The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This study was conducted to identify the relationship among some intrapersonal factors such as professional competency, interdisplinary ability, social skills capability, and team cohesion. The validated questionnaire was delivered to 296 students in the design programs of universities as research samples. Consequently, the SPSS 18.0 and AMOS statistic software were used to analyze the collected data...
Internet of Things (IoT) refers to the network, the micro-sensor generated by the information to be collected, processed and used, and then the construction of intelligent families, smart city and wisdom of medical and other living environment. The research contents of this paper are to analyze the driving behavior data through the vehicle preloading equipment, analyze the factors that affect the...
Since post-industrial society and experience economy age, consuming a product is no longer the most important part to the consumers. They will concern more about whether the process of consumption to meet the psychological needs. In order to provide a very personal, unique and emotional experience, many of traditional industries seek transformation. They start designing and giving handmade or craft...
Noise reduction on hyperspectral imagery is a critical step for the success of other applications that use this type of data. In this paper, we propose a novel approach to reduce the noise on hyperspectral data that might occur due to various factors. Since the proposed method exploits class-labels of data, it can be categorized as a semi-supervised method. First, our approach computes the mean spectral...
Base station cooperation is a promising scheme to improve network performance for next generation cellular networks. Up to this point research has focused on station grouping criteria based solely on geographic proximity. However, for the cooperation to be meaningful, each station participating in a group should have sufficient available resources to share with others. In this work we consider an...
Using topic modeling, we analyse the titles and abstracts of nearly 10,000 papers from 20 years published in 11 top-ranked Software Engineering(SE) conferences between 1993 to 2013. Seven topics are identified as the dominant themes in modern software engineering. We show that these topics are not static, rather, some of them are becoming decidedly less prominent over time (modeling) while others...
This manuscript presents a methodology to determine the transfer function in the house of quality tool of the quality function deployment method. The transfer function relates the product characteristics to the customer requirements on the product. Using sensitivity analysis on a model of the product the elements of the transfer function are calculated accurately and with no need on further iterations...
This paper describes the system dynamics architecture of UTASiMo, a simulation-based task analysis tool that simulates the outcomes of task analysis for a system design and estimates task execution times, workload, and human error probability. UTASiMo combines discrete event, agent-based, and system dynamics simulation methods to automatically construct and simulate models that correspond to different...
In this paper, we review and prove certain properties regarding t-way coverage when covering arrays are merged together to form larger arrays. Moreover, we build upon these theoretical observations to formulate a procedure on how, from the input space model of a composed SUT and t-way test suites for its components, to create a larger and unified t-way test suite. The proposed modelling methodologies...
Mobile phones are widely used in our day-to-day life. It's not only used by a common man but also used by antisocial elements and that's why it's not a surprise that today in almost every case the first step towards solving a Crime is to analyze the Call Records of the Suspects. Today in almost all the criminal cases, analysis of Mobile Phone calls of suspect's plays an important role in investigation...
This paper proposes two channel assignment models to manage channel blocking of the primary users (PUs) and the secondary users (SUs) in cognitive radio (CR) networks. The proposed models provide priority based channel assignment strategies for the PUs and SUs. In order to manage the blocking of PUs and SUs, channel blocking analysis for both models is performed using the Markov chain process. Further,...
In wireless ad hoc networks, neighbor discovery is essential for medium access control and routing. In this paper, we propose a new neighbor discovery algorithm utilizing in-band full duplex. This algorithm employs a reservation scheme with full duplex into an existing algorithm based on half-duplex. We analyze neighbor discovery time of both algorithms with absorbing Markov chain models and simulations...
We consider in this paper a discrete-time deterministic m-ary diffusion model over a strongly connected directed graph. The update rule is easy to state: let the vertices of the graph represent the agents and the edges represent the information flow; at every time step, each vertex updates its value to the maximum value held by its incoming neighbors at the last time step. The resulting system, defined...
One of the challenges in Long Term Evolution (LTE) and next generation cellular networks (5G) is the traffic overload and the network congestion caused by massive Machine Type Communication (MTC) devices accessing to an Evolved Node B (eNodeB) simultaneously. In this paper, a novel method is proposed, named Advanced Traffic Scattering for Group Paging (A-TSFGP), aiming to alleviate the system overload...
Aiming at the problem of the tank truck steering prone to rollover accidents, through the analysis of the outward shift of the mass center caused by the suspension movement and the liquid sloshing in the tank truck steering condition on the roll effect rules of the tank truck body, based on the lateral load transfer rate, a safety speed calculation model of the tank truck rollover prevention was proposed;...
Ship damage control is an important measure to maintain ship vitality when suffering damages. Through the study of a single node command ship damage control disposal process, this article established a model of ship damage control command based on T-Petri; On the basis of analyzing of typical damage by the crew compartment fire scene processing based on T-Petri damage control model, and optimizing...
Current network architecture suffers overloading due to extensive resource utility. This paper proposes a resource mapping algorithm upon service layer of service-based network: the unit of service component requests resource as well as limits; an agent is embedded in the component to surveil the utility of network resource. If network resource violates the limits, agent will punish the component...
Vector tracking loop (VTL) can be regarded as a kind of integration of navigation filter and signal tracking. It has a better performance for weak signal and can recapture signal quickly, but its robustness and computation complexity is worse. This paper mainly studies a tight integration model of navigation filter and tracking filter, which remains the signal tracking filter in local channels and...
In this study, we focus on extraction of latent topic transition from POS data. POS analysis is conducted to obtain the frequent pattern of customer's behavior. The fundamental method for POS analysis is to conduct market basket analysis. By doing Market basket analysis, the sets of products that are often bought at the same time can be extracted. In market basket analysis, however, the effect of...
With the advent of big data era, the data analytical applications have sprung up which can be modeled using workflow. Such workflow applications are subject to continuously arriving requests and have a rigid requirement on response time. When running the analytical workflow in a cloud platform, one of the critical questions arising here is that how to provision resources in a way that the monetary...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.