The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The work presented in this paper is related to the knowledge management. We aim to reuse knowledge during the design processes, in order to help designers in all the phases of the products design.We propose a reuse knowledge approach based on the assistance of the professional actors with an automatic push (proposition) of knowledge and ease pull (search) of knowledge by helping individual searches...
New product development, is interested in the management and discipline involved in the development of new product in some firms, which based on their experience of involvement in the process, after applying the network model the accumulation of knowledge and application of this knowledge is what to distinguish innovative firms from their less successful counterparts. One of the motivations of this...
This paper proposes a specific CAD model architecture and a specific design method based on a functional analysis in order to reduce the time dedicated to routine engineering. This method is directly integrated into our ACSP PLM (Product Lifecycle Management) system in order to work in a worldwide and collaborative design environment. The main objective of our methodology is to define the CAD model...
In the previous paper, a readout approach for the Hamiltonian path problem (HPP) in DNA computing based on the real-time polymerase chain reaction (PCR) was proposed. Based on this approach, real-time amplification was performed with the TaqMan probes and the TaqMan detection mechanism was exploited for the design and development of the readout approach. The readout approach consists of two steps:...
Free and open source software (F/OSS) developers tend to build feature-centric projects rather than following a user centred design, ignoring the necessity of usability inside the resulting product, ever since. As there are many reasons behind this, main cause can be attributed to the lack of awareness of usability from developers' point of view and little interaction of project stakeholders with...
In the world-wide web context, availability of software components increases the possibility of applying a reuse approach in software development. Thus, component retrieval is a key problem, both for software industry and for end-users, moreover for open source community which uses more and more components-based software engineering approaches.The OMG has defined a unified framework for reusable items...
This paper explores the difference between two types of information: personal identifiable information (PII), and non-identifiable information (NII) to argue that security, policy, and technical requirements set PII apart from NII. The paper describes databases of personal identifiable information that are built exclusively for this type of information with their own conceptual scheme, system management,...
Open-source software is unique in that the development of the product is performed in public over the Internet by developers who elect to contribute to the project and rarely if ever meet face-to-face. Software development is a knowledge intensive process and the information generated in open-source software development projects is typically housed in a central Internet repository. Open-source repositories...
We present a novel, practical, and effective mechanism that exposes the identity of Tor relays participating in a given circuit. Such an attack can be used by malicious or compromised nodes to identify the rest of the circuit, or as the first step in a follow-on trace-back attack. Our intuition is that by modulating the bandwidth of an anonymous connection (e.g. when the destination server, its router,...
Fudaa is an open-source, object oriented and distributed framework dedicated to the integration of scientific simulation code in homogeneous, graphic, and communicating interfaces. This tool, developed in Java and Corba, provides a user-friendly, common, and stable environment for independent simulation codes. Whereas in most cases simulation codes exchange data only through files, with Fudaa, they...
In this paper, we present a series of methods to authenticate a user with a graphical password. To that end, we employ the user??s personal handheld device as the password decoder and the second factor of authentication. In our methods, a service provider challenges the user with an image password. To determine the appropriate click points and their order, the user needs some hint information transmitted...
Reverse engineering is often the last resort for analyzing unknown or closed source software. Such an investigation is motivated by a risk evaluation of closed source programs or by evaluating consequences and countermeasures against infections by malicious programs that are often closed source. This article presents a success story where we used and modified free software serving as environment for...
In this paper we define two bi-adaptive mesh filtering algorithms for efficient features preserving restoration of noisy models acquired from 3D scanners. The new filters are based on 2D image processing adaptive algorithms extended to 3D mesh processing. We combine two adaptive algorithms to design more efficient bi-adaptive algorithms. The first filter is applied on the mesh triangles normal vector...
In this article, we present a method to perform G1-continuous blends between a differentiable superquadric of revolution and a plane or a sphere using Dupin cyclides. These blends are patches delimited by four lines of curvature. They allow to avoid parameterization problems that may occur when parametric surfaces are used. Rational quadratic Bezier curves are used to approximate the principal circles...
In this paper, we present a new geometric algorithm to compute the intersection between a ray and a rectangular Bezier patch. The novelty of our approach resides in the use of bounds of the difference between a Bezier patch and its quasi-interpolating control net. The quasi-interpolating polygon of a Bezier surface of arbitrary degree approximates the limit surface within a precision that is function...
Fractal curves described by iterated function system (IFS) are generally non-integer derivative. For that we use fractional derivative to investigate differentiability of this curves. We propose a method to calculate local fractional derivative of a curve from IFS property. Also we give some examples of IFS representing the slopes of the right and left half-tangent of the fractal curves.
A new technique has been proposed for the outline capture of generic shapes. The overall technique has various phases including extracting outlines of images, detecting corner points from the detected outline, curve fitting, and addition of extra knot points if needed. The idea of simulated annealing has been used to optimize the shape parameters in the description of the generalized cubic spline...
As information technologies advance, the data amount gathered on the Internet increases at an incredible rapid speed. To ease the data overloading problem, people commonly use search engines to reach required information in seconds. Nevertheless, depending on different user goals in Web search, users occasionally get lost in the large number of search results when trying to explore them. In this paper,...
Vibrotactile sensations to sight and sound cues on mobile handsets make content more realistic, fun and operation more intuitive. An intuitive method to render human facial feature for visually impaired is evaluated for effectiveness. In current system, the vibration of a mobile phone is used to provide emotion information based on human lip??s shape. Using designed vibration patterns, the users are...
In this paper, a perceptually adaptive watermarking scheme for color images is proposed in order to achieve robustness and transparency. A new just no-ticeable distortion (JND) estimator for color images is first designed in the wavelet domain. The key issue of the JND model is to effectively integrate visual mask-ing effects. The estimator is an extension to the per-ceptual model that is used in...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.