The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Signcryption is a public key cryptosystem that achieves the functions of digital signature and public key encryption simultaneously. It significantly reduces the cost of traditional signature-then-encryption approach. Although a large body of signcryption schemes have been proposed, few works have been done on attribute-based signcrytion (ABSC) which simultaneously achieves the functionalities of...
This paper describes a behavioral modeling methodology for the nonlinear transient responses of the high-voltage wordline generator in NAND flash memories. Behaviors that affect transient responses are modeled in the behavioral models to reduce computation loads. The transient response simulation including the proposed behavioral models for bandgap references, low drop-out regulators, and switched-capacitor...
We discuss a supervisory control problem of modular discrete-event systems that admits a distributed computation of supervisors. We provide a characterization and an algorithm to compute the supervisors. If the specification cannot be reached, we make use of a relaxation of coordination control to compute a sublanguage of the specification for which the supervisors can be computed in a distributed...
Madeup is a programming language for making things up-literally. Programmers write sequences of commands to move and turn through space, tracing out shapes with algorithms and mathematical operations. The language is designed to teach computation from a tangible, first-person perspective and help students integrate computation back into the physical world. We describe the language in general and reflect...
The rapid growth of the entertainment industry has driven the requirement for more efficient development of computerized games. Importantly, the diversity of audiences that participate in playing games has called for the development of new technologies that allow games to address users with differing levels of skills and preferences. This study explored the application of dynamic difficulty adjustment...
This paper investigates the feasibility of a stand-alone hybrid energy system to meet out electric load requirements of JK Lakshmipat University, Jaipur. In order to maintain continuity of electricity supply, a single energy source is not a good option. In Jaipur, Rajasthan annual average solar radiation is around 5.65 (kWh/m2/day). According to the various investigation reports wind energy system...
In this paper, the thermal field of a large scale permanent magnet embedded salient pole wind generator (PMESPWG) is investigated by using the computational fluid dynamic (CFD) modeling. To reduce the calculation, only one quarter model of the PMESPWG is established according to its symmetry. Based on the electromagnetic analysis and the empirical equations, the copper loss, stator iron loss and rotor...
Software development faces challenges from high expectation of software qualities, complexity of software and long development cycle. While Domain Specific Modeling (DSM) is helping developers overcome many of these challenges in many domains, it is not generally applied in the computer game domain. DSM can be hard to apply in the computer game domain because of the complexity of computer game domain...
Due to the predicted scarcity of the fossil fuels and their adverse effects to the environment, currently renewable energy generation is a major focus of the power and energy sector. Wind energy is one of the potential and rapidly growing sources of green energy. This is particularly due to the cost of the wind energy production has reduced by a factor of more than five over the last two decades....
The introduction and penetration of non-conventional renewable energy based generation technologies in South Africa and the world over has increased grid connection complexities. This has resulted in strict grid code requirements by utilities in order to ensure a reliable, safe and economically manageable grid operation. This justifies the need for adequate system models to represent overall system...
There exist several models for writing the equations of a multidimensional (nD) linear system and equivalence transformations can be used to pass from one representation to another. Within the constructive algebraic analysis approach to nD linear systems theory, this equivalence issue is studied by means of isomorphisms of finitely presented modules. The present paper illustrates this general algebraic...
Some high level algorithmic steps require more than one statement to implement, but are not large enough to be a method on their own. Specifically, many algorithmic steps (e.g., count, compare pairs of elements, find the maximum) are implemented as loop structures, which lack the higher level abstraction of the action being performed, and can negatively affect both human readers and automatic tools...
The growing pace of information technology demands fast operation for communication and other related applications. After having a successful Machine Translation System [MTS], it has been felt to optimize the performance of Machine Translation for its real-time uses. The considered MTS is Tree Adjoining Grammar [TAG] based system. An approach has been experimented to use File model instead of Database...
The S and K combinator expressions form a well-known Turing-complete subset of the lambda calculus. Using Prolog as a meta-language, we specify evaluation, type inference and combinatorial generation algorithms for SK-combinator trees. In the process, we unravel properties shedding new light on interesting aspects of their structure and distribution. We study the proportion of well-typed terms among...
ID-based authenticated key exchange (ID-AKE) is a cryptographic tool to establish a common session key between parties with authentication based on their IDs. If IDs contain some hierarchical structure such as an email address, hierarchical ID-AKE (HID-AKE) is especially suitable because of scalability. However, most of existing HID-AKE schemes do not satisfy advanced security properties such as forward...
There is a number of frameworks for the general task of classification available for free usage on the Internet. However, software to generate fuzzy classification systems using the genetic approach is scarce. In this work, we present the FCABASED RULE GENERATOR framework to automatically generate fuzzy classification systems based on a genetic rule selection process. Such rules are extracted from...
To overcome the slow convergence and local optimum of ant colony algorithm, the cloud model theory is adopted to regulate reasonably the randomness of the ant colony algorithm. In this paper, several adaptive strategies are proposed for the parameters of the ant colony algorithm and the cloud model, and for the optimum path determination. Meanwhile, the evaluation algorithm of pheromone distribution...
We are concerned with the performance analysis of finite-source networks with users retrials (repeated calls) and two heterogeneous servers classes using Markov Chains Model. Emphasis is done on comparison of two servers allocation disciplines, namely the Random Server discipline and the Fastest Free Server discipline. It is known that an analytical solution of the corresponding retrial queueing model...
This paper addresses control and scheduling codesign problem for multiple control loops sharing a common communication and computation medium, known also as networked embedded control system (NECS) in literature. Besides the limited communication medium, physical limitations on control inputs and/or states are considered as well. To avoid unnecessary use of the limited communication medium, each control...
The number of renewable energy sources in electricity grids is growing and with it the associated uncertainty. For power system operation a good tradeoff between security and cost becomes increasingly important. We consider the problem of including uncertainty from renewable in-feed in a DC security constrained optimal power flow (SCOPF) by formulating chance constraints. The chance-constrained SCOPF...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.