The creation of tools, techniques and methodologies to support the manipulation of large data sets has been receiving special attention of both scientific and industrial communities, in order to discover new ways of d...
详细信息
The creation of tools, techniques and methodologies to support the manipulation of large data sets has been receiving special attention of both scientific and industrial communities, in order to discover new ways of dealing with the underlying information, including learning purposes, identification of patterns, decision making support, amongst others. However, making use of computing resources to enhance awareness and understanding of software information and the software itself is still a challenge in software/systemsengineering, since it involves the identification of suitable mechanisms, adequate abstractions, and studies on stimulation of the human perceptive and cognitive abilities. This paper presents some of the challenges in this context, based on current trends of software development lifecycle, program comprehension, and software engineering education. At the end, a special focus is given on ongoing research on using and improving current mechanisms for supporting software reuse practices and software comprehension in general.
Peer to Peer (P2P) systems recently are receiving a lot of attention from the researchers. In such systems, peers are heterogeneous in providing resources and services. Peers do not have the same reliability so it is ...
详细信息
Peer to Peer (P2P) systems recently are receiving a lot of attention from the researchers. In such systems, peers are heterogeneous in providing resources and services. Peers do not have the same reliability so it is necessary to evaluate their trustworthiness for a reliable sharing of the resources and services. In this paper, we propose a fuzzy-based system for peer reliability in JXTA-Overlay P2P platform. We took in consideration two parameters: Actual Behaviour Criterion (ABC) and Amount of Data Exchanged (ADE) between peers. We evaluate the performance of the proposed system by computer simulations. The simulation results shows that the proposed system has a good behaviour and it can be used successfully to select the most reliable peer to execute the tasks.
Efficient neighbor sensing in vehicular wireless networks is crucial to a number of applications such as driving safety and data delivery. For neighbor sensing, a vehicle has to send probe messages. The characteristic...
Efficient neighbor sensing in vehicular wireless networks is crucial to a number of applications such as driving safety and data delivery. For neighbor sensing, a vehicle has to send probe messages. The characteristics of vehicular networks raise several great challenges for real-time neighbor sensing. First, simultaneous wireless transmissions lead to packet collision. The aggressiveness of probe message transmission has a great impact on sensing latency, and it is difficult to determine the optimal aggressive degree of probe message transmission. Second, the number of neighbors of a vehicle in an urban environment may change over time and a static control method for probe message transmission results in poor performance. We design a protocol ENS for efficient neighbor sensing, in which each vehicle performs a randomized broadcast of probe messages in fix-length frames. To approach optimal neighbor sensing, ENS adopts an adaptive probe message transmission strategy. Based on an analytical framework, we theoretically determine the optimal configurations for number of probe messages and frame length. We have conducted trace driven simulation experiments, and performance results demonstrate that ENS outperforms two other alternative algorithms. In addition, more than 90% of association latencies are less than 600 ms, and more than 90% of disassociation latencies are less than 200 ms under a typical urban setting.
This note generalizes the stability analysis for a high frequency networked control system. The high-frequency networked control system is described by a delta operator system with a high frequency constraint. Stabili...
详细信息
This note generalizes the stability analysis for a high frequency networked control system. The high-frequency networked control system is described by a delta operator system with a high frequency constraint. Stability conditions are given for the high frequency delta operator system. Furthermore, by developing the generalized Kalman-Yakubovic-Popov lemma, improved stability conditions are also presented in terms of linear matrix inequalities. Some experiment results are presented to illustrate the effectiveness of the developed techniques.
This paper presents an alternative approach, based on the transmission line theory, for determination of the attenuation constant (α), phase constant (β), characteristic impedance (Zo), refractive index (n), effecti...
详细信息
This paper presents an alternative approach, based on the transmission line theory, for determination of the attenuation constant (α), phase constant (β), characteristic impedance (Zo), refractive index (n), effective permittivity (ε) and effective permeability (μ) for active transmission line (TL) metamaterial. When active elements are introduced into the lossy TL meta-material, the gain acquired from the active elements should be evaluated quantitatively against the attenuation due to the loss in order to avoid ambiguities in determining the signs of the effective constitutive parameters. In stead of directly determining the characteristic impedance from S-parameters, we introduce the reflection coefficient as an intermediate quantity to assist solving the characteristic impedance. This paper shows demonstration of this method with an example of active TL metamaterial.
Students often annotate texts they are reading using highlighting, underlining, and written comments and marks in the margins of the text. These may serve various functions and will reflect each student's goals an...
详细信息
Students often annotate texts they are reading using highlighting, underlining, and written comments and marks in the margins of the text. These may serve various functions and will reflect each student's goals and understanding of the text. This research proposes two simple biology-inspired approaches to represent the patterns of student annotations and to cluster students based on the similarity between their annotations; the annotations produced were simple highlighting. To verify the effectiveness of the proposed approaches, the research compared the processing speed of these approaches with generic hierarchical clustering algorithm implemented in Matlab and compared the accuracy of the clusters with the clusters created by human raters. The results show that both of the proposed approaches are more efficient and accurate than the generic hierarchical clustering algorithm. The proposed methodology can be implemented as an add-on to existing learning management systems and e-book readers, to automatically offer the students important notes and annotations conducted by others (either peers or students in the past) who have similar annotation behaviour pattern and style to the students.
Wireless sensor networks have been widely applied to various application domains such as environmental monitoring and surveillance. Because of reliance on the open transmission media, a sensor network may suffer from ...
详细信息
In this work, we propose a recursive local linear estimator (RLLE) for identification of nonlinear autoregressive systems with exogenous inputs, along with an analysis of its strong consistency and asymptotical mean s...
详细信息
In this work, we propose a recursive local linear estimator (RLLE) for identification of nonlinear autoregressive systems with exogenous inputs, along with an analysis of its strong consistency and asymptotical mean square error properties. The performance of the proposed RLLE is verified by a simulation example.
Daily living skills are difficult for autistic children to learn because they have low motivation in learning new things. Some research has developed virtual environment to assist parents and teachers teaching autisti...
详细信息
Daily living skills are difficult for autistic children to learn because they have low motivation in learning new things. Some research has developed virtual environment to assist parents and teachers teaching autistic children daily living skills, educators still need to spend a lot of time in preparing personalized and more realistic tasks for children to practice. This research designs an activity generation mechanism by measuring activity's weight with fuzzy theory and rough set's help. Based on the activity generation mechanism and weight measurement, a Flash-based situated game is developed for providing autistic children personalized and non-repeated practices of activities of daily living. An evaluation plan of the pilot for verifying the effectiveness of the game and gathering the users' (include teachers, parents, and the autistic children) perceptions toward the game and the game-play is designed.
Group communication is essential for multi-user applications. However, due to unpredictable node departures and non-deterministic network partitions, providing reliable and scalable group communication services is cha...
详细信息
Group communication is essential for multi-user applications. However, due to unpredictable node departures and non-deterministic network partitions, providing reliable and scalable group communication services is challenging when the applications are utilized by the users with heterogeneous capacities on a large scale. To address this challenge, we propose a novel replication scheme to achieve high reliability and low-cost scalability in group communication with following three features. First, it introduces a new concept of replication based on topological similarity, which empowers each node with an ability of measuring similarity between the nodes in topology. By eliminating the topological similarity between the replicas, it intelligently mitigates service interruptions caused by node failures and network partitions. Second, instead of specifying the number of replicas, it provides a technique for nodes to dynamically adapt the replication placement schemes by exploiting functionality importance of the nodes in the group- communication session. It eliminates the bottleneck problem and improves the network resource utilization. Third, the scheme is self-converging and it can stabilize within a few adaptations even facing a high churn rate. Extensive simulations show that it yields significant improvements in reduction of replication overhead and service interruption when comparing to existing approaches.
暂无评论