The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recently, multi-core processors, which have more than one Central Processing Unit (CPU), are introduced widely into personal computers. Authors have been proposed a concurrent program of Differential Evolution (DE). The concurrent program of DE, which is called Parallelized DE (PDE), can generate and evaluate multiple individuals in parallel on a multi-core processor. In this paper, two implementation...
Gas Chromatography (GC) is used to analyze various products of volatile materials such natural gas, oils, pharmaceuticals, and foods. It is needed to control the quality of products till fulfill its requirements to be marketable. Therefore, maintenance is required to maintain the GC system running well. The expert system software for watering down the troubleshooting diagnosis on GC-2010 had been...
Data entry is an important activity in household census. In 2010 Aceh population census, there is only one data entry site, Banda Aceh as a provincial capital of Aceh province. Among options for future household census, is to have another site of data entry for efficiency. This paper examined the selection of districts in Aceh province as an optimum data entry sites using P-Median linear programming...
Using a computer has its advantages as well as disadvantages. The number of people who use the Internet in Malaysia has increased gradually, at the same time the number of threats that detected by various organizations also increased. [10] One of the threats to youth generations is pornography that spreads very fast via cyberspace or internet. The Southeast Asian countries have had a vigorous debate...
Prestressed anchorage is a very effective method to supervise high slope stability. By studying the simulation of various existing prestressed anchor, the paper works up a reasonable model and uses ANSYS for numerical simulation. With the example of the high rock slope of a hydropower project, the paper uses the limit equilibrium method to analysis slope stability and evaluates prestressed cable (pole)...
Heuristic techniques like artificial intelligence, neural networks are applied successfully in the computational field to achieve natural reasoning similar to humans. Among those uncertainty is a prominent factor which is been unsolved. This is a major challenging area in the distributed systems like communications protocol. Moreover practical future prediction is limited to a finite level because...
Real world is a complex world. Many things sounds simple can be astonishing complicated in dense knowledge environment. Inspired by human association process, this paper provided a method which reason with given scenarios to tell what was happened in dense knowledge environment with uncertainty. The method can provide good efficiency in dense knowledge background.
ERP value has been long assumed to be static in traditional evaluations. This study proposes a stochastic simulation model of ERP business value, which bridges the gap between ERP business value theories and modern finance evaluation approaches. By incorporating life cycle, the critical characteristic of ERP business value, uncertainty is explicitly accounted for in the model. We quantitatively justify...
Uncertainty is one of the major inherent difficulties for R&D, especially for innovative R&D projects. The objective of this paper is to develop a flexible decision making methodology based on the real option concept to improve development flexibility for R&D projects. The proposed methodology identifies potential risks that may occur during R&D, recognizes a cascading option structure...
In the last years, an increasing collaboration between defense and (civil) security, especially in technological areas can be observed. Here, an approach that automatically extracts relationships among defense — based technologies and security — based technologies is introduced. Information about these relationships can be used as planning support to defense and security — based technological research...
In this paper, we focus on consumer's needs for new products. Normally consumers search for these new products in internet by using a web search engine. They focus on websites of specific selected enterprises where they suppose the existence of such new products. Very often, consumers only get information from enterprise websites about existing products. However, these products do not fulfill consumer's...
Swimmer tracking in swimming pools is a challenging vision task due to its varying complex background. Most moving object detection methods are developed for static or partial static backgrounds, and thus can not be applied in swimmer detection problems. This work presents an approach combining mean-shift clustering and cascaded boosting learning algorithm for swimmer detection. There are three main...
Product Line Architecture is the key success of Software Product Line Engineering. Product Line Architecture prepares the design of architectures for members of product line. Architecture design is the most essential activities of a Product Line Architecture development. It prepares the corner stone of variability decision. The architecture design need to produce specific architecture from product...
Based on the CDMA network message and packet data techniques, a remote intelligent monitoring terminal, which includes a single-chip machine and module DTGS-800, can be used to realize the wireless transmission of data, and the real-time monitoring of power supply and distribution system, lighting system, and the working situations of electrical equipments in the building.
Profited from the theory of customer satisfaction(CS), the factors, influencing selection and evaluation of the third-party logistics(TPL) service provider, were analyzed by the customer satisfaction characteristics of direct logistics service, indirect logistics and third-party logistics(TPL). Firstly, this paper constructed the structural equation model(SEM) about the selection and evaluation of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.