The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud computing is paradigm that has emerged to deliver IT services to consumers as a utility service over the Internet. In developing countries, particularly Saudi Arabia, cloud computing is still not widely adopted. As a result, this study seeks to investigate the most influential factors that can encourage an organisation to use the cloud or which might impede them from moving to it. This research...
Artifact consists of information model and lifecycle. Artifact lifecycle defined by the business departments according to business rules and other relative constraints are used for business's compliance checks and process's real-time monitoring, so how to construct artifact lifecycle model is crucial, it can be used to judge the violations in the business process. In this paper, we adopt FSM (Finite-State-Machine)...
Special secure multi-party computation is a hot topic in recent years' research. Privacy preserving path planning is that how to do path planning without leakage of privacy information. It has a very broad application prospects, but there is little study about it. In this paper, we propose a generation protocol for the common tangent of two circles in a privacy-preserving way, also analyze the correctness,...
There has been a focus on the management of the complex engineering project. Firstly the organizational design elements that affect the decision making performance of a complex engineering project in the uncertain environment are analyzed. Then an agent-based model is proposed, in which the environmental uncertainty is represented with environmental complexity and turbulence. During modeling, a task...
An asynchronous cellular automaton (ACA) is a cellular automaton which allows cells to undergo state transitions independently at random timings. This paper gives an efficient scheme to compute on a special ACA model that takes a substantially simple transition function. This ACA has much less complexity as compared to other models with respect to the number of transition rules.
In this paper, we introduce a novel method to accelerate Screen Space Ambient Occlusion(SSAO) by exploiting spatial and temporal coherence. SSAO computation only depends on the surrounding pixels which is modeled as screen space local complexity function in this paper. Two pixels with similar local complexity should have close Ambient Occlusion(AO) value. Based on the above observation, the AO value...
The community structure is an important property of social networks. Motivated by circuit theory, a social network can be represented as an electric circuit with notions of voltages of nodes and currents of edges. Based on the electric circuit model, we propose an improved algorithm for finding the community structure in social networks. In the proposed algorithm, a social network can be divided into...
Computer games have been recognized for their educational potential for some time now and the number of educational games available has steadily increased in recent years. As the number of educational games available increases, serious games are starting to face a similar dilemma to other types of educational resources: how can educators or parents easily find the most relevant games and share their...
A new sparse kernel density estimator is introduced. Our main contribution is to develop a recursive algorithm for the selection of significant kernels one at time using the minimum integrated square error (MISE) criterion for both kernel selection. The proposed approach is simple to implement and the associated computational cost is very low. Numerical examples are employed to demonstrate that the...
Traffic flow classification to identify applications and activity of users is widely studied both to understand privacy threats and to support network functions such as usage policies and QoS. For those needs, real time classification is required and classifier's complexity is as important as accuracy, especially given the increasing link speeds also in the access section of the network. We propose...
We introduce a notion of the quantum query complexity of a certificate structure. This is a formalisation of a well-known observation that many quantum query algorithms only require the knowledge of the disposition of possible certificates in the input string, not the precise values therein. Next, we derive a dual formulation of the complexity of a non-adaptive learning graph, and use it to show that...
The cellular automaton (CA) traffic models are widely used to simulate the real traffic. Considering the influence of driving states on randomization, a cellular automaton model based on the NS model is proposed. In our new model, the randomization probability is different for different driving states, which is determined by the velocity changes after the step of deterministic deceleration. Simulation...
Emergent properties are becoming increasingly important as systems grow in size and complexity. Despite recent research interest in understanding emergent behavior, practical approaches remain a key challenge. This paper proposes an integrated approach for the identification of emergence with two perspectives. A post-mortem emergence analysis requires a-priori knowledge about emergence and can identify...
An algorithm is a consequence of logical instructions that, once executed, reduce to a result and it is not always evident to good understand its functioning. The progression of the technologies of information and communication and its availability in the teaching and in the learning offer the possibility to put at the disposal of the learners the tools that facilitate their learning. The algorithmic...
Representing and identifying the topological relations between fuzzy spatiotemporal regions over time have an important significance in reasoning fuzzy spatiotemporal relations. The research issue of topological relations between fuzzy regions over time has attracted a lot of attention in the recent years. However, modeling topological relations needs to be further developed and it is still an open...
In cloud computing, it is an urgent problem to provide stable composition service which can satisfy the personalized requirements for large scale users. This paper takes several aspects of web service into consideration, including Quality of Service (QoS), user preference and the service relationships and proposes a method based viterbi algorithm to reason out the global optimal solution of web composition...
A Petri Net is a mathematical modeling language for the description of distributed systems. A Petri net is a directed bipartite graph, in which the elements consist of place, transition, and arc. A Petri Net offers a kind of graphical notation for stepwise processes which include choice, iteration, and concurrent execution. However, when the system is getting large, the complexity of Petri Nets will...
The application of fence methodology on the optimal operation of heavy haul trains through model predictive control (MPC) approach is investigated in this paper. This is mainly motivated by the fact that without fencing, the large number of cars in a long heavy haul train present difficulties in solving the train optimal operation problem under MPC framework. Firstly, the large car number leads to...
An effective way to solve the conflict of rules in agent model based on BDI is that applying the priority relation of rules. To make such model work normal, we must be sure that no circling priority of rules existing in the model when the new rules are added. The conventional checking method is based on computing the transitive closure, and an alternative approach is based on traveling the directive...
Surrogate models are data-driven models used to accurately mimic the complex behavior of a system. They are often used to approximate computationally expensive simulation code in order to speed up the exploration of design spaces. A crucial step in the building of surrogate models is finding a good set of hyperparameters, which determine the behavior of the model. This is especially important when...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.