solution Simizu et al. (1997) introduced nonlinear weights on the evaluated signal and proposed a design method using linearization of the state-dependent matrix Riccati inequality derived from the Hamilton-Jacobi equation. In contrast to this, the purpose of the present paper is to propose a new design method using SOS (Sum-of-Squares) optimization technique without linearization.
暂无评论