The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Homecare services have started adopting - during the last few years - a new provision model, based on wireless technologies, in order to support healthcare provision decentralisation and eInclusion. However, this new homecare service provision model raises several issues regarding the credibility of the data transmitted. From the plethora of available technologies to support the formulation of WPAN...
More and more economic and financial data have been collected by the governmental departments in China since China started its “socialist market economy” in late 1980s. These government departments, in particular the departments in charge of economic development, pay a great attention to the economic information in their decision-making. There is an urgent demand for efficient decision support systems...
On the basis of multiple costumer projects restricted each other in the requirements and resources for the software organizations with complex business workflows, presents an organizational lever requirement management process oriented to multi-projects and the information support system. In the process solutions are framed against the requirements from various customers by consultation and service...
The security of inter-domain routing system greatly depends on the trustworthiness of routing information and routing behavior of autonomous system (AS). Many researches on e-commerce, grid, and p2p have proven that reputation mechanism is helpful to inhibit the spread of false route and the occurrence of malicious routing behavior. To increase AS resistance to malicious routing attack, we designs...
Cooperation mechanisms for agents monitoring service-based workflows are a means to address the increasing complexity of modern enterprise architectures. These mechanisms are inspired by existing biological mechanisms and extend an existing decentralized monitoring architecture in order to handle deviations from service level agreements autonomously. As the core cooperation mechanisms have been subject...
The present study applies modeling methods to study the simulated ECG of a subQ monitor with bipolar lead. The objective of the study was to analyze how different locations of ectopic activation affect the ECG obtained with horizontal and vertical electrode orientation. The ectopic activation was set to originate from 6 different locations and conduct through both ventricles. We had implants in 63...
The lead-time for the retailer's inventory system may be changed with different suppliers in chinapsilas low technology industries. A multi-agent simulation system is proposed to simulate this category of dynamic supply chain. In the simulation system, the retailer's stock was controlled by (S, s) policy, and then four categories of supply chain scenarios were suggested. Four propositions were achieved...
This paper investigates and simulates a coloured stochastic Petri nets model for depth evaluation intrusion detection. Network attack behaviors are very complexity sometimes, it is difficult to capture all of them. In this paper, we could realize what them happened with analyzing and simulating an intrusion. The experimental results demonstrated that the CSPN model approach was an efficient and helpful...
A critical infrastructure (CI) consists of those physical and information technology facilities, networks, services and assets which, if disrupted or destroyed, have a serious impact on the health, safety, security or economic well-being of citizens or the effective functioning of governments. Nowadays, the operation controls of these infrastructures have been computerized and have gradually become...
This work reports real-time soft-error rate (SER) testing of semiconductor static memories in both altitude and underground environments to separate the component of the SER induced by the cosmic rays (i.e. primarily by atmospheric neutrons) from that caused by on-chip radioactive impurities (alpha-particle emitters). Two European dedicated sites were used to perform long-term real-time measurements...
This paper presents a new similarity measure method on a combination of color and texture feature representations. In this method, the YIQ color space is chosen, because it can describe both color images and gray images and the transform from RGB to YIQ is linear and simple than other color space. In the proposed method, we firstly segment image using texture feature by combination of wavelet transform...
This paper will examine some of those EPEAT design choices, evaluate the challenges they present through the perspectives of stakeholders who have been most committed to EPEAT's success, and propose some ways forward.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.