The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This study proposes a framework of Design-by-Analogy (DbA) based on Structure Mapping Theory (SMT). A workshop is held to apply the framework to transforming the observation on DbA in daily life into creative designs. Results show that the participants' transformations prefer relational mapping to mere element mapping. The creativity in ideation is higher than that in observation; meaning the better...
The major challenge of Team Based Learning (TBL) or Group learning is its Design and Implement that assess the student's knowledge and skills. The challenge also includes designing assessment to grade the students based on their contribution to the team performance. Teacher assessing the student's performance in team is a teacher biased process. Therefore Peer evaluation can be included as part of...
In a recent publication, the author has established the existence of a unique weak solution of the initial/boundaryvalue problem for a closed quantum system modeled by time dependent density function theory (TDDFT). We describe a Newton iteration, based upon the technique used to prove (unique) existence for the TDDFT model.We show that successive approximation at the operator level, based upon the...
Sequences with good odd periodic autocorrelation property are of importance in applications. In this paper, we presented a lower bound of the magnitude of the odd periodic autocorrelation of binary sequences, and by using Parker's transformation, constructed new binary sequences with odd periodic autocorrelation magnitude achieving the lower bound.
Code Division Multiple Access or CDMA has its roots in WWII era spread spectrum technology. In this technology, multiple users can transmit the data simultaneously in a channel using the same frequency band and each user is assigned a distinguished code for transmission. CDMA uses spread-spectrum technology to minimize the problems relating to interference in the channel. Different types of codes...
There are many methods in statistical analysis, but the basic approach is quantitative analysis. Statistical analysis requires a combination of quantitative and qualitative analysis. Qualitative analysis is fundamental, and a quantitative analysis, which is the core of statistical analysis, is based on the precision of the qualitative analysis. The process of statistical analysis includes qualitative...
In order to study the variation rule of the physical-chemical indicators of Korla fragrant pear in the maturation process, and explore the correlation among these indicators, the fruit firmness, chlorophyll content, soluble solids content(SSC) and Vitamin C content were studied. Adopting to the methods of correlational analysis and regression analysis, the indicators mean and the correlation among...
In this letter, two lower bounds on the maximum cross-correlation magnitude of balanced quaternary sequence pairs with (almost) optimal autocorrelation are presented. The maximum cross-correlation magnitude of a balanced quaternary sequence pair of period $N$ with the maximum out-of-phase autocorrelation magnitude $\sqrt{5}$, where $N=4f+1$ is a prime and $f$ is an odd integer, is shown to be...
User names and passwords stubbornly remain the most prevalent authentication mechanism. Password secrecy ensures that only genuine users are granted access. If the secret is breached, impostors gain access too. One method of strengthening password authentication is through keystroke dynamics. Keystroke dynamics algorithms typically restrict the authentication entry to only one valid sequence of keystrokes,...
In this paper, we show that the d-decimation of a Sidelnikov sequence is the d-multiple of another Sidelnikov sequence and vice versa. Also, we calculate the crosscorrelation magnitude between d- and d′-decimations of a Sidelnikov sequence of period q − 1 to be upper bounded by (d+d′ − 1) √q+3.
Objective assessment of fabric wrinkledness using multifractal methodology is addressed in the paper. As a first experiment with this methodology in this application field, AATCC standard durable press rating replicas, which are used by textile experts worldwide, were photographed and then segmented using common image processing methods. The resulting skeleton images were then analyzed using the multifractal...
Cooperative co-evolutionary (CC) architectures provide a framework for solving large scale function optimization problems, by decomposing variables into different groups as subproblems, solving the subproblems, and then reintegrating the solutions. But there is no systematic method for how to decomposing variables, which is a major abstacle for CC framework. This paper provides a correlation identification...
Information and Communication Technologies play major role in all types of day to day life activities including Government, public and social domains. The need for HCI aspects to be taken care in these activities has become a predominant one. Especially, incorporating HCI features in the academic environment is getting more attention. In the case of reading materials associated with any type of academic...
Online reviews on a service are important sources for service providers to improve their service delivery and service consumers to obtain information for decision making before their service acquisition. However, in the real situation, there are several points of view (dimensions) in service assessment using online reviews. This paper shows an empirical study to apply classification-based sentiment...
Correlation between innovation and remote experiment development is in fact correlation between practical experimentation and R&D development. In face to face learning the student employ one assembly for one experiment so that its inference rules are not developed too much. In the case of the remote experiment, the student has the possibility to access many assemblies for the same experiment,...
This study investigates the network problems of the knowledge dissemination of ICT-in-education practices using an egocentric survey method to school technology coordinators (STCs). A conceptual framework of knowledge competitions is developed to inspect the significant and effective ties of knowledge dissemination. The results indicate that interactive predictability of effective sizes and significant...
We reconsider the classical problem of estimating the autocorrelation sequence of a stationary time-series from the viewpoint of multitaper spectrum estimates. This results in estimates of the autocorrelation that have both lower variance and, in particular, do not have the very slow decay that is characteristic of ordinary autocorrelation estimates.
To better decide the sequence of ammunition sort choice when one object is attacked by several kinds of ammunitions, that is the ammunition target matching problem for artillery field. In this paper, first depicting ammunition damage effect and target anti-damage effect and constructing the ammunition target matching index system. Then, rough set theory was applied to reduce the index system and determine...
This short communication shows that zero correlation zone sequences could be generated by using any odd-length binary sequence with ideal two-level autocorrelation function in place of the m-sequence using the exact same procedure proposed in the original paper. This removes the restriction on the spreading factor of the m-ZCZ sequences which could assume only the form 2^n for some integer n. The...
In this paper, we discover the method's limitation of grey incidence cluster analysis. The reason is that classification was adopted firstly before building grey equivalence relation. Base on these reasons, several significant relations were put forward combining with fuzzy mathematics's relevance theory, for example, grey reflexive relation, grey symmetric relation, grey transitive relation and so...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.