The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
While substantial business investment in business intelligence systems (BIS) is continuing to accelerate, there is an urgent need of specific and rigorous methods to assess their performance and effectiveness. There are some scholars that have handled the measurement of Business Intelligence (BI) from a value perspective; others have chosen to assess the BI process, while some have tried to rather...
Gear transmission is a feasible scheme to realize small size and large torque output manipulator. However, the nonlinear factors, especially the backlash and friction, seriously degrade the performance of a gear drive system. This paper proposes a twin-drive gear system to prevent performance degradation from the nonlinear factors. In the proposal, two motors drive the output axis with differential...
According to the group, interactive and real-time characteristics of mobile social environment, a novel user behavior prediction algorithm in mobile social environment is proposed in this paper. In this algorithm, firstly, a coding based two-dimensional Apriori method is presented to analyze user service behaviors: on one hand, the correlation analysis of a user behavior history is performed; on the...
This work aims to implement business intelligence strategies in an educational institution based on the distance education, particularly in the online tutoring process. In this paper we propose to use the business intelligence paradigm to analyze the online tutoring process, based on the data collected on the interactions of students and teachers in a virtual learning environment, and the results...
Today, mobile objects are finding increasing usage in a wide variety of applications. Robots have been put to use in the air, on the ground and under the sea. Along with this expansion in robot technology, the problem of control and autonomous decision making is an ongoing concern, especially in light of the increasing difficulty of tasks. This study is focused on the algorithms of adaptive control...
In todays' rapid world, many higher education institutions are dependent toward real-time decisions. However, the struggle associated in higher education institutions without the usage of business intelligence (BI) jeopardize the decision making process. Whilst, the contribution of business intelligence are highly foreshown many positive implications and organizations that applies the Theory of Constraints...
With the evolution of software engineering since the advent of structured programming until now, software engineers are faced with tremendous challenges mostly due to the development of large software programs that behave as open systems. Multi-agent systems, which consist of multiple cooperating intelligent agents within an environment, form a particular class of such systems. This sort of software...
Competitive organizations have implemented systems of business intelligence in order to help employees in the process of evidence-based decision-making. Using these systems in university will provide a set of analytical tools that support decision-making of academics focused to the improvement of their research and teaching activities. In the case of teachers, for example, it may help to better understand...
Model checking has been successfully used in many computer science fields, including artificial intelligence, theoretical computer science, and databases. Most of the proposed solutions make use of classical, point-based temporal logics, while little work has been done in the interval temporal logic setting. Recently, a non-elementary model checking algorithm for Halpern and Shoham's modal logic of...
A novel progressive lossy-to-lossless coding method is proposed for mesh models of images whose underlying triangulations have arbitrary connectivity. For a triangulation T of a set P of points, our proposed method represents the connectivity of T as a sequence of edge flips that maps a uniquely-determined Delaunay triangulation of P to T. The coding efficiency of our method is highest when the underlying...
Let Ω ⊂ RN be a bounded measurable set and let Λ ⊂ RN be a lattice. Assume that Ω tiles RN multiply at level K when translated by Λ. Then this paper derives conditions on sets of sampling functions such that they form a frame for the Paley-Wiener space PWΩ of functions bandlimited to Ω. Moreover, the canonical dual frame is derived, which allows signal recovery for all signals in PWΩ from a multichannel...
A fractional integrator operator is defined in this paper : its originality is that its non integer order action is limited to a frequential band. This operator is approximated by a conventional integrator associated to a fractional phase lead filter. The state-space representation of this operator allows modeling of more complex non integer order differential equations. The fractional order has been...
Using wireless sensor networks (WSNs) for intrusion detection in critical area and border surveillance has been an active research topic in the last decade. In this paper, we present a novel approach for intrusion identification in the forest region. This approach is based on the ultra wideband (UWB) WSNs model. It shows the potential for exploiting off-the-shelf UWB transceivers or existing WSNs...
In today's complex world requires state-of-the-art data analysis over massive data sets. In data warehousing and OLAP applications, scalar-level predicates of set in SQL become highly inadequate which needs to support set-level comparison semantics, i.e., comparing a group of tuples with set of values. Complex queries composed by scalar-level operations are challenging for database engine to optimize,...
In this paper, we describe the development of a series of automatic theorem provers for a variety of logics. Provers are developed from a functional approach. The first prover is for Classical Propositional Calculus (CPC), which is based on a constructive proof of Kalmar's Theorem. We also provide the implementation of a cut and contraction free sequent calculus for Intuitionistic Propositional Logic...
In order to realize the autonomous navigation of an unmanned aerial vehicle while exploring unknown indoor environments and meet the requirements of the indoor UAV positioning and indoor environmental reconstruction, a new strategy is presented based on monocular vision and a laser source. Combining laser-assisted odometry and a scan correlation algorithm with inertial information through an Extended...
With the continued adaption and improvement of information technology among power enterprises, all types of application systems have accumulated large amount of invaluable business data. In order to take a full advantage of the data, we need to transform the data into the insights and knowledge for the organization. These insights and knowledge can help the organization make fast, agile, and right...
The paper contains a brief description of activities concerning the problem of implementing Enterprise Resource Planning (ERP) systems in selected water parks in Poland. Examples of existing solutions are characterized and analyzed. The most important part of the article is a description of the research of ERP systems fully integrated with hardware components able to manage the complete daily operation...
Model checking is a powerful method widely explored in formal verification. Given a model of a system, e.g. A Kripke structure, and a formula specifying its expected behavior, one can verify whether the system meets the behavior by checking the formula against the model. Classically, system behavior is given as a formula of a temporal logic, such as LTL and the like. These logics are "point-wise"...
Este artículo muestra las ventajas y desventajas de la puesta a tierra en las refinerías de México hasta la actualidad así como, la oportunidad de optimizar las condiciones operativas y las regulaciones de procedimientos de mantenimiento correctivo que pueden reflejarse en una administración preventiva. Se presenta la implementación de métodos de puesta a tierra híbridos en fuentes de generación de...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.