This paper describes different aspects of teaching distributed software development, regarding the types of project customers: industry and academia. These approaches enable students to be more engaged in real-world s...
详细信息
This paper describes different aspects of teaching distributed software development, regarding the types of project customers: industry and academia. These approaches enable students to be more engaged in real-world situations, by having customers from the industry, local or distributed customers in universities, distributed customers in software engineering contests or being involved in an ongoing project, thus simulating the company merging. The methods we describe are used in a distributed project-oriented course, which is jointly carried out by two universities from Sweden and Croatia. The paper presents our experiences of such projects being done during the course, the differences in each approach, issues observed and ways to solve them, in order to create a more engaging education for better-prepared engineers of tomorrow.
The main goal of this paper is to develop the coupled double-distributionfunction(DDF)lattice Boltzmann method(LBM)for simulation of subsonic and transonic turbulent *** the present study,we adopt the second-order imp...
详细信息
The main goal of this paper is to develop the coupled double-distributionfunction(DDF)lattice Boltzmann method(LBM)for simulation of subsonic and transonic turbulent *** the present study,we adopt the second-order implicit-explicit(IMEX)Runge-Kutta schemes for time discretization and the Non-Oscillatory and NonFree-Parameters Dissipative(NND)finite difference scheme for space *** Sutherland’s law is used for expressing the viscosity of the fluid due to considerable temperature ***,the Spalart-Allmaras(SA)turbulence model is incorporated in order for the turbulent flow effect to be *** experiments are performed on different turbulent compressible flows around a NACA0012 airfoil with body-fitted *** numerical results are found to be in good agreement with experiment data and/or other numerical solutions,demonstrating the applicability of the method presented in this study to simulations of both subsonic and transonic turbulent flows.
Image encryption is one of the most important methods of image information hiding. A new image encryption method based on dual DNA sequences for image hiding is presented in this paper. This method is implemented by u...
详细信息
The wavelet diagnostic technology is applied for the detection of natural micro pitting on a back-to-back experimental gearbox test rig and the possibility of early detection/diagnosis of local tooth faults is shown. ...
详细信息
ISBN:
(纸本)9781618390134
The wavelet diagnostic technology is applied for the detection of natural micro pitting on a back-to-back experimental gearbox test rig and the possibility of early detection/diagnosis of local tooth faults is shown. A number of parameters are considered and selected (features, time resolution etc.). A novel automatic decision making technique based on the likelihood ratio is used for damage diagnosis. Novel results in world-wide terms have been achieved: the technology provides an early effective detection/diagnosis of micro pitting in gears with relative pitting size 0.3 - 0.7%.
In order to enhance the image information security, image encryption becomes an important research direction. A new image encryption algorithm based on encryption template is presented in this paper. This algorithm is...
详细信息
Wireless sensor networks(WSNs) have been increasingly available for large-scale applications in which energy efficiency is an important performance measure. These applications include environmental monitoring and stru...
详细信息
Wireless sensor networks(WSNs) have been increasingly available for large-scale applications in which energy efficiency is an important performance measure. These applications include environmental monitoring and structure monitoring which demand multifarious data. Driven by the energy limitation nature of WSNs lots of research works have been done in aspects such as nodes deployment, routing protocol, topology control, data reduction, sleep scheduling, etc. However, heterogeneous, i.e. hybrid sensor nodes are combined together into semantic sensor networks to provide large-scale applications with content rich information. In this paper, we discuss the potential of energy efficiency that semantization could bring to sensor networks. First we have an overview of some related work and then address current approaches of energy conservation in WSNs as well as how semantization can contribute in each aspect of saving energy. Finally a recommendatory architecture of semantic sensor network is proposed. Semantization will be a promising solution to improve energy efficiency together with system performance.
In the system of the PV grid-connected generation, because of the dispersion of the PV panel, difference of the sun radiation condition and the shadow of a part of the PV panel, they will cause the serious loss of ene...
详细信息
With the fast development of Internet technology and information processing technology, the image is commonly transmitted via the Internet. People enjoy the convenience and shortcut, but people have to face to the obs...
详细信息
With the fast development of Internet technology and information processing technology, the image is commonly transmitted via the Internet. People enjoy the convenience and shortcut, but people have to face to the obsession that the important image information in transmission is easily intercepted by unknown persons or hackers. In order to enhance the image information security, image encryption becomes an important research direction. An image encryption algorithm based on DNA sequences for the big image is presented in this paper. The main purpose of this algorithm is to reduce the big image encryption time. This algorithm is implemented by using the natural DNA sequences as main keys. The first part is the process of pixel scrambling. The original image is confused in the light of the scrambling sequence is generated by the DNA sequence. The second part is the process of pixel replacement. The pixel gray values of the new image and the one of the three encryption templates are generated by the other DNA sequence are XORed bit-by-bit in turn. The experimental result demonstrates that the image encryption algorithm is feasible and simple. Through performance analysis, this algorithm is robust against all kinds of attacks and owns higher security.
The Internet and related technologies have created an interconnected world in which we can exchange information easily, process tasks collaboratively, and form communities among users with similar interests. This allo...
详细信息
The Internet and related technologies have created an interconnected world in which we can exchange information easily, process tasks collaboratively, and form communities among users with similar interests. This allows improved efficiency and performance. Mashups, a new web 2.0 technology, have become very important as Web applications to perform these tasks. Currently, the uses of mashups are often more data related than process related. In this paper we explore differences between dataoriented mashups and processoriented enterprise mashups. Specific attention is paid to how to model end users’ process mashup applications from both control flow and data flow perspectives. Based on our analysis, a lightweight process modelling approach is proposed. Further efforts are needed before we are able to easily connect existing web resources for implementing processoriented enterprise mashups.
暂无评论