softwaresystems typically comprise multiple components which are developed using different technologies, thus the interoperability that enables the components to interact despite differences in programming languages ...
详细信息
softwaresystems typically comprise multiple components which are developed using different technologies, thus the interoperability that enables the components to interact despite differences in programming languages and execution platforms is becoming a central issue. This paper describes how to use Object-Oriented design patterns to derive a cross-platform interoperability framework for bridging the different technology specific models (PSMs) within the Model Driven Architecture (MDA). In addition, we present a MDA based approach to applying the proposed PSM interoperability framework in an automatic fashion to generate a communication bridge between two PSMs in a multi-agent system.
Water service providers (WSPs) in the UK have statutory obligations to supply drinking water to all customers that complies with increasingly stringent water quality regulations and minimum flow and pressure criteria....
详细信息
ISBN:
(纸本)9780784410233
Water service providers (WSPs) in the UK have statutory obligations to supply drinking water to all customers that complies with increasingly stringent water quality regulations and minimum flow and pressure criteria. At the same time, the industry is required by regulators and investors to demonstrate increasing operational efficiency and to meet a wide range of performance criteria that are expected to improve year-on-year. Most WSPs have an ideal for improving the operation of their water supply systems based on increased knowledge and understanding of their assets and a shift to proactive management followed by steadily increasing degrees of system monitoring, automation and optimisation. The fundamental mission is, however, to ensure security of supply, with no interruptions and water quality of the highest standard at the tap. Unfortunately, advanced technologies required to fully understand, manage and automate water supply system operation either do not yet exist, are only partially evolved, or have not yet been reliably proven for live water distribution systems. It is this deficiency that the project NEPTUNE seeks to address by carrying out research into 3 main areas;these are: data and knowledge management;pressure management (including energy management);and the associated complex decision support systems on which to base interventions. The 3-year project started in April of 2007 and has already resulted in a number of research findings under the three main research priority areas (RPA). The paper summarises in greater detail the overall project objectives, the RPA activities and the areas of research innovation that are being undertaken in this major, UK collaborative study. Copyright 2009 ASCE.
The objective of this paper is to put forward an intelligent system to assist and enable potential users who intend to make investment on Micro Electro Mechanical System (MEMS) products. The system functions as a deci...
详细信息
ISBN:
(纸本)9781424423279
The objective of this paper is to put forward an intelligent system to assist and enable potential users who intend to make investment on Micro Electro Mechanical System (MEMS) products. The system functions as a decision support system to help users the potentiality of investment in MEMS industry by predicting future sales and profitability based on past knowledge. In this paper work Fuzzy Logic system (FLs) is proposed, as it is conveniently adaptable to solve such problems. Among the many factors that are important for predicting MEMS industry potential, are sales, price, profit, earning, P/E ratio, PEG, P/S ratio. Some of these factors may be related, but some act independently. These factors are combined together into a finalize result. Data Fusion is the process of combining multiple economic factors in order to produce information of tactical value to the user. Briefly, in this project, the behaviour of an intelligent system is simulated by the Fuzzy Logic toolbox. In fact, the output variable and valuation scale is 'investment'. It is fuzzy variable and compared this output rate with actuality.
The project effort calculation with a functional size measurement method such as COSMIC can only be properly performed after the "Requirements Analysis" phase in a Project Life Cycle. The goal of this resear...
详细信息
ISBN:
(纸本)9783540894025
The project effort calculation with a functional size measurement method such as COSMIC can only be properly performed after the "Requirements Analysis" phase in a Project Life Cycle. The goal of this research is to investigate an early and project-level tuned prediction of the product size with the intent to reduce the effect of the 'cone of uncertainty' phenomenon. The lack of size measurement methods which take into account the effect of the product non-functional requirements (NFR) on size also contributes to the above phenomenon. We propose to use the Project Size Unit (PSU) technique for predicting the product (FUR and NFR) size measured in COSMIC functional size units. Such early prediction will lower the cost of size counting the project and minimize the estimation error in the requirements phase. Furthermore, the PSU calculation procedure can be automated, which would further reduce the cost of size counting. The expected advantage of jointly using PSU and COSMIC is the ability to get early estimates of the whole project effort.
Degradation in performance has been a common reason for limited use of security in Wireless LAN equipment such as PCs and embedded devices such as PDAs. However, performance has depended in part upon the technical cho...
详细信息
ISBN:
(纸本)9781605580890
Degradation in performance has been a common reason for limited use of security in Wireless LAN equipment such as PCs and embedded devices such as PDAs. However, performance has depended in part upon the technical chosen for encryption, authentication and re-keying. this paper describes the performance analysis and measurement of a range of security levels based variations of WEP, WPA and WPA2 in a variety of LAN architectures. The paper provides an analysis performance measured over a range of experiments run ontestbed and builds upon previous work on performance analysis of earlier wireless network security protocols. Copyright 2008 ACM.
WPANs (Wireless Personal Area Networks) fill an important role in local area network technology complementing traditional IEEE 802.11 Wireless LANs. Bluetooth, ZigBee and NFC (Near Field Communications) have emerged a...
详细信息
ISBN:
(纸本)9781605580890
WPANs (Wireless Personal Area Networks) fill an important role in local area network technology complementing traditional IEEE 802.11 Wireless LANs. Bluetooth, ZigBee and NFC (Near Field Communications) have emerged as the key WPAN technologies. They are however subject to the usual range of security vulnerabilities found in wireless LANs such as spoofing, snooping, man-in-the-middle, denial of service and other attacks. However security in WPANs is not as mature as it is in Wireless LANs and further work is needed in order to provide comparable protection. This paper examines a range of vulnerabilities and security attacks that can be performed on Bluetooth, ZigBee and NFC WPANs and proposes protection mechanisms that can mitigate such risks.
The growth in the popularity of Internet services, increasing of mobile users together with a wide range of access and mobile-networked devices, demands and inter-working of these heterogeneous access . Sometimes refe...
详细信息
ISBN:
(纸本)9781605580890
The growth in the popularity of Internet services, increasing of mobile users together with a wide range of access and mobile-networked devices, demands and inter-working of these heterogeneous access . Sometimes referred to as 4th generation (4G) , the overall objective is to provide a managed Always Connected (ABC) service over underlying heterogonous and mobile platforms while maintaining negotiated and Quality of Service (QoS) in an open and nonproprietary . paper proposes a new model and its architecture which is upon Policy-based Management (PBM) and provides a for the centralised management of networks based on level policies. However, it extends the basic PBM ideas provide a "layered approach" which facilitates the negotiation management services over interconnected heterogonous platforms thus achieving an always best connected . Finally this paper describes a proof-of-concept testbed demonstrates the implementation of this model in practice. Copyright 2008 ACM.
We present a reasoning procedure for ontologies with uncertainty described in Description Logic (DL) which include General TBoxes, i.e., include cycles and General Concept Inclusions (GCIs). For this, we consider the ...
详细信息
Rank order correlation has been used extensively when the data is non-parametric or when the relationship between two variables is nonlinear and monotonic. In such cases, linear correlation measures, such as the produ...
详细信息
ISBN:
(纸本)9781595939913
Rank order correlation has been used extensively when the data is non-parametric or when the relationship between two variables is nonlinear and monotonic. In such cases, linear correlation measures, such as the product-moment coefficient, are inadequate and fail to detect correlative relations. We present a polyhedral indexing technique for rank order correlation queries for time series data. We use an interesting geometry interpretation of rank order correlation which lends itself to indexing by spatial indexes such as R-trees. Our experimental results indicate one to two orders of magnitudes improvement over sequential scan - the only alternative solution.
We investigated that the brightness magnitude of the Del Cephei had been adapted to three different training values and each training had four different hidden layers in the back-propagation neural network (BPANN) mod...
详细信息
ISBN:
(纸本)9780769533285
We investigated that the brightness magnitude of the Del Cephei had been adapted to three different training values and each training had four different hidden layers in the back-propagation neural network (BPANN) models. The best forecasting mean through different approaches in the BPANN model was obtained at 15% training with four hidden layers. However, the difference in forecasting accuracies of the different levels was not statistically significant.
暂无评论