The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Mobility on a traditionally static percolation theory model was investigated. The modification of the percolation theory model to incorporate mobility on the model grid enabled the creation of a simple agent-based model (ABM). This resulted in statistically significant findings that the impact of agent density is inversely related to agent mobility. An interactive graphical user interface (GUI) was...
This paper presents a network protocol which has short-term reliability. This protocol is designed for image/video transmission and especially for hardware implementation. Short-term reliability means that corrupted or lost packets are retransmitted during limited time. This protocol is simpler than TCP protocol to implement in hardware and has some reliability which UDP does not have. A video transmission...
While the majority of companies fail to get success of their strategy, with our company, we have to deal with obstacles. In this paper, we present our company by focusing on: - Our strength and success keys. - our belief to the necessity of research to achieve our main objective: Always must be innovative and has willingness to be at the forefront of technology. We outline the main lines of our research...
An approach to optimize the control parameters for an extended-kanban control system (EKCS) is studied. The EKCS is a Just-in-Time production system that involves the advantages of classical kanban and base-stock control systems. Although EKCS can be modeled as a discrete-time Markov chain, the state space is gigantic even for a single stage production system, making it impossible to numerically compute...
Neural network models extended to higher-dimensional numbers have been studied in recent years. In particular, quaternions have an advantage with respect to the expression of rotation in a three-dimensional space. On the other hand, the problem that estimates the cause of an observed result is called an inverse problem, whose solutions have been studied in various engineering fields. In this study,...
We downloaded from GitHub, Inc., a portfolio of recently updated open source Scala projects containing 16,500 source files with 2.3 million lines of code and 223,000 methods written by hundreds of programmers. A related paper found in this "big data" of functional programs non-Gaussian distributions of lines of code and cyclomatic complexity and speculated that the distributions resembled...
Cloud computing is a fast growing IT model for the exchange and delivery of different services through the Internet. However there is a plethora of security concerns in cloud computing which still need to be tackled (e.g. confidentiality, auditability and Privileged User Access). To detect and prevent such issues, the Intrusion Detection System (IDS) and Intrusion Prevention System (IPS) are effective...
Although, Unified Modeling Language (UML) has become a de-facto standard for design and specification of object oriented systems but its structures being semi-formal in nature have various disadvantages. The UML diagrams lack with defining semantics of the functionality of a system to be developed. Automata theory and formal methods are proved powerful at requirement specification, modeling, design...
The safety of passengers is a major concern to airports. In the event of crises, having an effective and efficient evacuation process in place can significantly aid in enhancing passenger safety. Hence, it is necessary for airport operators to have an in-depth understanding of the evacuation process of their airport terminal. Although evacuation models have been used in studying pedestrian behavior...
Despite the efforts of organizations, institutions, car makers, car seat manufacturers and consumer groups to alert parents about the safety threat heatstroke poses for young children left in hot vehicles the number of victims each year is increasing. In fact, one child dies from heatstroke nearly every 10 days from being left in a hot vehicle. For this reason, this work focuses on using current technology...
The Agent in Grid (AiG) project develops an agent-based infrastructure for resource management in the Grid. The basic assumptions of the project are that (1) agents work in teams, and (2) information is ontologically represented and semantically processed. Thus far, issues involved in trust management were considered only from the point of view of fulfillment of contracts between stakeholders. However,...
In this paper we describe the importance of user experience while interacting with a recommender system for mobile devices, considering that the main function of a recommender system is to facilitate users' decision-making. We apply the combination of different techniques to determine a methodology that can be applied in the study of the characteristics of effectiveness, trust and satisfaction perceived...
Currently, the amount of data is huge. Not only is the quantity of data growing in size, it is also becoming much more diverse and complex, significantly complicating the issues around its creation. It is increasingly important to improve and maintain infrastructure services for a long time. Therefore, this study uses an automated approach in which digital policies and strategies are represented as...
Whatever our field (research, education, industry, etc), generally we follow the same process recruitment: launch calls for tender to find candidates: PHD students, PostDoc, engineers, etc Usually, human resources service which is in charge of the first selection: application corresponds to the tender. Generally, for a large number of CVs, we must find the best candidate. Everyone wants the best candidate!...
Provides an abstract for each of the keynote presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings.
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.