Knowledge governance analyses to what extent knowledge processes are influenced by governance mechanisms. A number of advances have been made in this field, but much space remains for research. However, before advanci...
详细信息
ISBN:
(纸本)9781467328432
Knowledge governance analyses to what extent knowledge processes are influenced by governance mechanisms. A number of advances have been made in this field, but much space remains for research. However, before advancing in this direction, we must have a tool to direct efforts and provide a certain notion of the progress made in research. This paper proposes a matrix that brings knowledge management processes into relation with knowledge governance objectives (ProGOb matrix). This matrix provides information about which knowledge processes affect which governance objectives, and to what extent. The ProGOb matrix can be highly useful in the current tendency towards the Web 2.0, where knowledge distribution requires knowledge governance which has clear objectives and takes specific actions.
Recently many researchers are working on Peer-to-Peer (P2P) networks, which are able to overcome the firewalls, NATs and other security devices without changing the network policy. P2P architectures will be very impor...
详细信息
Recently many researchers are working on Peer-to-Peer (P2P) networks, which are able to overcome the firewalls, NATs and other security devices without changing the network policy. P2P architectures will be very important for future distributed systems and applications. In such networks, peers are heterogeneous in providing the services and they do not have the same competence of reliability. Therefore, it is necessary to estimate whether a peer is trustworthy or not for file sharing and other services. In this paper, we propose an integrated fuzzy-based trustworthiness system for P2P Communications in JXTA-Overlay, which consists of two Fuzzy Logic Controllers (FLC1 and FLC2). For FLC1, we use three input parameters: Number of Jobs (NJ), Number of Connections (NC) and Connection Lifetime (CL) and the output is Actual Behavioural Criterion (ABC). We use ABC and Reputation (R) as input linguistic parameters for FLC2 and the output is Peer Reliability (PR). We evaluate the proposed system by computer simulations. The simulation results has shown that the proposed system has a good behaviour.
The creation of tools, techniques and methodologies to support the manipulation of large data sets has been receiving special attention of both scientific and industrial communities, in order to discover new ways of d...
详细信息
The creation of tools, techniques and methodologies to support the manipulation of large data sets has been receiving special attention of both scientific and industrial communities, in order to discover new ways of dealing with the underlying information, including learning purposes, identification of patterns, decision making support, amongst others. However, making use of computing resources to enhance awareness and understanding of software information and the software itself is still a challenge in software/systemsengineering, since it involves the identification of suitable mechanisms, adequate abstractions, and studies on stimulation of the human perceptive and cognitive abilities. This paper presents some of the challenges in this context, based on current trends of software development lifecycle, program comprehension, and software engineering education. At the end, a special focus is given on ongoing research on using and improving current mechanisms for supporting software reuse practices and software comprehension in general.
Peer to Peer (P2P) systems recently are receiving a lot of attention from the researchers. In such systems, peers are heterogeneous in providing resources and services. Peers do not have the same reliability so it is ...
详细信息
Peer to Peer (P2P) systems recently are receiving a lot of attention from the researchers. In such systems, peers are heterogeneous in providing resources and services. Peers do not have the same reliability so it is necessary to evaluate their trustworthiness for a reliable sharing of the resources and services. In this paper, we propose a fuzzy-based system for peer reliability in JXTA-Overlay P2P platform. We took in consideration two parameters: Actual Behaviour Criterion (ABC) and Amount of Data Exchanged (ADE) between peers. We evaluate the performance of the proposed system by computer simulations. The simulation results shows that the proposed system has a good behaviour and it can be used successfully to select the most reliable peer to execute the tasks.
Efficient neighbor sensing in vehicular wireless networks is crucial to a number of applications such as driving safety and data delivery. For neighbor sensing, a vehicle has to send probe messages. The characteristic...
Efficient neighbor sensing in vehicular wireless networks is crucial to a number of applications such as driving safety and data delivery. For neighbor sensing, a vehicle has to send probe messages. The characteristics of vehicular networks raise several great challenges for real-time neighbor sensing. First, simultaneous wireless transmissions lead to packet collision. The aggressiveness of probe message transmission has a great impact on sensing latency, and it is difficult to determine the optimal aggressive degree of probe message transmission. Second, the number of neighbors of a vehicle in an urban environment may change over time and a static control method for probe message transmission results in poor performance. We design a protocol ENS for efficient neighbor sensing, in which each vehicle performs a randomized broadcast of probe messages in fix-length frames. To approach optimal neighbor sensing, ENS adopts an adaptive probe message transmission strategy. Based on an analytical framework, we theoretically determine the optimal configurations for number of probe messages and frame length. We have conducted trace driven simulation experiments, and performance results demonstrate that ENS outperforms two other alternative algorithms. In addition, more than 90% of association latencies are less than 600 ms, and more than 90% of disassociation latencies are less than 200 ms under a typical urban setting.
This note generalizes the stability analysis for a high frequency networked control system. The high-frequency networked control system is described by a delta operator system with a high frequency constraint. Stabili...
详细信息
This note generalizes the stability analysis for a high frequency networked control system. The high-frequency networked control system is described by a delta operator system with a high frequency constraint. Stability conditions are given for the high frequency delta operator system. Furthermore, by developing the generalized Kalman-Yakubovic-Popov lemma, improved stability conditions are also presented in terms of linear matrix inequalities. Some experiment results are presented to illustrate the effectiveness of the developed techniques.
This paper presents an alternative approach, based on the transmission line theory, for determination of the attenuation constant (α), phase constant (β), characteristic impedance (Zo), refractive index (n), effecti...
详细信息
This paper presents an alternative approach, based on the transmission line theory, for determination of the attenuation constant (α), phase constant (β), characteristic impedance (Zo), refractive index (n), effective permittivity (ε) and effective permeability (μ) for active transmission line (TL) metamaterial. When active elements are introduced into the lossy TL meta-material, the gain acquired from the active elements should be evaluated quantitatively against the attenuation due to the loss in order to avoid ambiguities in determining the signs of the effective constitutive parameters. In stead of directly determining the characteristic impedance from S-parameters, we introduce the reflection coefficient as an intermediate quantity to assist solving the characteristic impedance. This paper shows demonstration of this method with an example of active TL metamaterial.
Students often annotate texts they are reading using highlighting, underlining, and written comments and marks in the margins of the text. These may serve various functions and will reflect each student's goals an...
详细信息
Students often annotate texts they are reading using highlighting, underlining, and written comments and marks in the margins of the text. These may serve various functions and will reflect each student's goals and understanding of the text. This research proposes two simple biology-inspired approaches to represent the patterns of student annotations and to cluster students based on the similarity between their annotations; the annotations produced were simple highlighting. To verify the effectiveness of the proposed approaches, the research compared the processing speed of these approaches with generic hierarchical clustering algorithm implemented in Matlab and compared the accuracy of the clusters with the clusters created by human raters. The results show that both of the proposed approaches are more efficient and accurate than the generic hierarchical clustering algorithm. The proposed methodology can be implemented as an add-on to existing learning management systems and e-book readers, to automatically offer the students important notes and annotations conducted by others (either peers or students in the past) who have similar annotation behaviour pattern and style to the students.
Wireless sensor networks have been widely applied to various application domains such as environmental monitoring and surveillance. Because of reliance on the open transmission media, a sensor network may suffer from ...
详细信息
In this work, we propose a recursive local linear estimator (RLLE) for identification of nonlinear autoregressive systems with exogenous inputs, along with an analysis of its strong consistency and asymptotical mean s...
详细信息
In this work, we propose a recursive local linear estimator (RLLE) for identification of nonlinear autoregressive systems with exogenous inputs, along with an analysis of its strong consistency and asymptotical mean square error properties. The performance of the proposed RLLE is verified by a simulation example.
暂无评论